%0 Conference Proceedings %T Thompson Sampling Guided Stochastic Searching on the Line for Adversarial Learning %+ University of Agder (UIA) %A Glimsdal, Sondre %A Granmo, Ole-Christoffer %Z Part 5: Machine Learning %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 11th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI 2015) %C Bayonne, France %Y Richard Chbeir %Y Yannis Manolopoulos %Y Ilias Maglogiannis %Y Reda Alhajj %3 Artificial Intelligence Applications and Innovations %V AICT-458 %P 307-317 %8 2015-09-14 %D 2015 %R 10.1007/978-3-319-23868-5_22 %K N-Door Puzzle %K Multi-armed Bandit Problem %K Adversarial Learning %K Bayesian Learning %K Thompson Sampling %Z Computer Science [cs]Conference papers %X The multi-armed bandit problem has been studied for decades. In brief, a gambler repeatedly pulls one out of N slot machine arms, randomly receiving a reward or a penalty from each pull. The aim of the gambler is to maximize the expected number of rewards received, when the probabilities of receiving rewards are unknown. Thus, the gambler must, as quickly as possible, identify the arm with the largest probability of producing rewards, compactly capturing the exploration-exploitation dilemma in reinforcement learning. In this paper we introduce a particular challenging variant of the multi-armed bandit problem, inspired by the so-called N-Door Puzzle. In this variant, the gambler is only told whether the optimal arm lies to the “left” or to the “right” of the one pulled, with the feedback being erroneous with probability 1 − p. Our novel scheme for this problem is based on a Bayesian representation of the solution space, and combines this representation with Thompson sampling to balance exploration against exploitation. Furthermore, we introduce the possibility of traitorous environments that lie about the direction of the optimal arm (adversarial learning problem). Empirical results show that our scheme deals with both traitorous and non-traitorous environments, significantly outperforming competing algorithms. %G English %Z TC 12 %Z WG 12.5 %2 https://inria.hal.science/hal-01385366/document %2 https://inria.hal.science/hal-01385366/file/978-3-319-23868-5_22_Chapter.pdf %L hal-01385366 %U https://inria.hal.science/hal-01385366 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC12 %~ IFIP-AIAI %~ IFIP-WG12-5 %~ IFIP-AICT-458