Score: 1

Anomaly Detection in Networked Bandits

Published: August 27, 2025 | arXiv ID: 2508.20076v1

By: Xiaotong Cheng, Setareh Maghsudi

Potential Business Impact:

Finds weird users and suggests things they like.

Business Areas:
Intrusion Detection Information Technology, Privacy and Security

The nodes' interconnections on a social network often reflect their dependencies and information-sharing behaviors. Nevertheless, abnormal nodes, which significantly deviate from most of the network concerning patterns or behaviors, can lead to grave consequences. Therefore, it is imperative to design efficient online learning algorithms that robustly learn users' preferences while simultaneously detecting anomalies. We introduce a novel bandit algorithm to address this problem. Through network knowledge, the method characterizes the users' preferences and residuals of feature information. By learning and analyzing these preferences and residuals, it develops a personalized recommendation strategy for each user and simultaneously detects anomalies. We rigorously prove an upper bound on the regret of the proposed algorithm and experimentally compare it with several state-of-the-art collaborative contextual bandit algorithms on both synthetic and real-world datasets.

Country of Origin
🇩🇪 Germany

Page Count
16 pages

Category
Computer Science:
Multiagent Systems