Picture for Krishna Jagannathan

Krishna Jagannathan

IIT Madras

Classical Bandit Algorithms for Entanglement Detection in Parameterized Qubit States

Add code
Jun 28, 2024
Viaarxiv icon

Concentration Bounds for Optimized Certainty Equivalent Risk Estimation

Add code
May 31, 2024
Viaarxiv icon

A Survey of Risk-Aware Multi-Armed Bandits

Add code
May 12, 2022
Viaarxiv icon

Online Estimation and Optimization of Utility-Based Shortfall Risk

Add code
Nov 16, 2021
Viaarxiv icon

Statistically Robust, Risk-Averse Best Arm Identification in Multi-Armed Bandits

Add code
Aug 28, 2020
Figure 1 for Statistically Robust, Risk-Averse Best Arm Identification in Multi-Armed Bandits
Figure 2 for Statistically Robust, Risk-Averse Best Arm Identification in Multi-Armed Bandits
Figure 3 for Statistically Robust, Risk-Averse Best Arm Identification in Multi-Armed Bandits
Figure 4 for Statistically Robust, Risk-Averse Best Arm Identification in Multi-Armed Bandits
Viaarxiv icon

Bandit algorithms: Letting go of logarithmic regret for statistical robustness

Add code
Jun 22, 2020
Viaarxiv icon

Constrained regret minimization for multi-criterion multi-armed bandits

Add code
Jun 17, 2020
Viaarxiv icon

A Framework for End-to-End Deep Learning-Based Anomaly Detection in Transportation Networks

Add code
Nov 20, 2019
Figure 1 for A Framework for End-to-End Deep Learning-Based Anomaly Detection in Transportation Networks
Figure 2 for A Framework for End-to-End Deep Learning-Based Anomaly Detection in Transportation Networks
Figure 3 for A Framework for End-to-End Deep Learning-Based Anomaly Detection in Transportation Networks
Figure 4 for A Framework for End-to-End Deep Learning-Based Anomaly Detection in Transportation Networks
Viaarxiv icon

LSTM-Based Anomaly Detection: Detection Rules from Extreme Value Theory

Add code
Sep 13, 2019
Figure 1 for LSTM-Based Anomaly Detection: Detection Rules from Extreme Value Theory
Figure 2 for LSTM-Based Anomaly Detection: Detection Rules from Extreme Value Theory
Figure 3 for LSTM-Based Anomaly Detection: Detection Rules from Extreme Value Theory
Figure 4 for LSTM-Based Anomaly Detection: Detection Rules from Extreme Value Theory
Viaarxiv icon

Distribution oblivious, risk-aware algorithms for multi-armed bandits with unbounded rewards

Add code
Jun 03, 2019
Figure 1 for Distribution oblivious, risk-aware algorithms for multi-armed bandits with unbounded rewards
Figure 2 for Distribution oblivious, risk-aware algorithms for multi-armed bandits with unbounded rewards
Viaarxiv icon