Quantum bandit with amplitude amplification exploration in an adversarial environment
Loading...
Access rights
openAccess
publishedVersion
URL
Journal Title
Journal ISSN
Volume Title
A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä
This publication is imported from Aalto University research portal.
View publication in the Research portal (opens in new window)
View/Open full text file from the Research portal (opens in new window)
Other link related to publication (opens in new window)
View publication in the Research portal (opens in new window)
View/Open full text file from the Research portal (opens in new window)
Other link related to publication (opens in new window)
Authors
Date
Major/Subject
Mcode
Degree programme
Language
en
Pages
7
Series
IEEE Transactions on Knowledge and Data Engineering, Volume 36, issue 1, pp. 311-317
Abstract
The rapid proliferation of learning systems in an arbitrarily changing environment mandates the need to manage tensions between exploration and exploitation. This work proposes a quantum-inspired bandit learning approach for the learning-and-adapting-based offloading problem where a client observes and learns the costs of each task offloaded to the candidate resource providers, e.g., fog nodes. In this approach, a new action update strategy and novel probabilistic action selection are adopted, provoked by the amplitude amplification and collapse postulate in quantum computation theory. We devise a locally linear mapping between a quantum-mechanical phase in a quantum domain, e.g., Grover-type search algorithm, and a distilled probability-magnitude in a value-based decision-making domain, e.g., adversarial multi-armed bandit algorithm. The proposed algorithm is generalized, via the devised mapping, for better learning weight adjustments on favorable/unfavorable actions, and its effectiveness is verified via simulation.Description
Keywords
Other note
Citation
Cho, B, Xiao, Y, Hui, P & Dong, D 2024, 'Quantum bandit with amplitude amplification exploration in an adversarial environment', IEEE Transactions on Knowledge and Data Engineering, vol. 36, no. 1, 10136755, pp. 311-317. https://doi.org/10.1109/TKDE.2023.3279207