{"id":1056,"date":"2025-08-06T17:27:23","date_gmt":"2025-08-06T17:27:23","guid":{"rendered":"https:\/\/mll.iiit.ac.in\/?p=1056"},"modified":"2025-08-06T17:32:39","modified_gmt":"2025-08-06T17:32:39","slug":"differentially-private-federated-combinatorial-bandits-with-constraints","status":"publish","type":"post","link":"https:\/\/mll.iiit.ac.in\/index.php\/2025\/08\/06\/differentially-private-federated-combinatorial-bandits-with-constraints\/","title":{"rendered":"Differentially Private Federated Combinatorial Bandits with Constraints"},"content":{"rendered":"\n<p class=\"has-ast-global-color-6-background-color has-background wp-block-paragraph\"><strong>Appeared at: <\/strong>European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases 2022<br><strong>Author: <\/strong>Sambhav Solanki, Sujit Gujar, Sankarshan Damle, Samhita Kanaparthy<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In multi-agent online learning settings, federated learning (<em>FL<\/em>) is a valuable tool. However, the learning agents can be competitive, and privacy concerns can pose a barrier to engagement in&nbsp;<em>FL<\/em>. Each agent would like to learn from others, but the part of the information it shares for others to learn from could be sensitive; thus, it desires its privacy.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This work investigates a group of agents working concurrently to solve similar combinatorial bandit problems while maintaining quality constraints. We propose that by employing differential privacy, these agents can collectively learn while keeping their sensitive information confidential. However, differential privacy techniques for protecting sensitive information makes the data noisy and may deteriorate rather than help improve regret. Hence, our work notes that deciding when to communicate and what shared data to learn is essential to strike a functional balance between regret and privacy. For such a federated combinatorial MAB setting, our work proposes a Privacy-preserving Federated Combinatorial Bandit algorithm,&nbsp;<em>P-FCB<\/em>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Say an agent wants to procure and utilize a component manufactured by several producers but can only learn the component\u2019s quality (dependent on the producer) upon procurement. This learning is similar to the exploration and exploitation problem, popularly known as Multi-armed Bandit (<em>MAB<\/em>). It needs sequential interactions between sets of producers and the learning agent. We propose that the learning agents communicate their history of procurements with each other to better estimate the qualities helping them maximize their revenues.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>P-FCB<\/em>&nbsp;comprises a novel communication algorithm among agents, while each agent is learning the qualities of the producers to cooperate in the learning process. Crucially in&nbsp;<em>P-FCB<\/em>, the agent only communicates within a specific time frame. It is not beneficial to communicate in (i) very early rounds (estimates have high error probability) or (ii) very late rounds (value added by communicating is minimal). Additionally,&nbsp;<em>P-FCB&nbsp;<\/em>minimizes privacy loss by limiting the number of rounds agents communicate. Further, to ensure the privacy of the shared information, the agents add calibrated noise to sanitize the information a priori.&nbsp;<em>P-FCB&nbsp;<\/em>also uses error bounds generated for&nbsp;<em>UCB&nbsp;<\/em>exploration (a commonly used learning technique in bandit literature) to determine if shared information is worth learning.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Our work shows the efficacy of&nbsp;<em>P-FCB&nbsp;<\/em>through simulations. Further, the algorithm provides an improvement in terms of regret while upholding quality threshold and meaningful privacy guarantees.<\/p>\n\n\n<div class=\"taxonomy-post_tag wp-block-post-terms\"><span class=\"wp-block-post-terms__prefix\">Keywords: <\/span><a href=\"https:\/\/mll.iiit.ac.in\/index.php\/tag\/federated-learning\/\" rel=\"tag\">Federated Learning<\/a><span class=\"wp-block-post-terms__separator\">, <\/span><a href=\"https:\/\/mll.iiit.ac.in\/index.php\/tag\/multi-armed-bandit\/\" rel=\"tag\">Multi-Armed Bandit<\/a><span class=\"wp-block-post-terms__separator\">, <\/span><a href=\"https:\/\/mll.iiit.ac.in\/index.php\/tag\/privacy\/\" rel=\"tag\">Privacy<\/a><\/div>","protected":false},"excerpt":{"rendered":"<p>Appeared at: European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases 2022Author: Sambhav Solanki, Sujit [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[14,15,16],"class_list":["post-1056","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-federated-learning","tag-multi-armed-bandit","tag-privacy"],"_links":{"self":[{"href":"https:\/\/mll.iiit.ac.in\/index.php\/wp-json\/wp\/v2\/posts\/1056","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mll.iiit.ac.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mll.iiit.ac.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mll.iiit.ac.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mll.iiit.ac.in\/index.php\/wp-json\/wp\/v2\/comments?post=1056"}],"version-history":[{"count":3,"href":"https:\/\/mll.iiit.ac.in\/index.php\/wp-json\/wp\/v2\/posts\/1056\/revisions"}],"predecessor-version":[{"id":1061,"href":"https:\/\/mll.iiit.ac.in\/index.php\/wp-json\/wp\/v2\/posts\/1056\/revisions\/1061"}],"wp:attachment":[{"href":"https:\/\/mll.iiit.ac.in\/index.php\/wp-json\/wp\/v2\/media?parent=1056"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mll.iiit.ac.in\/index.php\/wp-json\/wp\/v2\/categories?post=1056"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mll.iiit.ac.in\/index.php\/wp-json\/wp\/v2\/tags?post=1056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}