Skip to main content

Showing 1–5 of 5 results for author: Kong, F

Searching in archive stat. Search in all archives.
.
  1. arXiv:2412.03381  [pdf, other

    quant-ph cond-mat.stat-mech cs.LG stat.ML

    Classical Shadows with Improved Median-of-Means Estimation

    Authors: Winston Fu, Dax Enshan Koh, Siong Thye Goh, Jian Feng Kong

    Abstract: The classical shadows protocol, introduced by Huang et al. [Nat. Phys. 16, 1050 (2020)], makes use of the median-of-means (MoM) estimator to efficiently estimate the expectation values of $M$ observables with failure probability $δ$ using only $\mathcal{O}(\log(M/δ))$ measurements. In their analysis, Huang et al. used loose constants in their asymptotic performance bounds for simplicity. However,… ▽ More

    Submitted 4 December, 2024; originally announced December 2024.

    Comments: 15 pages, 13 figures

    Journal ref: Quantum Science and Technology 10, 035043 (2025)

  2. arXiv:2403.07213  [pdf, other

    cs.LG stat.ML

    Which LLM to Play? Convergence-Aware Online Model Selection with Time-Increasing Bandits

    Authors: Yu Xia, Fang Kong, Tong Yu, Liya Guo, Ryan A. Rossi, Sungchul Kim, Shuai Li

    Abstract: Web-based applications such as chatbots, search engines and news recommendations continue to grow in scale and complexity with the recent surge in the adoption of LLMs. Online model selection has thus garnered increasing attention due to the need to choose the best model among a diverse set while balancing task reward and exploration cost. Organizations faces decisions like whether to employ a cos… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

    Comments: Accepted by WWW'24 (Oral)

  3. arXiv:2303.06825  [pdf, ps, other

    cs.LG stat.ML

    Best-of-three-worlds Analysis for Linear Bandits with Follow-the-regularized-leader Algorithm

    Authors: Fang Kong, Canzhe Zhao, Shuai Li

    Abstract: The linear bandit problem has been studied for many years in both stochastic and adversarial settings. Designing an algorithm that can optimize the environment without knowing the loss type attracts lots of interest. \citet{LeeLWZ021} propose an algorithm that actively detects the loss type and then switches between different algorithms specially designed for specific settings. However, such an ap… ▽ More

    Submitted 18 July, 2023; v1 submitted 12 March, 2023; originally announced March 2023.

    Comments: Accepted in COLT 2023

  4. arXiv:2111.04295  [pdf, ps, other

    cs.LG cs.DS stat.ML

    The Hardness Analysis of Thompson Sampling for Combinatorial Semi-bandits with Greedy Oracle

    Authors: Fang Kong, Yueran Yang, Wei Chen, Shuai Li

    Abstract: Thompson sampling (TS) has attracted a lot of interest in the bandit area. It was introduced in the 1930s but has not been theoretically proven until recent years. All of its analysis in the combinatorial multi-armed bandit (CMAB) setting requires an exact oracle to provide optimal solutions with any input. However, such an oracle is usually not feasible since many combinatorial optimization probl… ▽ More

    Submitted 8 November, 2021; originally announced November 2021.

    Comments: Accepted in NeurIPS, 2021

  5. arXiv:2006.00250  [pdf

    eess.SP cs.LG stat.ML

    Sequence to Point Learning Based on Bidirectional Dilated Residual Network for Non Intrusive Load Monitoring

    Authors: Ziyue Jia, Linfeng Yang, Zhenrong Zhang, Hui Liu, Fannie Kong

    Abstract: Non Intrusive Load Monitoring (NILM) or Energy Disaggregation (ED), seeks to save energy by decomposing corresponding appliances power reading from an aggregate power reading of the whole house. It is a single channel blind source separation problem (SCBSS) and difficult prediction problem because it is unidentifiable. Recent research shows that deep learning has become a growing popularity for NI… ▽ More

    Submitted 30 May, 2020; originally announced June 2020.