ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2411.02383
32
1

Linear Causal Bandits: Unknown Graph and Soft Interventions

4 November 2024
Zirui Yan
A. Tajer
    CML
ArXivPDFHTML
Abstract

Designing causal bandit algorithms depends on two central categories of assumptions: (i) the extent of information about the underlying causal graphs and (ii) the extent of information about interventional statistical models. There have been extensive recent advances in dispensing with assumptions on either category. These include assuming known graphs but unknown interventional distributions, and the converse setting of assuming unknown graphs but access to restrictive hard/do⁡\operatorname{do}do interventions, which removes the stochasticity and ancestral dependencies. Nevertheless, the problem in its general form, i.e., unknown graph and unknown stochastic intervention models, remains open. This paper addresses this problem and establishes that in a graph with NNN nodes, maximum in-degree ddd and maximum causal path length LLL, after TTT interaction rounds the regret upper bound scales as O~((cd)L−12T+d+RN)\tilde{\mathcal{O}}((cd)^{L-\frac{1}{2}}\sqrt{T} + d + RN)O~((cd)L−21​T​+d+RN) where c>1c>1c>1 is a constant and RRR is a measure of intervention power. A universal minimax lower bound is also established, which scales as Ω(dL−32T)\Omega(d^{L-\frac{3}{2}}\sqrt{T})Ω(dL−23​T​). Importantly, the graph size NNN has a diminishing effect on the regret as TTT grows. These bounds have matching behavior in TTT, exponential dependence on LLL, and polynomial dependence on ddd (with the gap d d\ d ). On the algorithmic aspect, the paper presents a novel way of designing a computationally efficient CB algorithm, addressing a challenge that the existing CB algorithms using soft interventions face.

View on arXiv
Comments on this paper