
Best Arm Identification for Cascading Bandits in the Fixed Confidence Setting
We design and analyze CascadeBAI, an algorithm for finding the best set ...
read it

Stochastic LBFGS: Improved Convergence Rates and Practical Acceleration Strategies
We revisit the stochastic limitedmemory BFGS (LBFGS) algorithm. By pro...
read it

The Informativeness of kMeans and Dimensionality Reduction for Learning Mixture Models
The learning of mixture models can be viewed as a clustering problem. In...
read it

RankOne NMFBased Initialization for NMF and Relative Error Bounds under a Geometric Assumption
We propose a geometric assumption on nonnegative data matrices such that...
read it

A Unified Convergence Analysis of the Multiplicative Update Algorithm for Regularized Nonnegative Matrix Factorization
The multiplicative update (MU) algorithm has been extensively used to es...
read it

Online Nonnegative Matrix Factorization with General Divergences
We develop a unified and systematic framework for performing online nonn...
read it

Online Nonnegative Matrix Factorization with Outliers
We propose a unified and systematic framework for performing online nonn...
read it

Adversarial TopK Ranking
We study the topK ranking problem where the goal is to recover the set ...
read it

Automatic Relevance Determination in Nonnegative Matrix Factorization with the βDivergence
This paper addresses the estimation of the latent dimensionality in nonn...
read it

Highdimensional structure estimation in Ising models: Local separation criterion
We consider the problem of highdimensional Ising (graphical) model sele...
read it

Rank Minimization over Finite Fields: Fundamental Limits and CodingTheoretic Interpretations
This paper establishes informationtheoretic limits in estimating a fini...
read it

Learning Latent Tree Graphical Models
We study the problem of learning a latent tree graphical model where sam...
read it

Learning Gaussian Tree Models: Analysis of Error Exponents and Extremal Structures
The problem of learning treestructured Gaussian graphical models from i...
read it

TimeDivision Transmission is Optimal for Covert Communication over Broadcast Channels
We consider a covert communication scenario where a legitimate transmitt...
read it

The Dispersion of Universal Joint SourceChannel Coding for Arbitrary Sources and Additive Channels
We consider a universal joint source channel coding (JSCC) scheme to tra...
read it

ErrorFree Communication Over StateDependent Channels with VariableLength Feedback
The zeroerror capacity of statedependent channels with noiseless feedb...
read it

Asymptotic Coupling and Its Applications in Information Theory
A coupling of two distributions P_X and P_Y is a joint distribution P_XY...
read it

The Optimal Compression Rate of VariabletoFixed Length Source Coding with a NonVanishing ExcessDistortion Probability
We consider the variabletofixed length lossy source coding (VFSC) prob...
read it

Simulation of Random Variables under Rényi Divergence Measures of All Orders
The random variable simulation problem consists in using a kdimensional...
read it

SecondOrder Asymptotically Optimal Statistical Classification
Motivated by realworld machine learning applications, we analyze approx...
read it

Distributed Hypothesis Testing with Privacy Constraints
We revisit the distributed hypothesis testing (or hypothesis testing wit...
read it

Strong Converse for Hypothesis Testing Against Independence over a TwoHop Network
By proving a strong converse, we strengthen the weak converse result by ...
read it

Thompson Sampling for Cascading Bandits
We design and analyze TSCascade, a Thompson sampling algorithm for the ...
read it

On Exact and ∞Rényi Common Informations
Recently, two extensions of Wyner's common information — exact and Rényi...
read it

Corrections to "Wyner's Common Information under Rényi Divergence Measures"
In this correspondence, we correct an erroneous argument in the proof of...
read it

Asymptotically Optimal Codes Correcting FixedLength Duplication Errors in DNA Storage Systems
A (tandem) duplication of length k is an insertion of an exact copy of...
read it

Distributionally Robust and MultiObjective Nonnegative Matrix Factorization
Nonnegative matrix factorization (NMF) is a linear dimensionality reduct...
read it

A Ranking Model Motivated by Nonnegative Matrix Factorization with Applications to Tennis Tournaments
We propose a novel ranking model that combines the BradleyTerryLuce pr...
read it

SecondOrder Asymptotics of the ContinuousTime Poisson Channel
The paper derives the optimal secondorder coding rate for the continuou...
read it

Bounds on the Average Distance and Distance Enumerator with Applications to NonInteractive Simulation
We leverage proof techniques in coding theory and Fourier analysis to de...
read it

Distributed Detection with Empirically Observed Statistics
We consider a binary distributed detection problem in which the distribu...
read it

Exact Channel Synthesis
We consider the exact channel synthesis problem, which is the problem of...
read it

Second and ThirdOrder Asymptotics of the ContinuousTime Poisson Channel
The paper derives the optimal second and thirdorder coding rates for t...
read it

Error Exponent Bounds for the BeeIdentification Problem
Consider the problem of identifying a massive number of bees, uniquely l...
read it

Analysis of Optimization Algorithms via SumofSquares
In this work, we introduce a new framework for unifying and systematizin...
read it

Covert Communication Over a Compound Channel
In this paper, we consider fundamental communication limits over a compo...
read it

Throughput Scaling of Covert Communication over Wireless Adhoc Networks
We consider the problem of covert communication over wireless adhoc netw...
read it

On Robustness of Neural Ordinary Differential Equations
Neural ordinary differential equations (ODEs) have been attracting incre...
read it

VariableLength Source Dispersions Differ under Maximum and Average Error Criteria
Variablelength compression without prefixfree constraints and with sid...
read it

On the BeeIdentification Error Exponent with Absentee Bees
The "beeidentification problem" was formally defined by Tandon, Tan and...
read it

On the Capacity of Channels with Deletions and States
We consider the class of channels formed from the concatenation of a del...
read it

Sequential Classification with Empirically Observed Statistics
Motivated by realworld machine learning applications, we consider a sta...
read it

Economy Statistical Recurrent Units For Inferring Nonlinear Granger Causality
Granger causality is a widelyused criterion for analyzing interactions ...
read it

An Improved Linear Programming Bound on the Average Distance of a Binary Code
Ahlswede and Katona (1977) posed the following isodiametric problem in H...
read it

Community Detection and Matrix Completion with TwoSided Graph SideInformation
We consider the problem of recovering communities of users and communiti...
read it

Tight Regret Bounds for Noisy Optimization of a Brownian Motion
We consider the problem of Bayesian optimization of a onedimensional Br...
read it

Thompson Sampling Algorithms for MeanVariance Bandits
The multiarmed bandit (MAB) problem is a classical learning task that e...
read it

SecondOrder Asymptotics of Sequential Hypothesis Testing
We consider the classical sequential binary hypothesis testing problem i...
read it

Asymptotic Expansions of Smooth Rényi Entropies and Their Applications
This study considers the unconditional smooth Rényi entropy, the smooth ...
read it

Optimal Resolution of ChangePoint Detection with Empirically Observed Statistics and Erasures
This paper revisits the offline changepoint detection problem from a st...
read it
Vincent Y. F. Tan
is this you? claim profile
Associate Professor of Electrical Engineering and Mathematics, National University of Singapore