Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/3306127.3331738acmconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
research-article

Attacking Power Indices by Manipulating Player Reliability

Published: 08 May 2019 Publication History

Abstract

We investigate the manipulation of power indices in TU-cooperative games by stimulating (subject to a budget constraint) changes in the propensity of other players to participate to the game.
We display several algorithms that show that the problem is often tractable for so-called network centrality games and influence attribution games, as well as an example when optimal manipulation is intractable, even though computing power indices is feasible.

References

[1]
Karthik V. Aadithya and Balaraman Ravindran. 2010. Game theoretic network centrality: exact formulas and efficient algorithms. In Proceedings of the 2010 International Conference on Autonomous Agents and Multiagent Systems: volume 1-Volume 1. 1459--1460.
[2]
Haris Aziz, Yoram Bachrach, Edith Elkind, and Mike Paterson. 2011. False-name manipulations in weighted voting games. Journal of Artificial Intelligence Research, Vol. 40 (2011), 57--93.
[3]
Haris Aziz, Oded Lachish, Mike Paterson, and Rahul Savani. 2009. Power indices in spanning connectivity games. In International Conference on Algorithmic Applications in Management. Springer, 55--67.
[4]
Yoram Bachrach, Yuval Filmus, Joel Oren, and Yair Zick. 2016. Analyzing Power in Weighted Voting Games with Super-Increasing Weights. In International Symposium on Algorithmic Game Theory. Springer, 169--181.
[5]
Yoram Bachrach, Ian Kash, and Nisarg Shah. 2012. Agent failures in totally balanced games and convex games. In International Workshop on Internet and Network Economics. Springer, 15--29.
[6]
Yoram Bachrach, Reshef Meir, Michal Feldman, and Moshe Tennenholtz. 2011. Solving Cooperative Reliability Games. In Proceedings of the Twenty-Seventh Conference on Uncertainty in Artificial Intelligence (UAI'11). AUAI Press, 27--34.
[7]
Yoram Bachrach, David Parkes, and Jeffrey S. Rosenschein. 2013. Computing cooperative solution concepts in coalitional skill games. Artificial Intelligence, Vol. 204 (2013), 1--21.
[8]
Yoram Bachrach and Jeffrey S Rosenschein. 2008. Coalitional skill games. In Proceedings of the 2007 international joint conference on Autonomous agents and multiagent systems-Volume 2 . 1023--1030.
[9]
Yoram Bachrach, Rahul Savani, and Nisarg Shah. 2014. Cooperative max games and agent failures. In Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems. 29--36.
[10]
Yoram Bachrach and Nisarg Shah. 2013. Reliability weighted voting games. In International Symposium on Algorithmic Game Theory. Springer, 38--49.
[11]
J.M. Bilbao, J.R. Fernandez, A. Losada Jiménez, and E Lebrón. 2000. Bicooperative games. Cooperative games on combinatorial structures. (2000), 131--295.
[12]
George Chalkiadakis, Edith Elkind, and Michael Wooldridge. 2011. Computational Aspects of Cooperative Game Theory. Synthesis Lectures on Artificial Intelligence and Machine Learning (2011).
[13]
Georgios Chalkiadakis, Evangelos Markakis, and Craig Boutilier. 2007. Coalition formation under uncertainty: Bargaining equilibria and the Bayesian core stability concept. In Proceedings of the 2007 international joint conference on Autonomous agents and multiagent systems . 412--419.
[14]
Vincent Conitzer, Tuomas Sandholm, and Jérôme Lang. 2007. When are elections with few candidates hard to manipulate? Journal of the A.C.M., Vol. 54, 3 (2007), 14.
[15]
Vincent Conitzer and Toby Walsh. 2016. Handbook of Computational Social Choice .Cambridge University Press, Chapter Barriers to Manipulation in Voting.
[16]
Xiaotie Deng and Christos H. Papadimitriou. 1994. On the complexity of cooperative solution concepts. Mathematics of Operations Research, Vol. 19, 2 (1994), 257--266.
[17]
Edith Elkind and Gábor Erdélyi. 2012. Manipulation under voting rule uncertainty. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems-Volume 2 . 627--634.
[18]
Edith Elkind, Piotr Faliszewski, and Arkadii Slinko. 2011. Cloning in elections: Finding the possible winners. Journal of Artificial Intelligence Research, Vol. 42 (2011), 529--573.
[19]
Edith Elkind, Leslie Ann Goldberg, Paul W. Goldberg, and Michael Wooldridge. 2009. A tractable and expressive class of marginal contribution nets and its applications. Mathematical Logic Quarterly, Vol. 55, 4 (2009), 362--376.
[20]
Piotr Faliszewski, Edith Hemaspaandra, and Lane A. Hemaspaandra. 2006. The complexity of bribery in elections. In Proceedins of the AAAI, Vol. 6. 641--646.
[21]
Piotr Faliszewski, Edith Hemaspaandra, and Lane A. Hemaspaandra. 2011. Multimode control attacks on elections. Journal of Artificial Intelligence Research, Vol. 40 (2011), 305--351.
[22]
Piotr Faliszewski and Joerg Rothe. 2016. Handbook of Computational Social Choice .Cambridge University Press, Chapter Control and Bribery in Voting.
[23]
Dan S. Felsenthal and Moshé Machover. 1997. Ternary voting games. International journal of game theory, Vol. 26, 3 (1997), 335--351.
[24]
Jorge E. Hirsch. 2018. $h_α$ : An index to quantify an individual's scientific leadership. arXiv preprint arXiv:1810.01605 (2018).
[25]
Samuel Ieong and Yoav Shoham. 2005. Marginal contribution nets: a compact representation scheme for coalitional games. In Proceedings of the 6th ACM conference on Electronic commerce. ACM, 193--202.
[26]
Ayumi Igarashi, Rani Izsak, and Edith Elkind. 2018. Cooperative Games With Bounded Dependency Degree. Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, (AAAI-18), the 30th innovative Applications of Artificial Intelligence (IAAI-18), and the 8th AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-18), New Orleans, Louisiana, USA, February 2--7, 2018. 1063--1070.
[27]
Alexander Karpov. 2014. Equal weights coauthorship sharing and the Shapley value are equivalent. Journal of Informetrics, Vol. 8, 1 (2014), 71--76.
[28]
Steven Ketchpel. 1994. Forming coalitions in the face of uncertain rewards. In Proceedings of the AAAI, Vol. 94. 414--419.
[29]
Omer Lev, Maria Polukarov, Yoram Bachrach, and Jeffrey S. Rosenschein. 2013. Mergers and collusion in all-pay auctions and crowdsourcing contests. In Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems . 675--682.
[30]
Somchaya Liemhetcharat and Manuela Veloso. 2012. Modeling and learning synergy for team formation with heterogeneous agents. In Proceedings of the 2012 International Conference on Autonomous Agents and Multiagent Systems-Volume 1. 365--374.
[31]
Somchaya Liemhetcharat and Manuela Veloso. 2014. Weighted synergy graphs for effective team formation with heterogeneous ad hoc agents. Artificial Intelligence, Vol. 208 (2014), 41--65.
[32]
R. Lindelauf, H. Hamers, and B. Husslage. 2013. Cooperative game theoretic centrality analysis of terrorist networks: The cases of Jemaah Islamiyah and Al Qaeda. European Journal of Operational Research, Vol. 229, 1 (2013), 230--238.
[33]
Yasuko Matsui and Tomomi Matsui. 2001. NP-completeness for calculating power indices of weighted majority games. Theoretical Computer Science, Vol. 263, 1--2 (2001), 305--310.
[34]
Reshef Meir, Moshe Tennenholtz, Yoram Bachrach, and Peter Key. 2012. Congestion Games with Agent Failures. In Proceedings of the AAAI, Vol. 12. 1401--1407.
[35]
Tomasz P. Michalak, Karthik V. Aadithya, Piotr L Szczepanski, Balaraman Ravindran, and Nicholas R. Jennings. 2013. Efficient computation of the Shapley value for game-theoretic network centrality. Journal of Artificial Intelligence Research (2013), 607--650.
[36]
Tomasz P. Michalak, Talal Rahwan, Oskar Skibski, and Michael Wooldridge. 2015. Defeating terrorist networks with game theory. IEEE Intelligent Systems, Vol. 30, 1 (2015), 53--61.
[37]
Allison C. Morgan, Dimitrios J. Economou, Samuel F. Way, and Aaron Clauset. 2018. Prestige drives epistemic inequality in the diffusion of scientific ideas. EPJ Data Science, Vol. 7, 1 (19 Oct 2018), 40.
[38]
Panagiotis Papapetrou, Aristides Gionis, and Heikki Mannila. 2011. A Shapley value approach for influence attribution. Machine Learning and Knowledge Discovery in Databases. Springer, 549--564.
[39]
Ariel D. Procaccia, Nisarg Shah, and Max Lee Tucker. 2014. On the Structure of Synergies in Cooperative Games. In Proceedings of the AAAI . 763--769.
[40]
R. Ravi, Madhav V. Marathe, S.S. Ravi, Daniel J. Rosenkrantz, and Harry B. Hunt III. 1993. Many birds with one stone: Multi-objective approximation algorithms. In Proceedings of the twenty-fifth annual ACM Symposium on Theory of Computing . 438--447.
[41]
J. Cole Smith. 1997. Basic Interdiction Models. Wiley Encyclopedia of Operations Research and Management Science. American Cancer Society.
[42]
J. Cole Smith, Mike Prince, and Joseph Geunes. 2013. Modern network interdiction problems and algorithms. Handbook of combinatorial optimization . Springer, 1949--1987.
[43]
Rama N. Suri and Y. Narahari. 2008. Determining the top-k nodes in social networks using the Shapley value. In Proceedings of the 2008 international conference on Autonomous agents and multi-agent systems . 1509--1512.
[44]
Mateusz K. Tarkowski, Tomasz P. Michalak, Talal Rahwan, and Michael Wooldridge. 2017. Game-theoretic Network Centrality: A Review. arXiv preprint arXiv:1801.00218 (2017).
[45]
Thibaut Vallée, Grégory Bonnet, Bruno Zanuttini, and Francc ois Bourdon. 2014. A study of sybil manipulations in hedonic games. Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems. 21--28.
[46]
Marcin Waniek, Tomasz P. Michalak, Talal Rahwan, and Michael Wooldridge. 2017. On the Construction of Covert Networks. In Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems (AAMAS '17). International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, 1341--1349. http://dl.acm.org/citation.cfm?id=3091282.3091310
[47]
Marcin Waniek, Tomasz P. Michalak, Michael J. Wooldridge, and Talal Rahwan. 2018. Hiding individuals and communities in a social network. Nature Human Behaviour, Vol. 2, 2 (2018), 139--147.
[48]
Makoto Yokoo, Vincent Conitzer, Tuomas Sandholm, Naoki Ohta, and Atsushi Iwasaki. 2005. Coalitional games in open anonymous environments. Proceedings of AAAI, Vol. 5. 509--514.
[49]
Michael Zuckerman, Piotr Faliszewski, Yoram Bachrach, and Edith Elkind. 2012. Manipulating the quota in weighted voting games. Artificial Intelligence, Vol. 180 (2012), 1--19.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
AAMAS '19: Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems
May 2019
2518 pages
ISBN:9781450363099

Sponsors

Publisher

International Foundation for Autonomous Agents and Multiagent Systems

Richland, SC

Publication History

Published: 08 May 2019

Check for updates

Author Tags

  1. coalitional games
  2. manipulation
  3. reliability extension
  4. shapley value

Qualifiers

  • Research-article

Funding Sources

  • CNCS-UEFISCDI

Conference

AAMAS '19
Sponsor:

Acceptance Rates

AAMAS '19 Paper Acceptance Rate 193 of 793 submissions, 24%;
Overall Acceptance Rate 1,155 of 5,036 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 54
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media