Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd

Ya-Ting Yang, Tao Zhang, and Quanyan Zhu The Authors are with the Department of Electrical and Computer Engineering, New York University, Brooklyn, NY, 11201, USA; E-mail: {yy4348, tz636, qz494}@nyu.edu.
Abstract

Privacy-preserving AI algorithms are widely adopted in various domains, but the lack of transparency might pose accountability issues. While auditing algorithms can address this issue, machine-based audit approaches are often costly and time-consuming. Herd audit, on the other hand, offers an alternative solution by harnessing collective intelligence. Nevertheless, the presence of epistemic disparity among auditors, resulting in varying levels of expertise and access to knowledge, may impact audit performance. An effective herd audit will establish a credible accountability threat for algorithm developers, incentivizing them to uphold their claims. In this study, our objective is to develop a systematic framework that examines the impact of herd audits on algorithm developers using the Stackelberg game approach. The optimal strategy for auditors emphasizes the importance of easy access to relevant information, as it increases the auditors’ confidence in the audit process. Similarly, the optimal choice for developers suggests that herd audit is viable when auditors face lower costs in acquiring knowledge. By enhancing transparency and accountability, herd audit contributes to the responsible development of privacy-preserving algorithms.

I Introduction

AI and algorithmic decision-making have become pervasive in both business and society. However, when algorithms are treated as “black boxes” and their inner workings remain undisclosed, it becomes difficult to ensure that they perform as intended and adhere to necessary standards [1]. One specific category of algorithms that exemplifies this challenge is privacy-preserving algorithms [2]. For instance, platforms like Facebook Ad Recommendation Systems, Google SQL, and Safari have integrated differential privacy into their products to provide privacy protection. Nevertheless, verifying such claims can be arduous and intricate, for example, see [3, 4, 5].

Herd Audit: Auditing algorithms [6], [7] play a crucial role in tackling this challenge. However, traditional machine-based audit methods like direct scraping, sock puppet, and carrier puppet often necessitate the development of custom computer programs to gather data. Not only can these approaches be expensive, but they also consume a significant amount of time. A cost-effective alternative approach to auditing involves leveraging citizen science and crowd-sourcing principles to establish a democratic audit process that engages a diverse population of end users [8]. This concept gives rise to herd-audit (or group-audit) approaches. By empowering end users as auditors, we can foster a more democratic approach to algorithmic auditing while minimizing costs and time investments.

Refer to caption
Figure 1: A herd of diverse end-users act as auditors to inspect the AI algorithm used in the developed product.

Epistemic Disparity: One significant challenge in implementing herd-audit approaches is the presence of epistemic disparity [9, 10]. Not all users possess the same level of expertise or information required to conduct comprehensive audits of algorithms. A user-auditor with limited cognitive resources may inadvertently provide opportunities for algorithm developers to evade their responsibility. To some extent, incorporating audit into the algorithm design process itself establishes an accountability mechanism for developers. This accountability mechanism acts as an incentive for algorithm developers to uphold their claims and create responsible algorithms.

Game-Theoretic Framework: To design an effective herd-audit mechanism, this work aims to develop a comprehensive system framework that investigates the influence of herd-audit on algorithm developers. To accomplish the goal, the system framework adopts a Stackelberg game approach [11, 12]. In this approach, the developer assumes the role of the leader and determines the desired level of performance for differential privacy. The followers, comprising idiosyncratic end-users or auditors, are selected from a user population characterized by varying levels of epistemic capabilities. The proposed framework assumes that algorithms and their associated guarantees are clearly communicated to the end-users through a privacy protection agreement. This leader-and-follower structure allows us to analyze the optimal strategies employed by both the developer and the auditors, providing insights into the potential noncompliant behaviors of developers.

In order to capture the epistemic disparity experienced by end-users (auditors), this work employs a rational inattention model [13, 14], which takes into account the costs associated with accessing information during the decision-making process. We analyze the epistemic disparity among auditors, characterized by the epistemic factor, which measures the difficulty of accessing information. We find that auditors with lower epistemic factors exhibit higher audit confidence, indicating a better audit performance. Furthermore, our investigation reveals that a herd audit is a viable approach when auditors face lower costs in accessing information. In such circumstances, the algorithm developer is less likely to deviate significantly from their claims. Our findings highlight the importance of reducing epistemic injustice as well as lowering information costs to enhance the effectiveness of herd audits. By doing so, we can foster a more reliable and accountable environment for the development of algorithms.

Related Works Algorithm auditing refers to the process of evaluating the algorithms used in systems or applications to ensure they are fair, transparent, unbiased, and comply with ethical standards [6]. In differential privacy, several machine-based verification methods have been proposed [3, 4, 5]. While there has been a rich literature on citizen science and its applications in crowdsensing [15], crowdsourcing [16], and crowd defense [17], herd audit is a concept in its infancy. It reduces auditing costs and poses a threat to developers, as public perception [18] can be influenced by the audit results.

The disparity in the capability of herd behaviors has been studied in collective intelligence [19, 8, 20, 21]. The literature has examined the performance [22], reliability [23], and trustworthiness [24] of participants engaged in outsourced tasks. Processes such as risk and reputation management [25, 26] have been utilized to understand the differences among participants. Numerous studies have focused on different cognitive behaviors in humans, including cognitive-behavioral theory [27, 28, 29] which elucidates how thoughts, beliefs, and cognitive processes shape behavior, and the theory of mind [30] that attributes mental states such as beliefs and emotions to predict individuals’ behavior. In our work, we employ the concept of rational inattention, as studied in [31], which provides a framework that analyzes how decision-makers acquire information while considering associated costs, enabling investigations into cognitive impacts on audit decisions.

A game-theoretic approach is commonly employed to capture the threat posed by followers in dynamic games, such as ultimatum games [32], Stackelberg games [33], bargaining games [34], as well as contract [35, 36] and incentive mechanisms designs [37, 38]. Recently, there has been increased interest in the investigation of evasion behaviors [39]. This includes exploiting evasion-aware detection methods [40] and developing evaders for subsequent tests of collaborative cognition-assisted detector [41].

II Herd Auditors with Epistemic Disparity

In the context of herd-auditing an algorithm, the auditor is uncertain about the true state ωΩ={g,b}𝜔Ω𝑔𝑏\omega\in\Omega=\{g,b\}italic_ω ∈ roman_Ω = { italic_g , italic_b }, where g𝑔gitalic_g indicates the null hypothesis, implying that the algorithm is consistent with the claim, while b𝑏bitalic_b is for the alternative hypothesis, meaning that the algorithm does not comply. The prior belief of state ω𝜔\omegaitalic_ω can be denoted as μ(ω)𝜇𝜔\mu(\omega)italic_μ ( italic_ω ), implying the auditor’s uncertainty in the algorithm’s compliance.

In order to reduce the uncertainty, the auditor can obtain information s𝑠sitalic_s about the state according to the information-obtaining strategy d(s|ω)𝑑conditional𝑠𝜔d(s|\omega)italic_d ( italic_s | italic_ω ). More specifically, s𝑠sitalic_s can be viewed as the outcome of the algorithm, and d(s|ω)𝑑conditional𝑠𝜔d(s|\omega)italic_d ( italic_s | italic_ω ) indicates how the auditor accesses (obtains) it. The information s𝑠sitalic_s together with the obtaining strategy leads to a posterior belief of the state μ(ω|s)=μ(ω)d(s|ω)ωμ(ω)d(s|ω)𝜇conditional𝜔𝑠𝜇𝜔𝑑conditional𝑠𝜔subscript𝜔𝜇𝜔𝑑conditional𝑠𝜔\mu(\omega|s)=\frac{\mu(\omega)d(s|\omega)}{\sum_{\omega}\mu(\omega)d(s|\omega)}italic_μ ( italic_ω | italic_s ) = divide start_ARG italic_μ ( italic_ω ) italic_d ( italic_s | italic_ω ) end_ARG start_ARG ∑ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT italic_μ ( italic_ω ) italic_d ( italic_s | italic_ω ) end_ARG.

Based on the information s𝑠sitalic_s (correspondingly, the posterior belief μ(ω|s)𝜇conditional𝜔𝑠\mu(\omega|s)italic_μ ( italic_ω | italic_s )), the auditor can select an element from a finite action set a𝒜={T,F}𝑎𝒜𝑇𝐹a\in\mathcal{A}=\{T,F\}italic_a ∈ caligraphic_A = { italic_T , italic_F }, where T𝑇Titalic_T means reporting algorithm compliance, while F𝐹Fitalic_F indicates reporting non-compliance. The decision rule δ:𝒮𝒜:𝛿maps-to𝒮𝒜\delta:\mathcal{S}\mapsto\mathcal{A}italic_δ : caligraphic_S ↦ caligraphic_A aims to maximize the expected utility of u(ω,a)𝑢𝜔𝑎u(\omega,a)italic_u ( italic_ω , italic_a ), where u:Ω×𝒜:𝑢maps-toΩ𝒜u:\Omega\times\mathcal{A}\mapsto\mathbb{R}italic_u : roman_Ω × caligraphic_A ↦ blackboard_R is the utility of choosing action a𝑎aitalic_a when the state is ω𝜔\omegaitalic_ω.

Refer to caption
Figure 2: An illustration of how the auditor performs audit. The auditor acquires information s𝑠sitalic_s about the unknown state ω𝜔\omegaitalic_ω using strategy d𝑑ditalic_d and then makes a decision a𝑎aitalic_a using strategy δ𝛿\deltaitalic_δ.

However, the acquisition of information can incur costs, which can be viewed as the discrepancy between the prior belief μ(ω)𝜇𝜔\mu(\omega)italic_μ ( italic_ω ) and the posterior belief μ(ω|s)𝜇conditional𝜔𝑠\mu(\omega|s)italic_μ ( italic_ω | italic_s ) regarding the state ω𝜔\omegaitalic_ω. In conventional rational inattention research, a common method to model the cost is through the lens of Shannon mutual information. Furthermore, due to variations in epistemic disparities, the cost incurred for accessing information (i.e., reduction in uncertainty) differs among auditors. To account for this, we introduce the concept of an epistemic factor for each auditor, denoted as λ𝜆\lambdaitalic_λ, which quantifies the differences in the cost experienced by different auditors when reducing the same amount of uncertainty. The larger value of λ𝜆\lambdaitalic_λ implies harder access to relevant information, as the cost for the same amount of uncertainty reduction becomes higher. To this end, the auditor’s objective becomes

maxd,δ𝔼[u(ω,a)]λI(ω;s),subscript𝑑𝛿𝔼delimited-[]𝑢𝜔𝑎𝜆𝐼𝜔𝑠\max_{d,\delta}\mathbb{E}[u(\omega,a)]-\lambda I(\omega;s),roman_max start_POSTSUBSCRIPT italic_d , italic_δ end_POSTSUBSCRIPT blackboard_E [ italic_u ( italic_ω , italic_a ) ] - italic_λ italic_I ( italic_ω ; italic_s ) , (1)

where the expected utility is given by

𝔼[u(ω,a)]=ωaμ(ω)u(ω,a)s:δ(s)=ad(s|ω),𝔼delimited-[]𝑢𝜔𝑎subscript𝜔subscript𝑎𝜇𝜔𝑢𝜔𝑎subscript:𝑠𝛿𝑠𝑎𝑑conditional𝑠𝜔\mathbb{E}[u(\omega,a)]=\sum_{\omega}\sum_{a}\mu(\omega)u(\omega,a)\sum_{s:% \delta(s)=a}d(s|\omega),blackboard_E [ italic_u ( italic_ω , italic_a ) ] = ∑ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT italic_μ ( italic_ω ) italic_u ( italic_ω , italic_a ) ∑ start_POSTSUBSCRIPT italic_s : italic_δ ( italic_s ) = italic_a end_POSTSUBSCRIPT italic_d ( italic_s | italic_ω ) , (2)

and the information cost is expressed as

I(ω;s)=ωsd(s|ω)μ(ω)lnd(s|ω)ωd(s|ω)μ(ω).𝐼𝜔𝑠subscript𝜔subscript𝑠𝑑conditional𝑠𝜔𝜇𝜔𝑑conditional𝑠𝜔subscript𝜔𝑑conditional𝑠𝜔𝜇𝜔I(\omega;s)=\sum_{\omega}\sum_{s}d(s|\omega)\mu(\omega)\ln\frac{d(s|\omega)}{% \sum_{\omega}d(s|\omega)\mu(\omega)}.italic_I ( italic_ω ; italic_s ) = ∑ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT italic_d ( italic_s | italic_ω ) italic_μ ( italic_ω ) roman_ln divide start_ARG italic_d ( italic_s | italic_ω ) end_ARG start_ARG ∑ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT italic_d ( italic_s | italic_ω ) italic_μ ( italic_ω ) end_ARG . (3)

II-A Bayes hypothesis testing as the auditor’s decision rule

Conventionally, Bayes hypothesis testing deals with the optimization problem

maxδ𝔼[u(ω,a)]=ωaμ(ω)u(ω,a)δ(s)=ad(s|ω)subscript𝛿𝔼delimited-[]𝑢𝜔𝑎subscript𝜔subscript𝑎𝜇𝜔𝑢𝜔𝑎subscript𝛿𝑠𝑎𝑑conditional𝑠𝜔\max_{\delta}\mathbb{E}[u(\omega,a)]=\sum_{\omega}\sum_{a}\mu(\omega)u(\omega,% a)\sum_{\delta(s)=a}d(s|\omega)roman_max start_POSTSUBSCRIPT italic_δ end_POSTSUBSCRIPT blackboard_E [ italic_u ( italic_ω , italic_a ) ] = ∑ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT italic_μ ( italic_ω ) italic_u ( italic_ω , italic_a ) ∑ start_POSTSUBSCRIPT italic_δ ( italic_s ) = italic_a end_POSTSUBSCRIPT italic_d ( italic_s | italic_ω ) (4)

with given distributions for both hypotheses d(s|g)𝑑conditional𝑠𝑔d(s|g)italic_d ( italic_s | italic_g ) and d(s|b)𝑑conditional𝑠𝑏d(s|b)italic_d ( italic_s | italic_b ) during decision-making, which coincides with the first term in the auditor’s objective (1). According to detailed derivation in Appendix -A, the optimal decision rule can be written as

δ(s)={T,μ(b)d(s|b)μ(g)d(s|g)<u(g,T)u(g,F)u(b,F)u(b,T),F,μ(b)d(s|b)μ(g)d(s|g)>u(g,T)u(g,F)u(b,F)u(b,T),{T,F},μ(b)d(s|b)μ(g)d(s|g)=u(g,T)u(g,F)u(b,F)u(b,T),superscript𝛿𝑠cases𝑇𝜇𝑏𝑑conditional𝑠𝑏𝜇𝑔𝑑conditional𝑠𝑔𝑢𝑔𝑇𝑢𝑔𝐹𝑢𝑏𝐹𝑢𝑏𝑇𝐹𝜇𝑏𝑑conditional𝑠𝑏𝜇𝑔𝑑conditional𝑠𝑔𝑢𝑔𝑇𝑢𝑔𝐹𝑢𝑏𝐹𝑢𝑏𝑇𝑇𝐹𝜇𝑏𝑑conditional𝑠𝑏𝜇𝑔𝑑conditional𝑠𝑔𝑢𝑔𝑇𝑢𝑔𝐹𝑢𝑏𝐹𝑢𝑏𝑇\delta^{*}(s)=\begin{cases}T,\ &\frac{\mu(b)d(s|b)}{\mu(g)d(s|g)}<\frac{u(g,T)% -u(g,F)}{u(b,F)-u(b,T)},\\ F,\ &\frac{\mu(b)d(s|b)}{\mu(g)d(s|g)}>\frac{u(g,T)-u(g,F)}{u(b,F)-u(b,T)},\\ \{T,F\},&\frac{\mu(b)d(s|b)}{\mu(g)d(s|g)}=\frac{u(g,T)-u(g,F)}{u(b,F)-u(b,T)}% ,\end{cases}italic_δ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT ( italic_s ) = { start_ROW start_CELL italic_T , end_CELL start_CELL divide start_ARG italic_μ ( italic_b ) italic_d ( italic_s | italic_b ) end_ARG start_ARG italic_μ ( italic_g ) italic_d ( italic_s | italic_g ) end_ARG < divide start_ARG italic_u ( italic_g , italic_T ) - italic_u ( italic_g , italic_F ) end_ARG start_ARG italic_u ( italic_b , italic_F ) - italic_u ( italic_b , italic_T ) end_ARG , end_CELL end_ROW start_ROW start_CELL italic_F , end_CELL start_CELL divide start_ARG italic_μ ( italic_b ) italic_d ( italic_s | italic_b ) end_ARG start_ARG italic_μ ( italic_g ) italic_d ( italic_s | italic_g ) end_ARG > divide start_ARG italic_u ( italic_g , italic_T ) - italic_u ( italic_g , italic_F ) end_ARG start_ARG italic_u ( italic_b , italic_F ) - italic_u ( italic_b , italic_T ) end_ARG , end_CELL end_ROW start_ROW start_CELL { italic_T , italic_F } , end_CELL start_CELL divide start_ARG italic_μ ( italic_b ) italic_d ( italic_s | italic_b ) end_ARG start_ARG italic_μ ( italic_g ) italic_d ( italic_s | italic_g ) end_ARG = divide start_ARG italic_u ( italic_g , italic_T ) - italic_u ( italic_g , italic_F ) end_ARG start_ARG italic_u ( italic_b , italic_F ) - italic_u ( italic_b , italic_T ) end_ARG , end_CELL end_ROW (5)

which leads us to a threshold decision rule and can be viewed as making a decision based on the posteriors. We represent the optimal decision rule with given d(s|g)𝑑conditional𝑠𝑔d(s|g)italic_d ( italic_s | italic_g ) and d(s|b)𝑑conditional𝑠𝑏d(s|b)italic_d ( italic_s | italic_b ) as δd(s)subscriptsuperscript𝛿𝑑𝑠\delta^{*}_{d}(s)italic_δ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT ( italic_s ), and denote the information set partitioned by δd(s)subscriptsuperscript𝛿𝑑𝑠\delta^{*}_{d}(s)italic_δ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT ( italic_s ) as

{Sd,T={s:δd(s)=T},Sd,F={s:δd(s)=F}.casessubscript𝑆𝑑𝑇conditional-set𝑠subscriptsuperscript𝛿𝑑𝑠𝑇otherwisesubscript𝑆𝑑𝐹conditional-set𝑠subscriptsuperscript𝛿𝑑𝑠𝐹otherwise\begin{cases}S_{d,T}=\{s:\delta^{*}_{d}(s)=T\},\\ S_{d,F}=\{s:\delta^{*}_{d}(s)=F\}.\end{cases}{ start_ROW start_CELL italic_S start_POSTSUBSCRIPT italic_d , italic_T end_POSTSUBSCRIPT = { italic_s : italic_δ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT ( italic_s ) = italic_T } , end_CELL start_CELL end_CELL end_ROW start_ROW start_CELL italic_S start_POSTSUBSCRIPT italic_d , italic_F end_POSTSUBSCRIPT = { italic_s : italic_δ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT ( italic_s ) = italic_F } . end_CELL start_CELL end_CELL end_ROW (6)

II-B Auditor’s choice of the information strategy

With the optimal decision rule δdsubscriptsuperscript𝛿𝑑\delta^{*}_{d}italic_δ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT, the auditor’s objective:

maxd,δsubscript𝑑𝛿\displaystyle\max_{d,\delta}roman_max start_POSTSUBSCRIPT italic_d , italic_δ end_POSTSUBSCRIPT 𝔼[u(ω,a)]λI(ω;s),withδ=δd,𝔼delimited-[]𝑢𝜔𝑎𝜆𝐼𝜔𝑠with𝛿subscriptsuperscript𝛿𝑑\displaystyle\mathbb{E}[u(\omega,a)]-\lambda I(\omega;s),\ \text{with}\ \delta% =\delta^{*}_{d},blackboard_E [ italic_u ( italic_ω , italic_a ) ] - italic_λ italic_I ( italic_ω ; italic_s ) , with italic_δ = italic_δ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT , (7)

which leads to the constrained optimization problem

maxdsubscript𝑑\displaystyle\max_{d}roman_max start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT ωaμ(ω)u(ω,a)s:δd(s)=ad(s|ω)subscript𝜔subscript𝑎𝜇𝜔𝑢𝜔𝑎subscript:𝑠subscriptsuperscript𝛿𝑑𝑠𝑎𝑑conditional𝑠𝜔\displaystyle\sum_{\omega}\sum_{a}\mu(\omega)u(\omega,a)\sum_{s:\delta^{*}_{d}% (s)=a}d(s|\omega)∑ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT italic_μ ( italic_ω ) italic_u ( italic_ω , italic_a ) ∑ start_POSTSUBSCRIPT italic_s : italic_δ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT ( italic_s ) = italic_a end_POSTSUBSCRIPT italic_d ( italic_s | italic_ω ) (8)
λωsd(s|ω)μ(ω)lnd(s|ω)ωd(s|ω)μ(ω),𝜆subscript𝜔subscript𝑠𝑑conditional𝑠𝜔𝜇𝜔𝑑conditional𝑠𝜔subscript𝜔𝑑conditional𝑠𝜔𝜇𝜔\displaystyle-\lambda\sum_{\omega}\sum_{s}d(s|\omega)\mu(\omega)\ln\frac{d(s|% \omega)}{\sum_{\omega}d(s|\omega)\mu(\omega)},- italic_λ ∑ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT italic_d ( italic_s | italic_ω ) italic_μ ( italic_ω ) roman_ln divide start_ARG italic_d ( italic_s | italic_ω ) end_ARG start_ARG ∑ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT italic_d ( italic_s | italic_ω ) italic_μ ( italic_ω ) end_ARG ,
s.t. sd(s|ω)=1,d(s|ω)0,s𝒮,ωΩ.formulae-sequencesubscript𝑠𝑑conditional𝑠𝜔1formulae-sequence𝑑conditional𝑠𝜔0formulae-sequencefor-all𝑠𝒮for-all𝜔Ω\displaystyle\sum_{s}d(s|\omega)=1,d(s|\omega)\geq 0,\forall s\in\mathcal{S},% \forall\omega\in\Omega.∑ start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT italic_d ( italic_s | italic_ω ) = 1 , italic_d ( italic_s | italic_ω ) ≥ 0 , ∀ italic_s ∈ caligraphic_S , ∀ italic_ω ∈ roman_Ω .

With detailed derivations in Appendix -B we arrive at:

d(s|g)={v(s)exp(u(g,T)λ)y(g),sSd,T,v(s)exp(u(g,F)λ)y(g),sSd,F,𝑑conditional𝑠𝑔cases𝑣𝑠𝑢𝑔𝑇𝜆superscript𝑦𝑔𝑠subscript𝑆𝑑𝑇otherwise𝑣𝑠𝑢𝑔𝐹𝜆superscript𝑦𝑔𝑠subscript𝑆𝑑𝐹otherwise\displaystyle d(s|g)=\begin{cases}\frac{v(s)\exp(\frac{u(g,T)}{\lambda})}{y^{% \prime}(g)},\ s\in S_{d,T},\\ \frac{v(s)\exp(\frac{u(g,F)}{\lambda})}{y^{\prime}(g)},\ s\in S_{d,F},\end{cases}italic_d ( italic_s | italic_g ) = { start_ROW start_CELL divide start_ARG italic_v ( italic_s ) roman_exp ( divide start_ARG italic_u ( italic_g , italic_T ) end_ARG start_ARG italic_λ end_ARG ) end_ARG start_ARG italic_y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_g ) end_ARG , italic_s ∈ italic_S start_POSTSUBSCRIPT italic_d , italic_T end_POSTSUBSCRIPT , end_CELL start_CELL end_CELL end_ROW start_ROW start_CELL divide start_ARG italic_v ( italic_s ) roman_exp ( divide start_ARG italic_u ( italic_g , italic_F ) end_ARG start_ARG italic_λ end_ARG ) end_ARG start_ARG italic_y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_g ) end_ARG , italic_s ∈ italic_S start_POSTSUBSCRIPT italic_d , italic_F end_POSTSUBSCRIPT , end_CELL start_CELL end_CELL end_ROW (9)
d(s|b)={v(s)exp(u(b,T)λ)y(b),sSd,T,v(s)exp(u(b,F)λ)y(b),sSd,F.𝑑conditional𝑠𝑏cases𝑣𝑠𝑢𝑏𝑇𝜆superscript𝑦𝑏𝑠subscript𝑆𝑑𝑇otherwise𝑣𝑠𝑢𝑏𝐹𝜆superscript𝑦𝑏𝑠subscript𝑆𝑑𝐹otherwise\displaystyle d(s|b)=\begin{cases}\frac{v(s)\exp(\frac{u(b,T)}{\lambda})}{y^{% \prime}(b)},\ s\in S_{d,T},\\ \frac{v(s)\exp(\frac{u(b,F)}{\lambda})}{y^{\prime}(b)},\ s\in S_{d,F}.\end{cases}italic_d ( italic_s | italic_b ) = { start_ROW start_CELL divide start_ARG italic_v ( italic_s ) roman_exp ( divide start_ARG italic_u ( italic_b , italic_T ) end_ARG start_ARG italic_λ end_ARG ) end_ARG start_ARG italic_y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_b ) end_ARG , italic_s ∈ italic_S start_POSTSUBSCRIPT italic_d , italic_T end_POSTSUBSCRIPT , end_CELL start_CELL end_CELL end_ROW start_ROW start_CELL divide start_ARG italic_v ( italic_s ) roman_exp ( divide start_ARG italic_u ( italic_b , italic_F ) end_ARG start_ARG italic_λ end_ARG ) end_ARG start_ARG italic_y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_b ) end_ARG , italic_s ∈ italic_S start_POSTSUBSCRIPT italic_d , italic_F end_POSTSUBSCRIPT . end_CELL start_CELL end_CELL end_ROW (10)

The corresponding posterior belief μ(g|s)=μ(g)d(s|g)ωμ(ω)d(s|ω)=μ(g)d(s|g)v(s)𝜇conditional𝑔𝑠𝜇𝑔𝑑conditional𝑠𝑔subscript𝜔𝜇𝜔𝑑conditional𝑠𝜔𝜇𝑔𝑑conditional𝑠𝑔𝑣𝑠\mu(g|s)=\frac{\mu(g)d(s|g)}{\sum_{\omega}\mu(\omega)d(s|\omega)}=\frac{\mu(g)% d(s|g)}{v(s)}italic_μ ( italic_g | italic_s ) = divide start_ARG italic_μ ( italic_g ) italic_d ( italic_s | italic_g ) end_ARG start_ARG ∑ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT italic_μ ( italic_ω ) italic_d ( italic_s | italic_ω ) end_ARG = divide start_ARG italic_μ ( italic_g ) italic_d ( italic_s | italic_g ) end_ARG start_ARG italic_v ( italic_s ) end_ARG can then be written as

μ(g|s)={μ(g)exp(u(g,T)/λ)y(g),sSd,T,μ(g)exp(u(g,F)/λ)y(g),sSd,F,𝜇conditional𝑔𝑠cases𝜇𝑔𝑢𝑔𝑇𝜆superscript𝑦𝑔𝑠subscript𝑆𝑑𝑇otherwise𝜇𝑔𝑢𝑔𝐹𝜆superscript𝑦𝑔𝑠subscript𝑆𝑑𝐹otherwise\displaystyle\mu(g|s)=\begin{cases}\frac{\mu(g)\exp(u(g,T)/\lambda)}{y^{\prime% }(g)},\ s\in S_{d,T},\\ \frac{\mu(g)\exp(u(g,F)/\lambda)}{y^{\prime}(g)},\ s\in S_{d,F},\end{cases}italic_μ ( italic_g | italic_s ) = { start_ROW start_CELL divide start_ARG italic_μ ( italic_g ) roman_exp ( italic_u ( italic_g , italic_T ) / italic_λ ) end_ARG start_ARG italic_y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_g ) end_ARG , italic_s ∈ italic_S start_POSTSUBSCRIPT italic_d , italic_T end_POSTSUBSCRIPT , end_CELL start_CELL end_CELL end_ROW start_ROW start_CELL divide start_ARG italic_μ ( italic_g ) roman_exp ( italic_u ( italic_g , italic_F ) / italic_λ ) end_ARG start_ARG italic_y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_g ) end_ARG , italic_s ∈ italic_S start_POSTSUBSCRIPT italic_d , italic_F end_POSTSUBSCRIPT , end_CELL start_CELL end_CELL end_ROW (11)

Note that the sSd,T𝑠subscript𝑆𝑑𝑇s\in S_{d,T}italic_s ∈ italic_S start_POSTSUBSCRIPT italic_d , italic_T end_POSTSUBSCRIPT case can be viewed as the posterior belief μ(g|s)𝜇conditional𝑔𝑠\mu(g|s)italic_μ ( italic_g | italic_s ) given s𝑠sitalic_s that results in an action a=T𝑎𝑇a=Titalic_a = italic_T (i.e., μ(g|s)=μ(g|T),sSd,Tformulae-sequence𝜇conditional𝑔𝑠𝜇conditional𝑔𝑇𝑠subscript𝑆𝑑𝑇\mu(g|s)=\mu(g|T),\ s\in S_{d,T}italic_μ ( italic_g | italic_s ) = italic_μ ( italic_g | italic_T ) , italic_s ∈ italic_S start_POSTSUBSCRIPT italic_d , italic_T end_POSTSUBSCRIPT), while the sSd,F𝑠subscript𝑆𝑑𝐹s\in S_{d,F}italic_s ∈ italic_S start_POSTSUBSCRIPT italic_d , italic_F end_POSTSUBSCRIPT case can be viewed as the posterior belief μ(g|s)𝜇conditional𝑔𝑠\mu(g|s)italic_μ ( italic_g | italic_s ) given s𝑠sitalic_s that results in an action a=F𝑎𝐹a=Fitalic_a = italic_F (i.e., μ(g|s)=μ(g|F),sSd,Fformulae-sequence𝜇conditional𝑔𝑠𝜇conditional𝑔𝐹𝑠subscript𝑆𝑑𝐹\mu(g|s)=\mu(g|F),\ s\in S_{d,F}italic_μ ( italic_g | italic_s ) = italic_μ ( italic_g | italic_F ) , italic_s ∈ italic_S start_POSTSUBSCRIPT italic_d , italic_F end_POSTSUBSCRIPT). A similar expression can be found for μ(b|s)𝜇conditional𝑏𝑠\mu(b|s)italic_μ ( italic_b | italic_s ).

μ(b|s)={μ(b)exp(u(b,T)/λ)y(b),sSd,T,μ(b)exp(u(b,F)/λ)y(b),sSd,F,𝜇conditional𝑏𝑠cases𝜇𝑏𝑢𝑏𝑇𝜆superscript𝑦𝑏𝑠subscript𝑆𝑑𝑇otherwise𝜇𝑏𝑢𝑏𝐹𝜆superscript𝑦𝑏𝑠subscript𝑆𝑑𝐹otherwise\displaystyle\mu(b|s)=\begin{cases}\frac{\mu(b)\exp(u(b,T)/\lambda)}{y^{\prime% }(b)},\ s\in S_{d,T},\\ \frac{\mu(b)\exp(u(b,F)/\lambda)}{y^{\prime}(b)},\ s\in S_{d,F},\end{cases}italic_μ ( italic_b | italic_s ) = { start_ROW start_CELL divide start_ARG italic_μ ( italic_b ) roman_exp ( italic_u ( italic_b , italic_T ) / italic_λ ) end_ARG start_ARG italic_y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_b ) end_ARG , italic_s ∈ italic_S start_POSTSUBSCRIPT italic_d , italic_T end_POSTSUBSCRIPT , end_CELL start_CELL end_CELL end_ROW start_ROW start_CELL divide start_ARG italic_μ ( italic_b ) roman_exp ( italic_u ( italic_b , italic_F ) / italic_λ ) end_ARG start_ARG italic_y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_b ) end_ARG , italic_s ∈ italic_S start_POSTSUBSCRIPT italic_d , italic_F end_POSTSUBSCRIPT , end_CELL start_CELL end_CELL end_ROW (12)

where y(g)superscript𝑦𝑔y^{\prime}(g)italic_y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_g ) and y(b)superscript𝑦𝑏y^{\prime}(b)italic_y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_b ) are corresponding normalization terms.

Remark 1.

For an auditor with epistemic factor λ𝜆\lambdaitalic_λ, the information-obtaining strategy represented by the conditional probability d(s|ω)𝑑conditional𝑠𝜔d(s|\omega)italic_d ( italic_s | italic_ω ) is chosen if its resulting posterior belief μ(ω|s)𝜇conditional𝜔𝑠\mu(\omega|s)italic_μ ( italic_ω | italic_s ) maximizes the value of 𝔼[u(ω,a)]λI(ω;s)𝔼delimited-[]𝑢𝜔𝑎𝜆𝐼𝜔𝑠\mathbb{E}[u(\omega,a)]-\lambda I(\omega;s)blackboard_E [ italic_u ( italic_ω , italic_a ) ] - italic_λ italic_I ( italic_ω ; italic_s ).

The μ(g|s),sSd,T𝜇conditional𝑔𝑠for-all𝑠subscript𝑆𝑑𝑇\mu(g|s),\forall s\in S_{d,T}italic_μ ( italic_g | italic_s ) , ∀ italic_s ∈ italic_S start_POSTSUBSCRIPT italic_d , italic_T end_POSTSUBSCRIPT, can also be interpreted as the audit confidence for making the decision a=T𝑎𝑇a=Titalic_a = italic_T when observing the information s𝑠sitalic_s. Since u(g,T)>u(g,F)𝑢𝑔𝑇𝑢𝑔𝐹u(g,T)>u(g,F)italic_u ( italic_g , italic_T ) > italic_u ( italic_g , italic_F ), it is evident that auditors with a smaller epistemic factor λ𝜆\lambdaitalic_λ have higher confidence in the audit process. This implies that auditors who can easily access relative information are more likely to perform better in the audit.

III Stackelberg Herd Audit Game

To examine the impact of herd audit on the developer’s incentive to behave irresponsibly, we formulate the interplay between the herd auditor (she) and the algorithm developer (he) as a Stackelberg herd audit game, depicted in Fig. 3.

III-A Connection to differential privacy

We begin with the definition of ϵitalic-ϵ\epsilonitalic_ϵ-differential privacy.

Definition 1 (ϵitalic-ϵ\epsilonitalic_ϵ-DP).

A (randomized) mechanism M:𝒟:𝑀maps-to𝒟M:\mathcal{D}\mapsto\mathcal{B}italic_M : caligraphic_D ↦ caligraphic_B is ϵitalic-ϵ\epsilonitalic_ϵ-differentially private (ϵitalic-ϵ\epsilonitalic_ϵ-DP) if for every pair of neighboring inputs D1,D2𝒟subscript𝐷1subscript𝐷2𝒟D_{1},D_{2}\in\mathcal{D}italic_D start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_D start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ∈ caligraphic_D, and for every (measurable) output set B𝐵B\in\mathcal{B}italic_B ∈ caligraphic_B, the probabilities of events M(D1;F,ϵ)B𝑀subscript𝐷1𝐹italic-ϵ𝐵M(D_{1};F,\epsilon)\in Bitalic_M ( italic_D start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ; italic_F , italic_ϵ ) ∈ italic_B and M(D2;F,ϵ)B𝑀subscript𝐷2𝐹italic-ϵ𝐵M(D_{2};F,\epsilon)\in Bitalic_M ( italic_D start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ; italic_F , italic_ϵ ) ∈ italic_B are closer than a factor of eϵsuperscript𝑒italic-ϵe^{\epsilon}italic_e start_POSTSUPERSCRIPT italic_ϵ end_POSTSUPERSCRIPT:

Pr(M(D1;F,ϵ)B)eϵPr(M(D2;F,ϵ)B).𝑃𝑟𝑀subscript𝐷1𝐹italic-ϵ𝐵superscript𝑒italic-ϵ𝑃𝑟𝑀subscript𝐷2𝐹italic-ϵ𝐵Pr(M(D_{1};F,\epsilon)\in B)\leq e^{\epsilon}\cdot Pr(M(D_{2};F,\epsilon)\in B).italic_P italic_r ( italic_M ( italic_D start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ; italic_F , italic_ϵ ) ∈ italic_B ) ≤ italic_e start_POSTSUPERSCRIPT italic_ϵ end_POSTSUPERSCRIPT ⋅ italic_P italic_r ( italic_M ( italic_D start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ; italic_F , italic_ϵ ) ∈ italic_B ) . (13)

In the context of differential privacy, consider a scenario in which there is a public-known privacy protection agreement that requires ϵsuperscriptitalic-ϵ\epsilon^{\prime}italic_ϵ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT privacy budget. However, since more privacy budget (which means decreasing the privacy protection and making the results more distinguishable) often leads to better algorithm accuracy, the algorithm developer has the incentive to use some ϵ>ϵitalic-ϵsuperscriptitalic-ϵ\epsilon>\epsilon^{\prime}italic_ϵ > italic_ϵ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT when performing the algorithm, which creates irresponsibility. Hence, we consider the state ω=g𝜔𝑔\omega=gitalic_ω = italic_g means ϵ=ϵitalic-ϵsuperscriptitalic-ϵ\epsilon=\epsilon^{\prime}italic_ϵ = italic_ϵ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT and the state ω=b𝜔𝑏\omega=bitalic_ω = italic_b means ϵ>ϵitalic-ϵsuperscriptitalic-ϵ\epsilon>\epsilon^{\prime}italic_ϵ > italic_ϵ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT. Since privacy protection is often achieved by adding noise, it is assumed that for an algorithm M𝑀Mitalic_M with input dataset D𝐷Ditalic_D, the privacy budget ϵitalic-ϵ\epsilonitalic_ϵ results in an output distribution p(M(D)|ϵ)𝑝conditional𝑀𝐷italic-ϵp(M(D)|\epsilon)italic_p ( italic_M ( italic_D ) | italic_ϵ ) for later usage.

Refer to caption
Figure 3: The Stackelberg herd audit game.

III-B Problem Setting for the Developer

Consider two types of algorithm developers g𝑔gitalic_g and b𝑏bitalic_b, and they play a mixed strategy for executing ϵitalic-ϵ\epsilonitalic_ϵ, which are q(ϵ|g)𝑞conditionalitalic-ϵ𝑔q(\epsilon|g)italic_q ( italic_ϵ | italic_g ) and q(ϵ|b)𝑞conditionalitalic-ϵ𝑏q(\epsilon|b)italic_q ( italic_ϵ | italic_b ), respectively (for discrete choices of ϵitalic-ϵ\epsilon\in\mathcal{E}italic_ϵ ∈ caligraphic_E). Each ϵitalic-ϵ\epsilonitalic_ϵ results in an algorithm accuracy A(ϵ)𝐴italic-ϵA(\epsilon)italic_A ( italic_ϵ ), where A::𝐴maps-toA:\mathcal{E}\mapsto\mathbb{R}italic_A : caligraphic_E ↦ blackboard_R, under the assumption that a larger ϵitalic-ϵ\epsilonitalic_ϵ leads to better accuracy.

Assumption 1.

Given algorithm M𝑀Mitalic_M and input set D𝐷Ditalic_D, a privacy budget ϵitalic-ϵ\epsilonitalic_ϵ leads to a unique output distribution p(M(D)|ϵ)𝑝conditional𝑀𝐷italic-ϵp(M(D)|\epsilon)italic_p ( italic_M ( italic_D ) | italic_ϵ ).

Assumption 2.

For a given algorithm, the algorithmic accuracy under the privacy budget ϵitalic-ϵ\epsilon\in\mathcal{E}\subseteq\mathbb{R}italic_ϵ ∈ caligraphic_E ⊆ blackboard_R is governed by A::𝐴maps-toA:\mathcal{E}\mapsto\mathbb{R}italic_A : caligraphic_E ↦ blackboard_R, and it is increasing in ϵitalic-ϵ\epsilon\in\mathcal{E}italic_ϵ ∈ caligraphic_E.

In this context, the developer’s strategy q(ϵ|ω)𝑞conditionalitalic-ϵ𝜔q(\epsilon|\omega)italic_q ( italic_ϵ | italic_ω ) given his type ω𝜔\omegaitalic_ω will lead to the distributions for the two hypotheses

Qg(s)subscript𝑄𝑔𝑠\displaystyle Q_{g}(s)italic_Q start_POSTSUBSCRIPT italic_g end_POSTSUBSCRIPT ( italic_s ) =ϵp(s|ϵ)q(ϵ|g),absentsubscriptitalic-ϵ𝑝conditional𝑠italic-ϵ𝑞conditionalitalic-ϵ𝑔\displaystyle=\sum\nolimits_{\epsilon}p(s|\epsilon)q(\epsilon|g),= ∑ start_POSTSUBSCRIPT italic_ϵ end_POSTSUBSCRIPT italic_p ( italic_s | italic_ϵ ) italic_q ( italic_ϵ | italic_g ) , (14)
Qb(s)subscript𝑄𝑏𝑠\displaystyle Q_{b}(s)italic_Q start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ( italic_s ) =ϵp(s|ϵ)q(ϵ|b),absentsubscriptitalic-ϵ𝑝conditional𝑠italic-ϵ𝑞conditionalitalic-ϵ𝑏\displaystyle=\sum\nolimits_{\epsilon}p(s|\epsilon)q(\epsilon|b),= ∑ start_POSTSUBSCRIPT italic_ϵ end_POSTSUBSCRIPT italic_p ( italic_s | italic_ϵ ) italic_q ( italic_ϵ | italic_b ) , (15)

where p(s|ϵ)𝑝conditional𝑠italic-ϵp(s|\epsilon)italic_p ( italic_s | italic_ϵ ) is the distribution p(M(D)|ϵ)𝑝conditional𝑀𝐷italic-ϵp(M(D)|\epsilon)italic_p ( italic_M ( italic_D ) | italic_ϵ ) in Assumption 1.

III-B1 Responsible developer

For a responsible algorithm developer, the mixed strategy q(ϵ|g)𝑞conditionalitalic-ϵ𝑔q(\epsilon|g)italic_q ( italic_ϵ | italic_g ) should have mass 00 for ϵ>ϵitalic-ϵsuperscriptitalic-ϵ\epsilon>\epsilon^{\prime}italic_ϵ > italic_ϵ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, which means that he always provides privacy protection at least complies with the agreement. Moreover, in order to maximize A(ϵ)𝐴italic-ϵA(\epsilon)italic_A ( italic_ϵ ), a responsible algorithm developer tends to put all the mass on ϵ=ϵitalic-ϵsuperscriptitalic-ϵ\epsilon=\epsilon^{\prime}italic_ϵ = italic_ϵ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT since A(ϵ)<A(ϵ),ϵ<ϵformulae-sequence𝐴italic-ϵ𝐴superscriptitalic-ϵfor-allitalic-ϵsuperscriptitalic-ϵA(\epsilon)<A(\epsilon^{\prime}),\forall\epsilon<\epsilon^{\prime}italic_A ( italic_ϵ ) < italic_A ( italic_ϵ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) , ∀ italic_ϵ < italic_ϵ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT.

Proposition 1 (Responsible Developer’s Strategy).

A responsible developer’s mixed strategy reduces to a pure strategy by letting all the mass on ϵ=ϵitalic-ϵsuperscriptitalic-ϵ\epsilon=\epsilon^{\prime}italic_ϵ = italic_ϵ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT. Hence, Qg(s)=ϵp(s|ϵ)q(ϵ|g)=p(s|ϵ)subscript𝑄𝑔𝑠subscriptitalic-ϵ𝑝conditional𝑠italic-ϵ𝑞conditionalitalic-ϵ𝑔𝑝conditional𝑠superscriptitalic-ϵQ_{g}(s)=\sum_{\epsilon}p(s|\epsilon)q(\epsilon|g)=p(s|\epsilon^{\prime})italic_Q start_POSTSUBSCRIPT italic_g end_POSTSUBSCRIPT ( italic_s ) = ∑ start_POSTSUBSCRIPT italic_ϵ end_POSTSUBSCRIPT italic_p ( italic_s | italic_ϵ ) italic_q ( italic_ϵ | italic_g ) = italic_p ( italic_s | italic_ϵ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ).

III-B2 Irresponsible developer

However, it is important to consider various scenarios involving an irresponsible algorithm developer who prioritizes algorithm performance and disregards compliance with the agreement. If there is no auditor or no penalty imposed when the developer fails to pass the audit (i.e., when the auditor determines that a=F𝑎𝐹a=Fitalic_a = italic_F), the irresponsible developer can choose an extremely large value for ϵitalic-ϵ\epsilonitalic_ϵ. Consequently, it is reasonable to assume that a penalty will be enforced if the irresponsible developer is detected. In such a situation, the irresponsible developer may attempt to maximize the probability of avoiding penalties, which is the probability of the auditor deciding a=T𝑎𝑇a=Titalic_a = italic_T.

Assumption 3.

The irresponsible algorithm developer’s mixed strategy will not put any mass on ϵ=ϵitalic-ϵsuperscriptitalic-ϵ\epsilon=\epsilon^{\prime}italic_ϵ = italic_ϵ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT. That is, q(ϵ|b)=0𝑞conditionalsuperscriptitalic-ϵ𝑏0q(\epsilon^{\prime}|b)=0italic_q ( italic_ϵ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT | italic_b ) = 0.

III-C Revisiting the Auditor’s Problem

Considering that the penalty term for the irresponsible developer is influenced by the actions of the auditor, in terms of whether the irresponsible developer is caught or not, it is necessary to reexamine the problem from the auditor’s perspective when the developer is also a strategic player aiming to evade the audit. We reformulate the auditor’s problem by letting u(g,T)=u(b,F)=0𝑢𝑔𝑇𝑢𝑏𝐹0u(g,T)=u(b,F)=0italic_u ( italic_g , italic_T ) = italic_u ( italic_b , italic_F ) = 0 and setting the penalty terms u(b,T)𝑢𝑏𝑇u(b,T)italic_u ( italic_b , italic_T ) and u(g,F)𝑢𝑔𝐹u(g,F)italic_u ( italic_g , italic_F ) to negative values. However, within the context of DP, it is important to note that the distributions for these hypotheses are predefined by the output distribution p(s|ϵ)𝑝conditional𝑠italic-ϵp(s|\epsilon)italic_p ( italic_s | italic_ϵ ) and the developer’s mixed strategy given the observed information s𝑠sitalic_s. The audit confidences are analogous to those provided in (11) and (12).

Assumption 4.

Assume that u(b,T)<0𝑢𝑏𝑇0u(b,T)<0italic_u ( italic_b , italic_T ) < 0 and u(g,F)<0𝑢𝑔𝐹0u(g,F)<0italic_u ( italic_g , italic_F ) < 0 are the negative utilities for making wrong audit decisions.

Given the distributions for the two hypotheses Qg(s)subscript𝑄𝑔𝑠Q_{g}(s)italic_Q start_POSTSUBSCRIPT italic_g end_POSTSUBSCRIPT ( italic_s ) and Qb(s)subscript𝑄𝑏𝑠Q_{b}(s)italic_Q start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ( italic_s ), the auditor aims to achieve the following:

maxrsubscript𝑟\displaystyle\max_{r}roman_max start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT u(g,F)s[ϵp(s|ϵ)q(ϵ|g)]r(b|s)𝑢𝑔𝐹subscript𝑠delimited-[]subscriptitalic-ϵ𝑝conditional𝑠italic-ϵ𝑞conditionalitalic-ϵ𝑔𝑟conditional𝑏𝑠\displaystyle u(g,F)\sum_{s}\bigg{[}\sum_{\epsilon}p(s|\epsilon)q(\epsilon|g)% \bigg{]}r(b|s)italic_u ( italic_g , italic_F ) ∑ start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT [ ∑ start_POSTSUBSCRIPT italic_ϵ end_POSTSUBSCRIPT italic_p ( italic_s | italic_ϵ ) italic_q ( italic_ϵ | italic_g ) ] italic_r ( italic_b | italic_s ) (16)
+u(b,T)s[ϵp(s|ϵ)q(ϵ|b)]r(g|s)𝑢𝑏𝑇subscript𝑠delimited-[]subscriptitalic-ϵ𝑝conditional𝑠italic-ϵ𝑞conditionalitalic-ϵ𝑏𝑟conditional𝑔𝑠\displaystyle+u(b,T)\sum_{s}\bigg{[}\sum_{\epsilon}p(s|\epsilon)q(\epsilon|b)% \bigg{]}r(g|s)+ italic_u ( italic_b , italic_T ) ∑ start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT [ ∑ start_POSTSUBSCRIPT italic_ϵ end_POSTSUBSCRIPT italic_p ( italic_s | italic_ϵ ) italic_q ( italic_ϵ | italic_b ) ] italic_r ( italic_g | italic_s )
λ𝔼s[DkL(r(ω|s)μ(ω))],𝜆subscript𝔼𝑠delimited-[]subscript𝐷𝑘𝐿conditional𝑟conditional𝜔𝑠𝜇𝜔\displaystyle-\lambda\ \mathbb{E}_{s}\left[D_{kL}(r(\omega|s)\|\mu(\omega))% \right],- italic_λ blackboard_E start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT [ italic_D start_POSTSUBSCRIPT italic_k italic_L end_POSTSUBSCRIPT ( italic_r ( italic_ω | italic_s ) ∥ italic_μ ( italic_ω ) ) ] ,
s.t.ωs.t.subscript𝜔\displaystyle\text{s.t.}\sum_{\omega}s.t. ∑ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT r(ω|s)=1,r(w|s)0,w{g,b},s𝒮,formulae-sequence𝑟conditional𝜔𝑠1formulae-sequence𝑟conditional𝑤𝑠0formulae-sequencefor-all𝑤𝑔𝑏for-all𝑠𝒮\displaystyle r(\omega|s)=1,r(w|s)\geq 0,\forall w\in\{g,b\},\forall s\in% \mathcal{S},italic_r ( italic_ω | italic_s ) = 1 , italic_r ( italic_w | italic_s ) ≥ 0 , ∀ italic_w ∈ { italic_g , italic_b } , ∀ italic_s ∈ caligraphic_S ,

where the first two terms put negative weights on the audit error, and the last term quantifies the expected reduction in uncertainty for the state ω𝜔\omegaitalic_ω, measured in terms of the Kullback–Leibler (KL) divergence:

λs[Qg(s)+Qb(s)]ωr(ω|s)logr(ω|s)μ(ω).𝜆subscript𝑠delimited-[]subscript𝑄𝑔𝑠subscript𝑄𝑏𝑠subscript𝜔𝑟conditional𝜔𝑠𝑟conditional𝜔𝑠𝜇𝜔\lambda\sum_{s}\bigg{[}Q_{g}(s)+Q_{b}(s)\bigg{]}\sum_{\omega}r(\omega|s)\log% \frac{r(\omega|s)}{\mu(\omega)}.italic_λ ∑ start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT [ italic_Q start_POSTSUBSCRIPT italic_g end_POSTSUBSCRIPT ( italic_s ) + italic_Q start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ( italic_s ) ] ∑ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT italic_r ( italic_ω | italic_s ) roman_log divide start_ARG italic_r ( italic_ω | italic_s ) end_ARG start_ARG italic_μ ( italic_ω ) end_ARG .

The decision of r(g|s)𝑟conditional𝑔𝑠r(g|s)italic_r ( italic_g | italic_s ), r(b|s)𝑟conditional𝑏𝑠r(b|s)italic_r ( italic_b | italic_s ) already incorporate the auditor’s information strategy d(s|ω)𝑑conditional𝑠𝜔d(s|\omega)italic_d ( italic_s | italic_ω ) since r(ω|s)=μ(ω)d(s|ω)ωμ(ω)d(s|ω)𝑟conditional𝜔𝑠𝜇𝜔𝑑conditional𝑠𝜔subscript𝜔𝜇𝜔𝑑conditional𝑠𝜔r(\omega|s)=\frac{\mu(\omega)d(s|\omega)}{\sum_{\omega}\mu(\omega)d(s|\omega)}italic_r ( italic_ω | italic_s ) = divide start_ARG italic_μ ( italic_ω ) italic_d ( italic_s | italic_ω ) end_ARG start_ARG ∑ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT italic_μ ( italic_ω ) italic_d ( italic_s | italic_ω ) end_ARG.

III-D Revisit the Irresponsible Developer’s Problem

Until now, the irresponsible developer’s objective has become the following.

maxq(|b)\displaystyle\max_{q(\cdot|b)}roman_max start_POSTSUBSCRIPT italic_q ( ⋅ | italic_b ) end_POSTSUBSCRIPT ϵq(ϵ|b)A(ϵ)+βs[ϵp(s|ϵ)q(ϵ|b)]r(g|s),subscriptitalic-ϵ𝑞conditionalitalic-ϵ𝑏𝐴italic-ϵ𝛽subscript𝑠delimited-[]subscriptitalic-ϵ𝑝conditional𝑠italic-ϵ𝑞conditionalitalic-ϵ𝑏𝑟conditional𝑔𝑠\displaystyle\sum_{\epsilon}q(\epsilon|b)A(\epsilon)+\beta\sum_{s}\bigg{[}\sum% _{\epsilon}p(s|\epsilon)q(\epsilon|b)\bigg{]}r(g|s),∑ start_POSTSUBSCRIPT italic_ϵ end_POSTSUBSCRIPT italic_q ( italic_ϵ | italic_b ) italic_A ( italic_ϵ ) + italic_β ∑ start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT [ ∑ start_POSTSUBSCRIPT italic_ϵ end_POSTSUBSCRIPT italic_p ( italic_s | italic_ϵ ) italic_q ( italic_ϵ | italic_b ) ] italic_r ( italic_g | italic_s ) , (17)

with r(g|s)𝑟conditional𝑔𝑠r(g|s)italic_r ( italic_g | italic_s ) comes from the auditor’s problem. The former term is the expected algorithm accuracy, and the latter term corresponds to the false negative rate of the auditor’s decision, which is the rate of the irresponsible developer successfully passing the audit (and thus, the irresponsible developer seeks to maximize it). Note that β>0𝛽0\beta>0italic_β > 0 indicates the irresponsible developer’s preference for the two goals.

IV Equilibrium Analysis

For illustrative purposes, we work through an example where ||=33|\mathcal{E}|=3| caligraphic_E | = 3 in Appendix -C. Besides, we assume that the distinguishability—quantified by distance measures such as the Kullback–Leibler divergence—between the output distributions p(|ϵ)p(\cdot|\epsilon)italic_p ( ⋅ | italic_ϵ ) and p(|ϵ)p(\cdot|\epsilon^{\prime})italic_p ( ⋅ | italic_ϵ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) increases when the difference between ϵitalic-ϵ\epsilonitalic_ϵ and ϵsuperscriptitalic-ϵ\epsilon^{\prime}italic_ϵ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT expands.

IV-A The auditor’s optimal strategy

With the example in Appendix -C and derivations in Appendix -D, the auditor’s r(g|s)𝑟conditional𝑔𝑠r(g|s)italic_r ( italic_g | italic_s ) and r(b|s)𝑟conditional𝑏𝑠r(b|s)italic_r ( italic_b | italic_s ) that optimally solves problem (16) can be written as:

r(g|s)=μ(g)exp(u(b,T)Qb(s)/λv(s))/y(s),𝑟conditional𝑔𝑠𝜇𝑔𝑢𝑏𝑇subscript𝑄𝑏𝑠𝜆𝑣𝑠superscript𝑦𝑠r(g|s)=\mu(g)\exp\left(u(b,T)Q_{b}(s)/\lambda v(s)\right)/y^{\prime}(s),italic_r ( italic_g | italic_s ) = italic_μ ( italic_g ) roman_exp ( italic_u ( italic_b , italic_T ) italic_Q start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ( italic_s ) / italic_λ italic_v ( italic_s ) ) / italic_y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_s ) , (18)
r(b|s)=μ(b)exp(u(g,F)Qg(s)/λv(s))/y(s),𝑟conditional𝑏𝑠𝜇𝑏𝑢𝑔𝐹subscript𝑄𝑔𝑠𝜆𝑣𝑠superscript𝑦𝑠r(b|s)=\mu(b)\exp\left(u(g,F)Q_{g}(s)/\lambda v(s)\right)/y^{\prime}(s),italic_r ( italic_b | italic_s ) = italic_μ ( italic_b ) roman_exp ( italic_u ( italic_g , italic_F ) italic_Q start_POSTSUBSCRIPT italic_g end_POSTSUBSCRIPT ( italic_s ) / italic_λ italic_v ( italic_s ) ) / italic_y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_s ) , (19)

and y(s)=μ(g)exp(u(b,T)Qb(s)λv(s))+μ(b)exp(u(g,F)Qg(s)λv(s))superscript𝑦𝑠𝜇𝑔𝑢𝑏𝑇subscript𝑄𝑏𝑠𝜆𝑣𝑠𝜇𝑏𝑢𝑔𝐹subscript𝑄𝑔𝑠𝜆𝑣𝑠y^{\prime}(s)=\mu(g)\exp\big{(}\frac{u(b,T)Q_{b}(s)}{\lambda v(s)}\big{)}+\mu(% b)\exp\big{(}\frac{u(g,F)Q_{g}(s)}{\lambda v(s)}\big{)}italic_y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_s ) = italic_μ ( italic_g ) roman_exp ( divide start_ARG italic_u ( italic_b , italic_T ) italic_Q start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ( italic_s ) end_ARG start_ARG italic_λ italic_v ( italic_s ) end_ARG ) + italic_μ ( italic_b ) roman_exp ( divide start_ARG italic_u ( italic_g , italic_F ) italic_Q start_POSTSUBSCRIPT italic_g end_POSTSUBSCRIPT ( italic_s ) end_ARG start_ARG italic_λ italic_v ( italic_s ) end_ARG ) denotes the normalization term. We can observe that r(g|s)𝑟conditional𝑔𝑠r(g|s)italic_r ( italic_g | italic_s ) and r(b|s)𝑟conditional𝑏𝑠r(b|s)italic_r ( italic_b | italic_s ) share a similar form as (11) and (12).

Proposition 2.

The strategy specified by (18) and (19) is optimal for the auditor with epistemic factor λ𝜆\lambdaitalic_λ.

Remark 2.

The results coincide with the intuition. We first take a look at r(g|s)𝑟conditional𝑔𝑠r(g|s)italic_r ( italic_g | italic_s ). Recall that u(b,T)λ𝑢𝑏𝑇𝜆\frac{u(b,T)}{\lambda}divide start_ARG italic_u ( italic_b , italic_T ) end_ARG start_ARG italic_λ end_ARG is negative. If the penalty term u(b,T)𝑢𝑏𝑇u(b,T)italic_u ( italic_b , italic_T ) is the same across all the auditors, the auditor with a larger epistemic factor λ𝜆\lambdaitalic_λ achieves r(g|s)𝑟conditional𝑔𝑠r(g|s)italic_r ( italic_g | italic_s ) that is closer to μ(g)𝜇𝑔\mu(g)italic_μ ( italic_g ). Combining with the auditor’s objective in the maximization problem (16), it means that the larger-λ𝜆\lambdaitalic_λ auditor might have a larger false negative error. Similarly, for r(b|s)𝑟conditional𝑏𝑠r(b|s)italic_r ( italic_b | italic_s ), the larger-λ𝜆\lambdaitalic_λ auditor might have a larger false positive error.

IV-B The irresponsible developer’s optimal strategy

The irresponsible developer’s problem (17) is organized into

ϵsubscriptitalic-ϵ\displaystyle\sum_{\epsilon}∑ start_POSTSUBSCRIPT italic_ϵ end_POSTSUBSCRIPT q(ϵ|b)A(ϵ)+βs[ϵp(s|ϵ)q(ϵ|b)]r(g|s)𝑞conditionalitalic-ϵ𝑏𝐴italic-ϵ𝛽subscript𝑠delimited-[]subscriptitalic-ϵ𝑝conditional𝑠italic-ϵ𝑞conditionalitalic-ϵ𝑏𝑟conditional𝑔𝑠\displaystyle q(\epsilon|b)A(\epsilon)+\beta\ \sum_{s}\left[\sum_{\epsilon}p(s% |\epsilon)q(\epsilon|b)\right]r(g|s)italic_q ( italic_ϵ | italic_b ) italic_A ( italic_ϵ ) + italic_β ∑ start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT [ ∑ start_POSTSUBSCRIPT italic_ϵ end_POSTSUBSCRIPT italic_p ( italic_s | italic_ϵ ) italic_q ( italic_ϵ | italic_b ) ] italic_r ( italic_g | italic_s ) (20)
=ϵiq(ϵi|b)[A(ϵi)+βsr(g|s)p(s|ϵi)].absentsubscriptsubscriptitalic-ϵ𝑖𝑞conditionalsubscriptitalic-ϵ𝑖𝑏delimited-[]𝐴subscriptitalic-ϵ𝑖𝛽subscript𝑠𝑟conditional𝑔𝑠𝑝conditional𝑠subscriptitalic-ϵ𝑖\displaystyle=\sum\limits_{\epsilon_{i}\in\mathcal{E}}q(\epsilon_{i}|b)\bigg{[% }A(\epsilon_{i})+\beta\sum_{s}r(g|s)p(s|\epsilon_{i})\bigg{]}.= ∑ start_POSTSUBSCRIPT italic_ϵ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∈ caligraphic_E end_POSTSUBSCRIPT italic_q ( italic_ϵ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | italic_b ) [ italic_A ( italic_ϵ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) + italic_β ∑ start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT italic_r ( italic_g | italic_s ) italic_p ( italic_s | italic_ϵ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) ] .

The irresponsible developer determines his optimal pure strategy ϵitalic-ϵ\epsilonitalic_ϵ to maximize (20). Specifically, the irresponsible developer assigns q(ϵ|b)=1𝑞conditionalitalic-ϵ𝑏1q(\epsilon|b)=1italic_q ( italic_ϵ | italic_b ) = 1 to the ϵitalic-ϵ\epsilonitalic_ϵ that achieves the largest [A(ϵ)+βsr(g|s)p(s|ϵ)]delimited-[]𝐴italic-ϵ𝛽subscript𝑠𝑟conditional𝑔𝑠𝑝conditional𝑠italic-ϵ\big{[}A(\epsilon)+\beta\sum_{s}r(g|s)p(s|\epsilon)\big{]}[ italic_A ( italic_ϵ ) + italic_β ∑ start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT italic_r ( italic_g | italic_s ) italic_p ( italic_s | italic_ϵ ) ]. This leads us to the following propositions and remarks.

Proposition 3.

The irresponsible developer’s optimal strategy is choosing the ϵitalic-ϵ\epsilonitalic_ϵ that maximizes [A(ϵ)+βsr(g|s)p(s|ϵ)]delimited-[]𝐴italic-ϵ𝛽subscript𝑠𝑟conditional𝑔𝑠𝑝conditional𝑠italic-ϵ\big{[}A(\epsilon)+\beta\sum_{s}r(g|s)p(s|\epsilon)\big{]}[ italic_A ( italic_ϵ ) + italic_β ∑ start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT italic_r ( italic_g | italic_s ) italic_p ( italic_s | italic_ϵ ) ].

Proposition 4.

If algorithm accuracy A(ϵ)𝐴italic-ϵA(\epsilon)italic_A ( italic_ϵ ) is increasing in ϵitalic-ϵ\epsilonitalic_ϵ, the irresponsible developer always chooses the largest ϵitalic-ϵ\epsilonitalic_ϵ if r(g|s)=r(g|s),s,s𝒮formulae-sequence𝑟conditional𝑔𝑠𝑟conditional𝑔superscript𝑠for-all𝑠superscript𝑠𝒮r(g|s)=r(g|s^{\prime}),\forall s,s^{\prime}\in\mathcal{S}italic_r ( italic_g | italic_s ) = italic_r ( italic_g | italic_s start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) , ∀ italic_s , italic_s start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∈ caligraphic_S.

Proof.

We sketch the proof in Appendix -E. ∎

Remark 3.

The irresponsible developer violates as much as possible when the epistemic factor for the auditor λ=𝜆\lambda=\inftyitalic_λ = ∞.

Remark 4.

When the auditor’s epistemic factor λ𝜆\lambdaitalic_λ is small, indicating easy access to relevant information, an irresponsible developer is more likely to violate the claim.

Remark 5.

If the auditor’s epistemic factor λ𝜆\lambdaitalic_λ is large, it is likely that an irresponsible developer with a larger β𝛽\betaitalic_β (placing more value on the success rate of passing audits) will also tend to violate the claim more severely.

IV-C Auditor’s audit confidence and epistemic factor

With respect to Fig. 4, the optimal solution to the auditor’s problem given by (18) and (19) establishes a relationship between the epistemic factor λ𝜆\lambdaitalic_λ and the auditor’s confidence r(|s)r(\cdot|s)italic_r ( ⋅ | italic_s ) under fixed utilities u(ω,a)𝑢𝜔𝑎u(\omega,a)italic_u ( italic_ω , italic_a ). Let χ(s)=[u(g,F)Qg(s)u(b,T)Qb(s)]/v(s)𝜒𝑠delimited-[]𝑢𝑔𝐹subscript𝑄𝑔𝑠𝑢𝑏𝑇subscript𝑄𝑏𝑠𝑣𝑠\chi(s)=[u(g,F)Q_{g}(s)-u(b,T)Q_{b}(s)]/v(s)italic_χ ( italic_s ) = [ italic_u ( italic_g , italic_F ) italic_Q start_POSTSUBSCRIPT italic_g end_POSTSUBSCRIPT ( italic_s ) - italic_u ( italic_b , italic_T ) italic_Q start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ( italic_s ) ] / italic_v ( italic_s ) and ϕ(s)=[u(g,F)Qg(s)+u(b,T)Qb(s)]/(λv(s))italic-ϕ𝑠delimited-[]𝑢𝑔𝐹subscript𝑄𝑔𝑠𝑢𝑏𝑇subscript𝑄𝑏𝑠𝜆𝑣𝑠\phi(s)=[u(g,F)Q_{g}(s)+u(b,T)Q_{b}(s)]/(\lambda v(s))italic_ϕ ( italic_s ) = [ italic_u ( italic_g , italic_F ) italic_Q start_POSTSUBSCRIPT italic_g end_POSTSUBSCRIPT ( italic_s ) + italic_u ( italic_b , italic_T ) italic_Q start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ( italic_s ) ] / ( italic_λ italic_v ( italic_s ) ) . Taking the partial derivative of r(g|s)𝑟conditional𝑔𝑠r(g|s)italic_r ( italic_g | italic_s ) with respect to λ𝜆\lambdaitalic_λ yields r(g|s)λ=μ(g)μ(b)χ(s)exp(ϕ(s))λ2y(s)2.𝑟conditional𝑔𝑠𝜆𝜇𝑔𝜇𝑏𝜒𝑠italic-ϕ𝑠superscript𝜆2superscript𝑦superscript𝑠2\frac{\partial r(g|s)}{\partial\lambda}=\frac{\mu(g)\mu(b)\chi(s)\exp\left(% \phi(s)\right)}{\lambda^{2}y^{\prime}(s)^{2}}.divide start_ARG ∂ italic_r ( italic_g | italic_s ) end_ARG start_ARG ∂ italic_λ end_ARG = divide start_ARG italic_μ ( italic_g ) italic_μ ( italic_b ) italic_χ ( italic_s ) roman_exp ( italic_ϕ ( italic_s ) ) end_ARG start_ARG italic_λ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_s ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG . Here, if the developer is irresponsible, then he never chooses a privacy budget ϵitalic-ϵ\epsilonitalic_ϵ that is equal to the claimed budget ϵ0subscriptitalic-ϵ0\epsilon_{0}italic_ϵ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT. Hence, χ(s)0𝜒𝑠0\chi(s)\neq 0italic_χ ( italic_s ) ≠ 0. The term r(g|s)/λ𝑟conditional𝑔𝑠𝜆\partial r(g|s)/\partial\lambda∂ italic_r ( italic_g | italic_s ) / ∂ italic_λ is (strictly) positive if χ(s)>0𝜒𝑠0\chi(s)>0italic_χ ( italic_s ) > 0 and (strictly) negative otherwise. When χ(s)<0𝜒𝑠0\chi(s)<0italic_χ ( italic_s ) < 0, r(g|s)𝑟conditional𝑔𝑠r(g|s)italic_r ( italic_g | italic_s ) is close to 1111 when λ𝜆\lambdaitalic_λ goes close to 00. Furthermore, the audit confidences for g𝑔gitalic_g and b𝑏bitalic_b become close to 0.50.50.50.5 when λ𝜆\lambdaitalic_λ increases, which reveals that higher λ𝜆\lambdaitalic_λ leads to a weaker incentive to acquire more accurate information, thereby inducing lower audit confidences.

Similarly, r(b|s)λ=μ(g)μ(b)χ(s)exp(ϕ(s))λ2y(s)2.𝑟conditional𝑏𝑠𝜆𝜇𝑔𝜇𝑏𝜒𝑠italic-ϕ𝑠superscript𝜆2superscript𝑦superscript𝑠2\frac{\partial r(b|s)}{\partial\lambda}=\frac{-\mu(g)\mu(b)\chi(s)\exp\left(% \phi(s)\right)}{\lambda^{2}y^{\prime}(s)^{2}}.divide start_ARG ∂ italic_r ( italic_b | italic_s ) end_ARG start_ARG ∂ italic_λ end_ARG = divide start_ARG - italic_μ ( italic_g ) italic_μ ( italic_b ) italic_χ ( italic_s ) roman_exp ( italic_ϕ ( italic_s ) ) end_ARG start_ARG italic_λ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_s ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG . The term r(b|s)/λ𝑟conditional𝑏𝑠𝜆\partial r(b|s)/\partial\lambda∂ italic_r ( italic_b | italic_s ) / ∂ italic_λ is positive if χ(s)>0𝜒𝑠0-\chi(s)>0- italic_χ ( italic_s ) > 0 and negative otherwise. When χ(s)<0𝜒𝑠0-\chi(s)<0- italic_χ ( italic_s ) < 0, r(b|s)𝑟conditional𝑏𝑠r(b|s)italic_r ( italic_b | italic_s ) is close to 1111 when λ𝜆\lambdaitalic_λ goes close to 00. Furthermore, the audit confidences for g𝑔gitalic_g and b𝑏bitalic_b become closer to 0.50.50.50.5 when λ𝜆\lambdaitalic_λ increases, which coincides with the setting that higher λ𝜆\lambdaitalic_λ leads to a weaker incentive to acquire more accurate information, thereby inducing lower audit confidences.

Refer to caption
(a)
Refer to caption
(b)
Figure 4: Trends between the auditor’s confidence (posterior belief) and the auditor’s epistemic factor (μ(g)=μ(b)=0.5,u(b,T)=u(g,F)=1formulae-sequence𝜇𝑔𝜇𝑏0.5𝑢𝑏𝑇𝑢𝑔𝐹1\mu(g)=\mu(b)=0.5,u(b,T)=u(g,F)=-1italic_μ ( italic_g ) = italic_μ ( italic_b ) = 0.5 , italic_u ( italic_b , italic_T ) = italic_u ( italic_g , italic_F ) = - 1). Left: χ(s)<0𝜒𝑠0\chi(s)<0italic_χ ( italic_s ) < 0 (Qb(s)/v(s)=0.25subscript𝑄𝑏𝑠𝑣𝑠0.25Q_{b}(s)/v(s)=0.25italic_Q start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ( italic_s ) / italic_v ( italic_s ) = 0.25). Right: χ(s)<0𝜒𝑠0-\chi(s)<0- italic_χ ( italic_s ) < 0 (Qb(s)/v(s)=0.85subscript𝑄𝑏𝑠𝑣𝑠0.85Q_{b}(s)/v(s)=0.85italic_Q start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ( italic_s ) / italic_v ( italic_s ) = 0.85).

Note that audit confidence is determined by optimizing the objective, which consists of penalties for audit errors and costs associated with information acquisition. In this context, it is important to carefully select reasonable intervals for u(ω,a)𝑢𝜔𝑎u(\omega,a)italic_u ( italic_ω , italic_a ) and λ𝜆\lambdaitalic_λ. In practice, as auditors are end-users for the algorithm, and given the disparities in end-users across different algorithms, the range for the epistemic factor needs to be contingent upon the ease with which corresponding end-users of the algorithm can access relevant information.

IV-D Irresponsible developer’s choice and auditor’s confidence

According to (14) and (15), the irresponsible developer’s budget choice determines Qb()subscript𝑄𝑏Q_{b}(\cdot)italic_Q start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ( ⋅ ) given p()𝑝p(\cdot)italic_p ( ⋅ ). Hence, (18) and (19) (shown in Fig. 5) also establish a relationship between the irresponsible developer’s choice and the auditor’s confidence.

Refer to caption
Figure 5: The trend between the auditor’s confidence and the irresponsible developer’s choice that leads to Qb(s)/v(s)subscript𝑄𝑏𝑠𝑣𝑠Q_{b}(s)/v(s)italic_Q start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ( italic_s ) / italic_v ( italic_s ). Here, μ(g)=μ(b)=0.5,u(b,T)=u(g,F)=1,λ=1formulae-sequence𝜇𝑔𝜇𝑏0.5𝑢𝑏𝑇𝑢𝑔𝐹1𝜆1\mu(g)=\mu(b)=0.5,u(b,T)=u(g,F)=-1,\lambda=1italic_μ ( italic_g ) = italic_μ ( italic_b ) = 0.5 , italic_u ( italic_b , italic_T ) = italic_u ( italic_g , italic_F ) = - 1 , italic_λ = 1.

By taking partial derivative of r(g|s)𝑟conditional𝑔𝑠r(g|s)italic_r ( italic_g | italic_s ) with respect to Qb(s)v(s)subscript𝑄𝑏𝑠𝑣𝑠\frac{Q_{b}(s)}{v(s)}divide start_ARG italic_Q start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ( italic_s ) end_ARG start_ARG italic_v ( italic_s ) end_ARG, we obtain r(g|s)Qb(s)/v(s)=μ(g)μ(b)(u(g,F)+u(b,T))exp(ϕ(s))λy(s)2,𝑟conditional𝑔𝑠subscript𝑄𝑏𝑠𝑣𝑠𝜇𝑔𝜇𝑏𝑢𝑔𝐹𝑢𝑏𝑇italic-ϕ𝑠𝜆superscript𝑦superscript𝑠2\frac{\partial r(g|s)}{\partial Q_{b}(s)/v(s)}=\frac{\mu(g)\mu(b)(u(g,F)+u(b,T% ))\exp\left(\phi(s)\right)}{\lambda y^{\prime}(s)^{2}},divide start_ARG ∂ italic_r ( italic_g | italic_s ) end_ARG start_ARG ∂ italic_Q start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ( italic_s ) / italic_v ( italic_s ) end_ARG = divide start_ARG italic_μ ( italic_g ) italic_μ ( italic_b ) ( italic_u ( italic_g , italic_F ) + italic_u ( italic_b , italic_T ) ) roman_exp ( italic_ϕ ( italic_s ) ) end_ARG start_ARG italic_λ italic_y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_s ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG , which is negative since u(g,F)+u(b,T)<0𝑢𝑔𝐹𝑢𝑏𝑇0u(g,F)+u(b,T)<0italic_u ( italic_g , italic_F ) + italic_u ( italic_b , italic_T ) < 0. Additionally, as the value of λ𝜆\lambdaitalic_λ increases (when auditors incur higher costs for information acquisition), the magnitude of r(g|s)/(Qb(s)v(s))𝑟conditional𝑔𝑠subscript𝑄𝑏𝑠𝑣𝑠\partial r(g|s)/\partial(\frac{Q_{b}(s)}{v(s)})∂ italic_r ( italic_g | italic_s ) / ∂ ( divide start_ARG italic_Q start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ( italic_s ) end_ARG start_ARG italic_v ( italic_s ) end_ARG ) decreases, implying relatively less influence on audit confidence. This trend is evident in Figure 5, where a greater λ𝜆\lambdaitalic_λ corresponds to a flatter curve for r(g|s)𝑟conditional𝑔𝑠r(g|s)italic_r ( italic_g | italic_s ).

V Discussion and Conclusions

Herd audit is a collective mechanism that empowers users to hold algorithm developers accountable, fostering the development of compliant and responsible digital products for the betterment of society. In this study, we examine herd audit through a game-theoretic lens, capturing the interactions between an idiosyncratic user and a privacy-preserving algorithm developer. Our framework adopts a Stackelberg game approach, enabling us to assess the impact of herd audit on responsible algorithm design and understand selfish and irresponsible strategies in worst-case scenarios.

We have specifically explored the presence of auditors with varying cognitive and reasoning capabilities, capturing epistemic disparities. Within our game-theoretic framework, we have consolidated the concept of rational inattention. The optimal strategy for auditors underscores the importance of easy access to relevant information, which enhances their confidence in the herd-audit process. Similarly, the optimal decision for algorithm developers has revealed that herd audit is a viable approach when auditors face lower costs in accessing knowledge, as denoted by smaller epistemic factors. Based on our findings, we conclude that herd audit poses a credit threat to developers and plays a vital role in promoting the responsible development of privacy-preserving algorithms. In future work, we aim to enrich the game-theoretic framework by incorporating end-users’ incentives. This extension allows us to design an incentive mechanism that encourages participation in herd audits. Additionally, we plan to explore the fusion of distributed audits alongside a central audit center. Leveraging tools from decentralized hypothesis testing, game theory, information theory, and differential privacy, this research direction holds promise for advancing the field further.

References

  • [1] J. Guszcza, I. Rahwan, W. Bible, M. Cebrian, and V. Katyal, “Why we need to audit algorithms,” 2018. [Online]. Available: https://hdl.handle.net/21.11116/0000-0003-1C9E-D
  • [2] C. Dwork, “Differential privacy: A survey of results,” in Theory and Applications of Models of Computation: 5th International Conference, TAMC 2008, Xi’an, China, April 25-29, 2008. Proceedings 5.   Springer, 2008, pp. 1–19.
  • [3] Z. Ding, Y. Wang, G. Wang, D. Zhang, and D. Kifer, “Detecting violations of differential privacy,” in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, pp. 475–489.
  • [4] B. Bichsel, T. Gehr, D. Drachsler-Cohen, P. Tsankov, and M. Vechev, “Dp-finder: Finding differential privacy violations by sampling and optimization,” in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS ’18.   New York, NY, USA: Association for Computing Machinery, 2018, p. 508–524.
  • [5] Y. Han and S. Martínez, “A numerical verification framework for differential privacy in estimation,” IEEE Control Systems Letters, vol. 6, pp. 1712–1717, 2021.
  • [6] J. Bandy, “Problematic machine behavior: A systematic literature review of algorithm audits,” Proceedings of the acm on human-computer interaction, vol. 5, no. CSCW1, pp. 1–34, 2021.
  • [7] B. Mittelstadt, “Automation, algorithms, and politics— auditing for transparency in content personalization systems,” International Journal of Communication, vol. 10, p. 12, 2016.
  • [8] J. M. Leimeister, “Collective intelligence,” Business & Information Systems Engineering, vol. 2, pp. 245–248, 2010.
  • [9] M. Fricker, Epistemic injustice: Power and the ethics of knowing.   Oxford University Press, 2007.
  • [10] H. Grasswick, “Epistemic injustice in science,” in The Routledge handbook of epistemic injustice.   Routledge, 2017, pp. 313–323.
  • [11] M. H. Manshaei, Q. Zhu, T. Alpcan, T. Bacşar, and J.-P. Hubaux, “Game theory meets network security and privacy,” ACM Computing Surveys (CSUR), vol. 45, no. 3, pp. 1–39, 2013.
  • [12] F. Fang, S. Liu, A. Basak, Q. Zhu, C. D. Kiekintveld, and C. A. Kamhoua, “Introduction to game theory,” Game Theory and Machine Learning for Cyber Security, pp. 21–46, 2021.
  • [13] F. Matějka and A. McKay, “Rational inattention to discrete choices: A new foundation for the multinomial logit model,” American Economic Review, vol. 105, no. 1, pp. 272–298, 2015.
  • [14] A. Caplin and M. Dean, “Revealed preference, rational inattention, and costly information acquisition,” American Economic Review, vol. 105, no. 7, pp. 2183–2203, July 2015.
  • [15] F. Restuccia, N. Ghosh, S. Bhattacharjee, S. K. Das, and T. Melodia, “Quality of information in mobile crowdsensing: Survey and research challenges,” ACM Transactions on Sensor Networks (TOSN), vol. 13, no. 4, pp. 1–43, 2017.
  • [16] Y. Zhao and Q. Zhu, “Evaluation on crowdsourcing research: Current status and future direction,” Information systems frontiers, vol. 16, pp. 417–434, 2014.
  • [17] J. Pawlick and Q. Zhu, “Active crowd defense,” Game Theory for Cyber Deception: From Theory to Applications, pp. 147–167, 2021.
  • [18] H. Frye, “The technology of public shaming,” Social Philosophy and Policy, vol. 38, no. 2, pp. 128–145, 2021.
  • [19] H. Yu, C. Miao, C. Leung, Y. Chen, S. Fauvel, V. R. Lesser, and Q. Yang, “Mitigating herding in hierarchical crowdsourcing networks,” Scientific reports, vol. 6, no. 1, p. 4, 2016.
  • [20] I. Comeig, E. Mesa-Vázquez, P. Sendra-Pons, and A. Urbano, “Rational herding in reward-based crowdfunding: An mturk experiment,” Sustainability, vol. 12, no. 23, p. 9827, 2020.
  • [21] C. Eickhoff, “Cognitive biases in crowdsourcing,” in Proceedings of the eleventh ACM international conference on web search and data mining, 2018, pp. 162–170.
  • [22] R. R. Morris, M. Dontcheva, and E. M. Gerber, “Priming for better performance in microtask crowdsourcing environments,” IEEE Internet Computing, vol. 16, no. 5, pp. 13–19, 2012.
  • [23] D. R. Karger, S. Oh, and D. Shah, “Budget-optimal task allocation for reliable crowdsourcing systems,” Operations Research, vol. 62, no. 1, pp. 1–24, 2014.
  • [24] K. Wang, X. Qi, L. Shu, D.-j. Deng, and J. J. Rodrigues, “Toward trustworthy crowdsourcing in the social internet of things,” IEEE Wireless Communications, vol. 23, no. 5, pp. 30–36, 2016.
  • [25] M. Allahbakhsh, A. Ignjatovic, B. Benatallah, E. Bertino, N. Foo et al., “Reputation management in crowdsourcing systems,” in 8th International conference on collaborative computing: networking, applications and worksharing (CollaborateCom).   IEEE, 2012, pp. 664–671.
  • [26] Y. Yu, S. Liu, L. Guo, P. L. Yeoh, B. Vucetic, and Y. Li, “Crowdr-fbc: A distributed fog-blockchains for mobile crowdsourcing reputation management,” IEEE Internet of Things Journal, vol. 7, no. 9, pp. 8722–8735, 2020.
  • [27] A. A. González-Prendes and S. M. Resko, “Cognitive-behavioral theory,” 2012.
  • [28] D. Fum, F. Del Missier, A. Stocco et al., “The cognitive modeling of human behavior: Why a model is (sometimes) better than 10,000 words,” Cognitive Systems Research, vol. 8, no. 3, pp. 135–142, 2007.
  • [29] L. Huang and Q. Zhu, Cognitive Security: A System-Scientific Approach.   Springer Nature, 2023.
  • [30] J. R. Anderson, D. Bothell, M. D. Byrne, S. Douglass, C. Lebiere, and Y. Qin, “An integrated theory of the mind.” Psychological review, vol. 111, no. 4, p. 1036, 2004.
  • [31] C. A. Sims, “Implications of rational inattention,” Journal of monetary Economics, vol. 50, no. 3, pp. 665–690, 2003.
  • [32] S. Rajtmajer, A. Squicciarini, J. M. Such, J. Semonsen, and A. Belmonte, “An ultimatum game model for the evolution of privacy in jointly managed content,” in Decision and Game Theory for Security: 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings.   Springer, 2017, pp. 112–130.
  • [33] C. Casorrán, B. Fortz, M. Labbé, and F. Ordóñez, “A study of general and security stackelberg game formulations,” European journal of operational research, vol. 278, no. 3, pp. 855–868, 2019.
  • [34] D. Guerrero, A. A. Carsteanu, and J. B. Clempner, “Solving stackelberg security markov games employing the bargaining nash approach: Convergence analysis,” Computers & Security, vol. 74, pp. 240–257, 2018.
  • [35] J. Chen and Q. Zhu, “Optimal contract design under asymmetric information for cloud-enabled internet of controlled things,” in Decision and Game Theory for Security: 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings.   Springer, 2016, pp. 329–348.
  • [36] R. Zhang and Q. Zhu, “Flipin: A game-theoretic cyber insurance framework for incentive-compatible cyber risk management of internet of things,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2026–2041, 2019.
  • [37] Q. Zhu, C. Fung, R. Boutaba, and T. Basar, “Guidex: A game-theoretic incentive-based mechanism for intrusion detection networks,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 11, pp. 2220–2230, 2012.
  • [38] L. Huang and Q. Zhu, “Duplicity games for deception design with an application to insider threat mitigation,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 4843–4856, 2021.
  • [39] K. Horák, Q. Zhu, and B. Bošanskỳ, “Manipulating adversary’s belief: A dynamic game approach to deception by design for proactive network security,” in Decision and Game Theory for Security: 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings.   Springer, 2017, pp. 273–294.
  • [40] Y. Hu and Q. Zhu, “Evasion-aware neyman-pearson detectors: A game-theoretic approach,” in 2022 IEEE 61st Conference on Decision and Control (CDC), 2022, pp. 6111–6117.
  • [41] S. N. Narayanan, A. Ganesan, K. Joshi, T. Oates, A. Joshi, and T. Finin, “Early detection of cybersecurity threats using collaborative cognition,” in 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), 2018, pp. 354–363.

-A Proof of optimal decision rule δ(s)superscript𝛿𝑠\delta^{*}(s)italic_δ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT ( italic_s )

For the null hypothesis, d(s|g)𝑑conditional𝑠𝑔d(s|g)italic_d ( italic_s | italic_g ), and the alternative hypothesis, d(s|b)𝑑conditional𝑠𝑏d(s|b)italic_d ( italic_s | italic_b ), the expected utility for problem HT𝐻𝑇HTitalic_H italic_T in (LABEL:eq:4) can be reformulated as

𝔼[u(ω,a)]𝔼delimited-[]𝑢𝜔𝑎\displaystyle\mathbb{E}[u(\omega,a)]blackboard_E [ italic_u ( italic_ω , italic_a ) ] =μ(g)u(g,F)+μ(b)u(b,F)absent𝜇𝑔𝑢𝑔𝐹𝜇𝑏𝑢𝑏𝐹\displaystyle=\mu(g)u(g,F)+\mu(b)u(b,F)= italic_μ ( italic_g ) italic_u ( italic_g , italic_F ) + italic_μ ( italic_b ) italic_u ( italic_b , italic_F )
+δ(s)=T{μ(g)[u(g,T)u(g,F)]d(s|g)\displaystyle+\sum_{\delta(s)=T}\bigg{\{}\mu(g)\big{[}u(g,T)-u(g,F)\big{]}d(s|g)+ ∑ start_POSTSUBSCRIPT italic_δ ( italic_s ) = italic_T end_POSTSUBSCRIPT { italic_μ ( italic_g ) [ italic_u ( italic_g , italic_T ) - italic_u ( italic_g , italic_F ) ] italic_d ( italic_s | italic_g )
μ(b)[u(b,F)u(b,T)]d(s|b)}.\displaystyle-\mu(b)\big{[}u(b,F)-u(b,T)\big{]}d(s|b)\bigg{\}}.- italic_μ ( italic_b ) [ italic_u ( italic_b , italic_F ) - italic_u ( italic_b , italic_T ) ] italic_d ( italic_s | italic_b ) } .

Therefore, to maximize the expected utility, the auditor must decide δ(s)=T𝛿𝑠𝑇\delta(s)=Titalic_δ ( italic_s ) = italic_T if μ(g)[u(g,T)u(g,F)]d(s|g)>μ(b)[u(b,F)u(b,T)]d(s|b)𝜇𝑔delimited-[]𝑢𝑔𝑇𝑢𝑔𝐹𝑑conditional𝑠𝑔𝜇𝑏delimited-[]𝑢𝑏𝐹𝑢𝑏𝑇𝑑conditional𝑠𝑏\mu(g)\big{[}u(g,T)-u(g,F)\big{]}d(s|g)>\mu(b)\big{[}u(b,F)-u(b,T)\big{]}d(s|b)italic_μ ( italic_g ) [ italic_u ( italic_g , italic_T ) - italic_u ( italic_g , italic_F ) ] italic_d ( italic_s | italic_g ) > italic_μ ( italic_b ) [ italic_u ( italic_b , italic_F ) - italic_u ( italic_b , italic_T ) ] italic_d ( italic_s | italic_b ). This completes the proof.

-B Proof of optimal information strategy d𝑑ditalic_d

To analyze the problem, we use the method of Lagrange multipliers and denote

J(d,y)=ωaμ(ω)u(ω,a)s:δd(s)=ad(s|ω)𝐽𝑑𝑦subscript𝜔subscript𝑎𝜇𝜔𝑢𝜔𝑎subscript:𝑠subscriptsuperscript𝛿𝑑𝑠𝑎𝑑conditional𝑠𝜔\displaystyle J(d,y)=\sum_{\omega}\sum_{a}\mu(\omega)u(\omega,a)\sum_{s:\delta% ^{*}_{d}(s)=a}d(s|\omega)italic_J ( italic_d , italic_y ) = ∑ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT italic_μ ( italic_ω ) italic_u ( italic_ω , italic_a ) ∑ start_POSTSUBSCRIPT italic_s : italic_δ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT ( italic_s ) = italic_a end_POSTSUBSCRIPT italic_d ( italic_s | italic_ω )
λωsd(s|ω)μ(ω)lnd(s|ω)ωd(s|ω)μ(ω)ωy(ω)d(s|ω),𝜆subscript𝜔subscript𝑠𝑑conditional𝑠𝜔𝜇𝜔𝑑conditional𝑠𝜔subscript𝜔𝑑conditional𝑠𝜔𝜇𝜔subscript𝜔𝑦𝜔𝑑conditional𝑠𝜔\displaystyle-\lambda\sum_{\omega}\sum_{s}d(s|\omega)\mu(\omega)\ln\frac{d(s|% \omega)}{\sum_{\omega}d(s|\omega)\mu(\omega)}-\sum_{\omega}y(\omega)d(s|\omega),- italic_λ ∑ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT italic_d ( italic_s | italic_ω ) italic_μ ( italic_ω ) roman_ln divide start_ARG italic_d ( italic_s | italic_ω ) end_ARG start_ARG ∑ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT italic_d ( italic_s | italic_ω ) italic_μ ( italic_ω ) end_ARG - ∑ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT italic_y ( italic_ω ) italic_d ( italic_s | italic_ω ) ,

with the last term corresponding to the constraint that d(s|ω)𝑑conditional𝑠𝜔d(s|\omega)italic_d ( italic_s | italic_ω ) should be a conditional probability mass function.

Then, for d(s|g)𝑑conditional𝑠𝑔d(s|g)italic_d ( italic_s | italic_g ) with sSd,T𝑠subscript𝑆𝑑𝑇s\in S_{d,T}italic_s ∈ italic_S start_POSTSUBSCRIPT italic_d , italic_T end_POSTSUBSCRIPT, according to the first-order and the second-order condition,

J(d,y)d(s|g)=μ(g)u(g,T)λμ(g)log(d(s|g)v(s))y(g)=0,𝐽𝑑𝑦𝑑conditional𝑠𝑔𝜇𝑔𝑢𝑔𝑇𝜆𝜇𝑔𝑑conditional𝑠𝑔𝑣𝑠𝑦𝑔0\displaystyle\frac{\partial J(d,y)}{\partial d(s|g)}=\mu(g)u(g,T)-\lambda\mu(g% )\log(\frac{d(s|g)}{v(s)})-y(g)=0,divide start_ARG ∂ italic_J ( italic_d , italic_y ) end_ARG start_ARG ∂ italic_d ( italic_s | italic_g ) end_ARG = italic_μ ( italic_g ) italic_u ( italic_g , italic_T ) - italic_λ italic_μ ( italic_g ) roman_log ( divide start_ARG italic_d ( italic_s | italic_g ) end_ARG start_ARG italic_v ( italic_s ) end_ARG ) - italic_y ( italic_g ) = 0 ,
2J(d,y)d(s|g)2=λμ(g)μ(b)d(s|b)d(s|g)v(s)0,superscript2𝐽𝑑𝑦𝑑superscriptconditional𝑠𝑔2𝜆𝜇𝑔𝜇𝑏𝑑conditional𝑠𝑏𝑑conditional𝑠𝑔𝑣𝑠0\displaystyle\frac{\partial^{2}J(d,y)}{\partial d(s|g)^{2}}=-\lambda\mu(g)% \frac{\mu(b)d(s|b)}{d(s|g)v(s)}\leq 0,divide start_ARG ∂ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_J ( italic_d , italic_y ) end_ARG start_ARG ∂ italic_d ( italic_s | italic_g ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG = - italic_λ italic_μ ( italic_g ) divide start_ARG italic_μ ( italic_b ) italic_d ( italic_s | italic_b ) end_ARG start_ARG italic_d ( italic_s | italic_g ) italic_v ( italic_s ) end_ARG ≤ 0 ,

where v(s)=ωd(s|ω)μ(ω)𝑣𝑠subscript𝜔𝑑conditional𝑠𝜔𝜇𝜔v(s)=\sum_{\omega}d(s|\omega)\mu(\omega)italic_v ( italic_s ) = ∑ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT italic_d ( italic_s | italic_ω ) italic_μ ( italic_ω ). Letting log(y(g))=y(g)λμ(g)superscript𝑦𝑔𝑦𝑔𝜆𝜇𝑔\log(y^{\prime}(g))=\frac{y(g)}{\lambda\mu(g)}roman_log ( italic_y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_g ) ) = divide start_ARG italic_y ( italic_g ) end_ARG start_ARG italic_λ italic_μ ( italic_g ) end_ARG leads to the following d(s|g)𝑑conditional𝑠𝑔d(s|g)italic_d ( italic_s | italic_g ) that maximizes (8).

λμ(g)[u(g,T)λlog(d(s|g)v(s))logy(g)]=0,𝜆𝜇𝑔delimited-[]𝑢𝑔𝑇𝜆𝑑conditional𝑠𝑔𝑣𝑠superscript𝑦𝑔0\displaystyle\lambda\mu(g)\bigg{[}\frac{u(g,T)}{\lambda}-\log(\frac{d(s|g)}{v(% s)})-\log y^{\prime}(g)\bigg{]}=0,italic_λ italic_μ ( italic_g ) [ divide start_ARG italic_u ( italic_g , italic_T ) end_ARG start_ARG italic_λ end_ARG - roman_log ( divide start_ARG italic_d ( italic_s | italic_g ) end_ARG start_ARG italic_v ( italic_s ) end_ARG ) - roman_log italic_y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_g ) ] = 0 ,
d(s|g)=v(s)exp(u(g,T)λ)y(g).𝑑conditional𝑠𝑔𝑣𝑠𝑢𝑔𝑇𝜆superscript𝑦𝑔\displaystyle d(s|g)=\frac{v(s)\exp(\frac{u(g,T)}{\lambda})}{y^{\prime}(g)}.italic_d ( italic_s | italic_g ) = divide start_ARG italic_v ( italic_s ) roman_exp ( divide start_ARG italic_u ( italic_g , italic_T ) end_ARG start_ARG italic_λ end_ARG ) end_ARG start_ARG italic_y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_g ) end_ARG .

Note that y(g)superscript𝑦𝑔y^{\prime}(g)italic_y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_g ) is the normalization term. Similarly, for d(s|g)𝑑conditional𝑠𝑔d(s|g)italic_d ( italic_s | italic_g ) with sSd,F𝑠subscript𝑆𝑑𝐹s\in S_{d,F}italic_s ∈ italic_S start_POSTSUBSCRIPT italic_d , italic_F end_POSTSUBSCRIPT and d(s|b)𝑑conditional𝑠𝑏d(s|b)italic_d ( italic_s | italic_b ), we can get the information-obtaining strategy in (9) and (10)

-C An illustrative example for equilibrium analysis

We consider a scenario where the cardinality of the set \mathcal{E}caligraphic_E is three; i.e., ||=33|\mathcal{E}|=3| caligraphic_E | = 3 with ={ϵl,ϵm,ϵh}subscriptitalic-ϵ𝑙subscriptitalic-ϵ𝑚subscriptitalic-ϵ\mathcal{E}=\{\epsilon_{l},\epsilon_{m},\epsilon_{h}\}caligraphic_E = { italic_ϵ start_POSTSUBSCRIPT italic_l end_POSTSUBSCRIPT , italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT , italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT }, where ϵl<ϵm<ϵhsubscriptitalic-ϵ𝑙subscriptitalic-ϵ𝑚subscriptitalic-ϵ\epsilon_{l}<\epsilon_{m}<\epsilon_{h}italic_ϵ start_POSTSUBSCRIPT italic_l end_POSTSUBSCRIPT < italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT < italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT and it’s assumed that the claimed differential privacy budget is ϵ=ϵlsuperscriptitalic-ϵsubscriptitalic-ϵ𝑙\epsilon^{\prime}=\epsilon_{l}italic_ϵ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = italic_ϵ start_POSTSUBSCRIPT italic_l end_POSTSUBSCRIPT. Then, the two hypotheses become

Qg(s)=ϵp(s|ϵ)q(ϵ|g)=p(s|ϵ)=p(s|ϵl),subscript𝑄𝑔𝑠subscriptitalic-ϵ𝑝conditional𝑠italic-ϵ𝑞conditionalitalic-ϵ𝑔𝑝conditional𝑠superscriptitalic-ϵ𝑝conditional𝑠subscriptitalic-ϵ𝑙Q_{g}(s)=\sum_{\epsilon}p(s|\epsilon)q(\epsilon|g)=p(s|\epsilon^{\prime})=p(s|% \epsilon_{l}),italic_Q start_POSTSUBSCRIPT italic_g end_POSTSUBSCRIPT ( italic_s ) = ∑ start_POSTSUBSCRIPT italic_ϵ end_POSTSUBSCRIPT italic_p ( italic_s | italic_ϵ ) italic_q ( italic_ϵ | italic_g ) = italic_p ( italic_s | italic_ϵ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) = italic_p ( italic_s | italic_ϵ start_POSTSUBSCRIPT italic_l end_POSTSUBSCRIPT ) ,
Qb(s)=ϵp(s|ϵ)q(ϵ|b)=p(s|ϵm)q(ϵm|b)+p(s|ϵh)q(ϵh|b).subscript𝑄𝑏𝑠subscriptitalic-ϵ𝑝conditional𝑠italic-ϵ𝑞conditionalitalic-ϵ𝑏𝑝conditional𝑠subscriptitalic-ϵ𝑚𝑞conditionalsubscriptitalic-ϵ𝑚𝑏𝑝conditional𝑠subscriptitalic-ϵ𝑞conditionalsubscriptitalic-ϵ𝑏Q_{b}(s)=\sum_{\epsilon}p(s|\epsilon)q(\epsilon|b)=p(s|\epsilon_{m})q(\epsilon% _{m}|b)+p(s|\epsilon_{h})q(\epsilon_{h}|b).italic_Q start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ( italic_s ) = ∑ start_POSTSUBSCRIPT italic_ϵ end_POSTSUBSCRIPT italic_p ( italic_s | italic_ϵ ) italic_q ( italic_ϵ | italic_b ) = italic_p ( italic_s | italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ) italic_q ( italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT | italic_b ) + italic_p ( italic_s | italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) italic_q ( italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT | italic_b ) .

According to derivations in Appendix -D, the strategy specified by (18) and (19) is optimal for the auditor with epistemic factor λ𝜆\lambdaitalic_λ.

We then shift our focus to the irresponsible developer’s strategy. The irresponsible developer endeavors to enhance algorithmic accuracy while concurrently maximizing the probability of evading detection by the auditor, thereby increasing the likelihood of being perceived as a responsible developer. Hence, the irresponsible developer’s decision-making can be described by the following optimization problem:

maxq(|b)\displaystyle\max_{q(\cdot|b)}roman_max start_POSTSUBSCRIPT italic_q ( ⋅ | italic_b ) end_POSTSUBSCRIPT [q(ϵm|b)A(ϵm)+q(ϵh|b)A(ϵh)]delimited-[]𝑞conditionalsubscriptitalic-ϵ𝑚𝑏𝐴subscriptitalic-ϵ𝑚𝑞conditionalsubscriptitalic-ϵ𝑏𝐴subscriptitalic-ϵ\displaystyle\big{[}q(\epsilon_{m}|b)A(\epsilon_{m})+q(\epsilon_{h}|b)A(% \epsilon_{h})\big{]}[ italic_q ( italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT | italic_b ) italic_A ( italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ) + italic_q ( italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT | italic_b ) italic_A ( italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) ] (21)
+βs[p(s|ϵm)q(ϵm|b)+p(s|ϵh)q(ϵh|b)]r(g|s).𝛽subscript𝑠delimited-[]𝑝conditional𝑠subscriptitalic-ϵ𝑚𝑞conditionalsubscriptitalic-ϵ𝑚𝑏𝑝conditional𝑠subscriptitalic-ϵ𝑞conditionalsubscriptitalic-ϵ𝑏𝑟conditional𝑔𝑠\displaystyle+\beta\ \sum_{s}\bigg{[}p(s|\epsilon_{m})q(\epsilon_{m}|b)+p(s|% \epsilon_{h})q(\epsilon_{h}|b)\bigg{]}r(g|s).+ italic_β ∑ start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT [ italic_p ( italic_s | italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ) italic_q ( italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT | italic_b ) + italic_p ( italic_s | italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) italic_q ( italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT | italic_b ) ] italic_r ( italic_g | italic_s ) .

By leveraging q(ϵm|b)=1q(ϵh|b)𝑞conditionalsubscriptitalic-ϵ𝑚𝑏1𝑞conditionalsubscriptitalic-ϵ𝑏q(\epsilon_{m}|b)=1-q(\epsilon_{h}|b)italic_q ( italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT | italic_b ) = 1 - italic_q ( italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT | italic_b ), we rewrite the problem (21) as follows:

maxq(ϵl|b)subscript𝑞conditionalsubscriptitalic-ϵ𝑙𝑏\displaystyle\max_{q(\epsilon_{l}|b)}roman_max start_POSTSUBSCRIPT italic_q ( italic_ϵ start_POSTSUBSCRIPT italic_l end_POSTSUBSCRIPT | italic_b ) end_POSTSUBSCRIPT A(ϵh)+βsr(g|s)p(s|ϵh)+{[A(ϵm)A(ϵh)]\displaystyle A(\epsilon_{h})+\beta\ \sum_{s}r(g|s)p(s|\epsilon_{h})+\bigg{\{}% \big{[}A(\epsilon_{m})-A(\epsilon_{h})\big{]}italic_A ( italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) + italic_β ∑ start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT italic_r ( italic_g | italic_s ) italic_p ( italic_s | italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) + { [ italic_A ( italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ) - italic_A ( italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) ] (22)
+βsr(g|s)[p(s|ϵm)p(s|ϵh)]}q(ϵm|b).\displaystyle+\beta\sum_{s}r(g|s)\big{[}p(s|\epsilon_{m})-p(s|\epsilon_{h})% \big{]}\bigg{\}}q(\epsilon_{m}|b).+ italic_β ∑ start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT italic_r ( italic_g | italic_s ) [ italic_p ( italic_s | italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ) - italic_p ( italic_s | italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) ] } italic_q ( italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT | italic_b ) .

Since the first two terms A(ϵh)+βsr(g|s)p(s|ϵh)𝐴subscriptitalic-ϵ𝛽subscript𝑠𝑟conditional𝑔𝑠𝑝conditional𝑠subscriptitalic-ϵA(\epsilon_{h})+\beta\ \sum_{s}r(g|s)p(s|\epsilon_{h})italic_A ( italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) + italic_β ∑ start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT italic_r ( italic_g | italic_s ) italic_p ( italic_s | italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) are independent of q(|b)q(\cdot|b)italic_q ( ⋅ | italic_b ), (22) suggests the following strategy for the irresponsible developer: let ΔA=A(ϵm)A(ϵh)Δ𝐴𝐴subscriptitalic-ϵ𝑚𝐴subscriptitalic-ϵ\Delta A=A(\epsilon_{m})-A(\epsilon_{h})roman_Δ italic_A = italic_A ( italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ) - italic_A ( italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ),

{q(ϵm|b)=1,ΔA+βsr(g|s)[p(s|ϵm)p(s|ϵh)]>0q(ϵh|b)=1,otherwise.cases𝑞conditionalsubscriptitalic-ϵ𝑚𝑏1Δ𝐴𝛽subscript𝑠𝑟conditional𝑔𝑠delimited-[]𝑝conditional𝑠subscriptitalic-ϵ𝑚𝑝conditional𝑠subscriptitalic-ϵ0𝑞conditionalsubscriptitalic-ϵ𝑏1otherwise.\begin{cases}q(\epsilon_{m}|b)=1,&\Delta A+\beta\sum_{s}r(g|s)\big{[}p(s|% \epsilon_{m})-p(s|\epsilon_{h})\big{]}>0\\ q(\epsilon_{h}|b)=1,&\textup{otherwise.}\end{cases}{ start_ROW start_CELL italic_q ( italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT | italic_b ) = 1 , end_CELL start_CELL roman_Δ italic_A + italic_β ∑ start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT italic_r ( italic_g | italic_s ) [ italic_p ( italic_s | italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ) - italic_p ( italic_s | italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) ] > 0 end_CELL end_ROW start_ROW start_CELL italic_q ( italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT | italic_b ) = 1 , end_CELL start_CELL otherwise. end_CELL end_ROW

That is, the irresponsible developer has a pure strategy by choosing either q(ϵm|b)=1𝑞conditionalsubscriptitalic-ϵ𝑚𝑏1q(\epsilon_{m}|b)=1italic_q ( italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT | italic_b ) = 1 or q(ϵh|b)=1𝑞conditionalsubscriptitalic-ϵ𝑏1q(\epsilon_{h}|b)=1italic_q ( italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT | italic_b ) = 1.

-D Proof of auditor’s strategy r𝑟ritalic_r

In (16), the KL divergence term with a negative sign is concave with respect to the decision variables r()𝑟r(\cdot)italic_r ( ⋅ ) given fixed priors μ()𝜇\mu(\cdot)italic_μ ( ⋅ ). Therefore, the combination of the terms in the objective function forms a weighted sum of concave functions. This makes the overall objective function concave. Given the linear constraints, the feasibility set is convex. Hence, the optimization problem (16) is a concave maximization over a convex set.

The Lagrangian corresponding to (16) is then given by

J(r,y,z)=𝐽𝑟𝑦𝑧absent\displaystyle J(r,y,z)=italic_J ( italic_r , italic_y , italic_z ) = u(g,F)s[ϵp(s|ϵ)q(ϵ|g)]r(b|s)𝑢𝑔𝐹subscript𝑠delimited-[]subscriptitalic-ϵ𝑝conditional𝑠italic-ϵ𝑞conditionalitalic-ϵ𝑔𝑟conditional𝑏𝑠\displaystyle\ u(g,F)\sum_{s}\bigg{[}\sum_{\epsilon}p(s|\epsilon)q(\epsilon|g)% \bigg{]}r(b|s)italic_u ( italic_g , italic_F ) ∑ start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT [ ∑ start_POSTSUBSCRIPT italic_ϵ end_POSTSUBSCRIPT italic_p ( italic_s | italic_ϵ ) italic_q ( italic_ϵ | italic_g ) ] italic_r ( italic_b | italic_s ) (23)
+u(b,T)s[ϵp(s|ϵ)q(ϵ|b)]r(g|s)𝑢𝑏𝑇subscript𝑠delimited-[]subscriptitalic-ϵ𝑝conditional𝑠italic-ϵ𝑞conditionalitalic-ϵ𝑏𝑟conditional𝑔𝑠\displaystyle+u(b,T)\sum_{s}\bigg{[}\sum_{\epsilon}p(s|\epsilon)q(\epsilon|b)% \bigg{]}r(g|s)+ italic_u ( italic_b , italic_T ) ∑ start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT [ ∑ start_POSTSUBSCRIPT italic_ϵ end_POSTSUBSCRIPT italic_p ( italic_s | italic_ϵ ) italic_q ( italic_ϵ | italic_b ) ] italic_r ( italic_g | italic_s )
λs[ϵp(s|ϵ)q(ϵ|g)+ϵp(s|ε)q(ϵ|b)]𝜆subscript𝑠delimited-[]subscriptitalic-ϵ𝑝conditional𝑠italic-ϵ𝑞conditionalitalic-ϵ𝑔subscriptitalic-ϵ𝑝conditional𝑠𝜀𝑞conditionalitalic-ϵ𝑏\displaystyle-\lambda\ \sum_{s}\bigg{[}\sum_{\epsilon}p(s|\epsilon)q(\epsilon|% g)+\sum_{\epsilon}p(s|\varepsilon)q(\epsilon|b)\bigg{]}- italic_λ ∑ start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT [ ∑ start_POSTSUBSCRIPT italic_ϵ end_POSTSUBSCRIPT italic_p ( italic_s | italic_ϵ ) italic_q ( italic_ϵ | italic_g ) + ∑ start_POSTSUBSCRIPT italic_ϵ end_POSTSUBSCRIPT italic_p ( italic_s | italic_ε ) italic_q ( italic_ϵ | italic_b ) ]
ωr(ω|s)logr(ω|s)μ(ω)yr(g|s)zr(b|s),subscript𝜔𝑟conditional𝜔𝑠𝑟conditional𝜔𝑠𝜇𝜔𝑦𝑟conditional𝑔𝑠𝑧𝑟conditional𝑏𝑠\displaystyle\sum_{\omega}r(\omega|s)\log\frac{r(\omega|s)}{\mu(\omega)}-yr(g|% s)-zr(b|s),∑ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT italic_r ( italic_ω | italic_s ) roman_log divide start_ARG italic_r ( italic_ω | italic_s ) end_ARG start_ARG italic_μ ( italic_ω ) end_ARG - italic_y italic_r ( italic_g | italic_s ) - italic_z italic_r ( italic_b | italic_s ) ,

where y𝑦y\in\mathbb{R}italic_y ∈ blackboard_R and z𝑧z\in\mathbb{R}italic_z ∈ blackboard_R are the associated Lagrange multipliers. Then, the first-order condition concerning r(g|s)𝑟conditional𝑔𝑠r(g|s)italic_r ( italic_g | italic_s ) implies

J(r)r(g|s)𝐽𝑟𝑟conditional𝑔𝑠\displaystyle\frac{\partial J(r)}{\partial r(g|s)}divide start_ARG ∂ italic_J ( italic_r ) end_ARG start_ARG ∂ italic_r ( italic_g | italic_s ) end_ARG =u(b,T)[p(s|ϵm)q(ϵm|b)+p(s|ϵh)q(ϵh|b)]absent𝑢𝑏𝑇delimited-[]𝑝conditional𝑠subscriptitalic-ϵ𝑚𝑞conditionalsubscriptitalic-ϵ𝑚𝑏𝑝conditional𝑠subscriptitalic-ϵ𝑞conditionalsubscriptitalic-ϵ𝑏\displaystyle=u(b,T)\bigg{[}p(s|\epsilon_{m})q(\epsilon_{m}|b)+p(s|\epsilon_{h% })q(\epsilon_{h}|b)\bigg{]}= italic_u ( italic_b , italic_T ) [ italic_p ( italic_s | italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ) italic_q ( italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT | italic_b ) + italic_p ( italic_s | italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) italic_q ( italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT | italic_b ) ]
λ[p(s|ϵl)+p(s|ϵm)q(ϵm|b)+p(s|ϵh)q(ϵh|b)]𝜆delimited-[]𝑝conditional𝑠subscriptitalic-ϵ𝑙𝑝conditional𝑠subscriptitalic-ϵ𝑚𝑞conditionalsubscriptitalic-ϵ𝑚𝑏𝑝conditional𝑠subscriptitalic-ϵ𝑞conditionalsubscriptitalic-ϵ𝑏\displaystyle-\lambda\bigg{[}p(s|\epsilon_{l})+p(s|\epsilon_{m})q(\epsilon_{m}% |b)+p(s|\epsilon_{h})q(\epsilon_{h}|b)\bigg{]}- italic_λ [ italic_p ( italic_s | italic_ϵ start_POSTSUBSCRIPT italic_l end_POSTSUBSCRIPT ) + italic_p ( italic_s | italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ) italic_q ( italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT | italic_b ) + italic_p ( italic_s | italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) italic_q ( italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT | italic_b ) ]
(logr(g|s)μ(g)+1)y𝑟conditional𝑔𝑠𝜇𝑔1𝑦\displaystyle\bigg{(}\log\frac{r(g|s)}{\mu(g)}+1\bigg{)}-y( roman_log divide start_ARG italic_r ( italic_g | italic_s ) end_ARG start_ARG italic_μ ( italic_g ) end_ARG + 1 ) - italic_y
=0.absent0\displaystyle=0.= 0 .

Hence, we obtain

u(b,T)Qb(s)λv(s)(logr(g|s)μ(g)+1)y=0,𝑢𝑏𝑇subscript𝑄𝑏𝑠𝜆𝑣𝑠𝑟conditional𝑔𝑠𝜇𝑔1𝑦0\displaystyle u(b,T)Q_{b}(s)-\lambda v(s)\bigg{(}\log\frac{r(g|s)}{\mu(g)}+1% \bigg{)}-y=0,italic_u ( italic_b , italic_T ) italic_Q start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ( italic_s ) - italic_λ italic_v ( italic_s ) ( roman_log divide start_ARG italic_r ( italic_g | italic_s ) end_ARG start_ARG italic_μ ( italic_g ) end_ARG + 1 ) - italic_y = 0 ,
u(b,T)Qb(s)λv(s)(yλv(s)+1)=logr(g|s)μ(g).𝑢𝑏𝑇subscript𝑄𝑏𝑠𝜆𝑣𝑠𝑦𝜆𝑣𝑠1𝑟conditional𝑔𝑠𝜇𝑔\displaystyle\frac{u(b,T)Q_{b}(s)}{\lambda v(s)}-\bigg{(}\frac{y}{\lambda v(s)% }+1\bigg{)}=\log\frac{r(g|s)}{\mu(g)}.divide start_ARG italic_u ( italic_b , italic_T ) italic_Q start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ( italic_s ) end_ARG start_ARG italic_λ italic_v ( italic_s ) end_ARG - ( divide start_ARG italic_y end_ARG start_ARG italic_λ italic_v ( italic_s ) end_ARG + 1 ) = roman_log divide start_ARG italic_r ( italic_g | italic_s ) end_ARG start_ARG italic_μ ( italic_g ) end_ARG .

By letting logy(s)=(yλv(s)+1)superscript𝑦𝑠𝑦𝜆𝑣𝑠1\log y^{\prime}(s)=\big{(}\frac{y}{\lambda v(s)}+1\big{)}roman_log italic_y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_s ) = ( divide start_ARG italic_y end_ARG start_ARG italic_λ italic_v ( italic_s ) end_ARG + 1 ), r(g|s)𝑟conditional𝑔𝑠r(g|s)italic_r ( italic_g | italic_s ) can then be written as (18). We can get r(b|s)𝑟conditional𝑏𝑠r(b|s)italic_r ( italic_b | italic_s ) described in (19) with a similar process.

-E Proof of Proposition 4

We sketch the proof for |𝒮|=2𝒮2|\mathcal{S}|=2| caligraphic_S | = 2 with 𝒮={s1,s2}𝒮subscript𝑠1subscript𝑠2\mathcal{S}=\{s_{1},s_{2}\}caligraphic_S = { italic_s start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_s start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT }. In this example, p(s1|ϵm)+p(s2|ϵm)=1𝑝conditionalsubscript𝑠1subscriptitalic-ϵ𝑚𝑝conditionalsubscript𝑠2subscriptitalic-ϵ𝑚1p(s_{1}|\epsilon_{m})+p(s_{2}|\epsilon_{m})=1italic_p ( italic_s start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT | italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ) + italic_p ( italic_s start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT | italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ) = 1 and p(s1|ϵh)+p(s2|ϵh)=1𝑝conditionalsubscript𝑠1subscriptitalic-ϵ𝑝conditionalsubscript𝑠2subscriptitalic-ϵ1p(s_{1}|\epsilon_{h})+p(s_{2}|\epsilon_{h})=1italic_p ( italic_s start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT | italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) + italic_p ( italic_s start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT | italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) = 1, then r(g|s1)[p(s1|ϵm)p(s1|ϵh)]+r(g|s2)[p(s2|ϵm)p(s2|ϵh)]=11=0𝑟conditional𝑔subscript𝑠1delimited-[]𝑝conditionalsubscript𝑠1subscriptitalic-ϵ𝑚𝑝conditionalsubscript𝑠1subscriptitalic-ϵ𝑟conditional𝑔subscript𝑠2delimited-[]𝑝conditionalsubscript𝑠2subscriptitalic-ϵ𝑚𝑝conditionalsubscript𝑠2subscriptitalic-ϵ110r(g|s_{1})[p(s_{1}|\epsilon_{m})-p(s_{1}|\epsilon_{h})]+r(g|s_{2})[p(s_{2}|% \epsilon_{m})-p(s_{2}|\epsilon_{h})]=1-1=0italic_r ( italic_g | italic_s start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ) [ italic_p ( italic_s start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT | italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ) - italic_p ( italic_s start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT | italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) ] + italic_r ( italic_g | italic_s start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ) [ italic_p ( italic_s start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT | italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ) - italic_p ( italic_s start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT | italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) ] = 1 - 1 = 0 if r(g|s1)=r(g|s2)𝑟conditional𝑔subscript𝑠1𝑟conditional𝑔subscript𝑠2r(g|s_{1})=r(g|s_{2})italic_r ( italic_g | italic_s start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ) = italic_r ( italic_g | italic_s start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ).

Hence, A(ϵm)A(ϵh)+sr(g|s)[p(s|ϵm)p(s|ϵh)]<0𝐴subscriptitalic-ϵ𝑚𝐴subscriptitalic-ϵsubscript𝑠𝑟conditional𝑔𝑠delimited-[]𝑝conditional𝑠subscriptitalic-ϵ𝑚𝑝conditional𝑠subscriptitalic-ϵ0A(\epsilon_{m})-A(\epsilon_{h})+\sum_{s}r(g|s)\big{[}p(s|\epsilon_{m})-p(s|% \epsilon_{h})\big{]}<0italic_A ( italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ) - italic_A ( italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) + ∑ start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT italic_r ( italic_g | italic_s ) [ italic_p ( italic_s | italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ) - italic_p ( italic_s | italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) ] < 0 in the case where A(ϵm)<A(ϵh)𝐴subscriptitalic-ϵ𝑚𝐴subscriptitalic-ϵA(\epsilon_{m})<A(\epsilon_{h})italic_A ( italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ) < italic_A ( italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ), which leads to q(ϵm|b)=0𝑞conditionalsubscriptitalic-ϵ𝑚𝑏0q(\epsilon_{m}|b)=0italic_q ( italic_ϵ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT | italic_b ) = 0 and q(ϵh|b)=1𝑞conditionalsubscriptitalic-ϵ𝑏1q(\epsilon_{h}|b)=1italic_q ( italic_ϵ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT | italic_b ) = 1. This completes the proof.