Approximability of Manipulating Elections

Slides:



Advertisements
Similar presentations
Combinatorial Auction
Advertisements

On the Robustness of Preference Aggregation in Noisy Environments Ariel D. Procaccia, Jeffrey S. Rosenschein and Gal A. Kaminka.
Ioannis Caragiannis, Jason A. Covey, Michal Feldman, Christopher M. Homan, Christos Kaklamanis, Nikos Karanikolask, Ariel D. Procaccia, Je ff rey S. Rosenschein.
The Computational Difficulty of Manipulating an Election Tetiana Zinchenko 05/12/
Common Voting Rules as Maximum Likelihood Estimators Vincent Conitzer (Joint work with Tuomas Sandholm) Early version of this work appeared in UAI-05.
Presented by: Katherine Goulde
Voting and social choice Vincent Conitzer
CS 886: Electronic Market Design Social Choice (Preference Aggregation) September 20.
Complexity of manipulating elections with few candidates Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University Computer Science Department.
Manipulation Toby Walsh NICTA and UNSW. Manipulation Constructive  Can we change result so a given candidate wins Destructive  Can we change result.
The Complexity of Elections: A New Domain for Heuristic Computation Piotr Faliszewski AGH University of Science and Technology, Kraków, Poland
+ Random Tie Breaking Toby Walsh NICTA and UNSW. + Random Tie Breaking Haris Aziz, Serge Gaspers, Nick Mattei, Nina Narodytska, Toby Walsh NICTA and UNSW.
Using computational hardness as a barrier against manipulation Vincent Conitzer
Edith Elkind Nanyang Technological University, Singapore Piotr Faliszewski AGH Univeristy of Science and Technology, Poland Arkadii Slinko University of.
The Distortion of Cardinal Preferences in Voting Ariel D. Procaccia and Jeffrey S. Rosenschein.
Complexity 16-1 Complexity Andrei Bulatov Non-Approximability.
Manipulation and Control in Weighted Voting Games Based on: Bachrach, Elkind, AAMAS’08 Zuckerman, Faliszewski, Bachrach, Elkind, AAAI’08.
Speaker: Ariel Procaccia Joint work with: Michael Zuckerman, Jeff Rosenschein Hebrew University of Jerusalem.
Ties Matter: Complexity of Voting Manipulation Revisited based on joint work with Svetlana Obraztsova (NTU/PDMI) and Noam Hazon (CMU) Edith Elkind (Nanyang.
The Complexity of Llull’s Thirteenth-Century Election System
Preference elicitation Vincent Conitzer
CPS Voting and social choice
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
Campaign Management via Bribery Piotr Faliszewski AGH University of Science and Technology, Poland Joint work with Edith Elkind and Arkadii Slinko.
Junta Distributions and the Average Case Complexity of Manipulating Elections A. D. Procaccia & J. S. Rosenschein.
Common Voting Rules as Maximum Likelihood Estimators Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University, Computer Science Department.
Complexity of unweighted coalitional manipulation under some common voting rules Lirong XiaVincent Conitzer COMSOC08, Sep. 3-5, 2008 TexPoint fonts used.
Automated Design of Voting Rules by Learning From Examples Ariel D. Procaccia, Aviv Zohar, Jeffrey S. Rosenschein.
1 Combinatorial Dominance Analysis Keywords: Combinatorial Optimization (CO) Approximation Algorithms (AA) Approximation Ratio (a.r) Combinatorial Dominance.
Social choice theory = preference aggregation = truthful voting Tuomas Sandholm Professor Computer Science Department Carnegie Mellon University.
Strategic Behavior in Multi-Winner Elections A follow-up on previous work by Ariel Procaccia, Aviv Zohar and Jeffrey S. Rosenschein Reshef Meir The School.
Computational aspects of stability in weighted voting games Edith Elkind (NTU, Singapore) Based on joint work with Leslie Ann Goldberg, Paul W. Goldberg,
Introduction complexity has been suggested as a means of precluding strategic behavior. Previous studies have shown that some voting protocols are hard.
Social choice (voting) Vincent Conitzer > > > >
Online Manipulation and Control in Sequential Voting Lane A. Hemaspaandra Jörg Rothe Edith Hemaspaandra.
1 Approximation Through Scaling Algorithms and Networks 2014/2015 Hans L. Bodlaender Johan M. M. van Rooij.
CPS Voting and social choice Vincent Conitzer
An Algorithm for the Coalitional Manipulation Problem under Maximin Michael Zuckerman, Omer Lev and Jeffrey S. Rosenschein AAMAS’11.
An Algorithm for the Coalitional Manipulation Problem under Maximin Michael Zuckerman, Omer Lev and Jeffrey S. Rosenschein (Simulations by Amitai Levy)
Projektseminar Computational Social Choice -Eine Einführung- Jörg Rothe & Lena Schend SS 2012, HHU Düsseldorf 4. April 2012.
The Shield that Never Was: Societies with Single-Peaked Preferences are More Open to Manipulation and Control Piotr Faliszewski AGH University of Science.
Week 10Complexity of Algorithms1 Hard Computational Problems Some computational problems are hard Despite a numerous attempts we do not know any efficient.
1 Elections and Manipulations: Ehud Friedgut, Gil Kalai, and Noam Nisan Hebrew University of Jerusalem and EF: U. of Toronto, GK: Yale University, NN:
Optimal Manipulation of Voting Rules Edith Elkind Nanyang Technological University, Singapore (based on joint work with Svetlana Obraztsova)
Junta Distributions and the Average-Case Complexity of Manipulating Elections A presentation by Jeremy Clark Ariel D. Procaccia Jeffrey S. Rosenschein.
Manipulating the Quota in Weighted Voting Games (M. Zuckerman, P. Faliszewski, Y. Bachrach, and E. Elkind) ‏ Presented by: Sen Li Software Technologies.
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
11/24/2008CS Common Voting Rules as Maximum Likelihood Estimators - Matthew Kay 1 Common Voting Rules as Maximum Likelihood Estimators Vincent Conitzer,
When Are Elections with Few Candidates Hard to Manipulate V. Conitzer, T. Sandholm, and J. Lang Subhash Arja CS 286r October 29, 2008.
Approximation algorithms
Chapter 10: The Manipulability of Voting Systems Lesson Plan
Approximation algorithms
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
Algorithmic Analysis of Elections: Complexity of Multiwinner Rules (minicourse) Piotr Faliszewski AGH University Kraków, Poland.
Algorithmic Analysis of Elections: Voting Rules and Manipulability (minicourse) Piotr Faliszewski AGH University Kraków, Poland.
Introduction If we assume
1.3 The Borda Count Method.
Computability and Complexity
The Subset Sum Game Revisited
Bin Fu Department of Computer Science
Manipulation Lirong Xia Fall, Manipulation Lirong Xia Fall, 2016.
COMSOC ’06 6 December 2006 Rob LeGrand
Voting systems Chi-Kwong Li.
Voting and social choice
Polynomial time approximation scheme
CPS 173 Voting and social choice
Computational social choice
Computational Social Choice (Part II: Bribery and Friends)
CPS Voting and social choice
The Complexity of Bribery in Elections
Presentation transcript:

Approximability of Manipulating Elections Eric Brelsford Piotr Faliszewski Edith Hemaspaandra Henning Schnoor Ilka Schnoor RIT Univ. of Rochester

Agenda Introduction What to approximate? Results Model of elections Manipulation, Control, and Bribery Complexity barrier approach Need for approximations What to approximate? Goal function Approximation algorithms FPTASes Results Approximability Inapproximability COMSOC-08 Liverpool

Model of Elections Election E = (C,V) Scoring protocols Example C – candidate set V – voter set Scoring protocols α = (α1, … ,αm}  Nm Each candidate receives αi points from each voters that ranks him or her at the ith position Example plularlity (1,0, …, 0) Borda count (m-1, m-2, …, 0) Veto (1, …, 1, 0) k-approval (1k, 0m-k) Example C = { , , , } V = { > > > , > > > , > > > } Election rules Plurality Borda count Veto k-approval approval Copeland Min-max Dodgson Young … families of scoring protocols COMSOC-08 Liverpool

Manipulation, Bribery and Control How do we vote to make p a winner? Manipulation: Given an election E = (C,V) and a group of undecided voters W, pick how the voters in W should vote so that their preferred candidate p wins in E’ = (C, V+W). Bribery: Given an election E = (C,V) and a price for each voter, choose a group of voters such that: (a) the joint price of these voters is minimal, and (b) by changing these voters’ votes it is possible to make the preferred candidate p a winner. Control: Given an election E = (C,V), is it possible to make the candidate p a winner via changing the structure of the election, e.g., via adding/deleting candidates/voters. COMSOC-08 Liverpool

Complexity Barrier Approach Hmm… maybe finding a good bribery is NP-complete, but only unnatural instances are hard? Elections are endangered by “dishonest” behavior of participating agents Complexity barrier approach If difficult to find a manipulative action … … then perhaps agents won’t be able to … or maybe I can somehow approximately find a good cheat… Issues with the complexity barrier approach NP-completeness is a worst-case notion Frequency of hardness attacks COMSOC-08 Liverpool

Refining the Complexity Barrier Approach Idea If we know that a given election problem is NP-complete … … then we should ask: Is finding an approximate solution hard? Main problem: What to approximate? So far all work on approximating manipulation, bribery, and control (see, e.g., [ZPR08, Fal08, Bre07]) used specifically crafted goal functions. Our approach: Uniform framework! COMSOC-08 Liverpool

What to approximate? Performance E’ = (C,V+W), with protocol α PerfE’( )  4 E’ = (C,V+W), with protocol α α = ( 5 , 3 , 2 , 0 ) V = { > > > , > > > , > > > } E = (C,V), with protocol α α = ( 5 , 3 , 2 , 0 ) V = { > > > , > > > , > > > } = 16 12 PerfE( )  -2 = 8 4 Consider two manipulative votes W = { > > > , > > > } β(E,s) = PerfE’( ) - PerfE( ) = 6 PerfE( ) = -2 COMSOC-08 Liverpool

β(E, s) = PerfE(s)(p) – PerfE(p) More formally… Assumption: We are working with an election system that assigns points to candidates. Candidates with most points win. ScoreE(c) – number of points of candidate c Performance of a candidate: We measure the performance of a candidate as the number of poitns he or she misses to become a winner PerfE(p) = scoreE(p) – max{scoreE(c) | c  C} Performance of a solution: We measure the performance of a solution as the increase in the performance of the preferred candidate s – solution E(s) – election E after effectuating solution s β(E, s) = PerfE(s)(p) – PerfE(p) Goal: Maximize β(E, s) Solution: Solution is a description of what action we should effectuate in a given scenario (e.g., how the manipulators should vote, who to bribe) COMSOC-08 Liverpool

Is β Really Useful? PerfE(p) = scoreE(p) – max{scoreE(c) | c  C} Candidate’s performance: PerfE(p) = scoreE(p) – max{scoreE(c) | c  C} Performance of a solution: β(E, s) = PerfE(s)(p) – PerfE(p) Goal: Maximize β(E, s) Observation 1. Candidate p is a winner of an election E if and only if PerfE(p) ≥ 0. Observation 2. Consider election E, a solution s, and election E(s). By definition, we have: PerfE(s)(p) = β(E, s) + PerfE(p) COMSOC-08 Liverpool

Approximation Algorithms For a given election problem (e.g., manipultion) we are interested in the following problem: Input: E = (C,V) election, p – preferred candidate Output: a legal action s that maximizes β(E, s) An ε-approximation algorithm for this problem is an algorithm that outputs a legal solution s’, such that: β(E, s’) ≥ (1-ε)∙max{β(E,s) | s is a legal solution} OPT Acceptable solutions fit in here (1-ε)OPT An FPTAS (fully polynomial-time approximation scheme) is an algorithm that, given a problem instance I and an approximation parameter ε, finds an ε-approximate solution in time polynomial in |I| and 1/ε COMSOC-08 Liverpool

Results: Overview Results Manipulation Bribery NP-completeness of bribery for Borda count FPTASes for scoring protocols α, s.t., α1 > α2 Nonexistence of FPTASes Inapproximability of priced bribery for Borda count k-approval + generalizations k-veto COMSOC-08 Liverpool

Results: Manipulation Theorem [HH07]. Let α = (α1, …, αm) be a scoring protocol. If α2 > αm then α-weighted manipulation is NP-complete. Otherwise it is in P. Theorem. Let α = (α1, …, αm) be a scoring protocol such that α1 > α2. There is an FPTAS for computing max-β for the case of α-weighted-manipulation. Can we extend this theorem to work for an unbounded number of candidates? Theorem. Unless P = NP, there is no FPTAS for max-β for weighted manipulation in k-veto, k-approval, and generalizations of k-approval Does the result hold for any fixed scoring protocol? Can we get a nice dichotomy result? COMSOC-08 Liverpool

Results: Manipulation Theorem [HH07]. Let α = (α1, …, αm) be a scoring protocol. If α2 > αm then α-weighted manipulation is NP-complete. Otherwise it is in P. Theorem. Let α = (α1, …, αm) be a scoring protocol such that α1 > α2. There is an FPTAS for computing max-β for the case of α-weighted-manipulation. Theorem. Let α = (α1, …, αm) be a scoring protocol such that α1 > α2. There is an algorithm that given ε and an instance of α-weighted-manipulation problem I where the preferred candidate p can be made a winner, finds a manipulation that makes p a winner in I, assuming we have one more manipulator whose weight is εW, where W is the largest weight of a manipulator in I. COMSOC-08 Liverpool

Results: Bribery in Borda Count Theorem. Bribery is NP-complete for Borda count. Theorem. There is no algorithm that computes an ε-approximate solution for priced version of bribery in Borda count for any constant ε. Comment. Finding an approximate solution for priced bribery in Borda count is hard even if we want polynomial approximation ratio! In essence, the hardness lies in choosing the voters to bribe (almost like control via deleting voters) Solutions for a bribery problem find a set of voters to briber indicate how these voters should now vote COMSOC-08 Liverpool

Results: Interpretation Approximation algorithms Show that even if the problem at hand is NP-hard… … in practice it can be easy to find useful solutions Inapproximability results Still worst-case notion! However, reinforce hardness results Thank You! COMSOC-08 Liverpool