Manipulation Lirong Xia Fall, Manipulation Lirong Xia Fall, 2016.

Slides:



Advertisements
Similar presentations
Sep 16, 2013 Lirong Xia Computational social choice The easy-to-compute axiom.
Advertisements

Computational Game Theory Amos Fiat Spring 2012
Chapter 10: The Manipulability of Voting Systems Lesson Plan
Sep 15, 2014 Lirong Xia Computational social choice The easy-to-compute axiom.
On the Robustness of Preference Aggregation in Noisy Environments Ariel D. Procaccia, Jeffrey S. Rosenschein and Gal A. Kaminka.
Computational Social Choice WINE-13 Tutorial Dec 11, 2013 Lirong Xia.
The Computational Difficulty of Manipulating an Election Tetiana Zinchenko 05/12/
Voting and social choice Vincent Conitzer
Algorithmic Game Theory Uri Feige Robi Krauthgamer Moni Naor Lecture 9: Social Choice Lecturer: Moni Naor.
Voting and social choice Looking at a problem from the designers point of view.
Sep 22, 2014 Lirong Xia Computational social choice The hard-to-manipulate axiom.
IMPOSSIBILITY AND MANIPULABILITY Section 9.3 and Chapter 10.
Complexity of manipulating elections with few candidates Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University Computer Science Department.
Making Group Decisions Mechanism design: study solution concepts
Arrow’s impossibility theorem EC-CS reading group Kenneth Arrow Journal of Political Economy, 1950.
Lirong Xia Friday, May 2, 2014 Introduction to Social Choice.
Manipulation Toby Walsh NICTA and UNSW. Manipulation Constructive  Can we change result so a given candidate wins Destructive  Can we change result.
The Complexity of Elections: A New Domain for Heuristic Computation Piotr Faliszewski AGH University of Science and Technology, Kraków, Poland
Strategic voting Lirong XiaJérôme Lang with thanks to:
+ Random Tie Breaking Toby Walsh NICTA and UNSW. + Random Tie Breaking Haris Aziz, Serge Gaspers, Nick Mattei, Nina Narodytska, Toby Walsh NICTA and UNSW.
Generalized Scoring Rules Paper by Lirong Xia and Vincent Conitzer Presentation by Yosef Treitman.
Strategic Sequential Voting in Multi-Issue Domains and Multiple-Election Paradoxes Lirong Xia Joint work with Vincent ConitzerJerome Lang Sep 9, 2011.
Complexity of Computing the Margin of Victory for Various Voting Rules CAEC, Nov. 18, 2011 Ronald L. RivestEmily ShenLirong Xia.
Sep. 5, 2013 Lirong Xia Introduction to Game Theory.
Using computational hardness as a barrier against manipulation Vincent Conitzer
Using computational hardness as a barrier against manipulation Vincent Conitzer
Where are the hard manipulation problems? Toby Walsh NICTA and UNSW Sydney Australia LogICCC Day, COMSOC 2010.
Speaker: Ariel Procaccia Joint work with: Michael Zuckerman, Jeff Rosenschein Hebrew University of Jerusalem.
Ties Matter: Complexity of Voting Manipulation Revisited based on joint work with Svetlana Obraztsova (NTU/PDMI) and Noam Hazon (CMU) Edith Elkind (Nanyang.
Preference elicitation Vincent Conitzer
Alex Tabarrok Arrow’s Theorem.
CPS Voting and social choice
Common Voting Rules as Maximum Likelihood Estimators Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University, Computer Science Department.
Complexity of unweighted coalitional manipulation under some common voting rules Lirong XiaVincent Conitzer COMSOC08, Sep. 3-5, 2008 TexPoint fonts used.
Introduction complexity has been suggested as a means of precluding strategic behavior. Previous studies have shown that some voting protocols are hard.
Social choice (voting) Vincent Conitzer > > > >
Historically Interesting Voting Rules: Electing the Doge Lirong Xia Toby Walsh Auckland, Feb 20 th 2012.
CPS Social Choice & Mechanism Design Vincent Conitzer
Ordinal Preference Representation and Aggregation Game-Theoretic and Combinatorial Aspects of Computational Social Choice EPFL June 15, 2012 Lirong Xia.
CPS Voting and social choice Vincent Conitzer
An Algorithm for the Coalitional Manipulation Problem under Maximin Michael Zuckerman, Omer Lev and Jeffrey S. Rosenschein AAMAS’11.
An Algorithm for the Coalitional Manipulation Problem under Maximin Michael Zuckerman, Omer Lev and Jeffrey S. Rosenschein (Simulations by Amitai Levy)
Chapter 10: The Manipulability of Voting Systems Lesson Plan An Introduction to Manipulability Majority Rule and Condorcet’s Method The Manipulability.
Math for Liberal Studies.  We have seen many methods, all of them flawed in some way  Which method should we use?  Maybe we shouldn’t use any of them,
By: Eric Zhang.  Indivisible items from multiple categories are allocated to agents without monetary transfer  Example – How paper presentations are.
How Should Presidents Be Elected? E. Maskin Institute for Advanced Study.
When Are Elections with Few Candidates Hard to Manipulate V. Conitzer, T. Sandholm, and J. Lang Subhash Arja CS 286r October 29, 2008.
0 Fall, 2016 Lirong Xia Computational social choice The easy-to-compute axiom.
Mechanism design for computationally limited agents (last lecture discussed the case where valuation determination was complex) Tuomas Sandholm Computer.
Choosing the Lesser Evil: Helping Students Understand Voting Systems
Introduction to Social Choice
Chapter 10: The Manipulability of Voting Systems Lesson Plan
Introduction to Social Choice
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
Applied Mechanism Design For Social Good
A Brief Introductory Tutorial on Computational Social Choice
Algorithmic Analysis of Elections: Voting Rules and Manipulability (minicourse) Piotr Faliszewski AGH University Kraków, Poland.
Introduction If we assume
A Crash Course on Computational Social Choice and Fair Division
Elections with More Than Two Candidates
Alex Tabarrok Arrow’s Theorem.
Computational Social Choice and Moral Artificial Intelligence
Voting and social choice
A few more practice questions for the midterm
Introduction to Social Choice
CPS 173 Voting and social choice
Approximability of Manipulating Elections
Computational social choice
Computational Social Choice (Part II: Bribery and Friends)
CPS Voting and social choice
Presentation transcript:

Manipulation Lirong Xia Fall, 2016

Manipulation under plurality rule (lexicographic tie-breaking) > > > > Alice Plurality rule > > Bob > > Carol

Strategic behavior (of the agents) Manipulation: an agent (manipulator) casts a vote that does not represent her true preferences, to make herself better off A voting rule is strategy-proof if there is never a (beneficial) manipulation under this rule

Using Borda? Inverse the tie-breaking order? Alice > > Bob > > Alice > > Bob Inverse the tie-breaking order?

Using STV? > > > > > > N>M>O  O>M>N ×4 > > > > ×2 > > ×2 N>M>O  O>M>N

Any strategy-proof voting rule? No reasonable voting rule is strategyproof Gibbard-Satterthwaite Theorem [Gibbard Econometrica-73, Satterthwaite JET-75]: When there are at least three alternatives, no voting rules except dictatorships satisfy non-imposition: every alternative wins for some profile unrestricted domain: voters can use any linear order as their votes strategy-proofness Axiomatic characterization for dictatorships! Randomized version [Gibbard Econometrica-77]

A few ways out Relax non-dictatorship: use a dictatorship Restrict the number of alternatives to 2 Relax unrestricted domain: mainly pursued by economists Single-peaked preferences: Range voting: A voter submit any natural number between 0 and 10 for each alternative Approval voting: A voter submit 0 or 1 for each alternative

Single-peaked preferences There exists a social axis S linear order over the alternatives Each voter’s preferences V are compatible with the social axis S there exists a “peak” a such that [b≺c≺a in S] implies [c≻b in V] [a≻c≻b in S] implies [c≻b in V] alternatives closer to the peak are more preferred different voters may have different peaks

Examples rank Axis

Strategy-proof rules for single-peaked preferences The median rule given a profile of “peaks” choose the median in the social axis Theorem. The Median rule is strategy-proof. The median rule with phantom voters parameterized by a fixed set of “peaks” of phantom voters chooses the median of the peaks of the regular voters and the phantom voters Theorem. Any strategy-proof rule for single-peaked preferences are median rules with phantom voters Talk announcement: Dominik Peters 9/21 3-4pm Sage 3713

Computational thinking Use a voting rule that is too complicated so that nobody can easily predict the winner Dodgson Kemeny The randomized voting rule used in Venice Republic for more than 500 years [Walsh&Xia AAMAS-12] We want a voting rule where Winner determination is easy Manipulation is hard The hard-to-manipulate axiom: manipulation under the given voting rule is NP-hard

Example 3: Venetian election (1268--1797) ∼1000 lottery Round 1: Round 2: Round 3: Round 10: lottery Approval like voting … Plurality The winner must receive >24 votes

Manipulation: A computational complexity perspective If it is computationally too hard for a manipulator to compute a manipulation, she is best off voting truthfully Similar as in cryptography For which common voting rules manipulation is computationally hard? NP- Hard

Unweighted coalitional manipulation (UCM) problem Given The voting rule r The non-manipulators’ profile PNM The number of manipulators n’ The alternative c preferred by the manipulators We are asked whether or not there exists a profile PM (of the manipulators) such that c is the winner of PNM∪PM under r

The stunningly big table for UCM #manipulators One manipulator At least two Copeland P [BTT SCW-89b] NPC [FHS AAMAS-08,10] STV [BO SCW-91] Veto [ZPR AIJ-09] Plurality with runoff Cup [CSL JACM-07] Borda [DKN+ AAAI-11] [BNW IJCAI-11] Maximin [XZP+ IJCAI-09] Ranked pairs Bucklin Nanson’s rule [NWX AAA-11] Baldwin’s rule

What can we conclude? For some common voting rules, computational complexity provides some protection against manipulation Is computational complexity a strong barrier? NP-hardness is a worst-case concept