Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
When are elections with few candidates hard to manipulate?
Journal of the ACM (JACM)
Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 2
Algorithms for the coalitional manipulation problem
Artificial Intelligence
Complexity of unweighted coalitional manipulation under some common voting rules
IJCAI'09 Proceedings of the 21st international jont conference on Artifical intelligence
Coalitional voting manipulation: a game-theoretic perspective
IJCAI'11 Proceedings of the Twenty-Second international joint conference on Artificial Intelligence - Volume Volume One
The complexity of safe manipulation under scoring rules
IJCAI'11 Proceedings of the Twenty-Second international joint conference on Artificial Intelligence - Volume Volume One
How to change a group's collective decision?
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
Hi-index | 0.00 |
We investigate the computational aspects of safe manipulation, a new model of coalitional manipulation that was recently put forward by Slinko and White [10]. In this model, a potential manipulator v announces how he intends to vote, and some of the other voters whose preferences coincide with those of v may follow suit. Depending on the number of followers, the outcome could be better or worse for v than the outcome of truthful voting. A manipulative vote is called safe if for some number of followers it improves the outcome from v's perspective, and can never lead to a worse outcome. In this paper, we study the complexity of finding a safe manipulative vote for a number of common voting rules, including Plurality, Borda, k-approval, and Bucklin, providing algorithms and hardness results for both weighted and unweighted voters. We also propose two ways to extend the notion of safe manipulation to the setting where the followers' preferences may differ from those of the leader, and study the computational properties of the resulting extensions.