Multimode control attacks on elections

95Citations
Citations of this article
32Readers
Mendeley users who have this article in their library.

Abstract

In 1992, Bartholdi, Tovey, and Trick opened the study of control attacks on elections| attempts to improve the election outcome by such actions as adding/deleting candidates or voters. That work has led to many results on how algorithms can be used to find attacks on elections and how complexity-theoretic hardness results can be used as shields against attacks. However, all the work in this line has assumed that the attacker employs just a single type of attack. In this paper, we model and study the case in which the attacker launches a multipronged (i.e., multimode) attack. We do so to more realistically capture the richness of real-life settings. For example, an attacker might simultaneously try to suppress some voters, attract new voters into the election, and introduce a spoiler candidate. Our model provides a unified framework for such varied attacks. By constructing polynomialtime multiprong attack algorithms we prove that for various election systems even suchconcerted, exible attacks can be perfectly planned in deterministic polynomial time. © 2011 AI Access Foundation. All rights reserved.

Cite

CITATION STYLE

APA

Faliszewski, P., Hemaspaandra, E., & Hemaspaandra, L. A. (2011). Multimode control attacks on elections. Journal of Artificial Intelligence Research, 40, 305–351. https://doi.org/10.1613/jair.3136

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free