Multimode Control Attacks on Elections

Abstract

In 1992, Bartholdi, Tovey, and Trick [1992] opened the study of control attacks on elections--attempts to improve the election outcome by such actions as adding/deleting candidates or voters. That work has led to many results on how algorithms can be used to find attacks on elections and how complexity-theoretic hardness results can be used as shields against attacks. However, all the work in this line has assumed that the attacker employs just a single type of attack. In this paper, we model and study the case in which the attacker launches a multipronged (i.e., multimode) attack. We do so to more realistically capture the richness of reallife settings. For example, an attacker might simultaneously try to suppress some voters, attract new voters into the election, and introduce a spoiler candidate. Our model provides a unified framework for such varied attacks, and by constructing polynomial-time multiprong attack algorithms we prove that for various election systems even such concerted, flexible attacks can be perfectly planned in deterministic polynomial time.

Cite

Text

Faliszewski et al. "Multimode Control Attacks on Elections." International Joint Conference on Artificial Intelligence, 2009. doi:10.1613/JAIR.3136

Markdown

[Faliszewski et al. "Multimode Control Attacks on Elections." International Joint Conference on Artificial Intelligence, 2009.](https://mlanthology.org/ijcai/2009/faliszewski2009ijcai-multimode/) doi:10.1613/JAIR.3136

BibTeX

@inproceedings{faliszewski2009ijcai-multimode,
  title     = {{Multimode Control Attacks on Elections}},
  author    = {Faliszewski, Piotr and Hemaspaandra, Edith and Hemaspaandra, Lane A.},
  booktitle = {International Joint Conference on Artificial Intelligence},
  year      = {2009},
  pages     = {128-133},
  doi       = {10.1613/JAIR.3136},
  url       = {https://mlanthology.org/ijcai/2009/faliszewski2009ijcai-multimode/}
}