A study of sybil manipulations in hedonic games
暂无分享,去创建一个
[1] Piotr Faliszewski,et al. Cloning in Elections , 2010, AAAI.
[2] Edith Elkind,et al. False-Name Manipulations in Weighted Voting Games , 2014, J. Artif. Intell. Res..
[3] Cristina Nita-Rotaru,et al. A survey of attack and defense techniques for reputation systems , 2009, CSUR.
[4] Sarvapali D. Ramchurn,et al. Trust in Multiagent Systems , 2004 .
[5] Vincent Conitzer,et al. Using Mechanism Design to Prevent False-Name Manipulations , 2010, AI Mag..
[6] Samir Aknine,et al. Coalition Formation Strategies for Self-Interested Agents in Hedonic Games , 2010, ECAI.
[7] Michael Wooldridge,et al. Hedonic coalition nets , 2009, AAMAS.
[8] Piotr Faliszewski,et al. Cloning in Elections: Finding the Possible Winners , 2011, J. Artif. Intell. Res..
[9] Sarvapali D. Ramchurn,et al. Trust in multi-agent systems , 2004, The Knowledge Engineering Review.
[10] Makoto Yokoo,et al. The effect of false-name bids in combinatorial auctions: new fraud in internet auctions , 2004, Games Econ. Behav..
[11] M. Trick,et al. The computational difficulty of manipulating an election , 1989 .
[12] Vincent Conitzer,et al. False-name-proof matching , 2013, AAMAS.
[13] Thomas F. La Porta,et al. Limiting Sybil Attacks in Structured P2P Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[14] Toby Walsh,et al. Where are the hard manipulation problems? , 2010, J. Artif. Intell. Res..
[15] Vincent Conitzer,et al. False-Name-Proofness in Social Networks , 2010, WINE.
[16] Matthew O. Jackson,et al. The Stability of Hedonic Coalition Structures , 2002, Games Econ. Behav..
[17] Carmelo Rodríguez-Álvarez,et al. Strategy-proof coalition formation , 2009, Int. J. Game Theory.
[18] Coralio Ballester,et al. NP-completeness in hedonic games , 2004, Games Econ. Behav..
[19] Shao Chin Sung,et al. Enemies and Friends in Hedonic Games: Individual Deviations, Stability and Manipulation , 2004 .
[20] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[21] Grégory Bonnet. A Protocol Based on a Game-Theoretic Dilemma to Prevent Malicious Coalitions in Reputation Systems , 2012, ECAI.
[22] K. Arrow,et al. Social Choice and Individual Values , 1951 .