Sybil-proof Answer Querying Mechanism

We study a question answering problem on a social network, where a requester is seeking an answer from the agents on the network. The goal is to design reward mechanisms to incentivize the agents to propagate the requester's query to their neighbours if they don't have the answer. Existing mechanisms are vulnerable to Sybil-attacks, i.e., an agent may get more reward by creating fake identities. Hence, we combat this problem by first proving some impossibility results to resolve Sybil-attacks and then characterizing a class of mechanisms which satisfy Sybil-proofness (prevents Sybil-attacks) as well as other desirable properties. Except for Sybil-proofness, we also consider cost minimization for the requester and agents' collusions.

[1]  Yang Feng,et al.  Multi-Winner Contests for Strategic Diffusion in Social Networks , 2018, AAAI.

[2]  Panagiotis Georgiadis,et al.  Recommendation information diffusion in social networks considering user influence and semantics , 2016, Social Network Analysis and Mining.

[3]  Yung-Ming Li,et al.  A diffusion mechanism for social advertising over microblogs , 2012, Decis. Support Syst..

[4]  Manuel Cebrián,et al.  Finding red balloons with split contracts: robustness to individuals' selfishness , 2012, STOC '12.

[5]  Jon M. Kleinberg,et al.  Query incentive networks , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).

[6]  Sergei Vassilvitskii,et al.  On threshold behavior in query incentive networks , 2007, EC '07.

[7]  Y. Narahari,et al.  Threshold behavior of incentives in social networks , 2010, CIKM.

[8]  Lisa Fleischer,et al.  Simple sybil-proof mechanisms for multi-level marketing , 2012, 2012 Proceedings IEEE INFOCOM Workshops.

[9]  Vincent Conitzer,et al.  Using Mechanism Design to Prevent False-Name Manipulations , 2010, AI Mag..

[10]  L. Christophorou Science , 2018, Emerging Dynamics: Science, Energy, Society and Values.

[11]  Bin Li,et al.  Selling Multiple Items via Social Networks , 2018, AAMAS.

[12]  Gareth J. F. Jones,et al.  Proceedings of the 19th ACM international conference on Information and knowledge management , 2010, CIKM 2010.

[13]  Zekeriya Erkin,et al.  Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms , 2017, 2018 Crypto Valley Conference on Blockchain Technology (CVCBT).

[14]  Kevin Leyton-Brown,et al.  Proceedings of the 13th ACM Conference on Electronic Commerce, EC 2012, Valencia, Spain, June 4-8, 2012 , 2012, EC.

[15]  Wei Chen,et al.  Sybil-proof mechanisms in query incentive networks , 2013, EC '13.

[16]  International Foundation for Autonomous Agents and MultiAgent Systems ( IFAAMAS ) , 2007 .

[17]  Tim Roughgarden,et al.  Proceedings of the 12th ACM conference on Electronic commerce , 2011, EC 2011.

[18]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[19]  Y. Narahari,et al.  Mechanism Design for Time Critical and Cost Critical Task Execution via Crowdsourcing , 2012, WINE.

[20]  Zizhuo Wang,et al.  A unified framework for dynamic pari-mutuel information market design , 2009, EC '09.

[21]  J. Wyatt Decision support systems. , 2000, Journal of the Royal Society of Medicine.

[22]  J. Kleinberg Algorithmic Game Theory: Cascading Behavior in Networks: Algorithmic and Economic Issues , 2007 .

[23]  Alex Pentland,et al.  Time-Critical Social Mobilization , 2010, Science.

[24]  Bin Li,et al.  Mechanism Design in Social Networks , 2016, AAAI.

[25]  Shimeng Yu,et al.  JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY , 2016, Journal of Computer Science and Technology.

[26]  Paul Resnick,et al.  Proceedings of the 8th ACM conference on Electronic commerce , 2007, EC 2010.

[27]  Vincent Conitzer,et al.  False-Name-Proofness in Social Networks , 2010, WINE.

[28]  Sven Seuken,et al.  Sybil-proof accounting mechanisms with transitive trust , 2014, AAMAS.

[29]  Moshe Tennenholtz,et al.  Mechanisms for multi-level marketing , 2011, EC '11.