Mitigating Manipulation in Peer Review via Randomized Reviewer Assignments

We consider three important challenges in conference peer review: (i) reviewers maliciously attempting to get assigned to certain papers to provide positive reviews, possibly as part of quid-pro-quo arrangements with the authors; (ii) "torpedo reviewing," where reviewers deliberately attempt to get assigned to certain papers that they dislike in order to reject them; (iii) reviewer de-anonymization on release of the similarities and the reviewer-assignment code. On the conceptual front, we identify connections between these three problems and present a framework that brings all these challenges under a common umbrella. We then present a (randomized) algorithm for reviewer assignment that can optimally solve the reviewer-assignment problem under any given constraints on the probability of assignment for any reviewer-paper pair. We further consider the problem of restricting the joint probability that certain suspect pairs of reviewers are assigned to certain papers, and show that this problem is NP-hard for arbitrary constraints on these joint probabilities but efficiently solvable for a practical special case. Finally, we experimentally evaluate our algorithms on datasets from past conferences, where we observe that they can limit the chance that any malicious reviewer gets assigned to their desired paper to 50% while producing assignments with over 90% of the total optimal similarity. Our algorithms still achieve this similarity while also preventing reviewers with close associations from being assigned to the same paper.

[1]  Philip S. Yu,et al.  Review Graph Based Online Store Review Spammer Detection , 2011, 2011 IEEE 11th International Conference on Data Mining.

[2]  Nihar B. Shah,et al.  Loss Functions, Axioms, and Peer Review , 2018 .

[3]  Isabelle Guyon,et al.  Design and Analysis of the NIPS 2016 Review Process , 2017, J. Mach. Learn. Res..

[4]  Peter A. Flach,et al.  Novel tools to streamline the conference review process: experiences from SIGKDD'09 , 2010, SKDD.

[5]  E. A. Dinic Algorithm for solution of a problem of maximal flow in a network with power estimation , 1970 .

[6]  Cheng Long,et al.  On Good and Fair Paper-Reviewer Assignment , 2013, 2013 IEEE 13th International Conference on Data Mining.

[7]  Hervé Moulin,et al.  A New Solution to the Random Assignment Problem , 2001, J. Econ. Theory.

[8]  Richard S. Zemel,et al.  The Toronto Paper Matching System: An automated paper-reviewer assignment system , 2013 .

[9]  Toby Walsh,et al.  The Conference Paper Assignment Problem: Using Order Weighted Averages to Assign Indivisible Goods , 2017, AAAI.

[10]  Nihar B. Shah,et al.  Your 2 is My 1, Your 3 is My 9: Handling Arbitrary Miscalibrations in Ratings , 2018, AAMAS.

[11]  Eric Budish,et al.  IMPLEMENTING RANDOM ASSIGNMENTS : A GENERALIZATION OF THE BIRKHOFF-VON NEUMANN THEOREM , 2009 .

[12]  Vincent Conitzer,et al.  Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.

[13]  Adam Marcus,et al.  Publishing: The peer-review scam , 2014, Nature.

[14]  Zongben Xu,et al.  Re-scale AdaBoost for attack detection in collaborative filtering recommender systems , 2015, Knowl. Based Syst..

[15]  Nihar B. Shah,et al.  On Strategyproof Conference Peer Review , 2018, IJCAI.

[16]  Nihar B. Shah,et al.  PeerReview4All: Fair and Accurate Reviewer Assignment in Peer Review , 2018, ALT.

[17]  Nihar B. Shah,et al.  Uncovering Latent Biases in Text: Method and Application to Peer Review , 2020, AAAI.

[18]  R. Zeckhauser,et al.  The Efficient Allocation of Individuals to Positions , 1979, Journal of Political Economy.

[19]  Kurt Mehlhorn,et al.  Assigning Papers to Referees , 2009, Algorithmica.

[20]  Omer Lev,et al.  Impartial Peer Review , 2015, IJCAI.

[21]  Louise Hall,et al.  Peer review in a changing world: An international study measuring the attitudes of researchers , 2013, J. Assoc. Inf. Sci. Technol..

[22]  Vitaly Shmatikov,et al.  How To Break Anonymity of the Netflix Prize Dataset , 2006, ArXiv.

[23]  E. Barroga,et al.  Safeguarding the Integrity of Science Communication by Restraining 'Rational Cheating' in Peer Review , 2014, Journal of Korean medical science.

[24]  Min Zhang,et al.  Reviewer bias in single- versus double-blind peer review , 2017, Proceedings of the National Academy of Sciences.

[25]  Bhavana Dalvi,et al.  A Dataset of Peer Reviews (PeerRead): Collection, Insights and NLP Applications , 2018, NAACL.

[26]  Craig Boutilier,et al.  A Framework for Optimizing Paper Matching , 2011, UAI.

[27]  Jie Tang,et al.  Expertise Matching via Constraint-Based Optimization , 2010, Web Intelligence.

[28]  Jef Akst,et al.  I Hate Your Paper: Many say the peer review system is broken. Here's how some journals are trying to fix it. , 2010 .

[29]  Nihar B. Shah,et al.  Catch Me if I Can: Detecting Strategic Behaviour in Peer Assessment , 2020, AAAI.

[30]  Nihar B. Shah,et al.  On the Privacy-Utility Tradeoff in Peer-Review Data Analysis , 2020, ArXiv.

[31]  Ariel D. Procaccia,et al.  Ranking Wily People Who Rank Each Other , 2018, AAAI.

[32]  Christos Faloutsos,et al.  Opinion Fraud Detection in Online Reviews by Network Effects , 2013, ICWSM.

[33]  Mario Paolucci,et al.  Mechanism change in a simulation of peer review: from junk support to elitism , 2014, Scientometrics.

[34]  Jörg Rothe,et al.  How to Calibrate the Scores of Biased Reviewers by Quadratic Programming , 2011, AAAI.

[35]  Richard M. Karp,et al.  Reducibility Among Combinatorial Problems , 1972, 50 Years of Integer Programming.

[36]  Christos Faloutsos,et al.  REV2: Fraudulent User Prediction in Rating Platforms , 2018, WSDM.

[37]  Claire Cardie,et al.  Finding Deceptive Opinion Spam by Any Stretch of the Imagination , 2011, ACL.

[38]  Danai Koutra,et al.  Graph based anomaly detection and description: a survey , 2014, Data Mining and Knowledge Discovery.

[39]  Omer Lev,et al.  Strategyproof peer selection using randomization, partitioning, and apportionment , 2016, Artif. Intell..

[40]  Nihar B. Shah,et al.  A SUPER* Algorithm to Optimize Paper Bidding in Peer Review , 2020, UAI.

[41]  Qingshan Li,et al.  Shilling attacks against collaborative recommender systems: a review , 2018, Artificial Intelligence Review.

[42]  Xin-She Yang,et al.  Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.

[43]  Omri Weinstein,et al.  Faster Dynamic Matrix Inverse for Faster LPs , 2020, ArXiv.

[44]  R. Merton The Matthew Effect in Science , 1968, Science.

[45]  Judy Goldsmith,et al.  The AI conference paper assignment problem , 2007, AAAI 2007.

[46]  H. Moulin,et al.  Impartial Nominations for a Prize , 2013 .

[47]  Suzie Allard,et al.  Peer review: still king in the digital age , 2015, Learn. Publ..

[48]  Hyun Ah Song,et al.  FRAUDAR: Bounding Graph Fraud in the Face of Camouflage , 2016, KDD.

[49]  John von Neumann,et al.  1. A Certain Zero-sum Two-person Game Equivalent to the Optimal Assignment Problem , 1953 .

[50]  Nihar B. Shah,et al.  On Testing for Biases in Peer Review , 2019, NeurIPS.

[51]  Andrew McCallum,et al.  Paper Matching with Local Fairness Constraints , 2019, KDD.