On the complexity of bribery with distance restrictions

Abstract We study the complexity of the constructive/destructive bribery problem with distance restrictions. In the constructive/destructive bribery problem, we are given an election and a distinguished candidate p, and are asked whether we can make p a winner/loser by bribing a limited number of voters to recast their votes. In the constructive/destructive bribery problem with distance restrictions, we require that the votes recast by the bribed voters are close to their original votes. In particular, we measure the closeness of two votes by the minimum number of swaps of candidates needed to transform one vote into the other. We consider both the case where swaps only take place between consecutive candidates, and the case where swaps can take place between any arbitrary candidates. We achieve a wide range of complexity results for the voting correspondences Borda, Condorcet, Copeland α for every rational number 0 ≤ α ≤ 1 , and Maximin.

[1]  Piotr Faliszewski,et al.  The shield that never was: Societies with single-peaked preferences are more open to manipulation and control , 2011, Inf. Comput..

[2]  Yongjie Yang,et al.  How Hard Is Bribery with Distance Restrictions? , 2016, ECAI.

[3]  Meir Kalech,et al.  Practical voting rules with partial information , 2010, Autonomous Agents and Multi-Agent Systems.

[4]  Piotr Faliszewski,et al.  Approximability of Manipulating Elections , 2008, AAAI.

[5]  Gábor Erdélyi,et al.  The complexity of bribery and control in group identification , 2017, Autonomous Agents and Multi-Agent Systems.

[6]  Edith Hemaspaandra,et al.  Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates , 2010, AAAI.

[7]  Gonzalo Navarro,et al.  Effective Proximity Retrieval by Ordering Permutations , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[8]  Andrew Lin,et al.  The Complexity of Manipulating k-Approval Elections , 2010, ICAART.

[9]  Yongjie Yang,et al.  Controlling elections with bounded single-peaked width , 2014, AAMAS.

[10]  Yongjie Yang,et al.  The control complexity of r-Approval: From the single-peaked case to the general case , 2013, J. Comput. Syst. Sci..

[11]  Allan Borodin,et al.  Link analysis ranking: algorithms, theory, and experiments , 2005, TOIT.

[12]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[13]  Piotr Faliszewski,et al.  The complexity of manipulative attacks in nearly single-peaked electorates , 2014, Artif. Intell..

[14]  Lirong Xia,et al.  Computing the margin of victory for various voting rules , 2012, EC '12.

[15]  Edith Hemaspaandra,et al.  Dodgson's Rule and Young's Rule , 2016, Handbook of Computational Social Choice.

[16]  Piotr Faliszewski,et al.  Swap Bribery , 2009, SAGT.

[17]  M. Kendall A NEW MEASURE OF RANK CORRELATION , 1938 .

[18]  Francesca Rossi,et al.  Bribery in voting with CP-nets , 2013, Annals of Mathematics and Artificial Intelligence.

[19]  Henning Schnoor,et al.  Control of Condorcet voting: Complexity and a Relation-Algebraic approach , 2014, Eur. J. Oper. Res..

[20]  Svetlana Obraztsova,et al.  Optimal Manipulation of Voting Rules , 2012, AAAI.

[21]  Piotr Faliszewski,et al.  Nonuniform Bribery , 2007, AAMAS.

[22]  Yongjie Yang,et al.  On the Complexity of Borda Control in Single-Peaked Elections , 2017, AAMAS.

[23]  Ronald Fagin,et al.  Comparing and aggregating rankings with ties , 2004, PODS '04.

[24]  Loris Nanni,et al.  Detector of image orientation based on Borda Count , 2005, Pattern Recognit. Lett..

[25]  Piotr Faliszewski,et al.  Llull and Copeland Voting Computationally Resist Bribery and Constructive Control , 2009, J. Artif. Intell. Res..

[26]  Yongjie Yang,et al.  The Complexity of Control and Bribery in Majority Judgment , 2017, AAMAS.

[27]  Teofilo F. GONZALEZ,et al.  Clustering to Minimize the Maximum Intercluster Distance , 1985, Theor. Comput. Sci..

[28]  Yongjie Yang,et al.  Manipulation with Bounded Single-Peaked Width: A Parameterized Study , 2015, AAMAS.

[29]  M. Trick,et al.  Voting schemes for which it can be difficult to tell who won the election , 1989 .

[30]  Ronald L. Rivest,et al.  Computing the Margin of Victory in IRV Elections , 2011, EVT/WOTE.

[31]  Francesca Rossi,et al.  Bribery in Voting With Soft Constraints , 2013, AAAI.

[32]  Patrick J. Egan,et al.  “Do Something” Politics and Double-Peaked Policy Preferences , 2014, The Journal of Politics.

[33]  Piotr Faliszewski,et al.  How Hard Is Bribery in Elections? , 2006, J. Artif. Intell. Res..

[34]  David Cary,et al.  Estimating the Margin of Victory for Instant-Runoff Voting , 2011, EVT/WOTE.

[35]  Yongjie Yang,et al.  How Hard is Control in Multi-Peaked Elections: A Parameterized Study , 2015, AAMAS.

[36]  Piotr Faliszewski,et al.  Multimode Control Attacks on Elections , 2009, IJCAI.

[37]  Moni Naor,et al.  Rank aggregation methods for the Web , 2001, WWW '01.

[38]  P. Faliszewski,et al.  Control and Bribery in Voting , 2016, Handbook of Computational Social Choice.

[39]  Ronald Fagin,et al.  Comparing top k lists , 2003, SODA '03.

[40]  Piotr Faliszewski,et al.  On swap-distance geometry of voting rules , 2013, AAMAS.

[41]  Jörg Rothe,et al.  Exact analysis of Dodgson elections: Lewis Carroll's 1876 voting system is complete for parallel access to NP , 1997, JACM.