[PDF][PDF] Optimally Protecting Elections.
… election control can be prevented or deterred has been largely ignored. We introduce the
problem of optimal protection against election … allocates limited protection resources to prevent …
problem of optimal protection against election … allocates limited protection resources to prevent …
Optimal defense against election control by deleting voter groups
… To address these limitations, we consider the problem of optimally protecting elections
against control. We model control as a denial-of-service (deletion) attack on a subset of voter …
against control. We model control as a denial-of-service (deletion) attack on a subset of voter …
Protecting elections
G Shakya - Proceedings of the 7th ACM IKDD CoDS and 25th …, 2020 - dl.acm.org
… We prove that the OPTIMAL DEFENSE problem is NP-complete for every scoring rule
even if the number of candidates is three and the attacker can attack any number of the voter …
even if the number of candidates is three and the attacker can attack any number of the voter …
Optimally Protecting Elections with Uncertainty about Voter Preferences
M Li, Y Cao - Procedia computer science, 2018 - Elsevier
… the attacker chooses an optimal strategy after conducting surveillance. In order to protect
the credibility and integrity of the election, we consider the following model of protection. The …
the credibility and integrity of the election, we consider the following model of protection. The …
A secure and optimally efficient multi‐authority election scheme
R Cramer, R Gennaro… - European transactions on …, 1997 - Wiley Online Library
… the majority of election protocols that support some level of verifiability (either universal or
limited to voters, who can check their own vote) merely provide computational protection of the …
limited to voters, who can check their own vote) merely provide computational protection of the …
Protecting elections by recounting ballots
… protecting elections. In their model the defender allocates resources to guard some of the
electoral … for the defender to use a greedy recounting strategy, we can show that it is optimal for …
electoral … for the defender to use a greedy recounting strategy, we can show that it is optimal for …
[PDF][PDF] Protecting elections with minimal resource consumption
Y Li, Y Jiang, W Wu - Proceedings of the 16th Conference on …, 2017 - ifaamas.org
… to protect the election outcomes from control. In this paper, we consider how to protect election
outcome … Besides, we find that our approximation algorithm outperforms other non-optimal …
outcome … Besides, we find that our approximation algorithm outperforms other non-optimal …
[PDF][PDF] Protecting election from bribery: New approach and computational complexity characterization
… by the attacker and would win the election should there be no bribery attacker. … protection
of elections against bribery. More specifically, we initiate the study of the following protection …
of elections against bribery. More specifically, we initiate the study of the following protection …
Multimode control attacks on elections
P Faliszewski, E Hemaspaandra… - Journal of Artificial …, 2011 - jair.org
… goal is to protect elections from various attacking actions intended to skew the election’s …
In particular, we try to show either that one can compute in polynomial time an optimal attack of …
In particular, we try to show either that one can compute in polynomial time an optimal attack of …
Defending elections against malicious spread of misinformation
B Wilder, Y Vorobeychik - Proceedings of the AAAI conference on artificial …, 2019 - aaai.org
… nearoptimal defender strategies and showcase variations in the difficulty of defending
elections … A defender aims to protect the election against this manipulation. Each voter v has a …
elections … A defender aims to protect the election against this manipulation. Each voter v has a …