Manipulative Attacks in Group Identification

Abstract

In the group identification problem, we are given a set of individuals and are asked to identify a socially qualified subset among them. Each individual in the set has an opinion about who should be considered socially qualified. There are several different rules that can be used to determine the socially qualified subset based on these mutual opinions. In this paper, we consider the consensus-start-respecting rule, the liberal-start-respecting rule, and the consent rules.

In the context of group identification, a manipulative attack is the attempt by an outsider to influence the outcome of the selection process through certain means of manipulation. These means include adding, deleting, or partitioning individuals, as well as bribing individuals to change their opinion. In this paper, we provide an overview of the feasibility and the computational complexity of manipulative attacks in group identification.

1. Introduction to Group Identification

There are many situations where one needs to identify a socially qualified subgroup among a group of individuals. For instance, consider a facility whose members want to form a working group for a specific task. In this example, all members have pairwise opinions about whether each member is qualified for the task or not. Another example is when a group of autonomous agents wants to select those among them who are best suited to perform a particular job. Again, the selection in this example is based on the mutual valuations of the agents. To deal with scenarios like these, the group identification model has been developed.
In the following, we assume that the reader is familiar with the basics of graph theory (vertices, edges, arcs) and computational complexity theory (polynomial-time solvability, NP-hardness). For a consult, we refer to West[1] and Du et al.[2].
In the group identification model, we are given a set of individuals, each of whom has an opinion about which individuals are qualified in a certain way and which are not. Crucially, each individual also has an opinion about themselves.
Throughout this paper, we use N N NN to denote the given set of individuals. The pairwise opinions of the individuals are represented by a function φ : N × N { 1 , 1 } φ : N × N { 1 , 1 } varphi:N xx N rarr{-1,1}\varphi : N \times N \rightarrow \{ -1, 1 \} called profile over N N NN. For individuals a , b N a , b N a,b in Na,b \in N, we write φ ( a , b ) = 1 φ ( a , b ) = 1 varphi(a,b)=1\varphi(a,b) = 1 when a a aa thinks b b bb is qualified and say a a aa qualifies b b bb. We write φ ( a , b ) = 1 φ ( a , b ) = 1 varphi(a,b)=-1\varphi(a,b) = -1 when a a aa thinks b b bb is not qualified and say a a aa disqualifies b b bb.
A group identification instance ( N , φ ) ( N , φ ) (N,varphi)(N, \varphi) is best represented as a directed graph G = ( V , E ) G = ( V , E ) G=(V,E)G = (V, E) where V = N V = N V=NV = N and ( a , b ) E ( a , b ) E (a,b)in E(a, b) \in E if and only if φ ( a , b ) = 1 φ ( a , b ) = 1 varphi(a,b)=1\varphi(a, b) = 1.
Example: Let N = { a 1 , a 2 , a 3 , a 4 , a 5 } N = { a 1 , a 2 , a 3 , a 4 , a 5 } N={a_(1),a_(2),a_(3),a_(4),a_(5)}N = \{ a_1, a_2, a_3, a_4, a_5 \} be a set of five individuals and φ φ varphi\varphi a profile over N N NN defined as follows ( φ ( a i , a j ) φ ( a i , a j ) varphi(a_(i),a_(j))\varphi(a_i, a_j) is given by the matrix entry in the i i ii-th row and j j jj-th column):
a 1 a 2 a 3 a 4 a 5 a 1 1 1 1 1 1 a 2 1 1 1 1 1 a 3 1 1 1 1 1 a 4 1 1 1 1 1 a 5 1 1 1 1 1      a 1      a 2      a 3      a 4      a 5 a 1      1      1      1      1      1 a 2      1      1      1      1      1 a 3      1      1      1      1      1 a 4      1      1      1      1      1 a 5      1      1      1      1      1 {:[,a_(1),a_(2),a_(3),a_(4),a_(5)],[a_(1),1,1,1,-1,1],[a_(2),-1,-1,1,-1,1],[a_(3),-1,1,1,-1,-1],[a_(4),1,1,1,1,-1],[a_(5),-1,1,1,-1,-1]:}\begin{array}{rrrrrr} & a_1 & a_2 & a_3 & a_4 & a_5 \\ a_1 & 1 & 1 & 1 & -1 & 1 \\ a_2 & -1 & -1 & 1 & -1 & 1 \\ a_3 & -1 & 1 & 1 & -1 & -1 \\ a_4 & 1 & 1 & 1 & 1 & -1 \\ a_5 & -1 & 1 & 1 & -1 & -1 \end{array}
The graph representation of the above instance looks as follows:
Figure 1: The arc from an individual X to an individual Y indicates that X qualifies Y.

1.1. Social Rules

To determine the subset of socially qualified individuals for a given group identification instance, a so-called social rule is applied. A social rule is a function f f ff that, given a group identification instance ( N , φ ) ( N , φ ) (N,varphi)(N, \varphi), outputs a subset f ( N , φ ) N f ( N , φ ) N f(N,varphi)sube Nf(N, \varphi) \subseteq N which we refer to as socially qualified individuals of N N NN with respect to f f ff and φ φ varphi\varphi.
In the literature, the consensus-start-respecting (CSR) rule, the liberal-start-respecting (LSR) rule, and the consent rules have received particular attention[3][4][5]. Therefore, we make these rules the subject of our analysis in this paper.
Consensus-start-respecting rule f CSR f CSR f^("CSR")f^{\text{CSR}}: This rule determines the socially qualified individuals iteratively. In a first step, all individuals who are qualified by everyone are considered to be socially qualified. Then, in each iteration, any individual who is qualified by any of the currently socially qualified individuals is added to the set of socially qualified individuals. Once no new individuals can be added, the iterative process terminates.
More formally, the initial set of socially qualified individuals is defined as
K 0 C ( N , φ ) = { a N : φ ( a , a ) = 1 for all a N } . K 0 C ( N , φ ) = { a N : φ ( a , a ) = 1  for all  a N } . K_(0)^("C")(N,varphi)={a in N:varphi(a^('),a)=1" for all "a^(')in N}.K^{\text{C}}_0(N, \varphi) = \{a \in N : \varphi(a^\prime, a) = 1 \text{ for all } a^\prime \in N\}.
And for each positive integer i i ii, the set of socially qualified individuals in the i i ii-th iteration is defined as
K i C ( N , φ ) = K i 1 C ( N , φ ) { a N : a K i 1 C ( N , φ ) s.t. φ ( a , a ) = 1 } . K i C ( N , φ ) = K i 1 C ( N , φ ) { a N : a K i 1 C ( N , φ )  s.t.  φ ( a , a ) = 1 } . K_(i)^("C")(N,varphi)=K_(i-1)^("C")(N,varphi)uu{a in N:EEa^(')inK_(i-1)^("C")(N,varphi)" s.t. "varphi(a^('),a)=1}.K^{\text{C}}_i(N, \varphi) = K^{\text{C}}_{i-1}(N, \varphi) \cup \{a \in N : \exists~ a^\prime \in K^{\text{C}}_{i-1}(N, \varphi) \text{ s.t. } \varphi(a^\prime, a) = 1\}.
We define f CSR ( N , φ ) = K i C ( N , φ ) f CSR ( N , φ ) = K i C ( N , φ ) f^("CSR")(N,varphi)=K_(i)^("C")(N,varphi)f^{\text{CSR}}(N, \varphi) = K^{\text{C}}_i(N, \varphi) for the smallest i i ii with K i C ( N , φ ) = K i 1 C ( N , φ ) K i C ( N , φ ) = K i 1 C ( N , φ ) K_(i)^("C")(N,varphi)=K_(i-1)^("C")(N,varphi)K^{\text{C}}_i(N, \varphi) = K^{\text{C}}_{i-1}(N, \varphi).
Applying the CSR rule to the example instance depicted in Figure [1], we initially have K 0 C ( N , φ ) = { a 3 } K 0 C ( N , φ ) = { a 3 } K_(0)^("C")(N,varphi)={a_(3)}K^{\text{C}}_0(N, \varphi) = \{ a_3 \} since a 3 a 3 a_(3)a_3 is the only individual who is qualified by everyone. Because a 3 a 3 a_(3)a_3 qualifies a 2 a 2 a_(2)a_2, we get K 1 C ( N , φ ) = { a 2 , a 3 } K 1 C ( N , φ ) = { a 2 , a 3 } K_(1)^("C")(N,varphi)={a_(2),a_(3)}K^{\text{C}}_1(N, \varphi) = \{ a_2, a_3 \}. Since a 2 a 2 a_(2)a_2 also qualifies a 5 a 5 a_(5)a_5, we then get K 2 C ( N , φ ) = { a 2 , a 3 , a 5 } K 2 C ( N , φ ) = { a 2 , a 3 , a 5 } K_(2)^("C")(N,varphi)={a_(2),a_(3),a_(5)}K^{\text{C}}_2(N, \varphi) = \{ a_2, a_3, a_5 \}. The individual a 5 a 5 a_(5)a_5 qualifies no further individuals, so we obtain the final result f CSR ( N , φ ) = { a 2 , a 3 , a 5 } f CSR ( N , φ ) = { a 2 , a 3 , a 5 } f^("CSR")(N,varphi)={a_(2),a_(3),a_(5)}f^{\text{CSR}}(N, \varphi) = \{ a_2, a_3, a_5 \}.
Figure 2: The highlighted individuals are socially qualified with respect to the CSR rule.
Liberal-start-respecting rule f LSR f LSR f^("LSR")f^{\text{LSR}}: This rule also determines the socially qualified individuals iteratively. Initially, all individuals who qualify themselves are considered to be socially qualified. Then, in each iteration, any individual who is qualified by any of the currently socially qualified individuals is added to the set of socially qualified individuals. Once no new individuals can be added, the iterative process terminates.
More formally, the initial set of socially qualified individuals is defined as
K 0 L ( N , φ ) = { a N : φ ( a , a ) = 1 } . K 0 L ( N , φ ) = { a N : φ ( a , a ) = 1 } . K_(0)^("L")(N,varphi)={a in N:varphi(a,a)=1}.K^{\text{L}}_0(N, \varphi) = \{a \in N : \varphi(a, a) = 1\}.
And for each positive integer i i ii, the set of socially qualified individuals in the i i ii-th iteration is defined as
K i L ( N , φ ) = K i 1 L ( N , φ ) { a N : a K i 1 L ( N , φ ) s.t. φ ( a , a ) = 1 } . K i L ( N , φ ) = K i 1 L ( N , φ ) { a N : a K i 1 L ( N , φ )  s.t.  φ ( a , a ) = 1 } . K_(i)^("L")(N,varphi)=K_(i-1)^("L")(N,varphi)uu{a in N:EEa^(')inK_(i-1)^("L")(N,varphi)" s.t. "varphi(a^('),a)=1}.K^{\text{L}}_i(N, \varphi) = K^{\text{L}}_{i-1}(N, \varphi) \cup \{a \in N : \exists~ a^\prime \in K^{\text{L}}_{i-1}(N, \varphi) \text{ s.t. } \varphi(a^\prime, a) = 1\}.
We define f LSR ( N , φ ) = K i L ( N , φ ) f LSR ( N , φ ) = K i L ( N , φ ) f^("LSR")(N,varphi)=K_(i)^("L")(N,varphi)f^{\text{LSR}}(N, \varphi) = K^{\text{L}}_i(N, \varphi) for the smallest i i ii with K i L ( N , φ ) = K i 1 L ( N , φ ) K i L ( N , φ ) = K i 1 L ( N , φ ) K_(i)^("L")(N,varphi)=K_(i-1)^("L")(N,varphi)K^{\text{L}}_i(N, \varphi) = K^{\text{L}}_{i-1}(N, \varphi).
Applying the LSR rule to the example instance depicted in Figure [1], we initially have K 0 L ( N , φ ) = { a 1 , a 3 , a 4 } K 0 L ( N , φ ) = { a 1 , a 3 , a 4 } K_(0)^("L")(N,varphi)={a_(1),a_(3),a_(4)}K^{\text{L}}_0(N, \varphi) = \{ a_1, a_3, a_4 \} since these three individuals each qualify themselves. Because a 1 a 1 a_(1)a_1 also qualifies a 2 a 2 a_(2)a_2 and a 5 a 5 a_(5)a_5, we then get K 1 L ( N , φ ) = { a 1 , a 2 , a 3 , a 4 , a 5 } = f LSR ( N , φ ) K 1 L ( N , φ ) = { a 1 , a 2 , a 3 , a 4 , a 5 } = f LSR ( N , φ ) K_(1)^("L")(N,varphi)={a_(1),a_(2),a_(3),a_(4),a_(5)}=f^("LSR")(N,varphi)K^{\text{L}}_1(N, \varphi) = \{ a_1, a_2, a_3, a_4, a_5 \} = f^{\text{LSR}}(N, \varphi).
Figure 3: The highlighted individuals are socially qualified with respect to the LSR rule.
Consent rules f ( s , t ) f ( s , t ) f^((s,t))f^{(s, t)}: A consent rule is specified by two parameters s , t N s , t N s,t inNs, t \in \mathbb{N}. For every individual a N a N a in Na \in N, it holds:
  • If φ ( a , a ) = 1 φ ( a , a ) = 1 varphi(a,a)=1\varphi(a, a) = 1 then a f ( s , t ) ( N , φ ) a f ( s , t ) ( N , φ ) a inf^((s,t))(N,varphi)a \in f^{(s, t)}(N, \varphi) if and only if | a N : φ ( a , a ) = 1 | s | a N : φ ( a , a ) = 1 | s |a^(')in N:varphi(a^('),a)=1| >= s|{a^\prime \in N : \varphi(a^\prime, a) = 1}| \geq s.
  • If φ ( a , a ) = 1 φ ( a , a ) = 1 varphi(a,a)=-1\varphi(a, a) = -1 then a f ( s , t ) ( N , φ ) a f ( s , t ) ( N , φ ) a!inf^((s,t))(N,varphi)a \not\in f^{(s, t)}(N, \varphi) if and only if | a N : φ ( a , a ) = 1 | t | a N : φ ( a , a ) = 1 | t |a^(')in N:varphi(a^('),a)=-1| >= t|{a^\prime \in N : \varphi(a^\prime, a) = -1}| \geq t.
In other words, an individual who qualifies themselves is socially qualified if and only if at least s 1 s 1 s-1s-1 other individuals also qualify them. And an individual who disqualifies themselves is socially disqualified if and only if at least t 1 t 1 t-1t-1 other individuals also disqualify them.
For instance, applying the consent rule f ( 2 , 3 ) f ( 2 , 3 ) f^((2,3))f^{(2, 3)} with s = 2 s = 2 s=2s=2 and t = 3 t = 3 t=3t=3 to the example instance depicted in Figure [1], the individuals a 1 a 1 a_(1)a_1 and a 3 a 3 a_(3)a_3 would be socially qualified because they qualify themselves and are qualified by at least one other individual (namely a 4 a 4 a_(4)a_4). The individual a 5 a 5 a_(5)a_5 would be socially disqualified because they disqualify themselves and are disqualified by two other individuals (namely a 3 a 3 a_(3)a_3 and a 4 a 4 a_(4)a_4). Finally, a 2 a 2 a_(2)a_2 would be socially qualified because all other individuals qualify a 2 a 2 a_(2)a_2, and a 4 a 4 a_(4)a_4 would be socially disqualified because all other individuals disqualify a 4 a 4 a_(4)a_4. Thus, the set of socially qualified individuals would be f ( 2 , 3 ) ( N , φ ) = { a 1 , a 2 , a 3 } f ( 2 , 3 ) ( N , φ ) = { a 1 , a 2 , a 3 } f^((2,3))(N,varphi)={a_(1),a_(2),a_(3)}f^{(2, 3)}(N, \varphi) = \{ a_1, a_2, a_3 \}.
Figure 4: The highlighted individuals are socially qualified with respect to the consent rule using s=2 and t=3.

2. Introduction to Manipulative Attacks

In this paper, instead of trying to determine the socially qualified individuals, we mainly focus on manipulative attacks in group identification. In a manipulative attack, an outsider (called the attacker) tries to reach a certain strategic objective. There are four kinds of strategic objectives: With a constructive objective, the attacker tries to ensure that certain individuals will be socially qualified. With a destructive objective, the attacker tries to ensure that certain individuals will be socially disqualified. With an exact objective, the attacker tries to precisely specify for each individual whether they should be socially qualified or not. Finally, in the most general setting (also called constructive+destructive), the attacker tries to make certain individuals socially qualified and certain other individuals socially disqualified.
There are different means which the attacker may use to reach their objective. In group control scenarios, the attacker can add, delete, or partition individuals. In group bribery scenarios, the attacker can bribe individuals to change their opinion. Each strategic objective can be combined with each means of manipulation to form a group control (resp. group bribery) problem. For example, consider the Destructive Group Control by Deleting Individuals problem: In this scenario, the attacker is allowed to delete a certain number of individuals from the set, with the goal of making certain individuals in the remaining set socially disqualified.
The precise steps the attacker must take to reach their objective depend on which social rule is used for evaluation. For each combination of a strategic objective, a means of manipulation, and a social rule, we can study the feasibility and the computational complexity of the corresponding problem. Sometimes, it is not possible for the attacker to reach their objective by the given means. In this case, we say that the used social rule is immune to the manipulative attack. Otherwise, we say that the social rule is susceptible to the manipulative attack, and we then try to classify the problem as either polynomial-time solvable or NP-hard. When the problem is NP-hard, it is possible for the attacker to reach their objective, but computing the solution is generally difficult. This implies that the used social rule offers at least some protection against the manipulative attack.
Throughout this paper, we use A + A + A^(+)A^+ to denote the constructive target set, i.e. the set of individuals the attacker wants to make socially qualified. Likewise, we use A A A^(-)A^- to denote the destructive target set, i.e. the set of individuals the attacker wants to make socially disqualified. Naturally, we require that A + A = A + A = A^(+)nnA^(-)=O/A^+ \cap A^- = \emptyset.

2.1. Problem Definitions

We now provide formal definitions of the different problem settings. Recall that when f f ff is a social rule, f ( N , φ ) f ( N , φ ) f(N,varphi)f(N, \varphi) denotes the subset of socially qualified individuals of N N NN with respect to f f ff and φ φ varphi\varphi.
Group Control by Adding Individuals: In this scenario, only a subset of individuals T N T N T sube NT \subseteq N is initially considered in the group identification process. The attacker can then select up to \ell individuals from N T N T N\\TN \setminus T to be added to T T TT. This can be thought of as motivating additional individuals to participate in the process who otherwise would not have participated.
f f ff-Group Control by Adding Individuals (GCAI)
Given: A set N N NN of individuals, a profile φ φ varphi\varphi over N N NN, three subsets A + , A , T N A + , A , T N A^(+),A^(-),T sube NA^+, A^-, T \subseteq N with A + A = A + A = A^(+)nnA^(-)=O/A^+ \cap A^- = \emptyset and A + , A T A + , A T A^(+),A^(-)sube TA^+, A^- \subseteq T, and a positive integer \ell.
Question: Is there a subset U N T U N T U sube N\\TU \subseteq N \setminus T such that | U | | U | |U| <= ℓ|U| \leq \ell and A + f ( T U , φ ) A + f ( T U , φ ) A^(+)sube f(T uu U,varphi)A^+ \subseteq f(T \cup U, \varphi) and A f ( T U , φ ) = A f ( T U , φ ) = A^(-)nn f(T uu U,varphi)=O/A^- \cap f(T \cup U, \varphi) = \emptyset?
In other words, is there a way to add at most \ell individuals from N T N T N\\TN \setminus T to T T TT such that all individuals in A + A + A^(+)A^+ become socially qualified and all individuals in A A A^(-)A^- become socially disqualified with respect to the social rule f f ff?
In addition to the general f f ff-GCAI problem, there are the three special variants
  • f f ff-Constructive Group Control by Adding Individuals (CGCAI) where the set A A A^(-)A^- is dropped,
  • f f ff-Destructive Group Control by Adding Individuals (DGCAI) where the set A + A + A^(+)A^+ is dropped,
  • f f ff-Exact Group Control by Adding Individuals (EGCAI) where we add the premise A + A = T A + A = T A^(+)uuA^(-)=TA^+ \cup A^- = T.
Group Control by Deleting Individuals: In this scenario, we start with an initial set N N NN and allow the attacker to delete up to \ell individuals from N N NN. This can be thought of as preventing some individuals from participating in the selection process. However, the attacker is not allowed to delete individuals that are in A + A + A^(+)A^+ or A A A^(-)A^-.
f f ff-Group Control by Deleting Individuals (GCDI)
Given: A set N N NN of individuals, a profile φ φ varphi\varphi over N N NN, two subsets A + , A N A + , A N A^(+),A^(-)sube NA^+, A^- \subseteq N with A + A = A + A = A^(+)nnA^(-)=O/A^+ \cap A^- = \emptyset, and a positive integer \ell.
Question: Is there a subset U N ( A + A ) U N ( A + A ) U sube N\\(A^(+)uuA^(-))U \subseteq N \setminus (A^+ \cup A^-) such that | U | | U | |U| <= ℓ|U| \leq \ell and A + f ( N U , φ ) A + f ( N U , φ ) A^(+)sube f(N\\U,varphi)A^+ \subseteq f(N \setminus U, \varphi) and A f ( N U , φ ) = A f ( N U , φ ) = A^(-)nn f(N\\U,varphi)=O/A^- \cap f(N \setminus U, \varphi) = \emptyset?
In other words, is there a way to delete at most \ell individuals from N ( A + A ) N ( A + A ) N\\(A^(+)uuA^(-))N \setminus (A^+ \cup A^-) such that all individuals in A + A + A^(+)A^+ become socially qualified and all individuals in A A A^(-)A^- become socially disqualified with respect to the social rule f f ff?
In addition to the general f f ff-GCDI problem, there are the two special variants
  • f f ff-Constructive Group Control by Deleting Individuals (CGCDI) where the set A A A^(-)A^- is dropped,
  • f f ff-Destructive Group Control by Deleting Individuals (DGCDI) where the set A + A + A^(+)A^+ is dropped.
Note that there is no f f ff-Exact Group Control by Deleting Individuals problem. The reason for this is that we only allow the attacker to delete individuals from N ( A + A ) N ( A + A ) N\\(A^(+)uuA^(-))N \setminus (A^+ \cup A^-). Hence, the attacker would not be allowed to delete anyone when A + A = N A + A = N A^(+)uuA^(-)=NA^+ \cup A^- = N.
Group Control by Partitioning of Individuals: In this scenario, the attacker can organize the evaluation procedure as a two-stage process. In the first stage of the selection, the individuals are split into two partitions U U UU and N U N U N\\UN \setminus U, and the socially qualified individuals are determined separately for both partitions. Subsequently, in the second stage of the selection, only individuals who survived the first stage are considered. Multi-stage selection procedures are common in many real-world scenarios (e.g. think of organizational units or electoral districts).
f f ff-Group Control by Partitioning of Individuals (GCPI)
Given: A set N N NN of individuals, a profile φ φ varphi\varphi over N N NN, and two subsets A + , A N A + , A N A^(+),A^(-)sube NA^+, A^- \subseteq N with A + A = A + A = A^(+)nnA^(-)=O/A^+ \cap A^- = \emptyset.
Question: Is there a subset U N U N U sube NU \subseteq N such that A + f ( V , φ ) A + f ( V , φ ) A^(+)sube f(V,varphi)A^+ \subseteq f(V, \varphi) and A f ( V , φ ) = A f ( V , φ ) = A^(-)nn f(V,varphi)=O/A^- \cap f(V, \varphi) = \emptyset where V = f ( U , φ ) f ( N U , φ ) V = f ( U , φ ) f ( N U , φ ) V=f(U,varphi)uu f(N\\U,varphi)V = f(U, \varphi) \cup f(N \setminus U, \varphi)?
In other words, is there a way to split the set of individuals into two partitions U U UU and N U N U N\\UN \setminus U such that all individuals in A + A + A^(+)A^+ become socially qualified and all individuals in A A A^(-)A^- become socially disqualified with respect to the social rule f f ff?
In addition to the general f f ff-GCPI problem, there are the three special variants
  • f f ff-Constructive Group Control by Partitioning of Individuals (CGCPI) where the set A A A^(-)A^- is dropped,
  • f f ff-Destructive Group Control by Partitioning of Individuals (DGCPI) where the set A + A + A^(+)A^+ is dropped,
  • f f ff-Exact Group Control by Partitioning of Individuals (EGCPI) where we add the premise A + A = N A + A = N A^(+)uuA^(-)=NA^+ \cup A^- = N.
Group Bribery: In the bribery problems, the attacker can bribe up to \ell individuals to change their opinion. In this model, we assume that the attacker can arbitrarily alter the outgoing valuations of each bribed individual.
f f ff-Group Bribery (GB)
Given: A set N N NN of individuals, a profile φ φ varphi\varphi over N N NN, two subsets A + , A N A + , A N A^(+),A^(-)sube NA^+, A^- \subseteq N with A + A = A + A = A^(+)nnA^(-)=O/A^+ \cap A^- = \emptyset, and a positive integer \ell.
Question: Is there a way to obtain a profile φ φ varphi^(')\varphi^\prime over N N NN by changing the outgoing valuations in φ φ varphi\varphi of at most \ell individuals such that A + f ( N , φ ) A + f ( N , φ ) A^(+)sube f(N,varphi^('))A^+ \subseteq f(N, \varphi^\prime) and A f ( N , φ ) = A f ( N , φ ) = A^(-)nn f(N,varphi^('))=O/A^- \cap f(N, \varphi^\prime) = \emptyset?
In other words, is there a way to bribe at most \ell individuals such that all individuals in A + A + A^(+)A^+ become socially qualified and all individuals in A A A^(-)A^- become socially disqualified with respect to the social rule f f ff?
In addition to the general f f ff-GB problem, there are the three special variants
  • f f ff-Constructive Group Bribery (CGB) where the set A A A^(-)A^- is dropped,
  • f f ff-Destructive Group Bribery (DGB) where the set A + A + A^(+)A^+ is dropped,
  • f f ff-Exact Group Bribery (EGB) where we add the premise A + A = N A + A = N A^(+)uuA^(-)=NA^+ \cup A^- = N.
Group Microbribery: In the microbribery model, the attacker can also bribe individuals to change their opinion, but needs to pay for each changed entry in φ φ varphi\varphi separately. In total, the attacker is allowed to change up to \ell entries (i.e. replace a 1 1 11 by a 1 1 -1-1, or a 1 1 -1-1 by a 1 1 11).
f f ff-Group Microbribery (GMB)
Given: A set N N NN of individuals, a profile φ φ varphi\varphi over N N NN, two subsets A + , A N A + , A N A^(+),A^(-)sube NA^+, A^- \subseteq N with A + A = A + A = A^(+)nnA^(-)=O/A^+ \cap A^- = \emptyset, and a positive integer \ell.
Question: Is there a way to obtain a profile φ φ varphi^(')\varphi^\prime over N N NN by changing the valuations in φ φ varphi\varphi for at most \ell pairs of individuals such that A + f ( N , φ ) A + f ( N , φ ) A^(+)sube f(N,varphi^('))A^+ \subseteq f(N, \varphi^\prime) and A f ( N , φ ) = A f ( N , φ ) = A^(-)nn f(N,varphi^('))=O/A^- \cap f(N, \varphi^\prime) = \emptyset?
In other words, is there a way to change at most \ell entries in φ φ varphi\varphi such that all individuals in A + A + A^(+)A^+ become socially qualified and all individuals in A A A^(-)A^- become socially disqualified with respect to the social rule f f ff?
In addition to the general f f ff-GMB problem, there are the three special variants
  • f f ff-Constructive Group Microbribery (CGMB) where the set A A A^(-)A^- is dropped,
  • f f ff-Destructive Group Microbribery (DGMB) where the set A + A + A^(+)A^+ is dropped,
  • f f ff-Exact Group Microbribery (EGMB) where we add the premise A + A = N A + A = N A^(+)uuA^(-)=NA^+ \cup A^- = N.

2.2. Problem Acronyms Overview

Acronym Problem Name
CGB Constructive Group Bribery
CGCAI Constructive Group Control by Adding Individuals
CGCDI Constructive Group Control by Deleting Individuals
CGCPI Constructive Group Control by Partitioning of Individuals
CGMB Constructive Group Microbribery
DGB Destructive Group Bribery
DGCAI Destructive Group Control by Adding Individuals
DGCDI Destructive Group Control by Deleting Individuals
DGCPI Destructive Group Control by Partitioning of Individuals
DGMB Destructive Group Microbribery
EGB Exact Group Bribery
EGCAI Exact Group Control by Adding Individuals
EGCPI Exact Group Control by Partitioning of Individuals
EGMB Exact Group Microbribery
GB Group Bribery
GCAI Group Control by Adding Individuals
GCDI Group Control by Deleting Individuals
GCPI Group Control by Partitioning of Individuals
GMB Group Microbribery
Table 1: An overview of the problem names and their acronyms used in this paper.

3. Computational Complexity of Group Control and Bribery

The study of manipulative attacks in group identification is mainly concerned with the computational complexity of the corresponding problems. In this section, we provide an overview of the known complexity results for group control and bribery. We consider all problems listed in Section 2.1 under each of the social rules defined in Section 1.1.

3.1. Constructive Group Control and Bribery

We begin with the constrictive problems. The results for the three constructive group control problems were all shown by Yang et al.[6]. Erdélyi et al.[7] showed the results for the bribery problem, and Boehmer et al.[8] extended their results to the microbribery problem.
Table [2] lists all the known complexity results for constructive group control and bribery.
Consent rules f ( s , t ) f ( s , t ) f^((s,t))f^{(s, t)} f CSR f CSR f^("CSR")f^{\text{CSR}} f LSR f LSR f^("LSR")f^{\text{LSR}}
s = 1 s = 1 s=1s=1 s 2 s 2 s >= 2s \geq 2
t = 1 t = 1 t=1t=1 t = 2 t = 2 t=2t=2 t 3 t 3 t >= 3t \geq 3 t = 1 t = 1 t=1t=1 t = 2 t = 2 t=2t=2 t 3 t 3 t >= 3t \geq 3
CGCAI I I I NP-h NP-h NP-h NP-h NP-h
CGCDI I P NP-h I P NP-h P I
CGCPI I NP-h NP-h I NP-h NP-h ? I
CGB P NP-h NP-h NP-h NP-h NP-h P P
CGMB P P P P P P NP-h NP-h
Table 2: A summary of the known complexity results for constructive group control and bribery. In the table, "P" stands for "polynomial-time solvable", "NP-h" stands for "NP-hard", "I" stands for "immune", and "?" means that the complexity of the problem is open.
One of the results shown in the above table is that all consent rules f ( s , t ) f ( s , t ) f^((s,t))f^{(s, t)} with t = 1 t = 1 t=1t=1 are immune to Constructive Group Control by Deleting Individuals (CGCDI) and Constructive Group Control by Partitioning of Individuals (CGCPI). To see why this is the case, we can do a simple case analysis (cf. Yang et al.[6:1] Theorem 2):
Let a A + a A + a inA^(+)a \in A^+ be an individual who is not socially qualified initially, i.e. a f ( s , t ) ( N , φ ) a f ( s , t ) ( N , φ ) a!inf^((s,t))(N,varphi)a \not\in f^{(s, t)}(N, \varphi). We now show that it is impossible to turn a a aa socially qualified by partitioning or deleting individuals when t = 1 t = 1 t=1t=1. We distinguish between two cases.
Case 1: a a aa qualifies themselves, i.e. φ ( a , a ) = 1 φ ( a , a ) = 1 varphi(a,a)=1\varphi(a, a) = 1 In this case, there are less than s s ss individuals in N N NN who qualify a a aa (because otherwise a a aa would already be socially qualified initially). Therefore, no matter how we partition the set N N NN or which individuals we delete from N N NN, we can never make the individual a a aa socially qualified.
Case 2: a a aa disqualifies themselves, i.e. φ ( a , a ) = 1 φ ( a , a ) = 1 varphi(a,a)=-1\varphi(a, a) = -1 Because t = 1 t = 1 t=1t=1, a a aa is always socially disqualified, regardless of how we partition the set N N NN or which individuals we delete from N N NN.
In both of the above cases, it is impossible for the attacker to turn a a aa socially qualified by partitioning or deleting individuals. The consent rules f ( s , t ) f ( s , t ) f^((s,t))f^{(s, t)} with t = 1 t = 1 t=1t=1 are therefore immune to these kinds of manipulative attacks.

3.2. Destructive Group Control and Bribery

We now turn to the destructive problems. The results for the three destructive group control problems and the bribery problem were shown by Erdélyi et al.[7:1], and Boehmer et al.[8:1] extended their results to the microbribery problem.
Table [3] lists all the known complexity results for destructive group control and bribery.
Consent rules f ( s , t ) f ( s , t ) f^((s,t))f^{(s, t)} f CSR f CSR f^("CSR")f^{\text{CSR}} f LSR f LSR f^("LSR")f^{\text{LSR}}
s = 1 s = 1 s=1s=1 s = 2 s = 2 s=2s=2 s 3 s 3 s >= 3s \geq 3
t = 1 t = 1 t=1t=1 t 2 t 2 t >= 2t \geq 2 t = 1 t = 1 t=1t=1 t 2 t 2 t >= 2t \geq 2 t = 1 t = 1 t=1t=1 t 2 t 2 t >= 2t \geq 2
DGCAI I NP-h I NP-h I NP-h NP-h I
DGCDI I I P P NP-h NP-h P P
DGCPI I I NP-h NP-h NP-h NP-h ? P
DGB P NP-h NP-h NP-h NP-h NP-h P P
DGMB P P P P P P P P
Table 3: A summary of the known complexity results for destructive group control and bribery. In the table, "P" stands for "polynomial-time solvable", "NP-h" stands for "NP-hard", "I" stands for "immune", and "?" means that the complexity of the problem is open.
As shown in the above table, f CSR f CSR f^("CSR")f^{\text{CSR}}-Destructive Group Control by Adding Individuals (DGCAI) is an NP-hard problem. This can be shown via a reduction from the so-called Restricted Exact Cover by 3-sets problem (RX3C). That is, given an instance of the RX3C problem, we construct an equivalent instance of the f CSR f CSR f^("CSR")f^{\text{CSR}}-DGCAI problem, so if the latter could be solved efficiently, the same would be true for the former. The RX3C problem is known to be NP-hard[9] and is defined as follows:
Restricted Exact Cover by 3-sets (RX3C)
Given: A set X X XX of size 3 m 3 m 3m3m (i.e. a size divisible by 3 3 33) and a family F F F\mathcal{F} of subsets of X X XX. Each subset F F F F F inFF \in \mathcal{F} contains exactly three elements from X X XX and each element in X X XX is contained in exactly three subsets F F F F F inFF \in \mathcal{F}.
Question: Is there is a subfamily F F F F F^(')subeF\mathcal{F}^\prime \subseteq \mathcal{F} such that every element in X X XX is contained in exactly one subset in F F F^(')\mathcal{F}^\prime?
To proof that f CSR f CSR f^("CSR")f^{\text{CSR}}-DGCAI is NP-hard, we now show a reduction from RX3C to f CSR f CSR f^("CSR")f^{\text{CSR}}-DGCAI (cf. Erdélyi et al.[7:2] Theorem 5). Given a RX3C-instance ( X , F ) ( X , F ) (X,F)(X, \mathcal{F}), we construct an equivalent instance of f CSR f CSR f^("CSR")f^{\text{CSR}}-DGCAI:
We introduce one individual a x a x a_(x)a_x for each element x X x X x in Xx \in X and let N X = { a x : x X } N X = { a x : x X } N_(X)={a_(x):x in X}N_X = \{a_x : x \in X\}. We also introduce one individual a F a F a_(F)a_F for each subset F F F F F inFF \in \mathcal{F} and let N F = { a F : F F } N F = { a F : F F } N_(F)={a_(F):F inF}N_\mathcal{F} = \{a_F : F \in \mathcal{F}\}. We then let N = N X N F N = N X N F N=N_(X)uuN_(F)N = N_X \cup N_\mathcal{F} and define the profile φ φ varphi\varphi over N N NN as follows:
  • All individuals in N X N X N_(X)N_X qualify all individuals in N X N X N_(X)N_X.
  • For each individual a x N X a x N X a_(x)inN_(X)a_x \in N_X and each individual a F N F a F N F a_(F)inN_(F)a_F \in N_\mathcal{F}, we let a F a F a_(F)a_F qualify a x a x a_(x)a_x if and only if x F x F x!in Fx \not\in F.
  • For all pairs of individuals ( a , a ) N × N ( a , a ) N × N (a,a^('))in N xx N(a, a^\prime) \in N \times N not defined above, we let a a aa disqualify a a a^(')a^\prime.
Finally, we set A = T = N X A = T = N X A^(-)=T=N_(X)A^- = T = N_X and = m = m ℓ=m\ell=m.
We now claim that there exists a successful bribery of cost at most \ell in the constructed instance if and only if there exists an exact 3-set cover for X X XX in F F F\mathcal{F}.
( =>\Rightarrow) Assume that F F F F F^(')subeF\mathcal{F}^\prime \subseteq \mathcal{F} is an exact 3-set cover for X X XX. We let U = { a F N F : F F } U = { a F N F : F F } U={a_(F)inN_(F):F inF^(')}U = \{ a_F \in N_{\mathcal{F}} : F \in \mathcal{F}^\prime \} and add U U UU to the set of individuals. Because F F F^(')\mathcal{F}^\prime is an exact 3-set cover for X X XX, every individual a x N X a x N X a_(x)inN_(X)a_x \in N_X is disqualified by at least one individual in U U UU. Thus, there is now no individual who is qualified by everyone, so the initial set of socially qualified individuals K 0 C ( N X U , φ ) K 0 C ( N X U , φ ) K_(0)^("C")(N_(X)uu U,varphi)K^{\text{C}}_0(N_X \cup U, \varphi) is empty. From this, it follows that all individuals in A A A^(-)A^- are now socially disqualified.
( lArr\Leftarrow) Assume we are given a subset U N T U N T U sube N\\TU \subseteq N \setminus T consisting of at most = m = m ℓ=m\ell = m individuals such that all individuals in A A A^(-)A^- become socially disqualified after adding U U UU to the set of individuals. By construction, for each individual a x N X a x N X a_(x)inN_(X)a_x \in N_X, there must be at least one individual in U U UU who disqualifies a x a x a_(x)a_x. This implies that { F F : a F U } { F F : a F U } {F inF:a_(F)in U}\{ F \in \mathcal{F} : a_F \in U \} is an exact 3-set cover for X X XX.
This concludes the proof of the NP-hardness of f CSR f CSR f^("CSR")f^{\text{CSR}}-Destructive Group Control by Adding Individuals.

3.3. Exact Group Control and Bribery

Next, we turn to manipulative attacks where the attacker has an exact objective, i.e. they can precisely specify for each individual whether they should be socially qualified or not. The results for the exact group control problems are from Junker[10], and the results for bribery and microbribery are by Boehmer et al.[8:2].
Table [4] lists all the known complexity results for exact group control and bribery.
Consent rules f ( s , t ) f ( s , t ) f^((s,t))f^{(s, t)} f CSR f CSR f^("CSR")f^{\text{CSR}} f LSR f LSR f^("LSR")f^{\text{LSR}}
s = 1 s = 1 s=1s=1 s 2 s 2 s >= 2s \geq 2
t = 1 t = 1 t=1t=1 t 2 t 2 t >= 2t \geq 2 t = 1 t = 1 t=1t=1 t 2 t 2 t >= 2t \geq 2
EGCAI I I if A + A + A^(+)!=O/A^+ \neq \emptyset (NP-h else) I if A A A^(-)!=O/A^- \neq \emptyset (NP-h else) NP-h NP-h I if A A A^(-)!=O/A^- \neq \emptyset (NP-h else)
EGCPI I I I if A + A + A^(+)!=O/A^+ \neq \emptyset NP-h ? I
EGB P NP-h NP-h NP-h P P
EGMB P P P P P P
Table 4: A summary of the known complexity results for exact group control and bribery. In the table, "P" stands for "polynomial-time solvable", "NP-h" stands for "NP-hard", "I" stands for "immune", and "?" means that the complexity of the problem is open.
Notably, the NP-hardness of f CSR f CSR f^("CSR")f^{\text{CSR}}-Exact Group Control by Adding Individuals (EGCAI) follows directly from the NP-hardness of f CSR f CSR f^("CSR")f^{\text{CSR}}-Destructive Group Control by Adding Individuals (DGCAI) which we have already seen in the previous section. This is because the DGCAI-instances constructed in the reduction have the destructive target set defined as A = T A = T A^(-)=TA^- = T, i.e. the objective of the attacker is to make all individuals in T T TT socially disqualified. Hence, the NP-hardness also holds when the attacker has an exact objective.

3.4. General Group Control and Bribery

Finally, we now consider the most general form of group control and bribery problems (sometimes referred to as constructive+destructive). The results for the group control problems are from Junker[10:1], and the results for bribery and microbribery are by Boehmer et al.[8:3].
Note that, when A = A = A^(-)=O/A^- = \emptyset (resp. A + = A + = A^(+)=O/A^+ = \emptyset), the problems are simply equivalent to the constructive (resp. destructive) cases. For these problem instances, we refer to Tables [2] and [3]. Below, we only consider instances where both A + A + A^(+)A^+ and A A A^(-)A^- are nonempty and the attacker tries to simultaneously make everyone in A + A + A^(+)A^+ socially qualified and everyone in A A A^(-)A^- socially disqualified. Table [5] lists the known complexity results for group control and bribery restricted to such instances.
Consent rules f ( s , t ) f ( s , t ) f^((s,t))f^{(s, t)} f CSR f CSR f^("CSR")f^{\text{CSR}} f LSR f LSR f^("LSR")f^{\text{LSR}}
s = 1 s = 1 s=1s=1 s = 1 s = 1 s=1s=1 s 2 s 2 s >= 2s \geq 2 s = 2 s = 2 s=2s=2 s = 2 s = 2 s=2s=2 s 3 s 3 s >= 3s \geq 3
t = 1 t = 1 t=1t=1 t 2 t 2 t >= 2t \geq 2 t = 1 t = 1 t=1t=1 t = 2 t = 2 t=2t=2 t 3 t 3 t >= 3t \geq 3 t 2 t 2 t >= 2t \geq 2
GCAI I I I NP-h NP-h NP-h I I
GCDI I I I P NP-h NP-h ? I
GCPI I I I NP-h NP-h NP-h ? I
GB P NP-h NP-h NP-h NP-h NP-h P P
GMB P P P P P P NP-h NP-h
Table 5: A summary of the known complexity results for general group control and bribery. In the table, "P" stands for "polynomial-time solvable", "NP-h" stands for "NP-hard", "I" stands for "immune", and "?" means that the complexity of the problem is open.
As can be seen in the above table, the Group Microbribery problem (GMB) is polynomial-time solvable for all consent rules f ( s , t ) f ( s , t ) f^((s,t))f^{(s, t)} (cf. Boehmer et al.[8:4] Observation 2). The reason for this is that, for each individual a A + a A + a inA^(+)a \in A^+, there are only two ways to make a a aa socially qualified: (1) have a a aa qualify themselves and have at least s 1 s 1 s-1s-1 other individuals also qualify a a aa, or (2) have a a aa disqualify themselves and have less than t 1 t 1 t-1t-1 other individuals disqualify a a aa. Both scenarios lead to the desired outcome of making a a aa socially qualified, so we simply pick the one that requires less bribes. Likewise, for each individual a A a A a inA^(-)a \in A^-, there are only two ways to make a a aa socially disqualified: (1) have a a aa disqualify themselves and have at least t 1 t 1 t-1t-1 other individuals also disqualify a a aa, or (2) have a a aa qualify themselves and have less than s 1 s 1 s-1s-1 other individuals qualify a a aa. Again, both scenarios lead to the desired outcome of making a a aa socially disqualified, so we simply pick the one that requires less bribes. Overall, the f ( s , t ) f ( s , t ) f^((s,t))f^{(s, t)}-GMB problem can be solved in polynomial time with this approach.

4. Conclusion

In this paper, we have provided an introduction to manipulative attacks in group identification. We have listed all the currently known computational complexity results for the various problems and social rules. We have also given an insight into the approaches used to proof some of these results.
The study of manipulative attacks in group identification remains a hot topic in research. There are still some open cases (see the "?" entries in the tables above), and several papers with new findings have only recently been published[11][12].

5. References


  1. Douglas Brent West. "Introduction to graph theory". Prentice-Hall (2000). ↩︎
  2. Ding-Zhu Du, Ker-I Ko. "Theory of computational complexity". John Wiley & Sons (2011). ↩︎
  3. Dov Samet and David Schmeidler. "Between liberalism and democracy". In: Journal of Economic Theory 110.2 (2003), pp. 213–233. ↩︎
  4. Dinko Dimitrov. "The social choice approach to group identification". In: Consensual Processes. Springer (2011), pp. 123–134. ↩︎
  5. Alan D. Miller. "Group identification". In: Games and Economic Behavior 63.1 (2008), pp. 188–202. ↩︎
  6. Yongjie Yang and Dinko Dimitrov. "How hard is it to control a group?" In: Autonomous Agents and Multi-Agent Systems 32.5 (2018), pp. 672–692. ↩︎ ↩︎
  7. Gábor Erdélyi, Christian Reger, and Yongjie Yang. "The complexity of bribery and control in group identification". In: Autonomous Agents and Multi-Agent Systems 34.1 (2020), pp. 1–31. ↩︎ ↩︎ ↩︎
  8. Niclas Boehmer, Robert Bredereck, Dušan Knop, and Junjie Luo. "Fine-grained view on bribery for group identification". In: Proceedings of the 29th International Joint Conference on Artificial Intelligence (2020), pp. 67–73. ↩︎ ↩︎ ↩︎ ↩︎ ↩︎
  9. Teofilo F. Gonzalez. "Clustering to minimize the maximum intercluster distance". In: Theoretical Computer Science 38 (1985), pp. 293–306. ↩︎
  10. Emil Junker. "Manipulative attacks and group identification". In: arXiv preprint arXiv:2203.16151 [cs.GT] (2022). ↩︎ ↩︎
  11. Niclas Boehmer, Robert Bredereck, Dušan Knop, and Junjie Luo. "Finding small multi-demand set covers with ubiquitous elements and large sets is fixed-parameter tractable". In: arXiv preprint arXiv:2104.10124 [cs.DS] (2021). ↩︎
  12. Yongjie Yang and Dinko Dimitrov. "Group control for procedural rules: parameterized complexity and consecutive domains". In: arXiv preprint arXiv:2203.16872 [cs.GT] (2022). ↩︎

Recommended for you

Weihua He
Spiking Neural Network : Towards Brain-inspired Computing
Spiking Neural Network : Towards Brain-inspired Computing
A brief introduction and discussion of the base of brain-inspired computing, spiking neural network (SNN).
9 points
1 issues