March 25, 2024, 4:11 a.m. | Jacek Szybowski, Konrad Ku{\l}akowski, Jiri Mazurek, Sebastian Ernst

cs.CR updates on arXiv.org arxiv.org

arXiv:2403.14885v1 Announce Type: cross
Abstract: Abstract Like electoral systems, decision-making methods are also vulnerable to manipulation by decision-makers. The ability to effectively defend against such threats can only come from thoroughly understanding the manipulation mechanisms. In the presented article, we show two algorithms that can be used to launch a manipulation attack. They allow for equating the weights of two selected alternatives in the pairwise comparison method and, consequently, choosing a leader. The theoretical considerations are accompanied by a Monte …

algorithms article arxiv attack can comparisons cs.ai cs.cr cs.cy cs.dm decision effectively launch leader makers making manipulation systems threats understanding vulnerable

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Lead Technical Product Manager - Threat Protection

@ Mastercard | Remote - United Kingdom

Data Privacy Officer

@ Banco Popular | San Juan, PR

GRC Security Program Manager

@ Meta | Bellevue, WA | Menlo Park, CA | Washington, DC | New York City

Cyber Security Engineer

@ ASSYSTEM | Warrington, United Kingdom

Privacy Engineer, Technical Audit

@ Meta | Menlo Park, CA