# The complexity of manipulative attacks in nearly single-peaked electorates

@article{Faliszewski2011TheCO, title={The complexity of manipulative attacks in nearly single-peaked electorates}, author={Piotr Faliszewski and Edith Hemaspaandra and Lane A. Hemaspaandra}, journal={ArXiv}, year={2011}, volume={abs/1105.5032} }

Many electoral bribery, control, and manipulation problems (which we will refer to in general as "manipulative actions" problems) are NP-hard in the general case. It has recently been noted that many of these problems fall into polynomial time if the electorate is single-peaked (i.e., is polarized along some axis/issue). However, real-world electorates are not truly single-peaked. There are usually some mavericks, and so real-world electorates tend to merely be nearly single-peaked. This paper…

## 93 Citations

### Computational Aspects of Nearly Single-Peaked Electorates

- Computer ScienceAAAI
- 2013

It is proved that determining whether a given profile is nearly single-peaked is NP-complete in many cases, and several new distance measures regarding single- peakedness are introduced.

### Reinstating Combinatorial Protections for Manipulation and Bribery in Single-Peaked and Nearly Single-Peaked Electorates

- EconomicsAAAI
- 2016

In single- peaked and nearly single-peaked electorates, if voters are allowed to submit top-truncated ballots, then the complexity of manipulation and bribery for many voting rules increases from being in P to being NP-complete.

### The Complexity of Nearly Single-Peaked Consistency 1

- Computer Science
- 2012

It is proved that determining whether a given profile is nearly single-peaked is in many cases NPcomplete, and the relations between several notions of nearly singlepeakedness are explored.

### Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates

- Computer ScienceAAAI
- 2010

For voters who follow the most central political-science model of electorates — single-peaked preferences — those protections vanish, and it is shown that NP-hard bribery problems — including those for Kemeny and Llull elections- — fall to polynomial time.

### Computational aspects of strategic behaviour in elections with top-truncated ballots

- Computer ScienceAutonomous Agents and Multi-Agent Systems
- 2017

This paper addresses the question of how hard it is to manipulate elections when the voters specify only top-truncated ballots, and shows how, for many voting protocols, allowing top- Truncated voting reimposes the NP-hardness shields that normally vanish in electorates that are single-peaked.

### Multimode Control Attacks on Elections

- Computer ScienceIJCAI
- 2009

This paper model and study the case in which the attacker launches a multipronged (i.e., multimode) attack, and proves that for various election systems even such concerted, flexible attacks can be perfectly planned in deterministic polynomial time.

### Challenges to complexity shields that are supposed to protect elections against manipulation and control: a survey

- Computer ScienceAnnals of Mathematics and Artificial Intelligence
- 2013

This work surveys and discusses some recent results on challenges to complexity results for manipulation and control, including typical-case analyses and experiments, fixed-parameter tractability, domain restrictions, and approximability.

### On the Complexity of Borda Control in Single-Peaked Elections

- MathematicsAAMAS
- 2017

It is proved for the first time that constructive control by adding/deleting votes/candidates for Borda are NP-hard even in single-peaked elections, and polynomial-time solvable insingle-dived elections, which are elections obtained from single- peaked elections by reversing voters' preferences.

### Manipulation of k-Approval in Nearly Single-Peaked Electorates

- EconomicsADT
- 2015

The complexity of manipulation for the k-approval and veto families of voting rules in nearly single-peaked elections is investigated, exploring the limits where the manipulation problem turns from $$\mathrm{P}$$ to$$-hard.

### Election-Attack Complexity for More Natural Models

- Computer Science
- 2017

A model of electoral control in the setting where some of the voters act strategically (i.e., are manipulators) is introduced, and both the case where the agent controlling the election and the manipulators share a goal, and the cases where they have competing goals are considered.

## References

SHOWING 1-10 OF 77 REFERENCES

### The Complexity of Nearly Single-Peaked Consistency 1

- Computer Science
- 2012

It is proved that determining whether a given profile is nearly single-peaked is in many cases NPcomplete, and the relations between several notions of nearly singlepeakedness are explored.

### Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates

- Computer ScienceAAAI
- 2010

For voters who follow the most central political-science model of electorates — single-peaked preferences — those protections vanish, and it is shown that NP-hard bribery problems — including those for Kemeny and Llull elections- — fall to polynomial time.

### Junta distributions and the average-case complexity of manipulating elections

- Computer ScienceAAMAS '06
- 2006

It is demonstrated that NP-hard manipulations may be tractable in the average-case, and a family of important voting protocols is susceptible to manipulation by coalitions, when the number of candidates is constant.

### Multimode Control Attacks on Elections

- Computer ScienceIJCAI
- 2009

This paper model and study the case in which the attacker launches a multipronged (i.e., multimode) attack, and proves that for various election systems even such concerted, flexible attacks can be perfectly planned in deterministic polynomial time.

### Challenges to complexity shields that are supposed to protect elections against manipulation and control: a survey

- Computer ScienceAnnals of Mathematics and Artificial Intelligence
- 2013

This work surveys and discusses some recent results on challenges to complexity results for manipulation and control, including typical-case analyses and experiments, fixed-parameter tractability, domain restrictions, and approximability.

### How Hard Is Bribery in Elections?

- MathematicsJ. Artif. Intell. Res.
- 2009

This work obtains both polynomial-time bribery algorithms and proofs of the intractability of bribery, and results show that the complexity of bribery is extremely sensitive to the setting.

### Where Are the Really Hard Manipulation Problems? The Phase Transition in Manipulating the Veto Rule

- EconomicsIJCAI
- 2009

It is argued that manipulation of the veto rule is asymptotically easy for many independent and identically distributed votes even when the coalition of manipulators is critical in size, and it is shown that a rescaled probability curve displays a simple and universal form independent of the size of the problem.

### When are elections with few candidates hard to manipulate?

- EconomicsJ. ACM
- 2007

This article characterize the exact number of candidates for which manipulation becomes hard for the plurality, Borda, STV, Copeland, maximin, veto, plurality with runoff, regular cup, and randomized cup protocols and shows that for simpler manipulation problems, manipulation cannot be hard with few candidates.

### Control Complexity in Fallback Voting

- EconomicsCATS
- 2010

It is shown that fallback voting, an election system combining approval with majority voting, is resistant to each of the 14 common types of candidate control, and also to three types of voter control.