# How Many Vote Operations Are Needed to Manipulate A Voting System?

In this paper, we propose a framework to study a general class of strategic behavior in voting, which we call vote operations. We prove the following theorem: if we fix the number of alternatives, generate n votes i.i.d. according to a distribution π, and let n go to infinity, then for any ϵ >0, with probability at least 1-ϵ, the minimum number of operations that are needed for the strategic individual to achieve her goal falls into one of the following four categories: (1) 0, (2) Θ(√(n)), (3) Θ(n), and (4) ∞. This theorem holds for any set of vote operations, any individual vote distribution π, and any integer generalized scoring rule, which includes (but is not limited to) almost all commonly studied voting rules, e.g., approval voting, all positional scoring rules (including Borda, plurality, and veto), plurality with runoff, Bucklin, Copeland, maximin, STV, and ranked pairs. We also show that many well-studied types of strategic behavior fall under our framework, including (but not limited to) constructive/destructive manipulation, bribery, and control by adding/deleting votes, margin of victory, and minimum manipulation coalition size. Therefore, our main theorem naturally applies to these problems.

## Authors

• 46 publications
• ### The Computational Impact of Partial Votes on Strategic Voting

In many real world elections, agents are not required to rank all candid...
05/28/2014 ∙ by Nina Narodytska, et al. ∙ 0

• ### Cognitive Hierarchy and Voting Manipulation

By the Gibbard--Satterthwaite theorem, every reasonable voting rule for ...
07/26/2017 ∙ by Edith Elkind, et al. ∙ 0

• ### Strategic Voting in the Context of Negotiating Teams

A negotiating team is a group of two or more agents who join together as...
07/29/2021 ∙ by Leora Schmerler, et al. ∙ 0

• ### Complexity Results for Manipulation, Bribery and Control of the Kemeny Procedure in Judgment Aggregation

We study the computational complexity of several scenarios of strategic ...
08/08/2016 ∙ by Ronald de Haan, et al. ∙ 0

• ### A Phase Transition in Arrow's Theorem

Arrow's Theorem concerns a fundamental problem in social choice theory: ...
04/27/2020 ∙ by Frederic Koehler, et al. ∙ 0

• ### On the Complexity of Destructive Bribery in Approval-Based Multi-winner Voting

A variety of constructive manipulation, control, and bribery for approva...
02/03/2020 ∙ by Yongjie Yang, et al. ∙ 0

• ### Estimating the Margin of Victory of an Election using Sampling

The margin of victory of an election is a useful measure to capture the ...
05/04/2015 ∙ by Palash Dey, et al. ∙ 0

##### This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

## 1 Introduction

Voting is a popular method used to aggregate voters’ preferences to make a joint decision. Recently, voting has been used in many fields of artificial intelligence, for example in multi-agent systems Ephrati and Rosenschein (1991), recommender systems Ghosh et al. (1999); Pennock et al. (2000), and web-search engines Dwork et al. (2001). One of the most desired properties for voting rules is strategy-proofness, that is, no voter has incentive to misreport her preferences to obtain a better outcome of the election. Unfortunately, strategy-proofness is not compatible with some other desired properties, due to the celebrated Gibbard-Satterthwaite theorem Gibbard (1973); Satterthwaite (1975), which states that when there are at least three alternatives, no strategy-proof voting rule satisfies the following two natural properties: non-imposition (every alternative can win) and non-dictatorship (no voter is a dictator, whose top ranked alternative is always selected to be the winner).

Even though manipulation is inevitable, researchers have set out to investigate whether computational complexity can serve as a barrier against various types of strategic behavior, including manipulation. The idea is, if we can prove that it is computationally too costly for a strategic individual to find a beneficial operation, she may give up doing so. Initiated by Bartholdi, Tovey, and Trick Bartholdi et al. (1989), a fair amount of work has been done to characterize the computational complexity of various types of strategic behavior111See Faliszewski and Procaccia (2010); Faliszewski et al. (2010); Rothe and Schend (2012) for recent surveys., including the following.

Manipulation: a voter or a coalition of voters cast false vote(s) to change the winner (and the new winner is more preferred).

Bribery: a strategic individual changes some votes by bribing the voters to make the winner preferable to her Faliszewski et al. (2009). The bribery problem is closely related to the problem of computing the margin of victory Cary (2011); Magrino et al. (2011); Xia (2012).

Control: a strategic individual adds or deletes votes to make the winner more preferable to her Bartholdi et al. (1992).

Most previous results studying “using computational complexity as a barrier against strategic behavior” conduct worst-case analyses of computational complexity. Recently, an increasing number of results show that manipulation, as a particular type of strategic behavior, is typically not hard to compute. One direction, mainly pursued in the theoretical computer science community, is to obtain a quantitative version of the Gibbard-Satterthwaite theorem, showing that for any given voting rule that is “far” enough from any dictatorships, an instance of manipulation can be found easily with high probability. This line of research was initiated by Friedgut, Kalai, and Nisan Friedgut et al. (2008), where they proved the theorem for alternatives and neutral voting rules. The theorem was extended to an arbitrary number of alternatives by Isaksson, Kindler, and Mossel Isaksson et al. (2010), and finally, the neutrality constraint was removed by Mossel and Racz Mossel and Racz (2012). Other extensions include Dobzinski and Procaccia Dobzinski and Procaccia (2008) and Xia and Conitzer Xia and Conitzer (2008b).

Another line of research is to characterize the “frequency of manipulability”, defined as the probability for a randomly generated preference-profile to be manipulable by a group of manipulators, where the non-manipulators’ votes are generated i.i.d. according to some distribution (for example, the uniform distribution over all possible types of preferences). Peleg

Peleg (1979), Baharad and Neeman Baharad and Neeman (2002), and Slinko Slinko (2002, 2004) studied the asymptotic frequency of manipulability for positional scoring rules when the non-manipulators’ votes are drawn i.i.d. uniformly at random. Procaccia and Rosenschein Procaccia and Rosenschein (2007) showed that for positional scoring rules, when the non-manipulators’ votes are drawn i.i.d. according to some distribution that satisfies some natural conditions, if the number of manipulators is , where is the number of non-manipulators, then the probability that the manipulators can succeed goes to as goes to infinity; if the number of manipulator is , then the probability that the manipulators can succeed goes to .

This dichotomy theorem was generalized to a class of voting rules called generalized scoring rules (GSRs) by Xia and Conitzer Xia and Conitzer (2008a). A GSR is defined by two functions , where

maps each vote to a vector in multidimensional space, called a

generalized scoring vector (the dimensionality of the space is not necessarily the same as the number of alternatives). Given a profile , let total generalized scoring vector be the sum of for all votes in . Then, selects the winner based on the total preorder of the components of the total generalized scoring vector. We call a GSR an integer GSR, if the components of all generalized scoring vectors are integers. (Integer) GSRs are a general class of voting rules. One evidence is that many commonly studied voting rules are integer GSRs, including (but not limited to) approval voting, all positional scoring rules (which include Borda, plurality, and veto), plurality with runoff, Bucklin, Copeland, maximin, STV, and ranked pairs.222The definition of these commonly studied voting rules can be found in, e.g., Xia and Conitzer (2008a). In this paper, we define GSRs as voting rules where the inputs are profiles of linear orders. GSRs can be easily generalized to include other types of voting rules where the inputs are not necessarily linear orders, for example, approval voting. As another evidence, GSRs admit a natural axiomatic characterization Xia and Conitzer (2009), which also suggests that GSRs are equivalent to hyperplane rules Mossel et al. (2012). The knife-edge case of was studied experimentally for STV and veto in Walsh (2009)

, showing that the probability for the manipulators to succeed has a smooth phase transition. More recently,

Mossel et al. (2012) extends the dichotomy theorem to all anonymous voting rules for distributions that satisfy some mild conditions, and theoretically proved that for all generalized scoring rules, for the knife-edge case, the probability that the manipulators can achieve their goal is continuously differentiable, which suggests a smooth phase transition.

While most of the aforementioned results are about manipulation, in this paper, we focus the optimization variants of various types of strategic behavior, including manipulation, bribery, and control. Despite being natural, to the best of our knowledge, such optimization variants have been investigated for only three types of strategic behavior. The first is  the unweighted coalitional optimization (UCO) problem, where we are asked to compute the minimum number of manipulators who can make a given alternative win Zuckerman et al. (2009). Approximation algorithms have been proposed for UCO for specific voting systems, including positional scoring rules and maximin Zuckerman et al. (2009); Xia et al. (2010); Zuckerman et al. (2011). The second is the margin of victory problem, where we are asked to compute the smallest number of voters who can change their votes to change the winner Magrino et al. (2011); Cary (2011); Xia (2012). The third is the minimum manipulation coalition size problem, which is similar to the margin of victory, except that all voters who change their votes must prefer the new winner to the old winner Pritchard and Wilson (2009).

### 1.1 Our Contributions

In this paper, we introduce a unified framework to study a class of strategic behavior for generalized scoring rules, which we call vote operations. In our framework, a strategic individual seeks to change the winner by applying some operations, which are modeled as vectors in a multidimensional space. We study three goals of the strategic individual: (1) making a favored alternative win, called constructive vote operation (CVO), (2) making a disfavored alternative lose, called destructive vote operation (DVO), and (3) change the winner of the election, called change-winner vote operation (CWVO). The framework will be formally defined in Section 3. This is our main conceptual contribution.

Our main technical contribution is the following asymptotical characterization of the minimum number of operations that are needed for the strategic individual to achieve her goal.

Theorem 5 (informally put) Fix the number of alternatives and the set of vote operations. For any integer generalized scoring rule and any distribution over votes, we generate votes i.i.d. according to and let go to infinity. Then, for any and any , with probability at least , the minimum number of operations that are necessary for the strategic individual to achieve VO falls into one of the following four categories: (1) , (2) , (3) , and (4) .

More informally, Theorem 5 states that in large elections, to achieve a specific goal (one of the three goals described above), with probability that can be infinitely close to the strategic individual needs to either do nothing (the goal is already achieved), apply vote operations, apply vote operations, or the goal cannot be achieve no matter how many vote operations are applied. This characterization holds for any integer generalized scoring rule, any set of vote operations, and any distribution for individual votes.

The proof of Theorem 5

is based on the Central Limit Theorem and on sensitivity analyses for the integer linear programmings (ILPs). It works as follows. We will formulate each of the strategic individual’s three goals as a set of ILPs in Section

4. By applying Central Limit Theorem, we show that with probability that goes to the random generated preference-profile satisfies a desired property. Then, for each such preference-profile we apply the sensitivity analyses in Cook et al. (1986) to show that with high probability the number of operations that are necessary is either , , , or .

While Theorem 5 may look quite abstract, we show later in the paper that many well-studied types of strategic behavior fall under our vote operation framework, including constructive/destructive manipulation, bribery, and control by adding/deleting votes, margin of victory, and minimum manipulation coalition size.333We defer the definition of these types of strategic behavior to Section 6. Therefore, we naturally obtain corollaries of Theorem 5 for these types of strategic behavior. The theorem also applies to other types of strategic behavior, for example the mixture of any types mentioned above, which is known as multimode control attacks Faliszewski et al. (2011).

### 1.2 Related Work and Discussion

Our main theorem applies to any integer generalized scoring rule for destructive manipulation, constructive and destructive bribery and control by adding/deleting votes. To the best of our knowledge, no similar results were obtained even for specific voting rules for these types of strategic behavior. Three previous papers obtained similar results for manipulation, margin of victory, and minimum manipulation coalition size. The applications of our main theorem to these types of strategic behavior are slightly weaker, but we stress that our main theorem is significantly more general.

Three related papers. First, the dichotomy theorem in Xia and Conitzer (2008a) implies that, (informally) when the votes are drawn i.i.d. from some distribution, with probability that goes to the solution to constructive and destructive UCO is either or approximately for some favored alternatives. However, this result only works for the UCO problem and some distributions over the votes.

Second, it was proved in Xia (2012) that for any non-redundant generalized scoring rules that satisfy a continuity condition, when the votes are drawn i.i.d. and we let the number of voters go to infinity, either with probability that can be arbitrarily close to the margin of victory is , or with probability that can be arbitrarily close to the margin of victory is . It is easy to show that for non-redundant voting rules, the margin of victory is never or . Though it was shown in Xia (2012) that many commonly studied voting rules are GSRs that satisfy such continuity condition, in general it is not clear how restrictive the continuity condition is. More importantly, the result only works for the margin of victory problem.

Third, in Pritchard and Wilson (2009), the authors investigated the distribution over the minimum manipulation coalition size for positional scoring rules when the votes are drawn i.i.d. from the uniform distribution. However, it is not clear how their techniques can be extended beyond the uniform distributions and positional scoring rules, which are a very special case of generalized scoring rules. Moreover, the paper only focused on the minimum manipulation coalition size problem.

Our results has both negative and positive implications. On the negative side, our results provide yet another evidence that computational complexity is not a strong barrier against strategic behavior, because the strategic individual now has some information about the number of operations that are needed, without spending any computational cost or even without looking at the input instance. Although the estimation of our theorem may not be very precise (because we do not know which of the four cases a given instance belongs to), such estimation may be explored to designing effective algorithms that facilitate strategic behavior. On the positive side, this easiness of computation is not always a bad thing: sometimes we want to do such computation in order to test how robust a given preference-profile is. For example, computing the margin of victory is an important component in designing novel

risk-limiting audit methods Magrino et al. (2011); Cary (2011); Xia (2012); Stark (2008a, b, 2009b, 2009a, 2010).

While being quite general, our results have two main limitations. First, they are asymptotical results, where we fix the number of alternatives and let the number of voters go to infinity. We do not know the convergence rate, or equivalently, how many voters are needed for the observation to hold. In fact, this is a standard setting in previous work, especially in the studies of “frequency of manipulability”. We feel that our results work well in settings where there are small number of alternatives and large number of voters, e.g., political elections. Second, our results show that with high probability one of the four cases holds (, , , ), but we do not know which case holds more often. We will briefly discuss this issue in B. It is possible to refine our study for specific voting rules and specific types of strategic behavior that fall under our framework, which we leave as future work.

### 1.3 Structure of the Paper

After recalling basic definitions of voting and generalized scoring rules, we present the framework in Section 3, where we define vote operations as well as the strategic individual’s objectives. Then, in Section 4 we formulate the optimization problem for the strategic individual as a set of integer linear programmings (ILPs). The main theorem will be presented in Section 5. To show the wide application of the framework and the main theorem, we show that many commonly studied types of strategic behavior can be modeled as vote operations for generalized scoring rules in Section 6, which means that our main theorem naturally applies to these cases. We add some discussions and point out some future directions in Section 7 and B. Some proofs are relegated to A.

## 2 Preliminaries

Let denote the set of alternatives (or candidates), . We assume strict preference orders. That is, a vote is a linear order over . The set of all linear orders over is denoted by . A preference-profile is a collection of votes for some , that is, . Let . A voting rule is a mapping that assigns to each preference-profile a single winner. That is, . Throughout the paper, we let denote the number of votes and let denote the number of alternatives.

We now recall the definition of generalized scoring rules (GSRs) Xia and Conitzer (2008a). For any , let . A total preorder (preorder for short) is a reflexive, transitive, and total relation. Let denote the set of all preorders over . For any , we let denote the preorder over where if and only if . That is, the -th component of is as large as the -th component of . For any preorder , if and , then we write . Each preorder naturally induces a (partial) strict order , where if and only if and .

###### Definition

Let , and . and determine a generalized scoring rule (GSR) as follows. For any preference-profile , abusing the notation we let , and let . We say that is of order . If holds for all , then we call an integer GSR.

For any , is called a generalized scoring vector, is called a total generalized scoring vector, and is called the induced preorder of . The class of integer GSRs is equivalent to the class of rational GSRs, where the components of each generalized scoring vector is in , because for any , .

Almost all commonly studied voting rules are generalized scoring rules, including (but not limited to) approval voting, Bucklin, Copeland, maximin, plurality with runoff, ranked pairs, and multi-stage voting rules that use GSRs in each stage to eliminate alternatives (including Nanson’s and Baldwin’s rule). As an example, we recall the proof from Xia and Conitzer (2008a) that the single transferable vote (STV) rule (a.k.a. instant-runoff voting or alternative vote for single-winner elections) is an integer generalized scoring rule.

###### Example

STV selects the winner in rounds. In each round, the alternative that gets the lowest plurality score (the number of times that the alternative is ranked in the top position) drops out, and is removed from all of the votes (so that votes for this alternative transfer to another alternative in the next round). Ties are broken alphabetically. The last-remaining alternative is the winner.

To see that STV is an integer GSR, we will use generalized scoring vectors with many components. For every proper subset of alternatives, for every alternative outside of , there is a component in the vector that contains the number of times that is ranked first if all alternatives in are removed. Let

; the components are indexed by , where is a proper subset of and .

, if after removing from , is at the top; otherwise, let .

selects the winners based on as follows. In the first round, let be the index such that is ranked the lowest in among all (if there are multiple such ’s, then we break ties alphabetically to select the least-preferred one). Let . Then, for any , define recursively as follows: , where is the index such that is ranked the lowest in among all ; finally, the winner is the unique alternative in .

GSRs admit a natural axiomatic characterization Xia and Conitzer (2009). That is, GSRs are the class of voting rules that satisfy anonymity, homogeneity, and finite local consistency. Anonymity says that the winner does not depend on the name of the voters, homogeneity says that if we duplicate the preference-profile multiple times, then the winner does not change, and finite local consistency is an approximation to the well-studied consistency axiom. Not all voting rules are GSRs, for example, Dodgson’s rule is not a GSR because it violates homogeneity Brandt (2009)

, and the following skewed majority rule is also not a GSR because it also violates homogeneity.

###### Example

For any , the -majority rule is defined for two alternatives as follows: is the winner if and only if the number of voters who prefer is more than the number of voters who prefer by at least .

Admittedly, these -majority rules are quite artificial. Later in this paper we will see that the observation made for GSRs in our main theorem (Theorem 5) does not hold for -majority rules for any . Notice that these rules satisfy anonymity, which means that the observation made in Theorem 5 cannot be extended to all anonymous voting rules.

## 3 Vote Operations

All types of strategic behavior mentioned in the introduction share the following common characteristics. The strategic individual (who can be a group of manipulators, a briber, or a controller, etc.) changes the winner by changing the votes in the preference-profile. Therefore, for generalized scoring rules, any such an operation can be uniquely represented by changes in the total generalized scoring vector. This is in contrast to some other types of strategic behavior where the strategic individual changes the set of alternatives or the voting rule Bartholdi et al. (1992); Tideman (1987).

In this section, we first define the set of operations the strategic individual can apply, then define her goals. Given a generalized scoring rule of order , we model the strategic behavior, called vote operations, as a set of vectors, each of which has elements, representing the changes made to the total generalized scoring vector if the strategic individual applies this operation. We focus on integer vectors in this paper.

###### Definition

Given a GSR of order , let denote the vote operations, where for each , is a column vector that represents the changes made to the generalized scoring vector by applying the -th vote operation. For each , let denote the -th row of .

We will show examples of these vote operations for some well-studied types of strategic behavior in Section 6. Given the set of available operations , the strategic individual’s behavior is characterized by a vector , where is a column vector and for each , represents the number of -th operation (corresponding to ) that she applies. Let denote the total number of operations in , which is the L-norm of . It follows that is the change in the total generalized scoring vector introduced by the strategic individual, where for any , is the change in the -th component.

Next, we give definitions of the strategic individual’s three goals and the corresponding computational problems studied in this paper.

###### Definition

In the constructive vote operation (CVO) problem, we are given a generalized scoring rule , a preference-profile , a favored alternative , and a set of vote operations , and we are asked to compute the smallest number , denoted by , such that there exists a vector with and . If such does not exist, then we denote .

The destructive vote operation (DVO) problem is defined similarly, where is the disfavored alternative, and we are asked to compute the smallest number , denoted by , such that there exists a vector with and .

In the change-winner vote operation (CWVO) problem, we are not given and we are asked to compute , denoted by .

In CVO, the strategic individual seeks to make win; in DVO, the strategic individual seeks to make lose; and in CWVO, the strategic individual seeks to change the current winner.

For a given instance , CWVO is a special case of DVO, where . We distinguish these two problems because in this paper, the input preference-profiles are generated randomly, so the winners of these preference-profiles might be different. Therefore, when the preference-profiles are randomly generated, the distribution for the solution to DVO does not immediately give us a distribution for the solution to CWVO.

## 4 The ILP Formulation

Let us first put aside the strategic individual’s goal for the moment (i.e., making a favored alternative win, making a disfavored alternative lose, or changing the winner) and focus on the following question: given a preference-profile

and a preorder over the components of the generalized scoring vector, that is, , how many vote manipulations are needed to change the order of the total generalized scoring vector to ? Formally, given a , a preference-profile and , we are interested in .

This can be computed by the following integer linear programming ILP, where represents the th component in , which must be a nonnegative integer. We recall that denotes the -th row vector of .

 min ∥→v∥1 s.t. ∀oi=⊵oj: (Δi−Δj)⋅→v=[f(P)]j−[f(P)]i ∀oi⊳oj: (Δi−Δj)⋅→v≥[f(P)]j−[f(P)]i+1 ∀i: vi≥0

Now, we take the strategic individual’s goal into account. We immediately have the following lemma as a warmup, whose proofs are straightforward and are thus omitted.

###### Lemma

Given a GSR , an alternative , and a preference-profile ,

if and only if there exists such that and LP has an integer solution;

if and only if there exists such that and LP has an integer solution;

if and only if there exists such that and LP has an integer solution. (We do not need the input for this problem.)

Moreover, the solution to each of the three problems is the minimum objective value in all LPs corresponding to the problem. For example, if , then

## 5 The Main Theorem

In this section we prove the main theorem, which states that for any fixed , any generalized scoring rules, and any set of vote operations , if votes are generated i.i.d., then for CVO (respectively, DVO, CWVO), with probability that can be infinitely close to , the solution is either , , , or .

We first present a simple example for the majority rule for two alternatives to show the taste of the proof for a very special case, and then comment on why this idea cannot be extended to GSRs. After the proof of Theorem 5 we will add more comments on the non-triviality of proof.

###### Example

Suppose there are voters, whose votes are drawn i.i.d. from a distribution over all possible votes (i.e., voting for with probability and voting for with probability , w.l.o.g. ). Let (respectively,

) denote random variable that represents the total number of voters for

(respectively, for ). The number of manipulators that are needed to make to win (i.e., the solution to the UCO problem, see Section 6.1 for formal definition) is thus a random variable .444If then no manipulator is needed. Let denote the random variable that takes with probability and takes with probability . It follows that . By the Central Limit Theorem,

converges to a normal distribution with mean

and variance

.

We are interested in usually how large is . Not surprisingly, the answer depends on the distribution . If , then the mean of

is zero, and the probability that it is a few standard deviations away from the mean is small. For example, the probability that its absolute value is larger than

is less than , which means that with probability the solution of UCO is no more than . On the other hand, if , then the mean of is , which means that with high probability the solution of UCO is very close to .

The idea behind the argument in Example 5 can be easily extended to positional scoring rules Procaccia and Rosenschein (2007). However, we do not believe that it can be extended to generalized scoring rules, even for the case of manipulation, for the following two reasons. First, for generalized scoring rules, the components of the generalized scoring vector do not correspond to the “scores” of alternatives. Therefore, having two components tied in the total generalized scoring vector does not mean that two alternatives are tied. Second, the conditions for an alternative to win can be much more complicated than the condition for positional scoring rules, which amounts to requiring that a corresponding component of the total generalized scoring vector is the largest. Therefore, it is not easy to figure out whether the manipulators can achieve their goal by just knowing the asymptotic relationship between the components of the total generalized scoring vector.

###### Theorem

Let be an integer generalized scoring rule, let be a distribution over all linear orders, and let be a set of vote operations. Suppose we fix the number of alternatives, generate votes i.i.d. according to , and let denote the preference-profile. Then, for any alternative , , and any , there exists such that as goes to infinity, the total probability for the following four events sum up to more than : (1) , (2) , (3) , and (4) .

Proof of Theorem 5:  Let , and . We first prove the theorem for CVO, and then show how to adjust the proof for DVO and CWVO. The theorem is proved in the following two steps. Step 1: we show that as goes to infinity, with probability that goes to one we have the following: in a randomly generated , the difference between any pair of components in is either or . Step 2: we apply sensitivity analyses to ILPs that are similar to the ILP given in Section 4 to prove that for any such preference-profile and any , is either , , , or . The idea behind Step 2 is, for any preference-profile , if the difference between a pair of components in is , then we consider this pair of components (not alternatives) to be “almost tied”; if the difference is , then we consider them to be “far away”. Take CVO as an example, we can easily identify the cases where is either (when ) or (by Lemma 4). Then, we will first try to break these “almost tied” pairs by using LPs that are similar to LP introduced in Section 4, and show that if there exists an integer solution , then the objective value is . Otherwise, we have to change the orders between some “far away” pairs by using LP’s, and show that if there exists an integer solution to some LP with , then the objective value is .

Formally, given and , let denote the set of all -vote preference-profiles that satisfy the following two conditions (we recall that ): for any pair ,

1. if then ;

2. if then .

The following lemma was proved in Xia (2012), which follows after the Central Limit Theorem.

###### Lemma

For any , there exists such that .

For any given , in the rest of the proof we fix to be a constant guaranteed by Lemma 5. The next lemma (whose proof is deferred to the appendix) will be frequently used in the rest of the proof.

###### Lemma

Fix an integer matrix . There exists a constant that only depends on , such that if the following LP has an integer solution, then the solution is no more than .

 min∥→x∥1, s.t. A⋅→x≥→b

To prove that with high probability is either , , , or , we introduce the following notation. A preorder is a refinement of another preorder , if extends . That is, . We note that is a refinement of itself. Let denote the strict orders that are in but not in . That is, if and only if and . We define the following LP that is similar to LP defined in Section 4, which will be used to check whether there is a way to break “almost tied” pairs of components to make win. For any preorder and any of its refinement , we define LP as follows.

 min ∥→v∥1 s.t. ∀oi=⊵′oj: (Δi−Δj)⋅→v=[f(P)]j−[f(P)]i ∀(oi,oj)∈(⊵′⊖⊵): (Δi−Δj)⋅→v≥[f(P)]j−[f(P)]i+1 ∀i: vi≥0

LP is defined with a little abuse of notation because some of its constraints depend on (not only the pairwise comparisons in ). This will not cause confusion because we will always indicate in the subscript. We note that there is a constraint in LP for each pair of components with . Therefore, LP is used to find a solution that breaks ties in . It follows that LP has an integer solution if and only if the strategic individual can make the order between any pairs of with to be the one in by applying the -th operation times, and the total number of vote operations is .

The following two claims identify the preference-profiles in for which CVO is and , respectively, whose proofs are deferred to the appendix.

###### Claim

There exists and such that for any , any , if (1) is not the winner for , and (2) there exists a refinement of such that and LP has an integer solution, then .

###### Claim

There exists such that for any , if (1) is not the winner for , (2) there does not exist a refinement of such that LP has an integer solution, and (3) there exists such that and LP has an integer solution, then .

Lastly, for any such that , the only case not covered by Claim 5 and Claim 5 is that there does not exist with such that LP has an integer solution. It follows from Lemma 4 that in this case . We note that in Claim 5 and Claim 5 does not depend on . Let be an arbitrary number that is larger than the two s. This proves the theorem for CVO.

For DVO, we only need to change to in Claim 5, and change to in Claim 5. For CWVO, is never and we only need to change to in Claim 5, and change to in Claim 5.

More comments on the non-triviality of the proof. Lemma 5 has been proved in Xia (2012), whose intuition is quite straightforward and naturally corresponds to a random walk in multidimensional space. However, we did not find an obvious connection between random walk theory and the observation made in Theorem 5. We believe that it is unlikely that an obvious connection exists. One evidence is that the observation made in Theorem 5 does not hold for some voting rules. For example, consider the -majority rule defined in Example 2. It is not hard to see that as goes to infinity, with probability that goes to we have , which is not any of the four cases described in Theorem 5 if . (This implies that for any , -majority is not a generalized scoring rule, which we already know because they do not satisfy homogeneity.) Therefore, the proof of Theorem 5 should involve analyses on the specific structure of GSRs.

The main difficulty in proving Theorem 5 is, for generalized scoring rules we have to handle the cases where some components of the total generalized scoring vector are equivalent. This only happens with negligible probability for the randomly generated preference-profile , but it is not clear how often the strategic individual can make some components equivalent in order to achieve her goal. This is the main reason for us to convert the vote manipulation problem to multiple ILPs and apply Lemma 5 to analyze them.

## 6 Applications of the Main Theorem

In this section we show how to apply Theorem 5 to some well-studied types of strategic behavior, including constructive and destructive unweighted coalitional optimization, bribery and control, and margin of victory and minimum manipulation coalition size. In the sequel, we will use each subsection to define these problems and describe how they fit in our vote operation framework, and how Theorem 5 applies. In the end of the section we present a unified corollary for all these types of strategic behavior.

### 6.1 Unweighted Coalitional Optimization

###### Definition

In a constructive (respectively, destructive) unweighted coalitional optimization (UCO) problem, we are given a voting rule , a preference-profile of the non-manipulators, and a (dis)favored alternative . We are asked to compute the smallest number of manipulators who can cast votes such that (respectively, ).

To see how UCO fits in the vote operation model, we view the group of manipulators as the strategic individual, and each vote cast by a manipulator is a vote operation. Therefore, the set of operations is exactly the set of all generalized scoring vectors . To apply Theorem 5, for constructive UCO we let and for destructive UCO we let .

### 6.2 Bribery

In this paper we are interested in the optimization variant of the bribery problem Faliszewski et al. (2009).

###### Definition

In a constructive (respectively, destructive) opt-bribery problem, we are given a preference-profile and a (dis)favored alternative . We are asked to compute the smallest number such that the strategic individual can change no more than votes such that is the winner (respectively, is not the winner).

To see how opt-bribery falls under the vote operation framework, we view each action of “changing a vote” as a vote operation. Since the strategic individual can only change existing votes in the preference-profile, we define the set of operations to be the difference between the generalized scoring vectors of all votes and the generalized scoring vectors of votes in the support of , that is, . Then, similarly the constructive variant corresponds to CVO and the destructive variant corresponds to DVO. In both cases Theorem 5 cannot be directly applied, because in the ILPs we did not limit the total number of each type of vote operations that can be used by the strategic individual. Nevertheless, we can still prove a similar proposition by taking a closer look at the relationship between CVO (DVO) and opt-bribery as follows: For any preference-profile, the solution to CVO (respectively, DVO) is a lower bound on the solution to constructive (respectively, destructive) opt-bribery, because in CVO and DVO there are no constraints on the number of each type of vote operations. We have the following four cases.

1. If the solution to CVO (DVO) is , then the solution to constructive (destructive) opt-bribery is also .

2. If the solution to CVO (DVO) is , as become large enough, with probability that goes to each type of votes in the support of will appear , which is , times in the randomly generated preference-profile, which means that there are enough votes of each type for the strategic individual to change.

3. If the solution to CVO (DVO) is , then the solution to constructive (destructive) opt-bribery is either (when the strategic individual can change all votes to achieve her goal), or .

4. If the solution to CVO (DVO) is , then the solution to constructive (destructive) opt-bribery is also .

It follows that the observation made in Theorem 5 holds for opt-bribery.

### 6.3 Margin of Victory (MoV)

###### Definition

Given a voting rule and a preference-profile , the margin of victory (MoV) of is the smallest number such that the winner can be changed by changing votes in . In the mov problem, we are given and , and are asked to compute the margin of victory.

For a given instance , mov is equivalent to destructive opt-bribery, where . However, when the input preference-profiles are generated randomly, the winners in these profiles might be different. Therefore, the corollary of Theorem 5 for opt-bribery does not directly imply a similar corollary for mov. This relationship is similar to the relationship between DVO and CWVO.

Despite this difference, the formulation of mov in the vote operation framework is very similar to that of opt-bribery: The set of all operations and the argument to apply Theorem 5 are the same. The only difference is that for mov, we obtain the corollary from the CWVO part of Theorem 5, while the corollary for opt-bribery is obtained from the CVO and DVO parts of Theorem 5.

### 6.4 Minimum Manipulation Coalition Size (MMCS)

The minimum manipulation coalition size (MMCS) problem is similar to mov, except that in MMCS the winner must be improved for all voters who change their votes Pritchard and Wilson (2009).

###### Definition

In an MMCS problem, we are given a voting rule and a preference-profile . We are asked to compute the smallest number such that a coalition of voters can change their votes to change the winner, and all of them prefer the new winner to .

Unlike mov, MMCS falls under the vote operation framework in the following dynamic way. For each preference-profile, suppose is the current winner. For each adversarial , we use as the set of operations. That is, we only allow voters who prefer to to participate in the manipulative coalition. We also replace each of LP and LP by multiple LPs, each of which is indexed by a pair of alternatives and the constraints are generated by using the corresponding set of operations. Then, the corollary for MMCS follows after a similar argument to that of CVO in Theorem 5.

###### Definition

In a constructive (respectively, destructive) optimal control by adding votes (opt-CAV) problem, we are given a preference-profile , a (dis)favored alternative , and a set of additional votes. We are asked to compute the smallest number such that the strategic individual can add votes in such that is the winner (respectively, is not the winner).

For simplicity, we assume that and the votes in are drawn i.i.d. from a distribution . To show how opt-CAV falls under the vote operation model, we let the set of operations to be the generalized scoring vectors of all votes that are in the support of , that is, . Then, the corollary follows from the CVO and DVO parts of Theorem 5 via a similar argument to the argument for opt-bribery.

###### Definition

In a constructive (respectively, destructive) optimal control by deleting votes (opt-CDV) problem, we are given a preference-profile and a (dis)favored alternative . We are asked to compute the smallest number such that the strategic individual can delete votes in such that is the winner (respectively, is not the winner).

To show how opt-CDV falls under the vote operation framework, we let the set of operations to be the negation of generalized scoring vectors of votes in the support of , that is, . Then, the corollary follows from the CVO and DVO parts of Theorem 5 via a similar argument to the argument for opt-bribery.

### 6.6 A Unified Corollary

The next corollary of Theorem 5 summarizes the results obtained for all types of strategic behavior studied in this section.

###### Corollary

For any integer generalized scoring rule, any distribution over votes, and any {constructive, destructive}{UCO, opt-bribery, opt-CAV, opt-CDV}{MoV, MMCS}, suppose the input preference-profiles are generated i.i.d. from .666For CAV, the distribution over the new votes can be generated i.i.d. from a different distribution . Then, for any alternative and any , there exists such that the total probability for the solution to to be one of the following four cases is more than as goes to infinity: (1) , (2) between and , (3) between and , and (4) .

## 7 Discussions and Future Work

In this paper, we proposed a general framework to study vote operations for generalized scoring rules. Our main theorem is a characterization for the number of vote operations that are needed to achieve the strategic individual’s goal. We showed that the main theorem can be applied to many types of strategic behavior and many commonly used voting rules, for most of which no similar results were previously known. We further discuss the generality of our framework in the next two paragraphs.

GSRs vs. integer GSRs. Though integer GSRs are a subclass of GSRs, we feel that from a computational point of view, focusing integer generalized scoring rules does not sacrifice much generality. Because the function only depends on the preorder among components in the total generalized scoring vector, if the function is scaled up by a constant, then the function will select the same winner. Therefore, integer GSRs are equivalent to GSRs where components in the generalized scoring vectors are rational numbers. When the components are irrational numbers, two computational problems arise. First, it is not clear how these irrational numbers are represented, and second, it is hard to compare two irrational numbers computationally, thus even harder to compute the preorder of the components of the total generalized scoring vector. On the other hand, integer GSRs do not have such computational constraints. In fact, all commonly studied voting rules that are known to be GSRs are integer GSRs. Therefore, we believe that our main theorem has a wide application (at least can be applied to many commonly studied voting rules).

On the generality of vote operations. While the framework we proposed covers many types of strategic behavior, some other types of strategic behavior that have been widely studied are not covered by our framework. These types of strategic behavior can be roughly categorized as follows: (1) controls that changes the set of alternatives, for example, control by adding/deleting alternatives Bartholdi et al. (1992) and control by introducing clones of alternatives Tideman (1987); Elkind et al. (2010); and (2) controls that change the procedure of voting, for example control by (runoff) partition of alternatives and control by partition of voters Bartholdi et al. (1992), and control by changing the agenda of voting Lang and Xia (2009). Building a more general framework that covers more types of strategic behavior and studying their properties are interesting directions for future research.

As we discussed in the introduction, on the positive side, our main theorem suggests that computing the margin of victory is usually not hard, which helps implementing efficient post-election auditing methods. One promising future direction is to design practical computational techniques for computing the margin of victory for generalized scoring rules, based on the ILP proposed in this paper. On the negative side, our main theorem suggests that computational complexity might merely be a weak barrier against many types of strategic behavior. Therefore, we should look for new ways to protect voting, for example introducing randomization Conitzer and Sandholm (2003); Elkind and Lipmaa (2005); Walsh and Xia (2012); Obraztsova and Elkind (2011); Obraztsova et al. (2011), using multiple rounds Davies et al. (2012a); Narodytska et al. (2012); Davies et al. (2012b), or limiting the strategic individuals’ information about other voters Conitzer et al. (2011). Another interesting research direction is to investigate the phase transition of the probability for a coalition of strategic individuals to achieve their goal by using vote operations, as it was done for manipulation Walsh (2009); Mossel et al. (2012).

## Appendix A Proofs

Lemma 5 Fix an integer matrix . There exists a constant that only depends on , such that if the following LP has an integer solution, then the solution is no more than .

 min∥→x∥1, s.t. A⋅→x≥→b (1)

Proof of Lemma 5:  Let be a integer matrix, which includes the constraints . Suppose LP (1) has a (non-negative) integer solution. We note that is an optimal integer solution to . Then, it follows from Theorem 5 (ii) in Cook et al. (1986) that LP (1) has a (non-negative) integer solution such that

 ∥→z−→0∥∞≤n∗⋅M(A)⋅(∥→b−→0∥∞+2),

where is the maximum of the absolute values of the determinants of the square sub-matrices of . Since is fixed, the right hand side becomes a constant, that is, . Therefore, there exists such that the optimal value in the ILP (1) is no more than .

Claim 5 There exists and such that for any , any , if (1) is not the winner for , and (2) there exists a refinement of such that and LP has an integer solution, then .

Proof of Claim 5:  Let . Because , . Therefore, the strategic individual has to change the order of some components in the generalized scoring vector to make win. We note that , which means that the difference between any pair of components of is more than . Let denote the maximum difference between any pair of components in generalized score vectors. That is, . In order for to win, the number of vote operations must be at least . Therefore, .

We next show the upper bound. Because , for any pair with , . Therefore, the right hand side of each (in)equality in LP is no more than . Applying Lemma 5 to LP, we have that there exists a constant that only depends on and , and an integer solution with (the matrix in Lemma 5 is fixed because we fix the number of alternatives , and the left hand side of each (in)equality in LP does not depend on ). Let be the maximum of and all (since we fix the number of alternatives, there are finite many ’s). Since , . It follows that . We next show that for a sufficiently large , if the strategic individual applies , then the order over components of the total scoring vector will become . That is, can be made win.

The idea is, LP ensures that by applying , ties between the “almost tied” components are broken as in . Since , when is large enough the order between any pair of “far away” components will not be affected. Formally, let . That is, is the total generalized scoring vector after the strategic individual applied . Because is a solution to LP, for any pair with , the order between and in is the same as the order between and in . Since is an extension of , if , then we must have . Therefore, we only need to check that for any , we have . Because , . We note that , which means that by applying , the strategic individual can only change the difference between any pair of components by no more than . Let . When , , which means that for any , applying will not change the order between and in the total generalized scoring vector. This means that by applying , the strategic individual can make win. Therefore, . It follows that for any , .

Claim 5 There exists such that for any , if (1) is not the winner for , (2) there does not exist a refinement of such that LP has an integer solution, and (3) there exists such that and LP has an integer solution, then .

Proof of Claim 5:  Let . Because the premises of Claim 5 do not hold, the strategic individual has to change the order of some pair of components that are “far away” (that is, the difference between them is before the strategic individual applies vote operations) to make win. We note that one operation can only change the difference between a pair of components by at most . Therefore, .

On the other hand, it follows from Lemma 4 and condition (3) in the statement of the claim that . The only thing left to show is that there exists such that for all and for all . Because , for any pair , . Applying Lemma 5 to LP and condition (3) in the statement of the claim, we have that for any , there exits that only depends on , and an optimal integer solution such that . Let be the maximum of and all (again, there are finite number of ’s). It follows that .

## Appendix B Discussion: How often the solution is 0 or ∞?

One important question is: how large is the probability that the solution to problems studied in this section is or ? Not surprisingly the answer depends on both the voting rule and the type of vote operations. The probability can be large for some voting rules. For example, for any voting rule that always selects a given alternative as the winner, the solution to CVO (respectively, DVO) is always (respectively ) for and is always (respectively ) for . However, for common voting rules the alternatives are treated almost equally (except for cases with ties). Therefore, we may expect that for a preference-profile whose votes are generated i.i.d., each alternative has almost the same probability of being selected as the winner. This is indeed the case in all commonly used voting rules, including approval voting, all positional scoring rules (which include Borda, plurality, and veto), plurality with runoff, Bucklin, Copeland, maximin, STV, and ranked pairs. Therefore, for these voting rules, when the votes are drawn i.i.d. uniformly at random, the probability for CVO is approximately and the probability for DVO is approximately . For CWVO, the answer is never because changing votes cannot change the winner.

We would also expect for common voting rules, for some types of strategic behavior studied in this section, with low probability the solution is . For UCO, the strategic individual can introduce many (but finitely many) votes such that the non-manipulators’ votes are negligible. For opt-bribery and mov, the strategic individual can change all votes to achieve her goal. For MMCS, CAV, and CDV, it is not clear how large such probability is. The following table summarizes folklore results for common voting rules when votes are drawn i.i.d. uniformly at random.

## References

• Baharad and Neeman (2002) Baharad, E., Neeman, Z., 2002. The asymptotic strategyproofness of scoring and condorcet consistent rules. Review of Economic Design 4, 331–340.
• Bartholdi et al. (1989) Bartholdi, III, J., Tovey, C., Trick, M., 1989. The computational difficulty of manipulating an election. Social Choice and Welfare 6 (3), 227–241.
• Bartholdi et al. (1992) Bartholdi, III, J., Tovey, C., Trick, M., 1992. How hard is it to control an election? Math. Comput. Modelling 16 (8-9), 27–40, formal theories of politics, II.
• Brandt (2009) Brandt, F., 2009. Some remarks on Dodgson’s voting rule. Mathematical Logic Quarterly 55, 460–463.
• Cary (2011) Cary, D., 2011. Estimating the margin of victory for instant-runoff voting. In: Proceedings of 2011 EVT/WOTE Conference.
• Conitzer and Sandholm (2003) Conitzer, V., Sandholm, T., 2003. Universal voting protocol tweaks to make manipulation hard. In: Proceedings of the Eighteenth International Joint Conference on Artificial Intelligence (IJCAI). Acapulco, Mexico, pp. 781–788.
• Conitzer et al. (2011) Conitzer, V., Walsh, T., Xia, L., 2011. Dominating manipulations in voting with partial information. In: Proceedings of the National Conference on Artificial Intelligence (AAAI). San Francisco, CA, USA, pp. 638–643.
• Cook et al. (1986) Cook, W. J., Gerards, A. M. H., Schrijver, A., Tardos, E., 1986. Sensitivity theorems in integer linear programming. Mathematical Programming 34 (3), 251–264.
• Davies et al. (2012a) Davies, J., Katsirelos, G., Narodytska, N., Walsh, T., Xia, L., 2012a. Complexity of and Algorithms for the Manipulation of Borda, Nanson and Baldwin’s Voting Rules. Artificial Intelligence, to appear.
• Davies et al. (2012b) Davies, J., Narodytska, N., Walsh, T., 2012b. Eliminating the Weakest Link: Making Manipulation Intractable? In: Proceedings of the National Conference on Artificial Intelligence (AAAI). Toronto, Canada, pp. 1333–1339.
• Dobzinski and Procaccia (2008) Dobzinski, S., Procaccia, A. D., 2008. Frequent manipulability of elections: The case of two voters. In: Proceedings of the Fourth Workshop on Internet and Network Economics (WINE). Shanghai, China, pp. 653–664.
• Dwork et al. (2001) Dwork, C., Kumar, R., Naor, M., Sivakumar, D., 2001. Rank aggregation methods for the web. In: Proceedings of the 10th World Wide Web Conference. pp. 613–622.
• Elkind et al. (2010) Elkind, E., Faliszewski, P., Slinko, A., 2010. Cloning in elections. In: Proceedings of the National Conference on Artificial Intelligence (AAAI). Atlanta, GA, USA, pp. 768–773.
• Elkind and Lipmaa (2005) Elkind, E., Lipmaa, H., 2005. Hybrid voting protocols and hardness of manipulation. In: Annual International Symposium on Algorithms and Computation (ISAAC). pp. 24–26.
• Ephrati and Rosenschein (1991) Ephrati, E., Rosenschein, J. S., 1991. The Clarke tax as a consensus mechanism among automated agents. In: Proceedings of the National Conference on Artificial Intelligence (AAAI). Anaheim, CA, USA, pp. 173–178.
• Faliszewski et al. (2009) Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L. A., 2009. How hard is bribery in elections? Journal of Artificial Intelligence Research 35, 485–532.
• Faliszewski et al. (2010) Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L. A., 2010. Using complexity to protect elections. Communications of the ACM 53, 74–82.
• Faliszewski et al. (2011) Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L. A., 2011. Multimode control attacks on elections. Journal of Artificial Intelligence Research 40, 305–351.
• Faliszewski and Procaccia (2010) Faliszewski, P., Procaccia, A. D., 2010. AI’s war on manipulation: Are we winning? AI Magazine 31 (4), 53–64.
• Friedgut et al. (2008) Friedgut, E., Kalai, G., Nisan, N., 2008. Elections can be manipulated often. In: Proceedings of the Annual Symposium on Foundations of Computer Science (FOCS). pp. 243–249.
• Ghosh et al. (1999) Ghosh, S., Mundhe, M., Hernandez, K., Sen, S., 1999. Voting for movies: the anatomy of a recommender system. In: Proceedings of the third annual conference on Autonomous Agents. pp. 434–435.
• Gibbard (1973) Gibbard, A., 1973. Manipulation of voting schemes: A general result. Econometrica 41, 587–601.
• Isaksson et al. (2010) Isaksson, M., Kindler, G., Mossel, E., 2010. The Geometry of Manipulation: A Quantitative Proof of the Gibbard-Satterthwaite Theorem. In: Proceedings of the 51st Annual Symposium on Foundations of Computer Science (FOCS). Washington, DC, USA, pp. 319–328.
• Lang and Xia (2009) Lang, J., Xia, L., 2009. Sequential composition of voting rules in multi-issue domains. Mathematical Social Sciences 57 (3), 304–324.
• Magrino et al. (2011) Magrino, T. R., Rivest, R. L., Shen, E., Wagner, D., 2011. Computing the Margin of Victory in IRV Elections. In: Proceedings of 2011 EVT/WOTE Conference.
• Mossel et al. (2012) Mossel, E., Procaccia, A. D., Racz, M. Z., 2012. A smooth transition from powerlessness to absolute power. http://www.cs.cmu.edu/~arielpro/papers/phase.pdf.
• Mossel and Racz (2012)

Mossel, E., Racz, M. Z., 2012. A quantitative Gibbard-Satterthwaite theorem without neutrality. In: Proceedings of the The 44th ACM Symposium on Theory of Computing (STOC).

• Narodytska et al. (2012) Narodytska, N., Walsh, T., Xia, L., 2012. Combining voting rules together. In: Proceedings of the 20th European Conference on Artificial Intelligence (ECAI).
• Obraztsova and Elkind (2011) Obraztsova, S., Elkind, E., 2011. On the complexity of voting manipulation under randomized tie-breaking. In: Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence (IJCAI). Barcelona, Catalonia, Spain, pp. 319–324.
• Obraztsova et al. (2011) Obraztsova, S., Elkind, E., Hazon, N., 2011. Ties matter: Complexity of voting manipulation revisited. In: Proceedings of the Tenth International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS). Taipei, Taiwan, pp. 71–78.
• Peleg (1979) Peleg, B., 1979. A note on manipulability of large voting schemes. Theory and Decision 11, 401–412.
• Pennock et al. (2000) Pennock, D. M., Horvitz, E., Giles, C. L., 2000. Social choice theory and recommender systems: Analysis of the axiomatic foundations of collaborative filtering. In: Proceedings of the National Conference on Artificial Intelligence (AAAI). Austin, TX, USA, pp. 729–734.
• Pritchard and Wilson (2009) Pritchard, G., Wilson, M. C., 2009. Asymptotics of the minimum manipulating coalition size for positional voting rules under impartial culture behaviour. Mathematical Social Sciences 1, 35–57.
• Procaccia and Rosenschein (2007) Procaccia, A. D., Rosenschein, J. S., 2007. Average-case tractability of manipulation in voting via the fraction of manipulators. In: Proceedings of the Sixth International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS). Honolulu, HI, USA, pp. 718–720.
• Rothe and Schend (2012) Rothe, J., Schend, L., 2012. Typical-Case Challenges to Complexity Shields That Are Supposed to Protect Elections Against Manipulation and Control: A Survey. In: International Symposium on Artificial Intelligence and Mathematics.
• Satterthwaite (1975) Satterthwaite, M., 1975. Strategy-proofness and Arrow’s conditions: Existence and correspondence theorems for voting procedures and social welfare functions. Journal of Economic Theory 10, 187–217.
• Slinko (2002) Slinko, A., 2002. On asymptotic strategy-proofness of classical social choice rules. Theory and Decision 52, 389–398.
• Slinko (2004) Slinko, A., 2004. How large should a coalition be to manipulate an election? Mathematical Social Sciences 47 (3), 289–293.
• Stark (2008a) Stark, P. B., 2008a. Conservative statistical post-election audits. The Annals of Applied Statistics 2 (2), 550–581.
• Stark (2008b) Stark, P. B., 2008b. A sharper discrepancy measure for post-election audits. The Annals of Applied Statistics 2 (3), 982–985.
• Stark (2009a) Stark, P. B., 2009a. Efficient post-election audits of multiple contests: 2009 California tests. In: 4th Annual Conference on Empirical Legal Studies (CELS).
• Stark (2009b) Stark, P. B., 2009b. Risk-limiting post-election audits: P-values from common probability inequalities. IEEE Transactions on Information Forensics and Security 4, 1005–1014.
• Stark (2010) Stark, P. B., 2010. Super-simple simultaneous single-ballot risk-limiting audits. In: Proceedings of 2010 EVT/WOTE Conference.
• Tideman (1987) Tideman, T. N., 1987. Independence of clones as a criterion for voting rules. Social Choice and Welfare 4 (3), 185–206.
• Walsh (2009) Walsh, T., 2009. Where are the really hard manipulation problems? The phase transition in manipulating the veto rule. In: Proceedings of the Twenty-First International Joint Conference on Artificial Intelligence (IJCAI). Pasadena, CA, USA, pp. 324–329.
• Walsh and Xia (2012) Walsh, T., Xia, L., 2012. Lot-based voting rules. In: Proceedings of the Eleventh International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS). Valencia, Spain, pp. 603–610.
• Xia (2012) Xia, L., 2012. Computing the margin of victory for various voting rules. In: Proceedings of the ACM Conference on Electronic Commerce (EC). Valencia, Spain, pp. 982–999.
• Xia and Conitzer (2008a) Xia, L., Conitzer, V., 2008a. Generalized scoring rules and the frequency of coalitional manipulability. In: Proceedings of the ACM Conference on Electronic Commerce (EC). Chicago, IL, USA, pp. 109–118.
• Xia and Conitzer (2008b) Xia, L., Conitzer, V., 2008b. A sufficient condition for voting rules to be frequently manipulable. In: Proceedings of the ACM Conference on Electronic Commerce (EC). Chicago, IL, USA, pp. 99–108.
• Xia and Conitzer (2009) Xia, L., Conitzer, V., 2009. Finite local consistency characterizes generalized scoring rules. In: Proceedings of the Twenty-First International Joint Conference on Artificial Intelligence (IJCAI). Pasadena, CA, USA, pp. 336–341.
• Xia et al. (2010) Xia, L., Conitzer, V., Procaccia, A. D., 2010. A scheduling approach to coalitional manipulation. In: Proceedings of the ACM Conference on Electronic Commerce (EC). Cambridge, MA, USA, pp. 275–284.
• Zuckerman et al. (2011) Zuckerman, M., Lev, O., Rosenschein, J. S., 2011. An algorithm for the coalitional manipulation problem under maximin. In: Proceedings of the Tenth International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS). Taipei, Taiwan, pp. 845–852.
• Zuckerman et al. (2009) Zuckerman, M., Procaccia, A. D., Rosenschein, J. S., 2009. Algorithms for the coalitional manipulation problem. Artificial Intelligence 173 (2), 392–412.