Defending Elections Against Malicious Spread of Misinformation

09/14/2018
by   Bryan Wilder, et al.
0

The integrity of democratic elections depends on voters' access to accurate information. However, modern media environments, which are dominated by social media, provide malicious actors with unprecedented ability to manipulate elections via misinformation, such as fake news. We study a zero-sum game between an attacker, who attempts to subvert an election by propagating a fake new story or other misinformation over a set of advertising channels, and a defender who attempts to limit the attacker's impact. Computing an equilibrium in this game is challenging as even the pure strategy sets of players are exponential. Nevertheless, we give provable polynomial-time approximation algorithms for computing the defender's minimax optimal strategy across a range of settings, encompassing different population structures as well as models of the information available to each player. Experimental results confirm that our algorithms provide near-optimal defender strategies and showcase variations in the difficulty of defending elections depending on the resources and knowledge available to the defender.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/24/2018

Adversarial Classification on Social Networks

The spread of unwanted or malicious content through social media has bec...
research
11/23/2017

Controlling Elections through Social Influence

Election control considers the problem of an adversary who attempts to t...
research
07/28/2020

Modeling and Predicting Fake News Spreading on Twitter

Fake news becomes a palpable potential risk to society because of the gr...
research
02/23/2023

MCWDST: a Minimum-Cost Weighted Directed Spanning Tree Algorithm for Real-Time Fake News Mitigation in Social Media

The widespread availability of internet access and handheld devices conf...
research
03/17/2020

FakeYou! – A Gamified Approach for Building and Evaluating Resilience Against Fake News

Nowadays fake news are heavily discussed in public and political debates...
research
12/07/2020

Sequential Resource Access: Theory and Algorithm

We formulate and analyze a generic sequential resource access problem ar...
research
04/23/2015

Security Games with Information Leakage: Modeling and Computation

Most models of Stackelberg security games assume that the attacker only ...

Please sign up or login with your details

Forgot password? Click here to reset