Fraud Detection and Deterrence in Electronic Voting Machines: A Game-Theoretic Approach

被引:0
|
作者
Vora, Anuj S. [1 ]
Kulkarni, Ankur A. [2 ]
机构
[1] Delft Univ Technol, Delft Ctr Syst & Control, NL-2628 CD Delft, Netherlands
[2] Indian Inst Technol, Syst & Control Engn, Mumbai 400076, Maharashtra, India
关键词
D O I
10.1109/CDC49753.2023.10384221
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study a setting where a detector wishes to detect and deter adversarial manipulation in an electronic voting machine. An adversary tries to win the election by tampering the votes while obfuscating its manipulation. We pose this problem as a game between the detector and the adversary and characterize the equilibrium payoffs for the players and the asymptotic nature of these payoffs. We find that if the detector is too cautious, then in equilibrium the adversary wins with a probability higher than its prior probability of winning. We derive an expression for the deterrence threshold, i.e., the minimum level of false-alarm that the detector should endure so that the adversary is not any better off by the manipulation. With this, asymptotically, the detector can ensure that the probability of missed-detection becomes zero by appropriately adjusting the rate of decay of probability of false-alarm. But if this rate of decay is too 'fast', then the adversary can get an arbitrarily high probability of winning in spite of having a vanishing prior probability of winning. We then extend the results to a setting where the detector has incomplete information about the adversary.
引用
收藏
页码:3832 / 3837
页数:6
相关论文
共 50 条
  • [1] A game-theoretic approach to credit card fraud detection
    Vatsa, V
    Sural, S
    Majumdar, AK
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 263 - 276
  • [2] A game-theoretic view of voting
    Krueger, Joachim I.
    Acevedo, Melissa
    JOURNAL OF SOCIAL ISSUES, 2008, 64 (03) : 467 - 485
  • [3] A Rule-Based and Game-Theoretic Approach to Online Credit Card Fraud Detection
    Vatsa, Vishal
    Sural, Shamik
    Majumdar, A. K.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2007, 1 (03) : 26 - 46
  • [4] An Unsupervised Game-Theoretic Approach to Saliency Detection
    Zeng, Yu
    Feng, Mengyang
    Lu, Huchuan
    Yang, Gang
    Borji, Ali
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2018, 27 (09) : 4545 - 4554
  • [5] A game-theoretic approach to weighted majority voting for combining SVM classifiers
    Georgiou, Harris
    Mavroforakis, Michael
    Theodoridis, Sergios
    ARTIFICIAL NEURAL NETWORKS - ICANN 2006, PT 1, 2006, 4131 : 284 - 292
  • [6] Deterrence, Backup, or Insurance: Game-Theoretic Modeling of Ransomware
    Yin, Tongxin
    Sarabi, Armin
    Liu, Mingyan
    GAMES, 2023, 14 (02):
  • [7] Nuclear deterrence in the developing world: A game-theoretic treatment
    Kraig, MR
    JOURNAL OF PEACE RESEARCH, 1999, 36 (02) : 141 - 167
  • [8] A linguistic/game-theoretic approach to detection/explanation of propaganda
    Barfar, Arash
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 189
  • [9] A Game-Theoretic Approach for Community Detection in Signed Networks
    Wang, Shuaihui
    Hu, Guyu
    Pan, Zhisong
    Zhang, Jin
    Li, Dong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (06) : 796 - 807
  • [10] A Game-Theoretic Approach for Threats Detection and Intervention in Surveillance
    Ma, Wenjun
    Liu, Weiru
    Miller, Paul
    Luo, Xudong
    AAMAS'14: PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS, 2014, : 1565 - 1566