Login / Signup
Manipulative Elicitation - A New Attack on Elections with Incomplete Preferences.
Palash Dey
Published in:
CoRR (2017)
Keyphrases
</>
single peaked
computationally hard
preference aggregation
np hard
preference elicitation
countermeasures
social choice
malicious attacks
noisy data
authentication protocol
ddos attacks
ciphertext
data mining
minimax regret
power analysis
utility function
key exchange protocol