VCG Under Sybil (False-name) Attacks - a Bayesian Analysis.
Yotam GafniRon LaviMoshe TennenholtzPublished in: CoRR (2019)
Keyphrases
- bayesian analysis
- malicious users
- multiagent systems
- computationally feasible
- countermeasures
- mechanism design
- statistically sound
- malicious attacks
- malicious nodes
- security threats
- personalized ranking
- dos attacks
- combinatorial auctions
- ddos attacks
- watermarking scheme
- incentive compatible
- search algorithm
- multi agent