Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
153 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Elections in the Post-Quantum Era: Is the Complexity Shield Strong Enough? (2403.05273v1)

Published 8 Mar 2024 in cs.CR, cs.CY, and cs.GT

Abstract: The election, a cornerstone of democracy, is one of the best-recognizable symbols of democratic governance. Voters' confidence in elections is essential, and these days, we can watch practically in live broadcast what consequences distrust in the fairness of elections may have. From the times of the celebrated Gibbard-Satterthwaite theorem, it is well-known in the social-choice community that most voting systems are vulnerable to the efforts of various players to influence elections. Luckily for us, computing such influence to affect election outcomes is a hard problem from the computational complexity perspective. This intractability is regarded as a ``complexity shield'' that secures voting rules against this malicious behavior. In this work, we consider quantum computers to be a new threat to the complexity shield described above, as they break out of standard computing paradigms and unlock additional computational resources. To this end, we provide an overview of possible attacks on election, discuss the abilities of quantum computing, and chart possible directions for future research in this area.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (127)
  1. Andris Ambainis. 2004. Quantum search algorithms. SIGACT News 35, 2 (2004), 22–35. https://doi.org/10.1145/992287.992296
  2. Costin Badescu and Ryan O’Donnell. 2021. Improved Quantum data analysis. In Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, STOC ’21. ACM, 1398–1411. https://doi.org/10.1145/3406325.3451109
  3. John J. Bartholdi III and James B. Orlin. 1991. Single transferable vote resists strategic voting. Social Choice and Welfare 8, 4 (1991), 341–354. https://doi.org/10.1007/BF00183045
  4. The Computational Difficulty of Manipulating an Election. Social Choice and Welfare 6, 3 (1989), 227–241. https://doi.org/10.1007/BF00295861
  5. Voting schemes for which it can be difficult to tell who won the election. Social Choice and Welfare 6, 2 (1989), 157–165. https://doi.org/10.1007/BF00303169
  6. How hard is it to control an election? Mathematical and Computer Modelling 16, 8 (1992), 27–40. https://doi.org/10.1016/0895-7177(92)90085-Y
  7. Johannes Bausch. 2020. Recurrent Quantum Neural Networks. In Proceedings of the 34th Conference on Neural Information Processing Systems, NeurIPS ’20. Curran Associates. https://proceedings.neurips.cc/paper/2020/hash/0ec96be397dd6d3cf2fecb4a2d627c1c-Abstract.html
  8. Efficient networks for quantum factoring. Physics Reviews A 54 (1996), 1034–1063. Issue 2. https://doi.org/10.1103/PhysRevA.54.1034
  9. Strengths and Weaknesses of Quantum Computing. SIAM J. Comput. 26, 5 (1997), 1510–1523. https://doi.org/10.1137/S0097539796300933
  10. Post-Quantum Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88702-7
  11. Controlling the Spread of Two Secrets in Diverse Social Networks (Student Abstract). In Proceedings of the 36th AAAI Conference on Artificial Intelligence, AAAI ’22. AAAI Press, Palo Alto, 12919–12920.
  12. Christian Blum and Christina Isabel Zuber. 2016. Liquid Democracy: Potentials, Problems, and Perspectives. Journal of Political Philosophy 24, 2 (2016), 162–182. https://doi.org/10.1111/jopp.12065
  13. Fine-grained view on bribery for group identification. Autonomous Agents and Multi-Agent Systems 37, 1 (2023), 21. https://doi.org/10.1007/S10458-023-09597-7
  14. Steven J. Brams and Peter C. Fishburn. 2007. Approval Voting (2 ed.). Springer, New York, NY, USA. https://doi.org/10.1007/978-0-387-49896-6
  15. Fernando G. S. L. Brandão and Krysta M. Svore. 2017. Quantum Speed-Ups for Solving Semidefinite Programs. In Proceedings of the 58th IEEE Annual Symposium on Foundations of Computer Science, FOCS ’17. IEEE, Los Alamitos, CA, USA, 415–426. https://doi.org/10.1109/FOCS.2017.45
  16. Bypassing combinatorial protections: Polynomial-time algorithms for single-peaked electorates. Journal of Artificial Intelligence Research 53 (2015), 439–496.
  17. Handbook of Computational Social Choice. Cambridge University Press, New York, NY. https://doi.org/10.1017/CBO9781107446984
  18. Optimal bounds for the no-show paradox via SAT solving. Mathematical Social Sciences 90 (2017), 18–27. https://doi.org/10.1016/j.mathsocsci.2016.09.003
  19. It Only Takes a Few: On the Hardness of Voting with a Constant Number of Agents. In Proceedings of the 2013 International Conference on Autonomous Agents and Multi-Agent Systems, AAMAS ’13 (St. Paul, MN, USA). IFAAMAS, Richland, SC, 375–382.
  20. Exploring the No-Show Paradox for Condorcet Extensions Using Ehrhart Theory and Computer Simulations. In Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, AAMAS ’19 (Montreal, QC, Canada). IFAAMAS, Richland, SC, 520–528. http://dl.acm.org/citation.cfm?id=3331735
  21. Minimal voting paradoxes. Journal of Theoretical Politics 34, 4 (2022), 527–551. https://doi.org/10.1177/09516298221122104
  22. Are there any nicely structured preference profiles nearby? Mathematical Social Sciences 79 (2016), 61–73. https://doi.org/10.1016/j.mathsocsci.2015.11.002
  23. Approximability of Manipulating Elections. In Proceedings of the 23rd AAAI Conference on Artificial Intelligence, AAAI ’08. AAAI Press, Palo Alto, CA, USA, 44–49.
  24. Voting: A machine learning approach. European Journal of Operational Research 299, 3 (2022), 1003–1017. https://doi.org/10.1016/j.ejor.2021.10.005
  25. Davide Castelvecchi. 2024. The AI–quantum computing mash-up: will it revolutionize science? Nature (2024). https://doi.org/10.1038/d41586-023-04007-0
  26. Nested Quantum Search and NP-Hard Problems. Applicable Algebra in Engineering, Communication and Computing 10, 4 (2000), 311–338. https://doi.org/10.1007/s002000050134
  27. Elections with Few Voters: Candidate Control Can Be Easy. Journal of Artificial Intelligence Research 60 (2017), 937–1002.
  28. Zoé Christoff and Davide Grossi. 2017. Binary Voting with Delegable Proxy: An Analysis of Liquid Democracy. In Proceedings of the 16th Conference on Theoretical Aspects of Rationality and Knowledge, TARK ’17 (Electronic Proceedings in Theoretical Computer Science, Vol. 251). Open Publishing Association, Waterloo, Australia, 134–150. https://doi.org/10.4204/EPTCS.251.10
  29. When Are Elections with Few Candidates Hard to Manipulate? Journal of the ACM 54, 3, Article 14 (2007), 33 pages. https://doi.org/10.1145/1236457.1236461
  30. Vincent Conitzer and Toby Walsh. 2016. Barriers to Manipulation in Voting. In Handbook of Computational Social Choice, Felix Brandt, Vincent Conitzer, Ulle Endriss, Jérôme Lang, and Ariel D. Procaccia (Eds.). Cambridge University Press, 127–145. https://doi.org/10.1017/CBO9781107446984.007
  31. Parameterized Algorithms. Springer. https://doi.org/10.1007/978-3-319-21275-3
  32. Frugal bribery in voting. Theoretical Computer Science 676 (2017), 15–32. https://doi.org/10.1016/j.tcs.2017.02.031
  33. Rodney G. Downey and Michael R. Fellows. 2013. Fundamentals of Parameterized Complexity. Springer, London. https://doi.org/10.1007/978-1-4471-5559-1
  34. J. Duggan and T. Schwartz. 2000. Strategic manipulability without resoluteness or shared beliefs: Gibbard–Satterthwaite generalized. Social Choice and Welfare 17, 1 (2000), 85–93.
  35. Manipulating Districts to Win Elections: Fine-Grained Complexity. In Proceedings of the 34th AAAI Conference on Artificial Intelligence, AAAI ’20 (New York, NY, USA). ACM, New York, NY, USA, 1902–1909.
  36. Swap Bribery. In Proceedings of the 2nd International Symposium on Algorithmic Game Theory, SAGT ’09 (Lecture Notes in Computer Science, Vol. 5814). Springer, 299–310. https://doi.org/10.1007/978-3-642-04645-2_27
  37. Eithan Ephrati and Jeffrey S. Rosenschein. 1991. The Clarke Tax as a Consensus Mechanism among Automated Agents. In Proceedings of the 9th National Conference on Artificial Intelligence, AAAI ’91 (Anaheim, California), Vol. 1. AAAI Press, Palo Alto, CA, USA, 173–178.
  38. Piotr Falieszewski and Ariel D. Procaccia. 2010. AI’s War on Manipulation: Are We Winning? AI Magazine 31, 4 (2010), 53–64. https://doi.org/10.1609/aimag.v31i4.2314
  39. Piotr Faliszewski. 2008. Nonuniform bribery. In Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS ’08. IFAAMAS, Richland, SC, 1569–1572. https://dl.acm.org/citation.cfm?id=1402927
  40. How Hard Is Bribery in Elections? Journal of Artificial Intelligence Research 35 (2009), 485–532.
  41. Using complexity to protect elections. Commun. ACM 53, 11 (2010), 74–82. https://doi.org/10.1145/1839676.1839696
  42. Multimode Control Attacks on Elections. Journal of Artificiall Inteligence Research 40, 1 (2011), 305–351.
  43. The shield that never was: Societies with single-peaked preferences are more open to manipulation and control. Information and Computation 209, 2 (2011), 89–107.
  44. The complexity of election problems with group-separable preferences. Autonomous Agents and Multi-Agent Systems 36, 1, Article 18 (2022), 28 pages. https://doi.org/10.1007/s10458-022-09549-7
  45. Approximation and hardness of Shift-Bribery. Artificial Intelligence 298, Article 103520 (2021), 26 pages. https://doi.org/10.1016/j.artint.2021.103520
  46. Piotr Faliszewski and Jörg Rothe. 2016. Control and Bribery in Voting. In Handbook of Computational Social Choice, Felix Brandt, Vincent Conitzer, Ulle Endriss, Jérôme Lang, and Ariel D. Procaccia (Eds.). Cambridge University Press, 146–168. https://doi.org/10.1017/CBO9781107446984.008
  47. Dan S. Felsenthal and Hannu Nurmi. 2019. The No-Show Paradox Under a Restricted Domain. Homo Oeconomicus 35, 4 (2019), 277–293. https://doi.org/10.1007/s41412-018-00079-w
  48. Fair algorithms for selecting citizens’ assemblies. Nature 596, 7873 (2021), 548–552. https://doi.org/10.1038/s41586-021-03788-6
  49. Manipulation-Robust Selection of Citizens’ Assemblies. In Proceedings of the 38th AAAI Conference on Artificial Intelligence, AAAI ’24. AAAI Press, Palo Alto, CA, USA.
  50. Maor Ganz. 2017. Quantum leader election. Quantum Information Processing 16, 3, Article 73 (2017), 17 pages. https://doi.org/10.1007/s11128-017-1528-8
  51. An Anti-Quantum E-Voting Protocol in Blockchain With Audit Function. IEEE Access 7 (2019), 115304–115316. https://doi.org/10.1109/ACCESS.2019.2935895
  52. Allan Gibbard. 1973. Manipulation of Voting Schemes: A General Result. Econometrica 41 (1973), 587–601.
  53. Paul W. Goldberg. 2011. A Survey of PPAD-Completeness for Computing Nash Equilibria. CoRR abs/1103.2709 (2011). arXiv:1103.2709 http://arxiv.org/abs/1103.2709
  54. The Fluid Mechanics of Liquid Democracy. ACM Transactions on Economics and Computation 9, 4 (2021), 23:1–23:39. https://doi.org/10.1145/3485012
  55. Restricted Manipulation in Iterative Voting: Condorcet Efficiency and Borda Score. In Proceedings of the 3rd International Conference on Algorithmic Decision Theory, ADT ’13 (Bruxelles, Belgium). Springer, Berlin, Heidelberg, 181–192.
  56. Federico Grasselli. 2021. Quantum Cryptography: From Key Distribution to Conference Key Agreement. Springer, Cham. https://doi.org/10.1007/978-3-030-64360-7
  57. Davide Grossi. 2022. Social Choice Around the Block: On the Computational Social Choice of Blockchain. In Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, AAMAS ’22. IFAAMAS, 1788–1793. Blue Sky Ideas Track.
  58. Lov K. Grover. 1996. A Fast Quantum Mechanical Algorithm for Database Search. In Proceedings of the 28th Annual ACM Symposium on Theory of Computing, STOC ’96 (Philadelphia, Pennsylvania, USA). ACM, New York, NY, USA, 212–219. https://doi.org/10.1145/237814.237866
  59. Quantum anonymous voting with unweighted continuous-variable graph states. Quantum Information Processing 15, 8 (2016), 3327–3345. https://doi.org/10.1007/s11128-016-1349-1
  60. David Harvey and Joris van der Hoeven. 2021. Integer multiplication in time O⁢(n⁢log⁢n)𝑂𝑛log𝑛O(n\mathrm{log}\,n)italic_O ( italic_n roman_log italic_n ). Annals of Mathematics 193, 2 (2021), 563 – 617. https://doi.org/10.4007/annals.2021.193.2.4
  61. Toward Physically Realizable Quantum Neural Networks. In Proceedings of the 36th AAAI Conference on Artificial Intelligence, AAAI ’22. AAAI Press, Palo Alto, CA, USA, 6902–6909. https://doi.org/10.1609/aaai.V36I6.20647
  62. Jorge Heine. 2021. The Attack on the US Capitol: An American Kristallnacht. Protest 1, 1 (2021), 126–141. https://doi.org/10.1163/2667372X-01010004
  63. Schulze and ranked-pairs voting are fixed-parameter tractable to bribe, manipulate, and control. Annals of Mathematics and Artificial Intelligence 77, 3 (2016), 191–223. https://doi.org/10.1007/s10472-015-9479-1
  64. Samuel Javed. 2014. The Factoring Dead: Preparing for the Cryptopocalypse. Technical Report. NCC Group.
  65. Liquid Democracy: An Algorithmic Perspective. Journal of Artificial Intelligence Research 70 (2021), 1223–1252. https://doi.org/10.1613/jair.1.12261
  66. How hard is safe bribery? Theoretical Computer Science 979 (2023), 114156. https://doi.org/10.1016/j.tcs.2023.114156
  67. Joshua Kavner and Lirong Xia. 2021. Strategic Behavior is Bliss: Iterative Voting Improves Social Welfare. In Proceedings of the 35th Conference on Neural Information Processing Systems, NeurIPS ’21, Vol. 34. Curran Associates, 19021–19032. https://proceedings.neurips.cc/paper/2021/file/9edcc1391c208ba0b503fe9a22574251-Paper.pdf
  68. Approximating Weighted and Priced Bribery in Scoring Rules. Journal of Artificial Intelligence Research 66 (2019), 1057–1098. https://doi.org/10.1613/jair.1.11538
  69. New Approximations for Coalitional Manipulation in Scoring Rules. Journal of Artificial Intelligence Research 64 (2019), 109–145. https://doi.org/10.1613/jair.1.11335
  70. Semin Kim. 2017. Ordinal versus cardinal voting rules: A mechanism design approach. Games and Economic Behavior 104 (2017), 350–371. https://doi.org/10.1016/j.geb.2017.04.012
  71. Matthias Klusch. 2004. Toward Intelligent Agents on Quantum Computers. In Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS ’04’ (New York, New York). IEEE Computer Society, USA, 1518–1519.
  72. Matthias Klusch. 2005. Coordination of Quantum Internet Agents. In Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS ’05 (The Netherlands). ACM, New York, NY, USA, 1221–1222. https://doi.org/10.1145/1082473.1082703
  73. Voting and Bribing in Single-Exponential Time. ACM Transactions on Economics and Computation 8, 3 (2020), 12:1–12:28. https://doi.org/10.1145/3396855
  74. Simpler Exact Leader Election via Quantum Reduction. Chicago Journal of Theoretical Computer Science 2014, Article 10 (2014), 31 pages. https://doi.org/10.4086/cjtcs.2014.010
  75. Martin Lackner. 2020. Perpetual Voting: Fairness in Long-Term Decision Making. In Proceedings of the 34th AAAI Conference on Artificial Intelligence, AAAI ’20, Vol. 34, part 2. AAAI Press, Palo Alto, CA, USA, 2103–2110. https://doi.org/10.1609/aaai.v34i02.5584
  76. Martin Lackner and Piotr Skowron. 2023. Multi-Winner Voting with Approval Preferences. Springer, Cham. https://doi.org/10.1007/978-3-031-09016-5
  77. Jean-François Laslier and M. Remzi Sanver. 2010. Handbook on Approval Voting. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02839-7
  78. Arjen K. Lenstra and Hendrik W. Lenstra. 1993. The Development of the Number Field Sieve. Lecture Notes in Mathematics, Vol. 1554. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0091534
  79. Omar Lev and Yoad Lewenberg. 2019. “Reverse Gerrymandering”: Manipulation in Multi-Group Decision Making. In Proceedings of the 33rd AAAI Conference on Artificial Intelligence, AAAI ’19 (Honolulu, Hawaii, USA). AAAI Press, Palo Alto, 2069–2076.
  80. Omer Lev and Jeffrey S. Rosenschein. 2012. Convergence of Iterative Voting. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, AAMAS ’12 (Valencia, Spain). IFAAMAS, Richland, SC, 611–618.
  81. Omer Lev and Jeffrey S. Rosenschein. 2016. Convergence of Iterative Scoring Rules. Journal on Artificial Intelligence Research 57, 1 (2016), 573–591.
  82. Divide and conquer: Using geographic manipulation to win district-based elections. In Proceedings of the 16th International Conference on Autonomous Agents and Multiagent Systems, AAMAS ’17. IFAAMAS, Richland, SC, 624–632.
  83. Sublinear Classical and Quantum Algorithms for General Matrix Games. In Proceedings of the 35th AAAI Conference on Artificial Intelligence, AAAI ’21. AAAI Press, Palo Alto, CA, USA, 8465–8473. https://doi.org/10.1609/aaai.V35I10.17028
  84. A quantum voting protocol using single-particle states. Quantum Information Processing 20, 3, Article 110 (2021), 17 pages. https://doi.org/10.1007/s11128-021-03048-6
  85. Andrew Peter Lin. 2012. Solving Hard Problems in Election Systems. Ph.D. Dissertation. Rochester Institute of Technology. Advisor(s) Hemaspaandra, Edith. AAI3512856.
  86. Richard J. Lipton and Kenneth W. Regan. 2014. Quantum Algorithms via Linear Algebra: A Primer. The MIT Press, Cambridge, MA, USA.
  87. Krzysztof Magiera and Piotr Faliszewski. 2017. How Hard is Control in Single-Crossing Elections? Autonomous Agents and Multi Agent Systems 31, 3 (2017), 606–627. https://doi.org/10.1007/s10458-016-9339-3
  88. David McMahon. 2007. Quantum Computing Explained. Wiley. https://doi.org/10.1002/9780470181386
  89. Quantum optimization using variational algorithms on near-term quantum devices. Quantum Science and Technology 3, 3, Article 030503 (2018), 17 pages. https://doi.org/10.1088/2058-9565/aab822
  90. Robin A. Moser and Dominik Scheder. 2011. A full derandomization of Schöning’s k-SAT algorithm. In Proceedings of the 43rd ACM Symposium on Theory of Computing, STOC ’11 (San Jose, CA, USA). ACM, New York, NY, USA, 245–252. https://doi.org/10.1145/1993636.1993670
  91. Hervé Moulin. 1988. Condorcet’s principle implies the no show paradox. Journal of Economic Theory 45, 1 (1988), 53–64. https://doi.org/10.1016/0022-0531(88)90253-0
  92. Eitan Muller and Mark A. Satterthwaite. 1977. The equivalence of strong positive association and strategy-proofness. Journal of Economic Theory 14, 2 (1977), 412–418. https://doi.org/10.1016/0022-0531(77)90140-5
  93. Rolf Niedermeier. 2006. Invitation to Fixed-Parameter Algorithms. Oxford University Press. https://doi.org/10.1093/acprof:oso/9780198566076.001.0001
  94. Michael A. Nielsen and Isaac L. Chuang. 2016. Quantum Computation and Quantum Information (10 ed.). Cambridge University Press, Cambridge. https://doi.org/10.1017/CBO9780511976667
  95. NobelPrize.org. 2022. Press release: The Nobel Prize in Physics 2022. Technical Report. Nobel Prize Outreach AB. https://www.nobelprize.org/prizes/physics/2022/press-release/
  96. On the Convergence of Iterative Voting: How Restrictive Should Restricted Dynamics Be?. In Proceedings of the 29th AAAI Conference on Artificial Intelligence, AAAI ’15 (Austin, Texas). AAAI Press, Palo Alto, CA, USA, 993–999.
  97. Christos H. Papadimitriou. 1994. Computational Complexity. Addison-Wesley.
  98. Davide Pastorello. 2023. Concise Guide to Quantum Machine Learning. Springer, Singapore. https://doi.org/10.1007/978-981-19-6897-6
  99. Joaquín Pérez. 2001. The Strong No Show Paradoxes are a common flaw in Condorcet voting correspondences. Social Choice and Welfare 18, 3 (2001), 601–616.
  100. Neural voting machines. Neural Networks 19, 8 (2006), 1161–1167. https://doi.org/10.1016/j.neunet.2006.06.006 Neurobiology of Decision Making.
  101. Brianna Richardson. 2022. Axios—Momentive Poll: January 6th revisited. Technical Report. Axios—Momentive. https://www.surveymonkey.com/curiosity/axios-january-6-revisited/
  102. Bob Ricks and Dan Ventura. 2003. Training a Quantum Neural Network. In Proceedings of the 17th Conference on Neural Information Processing Systems, NIPS ’03 (Vancouver and Whistler, BC, Canada). MIT Press, 1019–1026. https://proceedings.neurips.cc/paper/2003/hash/505259756244493872b7709a8a01b536-Abstract.html
  103. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM 21, 2 (1978), 120–126. https://doi.org/10.1145/359340.359342
  104. Daniel J. Rogers. 2010. Broadband Quantum Cryptography. Springer, Cham. https://doi.org/10.1007/978-3-031-02513-6
  105. Jörg Rothe (Ed.). 2015. Economics and Computation: An Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47904-9
  106. Jörg Rothe and Lena Schend. 2013. Challenges to complexity shields that are supposed to protect elections against manipulation and control: A survey. Annals of Mathematics and Artificial Intelligence 68, 1 (2013), 161–193. https://doi.org/10.1007/s10472-013-9359-5
  107. Mark A. Satterthwaite. 1975. Strategy Proofness and Arrow’s Conditions: Existence and Correspondence Theorems for Voting Procedures and Social Welfare Functions. Journal of Economic Theory 10 (1975), 187–217.
  108. Peter W. Shor. 1994. Algorithms for quantum computation: discrete logarithms and factoring. In Proceedings 35th Annual Symposium on Foundations of Computer Science, FOCS ’94 (Santa Fe, NM, USA). IEEE, Los Alamitos, CA, USA, 124–134. https://doi.org/10.1109/SFCS.1994.365700
  109. A new post-quantum voting protocol based on physical laws. Quantum Information Processing 21, 8, Article 289 (2022), 25 pages. https://doi.org/10.1007/s11128-022-03628-0
  110. Exact Quantum Algorithms for the Leader Election Problem. ACM Transactions on Computation Theory 4, 1, Article 1 (2012), 24 pages. https://doi.org/10.1145/2141938.2141939
  111. Vijay V. Vazirani. 2001. Approximation Algorithms. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-04565-7
  112. Toby Walsh. 2007. Uncertainty in Preference Elicitation and Aggregation. In Proceedings of the 22nd National Conference on Artificial Intelligence, AAAI ’07 (Vancouver, BC, Canada), Vol. 1. AAAI Press, Palo Alto, CA, USA, 3–8.
  113. Quantum Exploration Algorithms for Multi-Armed Bandits. In Proceedings of the 35th AAAI Conference on Artificial Intelligence, AAAI ’21. AAAI Press, Palo Alto, CA, USA, 10102–10110. https://doi.org/10.1609/aaai.V35I11.17212
  114. Quantum Bell states-based anonymous voting with anonymity trace. Quantum Information Processing 20, 4, Article 142 (2021), 21 pages. https://doi.org/10.1007/s11128-021-03081-5
  115. David P. Williamson and David B. Shmoys. 2011. The Design of Approximation Algorithms. Cambridge University Press, Cambridge. https://doi.org/10.1017/CBO9780511921735
  116. Manipulating Elections by Changing Voter Perceptions. In Proceedings of the 31st International Joint Conference on Artificial Intelligence, IJCAI ’22 (Vienna, Austria). ijcai.org, 557–563. https://doi.org/10.24963/ijcai.2022/79
  117. A Secure Quantum Protocol for Anonymous One-Vote Veto Voting. IEEE Access 9 (2021), 146841–146849. https://doi.org/10.1109/ACCESS.2021.3123681
  118. Learning with Optimized Random Features: Exponential Speedup by Quantum Machine Learning without Sparsity and Low-Rank Assumptions. In Proceedings of the 34th Conference on Neural Information Processing Systems, NeurIPS ’20. Curran Associates. https://proceedings.neurips.cc/paper/2020/hash/9ddb9dd5d8aee9a76bf217a2a3c54833-Abstract.html
  119. Yongjie Yang. 2018. Complexity of Controlling Nearly Single-Peaked Elections Revisited. In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, AAMAS ’18 (Stockholm, Sweden). IFAAMAS, Richland, SC, 2139–2141.
  120. Yongjie Yang. 2020. On the Complexity of Constructive Control Under Nearly Single-Peaked Preferences. In Proceedings of the 24th European Conference on Artificial Intelligence, ECAI ’20 (Santiago de Compostela, Spain) (Frontiers in Artificial Intelligence and Applications, Vol. 325). IOS Press, 243–250. https://doi.org/10.3233/FAIA200099
  121. Yongjie Yang and Jiong Guo. 2018. Parameterized Complexity of Voter Control in Multi-Peaked Elections. Theory of Computing Systems 62, 8 (2018), 1798–1825. https://doi.org/10.1007/s00224-018-9843-8
  122. Noson S. Yanofsky and Mirco A. Mannucci. 2008. Quantum Computing for Computer Scientists. Cambridge University Press, Cambridge. https://doi.org/10.1017/CBO9780511813887
  123. Quantum annealing for industry applications: introduction and review. Reports on Progress in Physics 85, 10, Article 104001 (2022), 27 pages. https://doi.org/10.1088/1361-6633/ac8c54
  124. Power and limitations of single-qubit native quantum neural networks. In Proceedings of the 36th Conference on Neural Information Processing Systems, NeurIPS ’22 (New Orleans, LA, USA). Curran Associates. https://proceedings.neurips.cc/paper_files/paper/2022/file/b250de41980b58d34d6aadc3f4aedd4c-Paper-Conference.pdf
  125. Quantum Multi-Agent Meta Reinforcement Learning. In Proceedings of the 37th AAAI Conference on Artificial Intelligence, AAAI ’23 (Washington, DC, USA). AAAI Press, Palo Alto, CA, USA, 11087–11095. https://doi.org/10.1609/aaai.v37i9.26313
  126. An algorithm for the coalitional manipulation problem under maximin. In Proceedings of the 10th International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS ’11. IFAAMAS, Richland, SC, 845–852.
  127. Algorithms for the coalitional manipulation problem. Artificial Intelligence 173, 2 (2009), 392–412.

Summary

We haven't generated a summary for this paper yet.