Papers
Topics
Authors
Recent
Search
2000 character limit reached

Differentially Private Machine Learning-powered Combinatorial Auction Design

Published 17 May 2024 in cs.GT, cs.IT, and math.IT | (2405.10622v1)

Abstract: We present a new approach to machine learning-powered combinatorial auctions, which is based on the principles of Differential Privacy. Our methodology guarantees that the auction mechanism is truthful, meaning that rational bidders have the incentive to reveal their true valuation functions. We achieve this by inducing truthfulness in the auction dynamics, ensuring that bidders consistently provide accurate information about their valuation functions. Our method not only ensures truthfulness but also preserves the efficiency of the original auction. This means that if the initial auction outputs an allocation with high social welfare, our modified truthful version of the auction will also achieve high social welfare. We use techniques from Differential Privacy, such as the Exponential Mechanism, to achieve these results. Additionally, we examine the application of differential privacy in auctions across both asymptotic and non-asymptotic regimes.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (14)
  1. G. Brero, B. Lubin, and S. Seuken, “Machine Learning-powered Iterative Combinatorial Auctions,” Sep. 2021, arXiv:1911.08042 [cs]. [Online]. Available: http://arxiv.org/abs/1911.08042
  2. M. Beyeler, G. Brero, B. Lubin, and S. Seuken, “imlca: Machine learning-powered iterative combinatorial auctions with interval bidding,” in Proceedings of the 22nd ACM Conference on Economics and Computation, 2021, pp. 136–136.
  3. A. Ghosh and A. Roth, “Selling privacy at auction,” in Proceedings of the 12th ACM conference on Electronic commerce, 2011, pp. 199–208.
  4. C. Li, D. Y. Li, G. Miklau, and D. Suciu, “A theory of pricing private data,” ACM Transactions on Database Systems (TODS), vol. 39, no. 4, pp. 1–28, 2014.
  5. K. Nissim, S. Vadhan, and D. Xiao, “Redrawing the boundaries on purchasing data from privacy-sensitive individuals,” in Proceedings of the 5th conference on Innovations in theoretical computer science, 2014, pp. 411–422.
  6. K. Nissim, R. Smorodinsky, and M. Tennenholtz, “Approximately optimal mechanism design via differential privacy,” in Proceedings of the 3rd innovations in theoretical computer science conference, 2012, pp. 203–213.
  7. F. McSherry and K. Talwar, “Mechanism design via differential privacy,” in 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS’07).   IEEE, 2007, pp. 94–103.
  8. Z. Huang and S. Kannan, “The exponential mechanism for social welfare: Private, truthful, and nearly optimal,” in 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science.   IEEE, 2012, pp. 140–149.
  9. J. Hsu, Z. Huang, A. Roth, and Z. S. Wu, “Jointly private convex programming,” in Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms.   SIAM, 2016, pp. 580–599.
  10. P. Milgrom, “PUTTING AUCTION THEORY TO WORK,” 2003.
  11. W. Vickrey, “Counterspeculation, Auctions, and Competitive Sealed Tenders,” The Journal of Finance, vol. 16, no. 1, pp. 8–37, 1961, publisher: [American Finance Association, Wiley]. [Online]. Available: https://www.jstor.org/stable/2977633
  12. E. H. Clarke, “Multipart pricing of public goods,” Public Choice, vol. 11, no. 1, pp. 17–33, Sep. 1971. [Online]. Available: http://link.springer.com/10.1007/BF01726210
  13. T. Groves, “Incentives in Teams,” Econometrica, vol. 41, no. 4, p. 617, Jul. 1973. [Online]. Available: https://www.jstor.org/stable/1914085?origin=crossref
  14. C. Dwork and A. Roth, “The Algorithmic Foundations of Differential Privacy,” Foundations and Trends® in Theoretical Computer Science, vol. 9, no. 3-4, pp. 211–407, 2013. [Online]. Available: http://www.nowpublishers.com/articles/foundations-and-trends-in-theoretical-computer-science/TCS-042

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 2 tweets with 0 likes about this paper.