Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
158 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Differentially Private Machine Learning-powered Combinatorial Auction Design (2405.10622v1)

Published 17 May 2024 in cs.GT, cs.IT, and math.IT

Abstract: We present a new approach to machine learning-powered combinatorial auctions, which is based on the principles of Differential Privacy. Our methodology guarantees that the auction mechanism is truthful, meaning that rational bidders have the incentive to reveal their true valuation functions. We achieve this by inducing truthfulness in the auction dynamics, ensuring that bidders consistently provide accurate information about their valuation functions. Our method not only ensures truthfulness but also preserves the efficiency of the original auction. This means that if the initial auction outputs an allocation with high social welfare, our modified truthful version of the auction will also achieve high social welfare. We use techniques from Differential Privacy, such as the Exponential Mechanism, to achieve these results. Additionally, we examine the application of differential privacy in auctions across both asymptotic and non-asymptotic regimes.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (14)
  1. G. Brero, B. Lubin, and S. Seuken, “Machine Learning-powered Iterative Combinatorial Auctions,” Sep. 2021, arXiv:1911.08042 [cs]. [Online]. Available: http://arxiv.org/abs/1911.08042
  2. M. Beyeler, G. Brero, B. Lubin, and S. Seuken, “imlca: Machine learning-powered iterative combinatorial auctions with interval bidding,” in Proceedings of the 22nd ACM Conference on Economics and Computation, 2021, pp. 136–136.
  3. A. Ghosh and A. Roth, “Selling privacy at auction,” in Proceedings of the 12th ACM conference on Electronic commerce, 2011, pp. 199–208.
  4. C. Li, D. Y. Li, G. Miklau, and D. Suciu, “A theory of pricing private data,” ACM Transactions on Database Systems (TODS), vol. 39, no. 4, pp. 1–28, 2014.
  5. K. Nissim, S. Vadhan, and D. Xiao, “Redrawing the boundaries on purchasing data from privacy-sensitive individuals,” in Proceedings of the 5th conference on Innovations in theoretical computer science, 2014, pp. 411–422.
  6. K. Nissim, R. Smorodinsky, and M. Tennenholtz, “Approximately optimal mechanism design via differential privacy,” in Proceedings of the 3rd innovations in theoretical computer science conference, 2012, pp. 203–213.
  7. F. McSherry and K. Talwar, “Mechanism design via differential privacy,” in 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS’07).   IEEE, 2007, pp. 94–103.
  8. Z. Huang and S. Kannan, “The exponential mechanism for social welfare: Private, truthful, and nearly optimal,” in 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science.   IEEE, 2012, pp. 140–149.
  9. J. Hsu, Z. Huang, A. Roth, and Z. S. Wu, “Jointly private convex programming,” in Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms.   SIAM, 2016, pp. 580–599.
  10. P. Milgrom, “PUTTING AUCTION THEORY TO WORK,” 2003.
  11. W. Vickrey, “Counterspeculation, Auctions, and Competitive Sealed Tenders,” The Journal of Finance, vol. 16, no. 1, pp. 8–37, 1961, publisher: [American Finance Association, Wiley]. [Online]. Available: https://www.jstor.org/stable/2977633
  12. E. H. Clarke, “Multipart pricing of public goods,” Public Choice, vol. 11, no. 1, pp. 17–33, Sep. 1971. [Online]. Available: http://link.springer.com/10.1007/BF01726210
  13. T. Groves, “Incentives in Teams,” Econometrica, vol. 41, no. 4, p. 617, Jul. 1973. [Online]. Available: https://www.jstor.org/stable/1914085?origin=crossref
  14. C. Dwork and A. Roth, “The Algorithmic Foundations of Differential Privacy,” Foundations and Trends® in Theoretical Computer Science, vol. 9, no. 3-4, pp. 211–407, 2013. [Online]. Available: http://www.nowpublishers.com/articles/foundations-and-trends-in-theoretical-computer-science/TCS-042

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com