首页 > 最新文献

Proceedings of the 23rd ACM Conference on Economics and Computation最新文献

英文 中文
Online Bayesian Recommendation with No Regret 无悔的在线贝叶斯推荐
Pub Date : 2022-02-12 DOI: 10.1145/3490486.3538327
Yiding Feng, Wei Tang, Haifeng Xu
We introduce and study the online Bayesian recommendation problem for a platform, who can observe a utility-relevant state of a product, repeatedly interacting with a population of myopic users through an online recommendation mechanism. This paradigm is common in a wide range of scenarios in the current Internet economy. For each user with her own private preference and belief, the platform commits to a recommendation strategy to utilize his information advantage on the product state to persuade the self-interested user to follow the recommendation. The platform does not know user's preferences and beliefs, and has to use an adaptive recommendation strategy to persuade with gradually learning user's preferences and beliefs in the process. We aim to design online learning policies with no Stackelberg regret for the platform, i.e., against the optimum policy in hindsight under the assumption that users will correspondingly adapt their behaviors to the benchmark policy. Our first result is an online policy that achieves double logarithm regret dependence on the number of rounds. We then present a hardness result showing that no adaptive online policy can achieve regret with better dependency on the number of rounds. Finally, by formulating the platform's problem as optimizing a linear program with membership oracle access, we present our second online policy that achieves regret with polynomial dependence on the number of states but logarithm dependence on the number of rounds.
我们引入并研究了一个平台的在线贝叶斯推荐问题,该平台可以观察产品的效用相关状态,并通过在线推荐机制与一群近视用户进行重复交互。这种模式在当前互联网经济的许多场景中都很常见。对于每一个有自己私人偏好和信仰的用户,平台承诺一个推荐策略,利用他在产品状态上的信息优势,说服自利用户遵循推荐。平台不知道用户的偏好和信念,必须使用自适应的推荐策略进行说服,并在此过程中逐渐学习用户的偏好和信念。我们的目标是为平台设计没有Stackelberg遗憾的在线学习策略,即在假设用户将相应地调整其行为以适应基准策略的情况下,在事后反对最优策略。我们的第一个结果是一个在线策略,它实现了对轮数的双对数后悔依赖。然后,我们给出了一个硬度结果,表明没有自适应在线策略可以更好地依赖于轮数来实现后悔。最后,通过将平台问题表述为优化具有成员oracle访问的线性规划,我们提出了第二个在线策略,该策略通过多项式依赖于状态数而对数依赖于轮数来实现遗憾。
{"title":"Online Bayesian Recommendation with No Regret","authors":"Yiding Feng, Wei Tang, Haifeng Xu","doi":"10.1145/3490486.3538327","DOIUrl":"https://doi.org/10.1145/3490486.3538327","url":null,"abstract":"We introduce and study the online Bayesian recommendation problem for a platform, who can observe a utility-relevant state of a product, repeatedly interacting with a population of myopic users through an online recommendation mechanism. This paradigm is common in a wide range of scenarios in the current Internet economy. For each user with her own private preference and belief, the platform commits to a recommendation strategy to utilize his information advantage on the product state to persuade the self-interested user to follow the recommendation. The platform does not know user's preferences and beliefs, and has to use an adaptive recommendation strategy to persuade with gradually learning user's preferences and beliefs in the process. We aim to design online learning policies with no Stackelberg regret for the platform, i.e., against the optimum policy in hindsight under the assumption that users will correspondingly adapt their behaviors to the benchmark policy. Our first result is an online policy that achieves double logarithm regret dependence on the number of rounds. We then present a hardness result showing that no adaptive online policy can achieve regret with better dependency on the number of rounds. Finally, by formulating the platform's problem as optimizing a linear program with membership oracle access, we present our second online policy that achieves regret with polynomial dependence on the number of states but logarithm dependence on the number of rounds.","PeriodicalId":209859,"journal":{"name":"Proceedings of the 23rd ACM Conference on Economics and Computation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133503566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Faster No-Regret Learning Dynamics for Extensive-Form Correlated and Coarse Correlated Equilibria 广义相关均衡与粗相关均衡的快速无遗憾学习动力学
Pub Date : 2022-02-11 DOI: 10.1145/3490486.3538288
Ioannis Anagnostides, Gabriele Farina, Christian Kroer, A. Celli, T. Sandholm
A recent emerging trend in the literature on learning in games has been concerned with providing faster learning dynamics for correlated and coarse correlated equilibria in normal-form games. Much less is known about the significantly more challenging setting of extensive-form games, which can capture both sequential and simultaneous moves, as well as imperfect information. In this paper we establish faster no-regret learning dynamics forextensive-form correlated equilibria (EFCE) in multiplayer general-sum imperfect-information extensive-form games. When all players follow our accelerated dynamics, the correlated distribution of play is an O(T-3/4)-approximate EFCE, where the O(·) notation suppresses parameters polynomial in the description of the game. This significantly improves over the best prior rate of O(T-1/2 ). To achieve this, we develop a framework for performing accelerated Phi-regret minimization via predictions. One of our key technical contributions---that enables us to employ our generic template---is to characterize the stability of fixed points associated with trigger deviation functions through a refined perturbation analysis of a structured Markov chain. Furthermore, for the simpler solution concept of extensive-form coarse correlated equilibrium (EFCCE) we give a new succinct closed-form characterization of the associated fixed points, bypassing the expensive computation of stationary distributions required for EFCE. Our results place EFCCE closer to normal-form coarse correlated equilibria in terms of the per-iteration complexity, although the former prescribes a much more compelling notion of correlation. Finally, experiments conducted on standard benchmarks corroborate our theoretical findings.
最近关于游戏学习的文献中出现了一个新趋势,即为正常形式游戏中的相关均衡和粗相关均衡提供更快的学习动态。而对于具有更大挑战性的游戏设置,我们所知甚少,因为它既可以捕捉顺序移动,也可以捕捉同步移动,以及不完全信息。本文建立了多人一般和不完全信息泛化博弈中泛化相关均衡的快速无遗憾学习动态。当所有玩家都遵循我们的加速动态时,游戏的相关分布是一个O(T-3/4)近似的EFCE,其中O(·)符号抑制了游戏描述中的参数多项式。这大大提高了最佳的先验率0 (T-1/2)。为了实现这一点,我们开发了一个框架,通过预测来执行加速的pi -遗憾最小化。我们的关键技术贡献之一——使我们能够使用我们的通用模板——是通过对结构化马尔可夫链的精细扰动分析来表征与触发偏差函数相关的不动点的稳定性。此外,对于广义粗相关平衡(EFCCE)的简单解概念,我们给出了相关不动点的一个新的简洁的闭形式表征,从而绕过了EFCE所需的昂贵的平稳分布计算。我们的结果使EFCCE在每次迭代的复杂性方面更接近于标准形式的粗相关平衡,尽管前者规定了一个更引人注目的相关概念。最后,在标准基准上进行的实验证实了我们的理论发现。
{"title":"Faster No-Regret Learning Dynamics for Extensive-Form Correlated and Coarse Correlated Equilibria","authors":"Ioannis Anagnostides, Gabriele Farina, Christian Kroer, A. Celli, T. Sandholm","doi":"10.1145/3490486.3538288","DOIUrl":"https://doi.org/10.1145/3490486.3538288","url":null,"abstract":"A recent emerging trend in the literature on learning in games has been concerned with providing faster learning dynamics for correlated and coarse correlated equilibria in normal-form games. Much less is known about the significantly more challenging setting of extensive-form games, which can capture both sequential and simultaneous moves, as well as imperfect information. In this paper we establish faster no-regret learning dynamics forextensive-form correlated equilibria (EFCE) in multiplayer general-sum imperfect-information extensive-form games. When all players follow our accelerated dynamics, the correlated distribution of play is an O(T-3/4)-approximate EFCE, where the O(·) notation suppresses parameters polynomial in the description of the game. This significantly improves over the best prior rate of O(T-1/2 ). To achieve this, we develop a framework for performing accelerated Phi-regret minimization via predictions. One of our key technical contributions---that enables us to employ our generic template---is to characterize the stability of fixed points associated with trigger deviation functions through a refined perturbation analysis of a structured Markov chain. Furthermore, for the simpler solution concept of extensive-form coarse correlated equilibrium (EFCCE) we give a new succinct closed-form characterization of the associated fixed points, bypassing the expensive computation of stationary distributions required for EFCE. Our results place EFCCE closer to normal-form coarse correlated equilibria in terms of the per-iteration complexity, although the former prescribes a much more compelling notion of correlation. Finally, experiments conducted on standard benchmarks corroborate our theoretical findings.","PeriodicalId":209859,"journal":{"name":"Proceedings of the 23rd ACM Conference on Economics and Computation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124828515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Improved Upper Bounds for Finding Tarski Fixed Points 改进了寻找Tarski不动点的上界
Pub Date : 2022-02-11 DOI: 10.1145/3490486.3538297
X. Chen, Yuhao Li
We study the query complexity of finding a Tarski fixed point over the k-dimensional grid {1,...,n}k. Improving on the previous best upper bound of O(log⌈2k/3⌉n)[7], we give a new algorithm with query complexity O(log⌈(k+1)/2⌉n). This is based on a novel decomposition theorem about a weaker variant of the Tarski fixed point problem, where the input consists of a monotone function f:[n]k→[n]k and a monotone sign function b:[n]k→ {-1,0,1} and the goal is to find a point x ∈ [n]k that satisfies either f(x) ≼ x and b(x) ≤ 0 or f(x) ≽ x and b(x) ≥ 0.
我们研究了在k维网格{1,…,n}k上寻找一个Tarski不动点的查询复杂度。改进了先前的最佳上界O(log≤≤2k/3≤n)[7],给出了查询复杂度O(log≤≤(k+1)/2≤n)的新算法。这是基于一个关于Tarski不动点问题的一个较弱变体的新的分解定理,其中输入由单调函数f:[n]k→[n]k和单调符号函数b:[n]k→{-1,0,1}组成,目标是找到一个点x∈[n]k满足f(x) x和b(x)≤0或f(x) x和b(x)≥0。
{"title":"Improved Upper Bounds for Finding Tarski Fixed Points","authors":"X. Chen, Yuhao Li","doi":"10.1145/3490486.3538297","DOIUrl":"https://doi.org/10.1145/3490486.3538297","url":null,"abstract":"We study the query complexity of finding a Tarski fixed point over the k-dimensional grid {1,...,n}k. Improving on the previous best upper bound of O(log⌈2k/3⌉n)[7], we give a new algorithm with query complexity O(log⌈(k+1)/2⌉n). This is based on a novel decomposition theorem about a weaker variant of the Tarski fixed point problem, where the input consists of a monotone function f:[n]k→[n]k and a monotone sign function b:[n]k→ {-1,0,1} and the goal is to find a point x ∈ [n]k that satisfies either f(x) ≼ x and b(x) ≤ 0 or f(x) ≽ x and b(x) ≥ 0.","PeriodicalId":209859,"journal":{"name":"Proceedings of the 23rd ACM Conference on Economics and Computation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116464714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Closure Operators: Complexity and Applications to Classification and Decision-making 闭包操作符:复杂性及其在分类和决策中的应用
Pub Date : 2022-02-10 DOI: 10.1145/3490486.3538253
Hamed Hamze Bajgiran, F. Echenique
We study the complexity of closure operators, with applications to machine learning and decision theory. In machine learning, closure operators emerge naturally in data classification and clustering. In decision theory, they can model equivalence of choice menus, and therefore situations with a preference for flexibility. Our contribution is to formulate a notion of complexity of closure operators, which translate into the complexity of a classifier in ML, or of a utility function in decision theory.
我们研究闭包算子的复杂性,并将其应用于机器学习和决策理论。在机器学习中,闭包运算符自然出现在数据分类和聚类中。在决策理论中,它们可以模拟选择菜单的等效性,因此可以模拟具有灵活性偏好的情况。我们的贡献是形成闭包操作符复杂性的概念,它转化为ML中分类器的复杂性,或决策理论中的效用函数的复杂性。
{"title":"Closure Operators: Complexity and Applications to Classification and Decision-making","authors":"Hamed Hamze Bajgiran, F. Echenique","doi":"10.1145/3490486.3538253","DOIUrl":"https://doi.org/10.1145/3490486.3538253","url":null,"abstract":"We study the complexity of closure operators, with applications to machine learning and decision theory. In machine learning, closure operators emerge naturally in data classification and clustering. In decision theory, they can model equivalence of choice menus, and therefore situations with a preference for flexibility. Our contribution is to formulate a notion of complexity of closure operators, which translate into the complexity of a classifier in ML, or of a utility function in decision theory.","PeriodicalId":209859,"journal":{"name":"Proceedings of the 23rd ACM Conference on Economics and Computation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115969275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sequential Veto Bargaining with Incomplete Information 不完全信息下的顺序否决权议价
Pub Date : 2022-02-05 DOI: 10.1145/3490486.3538362
S. N. Ali, Navin Kartik, Andreas Kleiner
We study sequential bargaining between a proposer and a veto player. Both have single-peaked preferences, but the proposer is uncertain about the veto player's ideal point. The proposer cannot commit to future proposals. When players are patient, there can be equilibria with Coasian dynamics: the veto player's private information can largely nullify proposer's bargaining power. Our main result, however, is that there are also equilibria in which the proposer obtains the high payoff that he would with commitment power. The driving force is that the veto player's single-peaked preferences give the proposer an option to "leapfrog", i.e., to secure agreement from only low-surplus types early on to credibly extract surplus from high types later. Methodologically, we exploit the connection between sequential bargaining and static mechanism design. Full paper available at: https://personal.psu.edu/sma29/papers/AliKartikKleiner.pdf
我们研究提议者和否决者之间的顺序讨价还价。两者都有单峰偏好,但提议者不确定否决者的理想点。提议者不能承诺未来的提议。当玩家有耐心时,就会出现科斯动力学的均衡:否决者的私人信息可以在很大程度上抵消提议者的议价能力。然而,我们的主要结果是,也存在提议者通过承诺权力获得高回报的均衡。其驱动力是,否决方的单峰偏好给了提议方一个“跨越式”的选择,即在早期确保低盈余类型的协议,然后从高盈余类型中可靠地提取盈余。在方法上,我们利用顺序议价和静态机制设计之间的联系。全文可在:https://personal.psu.edu/sma29/papers/AliKartikKleiner.pdf
{"title":"Sequential Veto Bargaining with Incomplete Information","authors":"S. N. Ali, Navin Kartik, Andreas Kleiner","doi":"10.1145/3490486.3538362","DOIUrl":"https://doi.org/10.1145/3490486.3538362","url":null,"abstract":"We study sequential bargaining between a proposer and a veto player. Both have single-peaked preferences, but the proposer is uncertain about the veto player's ideal point. The proposer cannot commit to future proposals. When players are patient, there can be equilibria with Coasian dynamics: the veto player's private information can largely nullify proposer's bargaining power. Our main result, however, is that there are also equilibria in which the proposer obtains the high payoff that he would with commitment power. The driving force is that the veto player's single-peaked preferences give the proposer an option to \"leapfrog\", i.e., to secure agreement from only low-surplus types early on to credibly extract surplus from high types later. Methodologically, we exploit the connection between sequential bargaining and static mechanism design. Full paper available at: https://personal.psu.edu/sma29/papers/AliKartikKleiner.pdf","PeriodicalId":209859,"journal":{"name":"Proceedings of the 23rd ACM Conference on Economics and Computation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129504012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Population's Feasible Posterior Beliefs 人口的可行后验信念
Pub Date : 2022-02-03 DOI: 10.1145/3490486.3538234
Itai Arieli, Y. Babichenko
We consider a population of Bayesian agents who share a common prior over some finite state space and each agent is exposed to some information about the state. We ask which distributions over empirical distributions of posteriors beliefs in the population are feasible. We provide a necessary and sufficient condition for feasibility. We apply this result in several domains. First, we study the problem of maximizing the polarization of beliefs in a population. Second, we provide a characterization of the feasible agent-symmetric product distributions of posteriors. Finally, we study an instance of a private Bayesian persuasion problem and provide a clean formula for the sender's optimal value.
我们考虑一群贝叶斯智能体,它们在有限的状态空间上有一个共同的先验,每个智能体都暴露在状态的一些信息中。我们问总体后验信念的经验分布上哪些分布是可行的。提供了可行性的充分必要条件。我们将这一结果应用于几个领域。首先,我们研究了群体中信念极化最大化的问题。其次,我们提供了可行的代理对称后验积分布的表征。最后,我们研究了一个私人贝叶斯说服问题的实例,并提供了一个简洁的发送方最优值公式。
{"title":"A Population's Feasible Posterior Beliefs","authors":"Itai Arieli, Y. Babichenko","doi":"10.1145/3490486.3538234","DOIUrl":"https://doi.org/10.1145/3490486.3538234","url":null,"abstract":"We consider a population of Bayesian agents who share a common prior over some finite state space and each agent is exposed to some information about the state. We ask which distributions over empirical distributions of posteriors beliefs in the population are feasible. We provide a necessary and sufficient condition for feasibility. We apply this result in several domains. First, we study the problem of maximizing the polarization of beliefs in a population. Second, we provide a characterization of the feasible agent-symmetric product distributions of posteriors. Finally, we study an instance of a private Bayesian persuasion problem and provide a clean formula for the sender's optimal value.","PeriodicalId":209859,"journal":{"name":"Proceedings of the 23rd ACM Conference on Economics and Computation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129531517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Long-term Data Sharing under Exclusivity Attacks 排他性攻击下的长期数据共享
Pub Date : 2022-01-22 DOI: 10.1145/3490486.3538311
Yotam gafni, Moshe Tennenholtz
The quality of learning generally improves with the scale and diversity of data. Companies and institutions can therefore benefit from building models over shared data. Many cloud and blockchain platforms, as well as government initiatives, are interested in providing this type of service. These cooperative efforts face a challenge, which we call "exclusivity attacks". A firm can share distorted data, so that it learns the best model fit, but is also able to mislead others. We study protocols for long-term interactions and their vulnerability to these attacks, in particular for regression and clustering tasks. We find that the choice of communication protocol is essential for vulnerability: The protocol is much more vulnerable if firms can continuously initiate communication, instead of periodically asked for their inputs. Vulnerability may also depend on the number of Sybil identities a firm can control.
学习的质量通常随着数据的规模和多样性而提高。因此,公司和机构可以从建立基于共享数据的模型中获益。许多云和区块链平台以及政府计划都有兴趣提供这种类型的服务。这些合作努力面临着挑战,我们称之为“排他性攻击”。一家公司可以分享扭曲的数据,这样它就可以学习到最佳的模型拟合,但也可能误导他人。我们研究了长期交互协议及其对这些攻击的脆弱性,特别是回归和聚类任务。我们发现,通信协议的选择对脆弱性至关重要:如果企业可以持续发起通信,而不是定期要求他们的输入,那么协议将更加脆弱。脆弱性还可能取决于公司可以控制的Sybil身份的数量。
{"title":"Long-term Data Sharing under Exclusivity Attacks","authors":"Yotam gafni, Moshe Tennenholtz","doi":"10.1145/3490486.3538311","DOIUrl":"https://doi.org/10.1145/3490486.3538311","url":null,"abstract":"The quality of learning generally improves with the scale and diversity of data. Companies and institutions can therefore benefit from building models over shared data. Many cloud and blockchain platforms, as well as government initiatives, are interested in providing this type of service. These cooperative efforts face a challenge, which we call \"exclusivity attacks\". A firm can share distorted data, so that it learns the best model fit, but is also able to mislead others. We study protocols for long-term interactions and their vulnerability to these attacks, in particular for regression and clustering tasks. We find that the choice of communication protocol is essential for vulnerability: The protocol is much more vulnerable if firms can continuously initiate communication, instead of periodically asked for their inputs. Vulnerability may also depend on the number of Sybil identities a firm can control.","PeriodicalId":209859,"journal":{"name":"Proceedings of the 23rd ACM Conference on Economics and Computation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133382336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal and Differentially Private Data Acquisition: Central and Local Mechanisms 最优和差异化私有数据获取:中央和局部机制
Pub Date : 2022-01-10 DOI: 10.1145/3490486.3538329
Alireza Fallah, A. Makhdoumi, Azarakhsh Malekian, A. Ozdaglar
We consider a platform's problem of collecting data from privacy sensitive users to estimate an underlying parameter of interest. We formulate this question as a Bayesian-optimal mechanism design problem, in which an individual can share her (verifiable) data in exchange for a monetary reward or services, but at the same time has a (private) heterogeneous privacy cost which we quantify using differential privacy. We consider two popular differential privacy settings for providing privacy guarantees for the users: central and local. In both settings, we establish minimax lower bounds for the estimation error and derive (near) optimal estimators for given heterogeneous privacy loss levels for users. Building on this characterization, we pose the mechanism design problem as the optimal selection of an estimator and payments that will elicit truthful reporting of users' privacy sensitivities. Under a regularity condition on the distribution of privacy sensitivities we develop efficient algorithmic mechanisms to solve this problem in both privacy settings. Our mechanism in the central setting can be implemented in time O (n log n) where n is the number of users and our mechanism in the local setting admits a Polynomial Time Approximation Scheme (PTAS). The full paper is available at: https://arxiv.org/abs/2201.03968
我们考虑平台从隐私敏感用户收集数据以估计感兴趣的潜在参数的问题。我们将这个问题表述为贝叶斯最优机制设计问题,其中个人可以共享她的(可验证的)数据以换取货币奖励或服务,但同时有(私有的)异构隐私成本,我们使用差分隐私来量化。我们考虑了为用户提供隐私保障的两种流行的差异隐私设置:中央和本地。在这两种情况下,我们建立了估计误差的最小最大下界,并为给定的用户异构隐私丢失水平导出了(接近)最优估计。在此特征的基础上,我们提出了机制设计问题,即估算器和支付的最佳选择,这将引发用户隐私敏感性的真实报告。在隐私敏感性分布的规则性条件下,我们开发了有效的算法机制来解决这两种隐私设置下的问题。我们在中心设置中的机制可以在O (n log n)时间内实现,其中n是用户数量,我们在局部设置中的机制允许多项式时间近似方案(PTAS)。全文可在https://arxiv.org/abs/2201.03968上找到
{"title":"Optimal and Differentially Private Data Acquisition: Central and Local Mechanisms","authors":"Alireza Fallah, A. Makhdoumi, Azarakhsh Malekian, A. Ozdaglar","doi":"10.1145/3490486.3538329","DOIUrl":"https://doi.org/10.1145/3490486.3538329","url":null,"abstract":"We consider a platform's problem of collecting data from privacy sensitive users to estimate an underlying parameter of interest. We formulate this question as a Bayesian-optimal mechanism design problem, in which an individual can share her (verifiable) data in exchange for a monetary reward or services, but at the same time has a (private) heterogeneous privacy cost which we quantify using differential privacy. We consider two popular differential privacy settings for providing privacy guarantees for the users: central and local. In both settings, we establish minimax lower bounds for the estimation error and derive (near) optimal estimators for given heterogeneous privacy loss levels for users. Building on this characterization, we pose the mechanism design problem as the optimal selection of an estimator and payments that will elicit truthful reporting of users' privacy sensitivities. Under a regularity condition on the distribution of privacy sensitivities we develop efficient algorithmic mechanisms to solve this problem in both privacy settings. Our mechanism in the central setting can be implemented in time O (n log n) where n is the number of users and our mechanism in the local setting admits a Polynomial Time Approximation Scheme (PTAS). The full paper is available at: https://arxiv.org/abs/2201.03968","PeriodicalId":209859,"journal":{"name":"Proceedings of the 23rd ACM Conference on Economics and Computation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115957811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Auction Throttling and Causal Inference of Online Advertising Effects 拍卖节流与网络广告效应的因果推理
Pub Date : 2021-12-30 DOI: 10.1145/3490486.3538246
George Gui, Harikesh S. Nair, Fengshi Niu
Causally identifying the effect of digital advertising is challenging, because experimentation is expensive, and observational data lacks random variation. This paper identifies a pervasive source of naturally occurring, quasi-experimental variation in user-level ad-exposure in digital advertising campaigns. It shows how this variation can be utilized by ad-publishers to identify the causal effect of advertising campaigns. The variation pertains to auction throttling, a probabilistic method of budget pacing that is widely used to spread an ad-campaign's budget over its deployed duration, so that the campaign's budget is not exceeded or overly concentrated in any one period. The throttling mechanism is implemented by computing a participation probability based on the campaign's budget spending rate and then including the campaign in a random subset of available ad-auctions each period according to this probability. We show that access to logged-participation probabilities enables identifying the local average treatment effect (LATE) in the ad-campaign. We present a new estimator that leverages this identification strategy and outline a bootstrap procedure for quantifying its variability. We apply our method to real-world ad-campaign data from an e-commerce advertising platform, which uses such throttling for budget pacing. We show our estimate is statistically different from estimates derived using other standard observational methods such as OLS and two-stage least squares estimators. Our estimated conversion lift is 110%, a more plausible number than 600%, the conversion lifts estimated using naive observational methods. The full version of the paper : https://arxiv.org/abs/2112.15155
通过因果关系来确定数字广告的效果是具有挑战性的,因为实验是昂贵的,而且观察数据缺乏随机变化。本文确定了数字广告活动中用户级广告曝光中自然发生的准实验变化的普遍来源。它展示了广告发布者如何利用这种变化来确定广告活动的因果效应。这种变化与拍卖节流有关,这是一种预算节奏的概率方法,广泛用于在部署期间分散广告活动的预算,这样广告活动的预算就不会超过或过度集中在任何一个时期。节流机制是通过基于广告活动的预算支出率计算参与概率来实现的,然后根据该概率将广告活动包含在每个时间段的可用广告拍卖的随机子集中。我们表明,访问登录参与概率可以识别广告活动中的本地平均治疗效果(LATE)。我们提出了一种新的估计器,它利用了这种识别策略,并概述了一个量化其可变性的自举过程。我们将我们的方法应用于来自电子商务广告平台的真实广告活动数据,该平台使用这种节流来调整预算节奏。我们表明,我们的估计在统计上不同于使用其他标准观察方法(如OLS和两阶段最小二乘估计)得出的估计。我们估计的转换提升率为110%,比600%更合理,600%是用朴素的观测方法估计的转换提升率。论文的完整版本:https://arxiv.org/abs/2112.15155
{"title":"Auction Throttling and Causal Inference of Online Advertising Effects","authors":"George Gui, Harikesh S. Nair, Fengshi Niu","doi":"10.1145/3490486.3538246","DOIUrl":"https://doi.org/10.1145/3490486.3538246","url":null,"abstract":"Causally identifying the effect of digital advertising is challenging, because experimentation is expensive, and observational data lacks random variation. This paper identifies a pervasive source of naturally occurring, quasi-experimental variation in user-level ad-exposure in digital advertising campaigns. It shows how this variation can be utilized by ad-publishers to identify the causal effect of advertising campaigns. The variation pertains to auction throttling, a probabilistic method of budget pacing that is widely used to spread an ad-campaign's budget over its deployed duration, so that the campaign's budget is not exceeded or overly concentrated in any one period. The throttling mechanism is implemented by computing a participation probability based on the campaign's budget spending rate and then including the campaign in a random subset of available ad-auctions each period according to this probability. We show that access to logged-participation probabilities enables identifying the local average treatment effect (LATE) in the ad-campaign. We present a new estimator that leverages this identification strategy and outline a bootstrap procedure for quantifying its variability. We apply our method to real-world ad-campaign data from an e-commerce advertising platform, which uses such throttling for budget pacing. We show our estimate is statistically different from estimates derived using other standard observational methods such as OLS and two-stage least squares estimators. Our estimated conversion lift is 110%, a more plausible number than 600%, the conversion lifts estimated using naive observational methods. The full version of the paper : https://arxiv.org/abs/2112.15155","PeriodicalId":209859,"journal":{"name":"Proceedings of the 23rd ACM Conference on Economics and Computation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129843298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Private Private Information 私人信息
Pub Date : 2021-12-29 DOI: 10.1145/3490486.3538348
Kevin He, Fedor Sandomirskiy, O. Tamuz
In a private private information structure, agents' signals contain no information about the signals of their peers. We study how informative such structures can be, and characterize those that are on the Pareto frontier, in the sense that it is impossible to give more information to any agent without violating privacy. In our main application, we show how to optimally disclose information about an unknown state under the constraint of not revealing anything about a correlated variable that contains sensitive information. The full paper is available at https://arxiv.org/abs/2112.14356.
在私有私有信息结构中,代理的信号不包含其对等体的信号信息。我们研究了这些结构的信息量,并描述了那些在帕累托边界上的结构,因为不可能在不侵犯隐私的情况下向任何代理提供更多信息。在我们的主要应用程序中,我们展示了如何在不透露任何包含敏感信息的相关变量的约束下,以最佳方式公开关于未知状态的信息。全文可在https://arxiv.org/abs/2112.14356上找到。
{"title":"Private Private Information","authors":"Kevin He, Fedor Sandomirskiy, O. Tamuz","doi":"10.1145/3490486.3538348","DOIUrl":"https://doi.org/10.1145/3490486.3538348","url":null,"abstract":"In a private private information structure, agents' signals contain no information about the signals of their peers. We study how informative such structures can be, and characterize those that are on the Pareto frontier, in the sense that it is impossible to give more information to any agent without violating privacy. In our main application, we show how to optimally disclose information about an unknown state under the constraint of not revealing anything about a correlated variable that contains sensitive information. The full paper is available at https://arxiv.org/abs/2112.14356.","PeriodicalId":209859,"journal":{"name":"Proceedings of the 23rd ACM Conference on Economics and Computation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132682107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Proceedings of the 23rd ACM Conference on Economics and Computation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1