TY - GEN
T1 - Long-term Data Sharing under Exclusivity Attacks
AU - Gafni, Yotam
AU - Tennenholtz, Moshe
N1 - Publisher Copyright: © 2022 Owner/Author.
PY - 2022/7/13
Y1 - 2022/7/13
N2 - The quality of learning generally improves with the scale and diversity of data. Companies and institutions can therefore benefit from building models over shared data. Many cloud and blockchain platforms, as well as government initiatives, are interested in providing this type of service. These cooperative efforts face a challenge, which we call "exclusivity attacks". A firm can share distorted data, so that it learns the best model fit, but is also able to mislead others. We study protocols for long-term interactions and their vulnerability to these attacks, in particular for regression and clustering tasks. We find that the choice of communication protocol is essential for vulnerability: The protocol is much more vulnerable if firms can continuously initiate communication, instead of periodically asked for their inputs. Vulnerability may also depend on the number of Sybil identities a firm can control.
AB - The quality of learning generally improves with the scale and diversity of data. Companies and institutions can therefore benefit from building models over shared data. Many cloud and blockchain platforms, as well as government initiatives, are interested in providing this type of service. These cooperative efforts face a challenge, which we call "exclusivity attacks". A firm can share distorted data, so that it learns the best model fit, but is also able to mislead others. We study protocols for long-term interactions and their vulnerability to these attacks, in particular for regression and clustering tasks. We find that the choice of communication protocol is essential for vulnerability: The protocol is much more vulnerable if firms can continuously initiate communication, instead of periodically asked for their inputs. Vulnerability may also depend on the number of Sybil identities a firm can control.
KW - collaborative machine learning
KW - informational mechanism design
KW - non-cooperative computing
KW - strategic machine learning
UR - http://www.scopus.com/inward/record.url?scp=85135007730&partnerID=8YFLogxK
U2 - https://doi.org/10.1145/3490486.3538311
DO - https://doi.org/10.1145/3490486.3538311
M3 - منشور من مؤتمر
T3 - EC 2022 - Proceedings of the 23rd ACM Conference on Economics and Computation
SP - 739
EP - 759
BT - EC 2022 - Proceedings of the 23rd ACM Conference on Economics and Computation
T2 - 23rd ACM Conference on Economics and Computation, EC 2022
Y2 - 11 July 2022 through 15 July 2022
ER -