Starting in October 2022, companies that use software to assist in setting prices for their products have faced an avalanche of litigation claiming that the common use by competitors of the same pricing software inflates prices and amounts to "collusion by algorithm" in violation of Sec...
Antitrust attorneys David Kully and Kenneth Racowski co-authored an article featured inWestlaw Todayanalyzing recent court rulings on "collusion-by-algorithm" cases in the context of antitrust law. The article examines the emerging consensus among courts regarding what allegations can survive motions ...
collusiondemand predictionmachine learningWe build a game-theoretic model to examine how better demand forecasting due to algorithms, machine learning and artificial intelligence affects the sustainabilMiklós-Thal, JeanineTucker, Catherine E.Social Science Electronic Publishing...
The security protocol of privacy computing products is also designed based on a series of security assumptions. For example, these protocols typically assume that the hardware supplier is trustworthy, that all computing participants stri...
(both rational nodes and undecided nodes) voting independently to ensure the consensus result satisfies the validity property, i.e., there is no collusion, lobbying, or bribery among these nodes. (2) During the execution of the consensus output protocol, we assume that non-Byzantine nodes, ...
(2012) proposal introduces a semi-trusted third entity to perform some extra-computation on encrypted data, in order to assist the recommender and prevent collusion between malicious users and the recommender. Later, Badsha et al. presented a privacy preserving recommendation scheme (Badsha et al.,...
We analyze the means of countering common attacks such as image processing attacks, geometric attacks, print-scan and screen capture attacks, collusion attacks, and ambiguity attacks. Based on the results of our review, we highlight the most common methods of countering attacks and formulate ...
in a less than convincing way. Ariel Ezrachi and Maurice E. Stucke have made the effort to think about the way the message is carried. Taking the collusion chapter as an example, the authors have devised four scenarios: the “Messenger,” the “Hub and Spo...
Therefore, in this paper, we study multiple MEs to attack the network using both collusion and non-collusion methods. However, the above studies consider MEs colluding in eavesdropping to enhance their eavesdropping capabilities while ignoring the fact that MEs can choose to benefit from information...
Designing a mechanism to detect free-riders does not guarantee the efficiency of a cooperative system, mainly because there are users who try to break the rules of the game and earn more by means of collusion and fake identity [12]. Show abstract Trust, Security and Privacy in Emerging ...