Daily Arxiv

This is a page that curates AI-related papers published worldwide.
All content here is summarized using Google Gemini and operated on a non-profit basis.
Copyright for each paper belongs to the authors and their institutions; please make sure to credit the source when sharing.

DeepVoting: Learning and Fine-Tuning Voting Rules with Canonical Embeddings

Created by
  • Haebom

Author

Leonardo Matone, Ben Abramowitz, Ben Armstrong, Avinash Balakrishnan, Nicholas Mattei

Outline

This paper addresses the problem of agent preference aggregation for collective decision-making, a crucial issue in diverse fields. Considering the challenges of designing aggregation rules with specific properties (axioms) in social choice theory, we propose a method for learning aggregation rules, specifically voting rules, from data. To overcome the limitations of existing studies' large-scale models or preference representations, we reframe the problem as a probabilistic function learning problem that outputs a probability distribution over a set of candidates. We learn the probabilistic social choice function using a neural network and demonstrate the effectiveness and learning ability of preference profile encoding using standard embeddings from social choice theory. We demonstrate that the rules can be learned faster and with a smaller network than previous studies. Furthermore, we demonstrate that axiomatic properties can be used to fine-tune the learned rules to create new voting rules, and that this approach enhances resistance to certain types of attacks (e.g., the probabilistic non-response paradox).

Takeaways, Limitations

Takeaways:
A novel method for learning probabilistic social selection functions using neural networks is presented.
Emphasize the importance of preference profile encoding and present an efficient encoding method.
By fine-tuning the learned rules using axiomatic properties, new voting rules can be created and their resistance to attacks can be improved.
Voting rules can be learned with a smaller and faster network than previous studies.
Limitations:
Additional experiments are needed to evaluate the generalization performance of the proposed method.
Need to assess resistance to various types of attacks
Validation of its utility in real-world applications is needed.
👍