no code implementations • 26 Mar 2024 • Yotam Gafni, Ronen Gradwohl, Moshe Tennenholtz
Second, we narrow our focus to two natural settings within this framework: (i) a setting in which the accuracy of each firm's prediction model is common knowledge, but the correlation between the respective models is unknown; and (ii) a setting in which two hypotheses exist regarding the optimal predictor, and one of the firms has a structural advantage in deducing it.
no code implementations • 27 Oct 2022 • Yotam Gafni, Moshe Tennenholtz
We consider two refined notions: (i) a term we call DSL (distinguishable safety level), and is based on the notion of ``discrimin'', which uses a pairwise comparison of actions while removing trivial equivalencies.
1 code implementation • 22 Jan 2022 • Yotam Gafni, Moshe Tennenholtz
We conclude that the choice of protocol, as well as the number of Sybil identities an attacker may control, is material to vulnerability.