{"id":"https://openalex.org/W7138033009","doi":"https://doi.org/10.1609/aaai.v40i20.38722","title":"Optimally Auditing Adversarial Agents","display_name":"Optimally Auditing Adversarial Agents","publication_year":2026,"publication_date":"2026-03-14","ids":{"openalex":"https://openalex.org/W7138033009","doi":"https://doi.org/10.1609/aaai.v40i20.38722"},"language":null,"primary_location":{"id":"doi:10.1609/aaai.v40i20.38722","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i20.38722","pdf_url":"https://ojs.aaai.org/index.php/AAAI/article/download/38722/42684","source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://ojs.aaai.org/index.php/AAAI/article/download/38722/42684","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5129671822","display_name":"Sanmay Das","orcid":null},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sanmay Das","raw_affiliation_strings":["Virginia Polytechnic Institute and State University"],"affiliations":[{"raw_affiliation_string":"Virginia Polytechnic Institute and State University","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129704054","display_name":"Fang-Yi Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fang-Yi Yu","raw_affiliation_strings":["George Mason University"],"affiliations":[{"raw_affiliation_string":"George Mason University","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5129690471","display_name":"Yuang Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuang Zhang","raw_affiliation_strings":["George Mason University"],"affiliations":[{"raw_affiliation_string":"George Mason University","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5129671822"],"corresponding_institution_ids":["https://openalex.org/I859038795"],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22772277,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"40","issue":"20","first_page":"16787","last_page":"16794"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11182","display_name":"Auction Theory and Applications","score":0.2768000066280365,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11182","display_name":"Auction Theory and Applications","score":0.2768000066280365,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10991","display_name":"Game Theory and Voting Systems","score":0.15860000252723694,"subfield":{"id":"https://openalex.org/subfields/2002","display_name":"Economics and Econometrics"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12101","display_name":"Advanced Bandit Algorithms Research","score":0.1527000069618225,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.7921000123023987},{"id":"https://openalex.org/keywords/principal","display_name":"Principal (computer security)","score":0.6807000041007996},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.45559999346733093},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.4519999921321869},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.43799999356269836},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.42010000348091125},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.37950000166893005},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.3785000145435333}],"concepts":[{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.7921000123023987},{"id":"https://openalex.org/C144559511","wikidata":"https://www.wikidata.org/wiki/Q2986279","display_name":"Principal (computer security)","level":2,"score":0.6807000041007996},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6098999977111816},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.45559999346733093},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.4519999921321869},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.43799999356269836},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.42010000348091125},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4074000120162964},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.38530001044273376},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.37950000166893005},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.3785000145435333},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3718999922275543},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.34389999508857727},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3160000145435333},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.30399999022483826},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.3003999888896942},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.28859999775886536},{"id":"https://openalex.org/C41550386","wikidata":"https://www.wikidata.org/wiki/Q529909","display_name":"Multi-agent system","level":2,"score":0.2833999991416931},{"id":"https://openalex.org/C110121322","wikidata":"https://www.wikidata.org/wiki/Q865811","display_name":"Distribution (mathematics)","level":2,"score":0.27950000762939453},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.26829999685287476},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2676999866962433},{"id":"https://openalex.org/C200707436","wikidata":"https://www.wikidata.org/wiki/Q1053211","display_name":"Principal\u2013agent problem","level":3,"score":0.2676999866962433},{"id":"https://openalex.org/C113336015","wikidata":"https://www.wikidata.org/wiki/Q574010","display_name":"Complete information","level":2,"score":0.25679999589920044}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1609/aaai.v40i20.38722","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i20.38722","pdf_url":"https://ojs.aaai.org/index.php/AAAI/article/download/38722/42684","source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1609/aaai.v40i20.38722","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i20.38722","pdf_url":"https://ojs.aaai.org/index.php/AAAI/article/download/38722/42684","source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5006863474845886,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8976987519","display_name":"RI: HCC: Medium: Trustworthy AI in Societal Resource Allocation","funder_award_id":"2533162","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7138033009.pdf","grobid_xml":"https://content.openalex.org/works/W7138033009.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Fraud":[0],"can":[1,38,99],"pose":[2],"a":[3,36,53,61,126],"challenge":[4],"in":[5,24,118],"many":[6],"resource":[7],"allocation":[8],"domains,":[9],"including":[10],"social":[11],"service":[12],"delivery":[13],"and":[14,45,75,90,121],"credit":[15],"provision.":[16],"For":[17],"example,":[18],"agents":[19,76],"may":[20],"misreport":[21],"private":[22],"information":[23],"order":[25],"to":[26,31,42,71,102,125],"gain":[27],"benefits":[28],"or":[29],"access":[30],"credit.":[32],"To":[33],"mitigate":[34],"this,":[35],"principal":[37,69],"design":[39,59],"strategic":[40],"audits":[41],"verify":[43],"claims":[44],"penalize":[46],"misreporting.":[47],"In":[48],"this":[49],"paper,":[50],"we":[51],"introduce":[52],"general":[54],"model":[55],"of":[56,105],"audit":[57,73,116,130],"policy":[58,98],"as":[60],"principal-agent":[62],"game":[63],"with":[64,128],"multiple":[65],"agents,":[66],"where":[67],"the":[68,83,96,103],"commits":[70],"an":[72,79],"policy,":[74],"collectively":[77],"choose":[78],"equilibrium":[80],"that":[81],"minimizes":[82],"principal\u2019s":[84],"utility.":[85],"We":[86],"examine":[87],"both":[88,119],"adaptive":[89],"non-adaptive":[91],"settings,":[92],"depending":[93],"on":[94],"whether":[95],"principal's":[97],"be":[100],"responsive":[101],"distribution":[104],"agent":[106],"reports.":[107],"Our":[108],"work":[109],"provides":[110],"efficient":[111],"algorithms":[112],"for":[113],"computing":[114],"optimal":[115],"policies":[117],"settings":[120],"extends":[122],"these":[123],"results":[124],"setting":[127],"limited":[129],"budgets.":[131]},"counts_by_year":[],"updated_date":"2026-04-03T22:45:19.894376","created_date":"2026-03-18T00:00:00"}
