Skip to main content
Log in

Evolution of cooperation in malicious social networks with differential privacy mechanisms

  • S.I. : Deep Social Computing
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Cooperation is an essential behavior in multi-agent systems. Existing mechanisms have two common drawbacks. The first drawback is that malicious agents are not taken into account. Due to the diverse roles in the evolution of cooperation, malicious agents can exist in multi-agent systems, and they can easily degrade the level of cooperation by interfering with agent’s actions. The second drawback is that most existing mechanisms have a limited ability to fit in different environments, such as different types of social networks. The performance of existing mechanisms heavily depends on some factors, such as network structures and the initial proportion of cooperators. To solve these two drawbacks, we propose a novel mechanism which adopts differential privacy mechanisms and reinforcement learning. Differential privacy mechanisms can be used to relieve the impact of malicious agents by exploiting the property of randomization. Reinforcement learning enables agents to learn how to make decisions in various social networks. In this way, the proposed mechanism can promote the evolution of cooperation in malicious social networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Notes

  1. https://github.com/dasdsfdfdsfsd/iudfjksldnf.

References

  1. Leibo JZ, Zambaldi V, Lanctot M, Marecki J, Graepel T (2017) Multi-agent reinforcement learning in sequential social dilemmas. In: Proceedings of the 16th conference on autonomous agents and multiagent systems

  2. Peng P, Wen Y, Yang Y, Yuan Q, Tang Z, Long H, Wang J (2017) Multiagent bidirectionally-coordinated nets: emergence of human-level coordination in learning to play starcraft combat games, ArXiv preprint. arXiv:1703.10069

  3. Matignon L, Jeanpierre L, Mouaddi A-I (2012) Coordinated multi-robot exploration under communication constraints using decentralized markov decision processes. In: AAAI conference on artificial intelligence

  4. Liu F, Xue S, Wu J, Zhou C, Hu W, Paris C, Nepal S, Yang J, Yu PS (2020) Deep learning for community detection: progress, challenges and opportunities. ArXiv preprint. arXiv:2005.08225

  5. Hofmann L-M, Chakraborty N, Sycara K (2011) The evolution of cooperation in self-interested agent societies: a critical study. In: The 10th international conference on autonomous agents and multiagent systems, pp 685–692

  6. Ranjbar-Sahraei B, Ammar HB, Bloembergen D, Tuyls K, Weiss G (2014) Theory of cooperation in complex social networks. In: Proceedings of the 25th AAAI conference on artificial intelligence

  7. Ye D, Zhang M (2015) A self-adaptive strategy for evolution of cooperation in distributed networks. IEEE Trans Comput 64(4):899–911

    Article  MathSciNet  MATH  Google Scholar 

  8. Charness G, Rigotti L, Rustichini A (2016) Social surplus determines cooperation rates in the one-shot prisoner’s dilemma. Games Econ Behav 100:113–124

    Article  MathSciNet  MATH  Google Scholar 

  9. Pinheiro FL, Santos FP (2018) Local wealth redistribution promotes cooperation in multiagent systems. In: Proceedings of the 17th international conference on autonomous agents and multiagent systems, pp 786–794

  10. Lozano P, Antonioni A, Tomassini M, Sánchez A (2018) Cooperation on dynamic networks within an uncertain reputation environment. Sci Rep 8:1–9

    Article  Google Scholar 

  11. Hughes E, Leibo JZ, Phillips M, Tuyls K, Dueñez-Guzman E, Castañeda AG, Dunning I, Zhu T, McKee K, Koster R et al (2018) Inequity aversion improves cooperation in intertemporal social dilemmas. In: Advances in neural information processing systems, pp 3326–3336

  12. Santos FC, Pinheiro FL, Lenaerts T, Pacheco JM (2012) The role of diversity in the evolution of cooperation. J Theor Biol 299:88–96

    Article  MathSciNet  Google Scholar 

  13. Liu L, De Vel O, Han Q-L, Zhang J, Xiang Y (2018) Detecting and preventing cyber insider threats: a survey. IEEE Commun Surv Tutor 20(2):1397–1417

    Article  Google Scholar 

  14. Nowak M, Sigmund K (1993) A strategy of win-stay, lose-shift that outperforms tit-for-tat in the prisones dilemma game. Nature 364:56

    Article  Google Scholar 

  15. Axelrod R, Hamilton W (1981) The evolution of cooperation. Science 211(4489):1390–1396

    Article  MathSciNet  MATH  Google Scholar 

  16. Axelrod R, Dion D (1988) The further evolution of cooperation. Science 242(4884):1385–1390

    Article  Google Scholar 

  17. Nowak MA, Sigmund K (1992) Tit for tat in heterogeneous populations. Nature 355(6357):250

    Article  Google Scholar 

  18. Nowak MA, May RM (1992) Evolutionary games and spatial chaos. Nature 359:826

    Article  Google Scholar 

  19. Novak MA, Sigmund K (2005) Evolution of indirect reciprocity. Nature 437(7063):1291

    Article  Google Scholar 

  20. Santos FP, Santos FC, Pacheco JM (2018) Social norm complexity and past reputations in the evolution of cooperation. Nature 555(7695):242

    Article  Google Scholar 

  21. Pinheiro FL, Pacheco JM, Santos FC (2012) From local to global dilemmas in social networks. PloS One 7(2):e32114

    Article  Google Scholar 

  22. Fu F, Hauert C, Nowak MA, Wang L (2008) Reputation-based partner choice promotes cooperation in social networks. Phys Rev E 78(2):026117

    Article  Google Scholar 

  23. Hofmann L-M, Chakraborty N, Sycara K. The evolution of cooperation in self-interested agent societies: a critical study. In: The 10th international conference on autonomous agents and multiagent systems, pp 685–692

  24. Chen M-H, Wang L, Sun S-W, Wang J, Xia C-Y (2016) Evolution of cooperation in the spatial public goods game with adaptive reputation assortment. Phys Lett A 380(1–2):40–47

    Article  MATH  Google Scholar 

  25. Grujić J, Fosco C, Araujo L, Cuesta JA, Sánchez A (2010) Social experiments in the mesoscale: humans playing a spatial prisoner’s dilemma. PloS One 5(11):e13749

    Article  Google Scholar 

  26. Traulsen A, Semmann D, Sommerfeld RD, Krambeck H-J, Milinski M (2010) Human strategy updating in evolutionary games. Proc Natl Acad Sci 107(7):2962–2966

    Article  Google Scholar 

  27. Fehl K, van der Post DJ, Semmann D (2011) Co-evolution of behaviour and social network structure promotes human cooperation. Ecol Lett 14(6):546–551

    Article  Google Scholar 

  28. Rand DG, Arbesman S, Christakis NA (2011) Dynamic social networks promote cooperation in experiments with humans. Proc Natl Acad Sci 108(48):19 193–19 198

    Article  Google Scholar 

  29. Ezaki T, Horita Y, Takezawa M, Masuda N (2016) Reinforcement learning explains conditional cooperation and its moody cousin. PLoS Comput Biol 12(7):e1005034

    Article  Google Scholar 

  30. Ezaki T, Masuda N (2017) Reinforcement learning account of network reciprocity. PloS One 12(12):e0189220

    Article  Google Scholar 

  31. Tanabe S, Masuda N (2012) Evolution of cooperation facilitated by reinforcement learning with adaptive aspiration levels. J Theor Biol 293:151–160

    Article  MathSciNet  MATH  Google Scholar 

  32. Tampuu A, Matiisen T, Kodelja D, Kuzovkin I, Korjus K, Aru J, Aru J, Vicente R (2017) Multiagent cooperation and competition with deep reinforcement learning. PloS One 12(4):e0172395

    Article  Google Scholar 

  33. Kubera Y, Mathieu P, Picault S (2010) Everything can be agent! In: Proceedings of the 9th international conference on autonomous agents and multiagent systems, pp 1547–1548

  34. Watkins CJCH, Dayan P (1992) Q-learning. Mach Learn 8(3):279–292

    Article  MATH  Google Scholar 

  35. Zhu T, Li G, Zhou W, Philip SY (2017) Differentially private data publishing and analysis: a survey. IEEE Trans Knowl Data Eng 29(8):1619–1638

    Article  Google Scholar 

  36. Abadi M, Chu A, Goodfellow I, McMahan HB, Mironov I, Talwar K, Zhang L (2016) Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp 308–318

  37. Zhu T, Xiong P, Li G, Zhou W, Philip SY (2018) Differentially private model publishing in cyber physical systems. Future Gen Comput Syst 108:1297–1306

    Article  Google Scholar 

  38. Zhang T, Zhu T, Xiong P, Huo H, Tari Z, Zhou W (2019) Correlated differential privacy: feature selection in machine learning. IEEE Trans Ind Inform 16:2115–2124

    Article  Google Scholar 

  39. Dwork C, Kenthapadi K, McSherry F, Mironov I, Naor M . Our data, ourselves: privacy via distributed noise generation. In: Advances in cryptology—EUROCRYPT 2006, pp 486–503

  40. Dwork C (2011) A firm foundation for private data analysis. Commun ACM 54(1):86–95

    Article  Google Scholar 

  41. McSherry F, Talwar K (2007) Mechanism design via differential privacy. In: 48th annual IEEE symposium on foundations of computer science

  42. Dwork C, McSherry F, Nissim K, Smith A (2006) Calibrating noise to sensitivity in private data analysis. In: Theory of cryptography, pp 265–284

  43. Ye D, Zhu T, Zhou W, Philip SY (2019) Differentially private malicious agent avoidance in multiagent advising learning. IEEE Trans Cybern

  44. Zhu T, Philip SY (2019) Applying differential privacy mechanism in artificial intelligence. In: 2019 IEEE 39th international conference on distributed computing systems (ICDCS). IEEE, pp 1601–1609

  45. McSherry FD (2009) Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data, pp 19–30

  46. Melo FS (2001) Convergence of q-learning: a simple proof, Institute Of Systems and Robotics, Tech. Rep, pp 1–4

Download references

Acknowledgements

This work is supported by an ARC Discovery Project (DP200100946) from Australian Research Council, Australia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tianqing Zhu.

Ethics declarations

Conflict of interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, T., Ye, D., Zhu, T. et al. Evolution of cooperation in malicious social networks with differential privacy mechanisms. Neural Comput & Applic 35, 12979–12994 (2023). https://doi.org/10.1007/s00521-020-05243-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-020-05243-5

Keywords

Navigation