of her neighbors are of the same type; an unhappy agent either jumps to an unoccupied node or swaps
locations with another unhappy agent. In recent work, we considered Schelling’s model through the
lens of game theory, by assuming that agents choose their next location to maximize the fraction of
same-type neighbors. We have studied questions related to the existence, computation, and quality of
equilibria for many variants of Schelling games [EGI+19, KKV21a, KKV21b, AEGV20]. Besides this,
we have also studied the complexity of computing welfare-maximizing allocations [BSV21].
Regarding the classical stable matching problem, we considered its generalization that allows for
cardinal preferences (as opposed to ordinal) and fractional matchings (as opposed to integral) [CFKV21].
In this cardinal seing, stable fractional matchings can have much larger social welfare than stable in-
tegral ones. Our goal was to understand the computational complexity of nding an optimal (i.e.,
welfare-maximizing) stable fractional matching. We considered both exact and approximate stabil-
ity notions, and provided simple approximation algorithms with weak welfare guarantees; somewhat
surprisingly, achieving beer approximations is computationally hard.
Opinion formation is another important topic, where the objective is to study how the opinion of
an individual is aected by her social acquaintances. In this context, we have studied the existence
and quality of equilibria in games consisting of agents, each of whom has a personal belief that can be
represented by a real number, but may express a dierent opinion aiming to minimize the maximum
distance of her opinion from her belief and the most distant opinion expressed by any of her friends
[CKV22].
In graph-based hedonic games, a group of utility-maximizing agents have hedonic preferences over
the agents’ set, and wish to be partitioned into clusters so that they are grouped together with agents
they prefer. e agents correspond to nodes in a connected graph and their preferences are dened so
that shorter graph distance implies higher preference. In [KKPP21] we focused on fractional hedonic
games and social distance games and we proved improved bounds on the price of stability.
Security games. To decide the optimal strategy to commit to, the leader in a Stackelberg game can
use a variety of learning algorithms that operate by querying the best responses or the payos of the
follower. Consequently, the follower can potentially deceive the leader by responding as if her payos
are much dierent than what they actually are. In [BGH+21], we proved that it is always possible for
the follower to compute payos, and thus deceive the leader, that yield near-optimal utility, for various
scenarios about the learning interaction between leader and follower. In [EGO+21], we considered a
two-stage district-based voting manipulation scenario which leads to a Stackelberg game. First, an
aacker aempts to manipulate the election outcome in favor of a preferred candidate by changing
the vote counts in some districts. Aerwards, a defender has the ability to demand a recount in a subset
of the manipulated districts, thus restoring the vote counts therein to the original, true values.
An aacker-defender seing was also studied in [ADMS21] where multiple aackers try to inict
damage to nodes on a network, and a single defender tries to protect the nodes by probabilistically
patrolling induced connected subgraphs of the network. In that work we showed a general LP-based
algorithm for computing Nash equilibria and then focused on special cases of graphs. First we char-
acterized equilibria, and analyzed some of their properties, like the defense ratio; that is, the ratio of
all aackers over the expected number of the ones caught by the defender in equilibrium. We also
computed the (parameterized) value of the price of defense, i.e., the worst defense ratio over all possible
networks.
Investigating a signicantly challenging aspect of cryptocurrency, in [KKKT16] we focused on the
strategic considerations of miners participating in bitcoin’s protocol. We formulated and studied the
stochastic game underlying such strategic considerations and showed that, when each miner’s com-
putational power is relatively small, their best response matches the expected behavior of the bitcoin
designer. However, when a miner’s computational power is large, she deviates from the expected be-
havior, and other Nash equilibria arise. is work has served as a starting point for a long line of works
on blockchain protocols.
4