{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2019:7OJ7XUQA7RT2KSGHTXETTP5ZZD","short_pith_number":"pith:7OJ7XUQA","schema_version":"1.0","canonical_sha256":"fb93fbd200fc67a548c79dc939bfb9c8d7abb9cbf43558a9c635fed2a19bf230","source":{"kind":"arxiv","id":"1902.03779","version":2},"attestation_state":"computed","paper":{"title":"Election Manipulation on Social Networks with Messages on Multiple Candidates","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.GT","authors_text":"Diodato Ferraioli, Giulia Landriani, Matteo Castiglioni, Nicola Gatti","submitted_at":"2019-02-11T08:56:20Z","abstract_excerpt":"We study the problem of election control through social influence when the manipulator is allowed to use the locations that she acquired on the network for sending \\emph{both} positive and negative messages on \\emph{multiple} candidates, widely extending the previous results available in the literature that study the influence of a single message on a single candidate. In particular, we provide a tight characterization of the settings in which the maximum increase in the margin of victory can be efficiently approximated and of those in which any approximation turns out to be impossible. We als"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1902.03779","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2019-02-11T08:56:20Z","cross_cats_sorted":[],"title_canon_sha256":"98ac7febfea800f0cbac9ddca83d2a3ff4edd84175c9004cb581047d2a6583f4","abstract_canon_sha256":"6cc86439e78f778412894553f1cfe1aa17609a0ae5d2be7f38bc1bc5630e1b8e"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:54:06.640511Z","signature_b64":"1yr0GdWeRW6HHP31xt7dWmIxrMV8ZFFSWpnFaAAdP9Yn3tveM6p+Q67nXfUpR2+JuFOmrvOGI7HXnNXrlQNZCw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"fb93fbd200fc67a548c79dc939bfb9c8d7abb9cbf43558a9c635fed2a19bf230","last_reissued_at":"2026-05-17T23:54:06.639776Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:54:06.639776Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Election Manipulation on Social Networks with Messages on Multiple Candidates","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.GT","authors_text":"Diodato Ferraioli, Giulia Landriani, Matteo Castiglioni, Nicola Gatti","submitted_at":"2019-02-11T08:56:20Z","abstract_excerpt":"We study the problem of election control through social influence when the manipulator is allowed to use the locations that she acquired on the network for sending \\emph{both} positive and negative messages on \\emph{multiple} candidates, widely extending the previous results available in the literature that study the influence of a single message on a single candidate. In particular, we provide a tight characterization of the settings in which the maximum increase in the margin of victory can be efficiently approximated and of those in which any approximation turns out to be impossible. We als"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1902.03779","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1902.03779","created_at":"2026-05-17T23:54:06.639895+00:00"},{"alias_kind":"arxiv_version","alias_value":"1902.03779v2","created_at":"2026-05-17T23:54:06.639895+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1902.03779","created_at":"2026-05-17T23:54:06.639895+00:00"},{"alias_kind":"pith_short_12","alias_value":"7OJ7XUQA7RT2","created_at":"2026-05-18T12:33:12.712433+00:00"},{"alias_kind":"pith_short_16","alias_value":"7OJ7XUQA7RT2KSGH","created_at":"2026-05-18T12:33:12.712433+00:00"},{"alias_kind":"pith_short_8","alias_value":"7OJ7XUQA","created_at":"2026-05-18T12:33:12.712433+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":1,"internal_anchor_count":1,"sample":[{"citing_arxiv_id":"2605.15033","citing_title":"On the Limits of PAC Learning of Networks from Opinion Dynamics","ref_index":3,"is_internal_anchor":true}]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/7OJ7XUQA7RT2KSGHTXETTP5ZZD","json":"https://pith.science/pith/7OJ7XUQA7RT2KSGHTXETTP5ZZD.json","graph_json":"https://pith.science/api/pith-number/7OJ7XUQA7RT2KSGHTXETTP5ZZD/graph.json","events_json":"https://pith.science/api/pith-number/7OJ7XUQA7RT2KSGHTXETTP5ZZD/events.json","paper":"https://pith.science/paper/7OJ7XUQA"},"agent_actions":{"view_html":"https://pith.science/pith/7OJ7XUQA7RT2KSGHTXETTP5ZZD","download_json":"https://pith.science/pith/7OJ7XUQA7RT2KSGHTXETTP5ZZD.json","view_paper":"https://pith.science/paper/7OJ7XUQA","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1902.03779&json=true","fetch_graph":"https://pith.science/api/pith-number/7OJ7XUQA7RT2KSGHTXETTP5ZZD/graph.json","fetch_events":"https://pith.science/api/pith-number/7OJ7XUQA7RT2KSGHTXETTP5ZZD/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/7OJ7XUQA7RT2KSGHTXETTP5ZZD/action/timestamp_anchor","attest_storage":"https://pith.science/pith/7OJ7XUQA7RT2KSGHTXETTP5ZZD/action/storage_attestation","attest_author":"https://pith.science/pith/7OJ7XUQA7RT2KSGHTXETTP5ZZD/action/author_attestation","sign_citation":"https://pith.science/pith/7OJ7XUQA7RT2KSGHTXETTP5ZZD/action/citation_signature","submit_replication":"https://pith.science/pith/7OJ7XUQA7RT2KSGHTXETTP5ZZD/action/replication_record"}},"created_at":"2026-05-17T23:54:06.639895+00:00","updated_at":"2026-05-17T23:54:06.639895+00:00"}