1 code implementation • 12 Feb 2024 • Steven Jecmen, Nihar B. Shah, Fei Fang, Leman Akoglu
A major threat to the peer-review systems of computer science conferences is the existence of "collusion rings" between reviewers.
1 code implementation • NeurIPS 2023 • Martin Saveski, Steven Jecmen, Nihar B. Shah, Johan Ugander
We consider estimates of (i) the effect on review quality when changing weights in the assignment algorithm, e. g., weighting reviewers' bids vs. textual similarity (between the review's past papers and the submission), and (ii) the "cost of randomization", capturing the difference in expected quality between the perturbed and unperturbed optimal match.
no code implementations • 22 Jul 2022 • Steven Jecmen, Nihar B. Shah, Fei Fang, Vincent Conitzer
Many conferences rely on paper bidding as a key component of their reviewer assignment procedure.
1 code implementation • 24 Jun 2022 • Steven Jecmen, Minji Yoon, Vincent Conitzer, Nihar B. Shah, Fei Fang
The performance of these detection algorithms can be taken as a baseline for future research on detecting malicious bidding.
1 code implementation • 25 Jan 2022 • Komal Dhull, Steven Jecmen, Pravesh Kothari, Nihar B. Shah
Finally, we evaluate the methods on a dataset from conference peer review.
1 code implementation • 13 Aug 2021 • Steven Jecmen, Hanrui Zhang, Ryan Liu, Fei Fang, Vincent Conitzer, Nihar B. Shah
Many scientific conferences employ a two-phase paper review process, where some papers are assigned additional reviewers after the initial reviews are submitted.
2 code implementations • NeurIPS 2020 • Steven Jecmen, Hanrui Zhang, Ryan Liu, Nihar B. Shah, Vincent Conitzer, Fei Fang
We further consider the problem of restricting the joint probability that certain suspect pairs of reviewers are assigned to certain papers, and show that this problem is NP-hard for arbitrary constraints on these joint probabilities but efficiently solvable for a practical special case.