Abstract
Algorithms are now playing a central role in digital marketplaces, setting prices and automatically responding in real time to competitors’ behaviour. The deployment of automated pricing algorithms is scrutinized by economists and regulatory agencies, concerned about its impact on prices and competition. Existing research has so far been limited to cases where all firms use the same algorithm, suggesting that anti-competitive behaviour might spontaneously arise in that setting. Here we introduce and study a general anti-competitive mechanism, adversarial collusion, where one firm manipulates other sellers that use their own pricing algorithm. We propose a network-based framework to model the strategies of pricing algorithms on iterated two-firm and three-firm markets. In this framework, an attacker learns to endogenize competitors’ algorithms and then derive a strategy to artificially increase its profit at the expense of competitors. Facing a drastic loss of profits, competitors will eventually intervene and revise or turn off their pricing algorithm. To disincentivize this intervention, we show that the attacker can instead unilaterally increase both its profits and the profits of competitors. This leads to a collusive outcome with symmetric and supra-competitive profits, sustainable in the long run. Together, our findings highlight the need for policymakers and regulatory agencies to consider adversarial manipulations of algorithmic pricing, which might currently fall outside of the scope of current competition laws.
This is a preview of subscription content, access via your institution
Access options
Access Nature and 54 other Nature Portfolio journals
Get Nature+, our best-value online-access subscription
$29.99 / 30 days
cancel any time
Subscribe to this journal
Receive 12 digital issues and online access to articles
$119.00 per year
only $9.92 per issue
Rent or buy this article
Prices vary by article type
from$1.95
to$39.95
Prices may be subject to local taxes which are calculated during checkout




Data availability
Data files to reproduce figures are on the Open Science Framework repository at https://doi.org/10.17605/osf.io/2yuvm (ref. 44).
Code availability
The source code to reproduce the results of this article is also available on the Open Science Framework repository at https://doi.org/10.17605/osf.io/2yuvm (ref. 44).
References
Dalgleish, R. Retail sales, Great Britain: December 2020. Office for National Statistics https://www.ons.gov.uk/businessindustryandtrade/retailindustry/bulletins/retailsales/december2020 (2021).
Buck, R. et al. Perspectives on Retail and Consumer Goods Issue 8 (McKinsey, 2020); https://web.archive.org/web/20200924092104/https://www.mckinsey.com/~/media/mckinsey/industries/retail/our%20insights/perspectives%20on%20retail%20and%20consumer%20goods%20number%208/perspectives-on-retail-and-consumer-goods_issue-8.pdf
Pricing Algorithms: Economic Working Paper on the Use of Algorithms to Facilitate Collusion and Personalised Pricing (Competition and Markets Authority, 2018); https://gov.uk/government/publications/pricing-algorithms-research-collusion-and-personalised-pricing
Algorithms and Collusion: Competition Policy in the Digital Age (OECD, 2017); http://www.oecd.org/daf/competition/Algorithms-and-colllusion-competition-policy-in-the-digital-age.pdf
Chen, L., Mislove, A. & Wilson, C. An empirical analysis of algorithmic pricing on Amazon marketplace. In Proc. 25th Conference on World Wide Web (eds Bourdeau, J. et al.) 1339–1349 (International World Wide Web Conferences Steering Committee, 2016).
Thomas, S. Harmful signals: cartel prohibition and oligopoly theory in the age of machine learning. J. Compet. Law Econ. 15, 159–203 (2019).
Axelrod, R. in The Dynamics of Norms Vol. 1 (eds Lowenstein, C. & Lowenstein, M.) 1–16 (Cambridge Univ. Press, 1987).
Lerer, A. & Peysakhovich, A. Maintaining cooperation in complex social dilemmas using deep reinforcement learning. Preprint at http://arxiv.org/abs/1707.01068 (2017).
Assad, S., Clark, R., Ershov, D. & Xu, L. Algorithmic Pricing and Competition: Empirical Evidence from the German Retail Gasoline Market CESifo Working Paper No. 8521 (SSRN, 2020); http://papers.ssrn.com/abstract=3682021
Petit, N. Antitrust and artificial intelligence: a research agenda. J. Eur. Compet. Law Pract. 8, 361–362 (2017).
Tesauro, G. & Kephart, J. O. Pricing in agent economies using multi-agent q-learning. Auton. Agent. Multi. Agent. Syst. 5, 289–304 (2002).
Klein, T. Autonomous algorithmic collusion: Q-learning under sequential pricing. RAND J. Econ. 52, 538–558 (2021).
Calvano, E., Calzolari, G., Denicoló, V. & Pastorello, S. Artificial intelligence, algorithmic pricing, and collusion. Am. Econ. Rev. 110, 3267–97 (2020).
Calvano, E., Calzolari, G., Denicolò, V., Harrington, J. E. & Pastorello, S. Protecting consumers from collusive prices due to AI. Science 370, 1040–1042 (2020).
Salcedo, B. Pricing algorithms and tacit collusion. Bruno Salcedo http://brunosalcedo.com/docs/collusion.pdf (2015).
Press, W. H. & Dyson, F. J. Iterated prisoner’s dilemma contains strategies that dominate any evolutionary opponent. Proc. Natl Acad. Sci. USA 109, 10409–10413 (2012).
Eisen, M. Amazon’s $23,698,655.93 book about flies. Michael Eisen https://www.michaeleisen.org/blog/?p=358 (2011).
Kühn, K.-U. & Tadelis, S. Algorithmic collusion. CRESSE https://cresse.info/wp-content/uploads/2020/02/2017_sps5_pr2_Algorithmic-Collusion.pdf (2017).
Crandall, J. W. et al. Cooperating with machines. Nat. Commun. 9, 233 (2018).
Dalvi, N., Domingos, P., Sanghai, S. & Verma, D. Adversarial classification. In Proc. Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (eds Kim, W. et al.) 99–108 (ACM, 2004).
Eykholt, K. et al. Robust physical-world attacks on deep learning visual classification. In Proc. 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition 1625–1634 (IEEE, 2018).
Matsumoto, T., Matsumoto, H., Yamada, K. & Hoshino, S. Impact of artificial "gummy" fingers on fingerprint systems. In Proc. SPIE 4677, Optical Security and Counterfeit Deterrence Techniques IV (ed. van Renesse, R. L.) 275–289 (SPIE, 2002).
Biggio, B. & Roli, F. Wild patterns: ten years after the rise of adversarial machine learning. Pattern Recognit. 84, 317–331 (2018).
Su, J., Vargas, D. V. & Sakurai, K. One pixel attack for fooling deep neural networks. IEEE Trans. Evol. Comput. 23, 828–841 (2019).
Carlini, N. & Wagner, D. Audio adversarial examples: targeted attacks on speech-to-text. In 2018 IEEE Security and Privacy Workshops 1–7 (IEEE, 2018).
Lei, Q. et al. Discrete adversarial attacks and submodular optimization with applications to text classification. Proc. Mach. Learn. Syst. 1, 146–165 (2019).
Ivaldi, M., Jullien, B., Rey, P., Seabright, P. & Tirole, J. in The Political Economy of Antitrust Vol. 282 of Contributions to Economic Analysis (eds Ghosal, V. & J. Stennek, J.) 217–239 (Elsevier, 2007).
Schwalbe, U. Algorithms, machine learning, and collusion. J. Compet. Law Econ. 14, 568–607 (2018).
Silver, D. et al. Mastering the game of Go without human knowledge. Nature 550, 354–359 (2017).
Vinyals, O. et al. Grandmaster level in Starcraft II using multi-agent reinforcement learning. Nature 575, 350–354 (2019).
Milgrom, P. & Roberts, J. Rationalizability, learning, and equilibrium in games with strategic complementarities. Econometrica 58, 1255–1277 (1990).
Schlosser, R. & Boissier, M. Dynamic pricing under competition on online marketplaces: a data-driven approach. In Proc. 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining Vol. 24 (eds Guo, Y. & Farooq, F.) 705–714 (ACM, 2018).
Council of European Union Commission decision of 19 December 1984 relating to a proceeding under Article 85 of the EEC treaty (IV/29.725 - wood pulp). Official J. L 85, 1–52 (1985).
Guniganti, P. US DOJ deputy: algorithmic cartel requires agreement. GCR https://globalcompetitionreview.com/us-doj-deputy-algorithmic-cartel-requires-agreement (2018).
Axelrod, R. & Hamilton, W. D. The evolution of cooperation. Science 211, 1390–1396 (1981).
Chen, L., Mislove, A. & Wilson, C. Peeking beneath the hood of Uber. In Proc. 2015 Internet Measurement Conference (eds Cho, K. et al.) 495–508 (ACM, 2015).
Liu, G. & Lai, L. Provably efficient black-box action poisoning attacks against reinforcement learning. Adv. Neural Inf. Process. Syst. 34, 1–11 (2021).
Zhang, X., Zhu, X. & Lessard, L. Online data poisoning attacks. In Proc. 2nd Conference on Learning for Dynamics and Control (eds Bayen, A. M. et al.) 201–210 (PMLR, 2020).
Hansen, K. T., Misra, K. & Pai, M. M. Frontiers: algorithmic collusion: supra-competitive prices via independent algorithms. Mark. Sci. 40, 1–12 (2021).
Sutton, R. S. & Barto, A. G. Reinforcement Learning: An Introduction (MIT Press, 2018).
Busoniu, L., Babuska, R. & De Schutter, B. A comprehensive survey of multiagent reinforcement learning. IEEE Trans. Syst. Man. Cybern. C 38, 156–172 (2008).
Wang, T. T. et al. Adversarial policies beat professional-level Go AIs. Preprint at http://arxiv.org/abs/2211.00241 (2023).
Ariel, E. & Maurice, E. S. Virtual Competition: The Promise and Perils of the Algorithm-driven Economy (Harvard Univ. Press (2016).
Rocher, L. & Tournier, A. J. Cabale: a reproducible Python environment for adversarial collusion experiments. OSF https://doi.org/10.17605/osf.io/2yuvm (2023).
Acknowledgements
We thank all members of the Computational Privacy Group for discussions and suggestions. We also thank J. Cremer and H. Piffaut for comments on earlier versions of the paper.
Author information
Authors and Affiliations
Contributions
L.R. and A.J.T. contributed to conceptualization, methodology development, software development, experimental validation and writing. Y.-A.d.M. contributed to conceptualization, methodology development and writing.
Corresponding authors
Ethics declarations
Competing interests
L.R. acknowledges support from EPSRC (EP/W016419/1). The other authors declare no competing interests.
Peer review
Peer review information
Nature Machine Intelligence thanks Stefan Thomas, Aniko Hannak and the other, anonymous, reviewer(s) for their contribution to the peer review of this work.
Additional information
Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Extended data
Extended Data Fig. 1 The exploration phase efficiently discovers the optimal price sequence to maximize the profits of both the attacker and the competitor.
We report the likelihood LG of having found the optimal sequence, averaged over all 25 × 25 initial market configuration, as well as its 95% confidence interval. Each panel displays the likelihood LG for each of the three studied scenarios (a. TES, b. KLN, c. CAL), increasing from LG = 0 initially to LG = 100% across all scenarios and for all 25 × 25 initial market conditions.
Extended Data Fig. 2 Profits obtained with the best price sequence currently found at time t, showing that the attacker can find a good price sequence even with limited exploration.
We report the profits r1 (competitor \(\mathcal{A}_1\)) and r2 (attacker \(\mathcal{A}_2\)) for the best sequence found within the explored vertices (market price configuration) during the exploration phase for each of the three studied scenarios (a. TES, b. KLN, c. CAL). We display the median profits along with the 25% and 75% quartiles, averaged over each of the \(25\times25\) initial market configuration. For instance, stopping after only half of the complete exploration phase duration would yield the optimal profits against TES and KLN, and 39% of the optimal profits against CAL (median profits, filled triangles). The curves are not necessarily monotonous and profits symmetric: the adversary estimates the competitor’s profits by assuming symmetry of the demand function and marginal costs (see Methods) and therefore visits configurations where the competitor’s profits cannot be estimated yet. Once all vertices have been explored, all profits can be estimated, and the best sequence corresponds to symmetric profits.
Supplementary information
Supplementary Information
Supplementary Figs. 1–6, Tables 1–4, Notes 1–3 and Methods.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rocher, L., Tournier, A.J. & de Montjoye, YA. Adversarial competition and collusion in algorithmic markets. Nat Mach Intell 5, 497–504 (2023). https://doi.org/10.1038/s42256-023-00646-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1038/s42256-023-00646-0