Zum Hauptinhalt springen

Showing 1–14 of 14 results for author: Waniek, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.09791  [pdf, other

    cs.SI

    Network Members Can Hide from Group Centrality Measures

    Authors: Marcin Waniek, Talal Rahwan

    Abstract: Group centrality measures are a generalization of standard centrality, designed to quantify the importance of not just a single node (as is the case with standard measures) but rather that of a group of nodes. Some nodes may have an incentive to evade such measures, i.e., to hide their actual importance, in order to conceal their true role in the network. A number of studies have been proposed in… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

    MSC Class: 91D30 ACM Class: G.2.2

  2. arXiv:2307.14387  [pdf, other

    cs.CR cs.AI

    Coupled-Space Attacks against Random-Walk-based Anomaly Detection

    Authors: Yuni Lai, Marcin Waniek, Liying Li, Jingwen Wu, Yulin Zhu, Tomasz P. Michalak, Talal Rahwan, Kai Zhou

    Abstract: Random Walks-based Anomaly Detection (RWAD) is commonly used to identify anomalous patterns in various applications. An intriguing characteristic of RWAD is that the input graph can either be pre-existing or constructed from raw features. Consequently, there are two potential attack surfaces against RWAD: graph-space attacks and feature-space attacks. In this paper, we explore this vulnerability b… ▽ More

    Submitted 23 October, 2023; v1 submitted 26 July, 2023; originally announced July 2023.

    Comments: 13 pages

  3. arXiv:2304.11853  [pdf, other

    cs.AI cs.CY cs.SI

    Human intuition as a defense against attribute inference

    Authors: Marcin Waniek, Navya Suri, Abdullah Zameek, Bedoor AlShebli, Talal Rahwan

    Abstract: Attribute inference - the process of analyzing publicly available data in order to uncover hidden information - has become a major threat to privacy, given the recent technological leap in machine learning. One way to tackle this threat is to strategically modify one's publicly available data in order to keep one's private information hidden from attribute inference. We evaluate people's ability t… ▽ More

    Submitted 24 April, 2023; originally announced April 2023.

    Comments: 25 pages, 4 figures

    MSC Class: 68T05 ACM Class: I.2.6

  4. arXiv:2107.13174  [pdf, other

    physics.soc-ph cs.SI

    Hiding in Temporal Networks

    Authors: Marcin Waniek, Petter Holme, Talal Rahwan

    Abstract: Social network analysis tools can infer various attributes just by scrutinizing one's connections. Several researchers have studied the problem faced by an evader whose goal is to strategically rewire their social connections in order to mislead such tools, thereby concealing their private attributes. However, to date, this literature has only considered static networks, while neglecting the more… ▽ More

    Submitted 28 July, 2021; originally announced July 2021.

    Comments: 27 pages, 9 figures, 3 tables. arXiv admin note: text overlap with arXiv:2102.10539

    MSC Class: 91D30; 68T20 ACM Class: G.2.2; J.4

  5. arXiv:2102.10539  [pdf, other

    cs.SI physics.soc-ph

    Social Diffusion Sources Can Escape Detection

    Authors: Marcin Waniek, Manuel Cebrian, Petter Holme, Talal Rahwan

    Abstract: Influencing (and being influenced by) others through social networks is fundamental to all human societies. Whether this happens through the diffusion of rumors, opinions, or viruses, identifying the diffusion source (i.e., the person that initiated it) is a problem that has attracted much research interest. Nevertheless, existing literature has ignored the possibility that the source might strate… ▽ More

    Submitted 11 November, 2021; v1 submitted 21 February, 2021; originally announced February 2021.

    Comments: 100 pages, 80 figures

    MSC Class: 91D30 ACM Class: F.2.2; G.2.2

    Journal ref: iScience, Volume 25, Issue 9 (2022)

  6. arXiv:2101.10648  [pdf, other

    cs.SI

    Strategic Evasion of Centrality Measures

    Authors: Marcin Waniek, Jan Woźnica, Kai Zhou, Yevgeniy Vorobeychik, Talal Rahwan, Tomasz Michalak

    Abstract: Among the most fundamental tools for social network analysis are centrality measures, which quantify the importance of every node in the network. This centrality analysis typically disregards the possibility that the network may have been deliberately manipulated to mislead the analysis. To solve this problem, a recent study attempted to understand how a member of a social network could rewire the… ▽ More

    Submitted 26 January, 2021; originally announced January 2021.

    Comments: 18 pages, 8 figures, 4 tables

  7. arXiv:2003.03723  [pdf, other

    cs.SI physics.soc-ph

    Traffic networks are vulnerable to disinformation attacks

    Authors: Marcin Waniek, Gururaghav Raman, Bedoor AlShebli, Jimmy Chih-Hsien Peng, Talal Rahwan

    Abstract: Disinformation continues to attract attention due to its increasing threat to society. Nevertheless, a disinformation-based attack on critical infrastructure has never been studied to date. Here, we consider traffic networks and focus on fake information that manipulates drivers' decisions to create congestion. We study the optimization problem faced by the adversary when choosing which streets to… ▽ More

    Submitted 8 March, 2020; originally announced March 2020.

    Comments: 25 pages, 5 figures

  8. arXiv:1911.05947  [pdf, other

    cs.SI physics.soc-ph

    Hiding in Multilayer Networks

    Authors: Marcin Waniek, Tomasz P. Michalak, Talal Rahwan

    Abstract: Multilayer networks allow for modeling complex relationships, where individuals are embedded in multiple social networks at the same time. Given the ubiquity of such relationships, these networks have been increasingly gaining attention in the literature. This paper presents the first analysis of the robustness of centrality measures against strategic manipulation in multilayer networks. More spec… ▽ More

    Submitted 14 November, 2019; originally announced November 2019.

    Comments: 24 pages, 10 figures

    MSC Class: 91D30; 68T20 ACM Class: G.2.2; J.4

  9. arXiv:1908.02589  [pdf, other

    cs.SI physics.soc-ph

    How weaponizing disinformation can bring down a city's power grid

    Authors: Gururaghav Raman, Bedoor AlShebli, Marcin Waniek, Talal Rahwan, Jimmy Chih-Hsien Peng

    Abstract: Social technologies have made it possible to propagate disinformation and manipulate the masses at an unprecedented scale. This is particularly alarming from a security perspective, as humans have proven to be the weakest link when protecting critical infrastructure in general, and the power grid in particular. Here, we consider an attack in which an adversary attempts to manipulate the behavior o… ▽ More

    Submitted 31 July, 2019; originally announced August 2019.

    Comments: 10 pages, 3 figures

  10. arXiv:1809.08538  [pdf, other

    cs.SI cs.CR physics.soc-ph

    Strategic Attack & Defense in Security Diffusion Games

    Authors: Marcin Waniek, Tomasz P. Michalak, Aamena Alshamsi

    Abstract: Security games model the confrontation between a defender protecting a set of targets and an attacker who tries to capture them. A variant of these games assumes security interdependence between targets, facilitating contagion of an attack. So far only stochastic spread of an attack has been considered. In this work, we introduce a version of security games, where the attacker strategically drives… ▽ More

    Submitted 16 December, 2019; v1 submitted 23 September, 2018; originally announced September 2018.

    Comments: 40 pages, 15 figures

    MSC Class: G.2.2; J.4 ACM Class: G.2.2; J.4

  11. arXiv:1809.08368  [pdf, other

    cs.SI cs.CR

    Attacking Similarity-Based Link Prediction in Social Networks

    Authors: Kai Zhou, Tomasz P. Michalak, Talal Rahwan, Marcin Waniek, Yevgeniy Vorobeychik

    Abstract: Link prediction is one of the fundamental problems in computational social science. A particularly common means to predict existence of unobserved links is via structural similarity metrics, such as the number of common neighbors; node pairs with higher similarity are thus deemed more likely to be linked. However, a number of applications of link prediction, such as predicting links in gang or ter… ▽ More

    Submitted 31 December, 2018; v1 submitted 21 September, 2018; originally announced September 2018.

  12. Computational Aspects of Optimal Strategic Network Diffusion

    Authors: Marcin Waniek, Khaled Elbassioni, Flavio L. Pinheiro, Cesar A. Hidalgo, Aamena Alshamsi

    Abstract: Diffusion on complex networks is often modeled as a stochastic process. Yet, recent work on strategic diffusion emphasizes the decision power of agents and treats diffusion as a strategic problem. Here we study the computational aspects of strategic diffusion, i.e., finding the optimal sequence of nodes to activate a network in the minimum time. We prove that finding an optimal solution to this pr… ▽ More

    Submitted 30 January, 2020; v1 submitted 10 September, 2018; originally announced September 2018.

    Comments: 21 pages, 5 figures

    MSC Class: 68Q17 (Primary) 05C82 (Secondary) ACM Class: F.2.2; G.2.2

  13. arXiv:1809.00152  [pdf, other

    cs.SI cs.CR

    Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network

    Authors: Marcin Waniek, Kai Zhou, Yevgeniy Vorobeychik, Esteban Moro, Tomasz P. Michalak, Talal Rahwan

    Abstract: Link prediction is one of the fundamental research problems in network analysis. Intuitively, it involves identifying the edges that are most likely to be added to a given network, or the edges that appear to be missing from the network when in fact they are present. Various algorithms have been proposed to solve this problem over the past decades. For all their benefits, such algorithms raise ser… ▽ More

    Submitted 1 September, 2018; originally announced September 2018.

    Comments: 10 pages of the main article plus 40 pages of appendix, 5 figures in the main article plus 18 figures in appendix

    MSC Class: 91D30 (Primary) 68T20 (Secondary) ACM Class: G.2.2; J.4

  14. arXiv:1608.00375  [pdf, other

    cs.SI physics.soc-ph

    Hiding Individuals and Communities in a Social Network

    Authors: Marcin Waniek, Tomasz Michalak, Talal Rahwan, Michael Wooldridge

    Abstract: The Internet and social media have fueled enormous interest in social network analysis. New tools continue to be developed and used to analyse our personal connections, with particular emphasis on detecting communities or identifying key individuals in a social network. This raises privacy concerns that are likely to exacerbate in the future. With this in mind, we ask the question: Can individuals… ▽ More

    Submitted 1 August, 2016; originally announced August 2016.

    Comments: 29 pages, 22 figures

    MSC Class: 91D30 (Primary) 68T20 (Secondary) ACM Class: G.2.2; J.4

    Journal ref: Nature Human Behaviour 2, 139-147 (2018)