Search Results for author: Marcin Waniek

Found 5 papers, 1 papers with code

Coupled-Space Attacks against Random-Walk-based Anomaly Detection

2 code implementations26 Jul 2023 Yuni Lai, Marcin Waniek, Liying Li, Jingwen Wu, Yulin Zhu, Tomasz P. Michalak, Talal Rahwan, Kai Zhou

In addition, we conduct transfer attack experiments in a black-box setting, which show that our feature attack significantly decreases the anomaly scores of target nodes.

Graph Anomaly Detection

Human intuition as a defense against attribute inference

no code implementations24 Apr 2023 Marcin Waniek, Navya Suri, Abdullah Zameek, Bedoor AlShebli, Talal Rahwan

Attribute inference - the process of analyzing publicly available data in order to uncover hidden information - has become a major threat to privacy, given the recent technological leap in machine learning.

Attribute

Attacking Similarity-Based Link Prediction in Social Networks

no code implementations22 Sep 2018 Kai Zhou, Tomasz P. Michalak, Talal Rahwan, Marcin Waniek, Yevgeniy Vorobeychik

We offer a comprehensive algorithmic investigation of the problem of attacking similarity-based link prediction through link deletion, focusing on two broad classes of such approaches, one which uses only local information about target links, and another which uses global network information.

Social and Information Networks Cryptography and Security

Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network

no code implementations1 Sep 2018 Marcin Waniek, Kai Zhou, Yevgeniy Vorobeychik, Esteban Moro, Tomasz P. Michalak, Talal Rahwan

Link prediction is one of the fundamental research problems in network analysis.

Social and Information Networks Cryptography and Security 91D30 (Primary) 68T20 (Secondary) G.2.2; J.4

Hiding Individuals and Communities in a Social Network

no code implementations1 Aug 2016 Marcin Waniek, Tomasz Michalak, Talal Rahwan, Michael Wooldridge

With this in mind, we ask the question: Can individuals or groups actively manage their connections to evade social network analysis tools?

Social and Information Networks Physics and Society 91D30 (Primary) 68T20 (Secondary) G.2.2; J.4

Cannot find the paper you are looking for? You can Submit a new open access paper.