2 code implementations • 26 Jul 2023 • Yuni Lai, Marcin Waniek, Liying Li, Jingwen Wu, Yulin Zhu, Tomasz P. Michalak, Talal Rahwan, Kai Zhou
In addition, we conduct transfer attack experiments in a black-box setting, which show that our feature attack significantly decreases the anomaly scores of target nodes.
no code implementations • 24 Apr 2023 • Marcin Waniek, Navya Suri, Abdullah Zameek, Bedoor AlShebli, Talal Rahwan
Attribute inference - the process of analyzing publicly available data in order to uncover hidden information - has become a major threat to privacy, given the recent technological leap in machine learning.
no code implementations • 22 Sep 2018 • Kai Zhou, Tomasz P. Michalak, Talal Rahwan, Marcin Waniek, Yevgeniy Vorobeychik
We offer a comprehensive algorithmic investigation of the problem of attacking similarity-based link prediction through link deletion, focusing on two broad classes of such approaches, one which uses only local information about target links, and another which uses global network information.
Social and Information Networks Cryptography and Security
no code implementations • 1 Sep 2018 • Marcin Waniek, Kai Zhou, Yevgeniy Vorobeychik, Esteban Moro, Tomasz P. Michalak, Talal Rahwan
Link prediction is one of the fundamental research problems in network analysis.
Social and Information Networks Cryptography and Security 91D30 (Primary) 68T20 (Secondary) G.2.2; J.4
no code implementations • 1 Aug 2016 • Marcin Waniek, Tomasz Michalak, Talal Rahwan, Michael Wooldridge
With this in mind, we ask the question: Can individuals or groups actively manage their connections to evade social network analysis tools?
Social and Information Networks Physics and Society 91D30 (Primary) 68T20 (Secondary) G.2.2; J.4