Manipulating node similarity measures in networks
Node similarity measures quantify how similar a pair of nodes are in a network. These
similarity measures turn out to be an important fundamental tool for many real world …
similarity measures turn out to be an important fundamental tool for many real world …
Adversarial analysis of similarity-based sign prediction
Adversarial social network analysis explores how social links can be altered or otherwise
manipulated to hinder unwanted information collection. To date, however, problems of this …
manipulated to hinder unwanted information collection. To date, however, problems of this …
Hiding from centrality measures: A Stackelberg game perspective
Centrality measures can rank nodes in a social network according to their importance.
However, in many cases, a node may want to avoid being highly ranked by such measures …
However, in many cases, a node may want to avoid being highly ranked by such measures …
How members of covert networks conceal the identities of their leaders
Centrality measures are the most commonly advocated social network analysis tools for
identifying leaders of covert organizations. While the literature has predominantly focused …
identifying leaders of covert organizations. While the literature has predominantly focused …
Hiding in temporal networks
Social network analysis tools can infer various attributes just by scrutinizing one's
connections. Several researchers have studied the problem faced by an evader whose goal …
connections. Several researchers have studied the problem faced by an evader whose goal …
Human intuition as a defense against attribute inference
Attribute inference—the process of analyzing publicly available data in order to uncover
hidden information—has become a major threat to privacy, given the recent technological …
hidden information—has become a major threat to privacy, given the recent technological …
Network Members Can Hide from Group Centrality Measures
Group centrality measures are a generalization of standard centrality, designed to quantify
the importance of not just a single node (as is the case with standard measures) but rather …
the importance of not just a single node (as is the case with standard measures) but rather …
Computational Robotics: An Alternative Approach for Predicting Terrorist Networks
Increasing terrorist activities globally have attracted the attention of many researchers, policy
makers and security agencies towards counterterrorism. The clandestine nature of terrorist …
makers and security agencies towards counterterrorism. The clandestine nature of terrorist …
Adversarial Link Prediction in Spatial Networks
Social networks arise as a result of complex interactions among people, and homophily
plays an important role in this process. If we view homophily as a dominant force in network …
plays an important role in this process. If we view homophily as a dominant force in network …
Parameterized Complexity of the Hiding Leader problem
M Karra - 2023 - dr.iiserpune.ac.in
In this thesis, we study the theory of parametrized complexity and examine parameterized
complexity of the Hiding Leader problem. We discuss standard tools and techniques for …
complexity of the Hiding Leader problem. We discuss standard tools and techniques for …