2022
DOI: 10.1109/tnse.2022.3148752
|View full text |Cite
|
Sign up to set email alerts
|

Hiding in Temporal Networks

Abstract: Social network analysis tools can infer various attributes just by scrutinizing one's connections. Several researchers have studied the problem faced by an evader whose goal is to strategically rewire their social connections in order to mislead such tools, thereby concealing their private attributes. However, to date this literature has only considered static networks, while neglecting the more general case of temporal networks, where the structure evolves over time. Driven by this observation, we study how t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 50 publications
0
4
0
Order By: Relevance
“…Numerous real-world systems, such as those in nature, society, and technology, can be modeled as networks [54,79]. To date, most network studies have concentrated on static networks, while ignoring that many real networks undergo topological evolutions over time [79,80]. In particular, the topological evolution of emerging technology innovation networks, in reality, has obvious time attributes and will display temporal features with the cyclical development of emerging technology.…”
Section: Discussionmentioning
confidence: 99%
“…Numerous real-world systems, such as those in nature, society, and technology, can be modeled as networks [54,79]. To date, most network studies have concentrated on static networks, while ignoring that many real networks undergo topological evolutions over time [79,80]. In particular, the topological evolution of emerging technology innovation networks, in reality, has obvious time attributes and will display temporal features with the cyclical development of emerging technology.…”
Section: Discussionmentioning
confidence: 99%
“…There exists a growing literature on avoiding detection by a wide range of social network analysis tools. Such hiding techniques can be used to prevent a closely cooperating group of nodes from being identified by community detection algorithms (Waniek et al, 2018), or prevent the leader of the organization from being recognized by centrality measures in standard (Waniek et al, 2017(Waniek et al, , 2021bWas et al, 2020), multilayer (Waniek et al, 2020), and temporal (Waniek et al, 2022) networks. Similar techniques can be used to prevent an undisclosed relationship from being exposed by link prediction algorithms (Waniek et al, 2019;Zhou et al, 2019).…”
Section: Discussionmentioning
confidence: 99%
“…Another facet of the problem that was analyzed in the literature is the axiomatic characterization of the centrality measures that are resilient to manipulation [15]. While most works considers standard network structure, some examine networks that consist of multiple layers [16], or temporal networks where edges exists only at specific moments [17].…”
Section: Related Workmentioning
confidence: 99%