Hiding individuals and communities in a social network M Waniek, TP Michalak, MJ Wooldridge, T Rahwan Nature Human Behaviour, 2018 | 256 | 2018 |
Attacking similarity-based link prediction in social networks K Zhou, TP Michalak, T Rahwan, M Waniek, Y Vorobeychik AAMAS - International Conference on Autonomous Agents and Multi-Agent Systems, 2019 | 88 | 2019 |
How to hide one’s relationships from link prediction algorithms M Waniek, K Zhou, Y Vorobeychik, E Moro, TP Michalak, T Rahwan Scientific Reports, 2019 | 49* | 2019 |
How weaponizing disinformation can bring down a city’s power grid G Raman, B AlShebli, M Waniek, T Rahwan, JCH Peng PLOS One, 2020 | 37 | 2020 |
Traffic networks are vulnerable to disinformation attacks M Waniek, G Raman, B AlShebli, JCH Peng, T Rahwan Scientific Reports, 2021 | 27 | 2021 |
On the construction of covert networks M Waniek, TP Michalak, T Rahwan, M Wooldridge AAMAS - International Conference on Autonomous Agents and Multi-Agent Systems, 2017 | 27 | 2017 |
The Manipulability of Centrality Measures—An Axiomatic Approach T Wąs, M Waniek, T Rahwan, T Michalak AAMAS - International Conference on Autonomous Agents and Multi-Agent Systems, 2020 | 16 | 2020 |
Strategic Evasion of Centrality Measures M Waniek, J Woźnica, K Zhou, Y Vorobeychik, T Rahwan, T Michalak AAMAS - International Conference on Autonomous Agents and Multi-Agent Systems, 2021 | 11 | 2021 |
Strategic distribution of seeds to support diffusion in complex networks J Jankowski, M Waniek, A Alshamsi, P Bródka, R Michalski PLOS One, 2018 | 11 | 2018 |
Attacking Similarity-Based Sign Prediction MT Godziszewski, TP Michalak, M Waniek, T Rahwan, K Zhou, Y Zhu ICDM - IEEE International Conference on Data Mining, 2021 | 10 | 2021 |
Strategic Attack & Defense in Security Diffusion Games M Waniek, TP Michalak, A Alshamsi ACM Transactions on Intelligent Systems and Technology (TIST), 2019 | 10 | 2019 |
Hiding in multilayer networks M Waniek, T Michalak, T Rahwan AAAI Conference on Artificial Intelligence, 2020 | 9 | 2020 |
Spiteful bidding in the dollar auction M Waniek, A Nieścieruk, T Michalak, T Rahwan IJCAI - International Joint Conference on Artificial Intelligence, 2015 | 9 | 2015 |
Social diffusion sources can escape detection M Waniek, P Holme, M Cebrian, T Rahwan iScience, 2022 | 8 | 2022 |
Hiding in Temporal Networks M Waniek, P Holme, T Rahwan IEEE Transactions on Network Science and Engineering (TNSE), 2022 | 7 | 2022 |
Beijing’s central role in global artificial intelligence research B AlShebli, E Cheng, M Waniek, R Jagannathan, P Hernández-Lagos, ... Scientific Reports, 2022 | 6 | 2022 |
How Members of Covert Networks Conceal the Identities of Their Leaders M Waniek, TP Michalak, M Wooldridge, T Rahwan ACM Transactions on Intelligent Systems and Technology (TIST), 2021 | 6 | 2021 |
Repeated Dollar Auctions: A Multi-Armed Bandit Approach M Waniek, L Tran-Thanh, T Michalak AAMAS - International Conference on Autonomous Agents and Multi-Agent Systems, 2016 | 5 | 2016 |
Hiding from centrality measures: A Stackelberg game perspective M Waniek, J Woźnica, K Zhou, Y Vorobeychik, TP Michalak, T Rahwan IEEE Transactions on Knowledge and Data Engineering 35 (10), 10058-10071, 2023 | 3 | 2023 |
Hiding opinions from machine learning M Waniek, W Magdy, T Rahwan PNAS Nexus, 2022 | 3 | 2022 |