Marcin Waniek

Orcid: 0000-0002-2864-6909

According to our database1, Marcin Waniek authored at least 28 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Coupled-Space Attacks Against Random-Walk-Based Anomaly Detection.
IEEE Trans. Inf. Forensics Secur., 2024

Adversarial analysis of similarity-based sign prediction.
Artif. Intell., 2024

2023
Hiding From Centrality Measures: A Stackelberg Game Perspective.
IEEE Trans. Knowl. Data Eng., October, 2023

Network Members Can Hide from Group Centrality Measures.
CoRR, 2023

Dual-Space Attacks against Random-Walk-based Anomaly Detection.
CoRR, 2023

Human intuition as a defense against attribute inference.
CoRR, 2023

2022
Hiding in Temporal Networks.
IEEE Trans. Netw. Sci. Eng., 2022

How Members of Covert Networks Conceal the Identities of Their Leaders.
ACM Trans. Intell. Syst. Technol., 2022

2021
Social Diffusion Sources Can Escape Detection.
CoRR, 2021

Attacking Similarity-Based Sign Prediction.
Proceedings of the IEEE International Conference on Data Mining, 2021

Strategic Evasion of Centrality Measures.
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021

2020
Strategic Attack & Defense in Security Diffusion Games.
ACM Trans. Intell. Syst. Technol., 2020

Computational aspects of optimal strategic network diffusion.
Theor. Comput. Sci., 2020

Traffic networks are vulnerable to disinformation attacks.
CoRR, 2020

The Manipulability of Centrality Measures-An Axiomatic Approach.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

Hiding in Multilayer Networks.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
How weaponizing disinformation can bring down a city's power grid.
CoRR, 2019

Attacking Similarity-Based Link Prediction in Social Networks.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

2018
Security Diffusion Games.
CoRR, 2018

Adversarial Link Prediction in Social Networks.
CoRR, 2018

Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network.
CoRR, 2018

2017
On the Construction of Covert Networks.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

The Dollar Auction with Spiteful Players.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Hiding Individuals and Communities in a Social Network.
CoRR, 2016

Repeated Dollar Auctions: A Multi-Armed Bandit Approach.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

2015
Spiteful Bidding in the Dollar Auction.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

2014
Petro: A Multi-agent Model of Historical Warfare.
Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), Warsaw, Poland, August 11-14, 2014, 2014

An agent-based simulation of the battle of Kokenhausen.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014


  Loading...