On the construction of covert networks

Marcin Waniek, Talal Rahwan, Tomasz P. Michalak, Michael Wooldridge

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Centrality measures are widely used to identify leaders of covert networks. We study how a group of such leaders can avoid being detected by such measures. More concretely, we study the hardness of choosing a set of edges that can be added to the network in order to decrease the leaders' ranking according to two fundamental centrality measures, namely degree, and closeness. We prove that this problem is NP-complete for each measure. We then study how the leaders can construct a network from scratch, designed specifically for them to hide in disguise. We identify a network structure that not only guarantees to hide the leaders to a certain extent, but also allows them to spread their influence across the network.

Original languageEnglish (US)
Title of host publication16th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2017
EditorsEdmund Durfee, Michael Winikoff, Kate Larson, Sanmay Das
PublisherInternational Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS)
Pages1341-1349
Number of pages9
ISBN (Electronic)9781510855076
StatePublished - 2017
Event16th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2017 - Sao Paulo, Brazil
Duration: May 8 2017May 12 2017

Publication series

NameProceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS
Volume3
ISSN (Print)1548-8403
ISSN (Electronic)1558-2914

Other

Other16th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2017
Country/TerritoryBrazil
CitySao Paulo
Period5/8/175/12/17

Keywords

  • Centrality
  • Hiding in networks
  • Social network analysis

ASJC Scopus subject areas

  • Artificial Intelligence
  • Software
  • Control and Systems Engineering

Fingerprint

Dive into the research topics of 'On the construction of covert networks'. Together they form a unique fingerprint.

Cite this