How Members of Covert Networks Conceal the Identities of Their Leaders

Author:

Waniek Marcin1ORCID,Michalak Tomasz P.2,Wooldridge Michael3,Rahwan Talal4

Affiliation:

1. New York University Abu Dhabi, and University of Warsaw, Banacha, Warsaw, Poland

2. University of Warsaw, Banacha, Warsaw, Poland

3. University of Oxford, Oxford, UK

4. New York University Abu Dhabi, Abu Dhabi, UAE

Abstract

Centrality measures are the most commonly advocated social network analysis tools for identifying leaders of covert organizations. While the literature has predominantly focused on studying the effectiveness of existing centrality measures or developing new ones, we study the problem from the opposite perspective, by focusing on how a group of leaders can avoid being identified by centrality measures as key members of a covert network. More specifically, we analyze the problem of choosing a set of edges to be added to a network to decrease the leaders’ ranking according to three fundamental centrality measures, namely, degree, closeness, and betweenness. We prove that this problem is NP-complete for each measure. Moreover, we study how the leaders can construct a network from scratch, designed specifically to keep them hidden from centrality measures. We identify a network structure that not only guarantees to hide the leaders to a certain extent but also allows them to spread their influence across the network.

Funder

Polish National Science Centre

European Research Council

Publisher

Association for Computing Machinery (ACM)

Subject

Artificial Intelligence,Theoretical Computer Science

Reference74 articles.

1. Error and attack tolerance of complex networks

2. The rush in a directed graph;Anthonisse Jac M.;Stichting Mathematisch Centrum. Mathematische Besliskunde,1971

3. Emergence of Scaling in Random Networks

4. The evolution of Al Qaeda’s global network and Al Qaeda core’s position within it: A network analysis;Barber Victoria;Perspect. Terror.,2015

5. A Mathematical Model for Group Structures

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Hiding From Centrality Measures: A Stackelberg Game Perspective;IEEE Transactions on Knowledge and Data Engineering;2023-10-01

2. Social diffusion sources can escape detection;iScience;2022-09

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3