Follow
Marcin Waniek
Title
Cited by
Cited by
Year
Hiding individuals and communities in a social network
M Waniek, TP Michalak, MJ Wooldridge, T Rahwan
Nature Human Behaviour, 2018
2532018
Attacking similarity-based link prediction in social networks
K Zhou, TP Michalak, T Rahwan, M Waniek, Y Vorobeychik
AAMAS - International Conference on Autonomous Agents and Multi-Agent Systems, 2019
872019
How to hide one’s relationships from link prediction algorithms
M Waniek, K Zhou, Y Vorobeychik, E Moro, TP Michalak, T Rahwan
Scientific Reports, 2019
48*2019
How weaponizing disinformation can bring down a city’s power grid
G Raman, B AlShebli, M Waniek, T Rahwan, JCH Peng
PLOS One, 2020
372020
On the construction of covert networks
M Waniek, TP Michalak, T Rahwan, M Wooldridge
AAMAS - International Conference on Autonomous Agents and Multi-Agent Systems, 2017
272017
Traffic networks are vulnerable to disinformation attacks
M Waniek, G Raman, B AlShebli, JCH Peng, T Rahwan
Scientific Reports, 2021
262021
The Manipulability of Centrality Measures—An Axiomatic Approach
T Wąs, M Waniek, T Rahwan, T Michalak
AAMAS - International Conference on Autonomous Agents and Multi-Agent Systems, 2020
162020
Strategic Evasion of Centrality Measures
M Waniek, J Woźnica, K Zhou, Y Vorobeychik, T Rahwan, T Michalak
AAMAS - International Conference on Autonomous Agents and Multi-Agent Systems, 2021
102021
Strategic Attack & Defense in Security Diffusion Games
M Waniek, TP Michalak, A Alshamsi
ACM Transactions on Intelligent Systems and Technology (TIST), 2019
102019
Strategic distribution of seeds to support diffusion in complex networks
J Jankowski, M Waniek, A Alshamsi, P Bródka, R Michalski
PLOS One, 2018
102018
Attacking Similarity-Based Sign Prediction
MT Godziszewski, TP Michalak, M Waniek, T Rahwan, K Zhou, Y Zhu
ICDM - IEEE International Conference on Data Mining, 2021
92021
Spiteful bidding in the dollar auction
M Waniek, A Nieścieruk, T Michalak, T Rahwan
IJCAI - International Joint Conference on Artificial Intelligence, 2015
92015
Social diffusion sources can escape detection
M Waniek, P Holme, M Cebrian, T Rahwan
iScience, 2022
82022
Hiding in multilayer networks
M Waniek, T Michalak, T Rahwan
AAAI Conference on Artificial Intelligence, 2020
82020
Beijing’s central role in global artificial intelligence research
B AlShebli, E Cheng, M Waniek, R Jagannathan, P Hernández-Lagos, ...
Scientific Reports, 2022
72022
Hiding in Temporal Networks
M Waniek, P Holme, T Rahwan
IEEE Transactions on Network Science and Engineering (TNSE), 2022
72022
How Members of Covert Networks Conceal the Identities of Their Leaders
M Waniek, TP Michalak, M Wooldridge, T Rahwan
ACM Transactions on Intelligent Systems and Technology (TIST), 2021
62021
Repeated Dollar Auctions: A Multi-Armed Bandit Approach
M Waniek, L Tran-Thanh, T Michalak
AAMAS - International Conference on Autonomous Agents and Multi-Agent Systems, 2016
52016
Hiding from centrality measures: A stackelberg game perspective
M Waniek, J Woźnica, K Zhou, Y Vorobeychik, TP Michalak, T Rahwan
IEEE Transactions on Knowledge and Data Engineering, 2023
32023
In the search for the optimal path to establish a funded pension system
M Bielecki, K Makarski, J Tyrowicz, M Waniek
Faculty of Economic Sciences, University of Warsaw Working Papers, 2015
32015
The system can't perform the operation now. Try again later.
Articles 1–20