暂无分享,去创建一个
[1] Tomasz P. Michalak,et al. On the Construction of Covert Networks , 2017, AAMAS.
[2] Talal Rahwan,et al. Attacking Similarity-Based Link Prediction in Social Networks , 2018, AAMAS.
[3] E. Lazega. Introduction : Collegial Phenomenon : The Social Mechanisms of Cooperation Among Peers in a Corporate Law Partnership , 2001 .
[4] Mason A. Porter,et al. Multilayer networks , 2013, J. Complex Networks.
[5] Qi Xuan,et al. Target Defense Against Link-Prediction-Based Attacks via Evolutionary Perturbations , 2018, IEEE Transactions on Knowledge and Data Engineering.
[6] Leonard M. Freeman,et al. A set of measures of centrality based upon betweenness , 1977 .
[7] M. A. Beauchamp. AN IMPROVED INDEX OF CENTRALITY. , 1965, Behavioral science.
[8] Victor Asal,et al. Lethal Connections: The Determinants of Network Connections in the Provisional Irish Republican Army, 1970–1998 , 2014 .
[9] Barbora Micenková,et al. Combinatorial Analysis of Multiple Networks , 2013, ArXiv.
[10] Jian Pei,et al. A brief survey on anonymization techniques for privacy preserving publishing of social network data , 2008, SKDD.
[11] Krishna P. Gummadi,et al. You are who you know: inferring user profiles in online social networks , 2010, WSDM '10.
[12] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[13] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[14] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[15] Alan M. Frieze,et al. Random graphs , 2006, SODA '06.
[16] Ryan Miller,et al. Three is The Answer: Combining Relationships to Analyze Multilayered Terrorist Networks , 2017, 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[17] Alex Bavelas. A Mathematical Model for Group Structures , 1948 .
[18] A. Arenas,et al. Mathematical Formulation of Multilayer Networks , 2013, 1307.4977.
[19] Fabio Celli,et al. Social Network Data and Practices: The Case of Friendfeed , 2010, SBP.
[20] Kai Zhou,et al. How to Hide One’s Relationships from Link Prediction Algorithms , 2019, Scientific Reports.
[21] R. Kitchin,et al. The ethics of smart cities and urban science , 2016, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[22] M. E. Shaw. Group Structure and the Behavior of Individuals in Small Groups , 1954 .
[23] Zhiwei Steven Wu,et al. Private algorithms for the protected in social network search , 2016, Proceedings of the National Academy of Sciences.
[24] David Zuckerman,et al. Electronic Colloquium on Computational Complexity, Report No. 100 (2005) Linear Degree Extractors and the Inapproximability of MAX CLIQUE and CHROMATIC NUMBER , 2005 .
[25] Talal Rahwan,et al. Hiding individuals and communities in a social network , 2016, Nature Human Behaviour.
[26] Talal Rahwan,et al. Strategic Social Network Analysis , 2017, AAAI.