{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T06:40:13Z","timestamp":1740465613024,"version":"3.37.3"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,8,21]],"date-time":"2024-08-21T00:00:00Z","timestamp":1724198400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,8,21]],"date-time":"2024-08-21T00:00:00Z","timestamp":1724198400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003407","name":"Ministero dell\u2019Istruzione, dell\u2019Universit\u00e0 e della Ricerca","doi-asserted-by":"publisher","award":["H53D23008170001"],"award-info":[{"award-number":["H53D23008170001"]}],"id":[{"id":"10.13039\/501100003407","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007069","name":"Universit\u00e0 della Calabria","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100007069","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>This paper introduces the Better Hide Communities (BHC) benchmark dataset aimed at standardizing evaluations in community deception across networks. BHC addresses the need for a common framework to assess the effectiveness of existing and perspective deception strategies by enabling their comparative analyses. BHC serves as a foundation for future work in developing sophisticated algorithms for community deception, enhancing the understanding of algorithmic abilities to employ deceptive measures within communities. Additionally, it offers valuable insights into the varying degrees of resilience that different detection algorithms exhibit against deception strategies.<\/jats:p>","DOI":"10.1007\/s13278-024-01318-6","type":"journal-article","created":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T15:06:19Z","timestamp":1724339179000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A benchmark dataset for community deception algorithms"],"prefix":"10.1007","volume":"14","author":[{"given":"Valeria","family":"Fionda","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,21]]},"reference":[{"key":"1318_CR1","doi-asserted-by":"publisher","first-page":"P10008","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","volume":"10","author":"VD Blondel","year":"2008","unstructured":"Blondel VD, Guillaume J-L, Lambiotte R, Lefebvre E (2008) Fast unfolding of communities in large networks. J Stat Mech-Theory E 10:P10008","journal-title":"J Stat Mech-Theory E"},{"key":"1318_CR2","unstructured":"Bonald T, Charpentier B, Galland A, Hollocou A (2018) Hierarchical graph clustering using node pair sampling. arxiv:abs\/1806.01664"},{"key":"1318_CR3","unstructured":"Cazabet R, Rossetti G, Milli L (2022) CDlib: a python library to extract, compare and evaluate communities from complex networks (extended abstract). In: Proceedings of MARAMI , CEUR-WS.org"},{"issue":"2","key":"1318_CR4","first-page":"1","volume":"11","author":"T Chakraborty","year":"2016","unstructured":"Chakraborty T, Srinivasan S, Ganguly N, Mukherjee A, Bhowmick S (2016) Permanence and community structure in complex networks. ACM TKDD 11(2):1\u201334","journal-title":"ACM TKDD"},{"issue":"3","key":"1318_CR5","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/TCSS.2019.2912801","volume":"6","author":"J Chen","year":"2019","unstructured":"Chen J, Chen L, Chen Y, Zhao M, Shanqing Yu, Xuan Q, Yang X (2019) Ga-based q-attack on community detection. IEEE Trans Comput Soc Syst 6(3):491\u2013503","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"1","key":"1318_CR6","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/TCSS.2020.3031596","volume":"8","author":"J Chen","year":"2020","unstructured":"Chen J, Chen Y, Chen L, Zhao M, Xuan Q (2020) Multiscale evolutionary perturbation attack on community detection. IEEE Trans Comput Soc Syst 8(1):62\u201375","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"3","key":"1318_CR7","doi-asserted-by":"publisher","first-page":"704","DOI":"10.1109\/TCSS.2021.3054115","volume":"8","author":"X Chen","year":"2021","unstructured":"Chen X, Jiang Z, Li H, Ma J, Philip SY (2021) Community hiding by link perturbation in social networks. IEEE Trans Comput Soc Syst 8(3):704\u2013715","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"1","key":"1318_CR8","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1109\/TCSS.2022.3229162","volume":"11","author":"C Chen","year":"2022","unstructured":"Chen C, Jiang Z, Ma J (2022) Privacy protection for marginal-sensitive community individuals against adversarial community detection attacks. IEEE Trans Comput Soc Syst 11(1):782\u2013794","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"6","key":"1318_CR9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.066111","volume":"70","author":"A Clauset","year":"2004","unstructured":"Clauset A, Newman MEJ, Moore C (2004) Finding community structure in very large networks. Phys Rev E 70(6):066111","journal-title":"Phys Rev E"},{"key":"1318_CR10","doi-asserted-by":"crossref","unstructured":"Fionda V, Palopoli L, Panni S, Rombo SE (2008) Protein-protein interaction network querying by a \u201cfocus and zoom\u201d approach. In BIRD, CCIS, vol. 13. pp 331\u2013346","DOI":"10.1007\/978-3-540-70600-7_25"},{"issue":"4","key":"1318_CR11","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1504\/IJDMB.2009.029205","volume":"3","author":"V Fionda","year":"2009","unstructured":"Fionda V, Palopoli L, Panni S, Rombo SE (2009) A technique to search for functional similarities in protein-protein interaction networks. Int J Data Min Bioinform 3(4):431\u2013453","journal-title":"Int J Data Min Bioinform"},{"key":"1318_CR12","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.artint.2016.07.003","volume":"239","author":"V Fionda","year":"2016","unstructured":"Fionda V, Gutierrez C, Pirr\u00f2 G (2016) Building knowledge maps of Web graphs. Artif Intell 239:143\u2013167","journal-title":"Artif Intell"},{"issue":"4","key":"1318_CR13","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TKDE.2017.2776133","volume":"30","author":"V Fionda","year":"2018","unstructured":"Fionda V, Pirr\u00f2 G (2018) Community deception or: how to stop fearing community detection algorithms. IEEE Trans Knowl Data Eng 30(4):660\u2013673","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1318_CR14","doi-asserted-by":"crossref","unstructured":"Fionda V, Pirr\u00f2 G (2022) Community  deception in networks: where we are and where we should go. In: Proceedings of Complex Networks & Their Applications X, Springer International Publishing, Cham, pp 144\u2013155","DOI":"10.1007\/978-3-030-93413-2_13"},{"issue":"1","key":"1318_CR15","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/s13278-022-00896-7","volume":"12","author":"V Fionda","year":"2022","unstructured":"Fionda V, Madi SA, Pirr\u00f2 G (2022) Community deception: from undirected to directed networks. Soc Netw Anal Min 12(1):74","journal-title":"Soc Netw Anal Min"},{"key":"1318_CR16","doi-asserted-by":"crossref","unstructured":"Fionda V (2023) Better hide communities: benchmarking community deception algorithms. In: Proceedings of Complex Networks & Their Applications, Springer International Publishing, pp 378\u2013387","DOI":"10.1007\/978-3-031-53503-1_31"},{"issue":"1","key":"1318_CR17","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1109\/TCSS.2022.3213722","volume":"11","author":"V Fionda","year":"2024","unstructured":"Fionda V, Pirr\u00f2 G (2024) Community deception in attributed networks. IEEE Trans Comput Soc Syst 11(1):228\u2013237","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"4","key":"1318_CR18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.78.046110","volume":"78","author":"A Lancichinetti","year":"2008","unstructured":"Lancichinetti A, Fortunato S, Radicchi F (2008) Benchmark graphs for testing community detection algorithms. Phys Rev E 78(4):046110","journal-title":"Phys Rev E"},{"key":"1318_CR19","doi-asserted-by":"crossref","unstructured":"Li J, Zhang H, Han Z, Rong Y, Cheng H, Huang J (2020) Adversarial attack on community detection by hiding individuals. In: The Web Conference, pp 917\u2013927","DOI":"10.1145\/3366423.3380171"},{"key":"1318_CR20","unstructured":"Liu Y, Liu J, Zhang Z, Zhu L, Li A(2019) REM: from structural entropy to community structure deception. Adv Neural Inf Process Syst, 32"},{"key":"1318_CR21","doi-asserted-by":"crossref","unstructured":"Liu X, Fu L, Wang X, Hopcroft JE (2021) Prohico: a probabilistic framework to hide communities in large networks. In: IEEE INFOCOM","DOI":"10.1109\/INFOCOM42981.2021.9488870"},{"key":"1318_CR22","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.ins.2022.10.027","volume":"614","author":"D Liu","year":"2022","unstructured":"Liu D, Chang Z, Yang G, Chen E (2022) Hiding ourselves from community detection through genetic algorithms. J Inf Sci 614:123\u2013137","journal-title":"J Inf Sci"},{"issue":"4","key":"1318_CR23","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1109\/TBDATA.2022.3152431","volume":"8","author":"D Liu","year":"2022","unstructured":"Liu D, Yang G, Wang Y, Jin H, Chen E (2022) How to protect ourselves from overlapping community detection in social networks. IEEE Trans Big Data 8(4):894\u2013904","journal-title":"IEEE Trans Big Data"},{"key":"1318_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109495","volume":"253","author":"D Liu","year":"2022","unstructured":"Liu D, Chang Z, Yang G, Chen E (2022) Community hiding using a graph autoencoder. Knowl Based Syst 253:109495","journal-title":"Knowl Based Syst"},{"issue":"4","key":"1318_CR25","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1007\/s00265-003-0651-y","volume":"54","author":"D Lusseau","year":"2003","unstructured":"Lusseau D, Schneider K, Boisseau OJ, Haase P, Slooten E, Dawson SM (2003) The bottlenose dolphin community of doubtful sound features a large proportion of long-lasting associations. Behav Ecol Sociobiol 54(4):396\u2013405","journal-title":"Behav Ecol Sociobiol"},{"issue":"2","key":"1318_CR26","doi-asserted-by":"publisher","first-page":"2955","DOI":"10.1109\/TCSS.2023.3306787","volume":"11","author":"SA Madi","year":"2023","unstructured":"Madi SA, Pirr\u00f2 G (2023) Node-centric community deception based on safeness. IEEE Trans Comput Soc Syst 11(2):2955\u20132965","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"1","key":"1318_CR27","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1109\/TNSE.2020.3049068","volume":"8","author":"T Magelinski","year":"2021","unstructured":"Magelinski T, Bartulovic M, Carley KM (2021) Measuring node contribution to community structure with modularity vitality. IEEE Trans Netw Sci Eng 8(1):707\u2013723","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"4","key":"1318_CR28","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1109\/TCSS.2021.3062711","volume":"8","author":"S Mittal","year":"2021","unstructured":"Mittal S, Sengupta D, Chakraborty T (2021) Hide and seek: outwitting community detection algorithms. IEEE Trans Comput Soc Syst 8(4):799\u2013808","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"1318_CR29","doi-asserted-by":"crossref","unstructured":"Nagaraja S (2010) The impact of unlinkability on adversarial community detection: effects and countermeasures. In: PETS, pp 253\u2013272","DOI":"10.1007\/978-3-642-14527-8_15"},{"issue":"23","key":"1318_CR30","doi-asserted-by":"publisher","first-page":"8577","DOI":"10.1073\/pnas.0601602103","volume":"103","author":"MEJ Newman","year":"2006","unstructured":"Newman MEJ (2006) Modularity and community structure in networks. PNAS 103(23):8577\u20138582","journal-title":"PNAS"},{"issue":"3","key":"1318_CR31","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.74.036104","volume":"74","author":"MEJ Newman","year":"2006","unstructured":"Newman MEJ (2006) Finding community structure in networks using the eigenvectors of matrices. Phys Rev E 74(3):036104","journal-title":"Phys Rev E"},{"issue":"1","key":"1318_CR32","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1109\/TNSE.2023.3311762","volume":"11","author":"G Pirr\u00f2","year":"2023","unstructured":"Pirr\u00f2 G (2023) Community deception from a node-centric perspective. IEEE Trans Netw Sci Eng 11(1):969\u2013981","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"2","key":"1318_CR33","doi-asserted-by":"publisher","first-page":"191","DOI":"10.7155\/jgaa.00124","volume":"10","author":"P Pons","year":"2006","unstructured":"Pons P, Latapy M (2006) Computing communities in large networks using random walks. J Graph Algorithms Appl 10(2):191\u2013218","journal-title":"J Graph Algorithms Appl"},{"key":"1318_CR34","doi-asserted-by":"crossref","unstructured":"Revelle M, Domeniconi C, Sweeney M, Johri A (2015) Finding community topics and membership in graphs. In: ECML\/PKDD, pp 625\u2013640","DOI":"10.1007\/978-3-319-23525-7_38"},{"issue":"4","key":"1318_CR35","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1073\/pnas.0706851105","volume":"105","author":"M Rosvall","year":"2008","unstructured":"Rosvall M, Bergstrom CT (2008) Maps of random walks on complex networks reveal community structure. Proc Natl Acad Sci USA 105(4):1118\u20131123","journal-title":"Proc Natl Acad Sci USA"},{"issue":"1","key":"1318_CR36","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.90.012811","volume":"90","author":"S Sobolevsky","year":"2014","unstructured":"Sobolevsky S, Campari R, Belyi A, Ratti C (2014) General optimization technique for high-quality community detection in complex networks. Phys Rev E 90(1):012811","journal-title":"Phys Rev E"},{"key":"1318_CR37","doi-asserted-by":"crossref","unstructured":"Traag VA, Waltman L, van Eck NJ (2018) From Louvain to Leiden: guaranteeing well-connected communities. arXiv:abs\/1810.08473","DOI":"10.1038\/s41598-019-41695-z"},{"issue":"2","key":"1318_CR38","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1038\/s41562-017-0290-3","volume":"2","author":"M Waniek","year":"2018","unstructured":"Waniek M, Michalak TP, Wooldridge MJ, Rahwan T (2018) Hiding individuals and communities in a social network. Nature Human Behav 2(2):139\u2013147","journal-title":"Nature Human Behav"},{"key":"1318_CR39","doi-asserted-by":"crossref","unstructured":"Yang J, McAuley J, Leskovec J (2013) Community Detection in Networks with Node Attributes. In: ICMD, pp 1151\u20131156","DOI":"10.1109\/ICDM.2013.167"},{"issue":"2","key":"1318_CR40","doi-asserted-by":"publisher","first-page":"2966","DOI":"10.1109\/TCSS.2023.3312394","volume":"11","author":"H Yang","year":"2023","unstructured":"Yang H, Chen L, Cheng F, Qiu J, Zhang L (2023) Lsha: a local structure-based community detection attack heuristic approach. IEEE Trans Comput Soc Syst 11(2):2966\u20132978","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"1318_CR41","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1086\/jar.33.4.3629752","volume":"33","author":"WW Zachary","year":"1977","unstructured":"Zachary WW (1977) An information flow model for conflict and fission in small groups. J Anthropol Res 33:452\u2013473","journal-title":"J Anthropol Res"},{"issue":"2","key":"1318_CR42","doi-asserted-by":"publisher","first-page":"2057","DOI":"10.1109\/TCSS.2023.3268564","volume":"11","author":"C Zhang","year":"2023","unstructured":"Zhang C, Fu L, Ding J, Cao X, Long F, Wang X, Zhou L, Zhang J, Zhou C (2023) Community deception in large networks: through the lens of laplacian spectrum. IEEE Trans Comput Soc Syst 11(2):2057\u20132069","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"8","key":"1318_CR43","doi-asserted-by":"publisher","first-page":"4954","DOI":"10.1109\/TSMC.2023.3240765","volume":"53","author":"J Zhao","year":"2023","unstructured":"Zhao J, Wang Z, Cao J, Cheong KH (2023) A self-adaptive evolutionary deception framework for community structure. IEEE Trans Syst Man Cybern 53(8):4954\u20134967","journal-title":"IEEE Trans Syst Man Cybern"},{"issue":"6","key":"1318_CR44","doi-asserted-by":"publisher","first-page":"1926","DOI":"10.1109\/TEVC.2023.3242051","volume":"27","author":"J Zhao","year":"2023","unstructured":"Zhao J, Cheong KH (2023) Obfuscating community structure in complex network with evolutionary divide-and-conquer strategy. IEEE Trans Evol Comput 27(6):1926\u20131940","journal-title":"IEEE Trans Evol Comput"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-024-01318-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13278-024-01318-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-024-01318-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T05:40:51Z","timestamp":1740462051000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13278-024-01318-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,21]]},"references-count":44,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["1318"],"URL":"https:\/\/doi.org\/10.1007\/s13278-024-01318-6","relation":{},"ISSN":["1869-5469"],"issn-type":[{"type":"electronic","value":"1869-5469"}],"subject":[],"published":{"date-parts":[[2024,8,21]]},"assertion":[{"value":"22 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 June 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 July 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"166"}}