{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:56:56Z","timestamp":1763643416151,"version":"3.37.3"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"JSPS KAKENHI","award":["JP 21H04595"],"award-info":[{"award-number":["JP 21H04595"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2022,5,1]]},"DOI":"10.1109\/tnse.2022.3148752","type":"journal-article","created":{"date-parts":[[2022,2,7]],"date-time":"2022-02-07T21:02:55Z","timestamp":1644267775000},"page":"1645-1657","source":"Crossref","is-referenced-by-count":10,"title":["Hiding in Temporal Networks"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2864-6909","authenticated-orcid":false,"given":"Marcin","family":"Waniek","sequence":"first","affiliation":[{"name":"New York University Abu Dhabi, Abu Dhabi, UAE"}]},{"given":"Petter","family":"Holme","sequence":"additional","affiliation":[{"name":"Institute of Innovative Research, Tokyo Institute of Technology, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0070-0667","authenticated-orcid":false,"given":"Talal","family":"Rahwan","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi, Abu Dhabi, UAE"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.3191268"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v14i10.2611"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718519"},{"key":"ref5","first-page":"1","article-title":"Regulation 2016\/679 of the European Parliament and of the Council of 27 Apr. 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/EC","volume-title":"Official J. Eur. Union,","volume":"L119","year":"2016"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107590205"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1510612113"},{"key":"ref8","first-page":"7","article-title":"Anonymizing social networks","author":"Hay","year":"2007"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1629175.1629210"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2933833"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.11142"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2012.03.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0405728101"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1088\/1751-8113\/41\/22\/224015"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1093\/bib\/bbp057"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/51947"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevX.1.011008"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0120567"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.1003142"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.85.026107"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1852658.1852661"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.84.016105"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1137\/16M1066142"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2936217"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23495-9_17"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1038\/s41562-017-0290-3"},{"key":"ref28","first-page":"1341","article-title":"On the construction of covert networks","volume-title":"Proc. 16th Conf. Auton. Agents MultiAgent Syst.","author":"Waniek","year":"2017"},{"key":"ref29","first-page":"628","article-title":"Covert networks: How hard is it to hide","volume-title":"Proc. 18th Int. Conf. Auton. Agents MultiAgent Syst.","author":"Dey","year":"2019"},{"key":"ref30","first-page":"1467","article-title":"The manipulability of centrality measures-An axiomatic approach","volume-title":"Proc. 19th Int. Conf. Auton. Agents MultiAgent Syst.","author":"Was","year":"2020"},{"key":"ref31","first-page":"1389","article-title":"Strategic evasion of centrality measures","volume-title":"Proc. 20th Int. Conf. Auton. Agents MultiAgent Syst.","author":"Waniek","year":"2021"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5451"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-48583-6"},{"key":"ref34","first-page":"305","article-title":"Attacking similarity-based link prediction in social networks","volume-title":"Proc. 18th Int. Conf. Auton. Agents Multi-Agent Syst.","author":"Zhou","year":"2019"},{"key":"ref35","first-page":"321","article-title":"Manipulating node similarity measures in networks","volume-title":"Proc. 19th Int. Conf. Auton. Agents MultiAgent Syst.","author":"Dey","year":"2020"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.isci.2022.104956"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1209\/0295-5075\/118\/36001"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2018.08.018"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1137\/19M1262632"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2591796.2591884"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2011.79"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2008.2006638"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1060"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.jtbi.2010.11.033"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1186\/1741-7015-9-87"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0095978"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1098\/rsif.2008.0013"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0136497"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1371\/annotation\/b20d3cec-62b7-44ec-9150-8a06a9b30a9b"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-016-0084-2"},{"key":"ref51","first-page":"326","article-title":"Data on face-to-face contacts in an office building suggest a low-cost vaccination strategy based on community linkers","volume-title":"Netw. Sci.","volume":"3","author":"Genois","year":"2015"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21863-7_17"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0023176"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0046-3"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/EIDWT.2012.29"},{"article-title":"Crawdad dataset St Andrews\/Sassy (v. 2011-06-03)","year":"2011","author":"Bigwood","key":"ref56"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2011.09.004"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1996.tb02080.x"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488902\/9781297\/09706241.pdf?arnumber=9706241","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T23:31:02Z","timestamp":1705534262000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9706241\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,1]]},"references-count":58,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnse.2022.3148752","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"type":"electronic","value":"2327-4697"},{"type":"electronic","value":"2334-329X"}],"subject":[],"published":{"date-parts":[[2022,5,1]]}}}