{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:59Z","timestamp":1750220399043,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,8]],"date-time":"2021-11-08T00:00:00Z","timestamp":1636329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,8]]},"DOI":"10.1145\/3487351.3488337","type":"proceedings-article","created":{"date-parts":[[2022,2,19]],"date-time":"2022-02-19T12:16:07Z","timestamp":1645272967000},"page":"278-282","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Community deception in weighted networks"],"prefix":"10.1145","author":[{"given":"Valeria","family":"Fionda","sequence":"first","affiliation":[{"name":"University of Calabria, Rende, Italy"}]},{"given":"Giuseppe","family":"Pirr\u00f3","sequence":"additional","affiliation":[{"name":"Sapienza University of Rome, Rome, Italy"}]}],"member":"320","published-online":{"date-parts":[[2022,1,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1038\/35065725"},{"key":"e_1_3_2_1_2_1","volume-title":"Community detection in networks: A user guide","author":"Fortunato S.","year":"2016","unstructured":"S. Fortunato and D. Hric , \" Community detection in networks: A user guide ,\" 2016 , arXiv: 1608.00163. S. Fortunato and D. Hric, \"Community detection in networks: A user guide,\" 2016, arXiv:1608.00163."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0003055413000014"},{"key":"e_1_3_2_1_4_1","first-page":"166","volume-title":"Tracking bitcoin users activity using community detection on a network of weak signals,\" in International conference on complex networks and their applications","author":"Remy C.","year":"2017","unstructured":"C. Remy , B. Rym , and L. Matthieu , \" Tracking bitcoin users activity using community detection on a network of weak signals,\" in International conference on complex networks and their applications . Springer , 2017 , pp. 166 -- 177 . C. Remy, B. Rym, and L. Matthieu, \"Tracking bitcoin users activity using community detection on a network of weak signals,\" in International conference on complex networks and their applications. Springer, 2017, pp. 166--177."},{"key":"e_1_3_2_1_5_1","volume-title":"Hiding Individuals and Communities in a Social Network,\" arXiv:1608.00375","author":"Waniek M.","year":"2016","unstructured":"M. Waniek , T. Michalak , T. Rahwan , and M. Wooldridge , \" Hiding Individuals and Communities in a Social Network,\" arXiv:1608.00375 , 2016 . M. Waniek, T. Michalak, T. Rahwan, and M. Wooldridge, \"Hiding Individuals and Communities in a Social Network,\" arXiv:1608.00375, 2016."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2776133"},{"key":"e_1_3_2_1_7_1","first-page":"253","article-title":"The Impact of Unlinkability on Adversarial Community Detection: Effects and Countermeasures","author":"Nagaraja S.","year":"2010","unstructured":"S. Nagaraja , \" The Impact of Unlinkability on Adversarial Community Detection: Effects and Countermeasures ,\" in PETS , 2010 , pp. 253 -- 272 . S. Nagaraja, \"The Impact of Unlinkability on Adversarial Community Detection: Effects and Countermeasures,\" in PETS, 2010, pp. 253--272.","journal-title":"PETS"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14778\/2794367.2794370"},{"key":"e_1_3_2_1_9_1","first-page":"938","article-title":"Rem: From structural entropy to community structure deception","volume":"32","author":"Liu Y.","year":"2019","unstructured":"Y. Liu , J. Liu , Z. Zhang , L. Zhu , and A. Li , \" Rem: From structural entropy to community structure deception ,\" Advances in Neural Information Processing Systems , vol. 32 , pp. 12 938 -- 912 948, 2019 . Y. Liu, J. Liu, Z. Zhang, L. Zhu, and A. Li, \"Rem: From structural entropy to community structure deception,\" Advances in Neural Information Processing Systems, vol. 32, pp. 12 938--12 948, 2019.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3062711"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3054115"},{"key":"e_1_3_2_1_12_1","first-page":"2718","article-title":"Certified robustness of community detection against adversarial structural perturbation via randomized smoothing","volume":"2020","author":"Jia J.","year":"2020","unstructured":"J. Jia , B. Wang , X. Cao , and N. Z. Gong , \" Certified robustness of community detection against adversarial structural perturbation via randomized smoothing ,\" in Proceedings of The Web Conference 2020 , 2020 , pp. 2718 -- 2724 . J. Jia, B. Wang, X. Cao, and N. Z. Gong, \"Certified robustness of community detection against adversarial structural perturbation via randomized smoothing,\" in Proceedings of The Web Conference 2020, 2020, pp. 2718--2724.","journal-title":"Proceedings of The Web Conference"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.48"}],"event":{"name":"ASONAM '21: International Conference on Advances in Social Networks Analysis and Mining","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","IEEE CS"],"location":"Virtual Event Netherlands","acronym":"ASONAM '21"},"container-title":["Proceedings of the 2021 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487351.3488337","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487351.3488337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:48Z","timestamp":1750191528000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487351.3488337"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,8]]},"references-count":13,"alternative-id":["10.1145\/3487351.3488337","10.1145\/3487351"],"URL":"https:\/\/doi.org\/10.1145\/3487351.3488337","relation":{},"subject":[],"published":{"date-parts":[[2021,11,8]]},"assertion":[{"value":"2022-01-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}