Here is a list of my publications (in reverse chronological order).
You might also be interested in my Google Scholar profile.
2024
Y. Lai, M. Waniek, L. Li, J. Wu, Y. Zhu, T. Michalak, T. Rahwan, K. Zhou. Coupled-Space Attacks Against Random-Walk-based Anomaly Detection, IEEE TIFS
[PDF] [Published version]A. Nagórko, M. Waniek, M. Róg, M. Godziszewski, B. Rosiak, T. Michalak. General Markov Model for Solving Patrolling Games, UAI (rank A in CORE)
[PDF] [Published version]M. Godziszewski, M. Waniek, Y. Zhu, K. Zhou, T. Rahwan, T. Michalak. Adversarial Analysis of Similarity-Based Sign Predictions, Artificial Intelligence
[PDF] [Published version]
2023
M. Waniek, N. Suri, A. Zameek, B. AlShebli, T. Rahwan. Human intuition as a defense against attribute inference, Scientific Reports
[PDF] [Published version] [Supplementary materials]M. Waniek, J. Woźnica, K. Zhou, Y. Vorobeychik, T. Michalak, T. Rahwan. Hiding from centrality measures: A Stackelberg game perspective, IEEE TKDE
[PDF] [Published version] [Supplementary materials]
2022
M. Waniek, P. Holme, K. Farrahi, R. Emonet, M. Cebrian, T. Rahwan. Trading contact tracing efficiency for finding patient zero, Scientific Reports
[PDF] [Published version] [Supplementary materials]B. AlShebli, E. Cheng, M. Waniek, R. Jagannathan, P. Hernandez-Lagos, T. Rahwan. Beijing's central role in global artificial intelligence research, Scientific Reports
[PDF] [Published version]M. Waniek, C. A. Hidalgo. Bridging the polarization gap: Maximizing diffusion among dissimilar communities, Collective Intelligence
[PDF] [Published version]M. Waniek, W. Magdy, T. Rahwan. Hiding opinions from machine learning, PNAS Nexus
[PDF] [Published version] [Supplementary materials]M. Waniek, P. Holme, M.Cebrian, T. Rahwan. Social diffusion sources can escape detection, iScience
[PDF] [Published version] [Supplementary materials]M. Waniek, P. Holme, T. Rahwan. Hiding in temporal networks, IEEE Transactions on Network Science and Engineering
[PDF] [Published version]
2021
M. Waniek, T. Michalak, M. Wooldridge, T. Rahwan. How members of covert networks conceal the identities of their leaders, ACM Transactions on Intelligent Systems and Technology
[PDF] [Published version]T. Godziszewski, T. Michalak., M. Waniek, T. Rahwan, K. Zhou, Y. Zhu. Attacking similarity-based sign prediction, ICDM 2021 (rank A* in CORE)
[PDF] [Published version]M. Waniek, J. Woźnica, K. Zhou, Y. Vorobeychik, T. Rahwan, T. Michalak. Strategic evasion of centrality measures, AAMAS 2021 (rank A* in CORE)
[PDF] [Published version]M. Waniek, G. Raman, B. AlShebli, J. Peng, T. Rahwan. Traffic networks are vulnerable to disinformation attacks, Scientific Reports
[PDF] [Published version] [Supplementary materials]
2020
G. Raman, B. AlShebli, M. Waniek, T. Rahwan, J. Peng. How weaponizing disinformation can bring down a city's power grid, PLOS One
[PDF] [Published version] [Supplementary materials]T. Wąs, M. Waniek, T. Rahwan, T. Michalak. The manipulability of centrality measures: An axiomatic approach, AAMAS 2020 (rank A* in CORE)
[PDF] [Published version]M. Waniek, T. Michalak, T.Rahwan. Hiding in multilayer networks, AAAI 2020 (rank A* in CORE)
[PDF] [Published version] [Supplementary materials]M. Waniek, K. Elbassioni, F. L. Pinheiro, C. A. Hidalgo, A. Alshamsi. Computational aspects of optimal strategic network diffusion, Theoretical Computer Science
[PDF] [Published version] [arXiv]
2019
M. Waniek, T. Michalak, A. Alshamsi. Strategic attack & defense in security diffusion games, ACM Transactions on Intelligent Systems and Technology (TIST)
[PDF] [Published version]M. Waniek, K. Zhou, Y. Vorobeychik, E. Moro, T. Michalak, T. Rahwan. How to hide one's relationships from link prediction algorithms, Scientific Reports
[PDF] [Published version] [Direct link] [Supplementary materials]K. Zhou, T. Michalak, M. Waniek, T. Rahwan, Y. Vorobeychik. Attacking similarity-based link prediction in social networks, AAMAS 2019 (rank A* in CORE)
[PDF] [Published version]
2018
J. Jankowski, M. Waniek, A. Alshamsi, P. Bródka, R. Michalski. Strategic distribution of seeds to support diffusion in complex networks, PLOS One
[PDF] [Published version] [Supplementary materials]M. Waniek, T. Michalak, M. Wooldridge, T. Rahwan. Hiding individuals and communities in a social network, Nature Human Behaviour
[Published version] [Direct link] [Supplementary materials]
2017
M. Waniek. Hiding in social networks, PhD dissertation
[PDF]M. Waniek, T. Michalak, T. Rahwan, M. Wooldridge. On the construction of covert networks, AAMAS 2017 (rank A* in CORE)
[PDF] [Published version]M. Waniek, L. Tran-Thanh, T. Michalak, N. Jennings. The dollar auction with spiteful players, AAAI 2017 (rank A* in CORE)
[PDF] [Published version] [Supplementary materials]
2016
M. Waniek, L. Tran-Thanh, T. Michalak. Repeated dollar auctions: A multi-armed bandit approach, AAMAS 2016 (rank A* in CORE)
[PDF] [Published version]
2015
M. Waniek, A. Nieścieruk, T. Michalak, T. Rahwan. Spiteful bidding in the dollar auction, IJCAI 2015 (rank A* in CORE)
[PDF] [Published version]
2014
M. Waniek. Petro: a multi-agent model of historical warfare, IAT 2014 (rank B in CORE)
[PDF] [Published version]