Hiding in Temporal Networks
Abstract
Social network analysis tools can infer various attributes just by scrutinizing one’s connections. Several researchers have studied the problem faced by an evader whose goal is to strategically rewire their social connections in order to mislead such tools, thereby concealing their private attributes. However, to date this literature has only considered static networks, while neglecting the more general case of temporal networks, where the structure evolves over time. Driven by this observation, we study how the evader can conceal their importance from an adversary armed with temporal centrality measures. We consider computational and structural aspects of this problem: Is it computationally feasible to calculate optimal ways of hiding? If it is, what network characteristics facilitate hiding? This topic has been studied in static networks, but in this work, we add realism to the problem by considering temporal networks of edges changing in time. We find that it is usually computationally infeasible to find the optimal way of hiding. On the other hand, by manipulating one’s contacts, one could add a surprising amount of privacy. Compared to static networks, temporal networks offer more strategies for this type of manipulation and are thus, to some extent, easier to hide in.
1 Introduction
The increasing sophistication and ubiquity of computer-based invigilation tools is a persistent threat to the privacy of the general public. The increasing number of privacy-related scandals, such as Cambridge Analytica using data of millions of Facebook users for political agendas [18], demonstrates just how vulnerable our private information is in the age of social media. Network data, from social media in particular, can be used to uncover sensitive information, such as sexual orientation [20], relationship status [12], or political views [32].
Due to this vulnerability of network data, a number of privacy-preservation solutions have been proposed, both in terms of legislature [9] and algorithmic solutions [25, 21]. Most of the literature puts the responsibility of protecting the system users’ privacy in the hands of a centralized authority [13, 22, 10], but such an authority might be prone to error and negligence. A different body of literature proposes methods that can be applied by members of the social network to protect their own privacy, without having to rely on any central entities [56, 30].
Nevertheless, so far, the development of privacy-protection schemes for network data has focused on networks that are static, i.e., whose structure do not change over time. At the same time, network science researchers are starting to shift their attention to temporal networks—the more general case where the structure is allowed to change [16]. In many domains that involve dynamic changes, momentary contacts, and processes unfolding over time, the added complexity of a temporal-network approach can be justified by an added predictive and explanatory power [16]. Temporal networks already found application in such varied areas as communication [8, 3], microbiology [35, 36], and face-to-face interactions [41]. Nevertheless, so far no privacy-protection solutions have been proposed for temporal networks.
Motivated by the relevance of the growing privacy threats and the increasing popularity of temporal networks, in this work we examine how a member of a temporal network can avoid being detected by temporal centrality measures. We set out to investigate the issue from both theoretical and empirical standpoints. As for the theoretical analysis, we evaluate the computational complexity of the problem faced by an evader who wishes to rewire the network in order to obscure their central position in it. We consider both the decision version of the problem—if it is possible to find an optimal solution in polynomial time—as well as the optimization version—if it is possible to identify a solution that is guaranteed to be within a certain bound from optimum. As for the empirical analysis, we consider several real-life temporal network datasets and investigate how effectively the top nodes in the temporal centrality rankings can conceal their importance. We not only observe the results of the hiding process but also identify, using regression analysis, the properties of the nodes that allow them to conceal their importance effectively. Altogether, our study is the first analysis of strategic evasion of social network analysis tools in temporal networks.
2 Related Work
In recent years there has been a growing interest in temporal networks, where the network structure is not static, but instead changes with the passage of time [16]. Temporal networks found particularly relevant applications in epidemics, where they have been used to predict the infection’s reproduction number [15] and to construct static graphs based on temporal contact data [14]. In the context of our work, an essential class of tools for the analysis of temporal networks are centrality measures [23]. The approach to their design varies greatly, ranging from the analysis of network flows [42] and shortest temporal paths [34], to the applications of eigenvector-like techniques [43, 26, 44].
The topic of avoiding detection by social network analysis tools recently received some attention in the literature devoted to static networks. The greatest amount of attention is focused on hiding from centrality measures, either by lowering the node’s centrality, either in absolute terms [51] or in relative terms [50, 5]. Other works provide an axiomatic characterization of centrality measures that are resilient to being fooled [54], analyze the possible strategies of an adversary who is aware of the existence of nodes that want to hide themselves [52], or consider the problem of hiding from centrality measures in multilayer networks [49]. Other hiding problems considered in the literature include preventing the identification of closely-cooperating groups of nodes by community detection algorithms [51], avoiding the detection of private relationships by link prediction algorithms [53, 57], and investigating the possibility of concealing the source of network diffusion from source detection algorithms [48]. All of these works consider only static networks.
3 Preliminaries
3.1 Temporal Networks
Throughout the article, we will let denote a time interval of discrete time steps, i.e., . We will sometimes refer to a particular as the moment . Let us denote by a temporal network, where is the set of nodes, is the set of contacts, and is the duration of the time interval during which the contacts in take place. We denote a contact (sometimes also called a temporal edge) between nodes and at time by . In this work we only consider undirected temporal networks, i.e., we do not discern between contacts and . Moreover, we assume that networks do not contain self-contacts, i.e., . We denote all contacts of a given node by . Finally, for we denote by the effect of adding the set of contacts to , i.e., .
A time-respecting path in a temporal network is an ordered sequence of distinct contacts from , , in which for every two consecutive contacts and we have that and . The duration of the path is the time difference between the first and the last contact in the path, i.e., the duration of a path is . Let denote the set of temporal paths from to with the minimal duration. We say that we can reach node from node at time if there exists a time-respecting path from to that starts at time greater than or equal to . The latency between and at time is the shortest time it takes to reach from starting at time along time-respecting paths, we denote it by . If no such time-respecting path exists then . We denote average latency between and by . Notice that average latency is the area under the latency plot, divided by the length of the time interval . Following Pan and Saramäki [34] we assume a pair-specific temporal boundary condition, where for every pair of nodes, the first time-respecting path between them is repeated after the end of the observed time interval when computing the average latency for that pair. Hence, if there exists at least one time-respecting path between the pair of nodes, then the average latency between them is finite. An example of a latency plot used to compute the average latency is presented in Figure 1.

To make the notation more readable, we will often omit the temporal network itself from the notation whenever it is clear from the context, e.g., by writing instead of . This applies not only to the notation presented thus far, but rather to all notation in this article.
3.2 Temporal Centrality Measures
Centrality measures quantify the importance of a given node in a network. The concept has also been extended to temporal networks [23]. In this work we consider the following temporal centrality measures:
-
•
Degree temporal centrality [23]—importance of a node corresponds to its number of contacts.
-
•
Closeness temporal centrality [34]—importance of a node corresponds to its average latency to other nodes.
-
•
Betweenneess temporal centrality [42]—importance of a node corresponds to the percentage of shortest temporal paths between pairs of other nodes passing through .
where is the set of shortest temporal paths from to such that belongs to the path and either contacts between and its predecessor and successor take place at moment , or contact between and its predecessor takes place at or before moment , while the contact between and its successor takes place after moment :
-
•
Eigenvector temporal centrality [26]—importance of a node corresponds to the importance of its neighbors. The temporal version of the eigenvector centrality was defined in a number of ways [43, 17, 55, 45]. In our work we use algorithm by Lv et al. [26], as it allows to efficiently process even relatively large networks.
4 Theoretical Analysis
We now present the formal definition of the computational problems faced by the evader, starting with finding an optimal way of hiding within a certain budget.
Definition 1 (Temporal Hiding).
An instance of the Temporal Hiding problem is defined by a tuple , where is a temporal network, is the evader, is the set of contacts allowed to be added, is the set of contacts allowed to be removed, is a budget specifying the maximum number of contacts that can be added or removed, is a temporal centrality measure, and is a chosen safety threshold. The goal is then to identify two sets, and , such that and:
where .
We also present an approximation version of the problem, where the goal of the evader is to satisfy a certain safety threshold using as few network modifications as possible.
Definition 2 (Minimum Temporal Hiding).
An instance of the Minimum Temporal Hiding problem is defined by a tuple , where is a temporal network, is the evader, is the set of contacts allowed to be added, is the set of contacts allowed to be removed, is a temporal centrality measure, and is a chosen safety threshold. The goal is then to identify two sets, and , such that the sum of their sizes is as small as possible and and:
where .
Centrality | Temporal Hiding | Minimum Temporal Hiding |
Degree | NP-complete (Theorem 1) | We show a -approximation algorithm (Theorem 4) |
Closeness | NP-complete (Theorem 2) | Inapproximable within for any (Theorem 5) |
Betweenness | NP-complete (Theorem 3) | Inapproximable within for any (Theorem 6) |
Table 1 presents the summary of our computational complexity results.
Theorem 1.
Temporal Hiding problem is NP-complete given the degree temporal centrality.
Proof.
The problem is trivially in NP, since after adding and removing a given set of contacts we can computed the ranking of all nodes according to the degree temporal centrality in polynomial time.
We will now prove the NP-hardness of the problem. To this end, we will show a reduction from the NP-complete Finding -Clique problem. The decision version of this problem is defined by a simple network, , where , and a constant , where the goal is to determine whether there exist nodes forming a clique in .
Let be a given instance of the Finding -Clique problem. Let us assume that , i.e., network has at least two nodes.
We will now construct an instance of the Temporal Hiding problem. First, let us construct a temporal network where:
-
•
,
-
•
,
-
•
.
An example of the construction of the network is presented in Figure 2.
Now, consider the instance of the Temporal Hiding problem, where:
-
•
is the temporal network we just constructed,
-
•
is the evader,
-
•
, i.e., only edges existing in can be added to , all of them in moment ,
-
•
, i.e., none of the edges can be removed,
-
•
,
-
•
is the temporal degree centrality,
-
•
is the safety threshold.
Since , for any solution to the constructed instance of the Temporal Hiding problem we must have . Hence, we will omit mentions of in the remainder of the proof, and we will assume that a solution consists just of .
Note that the number of contacts of the evader in is , and it does not change after the addition of any (as we can only add edges between the members of ). Furthermore, note that the number of contacts of every node is , and it cannot be increased. Therefore, the only nodes that can contribute to satisfying the safety threshold (by increasing their centrality to a value greater than that of the evader) are the nodes in . The number of contacts of any in is (as it contacts with nodes and with the node ). Therefore, for a given to have a greater number of contacts than , we have to add to at least contacts incident with .

We will now show that the constructed instance of the Temporal Hiding problem has a solution if and only if the given instance of the Finding -Clique problem has a solution.
Assume that there exists a solution to the given instance of the Finding -Clique problem, i.e., a subset forming a -clique in . We will show that is a solution to the constructed instance of the Temporal Hiding problem. First, notice that indeed , as contains all edges from at moment , and is a clique in . Note also that adding to increases the number of contacts of nodes in to , i.e., to a value greater than the number of contacts of the evader. We showed that if there exists a solution to the given instance of the Finding -Clique problem, then there also exists a solution to the constructed instance of the Temporal Hiding problem.
Assume that there exists a solution to the constructed instance of the Temporal Hiding problem. We will show that forms a -clique in . Notice that since is a solution, it increases the number of contacts of at least nodes in (since the safety threshold is ) by at least . However, since the budget is , adding must increase the number of contacts of exactly nodes in by exactly . If such a choice is available, the nodes in form a clique in at moment , therefore, they also form a clique in . We showed that if there exists a solution to the constructed instance of the Temporal Hiding problem, then there also exists a solution to the given instance of the Finding -Clique problem. This concludes the proof. ∎
Theorem 2.
Temporal Hiding problem is NP-complete given the closeness temporal centrality.
Proof.
The problem is trivially in NP since after adding and removing a given set of contacts, we can compute the ranking of all nodes according to the closeness temporal centrality in polynomial time.
We will now prove that the problem is NP-hard. To this end, we will show a reduction from the NP-complete Set Cover problem. The decision version of this problem is defined by a universe, , a collection of sets such that , and an integer where the goal is to determine whether there exist elements of the union of which equals .
Let be a given instance of the Set Cover problem. Let us assume that , note that all instances where can be solved in polynomial time. We will now construct an instance of the Temporal Hiding problem. First, let us construct a temporal network where:
-
•
,
-
•
,
-
•
.
An example of the construction of the network is presented in Figure 3.

Now, consider the instance of the Temporal Hiding problem, where:
-
•
is the temporal network we just constructed,
-
•
is the evader,
-
•
,
-
•
, i.e., none of the edges can be removed,
-
•
,
-
•
is the temporal closeness centrality,
-
•
is the safety threshold.
Since , for any solution to the constructed instance of the Temporal Hiding problem we must have . Hence, we will omit mentions of in the remainder of the proof, and we will assume that a solution consists just of .
First, let us analyze the temporal closeness centrality values of the nodes in after the addition of any . Let denote the number of nodes such that , i.e., the number of nodes such that is connected (via the contacts from ) with at least one node connected with (notice that there are no other possibilities for to have finite average latency to a node in ). The temporal closeness centrality values can be computed as follows:
-
•
,
-
•
,
-
•
for every such that ,
-
•
for every such that ,
-
•
for every ,
-
•
for every ,
-
•
for every .
Since the safety threshold is , only one node has to have greater temporal closeness centrality than after he addition of a given in order for said to be solution to the constructed instance of the Temporal Hiding problem. However, notice that the only node that can have greater temporal closeness centrality than (and therefore higher position in the ranking) is . In other words, a given is a solution to the constructed instance of the Temporal Hiding problem if and only if we have .
We will now show that the constructed instance of the Temporal Hiding problem has a solution if and only if the given instance of the Set Cover problem has a solution.
Assume that there exists a solution to the given instance of the Set Cover problem, i.e., a subset of size the union of which is the universe . We will show that (i.e., connecting with nodes corresponding to all sets in ) is a solution to the constructed instance of the Temporal Hiding problem. First, notice that after the addition of there exists a time-respecting path from to every node , leading through the node corresponding to an element containing , with which is now connected. Hence, we have that and , which gives us:
Therefore, after the addition of node has greater temporal closeness centrality than the evader. We showed that if there exists a solution to the given instance of the Set Cover problem, then there also exists a solution to the constructed instance of the Temporal Hiding problem.
Assume that there exists a solution to the constructed instance of the Temporal Hiding problem. We will show that covers the universe . Let us compute the difference between and :
Since is a solution, must have greater temporal closeness centrality than , implying , which gives us:
Notice however that (since the evader’s budget is ) and that (since is the number of nodes in at finite average latency from ). Therefore, we must have and , which means that after the addition of for every we have a node connected to both and (there is no other way for to have a finite average latency to ). Consequently, every element of the universe is covered by at least one set , as is connected with a node only if it belongs to , and is connected with only if it contains in the Set Cover problem instance. We showed that if there exists a solution to the constructed instance of the Temporal Hiding problem, then there also exists a solution to the given instance of the Set Cover problem. This concludes the proof. ∎
Theorem 3.
Temporal Hiding problem is NP-complete given the betweenness temporal centrality.
Proof.
The problem is trivially in NP, since after adding and removing a given set of contacts we can computed the ranking of all nodes according to the betweenness temporal centrality in polynomial time.
We will now prove that the problem is NP-hard. To this end, we will show a reduction from the NP-complete -Set Cover problem. The decision version of this problem is defined by a universe, , a collection of sets such that , and an integer where the goal is to determine whether there exist elements of the union of which equals .
Let be a given instance of the -Set Cover problem. Let us assume that , note that all instances where can be solved in polynomial time. We will now construct an instance of the Temporal Hiding problem. First, let us construct a temporal network where:
-
•
,
-
•
,
-
•
.
An example of the construction of the network is presented in Figure 4.

Now, consider the instance of the Temporal Hiding problem, where:
-
•
is the temporal network we just constructed,
-
•
is the evader,
-
•
,
-
•
, i.e., none of the edges can be removed,
-
•
,
-
•
is the temporal betweenness centrality,
-
•
is the safety threshold.
Since , for any solution to the constructed instance of the Temporal Hiding problem we must have . Hence, we will omit mentions of in the remainder of the proof, and we will assume that a solution consists just of .
First, let us analyze the temporal betweenness centrality values of the nodes in after the addition of any . Let denote the number of nodes such that , i.e., the number of nodes such that is connected (via the contacts from ) with at least one node connected with (notice that there are no other possibilities for to have finite average latency to a node in ). The temporal betweenness centrality values can be computed as follows:
-
•
, as it belongs to the shortest temporal paths from to all nodes ,
-
•
, as it belongs to the shortest temporal paths from to all nodes it is connected with and to all nodes that can be reached from it,
-
•
, for any , as can belong to the shortest temporal paths from nodes in to the three nodes in that it is connected with,
-
•
, for any , as none of these nodes belong to the shortest temporal paths between any pairs of other nodes.
Since the safety threshold is , only one node has to have greater temporal betweenness centrality than after he addition of a given in order for said to be solution to the constructed instance of the Temporal Hiding problem. However, notice that the only node that can have greater temporal betweenness centrality than (and therefore higher position in the ranking) is . In other words, a given is a solution to the constructed instance of the Temporal Hiding problem if and only if we have .
We will now show that the constructed instance of the Temporal Hiding problem has a solution if and only if the given instance of the -Set Cover problem has a solution.
Assume that there exists a solution to the given instance of the -Set Cover problem, i.e., a subset of size the union of which is the universe . We will show that (i.e., connecting with nodes corresponding to all sets in ) is a solution to the constructed instance of the Temporal Hiding problem. First, notice that after the addition of there exists a time-respecting path from to every node , leading through the node corresponding to an element containing , with which is now connected. Hence, we have that and , which gives us:
Therefore, after the addition of node has greater temporal betweenness centrality than the evader. We showed that if there exists a solution to the given instance of the -Set Cover problem, then there also exists a solution to the constructed instance of the Temporal Hiding problem.
Assume that there exists a solution to the constructed instance of the Temporal Hiding problem. We will show that covers the universe . Let us compute the difference between and :
Since is a solution, must have greater temporal betweenness centrality than , implying , which gives us:
Notice however that (since the evader’s budget is ) and that (since is the number of nodes in at finite average latency from ). Therefore, we must have and , which means that after the addition of for every we have a node connected to both and (there is no other way for to have a finite average latency to ). Consequently, every element of the universe is covered by at least one set , as is connected with a node only if it belongs to , and is connected with only if it contains in the -Set Cover problem instance. We showed that if there exists a solution to the constructed instance of the Temporal Hiding problem, then there also exists a solution to the given instance of the -Set Cover problem. This concludes the proof. ∎
Theorem 4.
Algorithm 1 is a -approximation for the Minimum Temporal Hiding problem given the degree temporal centrality. The bound is tight.
Proof.
First, notice that removing contacts that are not incident with and adding edges that are incident with is always suboptimal, as in case of both these changes the difference between the degree of the evader and all other nodes either increases or stays the same. Hence, no solution of the optimal size will include these types of modification and we exclude them in lines 4-5.
Let the cost of a given solution be expressed by a number of stubs (half-contacts), i.e., twice the number of contacts. In lines 6-22 the algorithm computes the minimal cost of a solution that satisfies the safety threshold, under assumption that we are allowed to connect any two stubs from contacts appearing in (thus we are guaranteed that the actual optimum is greater or equal). It does so using the dynamic programming technique. The loop in line 6 iterates over the number of contacts removed from the network. The algorithm fills the arrays and in order to identify , the optimal cost of solution that satisfies the safety thresholds while removing contacts from the network. The element is minimal number of stubs that have to added to nodes so that of them have greater degrees than the evader, assuming that we removed stubs incident with them and that the degree of the evader is . The element stores the number of stubs that are added to and removed from node to achieve the solution with the cost . The loop in line 9 iterates over all nodes in the network other than the evader, while the loop in line 11 iterates over the number of stubs removed from the node . The value computed in line is the number of stubs that have to added to node in order for it to contribute towards the safety threshold, i.e., in order for it to have greater degree than the evader. The loops in lines 13 and 14 iterate over all values of and valid for arrays and , and based on them fill arrays and . If the addition of the required number of stubs is possible (test in line 15) then we record a solution where the node contributes towards the safety threshold (value in lines 16-17). In lines 19-20) we record a solution where the node does not contribute towards the safety threshold, but is only used to decrease the degree of the evader. We do it only if counting towards the threshold actually required adding any stubs (test in line 18). Finally, in line 21 we compute the cost of the optimal solution that removes contacts from the network, while satisfying the safety threshold .
We showed that is the minimal cost of a solution that satisfies the safety threshold, under assumption that we are allowed to connect any two stubs from contacts appearing in . If no solution was found (which is tested in line 23), then the algorithm returns in line 24. Otherwise, the algorithm constructs the solution in lines 25-37. Since we removed all contact including from , any solution that removes all contacts from the optimal solution and adds all the stubs from the optimal solution satisfies the safety threshold. What is more, such a solution contains at most twice as many contacts as the optimum (as it is possible that each stub in from the optimal solution gets connected to a stub not appearing in the optimal solution). Hence, the algorithm is a -approximation. The complexity of the algorithm is .

Finally, to prove the claim about the tight bound, Figure 5 presents an example of a network for which the approximation ratio of Algorithm 1 is exactly . Given a safety threshold , Algorithm 1 will add to the network contacts and (because of the order of nodes in sequence ), whereas the optimal solution is to add the contact . This concludes the proof. ∎
Theorem 5.
The Minimum Temporal Hiding problem given the closeness temporal centrality cannot be approximated within a ratio of for any , unless .
Proof.
In order to prove the theorem, we will use the result by Dinur and Steurer [6] that the Minimum Set Cover problem cannot be approximated within a ratio of for any , unless .
Let be an instance of the Minimum Set Cover problem, where is the universe , and is a collection of subsets of . The goal here is to find subset such that the union of equals and the size of is minimal.
First, we will show a function that based on an instance of the Minimum Set Cover problem constructs an instance of the Minimum Temporal Hiding problem. Let us assume that , note that all instances where can be solved in polynomial time.
Let the temporal network be defined as:
-
•
,
-
•
,
-
•
.
An example of the construction of the network is presented in Figure 6.

The formula of function is then , where:
-
•
is the temporal network we just constructed,
-
•
is the evader,
-
•
,
-
•
, i.e., none of the edges can be removed,
-
•
is the temporal closeness centrality,
-
•
is the safety threshold.
Let be the solution to the constructed instance of the Minimum Temporal Hiding problem (notice that since , we must have ). The function computing corresponding solution to the instance of the Minimum Set Cover problem is now , i.e., is the set of all sets such that their corresponding nodes are connected with via the contacts in .
Now, we will show that is indeed a correct solution to , i.e., that it covers the entire universe. Let denote the number of nodes such that for a given set of contacts . Centrality values after adding to the network are as follows:
-
•
,
-
•
,
-
•
for every ,
-
•
for every ,
-
•
for every .
Therefore, the safety threshold is satisfied if and only if , which is the case when . Hence, if is a solution to , then for every node there exists a node such that and is connected with . However, because of the way we constructed the network , this can only be the case when in the given instance of the Minimum Set Cover problem. Therefore, for every element of the universe there exists a set such that and in , which implies that is a solution to the given instance of the Minimum Set Cover problem, i.e., it covers the universe. What is more, since , we also have that the optimal solutions to both instances are of the same size.
Now, assume that there exists an -approximation algorithm for the Minimum Temporal Hiding problem where for some . Let us use this algorithm to solve the constructed instance and consider solution to the given instance of the Minimum Set Cover problem. Since the size of the optimal solution is the same for both instances, we obtained an approximation algorithm that solves Minimum Set Cover problem to within for . However, Dinur and Steurer [6] showed that the Minimum Set Cover problem cannot be approximated within a ratio of for any , unless . Therefore, such approximation algorithm for the Minimum Temporal Hiding problem cannot exist, unless . This concludes the proof. ∎
Theorem 6.
The Minimum Temporal Hiding problem given the betweenness temporal centrality cannot be approximated within a ratio of for any , unless .
Proof.
In order to prove the theorem, we will use the result by Dinur and Steurer [6] that the Minimum Set Cover problem cannot be approximated within a ratio of for any , unless .
Let be an instance of the Minimum Set Cover problem, where is the universe , and is a collection of subsets of . The goal here is to find subset such that the union of equals and the size of is minimal.
First, we will show a function that based on an instance of the Minimum Set Cover problem constructs an instance of the Minimum Temporal Hiding problem. Let us assume that , note that all instances where there exists can be solved in polynomial time.
Let the temporal network be defined as:
-
•
,
-
•
, -
•
.
An example of the construction of the network is presented in Figure 7.

The formula of function is then , where:
-
•
is the temporal network we just constructed,
-
•
is the evader,
-
•
,
-
•
, i.e., none of the edges can be removed,
-
•
is the temporal betweenness centrality,
-
•
is the safety threshold.
Let be the solution to the constructed instance of the Minimum Temporal Hiding problem (notice that since , we must have ). The function computing corresponding solution to the instance of the Minimum Set Cover problem is now , i.e., is the set of all sets such that their corresponding nodes are connected with via the contacts in .
Now, we will show that is indeed a correct solution to , i.e., that it covers the entire universe. Let denote the number of nodes such that for a given set of contacts . Centrality values after adding to the network are as follows:
-
•
, as controls all shortest temporal paths from nodes to ,
-
•
, as controls all shortest temporal paths from nodes to nodes that are reachable from ,
-
•
, as can control only paths from nodes and (there are such nodes) to nodes that has contact with (we made an assumption that there are at most such nodes),
-
•
, as these node do not control any shortest paths.
Therefore, the safety threshold is satisfied if and only if , which is the case when . Hence, if is a solution to , then for every node there exists a node such that and is connected with . However, because of the way we constructed the network , this can only be the case when in the given instance of the Minimum Set Cover problem. Therefore, for every element of the universe there exists a set such that and in , which implies that is a solution to the given instance of the Minimum Set Cover problem, i.e., it covers the universe. What is more, since , we also have that the optimal solutions to both instances are of the same size.
Now, assume that there exists an -approximation algorithm for the Minimum Temporal Hiding problem where for some . Let us use this algorithm to solve the constructed instance and consider solution to the given instance of the Minimum Set Cover problem. Since the size of the optimal solution is the same for both instances, we obtained an approximation algorithm that solves Minimum Set Cover problem to within for . However, Dinur and Steurer [6] showed that the Minimum Set Cover problem cannot be approximated within a ratio of for any , unless . Therefore, such approximation algorithm for the Minimum Temporal Hiding problem cannot exist, unless . This concludes the proof. ∎
5 Empirical Analysis
In this section, we present the experimental analysis of the problem using simulations.
Network | ||
Bluetooth [27] | 74 | 87491 |
Call center [33] | 52 | 1182 |
Cambridge [4] | 187 | 8769 |
Conference 1 [19] | 113 | 8218 |
Conference 2 [4] | 199 | 27165 |
Conference 3 [38] | 402 | 28954 |
Conference 4 [38] | 361 | 19304 |
Copenhagen call [40] | 484 | 1667 |
Copenhagen SMS [40] | 535 | 6165 |
Diary [37] | 49 | 1427 |
High school 1 [29] | 312 | 28780 |
High school 2 [29] | 310 | 35592 |
High school 3 [29] | 303 | 30383 |
High school 4 [29] | 295 | 28112 |
High school 5 [29] | 299 | 26391 |
Hospital [47] | 75 | 9313 |
Hospital colocation [47] | 73 | 35200 |
Intel [4] | 113 | 7408 |
Kenya [24] | 52 | 2070 |
Office [11] | 92 | 2679 |
Office colocation [11] | 95 | 45357 |
Polish manufacturer email [31] | 167 | 43360 |
Primary school 1 [39] | 236 | 52339 |
Primary school 2 [39] | 238 | 56313 |
Reality [7] | 64 | 4251 |
Romania [28] | 42 | 19045 |
St Andrews [2] | 25 | 1483 |
Undergrads call [27] | 75 | 3574 |
Undergrads SMS [27] | 41 | 758 |
University couples call [1] | 126 | 31155 |
University couples SMS [1] | 110 | 11962 |
5.1 Datasets
In our simulations we consider a number of real-life temporal network datasets. All datasets are presented in Table 2.
Given that the time resolutions of different datasets are vastly different, we perform the following normalization procedure. We divide the time interval between the first and the last timestamp in the original dataset into equal subintervals. For each pair of nodes we consider them to have contact at time step if and only if the -th subinterval contains at least one contact in the original dataset. The length of the time interval of such normalized dataset is then .
The third column of Table 2 contains the number of contacts after performing the normalization procedure. Such normalized datasets are then used in the simulations.

Type | Descriptor | Definition |
Fraction of node’s contacts when half of all contacts happened | ||
Fraction of node’s contacts at half the time | ||
Fraction of node’s edges present when half of all contacts happened | ||
Fraction of node’s edges present at half the time | ||
Fraction of node’s edges present at both the first and last of all contacts | ||
Time evolution | Fraction of node’s edges present at both the first and last of the time | |
Mean of intercontact times over node’s edges | ||
Standard deviation of intercontact times over node’s edges | ||
Coefficient of variation of intercontact times over node’s edges | ||
Skewness of intercontact times over node’s edges | ||
Mean of the number of other contacts between two consecutive contacts | ||
of a node’s edge | ||
Standard deviation of the number of other contacts between two consecutive | ||
contacts of a node’s edge | ||
Coefficient of variation of the number of other contacts between two consecutive | ||
contacts of a node’s edge | ||
Skewness of the number of other contacts between two consecutive | ||
Edge activity | contacts of a node’s edge | |
Like but for node’s contacts | ||
Like but for node’s contacts | ||
Like but for node’s contacts | ||
Like but for node’s contacts | ||
Like but for node’s contacts | ||
Like but for node’s contacts | ||
Like but for node’s contacts | ||
Node activity | Like but for node’s contacts | |
Degree of the node | ||
Degree of the node divided by the average degree | ||
Number of contacts of the node | ||
Number of contacts of the node divided by the average number of contacts | ||
Network structure | Local clustering coefficient of the node |
5.2 Heuristics
As shown in Section 4, the task of finding an optimal way to hide from temporal centralities is computationally intractable. Hence, we now consider a number of heuristic solutions that add or remove contacts from the network in hope of improving the concealment of the evader:
- Remove Random
-
Uniformly at random selects a neighbor of the evader, then removes one of the contacts with this neighbor (chosen uniformly at random),
- Remove Minimum
-
Removes one of the contacts (chosen uniformly at random) with a neighbor with the smallest number of contacts with the evader,
- Add Random
-
Uniformly at random selects a neighbor of the evader, then adds another contact with this neighbor (the moment of which is chosen uniformly at random),
- Add New
-
Adds a contact (the moment of which is chosen uniformly at random) between the evader and a second degree neighbor of the evader (chosen uniformly at random), i.e., a node that has at least one common neighbor with the evader, but is not the evader’s neighbor.
For both adding and removing contacts we consider two heuristics—one selecting contacts to add or remove uniformly at random, and one with a more strategic approach, focused either on removing all contacts with some neighbors, or on finding new neighbors.
![]() |
![]() |
![]() |
![]() |
![]() |
5.3 Basic Simulations
Given a temporal network and a centrality measure , we select top nodes in the centrality ranking as the potential evaders. We then attempt to hide each such evader using each of the considered heuristics described above. For each heuristic, we add or remove of the evader’s contacts (at least ten for nodes with exceptionally few contacts).
We measure the following values before and after the hiding process:
-
•
the position of in the ranking of ,
-
•
the centrality value of according to ,
-
•
the influence of over the network, measured as the average probability that gets infected if a Susceptible-Infected process starts in a different node times the expected number of infected nodes if a Susceptible-Infected process starts in (we consider the process with the probability of infection ).
We repeated the simulation times for each network and presented the results as averages.
Figure 8 presents the results of our simulations. As shown in the figure, in the vast majority of cases, the removal of contacts results in the evader’s being more hidden, i.e., dropping in centrality ranking and becoming less influential. At the same time, adding contacts to the network has the opposite effects, i.e., the evader becomes more influential and more exposed to temporal centrality analysis. It suggests a centrality-influence trade-off in temporal networks. When comparing the effects of heuristics performing random changes, be it adding or removing contacts, with those performing strategic manipulation, i.e., Remove Minimum and Add New heuristics, we can see that using strategic heuristics result in a more pronounced effect, i.e., the magnitude of change in centrality ranking or influence value is greater than in the case of their random counterparts. Finally, when comparing different centrality measures, the betweenness centrality is, on average, the most sensitive to manipulation, i.e., executing the hiding process results in the greatest change in the betweenness centrality ranking. The next most sensitive centrality measure is the closeness centrality, with the degree and the eigenvector centrality measures being the most resilient on average.
5.4 Regression Analysis
The results of the simulations presented so far give us some insight into how effective different hiding heuristics can be. Still, they do not explain what qualities of the evader determine how successfully it can hide from temporal centralities. To this end, we now perform the regression analysis of the hiding process. Since the analysis presented in the previous section showed that only removal heuristics successfully hide the evader, we will focus our attention on them.
For each node considered an evader in our experiments, we compute several descriptors, i.e., its characteristics relating to its contacts and the network structure in which it is embedded. We consider four different categories of descriptors: time evolution, edge activity, node activity, and network structure. All descriptors are presented in Table 3.
Figure 9 presents the regression coefficients computed using the Lasso regression methods [46]. Since the Lasso regression performs variable selection, not all descriptors appear in the figure (the coefficients for the omitted descriptors are deemed zero). As seen from the figure, the exact values of the coefficients depend on the temporal centrality under consideration. Nevertheless, we can see some trends. The descriptors that show a strong positive correlation with the evader’s ability to hide from at least two temporal centralities are the mean of the intercontact time of the evader’s contacts and the mean of the number of other contacts between two consecutive contacts over node’s contacts . On the other hand, the descriptors that show negative correlation vary greatly between centrality measures. Interestingly, the local clustering coefficient of the evader has positive regression coefficients values for more locally-oriented centralities, i.e., degree and eigenvector, but negative values for more global centralities, i.e., closeness and betweenness.
6 Conclusions
In this article, we analyzed both theoretically and empirically the problem faced by an evader—a member of a temporal social network who wishes to avoid being detected by temporal centrality measures. As part of the theoretical analysis, we defined the decision and the optimization versions of the problem faced by the evader. We proved that the decision version is NP-complete even for very basic temporal centrality measures. As for the optimization version, we presented a -approximation algorithm for the degree temporal centrality while showing that the problem is inapproximable within logarithmic bounds for the closeness and betweenness centrality measures. As part of the empirical analysis, we compared the effectiveness of several hiding heuristics in real-life temporal social networks, finding that removing existing contacts is significantly more effective in avoiding detection by temporal centralities than adding new contacts. Moreover, using regression analysis, we determined that the nodes whose contacts are more distributed throughout the analyzed period are, on average, more successful in obscuring their central position in the network. More broadly, our study contributes to the literature on hiding from social network analysis tools by considering temporal networks, which are not only more general, but also much more challenging to analyze compared to static networks.
Our findings suggest that while it is computationally infeasible to find an optimal way of hiding from temporal centrality measures, skillful manipulation of one’s contacts can still help maintain some semblance of safety even when utilizing heuristic solutions. At the same time, considering the temporal aspects of the network activity offers much more diverse ways of hiding one’s importance. Whereas in a static network, a member of the network can only decide who to connect or avoid, in a temporal network, they can also determine the distribution of the contacts, thus creating a much richer strategic space that should be further analyzed in the future research.
Acknowledgments
P.H. was supported by JSPS KAKENHI Grant Number JP 21H04595.
References
- [1] N. Aharony, W. Pan, C. Ip, I. Khayal, and A. Pentland. Socialfmri: Investigating and shaping social mechanisms in the real world. Pervasive Mob. Comput., 7(6):643–659, 2011.
- [2] G. Bigwood, T. Henderson, D. Rehunathan, M. Bateman, and S. Bhatti. Crawdad dataset st andrews/sassy (v. 2011-06-03). CRAWDAD wireless network data archive, 2011. Downloaded June 2011.
- [3] J. Candia, M. C. González, P. Wang, T. Schoenharl, G. Madey, and A.-L. Barabási. Uncovering individual and collective human dynamics from mobile phone records. J. Phys. A, 41(22):224015, 2008.
- [4] A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott. Impact of human mobility on opportunistic forwarding algorithms. IEEE Trans. Mob. Comput., 6(6):606–620, June 2007.
- [5] P. Dey and S. Medya. Covert networks: How hard is it to hide? In Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, pages 628–637, Montreal, Canada, 2019. IFAAMAS.
- [6] I. Dinur and D. Steurer. Analytical approach to parallel repetition. In Proceedings of the forty-sixth annual ACM symposium on Theory of computing, pages 624–633. ACM, 2014.
- [7] N. Eagle and A. S. Pentland. Reality mining: sensing complex social systems. Pers. Ubiquitous Comput., 10(4):255–268, 2006.
- [8] J.-P. Eckmann, E. Moses, and D. Sergi. Entropy of dialogues creates coherent structures in e-mail traffic. Proc. Natl. Acad. Sci. USA, 101(40):14333–14337, 2004.
- [9] EU. Regulation 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC. Official Journal of the European Union, L119:1–88, May 2016.
- [10] B. C. Fung, K. Wang, R. Chen, and P. S. Yu. Privacy-preserving data publishing: A survey of recent developments. ACM Comput. Surv., 42(4):1–53, 2010.
- [11] M. Genois, C. L. Vestergaard, J. Fournet, A. Panisson, I. Bonmarin, and A. Barrat. Data on face-to-face contacts in an office building suggest a low-cost vaccination strategy based on community linkers. Network Science, 3:326–347, 9 2015.
- [12] R. Gross and A. Acquisti. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pages 71–80, 2005.
- [13] M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava. Anonymizing social networks. Technical report, Computer Science Department, University of Massachusetts Amherst, 2007. No. 07–19.
- [14] P. Holme. Epidemiologically optimal static networks from temporal network data. PLoS Comput. Biol., 9(7):e1003142, 2013.
- [15] P. Holme and N. Masuda. The basic reproduction number as a predictor for epidemic outbreaks in temporal networks. PLOS One, 10(3):e0120567, 2015.
- [16] P. Holme and J. Saramäki. Temporal networks. Phys. Rep., 519(3):97–125, 2012.
- [17] Q. Huang, C. Zhao, X. Zhang, X. Wang, and D. Yi. Centrality measures in temporal networks with time series analysis. EPL (Europhys. Lett.), 118(3):36001, 2017.
- [18] J. Isaak and M. J. Hanna. User data privacy: Facebook, cambridge analytica, and privacy protection. Computer, 51(8):56–59, 2018.
- [19] L. Isella, J. Stehlé, A. Barrat, C. Cattuto, J.-F. Pinton, and W. Van den Broeck. What’s in a crowd? analysis of face-to-face behavioral networks. J. Theor. Biol., 271(1):166–180, 2011.
- [20] C. Jernigan and B. F. Mistree. Gaydar: Facebook friendships expose sexual orientation. First Monday, 2009.
- [21] M. Kearns, A. Roth, Z. S. Wu, and G. Yaroslavtsev. Private algorithms for the protected in social network search. Proc. Natl. Acad. Sci. USA, page 201510612, 2016.
- [22] V. Khatri and C. V. Brown. Designing data governance. Comm. ACM, 53(1):148–152, 2010.
- [23] H. Kim and R. Anderson. Temporal node centrality in complex networks. Phys. Rev. E, 85(2):026107, 2012.
- [24] M. C. Kiti, M. Tizzoni, T. M. Kinyanjui, D. C. Koech, P. K. Munywoki, M. Meriac, L. Cappa, A. Panisson, A. Barrat, C. Cattuto, et al. Quantifying social contacts in a household setting of rural kenya using wearable proximity sensors. EPJ Data Sci., 5(1):1–21, 2016.
- [25] J. I. Lane, V. Stodden, S. Bender, and H. Nissenbaum, editors. Privacy, Big Data, and the Public Good: Frameworks for Engagement. Cambridge University Press, 2014.
- [26] L. Lv, K. Zhang, T. Zhang, X. Li, J. Zhang, and W. Xue. Eigenvector centrality measure based on node similarity for multilayer and temporal networks. IEEE Access, 7:115725–115733, 2019.
- [27] A. Madan, M. Cebrian, S. Moturu, K. Farrahi, and A. Pentland. Sensing the ‘health state’ of a community. IEEE Pervasive Comput., 11(4):36–45, 2012.
- [28] R.-C. Marin, C. Dobre, and F. Xhafa. Exploring predictability in mobile interaction. In 2012 Third International Conference on Emerging Intelligent Data and Web Technologies, pages 133–139. IEEE, 2012.
- [29] R. Mastrandrea, J. Fournet, and A. Barrat. Contact patterns in a high school: a comparison between data collected using wearable sensors, contact diaries and friendship surveys. PLOS One, 10(9):e0136497, 2015.
- [30] T. P. Michalak, T. Rahwan, and M. Wooldridge. Strategic social network analysis. In Thirty-First AAAI Conference on Artificial Intelligence, 2017.
- [31] R. Michalski, S. Palus, and P. Kazienko. Matching organizational structure and social network extracted from email communication. In Lecture Notes in Business Information Processing, volume 87, pages 197–206, Berlin Heidelberg, 2011. Springer.
- [32] A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel. You are who you know: inferring user profiles in online social networks. In Proceedings of the third ACM international conference on Web search and data mining, pages 251–260, 2010.
- [33] D. Olguin, B. Waber, T. Kim, A. Mohan, K. Ara, and A. Pentland. Sensible organizations: Technology and methodology for automatically measuring organizational behavior. IEEE Trans. Syst. Man Cybern. Syst., 39(1):43–55, 2009.
- [34] R. K. Pan and J. Saramäki. Path lengths, correlations, and centrality in temporal networks. Phys. Rev. E, 84(1):016105, 2011.
- [35] T. M. Przytycka, M. Singh, and D. K. Slonim. Toward the dynamic interactome: it’s about time. Brief. Bioinform., 11(1):15–29, 2010.
- [36] A. Rao, A. O. Hero, D. J. States, and J. D. Engel. Inferring time-varying network topologies from gene expression data. Eurasip J. Bioinform. Syst. Biol., 2007:1–12, 2007.
- [37] J. M. Read, K. T. Eames, and W. J. Edmunds. Dynamic social networks and the implications for the spread of infectious disease. J. Roy. Soc. Interface, 5(26):1001–1007, 2008.
- [38] J. Stehlé, N. Voirin, A. Barrat, C. Cattuto, V. Colizza, L. Isella, C. Régis, J.-F. Pinton, N. Khanafer, W. Van den Broeck, et al. Simulation of an SEIR infectious disease model on the dynamic contact network of conference attendees. BMC Med., 9(1):87, 2011.
- [39] J. Stehlé, N. Voirin, A. Barrat, C. Cattuto, L. Isella, J.-F. Pinton, M. Quaggiotto, W. Van den Broeck, C. Régis, B. Lina, et al. High-resolution measurements of face-to-face contact patterns in a primary school. PLOS One, 6(8):e23176, 2011.
- [40] A. Stopczynski, V. Sekara, P. Sapiezynski, A. Cuttone, J. E. Larsen, and S. Lehmann. Measuring large-scale social networks with high resolution. PLOS One, 9(4):e95978, 2014.
- [41] T. Takaguchi, M. Nakamura, N. Sato, K. Yano, and N. Masuda. Predictability of conversation partners. Phys. Rev. X, 1(1):011008, 2011.
- [42] J. Tang, M. Musolesi, C. Mascolo, V. Latora, and V. Nicosia. Analysing information flows and key mediators through temporal centrality metrics. In Proceedings of the 3rd Workshop on Social Network Systems, pages 1–6, 2010.
- [43] D. Taylor, S. A. Myers, A. Clauset, M. A. Porter, and P. J. Mucha. Eigenvector-based centrality measures for temporal networks. Multiscale Model. Sim., 15(1):537–574, 2017.
- [44] D. Taylor, M. A. Porter, and P. J. Mucha. Supracentrality analysis of temporal networks with directed interlayer coupling. In Temporal Network Theory, pages 325–344. Springer, 2019.
- [45] D. Taylor, M. A. Porter, and P. J. Mucha. Tunable eigenvector-based centralities for multiplex and temporal networks. Multiscale Model. Sim., 19(1):113–147, 2021.
- [46] R. Tibshirani. Regression shrinkage and selection via the lasso. J. R. Stat. Soc. Series B Stat. Methodol., 58(1):267–288, 1996.
- [47] P. Vanhems, A. Barrat, C. Cattuto, J.-F. Pinton, N. Khanafer, C. Régis, B.-a. Kim, B. Comte, and N. Voirin. Estimating potential infection transmission routes in hospital wards using wearable proximity sensors. PLOS One, 8(9):e73970, 2013.
- [48] M. Waniek, M. Cebrian, P. Holme, and T. Rahwan. Social diffusion sources can escape detection, 2021.
- [49] M. Waniek, T. Michalak, and T. Rahwan. Hiding in multilayer networks. In Proceedings of the AAAI Conference on Artificial Intelligence, volume 34, pages 1021–1028, 2020.
- [50] M. Waniek, T. P. Michalak, T. Rahwan, and M. Wooldridge. On the construction of covert networks. In Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, pages 1341–1349, 2017.
- [51] M. Waniek, T. P. Michalak, M. J. Wooldridge, and T. Rahwan. Hiding individuals and communities in a social network. Nat. Hum. Behav., 2(2):139–147, 2018.
- [52] M. Waniek, J. Woundefinednica, K. Zhou, Y. Vorobeychik, T. Rahwan, and T. P. Michalak. Strategic evasion of centrality measures. In Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems, AAMAS ’21, page 1389–1397, Richland, SC, 2021. International Foundation for Autonomous Agents and Multiagent Systems.
- [53] M. Waniek, K. Zhou, Y. Vorobeychik, E. Moro, T. P. Michalak, and T. Rahwan. How to hide one’s relationships from link prediction algorithms. Sci. Rep., 9(1):12208, 2019.
- [54] T. Was, M. Waniek, T. Rahwan, and T. Michalak. The manipulability of centrality measures-an axiomatic approach. In Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems, pages 1467–1475, 2020.
- [55] R.-R. Yin, Q. Guo, J.-N. Yang, and J.-G. Liu. Inter-layer similarity-based eigenvector centrality measures for temporal networks. Physica A, 512:165–173, 2018.
- [56] S. Yu, M. Zhao, C. Fu, J. Zheng, H. Huang, X. Shu, Q. Xuan, and G. Chen. Target defense against link-prediction-based attacks via evolutionary perturbations. IEEE Trans. Knowl. Data Eng., 33(2):754–767, 2021.
- [57] K. Zhou, T. P. Michalak, M. Waniek, T. Rahwan, and Y. Vorobeychik. Attacking similarity-based link prediction in social networks. In Proceedings of the 18th International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), page 305–313, 2019.