{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T20:20:52Z","timestamp":1770754852267,"version":"3.50.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031083327","type":"print"},{"value":"9783031083334","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-08333-4_38","type":"book-chapter","created":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T15:52:13Z","timestamp":1655394733000},"page":"471-482","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Application of Graph-Based Technique to Identity Resolution"],"prefix":"10.1007","author":[{"given":"Hassan","family":"Kazemian","sequence":"first","affiliation":[]},{"given":"Mohammad-Hossein","family":"Amirhosseini","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Phillips","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,10]]},"reference":[{"key":"38_CR1","doi-asserted-by":"publisher","unstructured":"Li, J., Wang, A.G.: A framework of identity resolution: evaluating identity attributes and matching algorithms. Secur. Inf. 4(6), (2015). https:\/\/doi.org\/10.1186\/s13388-015-0021-0","DOI":"10.1186\/s13388-015-0021-0"},{"key":"38_CR2","unstructured":"Kean, T.H., et al.: The 9\/11 Commission Report (2004). http:\/\/govinfo.library.unt.edu\/911\/report\/index.htm"},{"key":"38_CR3","unstructured":"U.S. Department of State: Country Reports on Terrorism (2006). http:\/\/www.state.gov\/j\/ct\/rls\/crt\/2006\/"},{"key":"38_CR4","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s10796-010-9270-0","volume":"13","author":"J Li","year":"2010","unstructured":"Li, J., Wang, G.A., Chen, H.: Identity matching using personal and social identity features. Inf. Syst. Front. 13, 101\u2013113 (2010)","journal-title":"Inf. Syst. Front."},{"key":"38_CR5","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1016\/0092-6566(82)90001-0","volume":"16","author":"JM Cheek","year":"1982","unstructured":"Cheek, J.M., Briggs, S.R.: Self-consciousness and aspects of identity. J. Res. Pers. 16, 401\u2013408 (1982)","journal-title":"J. Res. Pers."},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Ananthakrishna, R., Chaudhuri, S., Ganti, V.: Eliminating fuzzy duplicates in data warehouses. In: Procceeding of 28th International Conference on Very Large Data Bases, Hong Kong, China, pp. 586\u2013597 (2002)","DOI":"10.1016\/B978-155860869-6\/50058-5"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Kalashnikov, D.V., Mehrotra, S., Chen, Z.: Exploiting relationships for domain-independent data cleaning. In: Proceeding of 2005 SIAM International Conference on Data Mining, pp. 262\u2013273. Newport Beach, CA (2005)","DOI":"10.1137\/1.9781611972757.24"},{"key":"38_CR8","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.datak.2009.10.003","volume":"69","author":"H K\u00f6pcke","year":"2010","unstructured":"K\u00f6pcke, H., Rahm, E.: Frameworks for entity matching: a comparison. Data Knowl. Eng. 69, 197\u2013210 (2010)","journal-title":"Data Knowl. Eng."},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"Marshall, B., Kaza, S., Xu, J., Atabakhsh, H., Petersen, T., Violette, C., Chen, H.: Cross-jurisdictional criminal activity networks to support border and transportation security. In: Proceedings 7th Int IEEE Conference Intelligent Transportation Systems, Washington, D.C., pp. 100\u2013105 (2004)","DOI":"10.1109\/ITSC.2004.1398879"},{"key":"38_CR10","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/S0167-9236(02)00064-7","volume":"34","author":"DE Brown","year":"2003","unstructured":"Brown, D.E., Hagen, S.C.: Data association methods with applications to law enforcement. Decis. Support Syst. 34, 369\u2013378 (2003)","journal-title":"Decis. Support Syst."},{"key":"38_CR11","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/971617.971618","volume":"47","author":"GA Wang","year":"2004","unstructured":"Wang, G.A., Chen, H., Atabakhsh, H.: Automatically detecting deceptive criminal identities. Commun. ACM 47, 70\u201376 (2004)","journal-title":"Commun. ACM"},{"key":"38_CR12","doi-asserted-by":"publisher","first-page":"988","DOI":"10.1109\/TSMCA.2006.871799","volume":"36","author":"GA Wang","year":"2006","unstructured":"Wang, G.A., Chen, H.C., Xu, J.J., Atabakhsh, H.: Automatically detecting criminal identity deception: an adaptive detection algorithm. IEEE Trans. Syst. Man Cybern. Part A: Syst. Humans 36, 988\u2013999 (2006)","journal-title":"IEEE Trans. Syst. Man Cybern. Part A: Syst. Humans"},{"key":"38_CR13","doi-asserted-by":"crossref","unstructured":"Bhattacharya, I., Getoor, L.: Entity Resolution in Graphs, in Min Graph Data. Wiley-Blackwell, Hoboken (2006)","DOI":"10.1002\/9780470073049.ch13"},{"key":"38_CR14","unstructured":"Bartunov, S., Korshunov, A., Park, S., Ryu, W., Lee, H.: Joint link-attribute user identity resolution in online social networks. In: Proceeding of the 6th International Conference on Knowledge Discovery and Data Mining, Workshop on Social Network Mining and Analysis, Beijing, China (2012)"},{"key":"38_CR15","doi-asserted-by":"publisher","first-page":"P10008","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","volume":"10","author":"VD Blondel","year":"2008","unstructured":"Blondel, V.D., Guillaume, J.L., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. J. Statist. Mech. Theory. Exp. 10, P10008 (2008)","journal-title":"J. Statist. Mech. Theory. Exp."},{"key":"38_CR16","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1016\/B978-0-444-64241-7.50135-X","volume":"44","author":"F Hua","year":"2018","unstructured":"Hua, F., Fang, Z., Qiu, T.: Modeling ethylene cracking process by learning convolutional neural networks. Comput. Aided Chem. Eng. 44, 841\u2013846 (2018)","journal-title":"Comput. Aided Chem. Eng."},{"key":"38_CR17","doi-asserted-by":"crossref","unstructured":"Newman, M.: Networks: An Introduction, Chapter 7: Measures and Metrics, pp. 168\u2013234. Oxford University Press, Oxford (2010)","DOI":"10.1093\/acprof:oso\/9780199206650.003.0007"},{"key":"38_CR18","unstructured":"Pujol, J.M., Erramilli, V., Rodriguez, P.: Divide and Conquer: Partitioning Online Social Networks (2010)"},{"key":"38_CR19","doi-asserted-by":"crossref","unstructured":"Greene, D., Doyle, D., Cunningham, P.: Tracking the evolution of communities in dynamic social networks. In: International Conference on Advances in Social Networks Analysis and Mining (2010)","DOI":"10.1109\/ASONAM.2010.17"},{"key":"38_CR20","doi-asserted-by":"crossref","unstructured":"Hui, P., Sastry, N.R.: Real world routing using virtual world information. In: International Conference on Computational Science and Engineering (2009)","DOI":"10.1109\/CSE.2009.315"},{"issue":"2","key":"38_CR21","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.joi.2009.11.005","volume":"4","author":"L Zhang","year":"2010","unstructured":"Zhang, L., Liu, X., Janssens, F., Liang, L., Gl\u00e4nzel, W.: Subject clustering analysis based on ISI category classification. J. Inform. 4(2), 185\u2013193 (2010)","journal-title":"J. Inform."},{"key":"38_CR22","doi-asserted-by":"crossref","unstructured":"Haynes, J., Perisic, I.: Mapping search relevance to social networks. In: Proceedings of the 3rd Workshop on Social Network Mining and Analysis (2010)","DOI":"10.1145\/1731011.1731013"}],"container-title":["IFIP Advances in Information and Communication Technology","Artificial Intelligence Applications and Innovations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-08333-4_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T02:02:09Z","timestamp":1727402529000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-08333-4_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031083327","9783031083334"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-08333-4_38","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Artificial Intelligence Applications and Innovations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hersonissos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aiai2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifipaiai.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}