{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:16:56Z","timestamp":1761808616518,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031434266"},{"type":"electronic","value":"9783031434273"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-43427-3_8","type":"book-chapter","created":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T21:01:41Z","timestamp":1694898101000},"page":"122-138","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["DegUIL: Degree-Aware Graph Neural Networks for\u00a0Long-Tailed User Identity Linkage"],"prefix":"10.1007","author":[{"given":"Meixiu","family":"Long","sequence":"first","affiliation":[]},{"given":"Siyuan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Du","sequence":"additional","affiliation":[]},{"given":"Jiahai","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,17]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/j.ins.2022.02.023","volume":"593","author":"B Chen","year":"2022","unstructured":"Chen, B., Chen, X.: MAUIL: multilevel attribute embedding for semisupervised user identity linkage. Inf. Sci. 593, 527\u2013545 (2022)","journal-title":"Inf. Sci."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Chen, H., Yin, H., Sun, X., Chen, T., Gabrys, B., Musial, K.: Multi-level graph convolutional networks for cross-platform anchor link prediction. In: KDD, pp. 1503\u20131511 (2020)","DOI":"10.1145\/3394486.3403201"},{"key":"8_CR3","unstructured":"Chen, S., Wang, J., Du, X., Hu, Y.: A novel framework with information fusion and neighborhood enhancement for user identity linkage. In: ECAI, vol. 325, pp. 1754\u20131761 (2020)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Chen, Z., Xiao, R., Li, C., Ye, G., Sun, H., Deng, H.: ESAM: discriminative domain adaptation with non-displayed items to improve long-tail performance. In: SIGIR, pp. 579\u2013588 (2020)","DOI":"10.1145\/3397271.3401043"},{"key":"8_CR5","unstructured":"Dai, H., et al.: Adversarial attack on graph structured data. In: ICML, vol. 80, pp. 1123\u20131132 (2018)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Grover, A., Leskovec, J.: node2vec: scalable feature learning for networks. In: KDD, pp. 855\u2013864 (2016)","DOI":"10.1145\/2939672.2939754"},{"issue":"7","key":"8_CR7","first-page":"3211","volume":"34","author":"H Hong","year":"2022","unstructured":"Hong, H., Li, X., Pan, Y., Tsang, I.W.: Domain-adversarial network alignment. IEEE Trans. Knowl. Data Eng. 34(7), 3211\u20133224 (2022)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Hu, G., Zhang, Y., Yang, Q.: CoNET: collaborative cross networks for cross-domain recommendation. In: CIKM, pp. 667\u2013676 (2018)","DOI":"10.1145\/3269206.3271684"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1007\/978-3-030-73197-7_46","volume-title":"Database Systems for Advanced Applications","author":"Z Hu","year":"2021","unstructured":"Hu, Z., Wang, J., Chen, S., Du, X.: A semi-supervised framework with efficient feature extraction and network alignment for user identity linkage. In: Jensen, C.S., et al. (eds.) DASFAA 2021. LNCS, vol. 12682, pp. 675\u2013691. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-73197-7_46"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Jin, W., Ma, Y., Liu, X., Tang, X., Wang, S., Tang, J.: Graph structure learning for robust graph neural networks. In: KDD, pp. 66\u201374 (2020)","DOI":"10.1145\/3394486.3403049"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Khodak, M., Saunshi, N., Liang, Y., Ma, T., Stewart, B., Arora, S.: A La Carte Embedding: cheap but effective induction of semantic feature vectors. In: ACL (1), pp. 12\u201322 (2018)","DOI":"10.18653\/v1\/P18-1002"},{"key":"8_CR12","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. In: ICLR (2017)"},{"key":"8_CR13","doi-asserted-by":"publisher","unstructured":"Li, C., et al.: Semi-supervised variational user identity linkage via noise-aware self-learning. IEEE Trans. Knowl. Data Eng. 1\u201314 (2023). https:\/\/doi.org\/10.1109\/TKDE.2023.3250245","DOI":"10.1109\/TKDE.2023.3250245"},{"key":"8_CR14","doi-asserted-by":"publisher","unstructured":"Lin, J., Chen, S., Wang, J.: Graph neural networks with dynamic and static representations for social recommendation. In: Bhattacharya, A., et al. (eds.) DASFAA (2), vol. 13246, pp. 264\u2013271. Springe, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-00126-0_18","DOI":"10.1007\/978-3-031-00126-0_18"},{"key":"8_CR15","unstructured":"Liu, L., Cheung, W.K., Li, X., Liao, L.: Aligning users across social networks using network embedding. In: IJCAI, pp. 1774\u20131780 (2016)"},{"issue":"9","key":"8_CR16","first-page":"1824","volume":"32","author":"L Liu","year":"2020","unstructured":"Liu, L., Li, X., Cheung, W.K., Liao, L.: Structural representation learning for user alignment across social networks. IEEE Trans. Knowl. Data Eng. 32(9), 1824\u20131837 (2020)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Liu, L., Wang, C., Zhang, Y., Wang, Y., Liu, Q., Wang, G.: Denoise network structure for user alignment across networks via graph structure learning. In: DMBD (1), vol. 1744, pp. 105\u2013119 (2022)","DOI":"10.1007\/978-981-19-9297-1_9"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Liu, Z., Nguyen, T., Fang, Y.: Tail-GNN: tail-node graph neural networks. In: KDD, pp. 1109\u20131119 (2021)","DOI":"10.1145\/3447548.3467276"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Liu, Z., Zhang, W., Fang, Y., Zhang, X., Hoi, S.C.H.: Towards locality-aware meta-learning of tail node embeddings on networks. In: CIKM, pp. 975\u2013984 (2020)","DOI":"10.1145\/3340531.3411910"},{"key":"8_CR20","unstructured":"Man, T., Shen, H., Liu, S., Jin, X., Cheng, X.: Predict anchor links across social networks via an embedding approach. In: IJCAI, pp. 1823\u20131829 (2016)"},{"key":"8_CR21","unstructured":"Mikolov, T., Sutskever, I., Chen, K., Corrado, G.S., Dean, J.: Distributed representations of words and phrases and their compositionality. In: NIPS, pp. 3111\u20133119 (2013)"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Mu, X., Zhu, F., Lim, E., Xiao, J., Wang, J., Zhou, Z.: User identity linkage by latent user space modelling. In: KDD, pp. 1775\u20131784 (2016)","DOI":"10.1145\/2939672.2939849"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Pei, S., Yu, L., Hoehndorf, R., Zhang, X.: Semi-supervised entity alignment via knowledge graph embedding with awareness of degree difference. In: WWW, pp. 3130\u20133136 (2019)","DOI":"10.1145\/3308558.3313646"},{"key":"8_CR24","unstructured":"Rendle, S., Freudenthaler, C., Gantner, Z., Schmidt-Thieme, L.: BPR: Bayesian personalized ranking from implicit feedback. In: UAI, pp. 452\u2013461 (2009)"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Tan, S., Guan, Z., Cai, D., Qin, X., Bu, J., Chen, C.: Mapping users across networks by manifold alignment on hypergraph. In: AAAI, pp. 159\u2013165 (2014)","DOI":"10.1609\/aaai.v28i1.8720"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Tang, J., Qu, M., Wang, M., Zhang, M., Yan, J., Mei, Q.: LINE: large-scale information network embedding. In: WWW, pp. 1067\u20131077 (2015)","DOI":"10.1145\/2736277.2741093"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Tang, X., Li, Y., Sun, Y., Yao, H., Mitra, P., Wang, S.: Transferring robustness for graph neural network against poisoning attacks. In: WSDM, pp. 600\u2013608 (2020)","DOI":"10.1145\/3336191.3371851"},{"key":"8_CR28","unstructured":"Velickovic, P., Cucurull, G., Casanova, A., Romero, A., Li\u00f2, P., Bengio, Y.: Graph attention networks. In: ICLR (2018)"},{"key":"8_CR29","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.neucom.2022.02.002","volume":"487","author":"H Wang","year":"2022","unstructured":"Wang, H., Wang, Y., Li, J., Luo, T.: Degree aware based adversarial graph convolutional networks for entity alignment in heterogeneous knowledge graph. Neurocomputing 487, 99\u2013109 (2022)","journal-title":"Neurocomputing"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Zeng, W., Zhao, X., Wang, W., Tang, J., Tan, Z.: Degree-aware alignment for entities in tail. In: SIGIR, pp. 811\u2013820 (2020)","DOI":"10.1145\/3397271.3401161"},{"key":"8_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-319-12844-3_17","volume-title":"Information Retrieval Technology","author":"H Zhang","year":"2014","unstructured":"Zhang, H., Kan, M.-Y., Liu, Y., Ma, S.: Online social network profile linkage. In: Jaafar, A., et al. (eds.) AIRS 2014. LNCS, vol. 8870, pp. 197\u2013208. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12844-3_17"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Zhang, S., Tong, H., Jin, L., Xia, Y., Guo, Y.: Balancing consistency and disparity in network alignment. In: KDD, pp. 2212\u20132222 (2021)","DOI":"10.1145\/3447548.3467331"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Zhou, F., Wen, Z., Trajcevski, G., Zhang, K., Zhong, T., Liu, F.: Disentangled network alignment with matching explainability. In: INFOCOM, pp. 1360\u20131368 (2019)","DOI":"10.1109\/INFOCOM.2019.8737411"},{"key":"8_CR34","doi-asserted-by":"crossref","unstructured":"Zhu, D., Zhang, Z., Cui, P., Zhu, W.: Robust graph convolutional networks against adversarial attacks. In: KDD, pp. 1399\u20131407 (2019)","DOI":"10.1145\/3292500.3330851"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases: Applied Data Science and Demo Track"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-43427-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T21:02:38Z","timestamp":1694898158000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-43427-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031434266","9783031434273"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-43427-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"17 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This paper presents a study on the application of data mining techniques in social networks, with a strong emphasis on ethical considerations. We are fully committed to upholding the highest ethical standards throughout our research process, prioritizing the privacy and well-being of individuals.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Statement"}},{"value":"Privacy protection: Our utmost priority is the careful and secure treatment of personal information. All data collected and analyzed in this study strictly adheres to the relevant privacy laws and regulations. To safeguard privacy, we have taken measures to anonymize and de-identify the data, ensuring there is no possibility of linking any personal information to specific individuals. Our analysis is based solely on aggregated and anonymized data, eliminating any potential risks to individual privacy.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Statement"}},{"value":"Datasets and licensing: We have utilized publicly available datasets that have been appropriately licensed, following the terms and conditions set by the dataset owners. In this research paper, we explicitly acknowledge the sources of our data, ensuring that all citation requirements are met.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Statement"}},{"value":"Ethical use of results: The results presented in this paper are meant for academic and research purposes only. We acknowledge the need to prevent any misuse of our findings that could violate privacy, harm individuals, or engage in unethical activities. We are dedicated to responsibly using our research outputs, contributing positively to the advancement of computer science and society.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Statement"}},{"value":"In conclusion, this study adheres to the highest ethical standards, ensuring the respect for privacy, confidentiality, and responsible use of data. We are dedicated to contributing to the field of data mining in social networks while maintaining the security and privacy of individuals and organizations involved.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Statement"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Turin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2023.ecmlpkdd.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"829","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"196","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.63","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Applied Data Science Track: 239 submissions, 58 accepted papers; Demo Track: 31 submissions, 16 accepted papers.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}