{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:00:50Z","timestamp":1725796850981},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319086071"},{"type":"electronic","value":"9783319086088"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08608-8_15","type":"book-chapter","created":{"date-parts":[[2014,7,4]],"date-time":"2014-07-04T01:30:34Z","timestamp":1404437434000},"page":"172-179","source":"Crossref","is-referenced-by-count":0,"title":["Mining the Association of Multiple Virtual Identities Based on Multi-Agent Interaction"],"prefix":"10.1007","author":[{"given":"Le","family":"Li","sequence":"first","affiliation":[]},{"given":"Weidong","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Changhua","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Haiming","family":"Tong","sequence":"additional","affiliation":[]},{"given":"Zhiqiang","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"15_CR1","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1344411.1344413","volume":"26","author":"A. Abbasi","year":"2008","unstructured":"Abbasi, A., Chen, H.: Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Transactions on Information Systems (TOIS)\u00a026(2), 7 (2008)","journal-title":"ACM Transactions on Information Systems (TOIS)"},{"key":"15_CR2","unstructured":"Airoldi, E., Malin, B.: Data mining challenges for electronic safety: The case of fraudulent intent detection in e-mails. In: Proceedings of the Workshop on Privacy and Security Aspects of Data Mining, pp. 57\u201366 (2004)"},{"key":"15_CR3","first-page":"993","volume":"3","author":"D.M. Blei","year":"2003","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. The Journal of Machine Learning Research\u00a03, 993\u20131022 (2003)","journal-title":"The Journal of Machine Learning Research"},{"key":"15_CR4","unstructured":"Chen, C., Wu, K., Srinivasan, V., Zhang, X.: Battling the internet water army: Detection of hidden paid posters. arXiv preprint arXiv:1111.4297 (2011)"},{"key":"15_CR5","volume-title":"The knowing organization: How organizations use information to construct meaning, create knowledge, and make decisions","author":"W.C. Chun","year":"1998","unstructured":"Chun, W.C.: The knowing organization: How organizations use information to construct meaning, create knowledge, and make decisions. Oxford University Press, Oxford (1998)"},{"key":"15_CR6","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/978-3-642-03348-3_42","volume-title":"Advanced Data Mining and Applications","author":"A. Daud","year":"2009","unstructured":"Daud, A., Li, J., Zhou, L., Muhammad, F.: Exploiting temporal authors interests via temporal-author-topic modeling. In: Huang, R., Yang, Q., Pei, J., Gama, J., Meng, X., Li, X. (eds.) ADMA 2009. LNCS (LNAI), vol.\u00a05678, pp. 435\u2013443. Springer, Heidelberg (2009)"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.Y.: Detecting and characterizing social spam campaigns. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, pp. 35\u201347. ACM (2010)","DOI":"10.1145\/1879141.1879147"},{"issue":"2","key":"15_CR8","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. Josang","year":"2007","unstructured":"Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems\u00a043(2), 618\u2013644 (2007)","journal-title":"Decision Support Systems"},{"issue":"4","key":"15_CR9","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/1121949.1121951","volume":"49","author":"J. Li","year":"2006","unstructured":"Li, J., Zheng, R., Chen, H.: From fingerprint to writeprint. Communications of the ACM\u00a049(4), 76\u201382 (2006)","journal-title":"Communications of the ACM"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Li, L., Xiao, W., Dai, C., Xu, J., Ge, B.: The recognition of multiple virtual identities association based on multi-agent system. In: Cao, L., Zeng, Y., Symeonidis, A.L., Gorodetsky, V., M\u00fcller, J.P., Yu, P.S. (eds.) ADMI 2013. LNCS(LNAI), vol. 8316, pp. 40\u201350. Springer, Heidelberg (2014)","DOI":"10.1007\/978-3-642-55192-5_4"},{"key":"15_CR11","unstructured":"Pan, Y.: Id identification in online communities. Technical report. Citeseer (2006)"},{"key":"15_CR12","unstructured":"Rosen-Zvi, M., Griffiths, T., Steyvers, M., Smyth, P.: The author-topic model for authors and documents. In: Proceedings of the 20th Conference on Uncertainty in Artificial Intelligence, pp. 487\u2013494. AUAI Press (2004)"},{"issue":"3","key":"15_CR13","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1002\/asi.21001","volume":"60","author":"E. Stamatatos","year":"2009","unstructured":"Stamatatos, E.: A survey of modern authorship attribution methods. Journal of the American Society for Information Science and Technology\u00a060(3), 538\u2013556 (2009)","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"7","key":"15_CR14","first-page":"424","volume":"427","author":"M. Steyvers","year":"2007","unstructured":"Steyvers, M., Griffiths, T.: Probabilistic topic models. Handbook of latent Semantic Analysis\u00a0427(7), 424\u2013440 (2007)","journal-title":"Handbook of latent Semantic Analysis"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Steyvers, M., Smyth, P., Rosen-Zvi, M., Griffiths, T.: Probabilistic author-topic models for information discovery. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 306\u2013315. ACM (2004)","DOI":"10.1145\/1014052.1014087"}],"container-title":["Lecture Notes in Computer Science","Databases Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08608-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T02:23:17Z","timestamp":1558923797000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-08608-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319086071","9783319086088"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08608-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}