{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:32:10Z","timestamp":1743024730774,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319184548"},{"type":"electronic","value":"9783319184555"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18455-5_4","type":"book-chapter","created":{"date-parts":[[2015,5,8]],"date-time":"2015-05-08T03:24:59Z","timestamp":1431055499000},"page":"51-70","source":"Crossref","is-referenced-by-count":1,"title":["GCM: A Greedy-Based Cross-Matching Algorithm for Identifying Users Across Multiple Online Social Networks"],"prefix":"10.1007","author":[{"given":"Wenxin","family":"Liang","sequence":"first","affiliation":[]},{"given":"Bo","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Xiaosong","family":"He","sequence":"additional","affiliation":[]},{"given":"Xianchao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"http:\/\/en.wikipedia.org\/wiki\/stable_marriage_problem"},{"key":"4_CR2","unstructured":"http:\/\/www.analytictech.com\/networks\/egonet.htm"},{"key":"4_CR3","unstructured":"Bartunov, S., Korshunov, A., Park, S.T., Ryu, W., Lee, H.: Joint link-attribute user identity resolution in online social networks. In: Proc. of the Sixth SNA-KDD Workshop at KDD (2012)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/978-3-319-03260-3_25","volume-title":"Social Informatics","author":"K. Cortis","year":"2013","unstructured":"Cortis, K., Scerri, S., Rivera, I., Handschuh, S.: An ontology-based technique for online profile resolution. In: Jatowt, A., et al. (eds.) SocInfo 2013. LNCS, vol.\u00a08238, pp. 284\u2013298. Springer, Heidelberg (2013)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Gale, D., Shapley, L.S.: College admissions and the stability of marriage. American Mathematical Monthly, 9\u201315 (1962)","DOI":"10.1080\/00029890.1962.11989827"},{"key":"4_CR6","unstructured":"Goga, O., Perito, D., Lei, H., Teixeira, R., Sommer, R.: Large-scale correlation of accounts across social networks. Tech. rep. (2013)"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Irani, D., Webb, S., Li, K., Pu, C.: Large online social footprints\u2013an emerging threat. In: International Conference on Computational Science and Engineering, CSE 2009, vol. 3, pp. 271\u2013276. IEEE (2009)","DOI":"10.1109\/CSE.2009.459"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Jain, P., Kumaraguru, P., Joshi, A.: @ i seek \u2019fb.me\u2019: identifying users across multiple online social networks. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 1259\u20131268 (2013)","DOI":"10.1145\/2487788.2488160"},{"key":"4_CR9","unstructured":"Joshi, A., Sodhi, J.: Attributes similarities supports profile matching in social network"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Kong, X., Zhang, J., Yu, P.S.: Inferring anchor links across multiple heterogeneous social networks. In: Proceedings of the 22nd ACM International Conference on Information & Knowledge Management, pp. 179\u2013188. ACM (2013)","DOI":"10.1145\/2505515.2505531"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Lu, C.T., Shuai, H.H., Yu, P.S.: Identifying your customers in social networks. In: Proceedings of the 23rd ACM International Conference on Information and Knowledge Management, pp. 391\u2013400. ACM (2014)","DOI":"10.1145\/2661829.2662057"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Malhotra, A., Totti, L., Meira Jr., W., Kumaraguru, P., Almeida, V.: Studying user footprints in different online social networks. In: Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), pp. 1065\u20131070. IEEE Computer Society (2012)","DOI":"10.1109\/ASONAM.2012.184"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Motoyama, M., Varghese, G.: I seek you: searching and matching individuals in social networks. In: Proceedings of the Eleventh International Workshop on Web Information and Data Management, pp. 67\u201375. ACM (2009)","DOI":"10.1145\/1651587.1651604"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 173\u2013187. IEEE (2009)","DOI":"10.1109\/SP.2009.22"},{"key":"4_CR15","unstructured":"Quinlan, J.R.: C4.5: programs for machine learning, vol.\u00a01. Morgan Kaufmann (1993)"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Raad, E., Chbeir, R., Dipanda, A.: User profile matching in social networks. In: 2010 13th International Conference on Network-Based Information Systems (NBiS), pp. 297\u2013304. IEEE (2010)","DOI":"10.1109\/NBiS.2010.35"},{"key":"4_CR17","unstructured":"Shehab, M., Ko, M.N., Touati, H.: Social networks profile mapping using games. In: Proceedings of the 3rd USENIX Conference on Web Application Development, WebApps (2012)"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Vosecky, J., Hong, D., Shen, V.Y.: User identification across multiple social networks. In: First International Conference on Networked Digital Technologies, NDT 2009, pp. 360\u2013365. IEEE (2009)","DOI":"10.1109\/NDT.2009.5272173"},{"issue":"2","key":"4_CR19","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1023\/A:1007659514849","volume":"40","author":"G.I. Webb","year":"2000","unstructured":"Webb, G.I.: Multiboosting: A technique for combining boosting and wagging. Machine Learning\u00a040(2), 159\u2013196 (2000)","journal-title":"Machine Learning"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"You, G.W., Hwang, S.W., Nie, Z., Wen, J.-R.: Socialsearch: enhancing entity search with social network matching. In: Proceedings of the 14th International Conference on Extending Database Technology, pp. 515\u2013519. ACM (2011)","DOI":"10.1145\/1951365.1951428"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Zafarani, R., Liu, H.: Connecting users across social media sites: a behavioral-modeling approach. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 41\u201349. ACM (2013)","DOI":"10.1145\/2487575.2487648"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18455-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T01:03:23Z","timestamp":1676941403000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-18455-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319184548","9783319184555"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18455-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}