{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:19:17Z","timestamp":1773656357309,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319273990","type":"print"},{"value":"9783319274003","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,11,18]],"date-time":"2015-11-18T00:00:00Z","timestamp":1447804800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-27400-3_37","type":"book-chapter","created":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T17:08:38Z","timestamp":1448989718000},"page":"417-428","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Profile Matching Across Online Social Networks Based on Geo-Tags"],"prefix":"10.1007","author":[{"given":"Robert","family":"Roedler","sequence":"first","affiliation":[]},{"given":"Dennis","family":"Kergl","sequence":"additional","affiliation":[]},{"given":"Gabi Dreo","family":"Rodosek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,18]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Bayir, M.A.,\u00a0Demirbas, M.,\u00a0Eagle, N.: IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks and Workshops, 2009. WoWMoM 2009. IEEE, 2009, pp. 1\u20139","DOI":"10.1109\/WOWMOM.2009.5282489"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Trasarti, R.,\u00a0Pinelli, F.,\u00a0Nanni, M.,\u00a0Giannotti, F.: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD\u201911. ACM, New York, NY, USA, 2011, pp. 1190\u20131198","DOI":"10.1145\/2020408.2020591"},{"key":"37_CR3","unstructured":"Zafarani, R.,\u00a0Liu, H.: ICWSM, Citeseer (2009)"},{"key":"37_CR4","first-page":"1","volume-title":"Privacy Enhancing Technologies","author":"Daniele Perito","year":"2011","unstructured":"Perito, D.,\u00a0Castelluccia, C., Kaafar, M.A.,\u00a0Manils, P.: Privacy Enhancing Technologies. Springer, New York, pp. 1\u201317 (2011)"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Vosecky, J.,\u00a0Hong, D., Shen, V.Y.: First International Conference on Networked Digital Technologies, 2009. NDT\u201909. IEEE, 2009, pp. 360\u2013365","DOI":"10.1109\/NDT.2009.5272173"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Raad, E.,\u00a0Chbeir, R.,\u00a0Dipanda, A.: 2010 13th International Conference on Network-Based Information Systems (NBiS). IEEE, 2010, pp. 297\u2013304","DOI":"10.1109\/NBiS.2010.35"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Akcora, C.G.,\u00a0Carminati, B.,\u00a0Ferrari, E.: 2011 IEEE International Conference on Information Reuse and Integration (IRI). IEEE, 2011, pp. 292\u2013298","DOI":"10.1109\/IRI.2011.6009562"},{"key":"37_CR8","unstructured":"Soltani, R.,\u00a0Abhari, A.: 2013 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS). IEEE, 2013, pp. 64\u201370"},{"key":"37_CR9","unstructured":"Peled, O.,\u00a0Fire, M.,\u00a0Rokach, L.,\u00a0Elovici, Y.: 2013 International Conference on Social Computing (SocialCom). IEEE, 2013, pp. 339\u2013344"},{"key":"37_CR10","unstructured":"Cohen, W.,\u00a0Ravikumar, P.,\u00a0Fienberg, S.: KDD Workshop on Data Cleaning and Object Consolidation, vol.\u00a03, pp. 73\u201378 (2003)"},{"issue":"12","key":"37_CR11","first-page":"37","volume":"10","author":"Y Na","year":"2013","unstructured":"Na, Y., Yinliang, Z., Lili, D., Genqing, B., Liu, E., Clapworthy, G.J.: Communications. China 10(12), 37 (2013)","journal-title":"China"},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"Carmagnola, F.,\u00a0Osborne, F.,\u00a0Torre, I.: Proceedings of the 1st International Workshop on Information Heterogeneity and Fusion in Recommender Systems. ACM, 2010, pp. 9\u201315","DOI":"10.1145\/1869446.1869448"},{"key":"37_CR13","unstructured":"Motoyama, M.,\u00a0Varghese, G.: Proceedings of the Eleventh International Workshop on Web Information and Data Management. ACM, 2009, pp. 67\u201375"},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"Narayanan, A.,\u00a0Shmatikov, V.: 2009 30th IEEE Symposium on Security and Privacy. IEEE, 2009, pp. 173\u2013187","DOI":"10.1109\/SP.2009.22"},{"key":"37_CR15","unstructured":"Chen, D.,\u00a0Hu, B.,\u00a0Xie, S.: CS224W Course Project Writup (2012)"},{"key":"37_CR16","unstructured":"Iofciu, T.,\u00a0Fankhauser, P.,\u00a0Abel, F.,\u00a0Bischoff, K.: ICWSM (2011)"},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Narayanan, A.,\u00a0Paskov, H., Gong, N.Z.,\u00a0Bethencourt, J.,\u00a0Stefanov, E., Shin, E.C.R.,\u00a0Song, D.: 2012 IEEE Symposium on Security and Privacy (SP). IEEE, 2012, pp. 300\u2013314","DOI":"10.1109\/SP.2012.46"},{"key":"37_CR18","doi-asserted-by":"crossref","unstructured":"Novak, J.,\u00a0Raghavan, P.,\u00a0Tomkins, A.: Proceedings of the 13th International Conference on World Wide Web. ACM, 2004, pp. 30\u201339","DOI":"10.1145\/988672.988678"},{"key":"37_CR19","doi-asserted-by":"crossref","unstructured":"Johansson, F.,\u00a0Kaati, L.,\u00a0Shrestha, A.: Proceedings of the 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining. ACM, 2013, pp. 1004\u20131011","DOI":"10.1145\/2492517.2500261"},{"key":"37_CR20","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/978-3-642-13470-8_4","volume-title":"User Modeling, Adaptation, and Personalization","author":"Fabian Abel","year":"2010","unstructured":"Abel, F.,\u00a0Henze, N.,\u00a0Herder, E.,\u00a0Krause, D.: User Modeling, Adaptation, and Personalization. Springer, New York, pp. 16\u201327 (2010)"},{"key":"37_CR21","doi-asserted-by":"crossref","unstructured":"Crandall, D.J., Backstrom, L., Cosley, D., Suri, S., Huttenlocher, D., Kleinberg, J.: Proc. Natl. Acad. Sci. 107(52), 22436 (2010)","DOI":"10.1073\/pnas.1006155107"},{"key":"37_CR22","doi-asserted-by":"crossref","unstructured":"Goga, O.,\u00a0Lei, H., Parthasarathi, S.H.K.,\u00a0Friedland, G.,\u00a0Sommer, R.,\u00a0Teixeira, R.: Proceedings of the 22nd International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 2013, WWW \u201913, pp. 447\u2013458","DOI":"10.1145\/2488388.2488428"},{"key":"37_CR23","doi-asserted-by":"crossref","unstructured":"Kergl, D.,\u00a0Roedler, R.,\u00a0Seeber, S.: 2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 2014, pp. 357\u2013364","DOI":"10.1109\/ASONAM.2014.6921610"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Nature and Biologically Inspired Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27400-3_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T16:40:39Z","timestamp":1748709639000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27400-3_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,18]]},"ISBN":["9783319273990","9783319274003"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27400-3_37","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,18]]},"assertion":[{"value":"18 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}