{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T13:50:26Z","timestamp":1758981026564,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319519623"},{"type":"electronic","value":"9783319519630"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-51963-0_33","type":"book-chapter","created":{"date-parts":[[2017,1,10]],"date-time":"2017-01-10T06:17:39Z","timestamp":1484029059000},"page":"423-435","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Hybrid Model for Linking Multiple Social Identities Across Heterogeneous Online Social Networks"],"prefix":"10.1007","author":[{"given":"Athanasios","family":"Kokkos","sequence":"first","affiliation":[]},{"given":"Theodoros","family":"Tzouramanis","sequence":"additional","affiliation":[]},{"given":"Yannis","family":"Manolopoulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,11]]},"reference":[{"key":"33_CR1","first-page":"1","volume":"8","author":"CE Chaski","year":"2001","unstructured":"Chaski, C.E.: Empirical evaluations of language-based author identification techniques. Forensic Linguist. 8, 1\u201365 (2001)","journal-title":"Forensic Linguist."},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: Proceedings 30th IEEE Symposium on Security & Privacy, pp. 173\u2013187 (2009)","DOI":"10.1109\/SP.2009.22"},{"key":"33_CR3","doi-asserted-by":"crossref","unstructured":"Irani, D., et al.: Large online social footprints - an emerging threat. In: Proceedings IEEE International Conference on Computational Science & Engineering - CSE, vol. 3, pp. 271\u2013276 (2009)","DOI":"10.1109\/CSE.2009.459"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Erlandsson, F., Boldt, M., Johnson, H.: Privacy threats related to user profiling in OSNs. In: Proceedings of IEEE International Conference on Social Computing, pp. 838\u2013842 (2012)","DOI":"10.1109\/SocialCom-PASSAT.2012.16"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Christen, P.: Data Matching: Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection. Springer Science & Business Media (2012)","DOI":"10.1007\/978-3-642-31164-2"},{"issue":"9","key":"33_CR6","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/2.410146","volume":"28","author":"M Flickner","year":"1995","unstructured":"Flickner, M., et al.: Query by image and video content: the QBIC system. IEEE Comput. 28(9), 23\u201332 (1995)","journal-title":"IEEE Comput."},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Kokkos, A., Tzouramanis, T.: A robust gender inference model for online social networks and its application to LinkedIn and Twitter. First Monday 19(9) (2014)","DOI":"10.5210\/fm.v19i9.5216"},{"issue":"5","key":"33_CR8","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MIS.2003.1234765","volume":"18","author":"M Bilenko","year":"2003","unstructured":"Bilenko, M., Mooney, R., Cohen, W., Ravikumar, P., Fienberg, S.: Adaptive name matching in information integration. IEEE Intell. Syst. 18(5), 16\u201323 (2003)","journal-title":"IEEE Intell. Syst."},{"key":"33_CR9","unstructured":"Winkler, W.E.: String comparator metrics and enhanced decision rules in the Fellegi-Sunter model of record linkage. In: Proceedings of the Section on Survey Research Methods, American Statistical Association, pp. 354\u2013359 (1990)"},{"key":"33_CR10","first-page":"67","volume":"38","author":"P Jaccard","year":"1902","unstructured":"Jaccard, P.: Lois de distribution florale. Bulletin de la Soc\u00edet\u00e9 Vaudoise des Sciences Naturelles 38, 67\u2013130 (1902)","journal-title":"Bulletin de la Soc\u00edet\u00e9 Vaudoise des Sciences Naturelles"},{"issue":"2","key":"33_CR11","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1111\/j.1469-8137.1912.tb05611.x","volume":"11","author":"P Jaccard","year":"1912","unstructured":"Jaccard, P.: The distribution of the flora in the alpine zone. New Phytol. 11(2), 37\u201350 (1912)","journal-title":"New Phytol."},{"key":"33_CR12","unstructured":"Winker, E.W.: Overview of record linkage and current research directions. Statistical Research Division U.S. Census Bureau (2006)"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Balduzzi, M., et al.: Abusing social networks for automated user profiling. In: Proceedings International Workshop on Recent Advances in Intrusion Detection, pp. 422\u2013441 (2010)","DOI":"10.1007\/978-3-642-15512-3_22"},{"key":"33_CR14","unstructured":"Wang, Y., Liu, T., Tan, Q., Shi, J., Guo, L.: Identifying users across different sites using usernames. Procedia Comput. Sci. 80, 376\u2013385 (2016)"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings 18th ACM International Conference on WWW, pp. 551\u2013560 (2009)","DOI":"10.1145\/1526709.1526784"},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Zhou, C., Chen, H., Yu, T.: Learning a probabilistic semantic model from heterogeneous social networks for relationship identification. In: Proceedings 20th IEEE International Conference on Tools with Artificial Intelligence, vol. 1, 343\u2013350 (2008)","DOI":"10.1109\/ICTAI.2008.49"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Vosecky, J., Hong, D., Shen, V.Y.: User identification across multiple OSNs. In: Proceedings 1st IEEE International Conference on Networked Digital Technologies, pp. 360\u2013365 (2009)","DOI":"10.1109\/NDT.2009.5272173"},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Peled, O., Fire, M., Rokach, L., Elovici, Y.: Matching entities across online social networks. Neurocomputing 210, 91\u2013106 (2016)","DOI":"10.1016\/j.neucom.2016.03.089"},{"key":"33_CR19","unstructured":"Zhang, Y., Tang, J., Yang, Z., Pei, J., Yu, P.S.: COSNET: connecting heterogeneous social networks with local and global consistency. In: Proceedings 21st ACM SIGKDD International Conference on Knowledge Discovery & Data Mining \u2013 KDD, 1485\u20131494 (2015)"},{"key":"33_CR20","doi-asserted-by":"crossref","unstructured":"Liu, S., Wang, S., Zhu, F., Zhang, J., Krishnan, R.: HYDRA: Large-scale social identity linkage via heterogeneous behavior modeling. In: Proceedings ACM International Conference on Management of Data- SIGMOD, pp. 51\u201362 (2014)","DOI":"10.1145\/2588555.2588559"},{"key":"33_CR21","doi-asserted-by":"crossref","unstructured":"Wondracek, G., Holz, T., Kirda, E., Kruegel, C.: A practical attack to de-anonymize social network users. In: Proceedings IEEE Symposium on Security & Privacy, pp. 223\u2013238 (2010)","DOI":"10.1109\/SP.2010.21"},{"key":"33_CR22","doi-asserted-by":"crossref","unstructured":"Goga, O., Loiseau, P., Sommer, R., Teixeira, R., Gummadi, K.P.: On the reliability of profile matching across large online social networks. In: Proceedings 21st ACM SIGKDD International Conference on Knowledge Discovery & Data Mining \u2013 KDD, pp. 1799\u20131808 (2015)","DOI":"10.1145\/2783258.2788601"},{"key":"33_CR23","doi-asserted-by":"crossref","unstructured":"Egozi, O., Markovitch, S., Gabrilovich, E.: Concept-based information retrieval using explicit semantic analysis. ACM Trans. Inf. Syst. 29(2) (2011). article 8","DOI":"10.1145\/1961209.1961211"}],"container-title":["Lecture Notes in Computer Science","SOFSEM 2017: Theory and Practice of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-51963-0_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T17:16:31Z","timestamp":1692638191000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-51963-0_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319519623","9783319519630"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-51963-0_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"11 January 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SOFSEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Current Trends in Theory and Practice of Informatics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Limerick","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ireland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 January 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 January 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"43","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sofsem2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}