{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:35:44Z","timestamp":1725888944025},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319600444"},{"type":"electronic","value":"9783319600451"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60045-1_2","type":"book-chapter","created":{"date-parts":[[2017,6,2]],"date-time":"2017-06-02T10:59:11Z","timestamp":1496401151000},"page":"12-21","source":"Crossref","is-referenced-by-count":0,"title":["Mining the Lattice of Binary Classifiers for Identifying Duplicate Labels in Behavioral Data"],"prefix":"10.1007","author":[{"given":"Quentin","family":"Labernia","sequence":"first","affiliation":[]},{"given":"Victor","family":"Codocedo","sequence":"additional","affiliation":[]},{"given":"C\u00e9line","family":"Robardet","sequence":"additional","affiliation":[]},{"given":"Mehdi","family":"Kaytoue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,3]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Cavadenti, O., Codocedo, V., Boulicaut, J.F., Kaytoue, M.: When cyberathletes conceal their game: clustering confusion matrices to identify avatar aliases. In: International Conference on Data Science and Advanced Analytics (DSAA) (2015)","DOI":"10.1109\/DSAA.2015.7344824"},{"issue":"1376","key":"2_CR2","first-page":"779","volume":"3","author":"YA Montjoye De","year":"2013","unstructured":"De Montjoye, Y.A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Nature Sci. Rep. 3(1376), 779\u2013782 (2013)","journal-title":"Nature Sci. Rep."},{"issue":"12","key":"2_CR3","first-page":"2018","volume":"5","author":"L Getoor","year":"2012","unstructured":"Getoor, L., Machanavajjhala, A.: Entity resolution: theory, practice & open challenges. PVLDB 5(12), 2018\u20132019 (2012)","journal-title":"PVLDB"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Hall, M.A., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. SIGKDD Explor. 11(1), 10\u201318 (2009). http:\/\/doi.acm.org\/10.1145\/1656274.1656278","DOI":"10.1145\/1656274.1656278"},{"key":"2_CR5","unstructured":"ICDM Contest: Identify individual users across their digital devices. In: IEEE International Conference on data mining (2015)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Mugan, J., Chari, R., Hitt, L., McDermid, E., Sowell, M., Qu, Y., Coffman, T.: Entity resolution using inferred relationships and behavior. In: IEEE International Conference on Big Data, pp. 555\u2013560 (2014)","DOI":"10.1109\/BigData.2014.7004273"},{"issue":"5","key":"2_CR7","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MSP.2004.89","volume":"2","author":"A Peacock","year":"2004","unstructured":"Peacock, A., Ke, X., Wilkerson, M.: Typing patterns: a key to user identification. IEEE Secur. Priv. 2(5), 40\u201347 (2004)","journal-title":"IEEE Secur. Priv."},{"key":"2_CR8","unstructured":"Von Eschen, A.: Machine learning and data mining in call of duty (invited talk). In: European Conference on Machine Learning and Knowledge Discovery in Databases (ECML\/PKDD) (2014)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Yan, E.Q., Huang, J., Cheung, G.K.: Masters of control: behavioral patterns of simultaneous unit group manipulation in starcraft 2. In: 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI 2015), pp. 3711\u20133720. ACM (2015)","DOI":"10.1145\/2702123.2702429"}],"container-title":["Lecture Notes in Computer Science","Advances in Artificial Intelligence: From Theory to Practice"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60045-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T09:30:38Z","timestamp":1569403838000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60045-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319600444","9783319600451"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60045-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}