{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T22:18:23Z","timestamp":1773094703891,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319635576","type":"print"},{"value":"9783319635583","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-63558-3_23","type":"book-chapter","created":{"date-parts":[[2017,7,18]],"date-time":"2017-07-18T10:03:05Z","timestamp":1500372185000},"page":"274-286","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Inferring User Profiles in Online Social Networks Based on Convolutional Neural Network"],"prefix":"10.1007","author":[{"given":"Xiaoxue","family":"Li","sequence":"first","affiliation":[]},{"given":"Yanan","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Yanmin","family":"Shang","sequence":"additional","affiliation":[]},{"given":"Yanbing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jianlong","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Li","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,19]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Li, R., Wang, C., Chang, K.C.C.: User profiling in an ego network: co-profiling attributes and relationships. In: Proceedings of the 23rd International Conference on World Wide Web, pp. 819\u2013830. ACM (2014)","DOI":"10.1145\/2566486.2568045"},{"issue":"15","key":"23_CR2","doi-asserted-by":"publisher","first-page":"5802","DOI":"10.1073\/pnas.1218772110","volume":"110","author":"M Kosinski","year":"2013","unstructured":"Kosinski, M., Stillwell, D., Graepel, T.: Private traits and attributes are predictable from digital records of human behavior. Proc. Natl. Acad. Sci. U.S.A. 110(15), 5802\u20135805 (2013)","journal-title":"Proc. Natl. Acad. Sci. U.S.A."},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-319-18356-5_8","volume-title":"Advances in Artificial Intelligence","author":"RY Dougnon","year":"2015","unstructured":"Dougnon, R.Y., Fournier-Viger, P., Nkambou, R.: Inferring user profiles in online social networks using a partial social graph. In: Barbosa, D., Milios, E. (eds.) CANADIAN AI 2015. LNCS, vol. 9091, pp. 84\u201399. Springer, Cham (2015). doi:10.1007\/978-3-319-18356-5_8"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Ciot, M., Sonderegger, M., Ruths, D.: Gender inference of Twitter users in non-English contexts. In: EMNLP, pp. 1136\u20131145 (2013)","DOI":"10.18653\/v1\/D13-1114"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Petkos, G., Papadopoulos, S., Kompatsiaris, Y.: Social circle discovery in ego-networks by mining the latent structure of user connections and profile attributes. In: 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 880\u2013887. IEEE (2015)","DOI":"10.1145\/2808797.2809303"},{"key":"23_CR6","first-page":"273","volume":"13","author":"D Jurgens","year":"2013","unstructured":"Jurgens, D.: That\u2019s what friends are for: inferring location in online social media platforms based on social relationships. ICWSM 13, 273\u2013282 (2013)","journal-title":"ICWSM"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Dong, Y., Tang, J., Wu, S., et al.: Link prediction and recommendation across heterogeneous social networks. In: 2012 IEEE 12th International Conference on Data Mining (ICDM), pp. 181\u2013190. IEEE (2012)","DOI":"10.1109\/ICDM.2012.140"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Mislove, A., Viswanath, B., Gummadi, K.P., et al.: You are who you know: inferring user profiles in online social networks. In: Proceedings of the third ACM International Conference on Web Search and Data Mining, pp. 251\u2013260. ACM (2010)","DOI":"10.1145\/1718487.1718519"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Lindamood, J., Heatherly, R., Kantarcioglu, M., et al.: Inferring private information using social network data. In: Proceedings of the 18th International Conference on World Wide Web, pp. 1145\u20131146. ACM (2009)","DOI":"10.1145\/1526709.1526899"},{"issue":"6","key":"23_CR10","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1111\/j.1467-9671.2011.01297.x","volume":"15","author":"CA Davis Jr","year":"2011","unstructured":"Davis Jr., C.A., Pappa, G.L., de Oliveira, D.R.R., et al.: Inferring the location of twitter messages based on user relationships. Trans. GIS 15(6), 735\u2013751 (2011)","journal-title":"Trans. GIS"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Mo, M., Wang, D., Li, B., et al.: Exploit of online social networks with semi-supervised learning. In: The 2010 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138. IEEE (2010)","DOI":"10.1109\/IJCNN.2010.5596580"},{"key":"23_CR12","first-page":"2493","volume":"12","author":"R Collobert","year":"2011","unstructured":"Collobert, R., Weston, J., Bottou, L., et al.: Natural language processing (almost) from scratch. J. Mach. Learn. Res. 12, 2493\u20132537 (2011)","journal-title":"J. Mach. Learn. Res."},{"issue":"2","key":"23_CR13","first-page":"27","volume":"5","author":"NZ Gong","year":"2014","unstructured":"Gong, N.Z., Talwalkar, A., Mackey, L., et al.: Joint link prediction and attribute inference using a social-attribute network. ACM Trans. Intell. Syst. Technol. (TIST) 5(2), 27 (2014)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Yin, Z., Gupta, M., Weninger, T., et al.: A unified framework for link recommendation using random walks. In: 2010 International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 152\u2013159. IEEE (2010)","DOI":"10.1109\/ASONAM.2010.27"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Yin, Z., Gupta, M., Weninger, T., et al.: Linkrec: a unified framework for link recommendation with user attributes and graph structure. In: Proceedings of the 19th International Conference on World Wide Web. pp. 1211\u20131212. ACM (2010)","DOI":"10.1145\/1772690.1772879"},{"key":"23_CR16","unstructured":"Gong, N.Z., Liu, B.: You are who you know and how you behave: attribute inference attacks via users\u2019 social friends and behaviors. arXiv preprint arXiv:1606.05893 (2016)"},{"issue":"6","key":"23_CR17","first-page":"162","volume":"28","author":"FX Xu","year":"2014","unstructured":"Xu, F.X., Liang Ying, H.-B.: A sock-puppet ralation detection method on social network. J. Chinese Inf. Process. 28(6), 162\u2013168 (2014)","journal-title":"J. Chinese Inf. Process."},{"key":"23_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-642-14527-8_14","volume-title":"Privacy Enhancing Technologies","author":"K Thomas","year":"2010","unstructured":"Thomas, K., Grier, C., Nicol, David M.: unFriendly: multi-party privacy risks in social networks. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 236\u2013252. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-14527-8_14"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Weinsberg, U., Bhagat, S. Ioannidis, Taft, N.: Blurme: inferring and obfuscating user gender based on ratings. In: RecSys (2012)","DOI":"10.1145\/2365952.2365989"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Ye, M., Liu, X., Lee, W.-C.: Exploring social influence for recommendation a probabilistic generative model approach. In: SIGIR (2012)","DOI":"10.1145\/2348283.2348373"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Otterbacher, J.: Inferring gender of movie reviewers: exploiting writing style, content and metadata. In: CIKM (2010)","DOI":"10.1145\/1871437.1871487"}],"container-title":["Lecture Notes in Computer Science","Knowledge Science, Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63558-3_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T14:30:34Z","timestamp":1750775434000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-63558-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319635576","9783319635583"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63558-3_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"19 July 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"KSEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Knowledge Science, Engineering and Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 August 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 August 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ksem2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ksem2017.conferences.academy\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}