{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T04:01:36Z","timestamp":1751774496163,"version":"3.41.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319930367"},{"type":"electronic","value":"9783319930374"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93037-4_17","type":"book-chapter","created":{"date-parts":[[2018,6,19]],"date-time":"2018-06-19T16:00:13Z","timestamp":1529424013000},"page":"209-221","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Multi-network User Identification via Graph-Aware Embedding"],"prefix":"10.1007","author":[{"given":"Yang","family":"Yang","sequence":"first","affiliation":[]},{"given":"De-Chuan","family":"Zhan","sequence":"additional","affiliation":[]},{"given":"Yi-Feng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,20]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Backstrom, L., Leskovec, J.: Supervised random walks: predicting and recommending links in social networks. In: WSDM, pp. 635\u2013644 (2011)","DOI":"10.1145\/1935826.1935914"},{"issue":"1","key":"17_CR2","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1137\/080716542","volume":"2","author":"A Beck","year":"2009","unstructured":"Beck, A., Teboulle, M.: A fast iterative shrinkage-thresholding algorithm for linear inverse problems. SIIMS 2(1), 183\u2013202 (2009)","journal-title":"SIIMS"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Belkin, M., Niyogi, P.: Laplacian eigenmaps and spectral techniques for embedding and clustering. In: NIPS, pp. 585\u2013591 (2001)","DOI":"10.7551\/mitpress\/1120.003.0080"},{"issue":"1","key":"17_CR4","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1080\/15427951.2005.10129098","volume":"2","author":"P Berkhin","year":"2005","unstructured":"Berkhin, P.: A survey on pagerank computing. Internet Math. 2(1), 73\u2013120 (2005)","journal-title":"Internet Math."},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Blum, A., Mitchell, T.: Combining labeled and unlabeled data with co-training. In: COLT, pp. 92\u2013100 (1999)","DOI":"10.1145\/279943.279962"},{"issue":"4","key":"17_CR6","doi-asserted-by":"publisher","first-page":"1956","DOI":"10.1137\/080738970","volume":"20","author":"JF Cai","year":"2008","unstructured":"Cai, J.F., Candes, E.J., Shen, Z.: A singular value thresholding algorithm for matrix completion. SIOPT 20(4), 1956\u20131982 (2008)","journal-title":"SIOPT"},{"issue":"2","key":"17_CR7","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/s10618-010-0186-6","volume":"21","author":"W Chen","year":"2010","unstructured":"Chen, W., Liu, Z., Sun, X., Wang, Y.: A game-theoretic framework to identify overlapping communities in social networks. Data Min. Knowledge Disc. 21(2), 224\u2013240 (2010)","journal-title":"Data Min. Knowledge Disc."},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Deng, Z., Sang, J., Xu, C.: Personalized video recommendation based on cross-platform user modeling. In: ICME, pp. 1\u20136 (2013)","DOI":"10.1109\/ICME.2013.6607513"},{"issue":"1","key":"17_CR9","first-page":"72","volume":"11","author":"S Han","year":"2016","unstructured":"Han, S., Xu, Y.: Link prediction in microblog network using supervised learning with multiple features. J. Comput. Phys. 11(1), 72\u201382 (2016)","journal-title":"J. Comput. Phys."},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Harchaoui, Z., Douze, M., Paulin, M., Dudik, M., Malick, J.: Large-scale image classification with trace-norm regularization. In: CVPR, pp. 3386\u20133393 (2012)","DOI":"10.1109\/CVPR.2012.6248078"},{"issue":"9","key":"17_CR11","doi-asserted-by":"publisher","first-page":"2117","DOI":"10.1109\/TPAMI.2012.271","volume":"35","author":"Y Hu","year":"2013","unstructured":"Hu, Y., Zhang, D., Ye, J., Li, X., He, X.: Fast and accurate matrix completion via truncated nuclear norm regularization. TPAMI 35(9), 2117 (2013)","journal-title":"TPAMI"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Ji, S., Ye, J.: An accelerated gradient method for trace norm minimization. In: ICML, pp. 457\u2013464 (2009)","DOI":"10.1145\/1553374.1553434"},{"key":"17_CR13","unstructured":"Joachims, T.: Transductive inference for text classification using support vector machines. In: ICML, pp. 200\u2013209 (1999)"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Liu, J., Zhang, F., Song, X., Song, Y.I., Lin, C.Y., Hon, H.W.: What\u2019s in a name?: an unsupervised approach to link users across communities. In: ICWSM, pp. 495\u2013504 (2013)","DOI":"10.1145\/2433396.2433457"},{"key":"17_CR15","unstructured":"Liu, L., Cheung, W.K., Li, X., Liao, L.: Aligning users across social networks using network embedding. In: IJCAI, pp. 1774\u20131780 (2016)"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Liu, S., Wang, S., Zhu, F., Zhang, J., Krishnan, R.: Hydra: large-scale social identity linkage via heterogeneous behavior modeling. In: SIGMOD, pp. 51\u201362 (2014)","DOI":"10.1145\/2588555.2588559"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Mu, X., Zhu, F., Wang, J., Zhou, Z.H.: User identity linkage by latent user space modelling. In: SIGKDD, pp. 1775\u20131784 (2016)","DOI":"10.1145\/2939672.2939849"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: SP, Oakland, California, pp. 173\u2013187 (2009)","DOI":"10.1109\/SP.2009.22"},{"key":"17_CR19","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.neucom.2015.10.147","volume":"210","author":"Y Nie","year":"2016","unstructured":"Nie, Y., Jia, Y., Li, S., Zhu, X., Li, A., Zhou, B.: Identifying users across social networks based on dynamic core interests. Neurocomputing 210, 107\u2013115 (2016)","journal-title":"Neurocomputing"},{"key":"17_CR20","first-page":"1","volume-title":"Privacy Enhancing Technologies","author":"Daniele Perito","year":"2011","unstructured":"Perito, D., Castelluccia, C., AliKaafar, M., Manils, P.: How unique and traceable are usernames? In: PET, pp. 1\u201317 (2011)"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Perozzi, B., Al-Rfou, R., Skiena, S.: Deepwalk: Online learning of social representations. In: SIGKDD, pp. 701\u2013710 (2014)","DOI":"10.1145\/2623330.2623732"},{"issue":"2","key":"17_CR22","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/3068777.3068781","volume":"18","author":"K Shu","year":"2016","unstructured":"Shu, K., Wang, S., Tang, J., Zafarani, R., Liu, H.: User identity linkage across online social networks: a review. SIGKDD Explor. 18(2), 5\u201317 (2016)","journal-title":"SIGKDD Explor."},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Tan, S., Guan, Z., Cai, D., Qin, X., Bu, J., Chen, C.: Mapping users across networks by manifold alignment on hypergraph. In: AAAI, pp. 159\u2013165 (2014)","DOI":"10.1609\/aaai.v28i1.8720"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Tang, J., Qu, M., Wang, M., Zhang, M., Yan, J., Mei, Q.: LINE: large-scale information network embedding, pp. 1067\u20131077 (2015)","DOI":"10.1145\/2736277.2741093"},{"issue":"5500","key":"17_CR25","doi-asserted-by":"publisher","first-page":"2319","DOI":"10.1126\/science.290.5500.2319","volume":"290","author":"JB Tenenbaum","year":"2000","unstructured":"Tenenbaum, J.B., de Silva, V., Langford, J.C.: A global geometric framework for nonlinear dimensionality reduction. Science 290(5500), 2319\u20132323 (2000)","journal-title":"Science"},{"key":"17_CR26","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-319-57454-7_26","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"Y Wei","year":"2017","unstructured":"Wei, Y., Singh, L.: Using network flows to identify users sharing extremist content on social media. In: Kim, J., Shim, K., Cao, L., Lee, J.-G., Lin, X., Moon, Y.-S. (eds.) PAKDD 2017. LNCS (LNAI), vol. 10234, pp. 330\u2013342. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-57454-7_26"},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Ye, H.J., Zhan, D.C., Miao, Y., Jiang, Y., Zhou, Z.H.: Rank consistency based multi-view learning: a privacy-preserving approach. In: CIKM, pp. 991\u20131000 (2015)","DOI":"10.1145\/2806416.2806552"},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Zafarani, R., Liu, H.: Connecting corresponding identities across communities. In: ICWSM, pp. 354\u2013357 (2009)","DOI":"10.1609\/icwsm.v3i1.13993"},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, J., Kong, X., Yu, P.S.: Transferring heterogeneous links across location-based social networks. In: WSDM. pp. 495\u2013504 (2014)","DOI":"10.1145\/2556195.2559894"},{"key":"17_CR30","unstructured":"Zhang, J., Yu, P.S.: Integrated anchor and social link predictions across social networks. In: IJCAI, pp. 1620\u20131626 (2015)"},{"key":"17_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, M.L., Zhou, B.B., Liu, X.Y.: Partial label learning via feature-aware disambiguation. In: SIGKDD, pp. 1335\u20131344 (2016)","DOI":"10.1145\/2939672.2939788"},{"key":"17_CR32","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Tang, J., Yang, Z., Pei, J., Yu, P.S.: Cosnet: Connecting heterogeneous social networks with local and global consistency. In: SIGKDD, pp. 1485\u20131494 (2015)","DOI":"10.1145\/2783258.2783268"},{"issue":"2","key":"17_CR33","first-page":"411","volume":"28","author":"X Zhou","year":"2016","unstructured":"Zhou, X., Liang, X., Zhang, H., Ma, Y.: Cross-platform identification of anonymous identical users in multiple social media networks. TKDE 28(2), 411\u2013424 (2016)","journal-title":"TKDE"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93037-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T06:12:49Z","timestamp":1751695969000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-93037-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319930367","9783319930374"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93037-4_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"20 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/prada-research.net\/pakdd18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}