{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T12:19:41Z","timestamp":1773490781559,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819570744","type":"print"},{"value":"9789819570751","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-7075-1_45","type":"book-chapter","created":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T11:12:34Z","timestamp":1773486754000},"page":"671-685","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Comparative Study of\u00a0Variational and\u00a0Vector Encoders in\u00a0Graph User Matching"],"prefix":"10.1007","author":[{"given":"Joeri","family":"Winckelmans","sequence":"first","affiliation":[]},{"given":"Bart","family":"De Clerck","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Steckel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,15]]},"reference":[{"key":"45_CR1","doi-asserted-by":"publisher","unstructured":"Breuer, J., Bishop, L., Kinder-Kurlanda, K.: The practical and ethical challenges in acquiring and sharing digital trace data: negotiating public-private partnerships. New Media Soc. 22(11), 2058\u20132080 (2020). https:\/\/doi.org\/10.1177\/1461444820924622","DOI":"10.1177\/1461444820924622"},{"key":"45_CR2","doi-asserted-by":"publisher","unstructured":"Chatzakou, D., Soler-Company, J., Tsikrika, T., Wanner, L., Vrochidis, S., Kompatsiaris, I.: User identity linkage in social media using linguistic and social interaction features. In: WebSci \u201920: Proceedings of the 12th ACM Conference on Web Science, pp. 295\u2013304. Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3394231.3397920","DOI":"10.1145\/3394231.3397920"},{"key":"45_CR3","doi-asserted-by":"publisher","unstructured":"Chu, X., Fan, X., Zhu, Z., Bi, J.: Variational cross-network embedding for anonymized user identity linkage. In: Proceedings of the 30th ACM International Conference on Information and Knowledge Management. CIKM \u201921, pp. 2955\u20132959. Association for Computing Machinery, New York, NY, USA (2021). https:\/\/doi.org\/10.1145\/3459637.3482214","DOI":"10.1145\/3459637.3482214"},{"key":"45_CR4","unstructured":"Hamilton, W.L., Ying, R., Leskovec, J.: Inductive representation learning on large graphs (2018). https:\/\/arxiv.org\/abs\/1706.02216"},{"key":"45_CR5","unstructured":"HuggingFace: all-mpnet-base-v2. https:\/\/huggingface.co\/sentence-transformers\/all-mpnet-base-v2. Accessed 07 May 2025"},{"key":"45_CR6","unstructured":"HuggingFace: meta-llama\/Llama-3.2-3B-Instruct $$\\cdot $$ Hugging Face \u2013 huggingface.co. https:\/\/huggingface.co\/meta-llama\/Llama-3.2-3B-Instruct. Accessed 07 May 2025"},{"key":"45_CR7","unstructured":"Kingma, D.P., Welling, M.: Auto-encoding variational bayes (2022). https:\/\/arxiv.org\/abs\/1312.6114"},{"key":"45_CR8","unstructured":"Kipf, T.N., Welling, M.: Variational graph auto-encoders (2016). https:\/\/arxiv.org\/abs\/1611.07308"},{"key":"45_CR9","doi-asserted-by":"crossref","unstructured":"Lu, D., Li, Q., Liu, Z., Li, S., Wu, X., Li, S.: A review of user identity linkage across social networks. In: 2023 8th International Conference on Data Science in Cyberspace (DSC), pp. 429\u2013436. IEEE (2023)","DOI":"10.1109\/DSC59305.2023.00068"},{"key":"45_CR10","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space (2013). https:\/\/arxiv.org\/abs\/1301.3781"},{"key":"45_CR11","doi-asserted-by":"publisher","unstructured":"Patel, P., Kannoorpatti, K., Shanmugam, B., Azam, S., Yeo, K.C.: A theoretical review of social media usage by cyber-criminals. In: 2017 International Conference on Computer Communication and Informatics (ICCCI), pp. 1\u20136 (2017). https:\/\/doi.org\/10.1109\/ICCCI.2017.8117694","DOI":"10.1109\/ICCCI.2017.8117694"},{"key":"45_CR12","doi-asserted-by":"crossref","unstructured":"Reimers, N., Gurevych, I.: Sentence-BERT: sentence embeddings using SIAMESE BERT-networks (2019). https:\/\/arxiv.org\/abs\/1908.10084","DOI":"10.18653\/v1\/D19-1410"},{"key":"45_CR13","unstructured":"UATeam: Embedding Model for LLaMA 3.1: A Comprehensive Guide (2024). https:\/\/medium.com\/@aleksej.gudkov\/embedding-model-for-llama-3-1-a-comprehensive-guide-1821ffadddb7. Accessed 07 May 2025"},{"key":"45_CR14","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Li\u00f2, P., Bengio, Y.: Graph attention networks (2018). https:\/\/arxiv.org\/abs\/1710.10903"},{"key":"45_CR15","doi-asserted-by":"publisher","first-page":"137472","DOI":"10.1109\/ACCESS.2019.2942840","volume":"7","author":"L Xing","year":"2019","unstructured":"Xing, L., Deng, K., Wu, H., Xie, P., Zhao, H.V., Gao, F.: A survey of across social networks user identification. IEEE Access 7, 137472\u2013137488 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2942840","journal-title":"IEEE Access"},{"issue":"2","key":"45_CR16","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1109\/TKDE.2015.2485222","volume":"28","author":"X Zhou","year":"2016","unstructured":"Zhou, X., Liang, X., Zhang, H., Ma, Y.: Cross-platform identification of anonymous identical users in multiple social media networks. IEEE Trans. Knowl. Data Eng. 28(2), 411\u2013424 (2016). https:\/\/doi.org\/10.1109\/TKDE.2015.2485222","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Lecture Notes in Computer Science","PRICAI 2025: Trends in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-7075-1_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T11:12:35Z","timestamp":1773486755000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-7075-1_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819570744","9789819570751"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-7075-1_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"15 March 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors do not have any competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"PRICAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific Rim International Conference on Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wellington","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Zealand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pricai2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.pricai.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}