{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T22:56:55Z","timestamp":1762210615194},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,2,26]],"date-time":"2010-02-26T00:00:00Z","timestamp":1267142400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Artif Intell Law"],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1007\/s10506-010-9085-9","type":"journal-article","created":{"date-parts":[[2010,2,25]],"date-time":"2010-02-25T04:40:18Z","timestamp":1267072818000},"page":"77-102","source":"Crossref","is-referenced-by-count":33,"title":["Disclosing false identity through hybrid link analysis"],"prefix":"10.1007","volume":"18","author":[{"given":"Tossapon","family":"Boongoen","sequence":"first","affiliation":[]},{"given":"Qiang","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Price","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,2,26]]},"reference":[{"issue":"1","key":"9085_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1326561.1326568","volume":"2","author":"B Aleman-Meza","year":"2008","unstructured":"Aleman-Meza B, Nagarajan M, Ding L, Sheth AP, Arpinar IB, Joshi A, Finin T (2008) Scalable semantic analytics on social networks for addressing the problem of conflict of interest detection. ACM Trans Web 2(1):1\u201329","journal-title":"ACM Trans Web"},{"issue":"1","key":"9085_CR2","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/TFUZZ.2002.806313","volume":"11","author":"AH Ali","year":"2003","unstructured":"Ali AH, Dubois D, Prade H (2003) Qualitative reasoning based on fuzzy relative orders of magnitude. IEEE Trans Fuzzy Syst 11(1):9\u201323","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"9085_CR3","doi-asserted-by":"crossref","unstructured":"Angheluta R, Moens MF (2007) Cross-document entity tracking. In: Proceedings of European conference on IR research, pp 670\u2013673","DOI":"10.1007\/978-3-540-71496-5_65"},{"key":"9085_CR4","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/s10506-009-9077-9","volume":"17","author":"KD Ashley","year":"2009","unstructured":"Ashley KD, Bruninghaus S (2009) Automatically classifying case texts and predicting outcomes. Artif Intell Law 17:125\u2013165","journal-title":"Artif Intell Law"},{"key":"9085_CR5","doi-asserted-by":"crossref","unstructured":"Badia A, Kantardzic MM (2005) Link analysis tools for intelligence and counterterrorism. In: Proceedings of IEEE international conference on intelligence and security informatics, Atlanta, pp 49\u201359 (2005)","DOI":"10.1007\/11427995_5"},{"issue":"1","key":"9085_CR6","first-page":"5-ex","volume":"1","author":"I Bhattacharya","year":"2007","unstructured":"Bhattacharya I, Getoor L (2007) Collective entity resolution in relational data. ACM Trans KDD 1(1):5-ex","journal-title":"ACM Trans KDD"},{"key":"9085_CR7","doi-asserted-by":"crossref","unstructured":"Bilenko M, Mooney RJ (2003) Adaptive duplicate detection using learnable string similarity measures. In: Proceedings of ACM SIGKDD international conference on knowledge discovery and data mining, pp 39\u201348","DOI":"10.1145\/956750.956759"},{"issue":"5","key":"9085_CR8","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MIS.2003.1234765","volume":"18","author":"M Bilenko","year":"2003","unstructured":"Bilenko M, Mooney R, Cohen W, Ravikumar P, Fienberg S (2003) Adaptive name matching in information integration. IEEE Intell Syst 18(5):16\u201323","journal-title":"IEEE Intell Syst"},{"key":"9085_CR9","doi-asserted-by":"crossref","unstructured":"Boongoen T, Shen Q (2008a) Clus-DOWA: a new dependent OWA operator. In: Proceedings of IEEE international conference on fuzzy sets and systems, pp 1057\u20131063","DOI":"10.1109\/FUZZY.2008.4630500"},{"key":"9085_CR10","unstructured":"Boongoen T, Shen Q (2008b) Detecting false identity through behavioural patterns. In: Proceedings of international crime science conference, London"},{"key":"9085_CR11","unstructured":"Boongoen T, Shen Q (2009a) Order-of-magnitude based link analysis for false identity detection. In: Proceedings of the 23rd international workshop on qualitative reasoning, pp 7\u201315"},{"key":"9085_CR12","doi-asserted-by":"crossref","unstructured":"Boongoen T, Shen Q (2009b) Semi-supervised OWA aggregation for link-based similarity evaluation and alias detection. In: Proceedings of IEEE international conference on fuzzy sets and systems, pp 288\u2013293","DOI":"10.1109\/FUZZY.2009.5277168"},{"key":"9085_CR13","doi-asserted-by":"crossref","unstructured":"Branting K (2003) A comparative evaluation of name matching algorithms. In: Proceedings of international conference on AI and law, pp 224\u2013232","DOI":"10.1145\/1047788.1047837"},{"issue":"1\u20137","key":"9085_CR14","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","volume":"30","author":"S Brin","year":"1998","unstructured":"Brin S, Page L (1998) The anatomy of a large-scale hypertextual web search engine. Comput Netw ISDN Syst 30(1\u20137):107\u2013117","journal-title":"Comput Netw ISDN Syst"},{"issue":"2","key":"9085_CR15","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1002\/asi.20266","volume":"57","author":"P Calado","year":"2006","unstructured":"Calado P, Cristo M, Gon\u00e7alves MA, de Moura ES, Ribeiro-Neto BA, Ziviani N (2006) Link based similarity measures for the classification of web documents. J Am Soc Inform Sci Technol 57(2):208\u2013221","journal-title":"J Am Soc Inform Sci Technol"},{"issue":"4","key":"9085_CR16","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1108\/09593849410076799","volume":"7","author":"R Clarke","year":"1994","unstructured":"Clarke R (1994) Human identification in information systems: management challenges and public policy issues. IT People 7(4):6\u201337","journal-title":"IT People"},{"key":"9085_CR17","doi-asserted-by":"crossref","first-page":"1183","DOI":"10.1080\/01621459.1969.10501049","volume":"64","author":"I Fellegi","year":"1969","unstructured":"Fellegi I, Sunter A (1969) Theory of record linkage. J Am Stat Assoc 64:1183\u20131210","journal-title":"J Am Stat Assoc"},{"issue":"3","key":"9085_CR18","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1109\/TKDE.2007.46","volume":"19","author":"F Fouss","year":"2007","unstructured":"Fouss F, Pirotte A, Renders JM, Saerens M (2007) Random-walk computation of similarities between nodes of a graph with application to collaborative recommendation. IEEE Trans Knowl Data Eng 19(3):355\u2013369","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"2","key":"9085_CR19","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1117454.1117456","volume":"7","author":"L Getoor","year":"2005","unstructured":"Getoor L, Diehl CP (2005) Link mining: a survey. ACM SIGKDD Explor Newslett 7(2):3\u201312","journal-title":"ACM SIGKDD Explor Newslett"},{"issue":"4","key":"9085_CR20","doi-asserted-by":"crossref","first-page":"940","DOI":"10.1109\/TKDE.2003.1209010","volume":"15","author":"J Hou","year":"2003","unstructured":"Hou J, Zhang Y (2003) Effectively finding relevant web pages from linkage information. IEEE Trans Knowl Data Eng 15(4):940\u2013951","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"9085_CR21","unstructured":"Hsiung P, Moore A, Neill D, Schneider J (2005) Alias detection in link data sets. In: Proceedings of international conference on intelligence analysis"},{"issue":"5\u20137","key":"9085_CR22","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1002\/sim.4780140510","volume":"14","author":"MA Jaro","year":"1995","unstructured":"Jaro MA (1995) Probabilistic linkage of large public health data files. Stat Med 14(5\u20137):491\u2013498","journal-title":"Stat Med"},{"key":"9085_CR23","doi-asserted-by":"crossref","unstructured":"Jeh G, Widom J (2002) Simrank: a measure of structural-context similarity. In: Proceedings of ACM SIGKDD international conference on knowledge discovery and data mining, pp 538\u2013543","DOI":"10.1145\/775047.775126"},{"key":"9085_CR24","doi-asserted-by":"crossref","unstructured":"Klink S, Reuther P, Weber A, Walter B, Ley M (2006) Analysing social networks within bibliographical data. In: Proceedings of international conference on database and expert systems applications, Poland, pp 234\u2013243","DOI":"10.1007\/11827405_23"},{"issue":"4","key":"9085_CR25","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1145\/146370.146380","volume":"24","author":"K Kukich","year":"1992","unstructured":"Kukich K (1992) Techniques for automatically correcting words in text. ACM Comput Surv 24(4):377\u2013439","journal-title":"ACM Comput Surv"},{"issue":"7","key":"9085_CR26","doi-asserted-by":"crossref","first-page":"1019","DOI":"10.1002\/asi.20591","volume":"58","author":"D Liben-Nowell","year":"2007","unstructured":"Liben-Nowell D, Kleinberg J (2007) The link-prediction problem for social networks. J Am Soc Inform Sci Technol 58(7):1019\u20131031","journal-title":"J Am Soc Inform Sci Technol"},{"key":"9085_CR27","doi-asserted-by":"crossref","unstructured":"Lin Z, King I, Lyu MR (2006) Pagesim: a novel link-based similarity measure for the world wide web. In: Proceedings of IEEE\/WIC\/ACM international conference on web intelligence, pp 687\u2013693","DOI":"10.1109\/WI.2006.127"},{"key":"9085_CR28","doi-asserted-by":"crossref","unstructured":"Minkov E, Cohen WW, Ng AY (2006) Contextual search and name disambiguation in email using graphs. In: Proceedings of international conference on research and development in IR, pp 27\u201334","DOI":"10.1145\/1148170.1148179"},{"key":"9085_CR29","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/s00354-008-0043-y","volume":"26","author":"T Murata","year":"2008","unstructured":"Murata T, Moriyasu S (2008) Link prediction based on structural properties of online social networks. New Gener Comput 26:245\u2013257","journal-title":"New Gener Comput"},{"issue":"1","key":"9085_CR30","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/375360.375365","volume":"33","author":"G Navarro","year":"2001","unstructured":"Navarro G (2001) A guided tour to approximate string matching. ACM Comput Surv 33(1):31\u201388","journal-title":"ACM Comput Surv"},{"key":"9085_CR31","doi-asserted-by":"crossref","unstructured":"Oatley GC, Zeleznikow J, Ewart BW (2005) Criminal networks and spatial density. In: Proceedings of international conference on artificial intelligence and law, pp 246\u2013247","DOI":"10.1145\/1165485.1165531"},{"key":"9085_CR32","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1023\/A:1025402013007","volume":"10","author":"A Oskamp","year":"2002","unstructured":"Oskamp A, Lauritsen M (2002) AI in law practice? So far, not much. Artif Intell Law 10:227\u2013236","journal-title":"Artif Intell Law"},{"key":"9085_CR33","unstructured":"Pantel P (2006) Alias detection in malicious environments. In: Proceedings of AAAI fall symposium on capturing and using patterns for evidence detection, Washington, D.C., pp 14\u201320"},{"key":"9085_CR34","first-page":"1425","volume":"15","author":"H Pasula","year":"2003","unstructured":"Pasula H, Marthi B, Milch B, Russell S, Shpitser I (2003) Identity uncertainty and citation matching. Adv Neural Inform Process Syst 15:1425\u20131432","journal-title":"Adv Neural Inform Process Syst"},{"key":"9085_CR35","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1023\/A:1008371600675","volume":"7","author":"L Philipps","year":"1999","unstructured":"Philipps L, Sartor G (1999) Introduction: from legal theories to neural networks and fuzzy reasoning. Artif Intell Law 7:115\u2013128","journal-title":"Artif Intell Law"},{"key":"9085_CR36","unstructured":"Porter G (2008) Crying (iranian) wolf in argentina. Asia Times Online"},{"issue":"1\u20133","key":"9085_CR37","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/0004-3702(91)90107-U","volume":"51","author":"O Raiman","year":"1991","unstructured":"Raiman O (1991) Order of magnitude reasoning. Artif Intell 51(1\u20133):11\u201338","journal-title":"Artif Intell"},{"issue":"2","key":"9085_CR38","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1504\/IJMSO.2006.011006","volume":"1","author":"P Reuther","year":"2006","unstructured":"Reuther P, Walter B (2006) Survey on test collections and techniques for personal name matching. Int J Metadata Semant Ontol 1(2):89\u201399","journal-title":"Int J Metadata Semant Ontol"},{"issue":"8","key":"9085_CR39","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1145\/163381.163402","volume":"36","author":"ME Schwartz","year":"1993","unstructured":"Schwartz ME, Wood DCM (1993) Discovering shared interests using graph analysis. Commun ACM 36(8):78\u201389","journal-title":"Commun ACM"},{"key":"9085_CR40","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/0954-1810(92)90004-L","volume":"7","author":"Q Shen","year":"1992","unstructured":"Shen Q, Leitch R (1992) On extending the quantity space in qualitative reasoning. Artif Intell Eng 7:167\u2013173","journal-title":"Artif Intell Eng"},{"issue":"2","key":"9085_CR41","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1093\/lpr\/mgl014","volume":"5","author":"Q Shen","year":"2006","unstructured":"Shen Q, Keppens J, Aitken C, Schafer B, Lee M (2006) A scenario-driven decision support system for serious crime investigation. Law Probab Risk 5(2):87\u2013117","journal-title":"Law Probab Risk"},{"key":"9085_CR42","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1002\/asi.4630240406","volume":"24","author":"H Small","year":"1973","unstructured":"Small H (1973) Co-citation in the scientific literature: a new measure of the relationship between two documents. J Am Soc Inform Sci 24:265\u2013269","journal-title":"J Am Soc Inform Sci"},{"issue":"2","key":"9085_CR43","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1145\/1117454.1117461","volume":"7","author":"J Sun","year":"2005","unstructured":"Sun J, Qu H, Chakrabarti D, Faloutsos C (2005) Relevance search and anomaly detection in bipartite graphs. ACM SIGKDD Explor Newslett 7(2):48\u201355","journal-title":"ACM SIGKDD Explor Newslett"},{"issue":"2","key":"9085_CR44","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1002\/asi.20105","volume":"56","author":"V Torvik","year":"2004","unstructured":"Torvik V, Weeber M, Swanson DW, Smalheiser NR (2004) A probabilistic similarity metric for medline records: a model of author name disambiguation. J Am Soc Inform Sci Technol 56(2):140\u2013158","journal-title":"J Am Soc Inform Sci Technol"},{"issue":"3","key":"9085_CR45","first-page":"71","volume":"47","author":"GA Wang","year":"2004","unstructured":"Wang GA, Chen H, Atabakhsh H (2004) Automatically detecting deceptive criminal identities. Commun ACM 47(3):71\u201376","journal-title":"Commun ACM"},{"key":"9085_CR46","doi-asserted-by":"crossref","unstructured":"Wang GA, Atabakhsh H, Petersen T, Chen H (2005) Discovering identity problems: a case study. In: Proceedings of IEEE international conference on intelligence and security informatics, Atlanta, pp 368\u2013373","DOI":"10.1007\/11427995_30"},{"issue":"5","key":"9085_CR47","doi-asserted-by":"crossref","first-page":"988","DOI":"10.1109\/TSMCA.2006.871799","volume":"36","author":"GA Wang","year":"2006","unstructured":"Wang GA, Chen H, Xu JJ, Atabakhsh H (2006) Automatically detecting criminal identity deception: an adaptive detection algorithm. IEEE Trans Syst Man Cybern Part A 36(5):988\u2013999","journal-title":"IEEE Trans Syst Man Cybern Part A"},{"key":"9085_CR48","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social network analysis: methods and applications","author":"S Wasserman","year":"1994","unstructured":"Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge"},{"issue":"6","key":"9085_CR49","doi-asserted-by":"crossref","first-page":"1122","DOI":"10.1109\/TFUZZ.2006.890686","volume":"15","author":"RR Yager","year":"2007","unstructured":"Yager RR (2007) Using stress functions to obtain OWA operators. IEEE Trans Fuzzy Syst 15(6):1122\u20131129","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"9085_CR50","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"Zadeh LA (1965) Fuzzy sets. Inform Control 8:338\u2013353","journal-title":"Inform Control"},{"key":"9085_CR51","doi-asserted-by":"crossref","unstructured":"Zhang P, Koppaka L (2007) Semantics-based legal citation network. In: Proceedings of international conference on artificial intelligence and law, pp 123\u2013130","DOI":"10.1145\/1276318.1276342"}],"container-title":["Artificial Intelligence and Law"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10506-010-9085-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10506-010-9085-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10506-010-9085-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T18:57:16Z","timestamp":1559156236000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10506-010-9085-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2,26]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,3]]}},"alternative-id":["9085"],"URL":"https:\/\/doi.org\/10.1007\/s10506-010-9085-9","relation":{},"ISSN":["0924-8463","1572-8382"],"issn-type":[{"value":"0924-8463","type":"print"},{"value":"1572-8382","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,2,26]]}}}