{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:31:13Z","timestamp":1760596273477,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,9,22]],"date-time":"2016-09-22T00:00:00Z","timestamp":1474502400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"TCS Research Labs"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s13278-016-0391-4","type":"journal-article","created":{"date-parts":[[2016,9,22]],"date-time":"2016-09-22T14:03:52Z","timestamp":1474553032000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Other times, other values: leveraging attribute history to link user profiles across online social networks"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6993-4790","authenticated-orcid":false,"given":"Paridhi","family":"Jain","sequence":"first","affiliation":[]},{"given":"Ponnurangam","family":"Kumaraguru","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Joshi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,22]]},"reference":[{"key":"391_CR1","unstructured":"Bartunov S, Korshunov A, Park S-T, Ryu W, Lee H (2012) Joint link-attribute user identity resolution in online social networks. In: Proceedings of the 6th international conference on knowledge discovery and data mining, workshop on social network mining and analysis, SNAKDD '12. ACM, San Diego, CA, USA"},{"key":"391_CR2","doi-asserted-by":"publisher","unstructured":"Chen T, Kaafar MA, Friedman A, Boreli R (2012) Is more always merrier?: a deep dive into online social footprints. In: Proceedings of the 2012 ACM workshop on workshop on online social networks, WOSN '12. ACM, New York, NY, USA, pp 67\u201372. doi: 10.1145\/2342549.2342565","DOI":"10.1145\/2342549.2342565"},{"key":"391_CR3","doi-asserted-by":"publisher","unstructured":"Chen Y, Zhuang C, Cao Q, Hui P (2014) Understanding cross-site linking in online social networks. In: Proceedings of the 8th workshop on social network mining and analysis, SNAKDD '14. ACM, New York, NY, USA, pp 61\u201369. doi: 10.1145\/2659480.2659498","DOI":"10.1145\/2659480.2659498"},{"key":"391_CR4","volume-title":"Making marketing meaningful","author":"G Cockerell","year":"2010","unstructured":"Cockerell G (2010) Making marketing meaningful. Kendall Hunt Publishing Company, Dubuque"},{"key":"391_CR5","doi-asserted-by":"publisher","unstructured":"Dewan P, Gupta M, Goyal K, Kumaraguru P (2013) MultiOSN: realtime monitoring of real world events on multiple online social media. In: Proceedings of the 5th IBM collaborative academia research exchange workshop, I-CARE '13. ACM, New York, NY, USA, pp 61\u201364. doi: 10.1145\/2528228.2528235","DOI":"10.1145\/2528228.2528235"},{"key":"391_CR6","doi-asserted-by":"publisher","unstructured":"Feizy R, Wakeman I, Chalmers D (2009) Transformation of online representation through time. In: Proceedings of the 2009 IEEE\/ACM international conference on advances in social networks analysis and mining, ASONAM '09, pp 273\u2013278. doi: 10.1109\/ASONAM.2009.64","DOI":"10.1109\/ASONAM.2009.64"},{"key":"391_CR7","doi-asserted-by":"publisher","unstructured":"Goga O, Lei H, Parthasarathi SHK, Friedland G, Sommer R, Teixeira R (2013) Exploiting innocuous activity for correlating users across sites. In: Proceedings of the 22nd international conference on world wide web, WWW '13. ACM, New York, NY, USA, pp 447\u2013458. doi: 10.1145\/2488388.2488428","DOI":"10.1145\/2488388.2488428"},{"key":"391_CR8","first-page":"467","volume":"21","author":"T Grant","year":"2012","unstructured":"Grant T (2012) Txt 4n6: method, consistency, and distinctiveness in the analysis of SMS text messages. J Law Econ Policy 21:467","journal-title":"J Law Econ Policy"},{"key":"391_CR9","doi-asserted-by":"publisher","unstructured":"Guyon I, Weston J, Barnhill S, Vapnik V (2002) Gene selection for cancer classification using support vector machines. In: Machine learning, vol 46. Kluwer Academic Publishers, Hingham, MA, USA, pp 389\u2013422. doi: 10.1023\/A:1012487302797","DOI":"10.1023\/A:1012487302797"},{"key":"391_CR10","unstructured":"Heitz G, Gould S, Saxena A, Koller D (2009) Cascaded classification models: combining models for holistic scene understanding. In: Proceedings of the neural information processing systems, NIPS '09"},{"key":"391_CR11","unstructured":"Iofciu T, Fankhauser P, Abel F, Bischoff K (2011) Identifying users across social tagging systems. In: Proceedings of the 5th international AAAI conference on weblogs and social media, ICWSM '11, pp 522\u2013525"},{"key":"391_CR12","doi-asserted-by":"publisher","unstructured":"Irani D, Webb S, Li K, Pu C (2009) Large online social footprints\u2014an emerging threat. In: Proceedings of the 2009 international conference on computational science and engineering, CSE '09, vol 3. IEEE Computer Society, Washington, DC, USA, pp 271\u2013276. doi: 10.1109\/CSE.2009.459","DOI":"10.1109\/CSE.2009.459"},{"key":"391_CR13","doi-asserted-by":"publisher","unstructured":"Jain P, Kumaraguru P (2016) On the dynamics of username changing behavior on twitter. In: Proceedings of the 3rd IKDD conference on data science, CODS '16. ACM, New York, NY, USA, pp 61\u201366. doi: 10.1145\/2888451.2888452","DOI":"10.1145\/2888451.2888452"},{"key":"391_CR14","doi-asserted-by":"publisher","unstructured":"Jain P, Kumaraguru P, Joshi A (2013) @I Seek 'fb.me': identifying users across multiple online social networks. In: Proceedings of the 22nd international conference on world wide web, WWW '13 Companion. ACM, New York, NY, USA, pp 1259\u20131268. doi: 10.1145\/2487788.2488160","DOI":"10.1145\/2487788.2488160"},{"key":"391_CR15","doi-asserted-by":"publisher","unstructured":"Jain P, Kumaraguru P, Joshi A (2015) Other times, other values: leveraging attribute history to link user profiles across online social networks. In: Proceedings of the 26th ACM conference on hypertext & social media, HT '15. ACM, New York, NY, USA, pp 247\u2013255. doi: 10.1145\/2700171.2791040","DOI":"10.1145\/2700171.2791040"},{"key":"391_CR16","doi-asserted-by":"crossref","unstructured":"Li P, Dong X, Maurino A, Srivastava D (2011) Linking temporal records. In: Proceedings of the international conference on very large data bases, VLDB '11, vol 4. VLDB Endowment, pp 956\u2013967","DOI":"10.14778\/3402707.3402733"},{"key":"391_CR17","doi-asserted-by":"publisher","unstructured":"Liu J, Zhang F, Song X, Song YI, Lin CY, Hon HW (2013) What's in a Name?: an unsupervised approach to link users across communities. In: Proceedings of the 6th ACM international conference on web search and data mining, WSDM '13. ACM, New York, NY, USA, pp 495\u2013504, doi: 10.1145\/2433396.2433457","DOI":"10.1145\/2433396.2433457"},{"key":"391_CR19","doi-asserted-by":"publisher","unstructured":"Liu S, Wang S, Zhu F, Zhang J, Krishnan R (2014) HYDRA: large-scale social identity linkage via heterogeneous behavior modeling. In: Proceedings of the 2014 ACM SIGMOD international conference on management of data, SIGMOD '14. ACM, New York, NY, USA, pp 51\u201362. doi: 10.1145\/2588555.2588559","DOI":"10.1145\/2588555.2588559"},{"key":"391_CR18","unstructured":"Liu Y, Kliman-Silver C, Mislove A (2015) The tweets they are a-Changin': evolution of twitter users and behavior. In: Proceedings of the 8th international AAAI conference on weblogs and social media, ICWSM '14, pp 305\u2013314"},{"key":"391_CR20","doi-asserted-by":"crossref","unstructured":"Malhotra A, Totti L, Meira Jr W, Kumaraguru P, Almeida V (2012) Studying user footprints in different online social networks. In: Proceedings of the 2012 international conference on advances in social networks analysis and mining, ASONAM '12. IEEE Computer Society, pp 1065\u20131070","DOI":"10.1109\/ASONAM.2012.184"},{"key":"391_CR21","doi-asserted-by":"publisher","unstructured":"Motoyama M, Varghese G (2009) I seek you: searching and matching individuals in social networks. In: Proceedings of the 11th international workshop on web information and data management, WIDM '09. ACM, New York, NY, USA, pp 67\u201375. doi: 10.1145\/1651587.1651604","DOI":"10.1145\/1651587.1651604"},{"key":"391_CR22","doi-asserted-by":"publisher","unstructured":"Narayanan A, Shmatikov V (2009) De-anonymizing social networks. In: Proceedings of the 2009 30th IEEE symposium on security and privacy, SP '09. IEEE Computer Society, Washington, DC, USA, pp 173\u2013187. doi: 10.1109\/SP.2009.22","DOI":"10.1109\/SP.2009.22"},{"key":"391_CR23","doi-asserted-by":"crossref","unstructured":"Perito D, Castelluccia C, Kaafar MA, Manils P (2011) How unique and traceable are usernames? In: Proceedings of the 11th international conference on privacy enhancing technologies, PETS '11. Springer, Berlin, Heidelberg, pp 1\u201317","DOI":"10.1007\/978-3-642-22263-4_1"},{"key":"391_CR24","unstructured":"Shehab M, Ko MN, Touati H (2012) Social networks profile mapping using games. In: Presented as part of the 3rd USENIX conference on web application development, WebApps 12, pp 27\u201338"},{"key":"391_CR25","unstructured":"Shi X, Nallapati R, Leskovec J, McFarland D, Jurafsky D (2010) Who leads whom: topical lead-lag analysis across corpora. In: Proceedings of the neural information processing systems workshop, NIPS workshop '10. doi:10.1.1.190.4612"},{"key":"391_CR26","doi-asserted-by":"crossref","unstructured":"Smith TF, Waterman MS (1981) Identification of common molecular subsequences. J mol biol 147:195\u2013197","DOI":"10.1016\/0022-2836(81)90087-5"},{"key":"391_CR27","doi-asserted-by":"publisher","unstructured":"Szomszor MN, Cantador I, Alani H (2008) Correlating user profiles from multiple folksonomies. In: Proceedings of the 19th ACM conference on hypertext and hypermedia, HT '08. ACM, New York, NY, USA, pp 33\u201342. doi: 10.1145\/1379092.1379103","DOI":"10.1145\/1379092.1379103"},{"key":"391_CR28","volume-title":"Handbook of market segmentation: strategic targeting for business and technology firms","author":"A Weinstein","year":"2004","unstructured":"Weinstein A (2004) Handbook of market segmentation: strategic targeting for business and technology firms. Haworth Press, Philadelphia"},{"key":"391_CR29","doi-asserted-by":"crossref","unstructured":"Zafarani R, Liu H (2009) Connecting corresponding identities across communities. In: Proceedings of the international AAAI conference on web and social media, ICWSM '09, pp 354\u2013357. http:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/09\/paper\/view\/209","DOI":"10.1609\/icwsm.v3i1.13993"},{"key":"391_CR30","doi-asserted-by":"publisher","unstructured":"Zafarani R, Liu H (2013) Connecting users across social media sites: a behavioral-modeling approach. In: Proceedings of the 19th ACM SIGKDD international conference on knowledge discovery and data mining, KDD '13. ACM, New York, NY, USA, pp 41\u201349. doi: 10.1145\/2487575.2487648","DOI":"10.1145\/2487575.2487648"},{"key":"391_CR31","doi-asserted-by":"crossref","unstructured":"Zhang J, Wang C, Wang J (2014) Learning temporal dynamics of behavior propagation in social networks. In: Proceedings of the AAAI conference on artificial intelligence, AAAI '14, pp 229\u2013236. http:\/\/www.aaai.org\/ocs\/index.php\/AAAI\/AAAI14\/paper\/view\/8315","DOI":"10.1609\/aaai.v28i1.8717"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-016-0391-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-016-0391-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-016-0391-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,20]],"date-time":"2023-08-20T06:32:43Z","timestamp":1692513163000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-016-0391-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,22]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["391"],"URL":"https:\/\/doi.org\/10.1007\/s13278-016-0391-4","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"type":"print","value":"1869-5450"},{"type":"electronic","value":"1869-5469"}],"subject":[],"published":{"date-parts":[[2016,9,22]]},"article-number":"85"}}