{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:51:25Z","timestamp":1774021885362,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T00:00:00Z","timestamp":1681776000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T00:00:00Z","timestamp":1681776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003995","name":"Anhui Provincial Natural Science Foundation","doi-asserted-by":"crossref","award":["2208085QF205"],"award-info":[{"award-number":["2208085QF205"]}],"id":[{"id":"10.13039\/501100003995","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Key Projects of Natural Science Research of Universities in Anhui Province","award":["KJ2021A0071"],"award-info":[{"award-number":["KJ2021A0071"]}]},{"name":"University Synergy Innovation Program of Anhui Province","award":["GXXT-2021-032"],"award-info":[{"award-number":["GXXT-2021-032"]}]},{"name":"MOE (Ministry of Education in China) Youth Foundation Project of Humanities and Social Sciences","award":["20YJCZH025"],"award-info":[{"award-number":["20YJCZH025"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>User alignment across online social network platforms (OSNPs) is a growing concern with the rapid development of internet technology. In reality, users tend to register different accounts on multiple OSNPs, and the network platforms are reluctant to share network structure and user\u2019s information due to business interest and privacy protection, which brings great obstacles to cross-platform user alignment. In view of this, we propose a homomorphic encryption-based social network alignment (HE-SNA) algorithm from the perspective of privacy leakage. Specifically, we first consider the OSNPs as a system containing multiple social networks, that each participant of OSNPs owns part of the network, i.e., a separate private sub-network. Then, encryption, fusion and decryption operations of the alignment information are performed by two third-party servers using HE scheme, which can protect the privacy information of sub-networks effectively. Finally, each sub-network uses the fused alignment information sent back from the third-party server for user alignment. Experimental results show that the HE-SNA method can provide a sum of locally trained models to third-party servers without leaking the privacy of any single sub-network. Moreover, the HE-SNA achieves a promising network alignment performance than only using the structural information and alignment data of single private sub-network while protecting its topology structure information.<\/jats:p>","DOI":"10.1007\/s40747-023-01052-0","type":"journal-article","created":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T08:02:03Z","timestamp":1681804923000},"page":"6009-6022","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["HE-SNA: an efficient cross-platform network alignment scheme from privacy-aware perspective"],"prefix":"10.1007","volume":"9","author":[{"given":"Li","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Xiao-Jing","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Dong-Hui","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Dong-Mei","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Hai-Feng","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0444-121X","authenticated-orcid":false,"given":"Kai","family":"Zhong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,18]]},"reference":[{"key":"1052_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105301","volume":"193","author":"S Fu","year":"2020","unstructured":"Fu S, Wang G, Xia S, Liu L (2020) Deep multi-granularity graph embedding for user identity linkage across social networks. Knowl-Based Syst 193:105301","journal-title":"Knowl-Based Syst"},{"key":"1052_CR2","doi-asserted-by":"publisher","first-page":"1761","DOI":"10.1109\/TIP.2022.3146625","volume":"31","author":"W Wen","year":"2022","unstructured":"Wen W, Ren W, Shi Y, Nie Y, Zhang J, Cao X (2022) Video super-resolution via a spatio-temporal alignment network. IEEE Trans Image Process 31:1761\u20131773","journal-title":"IEEE Trans Image Process"},{"issue":"6","key":"1052_CR3","doi-asserted-by":"publisher","first-page":"2060","DOI":"10.1109\/TCBB.2018.2808529","volume":"15","author":"WE Djeddi","year":"2018","unstructured":"Djeddi WE, Yahia SB, Nguifo EM (2018) A novel computational approach for global alignment for multiple biological networks. IEEE\/ACM Trans Comput Biol Bioinform 15(6):2060\u20132066","journal-title":"IEEE\/ACM Trans Comput Biol Bioinform"},{"key":"1052_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.07.015","volume":"188","author":"C Fu","year":"2020","unstructured":"Fu C (2020) User intimacy model for question recommendation in community question answering. Knowl-Based Syst 188:104844","journal-title":"Knowl-Based Syst"},{"key":"1052_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2022.3152598","author":"L Pretet","year":"2022","unstructured":"Pretet L, Richard G, Souchier C, Peeters G (2022) Video-to-music recommendation using temporal alignment of segments. IEEE Trans Multimed. https:\/\/doi.org\/10.1109\/TMM.2022.3152598","journal-title":"IEEE Trans Multimed"},{"issue":"1","key":"1052_CR6","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/TNSM.2021.3091517","volume":"19","author":"R Mills","year":"2021","unstructured":"Mills R, Marnerides AK, Broadbent M, Race N (2021) Practical intrusion detection of emerging threats. IEEE Trans Netw Serv Manage 19(1):582\u2013600","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"2","key":"1052_CR7","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1109\/TCSS.2021.3089535","volume":"9","author":"W Luo","year":"2021","unstructured":"Luo W, Duan B, Ni L, Liu Y (2021) Collaborative detection of community structure in multiple private networks. IEEE Trans Comput Soc Syst 9(2):612\u2013623","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"1052_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3168010","author":"H-F Zhang","year":"2022","unstructured":"Zhang H-F, Ma X-J, Wang J, Zhang X, Pan D, Zhong K (2022) Privacy-preserving link prediction in multiple private networks. IEEE Trans Comput Soc Syst. https:\/\/doi.org\/10.1109\/TCSS.2022.3168010","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"2","key":"1052_CR9","doi-asserted-by":"publisher","first-page":"108","DOI":"10.34306\/itsdi.v1i2.103","volume":"1","author":"T Alam","year":"2020","unstructured":"Alam T (2020) Cloud computing and its role in the information technology. IAIC Trans Sustain Digit Innov (ITSDI) 1(2):108\u2013115","journal-title":"IAIC Trans Sustain Digit Innov (ITSDI)"},{"key":"1052_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2020.103441","volume":"122","author":"SA Bello","year":"2021","unstructured":"Bello SA, Oyedele LO, Akinade OO, Bilal M, Delgado JMD, Akanbi LA, Ajayi AO, Owolabi HA (2021) Cloud computing in construction industry: use cases, benefits and challenges. Autom Constr 122:103441","journal-title":"Autom Constr"},{"key":"1052_CR11","doi-asserted-by":"publisher","first-page":"57792","DOI":"10.1109\/ACCESS.2021.3073203","volume":"9","author":"B Alouffi","year":"2021","unstructured":"Alouffi B, Hasnain M, Alharbi A, Alosaimi W, Alyami H, Ayaz M (2021) A systematic literature review on cloud computing security: threats and mitigation strategies. IEEE Access 9:57792\u201357807","journal-title":"IEEE Access"},{"issue":"4","key":"1052_CR12","first-page":"1","volume":"51","author":"A Abbas","year":"2017","unstructured":"Abbas A, Hidayet A, Selcuk UA, Mauro C (2017) A survey on homomorphic encryption schemes: theory and implementation. ACM Comput Surv 51(4):1\u201335","journal-title":"ACM Comput Surv"},{"issue":"9","key":"1052_CR13","first-page":"1","volume":"7","author":"C Zheng","year":"2021","unstructured":"Zheng C, Pan L, Wu P (2021) Camu: cycle-consistent adversarial mapping model for user alignment across social networks. IEEE Trans Cybern 7(9):1\u201312","journal-title":"IEEE Trans Cybern"},{"key":"1052_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113857","volume":"165","author":"TT Nguyen","year":"2021","unstructured":"Nguyen TT, Pham MT, Nguyen TT, Huynh TT, Nguyen QVH, Quan TT et al (2021) Structural representation learning for network alignment with self-supervised anchor links. Expert Syst Appl 165:113857","journal-title":"Expert Syst Appl"},{"issue":"3","key":"1052_CR15","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1007\/s11280-018-0571-4","volume":"22","author":"Y Li","year":"2019","unstructured":"Li Y, Peng Y, Zhang Z, Yin H, Xu Q (2019) Matching user accounts across social networks based on username and display name. World Wide Web 22(3):1075\u20131097","journal-title":"World Wide Web"},{"issue":"9","key":"1052_CR16","first-page":"1824","volume":"32","author":"L Liu","year":"2019","unstructured":"Liu L, Li X, Cheung WK, Liao L (2019) Structural representation learning for user alignment across social networks. IEEE Trans Knowl Data Eng 32(9):1824\u20131837","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1052_CR17","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3068468","author":"X Ding","year":"2021","unstructured":"Ding X, Ma C, Zhang X, Chen H-S, Zhang H-F (2021) Soidp: predicting interlayer links in multiplex networks. IEEE Trans Comput Soc Syst. https:\/\/doi.org\/10.1109\/TCSS.2021.3068468","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"1052_CR18","doi-asserted-by":"crossref","unstructured":"Narayanan A, Shmatikov V (2009) De-anonymizing social networks. In: 30th IEEE symposium on security and privacy. IEEE, pp 173\u2013187","DOI":"10.1109\/SP.2009.22"},{"key":"1052_CR19","unstructured":"Yan Z, Liu L, Li X, Cheung W, Zhang Y, Liu Q, Wang G (2021) Towards improving embedding based models of social network alignment via pseudo anchors. IEEE Trans Knowl Data Eng"},{"key":"1052_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105598","volume":"194","author":"R Tang","year":"2020","unstructured":"Tang R, Jiang S, Chen X, Wang H, Wang W, Wang W (2020) Interlayer link prediction in multiplex social networks: an iterative degree penalty algorithm. Knowl-Based Syst 194:105598","journal-title":"Knowl-Based Syst"},{"key":"1052_CR21","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/j.ins.2022.02.023","volume":"593","author":"B Chen","year":"2022","unstructured":"Chen B, Chen X (2022) Mauil: multilevel attribute embedding for semisupervised user identity linkage. Inf Sci 593:527\u2013545","journal-title":"Inf Sci"},{"key":"1052_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112883","volume":"140","author":"HT Trung","year":"2020","unstructured":"Trung HT, Toan NT, Van Vinh T, Dat HT, Thang DC, Hung NQV, Sattar A (2020) A comparative study on network alignment techniques. Expert Syst Appl 140:112883","journal-title":"Expert Syst Appl"},{"key":"1052_CR23","doi-asserted-by":"crossref","unstructured":"Huynh TT, Duong CT, Nguyen TT, Van\u00a0Tong V, Sattar A, Yin H, Nguyen QVH (2021) Network alignment with holistic embeddings. IEEE Trans Knowl Data Eng 1\u201312","DOI":"10.1109\/TKDE.2021.3101840"},{"issue":"5","key":"1052_CR24","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1109\/TKDE.2018.2849727","volume":"31","author":"P Cui","year":"2018","unstructured":"Cui P, Wang X, Pei J, Zhu W (2018) A survey on network embedding. IEEE Trans Knowl Data Eng 31(5):833\u2013852","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"5","key":"1052_CR25","doi-asserted-by":"publisher","first-page":"1935","DOI":"10.1109\/TNNLS.2020.2995483","volume":"32","author":"X Shen","year":"2020","unstructured":"Shen X, Dai Q, Mao S, Chung F-L, Choi K-S (2020) Network together: node classification via cross-network deep network embedding. IEEE Trans Neural Netw Learn Syst 32(5):1935\u20131948","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"1052_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106817","volume":"217","author":"A Salamat","year":"2021","unstructured":"Salamat A, Luo X, Jafari A (2021) Heterographrec: a heterogeneous graph-based neural networks for social recommendations. Knowl-Based Syst 217:106817","journal-title":"Knowl-Based Syst"},{"key":"1052_CR27","doi-asserted-by":"publisher","first-page":"3957","DOI":"10.1109\/TMM.2020.3034540","volume":"23","author":"X Chen","year":"2020","unstructured":"Chen X, Song X, Cui S, Gan T, Cheng Z, Nie L (2020) User identity linkage across social media via attentive time-aware user modeling. IEEE Trans Multimed 23:3957\u20133967","journal-title":"IEEE Trans Multimed"},{"issue":"1","key":"1052_CR28","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s11280-020-00833-8","volume":"24","author":"X Li","year":"2021","unstructured":"Li X, Cao Y, Li Q, Shang Y, Li Y, Liu Y, Xu G (2021) Rlink: deep reinforcement learning for user identity linkage. World Wide Web 24(1):85\u2013103","journal-title":"World Wide Web"},{"issue":"8","key":"1052_CR29","doi-asserted-by":"publisher","first-page":"6184","DOI":"10.1109\/JIOT.2021.3110300","volume":"9","author":"F Song","year":"2021","unstructured":"Song F, Qin Z, Xue L, Zhang J, Lin X, Shen X (2021) Privacy-preserving keyword similarity search over encrypted spatial data in cloud computing. IEEE Internet Things J 9(8):6184\u20136198","journal-title":"IEEE Internet Things J"},{"key":"1052_CR30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3050517","author":"J Shen","year":"2021","unstructured":"Shen J, Yang H, Vijayakumar P, Kumar N (2021) A privacy-preserving and untraceable group data sharing scheme in cloud computing. IEEE Trans Dependable Secure Comput. https:\/\/doi.org\/10.1109\/TDSC.2021.3050517","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1052_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2022.128179","volume":"607","author":"X-J Zhang","year":"2022","unstructured":"Zhang X-J, Wang J, Ma X-J, Ma C, Kan J-Q, Zhang H-F (2022) Influence maximization in social networks with privacy protection. Phys A 607:128179","journal-title":"Phys A"},{"issue":"4","key":"1052_CR32","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevResearch.4.043076","volume":"4","author":"X Xia","year":"2022","unstructured":"Xia X, Su Y, L\u00fc L, Zhang X, Lai Y-C, Zhang H-F (2022) Machine learning prediction of network dynamics with privacy protection. Phys Rev Res 4(4):043076","journal-title":"Phys Rev Res"},{"issue":"11","key":"1052_CR33","first-page":"169","volume":"4","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Adleman L, Dertouzos ML et al (1978) On data banks and privacy homomorphisms. Found Secure Comput 4(11):169\u2013180","journal-title":"Found Secure Comput"},{"issue":"8","key":"1052_CR34","doi-asserted-by":"publisher","first-page":"3590","DOI":"10.1109\/TII.2017.2780885","volume":"14","author":"K Gai","year":"2017","unstructured":"Gai K, Qiu M (2017) Blend arithmetic operations on tensor-based fully homomorphic encryption over real numbers. IEEE Trans Ind Inf 14(8):3590\u20133598","journal-title":"IEEE Trans Ind Inf"},{"key":"1052_CR35","doi-asserted-by":"publisher","first-page":"3740","DOI":"10.1109\/TIFS.2021.3090959","volume":"16","author":"S Meftah","year":"2021","unstructured":"Meftah S, Tan BHM, Mun CF, Aung KMM, Veeravalli B, Chandrasekhar V (2021) Doren: toward efficient deep convolutional neural networks with fully homomorphic encryption. IEEE Trans Inf Forensics Secur 16:3740\u20133752","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1052_CR36","doi-asserted-by":"crossref","unstructured":"Munjal K, Bhatia R (2022) A systematic review of homomorphic encryption and its contributions in healthcare industry. Complex Intell Syst 1\u201328","DOI":"10.1007\/s40747-022-00756-z"},{"key":"1052_CR37","doi-asserted-by":"crossref","unstructured":"Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 223\u2013238","DOI":"10.1007\/3-540-48910-X_16"},{"key":"1052_CR38","doi-asserted-by":"crossref","unstructured":"Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st annual ACM symposium on theory of computing, pp 169\u2013178","DOI":"10.1145\/1536414.1536440"},{"key":"1052_CR39","unstructured":"Gilad-Bachrach R, Dowlin N, Laine K, Lauter K, Naehrig M, Wernsing J (2016) Cryptonets: applying neural networks to encrypted data with high throughput and accuracy. In: International conference on machine learning, PMLR, pp 201\u2013210"},{"key":"1052_CR40","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.ins.2020.03.041","volume":"526","author":"J Li","year":"2020","unstructured":"Li J, Kuang X, Lin S, Ma X, Tang Y (2020) Privacy preservation for machine learning training and classification based on homomorphic encryption schemes. Inf Sci 526:166\u2013179","journal-title":"Inf Sci"},{"issue":"6","key":"1052_CR41","doi-asserted-by":"publisher","first-page":"4049","DOI":"10.1109\/TII.2021.3085960","volume":"18","author":"B Jia","year":"2021","unstructured":"Jia B, Zhang X, Liu J, Zhang Y, Huang K, Liang Y (2021) Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in iiot. IEEE Trans Ind Inf 18(6):4049\u20134058","journal-title":"IEEE Trans Ind Inf"},{"issue":"9","key":"1052_CR42","doi-asserted-by":"publisher","first-page":"3310","DOI":"10.1109\/JBHI.2021.3071270","volume":"25","author":"Y Lu","year":"2021","unstructured":"Lu Y, Tian Y, Zhou T, Zhu S, Li J (2021) Multicenter privacy-preserving cox analysis based on homomorphic encryption. IEEE J Biomed Health Inform 25(9):3310\u20133320","journal-title":"IEEE J Biomed Health Inform"},{"issue":"9","key":"1052_CR43","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/1810891.1810906","volume":"53","author":"J Rexford","year":"2010","unstructured":"Rexford J, Dovrolis C (2010) Future internet architecture: clean-slate versus evolutionary research. Commun ACM 53(9):36\u201340","journal-title":"Commun ACM"},{"issue":"5","key":"1052_CR44","doi-asserted-by":"publisher","first-page":"2357","DOI":"10.1109\/TAC.2020.3005920","volume":"66","author":"AB Alexandru","year":"2020","unstructured":"Alexandru AB, Gatsis K, Shoukry Y, Seshia SA, Tabuada P, Pappas GJ (2020) Cloud-based quadratic optimization with partially homomorphic encryption. IEEE Trans Autom Control 66(5):2357\u20132364","journal-title":"IEEE Trans Autom Control"},{"key":"1052_CR45","doi-asserted-by":"crossref","unstructured":"Boneh D, Goh E-J, Nissim K (2005) Evaluating 2-dnf formulas on ciphertexts. In: Theory of cryptography conference. Springer, pp 325\u2013341","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"1052_CR46","first-page":"78","volume":"47","author":"L Xiong","year":"2019","unstructured":"Xiong L, Dong D (2019) Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion. J Inf Secur Appl 47:78\u201385","journal-title":"J Inf Secur Appl"},{"key":"1052_CR47","doi-asserted-by":"crossref","unstructured":"Viand A, Jattke P, Hithnawi A (2021) Sok: fully homomorphic encryption compilers. In: IEEE symposium on security and privacy (SP). IEEE, pp 1092\u20131108","DOI":"10.1109\/SP40001.2021.00068"},{"key":"1052_CR48","doi-asserted-by":"crossref","unstructured":"Jager T (2012) The generic composite residuosity problem. In: Black-box models of computation in cryptology. Springer, pp 49\u201356","DOI":"10.1007\/978-3-8348-1990-1_5"},{"key":"1052_CR49","doi-asserted-by":"crossref","unstructured":"Zhang S, Tong H (2016) Final: fast attributed network alignment. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp 1345\u20131354","DOI":"10.1145\/2939672.2939766"},{"key":"1052_CR50","unstructured":"Man T, Shen H, Liu S, Jin X, Cheng X (2016) Predict anchor links across social networks via an embedding approach. In: Ijcai, vol\u00a016, pp 1823\u20131829"},{"issue":"9","key":"1052_CR51","doi-asserted-by":"publisher","first-page":"1680","DOI":"10.1109\/TKDE.2018.2866440","volume":"31","author":"S Zhang","year":"2018","unstructured":"Zhang S, Tong H (2018) Attributed network alignment: Problem definitions and fast solutions. IEEE Trans Knowl Data Eng 31(9):1680\u20131692","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1052_CR52","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139941907","volume-title":"Multilayer social networks","author":"ME Dickison","year":"2016","unstructured":"Dickison ME, Magnani M, Rossi L (2016) Multilayer social networks. Cambridge University Press, Cambridge"},{"key":"1052_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.108461","volume":"118","author":"A Amara","year":"2022","unstructured":"Amara A, Taieb MAH, Aouicha MB (2022) Cross-network representation learning for anchor users on multiplex heterogeneous social network. Appl Soft Comput 118:108461","journal-title":"Appl Soft Comput"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01052-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-023-01052-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01052-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T17:29:08Z","timestamp":1695403748000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-023-01052-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,18]]},"references-count":53,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["1052"],"URL":"https:\/\/doi.org\/10.1007\/s40747-023-01052-0","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,18]]},"assertion":[{"value":"19 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}