{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:20:05Z","timestamp":1762867205700,"version":"3.37.3"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/access.2017.2744646","type":"journal-article","created":{"date-parts":[[2017,8,25]],"date-time":"2017-08-25T18:41:43Z","timestamp":1503686503000},"page":"17342-17353","source":"Crossref","is-referenced-by-count":49,"title":["User Identification Based on Display Names Across Online Social Networks"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3184-6805","authenticated-orcid":false,"given":"Yongjun","family":"Li","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"You","family":"Peng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wenli","family":"Ji","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhen","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Quanqing","family":"Xu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/375360.375365"},{"journal-title":"A Place to Share Knowledge and Better Understand the World","year":"2017","key":"ref32"},{"journal-title":"Pinterest","year":"2017","key":"ref31"},{"journal-title":"Google","year":"2017","key":"ref30"},{"journal-title":"Scikitlearn Machine Learning in Python","year":"2017","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2006.11.004"},{"key":"ref10","first-page":"522","article-title":"Identifying users across social tagging systems","author":"iofciu","year":"2011","journal-title":"Proc ICWSM"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806523"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NDT.2009.5272173"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1145\/2433396.2433457","article-title":"What&#x2019;s in a name: An unsupervised approach to link users across communities","author":"liu","year":"2013","journal-title":"Proc WSDM"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2556195.2559894"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113320"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783268"},{"journal-title":"Friendship prediction in composite social networks","year":"2014","author":"zhong","key":"ref17"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1609\/icwsm.v3i1.13993","article-title":"Connecting corresponding identities across communities","author":"zafarani","year":"2009","journal-title":"Proc ICWSM"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487648"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2013.128"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.02.047"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2342549.2342565"},{"journal-title":"Food Nightkife Entertainment","year":"2016","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519089"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2659480.2659498"},{"journal-title":"Data and Research on Digital for Business Professionals","year":"2017","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535786"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"journal-title":"Welcome to Twitter","year":"2016","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"},{"year":"2016","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2747880"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588559"},{"key":"ref21","first-page":"2028","article-title":"User identification across multiple websites based on username features","volume":"38","author":"liu","year":"2015","journal-title":"Chin J Comput"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623645"},{"key":"ref23","first-page":"2125","article-title":"Integrated anchor and social link predictions across social networks","author":"zhang","year":"2015","journal-title":"Proc IJCAI"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1609\/icwsm.v8i1.14514","article-title":"Of pins and tweets: Investigating how users behave across image- and text-based social networks","author":"ottoni","year":"2014","journal-title":"Proc ICWSM"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939849"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/7859429\/08016580.pdf?arnumber=8016580","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T07:49:30Z","timestamp":1692949770000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8016580\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/access.2017.2744646","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2017]]}}}