{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T22:41:19Z","timestamp":1773528079484,"version":"3.50.1"},"reference-count":99,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771185"],"award-info":[{"award-number":["61771185"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772175"],"award-info":[{"award-number":["61772175"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61801171"],"award-info":[{"award-number":["61801171"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Research Project of Henan Province","award":["182102210044"],"award-info":[{"award-number":["182102210044"]}]},{"name":"Science and Technology Research Project of Henan Province","award":["182102210285"],"award-info":[{"award-number":["182102210285"]}]},{"name":"Key Scientific Research Program of Henan Higher Education","award":["18A510009"],"award-info":[{"award-number":["18A510009"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2018M632772"],"award-info":[{"award-number":["2018M632772"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2942840","type":"journal-article","created":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T01:09:01Z","timestamp":1569287341000},"page":"137472-137488","source":"Crossref","is-referenced-by-count":25,"title":["A Survey of Across Social Networks User Identification"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5132-3817","authenticated-orcid":false,"given":"Ling","family":"Xing","sequence":"first","affiliation":[{"name":"School of Information Engineering, Henan University of Science and Technology, Luoyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1123-6978","authenticated-orcid":false,"given":"Kaikai","family":"Deng","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Henan University of Science and Technology, Luoyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0209-4488","authenticated-orcid":false,"given":"Honghai","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Henan University of Science and Technology, Luoyang, China"}]},{"given":"Ping","family":"Xie","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Henan University of Science and Technology, Luoyang, China"}]},{"given":"H. Vicky","family":"Zhao","sequence":"additional","affiliation":[{"name":"Institute for Artificial Intelligence, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8896-352X","authenticated-orcid":false,"given":"Feifei","family":"Gao","sequence":"additional","affiliation":[{"name":"Institute for Artificial Intelligence, Tsinghua University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.336"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487648"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.9734\/ajrcos\/2018\/v1i424749"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3471"},{"key":"ref31","first-page":"352","article-title":"Expectation-propagation for the generative aspect model","author":"minka","year":"2002","journal-title":"Proc 18th Conf Uncertainty Artif Intell"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401957"},{"key":"ref37","first-page":"2028","article-title":"User identification across multiple Websites based on username features","volume":"38","author":"liu","year":"2015","journal-title":"Chin J Comput"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1145\/2433396.2433457","article-title":"What&#x2019;s in a name?: An unsupervised approach to link users across communities","author":"liu","year":"2013","journal-title":"Proc 6th ACM Int Conf Web Search Data Mining"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22263-4_1"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1609\/icwsm.v3i1.13993","article-title":"Connecting corresponding identities across communities","volume":"9","author":"zafarani","year":"2009","journal-title":"Proc Int AAAI Conf Weblogs Social Media"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3758\/BRM.41.3.647"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2014.6911095"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2012.6252767"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1810891.1810906"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1517480.1517484"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(03)00009-1"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6461195"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2012.6211961"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21331"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486022"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.68"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.03.089"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505531"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-012-0168-2"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1498-8_20"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS.2018.8691391"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2717921"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3051146"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-018-0571-4"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2744646"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2512938.2512945"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2747880"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2556613"},{"key":"ref5","first-page":"1","article-title":"Friend transfer: Cold-start friend recommendation with cross-platform transfer learning of social knowledge","author":"yan","year":"2013","journal-title":"Proc IEEE Int Conf Multimedia Expo"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623645"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1177\/0165551516673480"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487686"},{"key":"ref9","first-page":"90","article-title":"Information contagion: An empirical study of the spread of news on Digg and Twitter social networks","author":"lerman","year":"2010","journal-title":"Proc Int Conf Weblogs and Social Media"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2604383"},{"key":"ref45","article-title":"Large-scale correlation of accounts across social networks","author":"goga","year":"2013"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24261-3_14"},{"key":"ref47","first-page":"1060","article-title":"Identifying malicious Web links and their attack types in social networks","volume":"3","author":"veni","year":"2018","journal-title":"Int J Sci Res Comput Sci Eng Inf Technol"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2010.35"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1651587.1651604"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/CC.2013.6723877","article-title":"User identification based on multiple attribute decision making in social networks","volume":"10","author":"ye","year":"2013","journal-title":"China Commun"},{"key":"ref43","first-page":"522","article-title":"Identifying users across social tagging systems","author":"iofciu","year":"2011","journal-title":"Proc 5th Int AAAI Conf Weblogs Social Media"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2014.66"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2016.05.012"},{"key":"ref71","article-title":"Graph neural networks for user identity linkage","author":"zhang","year":"2019","journal-title":"arXiv 1903 02174"},{"key":"ref70","first-page":"1","article-title":"FBI: Friendship learning-based user identification in multiple social networks","author":"qu","year":"2019","journal-title":"Proc IEEE Global Commun Conf"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.10.147"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.541"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_18"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-0080-5_2"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27400-3_37"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488428"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.14778\/2732269.2732274"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783268"},{"key":"ref61","first-page":"159","article-title":"Mapping users across networks by manifold alignment on hypergraph","volume":"14","author":"tan","year":"2014","journal-title":"Proc 28th AAAI Conf Artif Intell"},{"key":"ref63","first-page":"1774","article-title":"Aligning users across social networks using network embedding","author":"liu","year":"2016","journal-title":"Proc 25th Int Joint Conf Artif Intell"},{"key":"ref64","first-page":"1823","article-title":"Predict anchor links across social networks via an embedding approach","author":"man","year":"2016","journal-title":"Proc 25th Int Joint Conf Artif Intell"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.114"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.3390\/e21030254"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2485222"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2784430"},{"key":"ref2","first-page":"1","article-title":"Cross social media recommendation","author":"liu","year":"2016","journal-title":"Proc AAAI Conf on Weblogs and Social Media"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-018-0499-9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3068777.3068781"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524578"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.33"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-010-0311-2"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497459"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242598"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.3390\/s19092102"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488160"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588559"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2818116"},{"key":"ref97","first-page":"1","article-title":"Joint link-attribute user identity resolution in online social networks","author":"bartunov","year":"2012","journal-title":"In Proceedings of 6th SNAKDD Workshop"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2240236.2240255"},{"key":"ref11","first-page":"111","article-title":"Robust de-anonymization of large sparse datasets","author":"narayanan","year":"2008","journal-title":"Proc IEEE Symp Secur Privacy"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2822839"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8974802"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1078"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3115\/1073483.1073499"},{"key":"ref16","first-page":"70","article-title":"UniMiB: Entity linking in tweets using Jaro-winkler distance","author":"caliano","year":"2016","journal-title":"Proc 6th Int Workshop Making Sense Microposts"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2018.00099"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/NDT.2009.5272173"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/6974809"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1108\/00220410410560573"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ITAIC.2019.8785470"},{"key":"ref19","first-page":"709","article-title":"Cosine similarity metric learning for face verification","author":"nguyen","year":"2010","journal-title":"Proc Asian Conf Comput Vis"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.01.041"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909089"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745460"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498306"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/2996913.2997017"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004868"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883002"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08846206.pdf?arnumber=8846206","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T17:48:33Z","timestamp":1695232113000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8846206\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":99,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2942840","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}