{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:35:58Z","timestamp":1730223358980,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1109\/globecom54140.2023.10436990","type":"proceedings-article","created":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T19:45:36Z","timestamp":1708976736000},"page":"6030-6036","source":"Crossref","is-referenced-by-count":0,"title":["Anchor Link Prediction via Network Structural Role for Privacy Leakage in Edge Computing"],"prefix":"10.1109","author":[{"given":"Huanran","family":"Wang","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Harbin Engineering University,Harbin,China"}]},{"given":"Wu","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Harbin Engineering University,Harbin,China"}]},{"given":"Jiguang","family":"Lv","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Harbin Engineering University,Harbin,China"}]},{"given":"Hanbo","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Harbin Engineering University,Harbin,China"}]},{"given":"Jingwen","family":"Tan","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Harbin Engineering University,Harbin,China"}]},{"given":"Dapeng","family":"Man","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Harbin Engineering University,Harbin,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1016\/j.future.2018.04.089","article-title":"Content-based multi-source encrypted image retrieval in clouds with privacy preservation","volume":"109","author":"Shen","year":"2020","journal-title":"Future Generation Computer Systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1600304WC"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2841047"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2692307"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.071278"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108671"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6766089"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2753244"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7842384"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486231"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.319"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-020-00833-8"},{"key":"ref13","first-page":"1823","article-title":"Predict anchor links across social networks via an embedding approach","volume":"16","author":"Man","year":"2016","journal-title":"Ijcai"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313499"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939849"},{"key":"ref16","first-page":"1774","article-title":"Aligning users across social networks using network embedding","author":"Liu","year":"2016","journal-title":"Ijcai"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322311"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2019.00123"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2695801"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1198\/016214502388618906"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339723"},{"key":"ref23","article-title":"Neural word embedding as implicit matrix factorization","volume":"27","author":"Levy","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806512"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71050-9"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783268"}],"event":{"name":"GLOBECOM 2023 - 2023 IEEE Global Communications Conference","start":{"date-parts":[[2023,12,4]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2023,12,8]]}},"container-title":["GLOBECOM 2023 - 2023 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10436708\/10436716\/10436990.pdf?arnumber=10436990","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:58:02Z","timestamp":1709254682000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10436990\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/globecom54140.2023.10436990","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]}}}