{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:35:38Z","timestamp":1729632938388,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,5]]},"DOI":"10.1109\/icassp.2011.5946968","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T15:50:30Z","timestamp":1310572230000},"page":"2404-2407","source":"Crossref","is-referenced-by-count":6,"title":["User verification: Matching the uploaders of videos across accounts"],"prefix":"10.1109","author":[{"given":"Howard","family":"Lei","sequence":"first","affiliation":[]},{"given":"Jaeyoung","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Janin","sequence":"additional","affiliation":[]},{"given":"Gerald","family":"Friedland","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5244\/C.20.92"},{"key":"ref3","article-title":"The 2010 ICSI Video Location Estimation System","author":"choi","year":"0","journal-title":"Proceedings of MediaEval 2010"},{"journal-title":"MediaEval Web Site","year":"0","key":"ref10"},{"journal-title":"HMM Toolkit (HTK)","year":"0","key":"ref6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"ref5","article-title":"Cybercasing the Joint: On the Privacy Implications of Geo-Tagging","author":"friedland","year":"0","journal-title":"Proceedings of the Fifth USENIX Workshop on Hot Topics in Security (HotSec 10)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959999"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.459"},{"journal-title":"Segmentation diarization and speech transcription surprise data unraveled","year":"2008","author":"huijbregts","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2005.1415219"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2006.881693"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1007\/978-3-642-15512-3_22","article-title":"Abusing Social Networks for Automated User Profiling","volume":"6307","author":"balduzzi","year":"2010","journal-title":"Lecture Notes in Computer Science"}],"event":{"name":"ICASSP 2011 - 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2011,5,22]]},"location":"Prague, Czech Republic","end":{"date-parts":[[2011,5,27]]}},"container-title":["2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5916934\/5946226\/05946968.pdf?arnumber=5946968","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T03:11:07Z","timestamp":1497928267000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5946968\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icassp.2011.5946968","relation":{},"subject":[],"published":{"date-parts":[[2011,5]]}}}