{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:44:56Z","timestamp":1729647896463,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/icassp.2013.6638203","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T23:19:46Z","timestamp":1383088786000},"page":"2974-2978","source":"Crossref","is-referenced-by-count":1,"title":["Nowhere to hide: Exploring user-verification across Flickr accounts"],"prefix":"10.1109","author":[{"given":"Howard","family":"Lei","sequence":"first","affiliation":[]},{"given":"Jaeyoung","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Gerald","family":"Friedland","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2005.1415219"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2006.1661343"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5947437"},{"key":"14","first-page":"531","article-title":"Probabilistic linear discriminant analysis","author":"ioffe","year":"2006","journal-title":"Proceedings of ECCV"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288367"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2072508.2072513"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5946968"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.21437\/Interspeech.2009-385","article-title":"Support vector machines versus fast scoring in the low-dimensional total variability space for speaker verification","author":"dehak","year":"2009","journal-title":"Proceedings of Interspeech"},{"year":"0","key":"1"},{"key":"10","article-title":"Exploiting innocuous activity for correlating users across sites","author":"goga","year":"2013","journal-title":"The 23rd International World-Wide Web Conference (WWW 2013)"},{"key":"7","article-title":"Cybercasing the joint: On the privacy implications of geo-tagging","author":"friedland","year":"2010","journal-title":"Proc USENIX Workshop on Hot Topics in Security"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.5244\/C.20.92"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959999"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.459"},{"key":"8","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1007\/978-3-642-15512-3_22","article-title":"Abusing social networks for automated user profiling","volume":"6307","author":"balduzzi","year":"2010","journal-title":"Lecture Notes in Computer Science"}],"event":{"name":"ICASSP 2013 - 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2013,5,26]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2013,5,31]]}},"container-title":["2013 IEEE International Conference on Acoustics, Speech and Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6619549\/6637585\/06638203.pdf?arnumber=6638203","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,10]],"date-time":"2022-03-10T22:44:04Z","timestamp":1646952244000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6638203\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icassp.2013.6638203","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}