{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T12:40:37Z","timestamp":1752669637257,"version":"3.37.3"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,3,20]],"date-time":"2021-03-20T00:00:00Z","timestamp":1616198400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,3,20]],"date-time":"2021-03-20T00:00:00Z","timestamp":1616198400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,3,20]],"date-time":"2021-03-20T00:00:00Z","timestamp":1616198400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,3,20]]},"DOI":"10.1109\/iccae51876.2021.9426147","type":"proceedings-article","created":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T22:47:11Z","timestamp":1620686831000},"page":"36-42","source":"Crossref","is-referenced-by-count":5,"title":["User Naming Conventions Mapping Learning for Social Network Alignment"],"prefix":"10.1109","author":[{"given":"Zhao","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Liu","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Guo","family":"Xiaoyu","sequence":"additional","affiliation":[]},{"given":"Sun","family":"Xian","sequence":"additional","affiliation":[]},{"given":"Wang","family":"Sen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783268"},{"key":"ref11","first-page":"2374","article-title":"Cross-social network user identification method based on information entropy [J]","volume":"37","author":"zheng","year":"2017","journal-title":"Computer Applications"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487648"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3051146"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-018-0571-4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433457"},{"key":"ref16","first-page":"1","article-title":"Support Vector Machine[J]","volume":"1","author":"ukil","year":"2002","journal-title":"Computer Science"},{"key":"ref17","first-page":"2028","article-title":"Identification of user identity based on username features [J]","volume":"38","author":"liu","year":"2015","journal-title":"Chinese Journal of Computers"},{"key":"ref18","first-page":"1823","article-title":"Predict Anchor Links across Social Networks via an Embedding Approach[C]","author":"man","year":"2016","journal-title":"International Joint Conference on Artificial Intelligence"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486231"},{"journal-title":"Large-scale correlation of accounts across social networks TR-13-002[R]","year":"2013","author":"goga","key":"ref4"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/CC.2013.6723877","article-title":"User identification based on multiple attribute decision making in social networks [J]","volume":"10","author":"ye","year":"2013","journal-title":"China Communications"},{"key":"ref6","first-page":"1065","article-title":"Studying User Footprints in Different Online Social Networks[C]","author":"malhotra","year":"2013","journal-title":"IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining"},{"key":"ref5","first-page":"660","article-title":"A survey of decision tree classifier methodology[J]","volume":"21","author":"landgrebe","year":"2002","journal-title":"IEEE Transactions on Systems Man & Cybernetics"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"377","DOI":"10.14778\/2732269.2732274","article-title":"An efficient algorithm for social networks[J]","volume":"7","author":"korula","year":"2014","journal-title":"Proceedings of the VLDB Endowment"},{"journal-title":"Uni Mi B Entity Linking in Tweets using Jaro-Winkler Distance Popularity and Coherence[C]\/\/ WWW","year":"2016","author":"caliano","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/NDT.2009.5272173"},{"year":"2019","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2485222"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-55304-3_32"},{"key":"ref22","article-title":"Research on Flame Detection Algorithm Based on Deep Learning [D]","author":"gangcheng","year":"2019","journal-title":"Xidian University"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1109\/72.977323","article-title":"A General Backpropagation Algorithm for Feedforward Neural Networks Learning[J]","volume":"13","author":"yu","year":"2002","journal-title":"IEEE Transactions on Neural Networks"},{"key":"ref24","first-page":"522","article-title":"Identifying Users Across Social Tagging Systems[C]","author":"iofciu","year":"2011","journal-title":"Proceedings of the Fifth International Conference on Weblogs and Social Media"},{"key":"ref23","first-page":"421","article-title":"Stochastic Gradient Descent Tricks[J]","volume":"7700","author":"bottou","year":"2012","journal-title":"Neural Networks"}],"event":{"name":"2021 13th International Conference on Computer and Automation Engineering (ICCAE)","start":{"date-parts":[[2021,3,20]]},"location":"Melbourne, Australia","end":{"date-parts":[[2021,3,22]]}},"container-title":["2021 13th International Conference on Computer and Automation Engineering (ICCAE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9426060\/9426070\/09426147.pdf?arnumber=9426147","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:41:39Z","timestamp":1652197299000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9426147\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,20]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/iccae51876.2021.9426147","relation":{},"subject":[],"published":{"date-parts":[[2021,3,20]]}}}