{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:06:16Z","timestamp":1761581176963,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/iccvw.2013.102","type":"proceedings-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T17:14:26Z","timestamp":1394212466000},"page":"748-754","source":"Crossref","is-referenced-by-count":4,"title":["Trusting Skype: Learning the Way People Chat for Fast User Recognition and Verification"],"prefix":"10.1109","author":[{"given":"Giorgio","family":"Roffo","sequence":"first","affiliation":[]},{"given":"Marco","family":"Cristani","sequence":"additional","affiliation":[]},{"given":"Loris","family":"Bazzani","sequence":"additional","affiliation":[]},{"given":"Ha Quang","family":"Minh","sequence":"additional","affiliation":[]},{"given":"Vittorio","family":"Murino","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"8","article-title":"Stylometry system-use cases and feasibility study","volume":"1","author":"shalhoub","year":"2010","journal-title":"Forensic Linguistics"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1002\/pa.1414"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.5769\/J200901002"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20316"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2013.6636623"},{"key":"15","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1145\/1231047.1231064","article-title":"Cybercrime, identity theft, and fraud: Practicing safe internet-Network security threats and vulnerabilities","author":"newman","year":"2006","journal-title":"InfoSecCD"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.03.006"},{"key":"14","first-page":"100","article-title":"A unifying framework for vector-valued manifold regularization and multiview learning","volume":"28","author":"minh","year":"2013","journal-title":"ICML"},{"journal-title":"Identity Theft Trends and Issues","year":"2010","author":"finklea","key":"11"},{"key":"12","first-page":"1","volume":"8","author":"harman","year":"2005","journal-title":"Liar Liar Internet Faking but Not Frequency of Use Affects Social Skills Self-esteem Social Anxiety and Aggression CB"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2008.11.007"},{"journal-title":"Security Engineering A Guide to Building Dependable Distributed Systems","year":"2001","author":"anderson","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21001"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222250103"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1344411.1344413"},{"key":"10","article-title":"Semi-supervised multifeature learning for person re-identification","author":"figueira","year":"2013","journal-title":"Proc IEEE Int Conf on Advanced Video and Signal based Surveillance (AVSS)"},{"key":"7","volume":"18","author":"corporation","year":"2013","journal-title":"Internet Security Threat Report 2013"},{"journal-title":"Guide to Biometrics","year":"2003","author":"bolle","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2011.11.016"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015424"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.013"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2393347.2396398"}],"event":{"name":"2013 IEEE International Conference on Computer Vision Workshops (ICCVW)","start":{"date-parts":[[2013,12,2]]},"location":"Sydney, Australia","end":{"date-parts":[[2013,12,8]]}},"container-title":["2013 IEEE International Conference on Computer Vision Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6751566\/6755862\/06755971.pdf?arnumber=6755971","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T05:15:09Z","timestamp":1498108509000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6755971\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iccvw.2013.102","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}