{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:12:06Z","timestamp":1775913126868,"version":"3.50.1"},"reference-count":78,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tkde.2022.3197985","type":"journal-article","created":{"date-parts":[[2022,8,10]],"date-time":"2022-08-10T19:31:49Z","timestamp":1660159909000},"page":"1-18","source":"Crossref","is-referenced-by-count":11,"title":["When Behavior Analysis Meets Social Network Alignment"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3242-150X","authenticated-orcid":false,"given":"Zhongbao","family":"Zhang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1234-0515","authenticated-orcid":false,"given":"Fuxin","family":"Ren","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2111-7617","authenticated-orcid":false,"given":"Jiawei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of California, Davis, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4266-7527","authenticated-orcid":false,"given":"Sen","family":"Su","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China"}]},{"given":"Yang","family":"Yan","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China"}]},{"given":"Qian","family":"Wei","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4562-2279","authenticated-orcid":false,"given":"Li","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Control and Computer Engineering, North China Electric Power University, China"}]},{"given":"Guozhen","family":"Zhu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China"}]},{"given":"Congying","family":"Guo","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488428"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3018661.3018689"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/312"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.174"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788627"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00182"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788601"},{"key":"ref58","first-page":"298","article-title":"Learning the consistent behavior of common users for target node prediction across social networks","author":"wu","year":"2014","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3350875"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16567"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3109859.3109877"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313430"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482418"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380077"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639725"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"ref19","first-page":"3459","article-title":"Why we go where we go: Profiling user decisions on choosing POIs","author":"hu","year":"2021","journal-title":"Proc Int Joint Conf Artif Intell"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00423"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/NDT.2009.5272173"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00660"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3358120"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883002"},{"key":"ref48","first-page":"1224","article-title":"DNA: Dynamic social network alignment","author":"sun","year":"2019","journal-title":"Proc IEEE Int Conf Big Data"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/537"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/200"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22263-4_1"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00521"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331230"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v28i1.8720"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313499"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"ref9","first-page":"1","article-title":"Reducing overfitting in deep networks by decorrelating representations","author":"cogswell","year":"2016","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403201"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3272032"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/298"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2018.00101"},{"key":"ref40","first-page":"1","article-title":"Exploring generalization in deep learning","author":"neyshabur","year":"2017","journal-title":"Proc 31st Int Conf Neural Inf Process Syst"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.184"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588559"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/504"},{"key":"ref37","first-page":"1823","article-title":"Predict anchor links across social networks via an embedding approach","author":"man","year":"2016","journal-title":"Proc Int Joint Conf Artif Intell"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/343"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482310"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737542"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3350950"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486231"},{"key":"ref33","first-page":"1774","article-title":"Aligning users across social networks using network embedding","author":"liu","year":"2016","journal-title":"Proc Int Joint Conf Artif Intell"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449823"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433457"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159671"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46128-1_29"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3097997"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939849"},{"key":"ref38","first-page":"1","article-title":"Regularizing and optimizing LSTM language models","author":"merity","year":"2018","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741656"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2929786"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.12014"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972825.64"},{"key":"ref24","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783268"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14778\/2794367.2794371"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313484"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14778\/2732269.2732274"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505531"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.02.008"},{"key":"ref20","first-page":"522","article-title":"Identifying users across social tagging systems","author":"iofciu","year":"2011","journal-title":"Proc Int AAAI Conf Weblogs Social Media"},{"key":"ref64","first-page":"2125","article-title":"Integrated anchor and social link predictions across social networks","author":"zhang","year":"2015","journal-title":"Proc Int Joint Conf Artif Intell"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.144"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357990"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974010.15"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2432811"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.70"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.3301996"},{"key":"ref27","first-page":"1188","article-title":"Distributed representations of sentences and documents","author":"le","year":"2014","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1022"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401156"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271705"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487648"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/4358933\/09854153.pdf?arnumber=9854153","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,6]],"date-time":"2023-06-06T18:09:21Z","timestamp":1686074961000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9854153\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":78,"URL":"https:\/\/doi.org\/10.1109\/tkde.2022.3197985","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}