{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:14:43Z","timestamp":1775229283060,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,10]],"date-time":"2015-08-10T00:00:00Z","timestamp":1439164800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,10]]},"DOI":"10.1145\/2783258.2788601","type":"proceedings-article","created":{"date-parts":[[2015,8,7]],"date-time":"2015-08-07T15:38:27Z","timestamp":1438961907000},"page":"1799-1808","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":93,"title":["On the Reliability of Profile Matching Across Large Online Social Networks"],"prefix":"10.1145","author":[{"given":"Oana","family":"Goga","sequence":"first","affiliation":[{"name":"MPI-SWS, Saarbrucken, Germany"}]},{"given":"Patrick","family":"Loiseau","sequence":"additional","affiliation":[{"name":"EURECOM, Sophia-Antipolis, France"}]},{"given":"Robin","family":"Sommer","sequence":"additional","affiliation":[{"name":"ICSI\/LBNL, Berkeley, USA"}]},{"given":"Renata","family":"Teixeira","sequence":"additional","affiliation":[{"name":"Inria, Paris, France"}]},{"given":"Krishna P.","family":"Gummadi","sequence":"additional","affiliation":[{"name":"MPI-SWS, Saarbrucken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2015,8,10]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Phash. http:\/\/www.phash.org.  Phash. http:\/\/www.phash.org."},{"key":"e_1_3_2_2_2_1","unstructured":"Spokeo. http:\/\/www.spokeo.com\/.  Spokeo. http:\/\/www.spokeo.com\/."},{"key":"e_1_3_2_2_3_1","unstructured":"Spokeo lawsuit. http:\/\/www.ftc.gov\/sites\/default\/files\/documents\/ cases\/2012\/06\/120612spokeocmpt.pdf.  Spokeo lawsuit. http:\/\/www.ftc.gov\/sites\/default\/files\/documents\/ cases\/2012\/06\/120612spokeocmpt.pdf."},{"key":"e_1_3_2_2_4_1","volume-title":"BlackHat","author":"Acquisti A.","year":"2011","unstructured":"A. Acquisti , R. Gross , and F. Stutzman . Faces of facebook: Privacy in the age of augmented reality . In BlackHat , 2011 . A. Acquisti, R. Gross, and F. Stutzman. Faces of facebook: Privacy in the age of augmented reality. In BlackHat, 2011."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30115-8_7"},{"key":"e_1_3_2_2_6_1","unstructured":"Get better results with less effort with Mechanical Turk Masters -- The Mechanical Turk blog. http:\/\/bit.ly\/112GmQI.  Get better results with less effort with Mechanical Turk Masters -- The Mechanical Turk blog. http:\/\/bit.ly\/112GmQI."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1894166.1894195"},{"key":"e_1_3_2_2_8_1","volume-title":"Entity Resolution, and Duplicate Detection. Data-centric systems and applications","author":"Christen P.","year":"2012","unstructured":"P. Christen . Data Matching - Concepts and Techniques for Record Linkage , Entity Resolution, and Duplicate Detection. Data-centric systems and applications . Springer , 2012 . P. Christen. Data Matching - Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection. Data-centric systems and applications. Springer, 2012."},{"key":"e_1_3_2_2_9_1","volume-title":"IIWeb","author":"Cohen W. W.","year":"2003","unstructured":"W. W. Cohen , P. Ravikumar , and S. E. Fienberg . A comparison of string distance metrics for name-matching tasks . In IIWeb , 2003 . W. W. Cohen, P. Ravikumar, and S. E. Fienberg. A comparison of string distance metrics for name-matching tasks. In IIWeb, 2003."},{"key":"e_1_3_2_2_11_1","volume-title":"WWW","author":"Goga O.","year":"2013","unstructured":"O. Goga , H. Lei , S. Parthasarathi , G. Friedland , R. Sommer , and R. Teixeira . Exploiting innocuous activity for correlating users across sites . In WWW , 2013 . O. Goga, H. Lei, S. Parthasarathi, G. Friedland, R. Sommer, and R. Teixeira. Exploiting innocuous activity for correlating users across sites. In WWW, 2013."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788601"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"e_1_3_2_2_14_1","volume-title":"ICWSM","author":"Iofciu T.","year":"2011","unstructured":"T. Iofciu , P. Fankhauser , F. Abel , and K. Bischoff . Identifying users across social tagging systems . In ICWSM , 2011 . T. Iofciu, P. Fankhauser, F. Abel, and K. Bischoff. Identifying users across social tagging systems. In ICWSM, 2011."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732269.2732274"},{"key":"e_1_3_2_2_16_1","volume-title":"LEET","author":"Kreibich C.","year":"2009","unstructured":"C. Kreibich , C. Kanich , K. Levchenko , B. Enright , G. M. Voelker , V. Paxson , and S. Savage . Spamcraft: An inside look at spam campaign orchestration . In LEET , 2009 . C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. Spamcraft: An inside look at spam campaign orchestration. In LEET, 2009."},{"key":"e_1_3_2_2_17_1","volume-title":"SNA-KDD","author":"Labitzke S.","year":"2011","unstructured":"S. Labitzke , I. Taranu , and H. Hartenstein . What your friends tell others about you: Low cost linkability of social network profiles . In SNA-KDD , 2011 . S. Labitzke, I. Taranu, and H. Hartenstein. What your friends tell others about you: Low cost linkability of social network profiles. In SNA-KDD, 2011."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433457"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588559"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661829.2662057"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.184"},{"key":"e_1_3_2_2_23_1","volume-title":"ESORICS","author":"Mishari M. A.","year":"2012","unstructured":"M. A. Mishari and G. Tsudik . Exploring linkability of user reviews . In ESORICS , 2012 . M. A. Mishari and G. Tsudik. Exploring linkability of user reviews. In ESORICS, 2012."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1651587.1651604"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"e_1_3_2_2_26_1","volume-title":"MDSW","author":"Northern C. T.","year":"2011","unstructured":"C. T. Northern and M. L. Nelson . An unsupervised approach to discovering and disambiguating social media profiles . In MDSW , 2011 . C. T. Northern and M. L. Nelson. An unsupervised approach to discovering and disambiguating social media profiles. In MDSW, 2011."},{"key":"e_1_3_2_2_27_1","volume-title":"WoLE","author":"Paridhi Jain P. K.","year":"2013","unstructured":"P. K. Paridhi Jain and A. Joshi . @i seek 'fb.me': Identifying users across multiple online social networks . In WoLE , 2013 . P. K. Paridhi Jain and A. Joshi. @i seek 'fb.me': Identifying users across multiple online social networks. In WoLE, 2013."},{"key":"e_1_3_2_2_28_1","unstructured":"Peekyou. http:\/\/www.peekyou.com\/.  Peekyou. http:\/\/www.peekyou.com\/."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.53"},{"key":"e_1_3_2_2_30_1","volume-title":"PETS","author":"Perito D.","year":"2011","unstructured":"D. Perito , C. Castelluccia , M. Ali K\u00e2afar , and P. Manils . How unique and traceable are usernames ? In PETS , 2011 . D. Perito, C. Castelluccia, M. Ali K\u00e2afar, and P. Manils. How unique and traceable are usernames? In PETS, 2011."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2010.35"},{"key":"e_1_3_2_2_32_1","unstructured":"R. Schmid. Salesforce service cloud -- featuring activision 2012. http:\/\/www.youtube.com\/watch?v=eT6iHEdnKQ4&feature=relmfu.  R. Schmid. Salesforce service cloud -- featuring activision 2012. http:\/\/www.youtube.com\/watch?v=eT6iHEdnKQ4&feature=relmfu."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661829.2661985"},{"key":"e_1_3_2_2_34_1","unstructured":"Social Intelligence Corp. http:\/\/www.socialintel.com\/.  Social Intelligence Corp. http:\/\/www.socialintel.com\/."},{"key":"e_1_3_2_2_35_1","volume-title":"Weaving technology and policy together to maintain confidentiality. Journal of Law, Medicine, and Ethics","author":"Sweeney L.","year":"1997","unstructured":"L. Sweeney . Weaving technology and policy together to maintain confidentiality. Journal of Law, Medicine, and Ethics , 1997 . L. Sweeney. Weaving technology and policy together to maintain confidentiality. Journal of Law, Medicine, and Ethics, 1997."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/NDT.2009.5272173"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1951365.1951428"},{"key":"e_1_3_2_2_38_1","volume-title":"ICWSM","author":"Zafarani R.","year":"2009","unstructured":"R. Zafarani and H. Liu . Connecting corresponding identities across communities . In ICWSM , 2009 . R. Zafarani and H. Liu. Connecting corresponding identities across communities. In ICWSM, 2009."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487648"}],"event":{"name":"KDD '15: The 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"Sydney NSW Australia","acronym":"KDD '15","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2783258.2788601","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2783258.2788601","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:14Z","timestamp":1750223234000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2783258.2788601"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,10]]},"references-count":38,"alternative-id":["10.1145\/2783258.2788601","10.1145\/2783258"],"URL":"https:\/\/doi.org\/10.1145\/2783258.2788601","relation":{},"subject":[],"published":{"date-parts":[[2015,8,10]]},"assertion":[{"value":"2015-08-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}