{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:14Z","timestamp":1750221314016,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T00:00:00Z","timestamp":1501459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,31]]},"DOI":"10.1145\/3110025.3110095","type":"proceedings-article","created":{"date-parts":[[2017,11,14]],"date-time":"2017-11-14T14:40:22Z","timestamp":1510670422000},"page":"1049-1055","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Content Driven Profile Matching across Online Social Networks"],"prefix":"10.1145","author":[{"given":"Robert","family":"Roedler","sequence":"first","affiliation":[{"name":"Universit\u00e4t der Bundeswehr M\u00fcnchen, Neubiberg"}]},{"given":"Dennis","family":"Kergl","sequence":"additional","affiliation":[{"name":"Universit\u00e4t der Bundeswehr M\u00fcnchen, Neubiberg"}]},{"given":"Gabi Dreo","family":"Rodosek","sequence":"additional","affiliation":[{"name":"Universit\u00e4t der Bundeswehr M\u00fcnchen, Neubiberg"}]}],"member":"320","published-online":{"date-parts":[[2017,7,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13470-8_4"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2011.6009562"},{"key":"e_1_3_2_1_3_1","volume-title":"De-anonymizing social networks. CS224W Course Project Writup","author":"Chen Danqi","year":"2012","unstructured":"Danqi Chen, Botao Hu, and Shuo Xie. 2012. De-anonymizing social networks. CS224W Course Project Writup (2012)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2659480.2659498"},{"key":"e_1_3_2_1_5_1","unstructured":"Instagram Engineering. [n. d.]. Sharding & IDs at Instagram. ([n. d.]). http:\/\/instagram-engineering.tumblr.com\/post\/10853187575\/sharding-ids-at-instagram"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488428"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788601"},{"key":"e_1_3_2_1_9_1","unstructured":"http:\/\/facebook.com\/sociallysorted. [n. d.]. Instagram to Twitter Shortcut: Easily Tweet Instagram Photos with IFTTT. ([n. d.]). http:\/\/sociallysorted.com.au\/instagram-to-twitter-shortcut\/"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488160"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2500261"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2500261"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2014.6921610"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588559"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/3192424.3192458"},{"key":"e_1_3_2_1_16_1","unstructured":"Jason Mander. [n. d.]. Internet users have average of 7 social accounts:. ([n. d.]). https:\/\/www.globalwebindex.net\/blog\/internet-users-have-average-of-7-social-accounts"},{"key":"e_1_3_2_1_17_1","volume-title":"Is the sample good enough? comparing data from twitter's streaming api with twitter's firehose. arXiv preprint arXiv:1306.5204","author":"Morstatter Fred","year":"2013","unstructured":"Fred Morstatter, J\u00fcrgen Pfeffer, Huan Liu, and Kathleen M Carley. 2013. Is the sample good enough? comparing data from twitter's streaming api with twitter's firehose. arXiv preprint arXiv:1306.5204 (2013)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2013.6723877"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2009.61"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.53"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2010.35"},{"key":"e_1_3_2_1_23_1","volume-title":"Bot or Not? Deciphering Time Maps for Tweet Interarrivals. arXiv preprint arXiv:1605.06555","author":"Radziwill Nicole M","year":"2016","unstructured":"Nicole M Radziwill and Morgan C Benton. 2016. Bot or Not? Deciphering Time Maps for Tweet Interarrivals. arXiv preprint arXiv:1605.06555 (2016)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27400-3_37"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661829.2661985"},{"key":"e_1_3_2_1_26_1","volume-title":"Performance Evaluation of Computer and Telecommunication Systems (SPECTS), 2013 International Symposium on. IEEE, 64--70","author":"Soltani Reza","year":"2013","unstructured":"Reza Soltani and Abdolreza Abhari. 2013. Identity matching in social media platforms. In Performance Evaluation of Computer and Telecommunication Systems (SPECTS), 2013 International Symposium on. IEEE, 64--70."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/NDT.2009.5272173"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Reza Zafarani and Huan Liu. 2009. Connecting Corresponding Identities across Communities.. In ICWSM. Citeseer.","DOI":"10.1609\/icwsm.v3i1.13993"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19260-9_11"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.114"}],"event":{"name":"ASONAM '17: Advances in Social Networks Analysis and Mining 2017","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","IEEE CS"],"location":"Sydney Australia","acronym":"ASONAM '17"},"container-title":["Proceedings of the 2017 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2017"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3110025.3110095","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3110025.3110095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:42Z","timestamp":1750212822000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3110025.3110095"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,31]]},"references-count":29,"alternative-id":["10.1145\/3110025.3110095","10.1145\/3110025"],"URL":"https:\/\/doi.org\/10.1145\/3110025.3110095","relation":{},"subject":[],"published":{"date-parts":[[2017,7,31]]},"assertion":[{"value":"2017-07-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}