{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:10:09Z","timestamp":1750205409774,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,24]],"date-time":"2019-02-24T00:00:00Z","timestamp":1550966400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,24]]},"DOI":"10.1145\/3316551.3316571","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"138-143","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Embedding Based Cross-network User Identity Association Technology"],"prefix":"10.1145","author":[{"given":"Qianyuan","family":"Miao","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Dingyang","family":"Duan","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Xiaobo","family":"Guo","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Xiang","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2019,2,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487648"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661829.2661985"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588559"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2747880"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732269.2732274"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2485222"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2893873.2893900"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI 2016","author":"Man Tong","year":"2016","unstructured":"Tong Man , Huawei Shen , Shenghua Liu , Xiaolong Jin , and Xueqi Cheng . 2016 . Predict anchor links across social networks via an embedding approach Aligning users across social networks using network embedding . In Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI 2016 ). New York City, New York, USA , 2016: 1823--1829 Tong Man, Huawei Shen, Shenghua Liu, Xiaolong Jin, and Xueqi Cheng. 2016. Predict anchor links across social networks via an embedding approach Aligning users across social networks using network embedding. In Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI 2016). New York City, New York, USA, 2016: 1823--1829"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI 2016","author":"Liu Li","year":"2016","unstructured":"Li Liu , William K. Cheung , Xin Li , and Lejian Liao . 2016 . Aligning users across social networks using network embedding . In Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI 2016 ). New York City, New York, USA , 2016: 1774--1780 Li Liu, WilliamK.Cheung, Xin Li, and Lejian Liao. 2016. Aligning users across social networks using network embedding. In Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI 2016). New York City, New York, USA, 2016: 1774--1780"},{"key":"e_1_3_2_1_11_1","first-page":"3111","article-title":"Distributed representations of words and phrases and their compositionality. In Proceedings of NIPS. South Lake Tahoe","volume":"2013","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Ilya Sutskever , Kai Chen , Gregory S. Corrado , and Jeffrey Dean . 2013 . Distributed representations of words and phrases and their compositionality. In Proceedings of NIPS. South Lake Tahoe , Nevada US: NIPS , 2013 : 3111 -- 3119 Tomas Mikolov, Ilya Sutskever, Kai Chen, Gregory S. Corrado, and Jeffrey Dean. 2013. Distributed representations of words and phrases and their compositionality. In Proceedings of NIPS. South Lake Tahoe, Nevada US: NIPS, 2013:3111--3119","journal-title":"Nevada US: NIPS"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"}],"event":{"name":"ICDSP 2019: 2019 3rd International Conference on Digital Signal Processing","acronym":"ICDSP 2019","location":"Jeju Island Republic of Korea"},"container-title":["Proceedings of the 2019 3rd International Conference on Digital Signal Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316551.3316571","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316551.3316571","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:16Z","timestamp":1750204396000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316551.3316571"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,24]]},"references-count":12,"alternative-id":["10.1145\/3316551.3316571","10.1145\/3316551"],"URL":"https:\/\/doi.org\/10.1145\/3316551.3316571","relation":{},"subject":[],"published":{"date-parts":[[2019,2,24]]},"assertion":[{"value":"2019-02-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}