{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:08Z","timestamp":1750221008807,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T00:00:00Z","timestamp":1568246400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,12]]},"DOI":"10.1145\/3342220.3344934","type":"proceedings-article","created":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T12:18:18Z","timestamp":1568722698000},"page":"293-294","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["User Identity Linking Across Social Networks by Jointly Modeling Heterogeneous Data with Deep Learning"],"prefix":"10.1145","author":[{"given":"Asmelash Teka","family":"Hadgu","sequence":"first","affiliation":[{"name":"Leibniz University Hannover, Hannover, Germany"}]},{"given":"Jayanth Kumar Reddy","family":"Gundam","sequence":"additional","affiliation":[{"name":"Leibniz University Hannover, Hannover, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488428"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2615569.2615676"},{"key":"e_1_3_2_1_3_1","unstructured":"Tereza Iofciu Peter Fankhauser Fabian Abel and Kerstin Bischoff. 2011. Identifying users across social tagging systems. In ICWSM .  Tereza Iofciu Peter Fankhauser Fabian Abel and Kerstin Bischoff. 2011. Identifying users across social tagging systems. In ICWSM ."},{"key":"e_1_3_2_1_4_1","first-page":"1823","article-title":"Predict Anchor Links across Social Networks via an Embedding Approach","volume":"16","author":"Man Tong","year":"2016","unstructured":"Tong Man , Huawei Shen , Shenghua Liu , Xiaolong Jin , and Xueqi Cheng . 2016 . Predict Anchor Links across Social Networks via an Embedding Approach .. In IJCAI , Vol. 16. 1823 -- 1829 . Tong Man, Huawei Shen, Shenghua Liu, Xiaolong Jin, and Xueqi Cheng. 2016. Predict Anchor Links across Social Networks via an Embedding Approach.. In IJCAI , Vol. 16. 1823--1829.","journal-title":"IJCAI"},{"key":"e_1_3_2_1_5_1","volume-title":"Mohamed Ali Kaafar, and Pere Manils","author":"Perito Daniele","year":"2011","unstructured":"Daniele Perito , Claude Castelluccia , Mohamed Ali Kaafar, and Pere Manils . 2011 . How unique and traceable are usernames? (2011), 1--17. Daniele Perito, Claude Castelluccia, Mohamed Ali Kaafar, and Pere Manils. 2011. How unique and traceable are usernames? (2011), 1--17."},{"key":"e_1_3_2_1_6_1","volume-title":"Elisabeth Lex, and Robert J\"aschke.","author":"Pujari Subhash Chandra","year":"2015","unstructured":"Subhash Chandra Pujari , Asmelash Teka Hadgu , Elisabeth Lex, and Robert J\"aschke. 2015 . Social activity versus academic activity: a case study of computer scientists on Twitter. In I-KNOW. ACM , 12. Subhash Chandra Pujari, Asmelash Teka Hadgu, Elisabeth Lex, and Robert J\"aschke. 2015. Social activity versus academic activity: a case study of computer scientists on Twitter. In I-KNOW. ACM, 12."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3068777.3068781"}],"event":{"name":"HT '19: 30th ACM Conference on Hypertext and Social Media","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Hof Germany","acronym":"HT '19"},"container-title":["Proceedings of the 30th ACM Conference on Hypertext and Social Media"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342220.3344934","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3342220.3344934","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:00Z","timestamp":1750206360000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342220.3344934"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,12]]},"references-count":7,"alternative-id":["10.1145\/3342220.3344934","10.1145\/3342220"],"URL":"https:\/\/doi.org\/10.1145\/3342220.3344934","relation":{},"subject":[],"published":{"date-parts":[[2019,9,12]]},"assertion":[{"value":"2019-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}