{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T22:41:19Z","timestamp":1773528079489,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,6]],"date-time":"2020-07-06T00:00:00Z","timestamp":1593993600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CONNEXIONs","award":["786731"],"award-info":[{"award-number":["786731"]}]},{"name":"PREVISION","award":["833115"],"award-info":[{"award-number":["833115"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,6]]},"DOI":"10.1145\/3394231.3397920","type":"proceedings-article","created":{"date-parts":[[2020,6,23]],"date-time":"2020-06-23T20:24:04Z","timestamp":1592943844000},"page":"295-304","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["User Identity Linkage in Social Media Using Linguistic and Social Interaction Features"],"prefix":"10.1145","author":[{"given":"Despoina","family":"Chatzakou","sequence":"first","affiliation":[{"name":"Information Technologies Institute Centre for Research and Technology Hellas, Greece"}]},{"given":"Juan","family":"Soler-Company","sequence":"additional","affiliation":[{"name":"Pompeu Fabra University, Spain"}]},{"given":"Theodora","family":"Tsikrika","sequence":"additional","affiliation":[{"name":"Information Technologies Institute CERTH, Greece"}]},{"given":"Leo","family":"Wanner","sequence":"additional","affiliation":[{"name":"ICREA and University Pompeu Fabra, Spain"}]},{"given":"Stefanos","family":"Vrochidis","sequence":"additional","affiliation":[{"name":"Information Technologies Institute, Greece"}]},{"given":"Ioannis","family":"Kompatsiaris","sequence":"additional","affiliation":[{"name":"CERTH - ITI, Greece"}]}],"member":"320","published-online":{"date-parts":[[2020,7,6]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X13499331"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3054223"},{"key":"e_1_3_2_2_3_1","volume-title":"Proceedings of the conference on empirical methods in natural language processing. Association for Computational Linguistics, 1301\u20131309","author":"Burger D","year":"2011","unstructured":"John\u00a0 D Burger , John Henderson , George Kim , and Guido Zarrella . 2011 . Discriminating gender on Twitter . In Proceedings of the conference on empirical methods in natural language processing. Association for Computational Linguistics, 1301\u20131309 . John\u00a0D Burger, John Henderson, George Kim, and Guido Zarrella. 2011. Discriminating gender on Twitter. In Proceedings of the conference on empirical methods in natural language processing. Association for Computational Linguistics, 1301\u20131309."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091487"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3053890"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Maura Conway Moign Khawaja Suraj Lakhani Jeremy Reffin Andrew Robertson and David Weir. 2018. Disrupting Daesh: measuring takedown of online terrorist material and its impacts. Studies in Conflict & Terrorism(2018) 1\u201320.  Maura Conway Moign Khawaja Suraj Lakhani Jeremy Reffin Andrew Robertson and David Weir. 2018. Disrupting Daesh: measuring takedown of online terrorist material and its impacts. Studies in Conflict & Terrorism(2018) 1\u201320.","DOI":"10.1080\/1057610X.2018.1513984"},{"key":"e_1_3_2_2_7_1","first-page":"3","article-title":"Swarmcast: How jihadist networks maintain a persistent online presence","volume":"9","author":"Fisher Ali","year":"2015","unstructured":"Ali Fisher . 2015 . Swarmcast: How jihadist networks maintain a persistent online presence . Perspectives on Terrorism 9 , 3 (2015), 3 \u2013 20 . Ali Fisher. 2015. Swarmcast: How jihadist networks maintain a persistent online presence. Perspectives on Terrorism 9, 3 (2015), 3\u201320.","journal-title":"Perspectives on Terrorism"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326028"},{"key":"e_1_3_2_2_9_1","unstructured":"[\n  9\n  ]  Gephi.2019. https:\/\/gephi.org\/.  [9] Gephi.2019. https:\/\/gephi.org\/."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078897.3080534"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488428"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788601"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014073"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2500261"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13388-015-0022-z"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741674"},{"key":"e_1_3_2_2_17_1","volume-title":"Estimating classification error rate: Repeated cross-validation, repeated hold-out and bootstrap. Computational statistics & data analysis 53, 11","author":"Kim Ji-Hyun","year":"2009","unstructured":"Ji-Hyun Kim . 2009. Estimating classification error rate: Repeated cross-validation, repeated hold-out and bootstrap. Computational statistics & data analysis 53, 11 ( 2009 ), 3735\u20133745. Ji-Hyun Kim. 2009. Estimating classification error rate: Repeated cross-validation, repeated hold-out and bootstrap. Computational statistics & data analysis 53, 11 (2009), 3735\u20133745."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/1057610X.2014.974948"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052677"},{"key":"e_1_3_2_2_20_1","volume-title":"Proceedings of the 25th International Joint Conference on Artificial Intelligence. AAAI Press, 1774\u20131780","author":"Liu Li","year":"2016","unstructured":"Li Liu , William\u00a0 K Cheung , Xin Li , and Lejian Liao . 2016 . Aligning Users across Social Networks Using Network Embedding . In Proceedings of the 25th International Joint Conference on Artificial Intelligence. AAAI Press, 1774\u20131780 . Li Liu, William\u00a0K Cheung, Xin Li, and Lejian Liao. 2016. Aligning Users across Social Networks Using Network Embedding. In Proceedings of the 25th International Joint Conference on Artificial Intelligence. AAAI Press, 1774\u20131780."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588559"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.184"},{"key":"e_1_3_2_2_23_1","volume-title":"How Reddit\u2019s algorithm, governance, and culture support toxic technocultures","author":"Massanari Adrienne","year":"2017","unstructured":"Adrienne Massanari . 2017. # Gamergate and The Fappening : How Reddit\u2019s algorithm, governance, and culture support toxic technocultures . New Media & Society( 2017 ), 329\u2013346. Adrienne Massanari. 2017. #Gamergate and The Fappening: How Reddit\u2019s algorithm, governance, and culture support toxic technocultures. New Media & Society(2017), 329\u2013346."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.3115\/1596276.1596317"},{"key":"e_1_3_2_2_25_1","unstructured":"Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient Estimation of Word Representations in Vector Space. CoRR abs\/1301.3781(2013).  Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient Estimation of Word Representations in Vector Space. CoRR abs\/1301.3781(2013)."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Tomas Mikolov Martin Karafi\u00e1t Lukas Burget Jan Cernock\u1ef3 and Sanjeev Khudanpur. 2010. Recurrent neural network based language model.. In Interspeech Vol.\u00a02. 3.  Tomas Mikolov Martin Karafi\u00e1t Lukas Burget Jan Cernock\u1ef3 and Sanjeev Khudanpur. 2010. Recurrent neural network based language model.. In Interspeech Vol.\u00a02. 3.","DOI":"10.21437\/Interspeech.2010-343"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939849"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1870658.1870679"},{"key":"e_1_3_2_2_29_1","unstructured":"Shuyo Nakatani. 2010. Language Detection Library for Java. https:\/\/github.com\/shuyo\/language-detection  Shuyo Nakatani. 2010. Language Detection Library for Java. https:\/\/github.com\/shuyo\/language-detection"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/375360.375365"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.10.147"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326050"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3316496"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883002"},{"key":"e_1_3_2_2_36_1","volume-title":"Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics. ACL, 681\u2013687","author":"Soler-Company Juan","year":"2017","unstructured":"Juan Soler-Company and Leo Wanner . 2017 . On the relevance of syntactic and discourse features for author profiling and identification . In Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics. ACL, 681\u2013687 . Juan Soler-Company and Leo Wanner. 2017. On the relevance of syntactic and discourse features for author profiling and identification. In Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics. ACL, 681\u2013687."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.10.117"},{"key":"e_1_3_2_2_38_1","volume-title":"Proceedings of the Workshop on Language Analysis in Social Media. ACL, 59\u201368","author":"Solorio Thamar","year":"2013","unstructured":"Thamar Solorio , Ragib Hasan , and Mainul Mizan . 2013 . A case study of sockpuppet detection in wikipedia . In Proceedings of the Workshop on Language Analysis in Social Media. ACL, 59\u201368 . Thamar Solorio, Ragib Hasan, and Mainul Mizan. 2013. A case study of sockpuppet detection in wikipedia. In Proceedings of the Workshop on Language Analysis in Social Media. ACL, 59\u201368."},{"key":"e_1_3_2_2_39_1","volume-title":"Number of monthly active Twitter users worldwide from 1st quarter 2010 to 1st quarter","year":"2019","unstructured":"Statista. 2019. Number of monthly active Twitter users worldwide from 1st quarter 2010 to 1st quarter 2019 . goo.gl\/JLy8Ko. Statista. 2019. Number of monthly active Twitter users worldwide from 1st quarter 2010 to 1st quarter 2019. goo.gl\/JLy8Ko."},{"key":"e_1_3_2_2_40_1","unstructured":"[\n  40\n  ]  Theano.2019. http:\/\/deeplearning.net\/software\/theano\/.  [40] Theano.2019. http:\/\/deeplearning.net\/software\/theano\/."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2332820"},{"key":"e_1_3_2_2_42_1","unstructured":"Twitter Public Policy. 2018. Expanding and building #TwitterTransparency. http:\/\/bit.ly\/2SIHGNf.  Twitter Public Policy. 2018. Expanding and building #TwitterTransparency. http:\/\/bit.ly\/2SIHGNf."},{"key":"e_1_3_2_2_43_1","unstructured":"Queenie Wong. 2019. Facebook pulls down fake accounts from the UK and Romania. cnet.co\/2w81ZJd.  Queenie Wong. 2019. Facebook pulls down fake accounts from the UK and Romania. cnet.co\/2w81ZJd."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487648"}],"event":{"name":"WebSci '20: 12th ACM Conference on Web Science","location":"Southampton United Kingdom","acronym":"WebSci '20","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["12th ACM Conference on Web Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394231.3397920","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3394231.3397920","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:41Z","timestamp":1750197701000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394231.3397920"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,6]]},"references-count":44,"alternative-id":["10.1145\/3394231.3397920","10.1145\/3394231"],"URL":"https:\/\/doi.org\/10.1145\/3394231.3397920","relation":{},"subject":[],"published":{"date-parts":[[2020,7,6]]},"assertion":[{"value":"2020-07-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}