{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:25:42Z","timestamp":1766298342589,"version":"3.41.0"},"reference-count":61,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2021,8,12]],"date-time":"2021-08-12T00:00:00Z","timestamp":1628726400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2018YFB1800804"],"award-info":[{"award-number":["2018YFB1800804"]}]},{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["U1936217, 61971267, 61972223, 61941117, and 61861136003"],"award-info":[{"award-number":["U1936217, 61971267, 61972223, 61941117, and 61861136003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Beijing Natural Science Foundation","award":["L182038"],"award-info":[{"award-number":["L182038"]}]},{"DOI":"10.13039\/501100017582","name":"Beijing National Research Center for Information Science and Technology","doi-asserted-by":"crossref","award":["20031887521"],"award-info":[{"award-number":["20031887521"]}],"id":[{"id":"10.13039\/501100017582","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Tsinghua University - Tencent Joint Laboratory for Internet Innovation Technology"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Intell. Syst. Technol."],"published-print":{"date-parts":[[2021,8,31]]},"abstract":"<jats:p>\n            Understanding the linkability of online user identifiers (IDs) is critical to both service providers (for business intelligence) and individual users (for assessing privacy risks). Existing methods are designed to match IDs across\n            <jats:italic>two services<\/jats:italic>\n            but face key challenges of matching multiple services in practice, particularly when users have multiple IDs per service. In this article, we propose a novel system to link IDs across multiple services by exploring the spatial-temporal features of user activities, of which the core idea is that the same user's online IDs are more likely to repeatedly appear at the same location. Specifically, we first utilize a\n            <jats:italic>contact graph<\/jats:italic>\n            to capture the \u201cco-location\u201d of all IDs across multiple services. Based on this graph, we propose a set-wise matching algorithm to discover candidate ID sets and use Bayesian inference to generate confidence scores for candidate ranking, which is proved to be optimal. We evaluate our system using two real-world ground-truth datasets from an Internet service provider (4 services, 815K IDs) and Twitter-Foursquare (2 services, 770 IDs). Extensive results show that our system significantly outperforms the state-of-the-art algorithms in accuracy (AUC is higher by 0.1\u20130.2), and it is highly robust against data quality, matching order, and number of services.\n          <\/jats:p>","DOI":"10.1145\/3439817","type":"journal-article","created":{"date-parts":[[2021,8,12]],"date-time":"2021-08-12T20:52:30Z","timestamp":1628801550000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Linking Multiple User Identities of Multiple Services from Massive Mobility Traces"],"prefix":"10.1145","volume":"12","author":[{"given":"Huandong","family":"Wang","sequence":"first","affiliation":[{"name":"Beijing National Research Center for Information Science and Technology (BNRist), Department of Electronic Engineering, Tsinghua University, China"}]},{"given":"Yong","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing National Research Center for Information Science and Technology (BNRist), Department of Electronic Engineering, Tsinghua University, China"}]},{"given":"Gang","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign (UIUC), USA"}]},{"given":"Depeng","family":"Jin","sequence":"additional","affiliation":[{"name":"Beijing National Research Center for Information Science and Technology (BNRist), Department of Electronic Engineering, Tsinghua University, China"}]}],"member":"320","published-online":{"date-parts":[[2021,8,12]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497446"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2010.05.003"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623361"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature04292"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132898"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020579"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456409"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3233\/FI-2018-1725"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313424"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.34"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3269248"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488428"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788601"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836111"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010920819831"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.25"},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS'15)","author":"Ji Shouling","key":"e_1_2_1_18_1","unstructured":"Shouling Ji , Weiqing Li , Neil Zhenqiang Gong , Prateek Mittal , and Raheem A. Beyah . 2015. On your social network de-anonymizablity: Quantification and large scale evaluation with seed knowledge .. In Proceedings of the Network and Distributed System Security Symposium (NDSS'15) . Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, and Raheem A. Beyah. 2015. On your social network de-anonymizablity: Quantification and large scale evaluation with seed knowledge.. In Proceedings of the Network and Distributed System Security Symposium (NDSS'15)."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660278"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177090"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732269.2732274"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2900423.2900614"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.3301996"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271675"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623657"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01193332"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588559"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep02923"},{"key":"e_1_2_1_30_1","volume-title":"CNNTOP: A CNN-based trajectory owner prediction method. arXiv preprint arXiv:2001.01185","author":"Luo Xucheng","year":"2020","unstructured":"Xucheng Luo , Shengyang Li , and Yuxiang Peng . 2020 . CNNTOP: A CNN-based trajectory owner prediction method. arXiv preprint arXiv:2001.01185 (2020). Xucheng Luo, Shengyang Li, and Yuxiang Peng. 2020. CNNTOP: A CNN-based trajectory owner prediction method. arXiv preprint arXiv:2001.01185 (2020)."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939849"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2380985"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2498131"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.10.147"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134004"},{"volume-title":"Social Media Update","year":"2016","key":"e_1_2_1_38_1","unstructured":"Pewinternet. [n.d.]. Social Media Update 2016 . http:\/\/www.pewinternet.org\/2016\/11\/11\/social-media-update-2016\/. Pewinternet. [n.d.]. Social Media Update 2016. http:\/\/www.pewinternet.org\/2016\/11\/11\/social-media-update-2016\/."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-011-0012-5"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.3565032"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883002"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660460.2660485"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3068777.3068781"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382262"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_2_1_47_1","unstructured":"Techcrunch. [n.d.]. How Many Twitter Accounts Do You Have?https:\/\/techcrunch.com\/2008\/01\/09\/how-many-twitter-accounts-do-you-have\/.  Techcrunch. [n.d.]. How Many Twitter Accounts Do You Have?https:\/\/techcrunch.com\/2008\/01\/09\/how-many-twitter-accounts-do-you-have\/."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.4801325"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644926"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132998"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2952774"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975321.22"},{"key":"e_1_2_1_53_1","volume-title":"Proceedings of the International Conference on Multimedia and Expo (ICME'13)","author":"Yan Ming","year":"2013","unstructured":"Ming Yan , Jitao Sang , Tao Mei , and Changsheng Xu . 2013 . Friend transfer: Cold-start friend recommendation with cross-platform transfer learning of social knowledge . In Proceedings of the International Conference on Multimedia and Expo (ICME'13) . Ming Yan, Jitao Sang, Tao Mei, and Changsheng Xu. 2013. Friend transfer: Cold-start friend recommendation with cross-platform transfer learning of social knowledge. In Proceedings of the International Conference on Multimedia and Expo (ICME'13)."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080769"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487648"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973440.108"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030630"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556195.2559894"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.114"},{"key":"e_1_2_1_60_1","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence (AAAI'18)","author":"Zhong Zexuan","year":"2018","unstructured":"Zexuan Zhong , Yong Cao , Mu Guo , and Zaiqing Nie . 2018 . CoLink: An unsupervised framework for user identity linkage . In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI'18) . Zexuan Zhong, Yong Cao, Mu Guo, and Zaiqing Nie. 2018. CoLink: An unsupervised framework for user identity linkage. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI'18)."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2784430"}],"container-title":["ACM Transactions on Intelligent Systems and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3439817","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3439817","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:53Z","timestamp":1750197713000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3439817"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,12]]},"references-count":61,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,8,31]]}},"alternative-id":["10.1145\/3439817"],"URL":"https:\/\/doi.org\/10.1145\/3439817","relation":{},"ISSN":["2157-6904","2157-6912"],"issn-type":[{"type":"print","value":"2157-6904"},{"type":"electronic","value":"2157-6912"}],"subject":[],"published":{"date-parts":[[2021,8,12]]},"assertion":[{"value":"2020-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}