{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:16:41Z","timestamp":1774541801863,"version":"3.50.1"},"reference-count":32,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T00:00:00Z","timestamp":1729382400000},"content-version":"vor","delay-in-days":293,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.055560","type":"journal-article","created":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T08:26:33Z","timestamp":1726820793000},"page":"251-270","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient User Identity Linkage Based on Aligned Multimodal Features and Temporal Correlation"],"prefix":"10.32604","volume":"81","author":[{"given":"Jiaqi","family":"Gao","sequence":"first","affiliation":[]},{"given":"Kangfeng","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Xiujuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chunhua","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Wu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","unstructured":"X. Chen, F. Zhou, K. Zhang, G. Trajcevski, T. Zhong and F. Zhang, \u201cInformation diffusion prediction via recurrent cascades convolution,\u201d presented at the 2019 IEEE 35th Int. Conf. Data Eng. (ICDE), Macao, China, Apr. 8\u201311, 2019, pp. 770\u2013781.","DOI":"10.1109\/ICDE.2019.00074"},{"key":"ref2","series-title":"presented at the Proc. 42nd Int. ACM SIGIR (Special Interest Group Inf. Retr.) Conf. Res. Develop. Inf. Retr.","first-page":"515","article-title":"CROSS: Cross-platform recommendation for social E-commerce","author":"Lin","year":"Jul. 21\u201325, 2019"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1731","DOI":"10.1007\/s11280-021-00882-7","article-title":"EEUPL: Towards effective and efficient user profile linkage across multiple social platforms","volume":"24","author":"Wang","year":"Jun. 2021","journal-title":"World Wide Web"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1016\/j.neucom.2022.10.027","article-title":"AsyLink: User identity linkage from text to geo-location via sparse labeled data","volume":"515","author":"Shao","year":"Jan. 2023","journal-title":"Neurocomputing"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.3390\/e25010172","article-title":"A Semantic-enhancement-based social network user-alignment algorithm","volume":"25","author":"Huang","year":"Jan. 2023","journal-title":"Entropy"},{"key":"ref6","article-title":"User identity linkage across social networks with the enhancement of knowledge graph and time decay function","volume":"24","author":"Gao","year":"Nov. 2022","journal-title":"Entropy"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1016\/j.ins.2022.02.023","article-title":"MAUIL: Multilevel attribute embedding for semisupervised user identity linkage","volume":"593","author":"Chen","year":"May 2022","journal-title":"Inf. Sci."},{"key":"ref8","doi-asserted-by":"crossref","unstructured":"V. Sharma and C. Dyreson, \u201cLINKSOCIAL: Linking user profiles across multiple social media platforms,\u201d presented at the 2018 IEEE Int. Conf. Big Knowl. (ICBK), Singapore, Nov. 17\u201318, 2018, pp. 260\u2013267.","DOI":"10.1109\/ICBK.2018.00042"},{"key":"ref9","doi-asserted-by":"crossref","unstructured":"Y. Li, G. Gou, G. Xiong, Z. Li, and M. Cui, \u201cThe potential utility of image descriptions: User identity linkage across social networks based on MultiModal self-attention fusion,\u201d presented at the 2023 IEEE Int. Perform., Comput., Commun. Conf. (IPCCC), Anaheim, CA, USA, Nov. 17\u201319, 2023, pp. 265\u2013273.","DOI":"10.1109\/IPCCC59175.2023.10253842"},{"key":"ref10","first-page":"1","article-title":"MFLink: User identity linkage across online social networks via multimodal fusion and adversarial learning","author":"Li","year":"Mar. 2024","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"ref11","doi-asserted-by":"crossref","unstructured":"X. Chen, X. Song, G. Peng, S. Feng, and L. Nie, \u201cAdversarial-enhanced hybrid graph network for user identity linkage,\u201d presented at the Proc. 44th Int. ACM SIGIR Conf. Res. Develop. Inf. Retr., Jul. 11\u201315, 2021, pp. 1084\u20131093.","DOI":"10.1145\/3404835.3462946"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"3957","DOI":"10.1109\/TMM.2020.3034540","article-title":"User identity linkage across social media via attentive time-aware user modeling","volume":"23","author":"Chen","year":"Nov. 2020","journal-title":"IEEE Trans. Multimedia"},{"key":"ref13","unstructured":"J. Li, D. Li, C. Xiong, and S. Hoi, \u201c BLIP: Bootstrapping language-image pre-training for unified vision-language understanding and generation,\u201d presented at the Proc. 39th Int. Conf. Mach. Learn. (PMLR), Baltimore, MD, USA, Jul. 17\u201323, 2022, pp. 12888\u201312900."},{"key":"ref14","unstructured":"A. Radford et al., \u201cLearning transferable visual models from natural language supervision,\u201d presented at the Proc. 38th Int. Conf. Mach. Learn. (ICML), Jul. 18\u201324, 2021, pp. 8748\u20138763."},{"key":"ref15","doi-asserted-by":"crossref","unstructured":"J. Pennington, R. Socher, and C. D. Manning, \u201cGloVe: Global vectors for word representation,\u201d presented at the Proc. 2014 Conf. Empir. Methods Nat. Lang. Process. (EMNLP), Doha, Qatar, Oct. 25\u201329, 2014, pp. 1532\u20131543.","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref16","unstructured":"A. Bordes, N. Usunier, A. Garcia-Duran, J. Weston, and O. Yakhnenko, \u201cTranslating embeddings for modeling multi-relational data,\u201d presented at the Proc. 26th Int. Conf. Neural Inf. Proc. Syst., Lake Tahoe, NV, USA, Dec. 05\u201310, 2013, pp. 2787\u20132795."},{"key":"ref17","doi-asserted-by":"crossref","unstructured":"J. Zhang et al., \u201cMEgo2Vec: Embedding matched ego networks for UIL across social networks,\u201d presented at the Proc. 27th ACM Int. Conf. Inf. Knowl. Manag., Torino, Italy, Oct. 22\u201326, 2018, pp. 327\u2013336.","DOI":"10.1145\/3269206.3271705"},{"key":"ref18","doi-asserted-by":"crossref","unstructured":"M. Long et al., \u201c DegUIL: Degree-aware graph neural networks for long-tailed user identity linkage,\u201d presented at the Proc. Eur. Conf. Mach. Learn. Princ. Pract. Knowl. Discov. Databases, Turin, Italy, Sep. 18\u201322, 2023, pp. 122\u2013138.","DOI":"10.1007\/978-3-031-43427-3_8"},{"key":"ref19","unstructured":"J. Devlin, M. W. Chang, K. Lee, and K. Toutanova, \u201cBERT: Pre-training of deep bidirectional transformers for language understanding,\u201d 2018, arXiv:1810.04805."},{"key":"ref20","doi-asserted-by":"crossref","unstructured":"Y. Kim, \u201cConvolutional neural network for sentence classification,\u201d 2015, arXiv:1408.5882.","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref21","doi-asserted-by":"crossref","unstructured":"K. He, X. Zhang, S. Ren, and J. Sun, \u201cDeep residual learning for image recognition,\u201d presented at the Proc. 2016 IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), Las Vegas, NV, USA, Jun. 27\u201330, 2016, pp. 770\u2013778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref22","unstructured":"J. Chung et al., \u201cEmpirical evaluation of gated recurrent neural networks on sequence modeling,\u201d 2014, arXiv:1412.3555."},{"key":"ref23","doi-asserted-by":"crossref","unstructured":"B. Perozzi, R. Al-Rfou, and S. Skiena, \u201cDeepWalk: Online learning of social representations,\u201d presented at the Proc. 20th ACM SIGKDD Int. Conf. Knowl. Discov. Data Min., NY, USA, Aug. 24\u201327, 2014, pp. 701\u2013710.","DOI":"10.1145\/2623330.2623732"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long short-term memory","volume":"9","author":"Hochreiter","year":"Nov. 1997","journal-title":"Neural Comput."},{"key":"ref25","first-page":"993","article-title":"Latent dirichlet allocation","volume":"3","author":"Blei","year":"Mar. 2003","journal-title":"J. Mach. Learn. Res."},{"key":"ref26","doi-asserted-by":"crossref","unstructured":"Z. Liu, H. Mao, C. Y. Wu, C. Feichtenhofer, T. Darrell and S. Xie, \u201cA convnet for the 2020s,\u201d presented at the Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR), New Orleans, LA, USA, Jun. 18\u201324, 2022, pp. 11976\u201311986.","DOI":"10.1109\/CVPR52688.2022.01167"},{"key":"ref27","unstructured":"J. Li et al., \u201cBLIP-2: Bootstrapping language-image pre-training with frozen image encoders and large language models,\u201d presented at the Proc. Int. Conf. Mach. Learn. (ICML), Honolulu, HI, USA, Jul. 23\u201329, 2023, pp. 19730\u201319742."},{"key":"ref28","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1002\/asi.20316","article-title":"A framework for authorship identification of online messages: Writing style features and classification techniques","volume":"57","author":"Zheng","year":"Dec. 2005","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"ref29","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/BF00994018","article-title":"Support-vector networks","volume":"20","author":"Cortes","year":"Sep. 1995","journal-title":"Mach. Learn."},{"key":"ref30","doi-asserted-by":"crossref","first-page":"15443","DOI":"10.1109\/JIOT.2023.3264019","article-title":"MQTT-A: A broker-bridging P2P architecture to achieve anonymity in MQTT","volume":"10","author":"Buccafurri","year":"Sep. 2023","journal-title":"IEEE Internet Things J."},{"key":"ref31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3649886","article-title":"DeLink: An adversarial framework for defending against cross-site user identity linkage","volume":"18","author":"Zhang","year":"Mar. 2024","journal-title":"ACM Trans. Web"},{"key":"ref32","doi-asserted-by":"crossref","unstructured":"J. Shao et al., \u201cTOAK: A topology-oriented attack strategy for degrading user identity linkage in cross-network learning,\u201d presented at the Proc. 32nd ACM Int. Conf. Inf. Knowl. Manag. (CIKM), Birmingham, UK, Oct. 21\u201325, 2023, pp. 2208\u20132218.","DOI":"10.1145\/3583780.3615084"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-1\/TSP_CMC_55560\/TSP_CMC_55560.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T02:40:28Z","timestamp":1741315228000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n1\/58344"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":32,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.055560","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-13","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-15","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}