ID-CONNECT: Combining Network and Call Features to Link Different Identities of a User
暂无分享,去创建一个
[1] Virgílio A. F. Almeida,et al. Studying User Footprints in Different Online Social Networks , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
[2] Bartunov Sergey,et al. Joint Link-Attribute User Identity Resolution in Online Social Networks , 2012 .
[3] Richard Chbeir,et al. User Profile Matching in Social Networks , 2010, 2010 13th International Conference on Network-Based Information Systems.
[4] Vincent Y. Shen,et al. User identification across multiple social networks , 2009, 2009 First International Conference on Networked Digital Technologies.
[5] Muhammad Ajmal Azad,et al. Caller-REP: Detecting unwanted calls with caller social strength , 2013, Comput. Secur..
[6] Martin Szomszor,et al. Correlating user profiles from multiple folksonomies , 2008, Hypertext.
[7] Reza Zafarani,et al. Connecting users across social media sites: a behavioral-modeling approach , 2013, KDD.
[8] Peter Fankhauser,et al. Identifying Users Across Social Tagging Systems , 2011, ICWSM.
[9] Pável Calado,et al. Resolving user identities over social networks through supervised learning and rich similarity features , 2012, SAC '12.
[10] Mark Newman,et al. Networks: An Introduction , 2010 .
[11] Christos Faloutsos,et al. Mobile call graphs: beyond power-law and lognormal distributions , 2008, KDD.
[12] Ramayya Krishnan,et al. HYDRA: large-scale social identity linkage via heterogeneous behavior modeling , 2014, SIGMOD Conference.
[13] M. Newman. Random Graphs as Models of Networks , 2002, cond-mat/0202208.
[14] Muhammad Ajmal Azad,et al. Mitigating SPIT with Social Strength , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[15] Ling Huang,et al. Joint Link Prediction and Attribute Inference Using a Social-Attribute Network , 2014, TIST.
[16] Jennifer Widom,et al. SimRank: a measure of structural-context similarity , 2002, KDD.
[17] Xing Xie,et al. Effective Social Graph Deanonymization Based on Graph Structure and Descriptive Information , 2015, ACM Trans. Intell. Syst. Technol..
[18] Barbara Carminati,et al. User similarities on social networks , 2013, Social Network Analysis and Mining.
[19] Anupam Joshi,et al. @i seek 'fb.me': identifying users across multiple online social networks , 2013, WWW.
[20] Reza Zafarani,et al. Connecting Corresponding Identities across Communities , 2009, ICWSM.
[21] M. E. J. Newman,et al. Power laws, Pareto distributions and Zipf's law , 2005 .
[22] Angelos D. Keromytis,et al. A Comprehensive Survey of Voice over IP Security Research , 2012, IEEE Communications Surveys & Tutorials.
[23] Shyhtsun Felix Wu,et al. Analysis of user keyword similarity in online social networks , 2011, Social Network Analysis and Mining.
[24] M. Newman. Power laws, Pareto distributions and Zipf's law , 2005 .