Modeling User Intrinsic Characteristic on Social Media for Identity Linkage
暂无分享,去创建一个
[1] Martin Vetterli,et al. Where You Are Is Who You Are: User Identification by Matching Statistics , 2015, IEEE Transactions on Information Forensics and Security.
[2] George Danezis,et al. GENERAL TERMS , 2003 .
[3] Sébastien Gambs,et al. De-anonymization attack on geolocated data , 2014, J. Comput. Syst. Sci..
[4] David Buttler,et al. Exploring Topic Coherence over Many Models and Many Topics , 2012, EMNLP.
[5] Jeffrey Dean,et al. Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.
[6] Jayakrishnan Unnikrishnan,et al. De-anonymizing private data by matching statistics , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[7] Jeffrey Dean,et al. Efficient Estimation of Word Representations in Vector Space , 2013, ICLR.
[8] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[9] Geoffrey E. Hinton,et al. Visualizing Data using t-SNE , 2008 .
[10] Yehuda Koren,et al. Matrix Factorization Techniques for Recommender Systems , 2009, Computer.
[11] Michael I. Jordan,et al. Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..
[12] Aapo Hyvärinen,et al. Noise-contrastive estimation: A new estimation principle for unnormalized statistical models , 2010, AISTATS.
[13] Hui Zang,et al. Anonymization of location data does not work: a large-scale measurement study , 2011, MobiCom.
[14] Elad Yom-Tov,et al. Serial Sharers: Detecting Split Identities of Web Authors , 2007, PAN.
[15] Bartunov Sergey,et al. Joint Link-Attribute User Identity Resolution in Online Social Networks , 2012 .
[16] Siyuan Liu,et al. Structured Learning from Heterogeneous Behavior for Social Identity Linkage , 2015, IEEE Transactions on Knowledge and Data Engineering.
[17] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[18] Elisa Bertino,et al. RahasNym: Pseudonymous Identity Management System for Protecting against Linkability , 2016, 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC).
[19] F. Maxwell Harper,et al. The MovieLens Datasets: History and Context , 2016, TIIS.
[20] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[21] Yizhou Sun,et al. Entity Embedding-Based Anomaly Detection for Heterogeneous Categorical Events , 2016, IJCAI.
[22] Mikhail Belkin,et al. Laplacian Eigenmaps and Spectral Techniques for Embedding and Clustering , 2001, NIPS.
[23] John Riedl,et al. The Tag Genome: Encoding Community Knowledge to Support Novel Interaction , 2012, TIIS.
[24] Elisa Bertino,et al. Efficient k -Anonymization Using Clustering Techniques , 2007, DASFAA.
[25] David A. Shamma,et al. Understanding Online Reviews: Funny, Cool or Useful? , 2015, CSCW.
[26] Lior Rokach,et al. Entity Matching in Online Social Networks , 2013, 2013 International Conference on Social Computing.
[27] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[28] Silvio Lattanzi,et al. An efficient reconciliation algorithm for social networks , 2013, Proc. VLDB Endow..