1. Cavadenti, O., Codocedo, V., Boulicaut, J.F., Kaytoue, M.: When cyberathletes conceal their game: clustering confusion matrices to identify avatar aliases. In: International Conference on Data Science and Advanced Analytics (DSAA) (2015)
2. De Montjoye, Y.A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Nature Sci. Rep. 3(1376), 779–782 (2013)
3. Getoor, L., Machanavajjhala, A.: Entity resolution: theory, practice & open challenges. PVLDB 5(12), 2018–2019 (2012)
4. Hall, M.A., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. SIGKDD Explor. 11(1), 10–18 (2009). http://doi.acm.org/10.1145/1656274.1656278
5. ICDM Contest: Identify individual users across their digital devices. In: IEEE International Conference on data mining (2015)