Author:
Perito Daniele,Castelluccia Claude,Kaafar Mohamed Ali,Manils Pere
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Scrapers dig deep for data on web,
http://online.wsj.com/article/SB1000142405274870335804575544381288117888.html
2. Lecture Notes in Computer Science;M. Balduzzi,2010
3. Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: Automated identity theft attacks on social networks. In: 18th International World Wide Web Conference, pp. 551–560 (2009)
4. Cohen, W.W., Ravikumar, P., Fienberg, S.E.: A comparison of string distance metrics for name-matching tasks. In: Proceeding of IJCAI 2003 Workshop on Information Integrtation, pp. 73–78 (August 2003)
5. Cover, T.M., Thomas, J.A.: Elements of information theory. Wiley-Interscience, New York (1991)
Cited by
146 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Disambiguating usernames across platforms: the GeekMAN approach;Social Network Analysis and Mining;2024-08-31
2. Network alignment based on multiple hypernetwork attributes;The European Physical Journal Special Topics;2024-03-14
3. Empowering Online Safety: A Machine Learning Approach to Cyberbullying Detection;2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT);2024-01-04
4. Against Credential Thief - A Modular Honeytoken Based Framework;Mechanisms and Machine Science;2024
5. PsyLink: User Identity Linkage via Psychological Characteristic Modeling;2023 IEEE 29th International Conference on Parallel and Distributed Systems (ICPADS);2023-12-17