[PDF][PDF] User Identification Framework in Social Network Services Environment

B Bakariya, GS Thakur - Informatica Economica, 2014 - academia.edu
social networking services are growing day by day, First of all the term of social network is a
socialSocial networking is the grouping of individuals into specific groups, like small rural …

[PDF][PDF] Spammer Detection and Fake User Identification on Social Networks

UD DIN, M GUIZANI, M ZUAIR - 2019 - academia.edu
… been carried out on fake user identification from Twitter. Tingmin et … user is fake or not, a
two-hop social network for each user is focused to gather social information from social networks

Relationship identification across heterogeneous online social networks

J He, H Liu, RYK Lau, J He - Computational intelligence, 2017 - Wiley Online Library
… of a social connection between a pair of users in a social network platform. We do not …
the existence of social connection in this article but use it as an input for the identification of …

Incremental User Identification Across Social Networks Based on User-Guider Similarity Index

Y Kou, D Li, DR Shen, TZ Nie, G Yu - Journal of Computer Science and …, 2022 - Springer
… We study the problem of user identification across social networks. Given multiple social
networks, we aim to efficiently identify accounts that belong to the same user. For …

Role identification of social networkers

A Zygmunt - arXiv preprint arXiv:1507.02851, 2015 - arxiv.org
… One of the methods frequently used to analyze social networks is to extract the most …
social networking sites more extensive (comprehensive) user profile can be obtained. If the …

Resisting structural re-identification in anonymized social networks

M Hay, G Miklau, D Jensen, D Towsley, C Li - The VLDB Journal, 2010 - Springer
… about a published social network may be acquired through malicious actions by the
adversary or from public information sources. In addition, a participant in the network, with some …

De-anonymizing social networks

A Narayanan, V Shmatikov - 2009 30th IEEE symposium on …, 2009 - ieeexplore.ieee.org
… We also give a methodology for measuring the extent of privacy breaches in social networks
identification algorithm for anonymized social networks. The algorithm uses only the network

A multi-granularity representation learning framework for user identification across social networks

S Fu, G Wang, S Xia, L Liu - … , IJCRS 2019, Debrecen, Hungary, June 17 …, 2019 - Springer
user identities across social networks, we consider the multi-layer characteristics which
essentially exist in networks when looking into networkuser identification across social networks. …

Investigation of Cross-Social Network User Identification

T Lei, L Ji, S Liu - 2021 International Conference on Advanced …, 2022 - ieeexplore.ieee.org
… -social network user identification can help improve usersocial network user identification
technology that can identify … same user on different networks through user attributes, user

On privacy in spatio-temporal data: User identification using microblog data

E Seglem, A Züfle, J Stutzki, F Borutta… - Advances in Spatial and …, 2017 - Springer
… Considering networks, record linkage is widely understood as user linkage and is stated as
… or many networks [23]. An important area of user linkage is social networks where the user