Disambiguating usernames across platforms: the GeekMAN approach

MR Masud, B Treves, M Faloutsos - 2024 - researchsquare.com
How can we identify malicious hackers participating in different online platforms using their
usernames only? Establishing the identity of a user across online platforms (eg security …

GeekMAN: Geek-oriented username matching across online networks

MR Masud, B Treves, M Faloutsos - Proceedings of the International …, 2023 - dl.acm.org
How can we identify malicious hackers participating in different online platforms using their
usernames only? Disambiguating users across online platforms (eg security forums, GitHub …

Deep dive on politician impersonating accounts in social media

K Zarei, R Farahbakhsh… - 2019 IEEE Symposium on …, 2019 - ieeexplore.ieee.org
There is an ever-growing number of users who duplicate the social media accounts of
celebrities or generally impersonate their presence on online social media as well as …

Your username can give you away: Matching turkish OSN users with usernames

Ö Çoban, A İnan, SA Ozel - International Journal of Information …, 2021 - dergipark.org.tr
User profile matching ie, user cross-referencing, user identification aims to find accounts that
belong to the same users over different websites or online social networks OSNs. Solving …

Username Squatting on Online Social Networks: A Study on X

A Lepipas, A Borovykh, S Demetriou - … of the 19th ACM Asia Conference …, 2024 - dl.acm.org
Adversaries have been targeting unique identifiers to launch typo-squatting, mobile app
squatting and even voice squatting attacks. Anecdotal evidence suggest that online social …

Aligning entity names with online aliases on twitter

K McKelvey, P Goutzounis, S da Cruz… - Proceedings of the …, 2017 - aclanthology.org
This paper presents new models that automatically align online aliases with their real entity
names. Many research applications rely on identifying entity names in text, but people often …

User identity linkage in social media using linguistic and social interaction features

D Chatzakou, J Soler-Company, T Tsikrika… - Proceedings of the 12th …, 2020 - dl.acm.org
Social media users often hold several accounts in their effort to multiply the spread of their
thoughts, ideas, and viewpoints. In the particular case of objectionable content, users tend to …

[PDF][PDF] K-Nearest Neighbor Algorithm to Detect Fake Identities Bots vs. Humans

V Dadhore, N Dubey - ijaem.net
Everyone's social life has gotten increasingly entwined with online social networks in the
current age. These websites have revolutionized the way we interact with one another …

On the dynamics of username changing behavior on twitter

P Jain, P Kumaraguru - Proceedings of the 3rd IKDD Conference on …, 2016 - dl.acm.org
People extensively use username to lookup users, their profiles and tweets that mention
them via Twitter search engine. Often, the searched username is outdated due to a recent …

Shedding light on the dark web: Authorship attribution in radical forums

L Ranaldi, F Ranaldi, F Fallucchi, FM Zanzotto - Information, 2022 - mdpi.com
Online users tend to hide their real identities by adopting different names on the Internet. On
Facebook or LinkedIn, for example, people usually appear with their real names. On other …