Connecting users across social media sites: a behavioral-modeling approach

R Zafarani, H Liu - Proceedings of the 19th ACM SIGKDD international …, 2013 - dl.acm.org
People use various social media for different purposes. The information on an individual site
is often incomplete. When sources of complementary information are integrated, a better …

Web 2.0 authorship: Issues of referencing and citation for academic integrity

K Gray, C Thompson, R Clerehan, J Sheard… - The Internet and Higher …, 2008 - Elsevier
Web 2.0 authoring forms such as wikis and blogs, social bookmarking, and audio and video
podcasting pose a challenge to academic authorship traditions. This paper reviews the …

Identifying users across social networks based on dynamic core interests

Y Nie, Y Jia, S Li, X Zhu, A Li, B Zhou - Neurocomputing, 2016 - Elsevier
With the development of social networks, most of users hold serval accounts in different
social network platforms. It is a very important task to match users' varying identities in the …

Students as Web 2.0 authors: Implications for assessment design and conduct

K Gray, C Thompson, J Sheard, R Clerehan… - Australasian Journal of …, 2010 - ajet.org.au
Students now have at their disposal a range of Web 2.0 authoring forms such as audio and
video podcasting, blogging, social bookmarking, social networking, virtual world activities …

User identification across social media

R Zafarani, L Tang, H Liu - … on Knowledge Discovery from Data (TKDD), 2015 - dl.acm.org
People use various social media sites for different purposes. The information on each site is
often partial. When sources of complementary information are integrated, a better profile of a …

Adversarial web search

C Castillo, BD Davison - Foundations and trends® in …, 2011 - nowpublishers.com
Web search engines have become indispensable tools for finding content. As the popularity
of the Web has increased, the efforts to exploit the Web for commercial, social, or political …

[PDF][PDF] Authorship analysis studies: A survey

SEM El, I Kassou - International Journal of Computer Applications, 2014 - researchgate.net
Authorship Analysis Studies: A Survey Page 1 International Journal of Computer Applications
(0975 – 8887) Volume 86 – No 12, January 2014 22 Authorship Analysis Studies: A Survey …

[PDF][PDF] Source code authorship attribution using n-grams

S Burrows, SMM Tahaghoghi - Proceedings of the twelth …, 2007 - adcs-conference.org
Plagiarism and copyright infringement are major problems in academic and corporate
environments. Existing solutions for detecting infringements in structured text such as source …

Structured learning from heterogeneous behavior for social identity linkage

S Liu, S Wang, F Zhu - IEEE Transactions on Knowledge and …, 2015 - ieeexplore.ieee.org
Social identity linkage across different social media platforms is of critical importance to
business intelligence by gaining from social data a deeper understanding and more …

Timeprints for identifying social media users with multiple aliases

F Johansson, L Kaati, A Shrestha - Security Informatics, 2015 - Springer
Many people who discuss sensitive or private issues on social media services are using
pseudonyms or aliases in order to not reveal their true identity, while using their usual, non …