Connecting users across social media sites: a behavioral-modeling approach
R Zafarani, H Liu - Proceedings of the 19th ACM SIGKDD international …, 2013 - dl.acm.org
People use various social media for different purposes. The information on an individual site
is often incomplete. When sources of complementary information are integrated, a better …
is often incomplete. When sources of complementary information are integrated, a better …
Web 2.0 authorship: Issues of referencing and citation for academic integrity
Web 2.0 authoring forms such as wikis and blogs, social bookmarking, and audio and video
podcasting pose a challenge to academic authorship traditions. This paper reviews the …
podcasting pose a challenge to academic authorship traditions. This paper reviews the …
Identifying users across social networks based on dynamic core interests
With the development of social networks, most of users hold serval accounts in different
social network platforms. It is a very important task to match users' varying identities in the …
social network platforms. It is a very important task to match users' varying identities in the …
Students as Web 2.0 authors: Implications for assessment design and conduct
Students now have at their disposal a range of Web 2.0 authoring forms such as audio and
video podcasting, blogging, social bookmarking, social networking, virtual world activities …
video podcasting, blogging, social bookmarking, social networking, virtual world activities …
User identification across social media
People use various social media sites for different purposes. The information on each site is
often partial. When sources of complementary information are integrated, a better profile of a …
often partial. When sources of complementary information are integrated, a better profile of a …
Adversarial web search
C Castillo, BD Davison - Foundations and trends® in …, 2011 - nowpublishers.com
Web search engines have become indispensable tools for finding content. As the popularity
of the Web has increased, the efforts to exploit the Web for commercial, social, or political …
of the Web has increased, the efforts to exploit the Web for commercial, social, or political …
[PDF][PDF] Authorship analysis studies: A survey
SEM El, I Kassou - International Journal of Computer Applications, 2014 - researchgate.net
Authorship Analysis Studies: A Survey Page 1 International Journal of Computer Applications
(0975 – 8887) Volume 86 – No 12, January 2014 22 Authorship Analysis Studies: A Survey …
(0975 – 8887) Volume 86 – No 12, January 2014 22 Authorship Analysis Studies: A Survey …
[PDF][PDF] Source code authorship attribution using n-grams
S Burrows, SMM Tahaghoghi - Proceedings of the twelth …, 2007 - adcs-conference.org
Plagiarism and copyright infringement are major problems in academic and corporate
environments. Existing solutions for detecting infringements in structured text such as source …
environments. Existing solutions for detecting infringements in structured text such as source …
Structured learning from heterogeneous behavior for social identity linkage
Social identity linkage across different social media platforms is of critical importance to
business intelligence by gaining from social data a deeper understanding and more …
business intelligence by gaining from social data a deeper understanding and more …
Timeprints for identifying social media users with multiple aliases
Many people who discuss sensitive or private issues on social media services are using
pseudonyms or aliases in order to not reveal their true identity, while using their usual, non …
pseudonyms or aliases in order to not reveal their true identity, while using their usual, non …