2013
DOI: 10.1007/978-3-319-03260-3_25
|View full text |Cite
|
Sign up to set email alerts
|

An Ontology-Based Technique for Online Profile Resolution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0
1

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(14 citation statements)
references
References 9 publications
0
13
0
1
Order By: Relevance
“…Apart from usernames and images, several researchers have focused on considering various profile attributes to improve the prediction performance [51,52,53,54,55,56]. A heuristic approach based on using the username, e-mail, and birth city attributes was proposed by Carmagnola et al [51].…”
Section: Feature-based Predictionmentioning
confidence: 99%
“…Apart from usernames and images, several researchers have focused on considering various profile attributes to improve the prediction performance [51,52,53,54,55,56]. A heuristic approach based on using the username, e-mail, and birth city attributes was proposed by Carmagnola et al [51].…”
Section: Feature-based Predictionmentioning
confidence: 99%
“…They use 27 features grouped into three types: name based features, general user info based features and social network topological based features. In [8] a weighted ontology-based user profile resolution technique is proposed for profile matching. Generally, these techniques assume that the two user profiles under investigation intentionally share attributes and features.…”
Section: Identifying and Matching User Profiles In Snsmentioning
confidence: 99%
“…Goga [10] linked accounts belonging to the same person identity, based solely on the profile information. Cortis [11] proposed a weighted ontology-based user profile resolution technique. Abel et al [12] aggregated user profiles and matched users across systems.…”
Section: Profile-based User Identificationmentioning
confidence: 99%
“…Many studies have addressed the user identification problem by examining public user profile attributes, including screen name, birthday, location, gender, profile photo, etc. [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17]. Since these attributes do not require exclusivity and are easily faked by users for different purposes (including malicious users), these schemes are quite fragile.…”
Section: Introductionmentioning
confidence: 99%