|
Almishari, M., & Tsudik, G. (2012). Exploring linkability of user reviews. Paper presented at the European Symposium on Research in Computer Security. Benevenuto, F., Magno, G., Rodrigues, T., & Almeida, V. (2010). Detecting spammers on twitter. Paper presented at the Collaboration, electronic messaging, anti-abuse and spam conference (CEAS). Benevenuto, F., Rodrigues, T., Almeida, V., Almeida, J., & Gonçalves, M. (2009). Detecting spammers and content promoters in online video social networks. Paper presented at the Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval. Blei, D. M., Ng, A. Y., & Jordan, M. I. J. J. o. m. L. r. (2003). Latent dirichlet allocation. 3(Jan), 993-1022. Bron, C., & Kerbosch, J. (1973). Algorithm 457: finding all cliques of an undirected graph. Communications of the ACM, 16(9), 575-577. Chawla, N. V., Bowyer, K. W., Hall, L. O., & Kegelmeyer, W. P. (2002). SMOTE: synthetic minority over-sampling technique. Journal of artificial intelligence research, 16, 321-357. Chen, L.-C. (2017). An effective LDA-based time topic model to improve blog search performance. 53(6), 1299-1319. Chu, Z., Gianvecchio, S., Wang, H., & Jajodia, S. (2010). Who is tweeting on Twitter: human, bot, or cyborg? Paper presented at the Proceedings of the 26th annual computer security applications conference. Chung, C. T., Lin, C. J., Lin, C. H., & Cheng, P. J. (2014). Person identification between different online social networks. Paper presented at the Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)-Volume 01. Geman, S., Geman, D. J. I. T. o. p. a., & intelligence, m. (1984). Stochastic relaxation, Gibbs distributions, and the Bayesian restoration of images. (6), 721-741. Goga, O., Lei, H., Parthasarathi, S. H. K., Friedland, G., Sommer, R., & Teixeira, R. (2013). Exploiting innocuous activity for correlating users across sites. Paper presented at the Proceedings of the 22nd international conference on World Wide Web. Irani, D., Webb, S., & Pu, C. (2010). Study of Static Classification of Social Spam Profiles in MySpace. Paper presented at the Icwsm. Jain, P., Kumaraguru, P., & Joshi, A. (2013). @ i seek'fb. me': Identifying users across multiple online social networks. Paper presented at the Proceedings of the 22nd international conference on World Wide Web. Jain, P., & Kumaraguru, P. J. a. p. a. (2012). Finding Nemo: searching and resolving identities of users across online social networks. Motoyama, M., & Varghese, G. (2009). I seek you: searching and matching individuals in social networks. Paper presented at the Proceedings of the eleventh international workshop on Web information and data management. Nie, Y., Jia, Y., Li, S., Zhu, X., Li, A., & Zhou, B. J. N. (2016). Identifying users across social networks based on dynamic core interests. 210, 107-115. Salton, G., & McGill, M. J. (1986). Introduction to modern information retrieval. Tan, S., Guan, Z., Cai, D., Qin, X., Bu, J., & Chen, C. (2014). Mapping Users across Networks by Manifold Alignment on Hypergraph. Paper presented at the AAAI. Vosecky, J., Hong, D., & Shen, V. Y. (2009). User identification across multiple social networks. Paper presented at the Networked Digital Technologies, 2009. NDT'09. First International Conference on. Xu, H., & Sun, Y. (2015). Identify user variants based on user behavior on social media. Paper presented at the Computing and Communications Conference (IPCCC), 2015 IEEE 34th International Performance. Zafarani, R., & Liu, H. (2013). Connecting users across social media sites: a behavioral-modeling approach. Paper presented at the Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining. Zhang, Y., Wang, L., Li, X., & Xiao, C. (2016). Social identity link across incomplete social information sources using anchor link expansion. Paper presented at the Pacific-Asia Conference on Knowledge Discovery and Data Mining. Zheng, R., Li, J., Chen, H., & Huang, Z. J. J. o. t. A. s. f. i. s. t. (2006). A framework for authorship identification of online messages: Writing‐style features and classification techniques. 57(3), 378-393. Zhou, X., Liang, X., Zhang, H., & Ma, Y. J. I. t. o. k. d. e. (2016). Cross-platform identification of anonymous identical users in multiple social media networks. 28(2), 411-424. 王力弘. (2015). 社群媒體新詞偵測系統 以 PTT 八卦版為例. 王力弘, 詠勝科技有限公司. mobile01. Retrieved from https://www.mobile01.com/ 維基百科編者. 三星寫手門事件. Retrieved from https://zh.wikipedia.org/w/index.php?title=%E4%B8%89%E6%98%9F%E5%AF%AB%E6%89%8B%E9%96%80%E4%BA%8B%E4%BB%B6&oldid=51055105
|