Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2487575.2487648acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Connecting users across social media sites: a behavioral-modeling approach

Published: 11 August 2013 Publication History

Abstract

People use various social media for different purposes. The information on an individual site is often incomplete. When sources of complementary information are integrated, a better profile of a user can be built to improve online services such as verifying online information. To integrate these sources of information, it is necessary to identify individuals across social media sites. This paper aims to address the cross-media user identification problem. We introduce a methodology (MOBIUS) for finding a mapping among identities of individuals across social media sites. It consists of three key components: the first component identifies users' unique behavioral patterns that lead to information redundancies across sites; the second component constructs features that exploit information redundancies due to these behavioral patterns; and the third component employs machine learning for effective user identification. We formally define the cross-media user identification problem and show that MOBIUS is effective in identifying users across social media sites. This study paves the way for analysis and mining across social media sites, and facilitates the creation of novel online services across sites.

References

[1]
E. Amitay, S. Yogev, and E. Yom-Tov. Serial Sharers: Detecting Split Identities of Web Authors. In SIGIR PAN workshop, 2007.
[2]
L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore Art Thou R3579X?: Anonymized Social Networks, Hidden Patterns, and Structural Steganography. In WWW, pages 181--190. ACM, 2007.
[3]
L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In WWW, pages 551--560. ACM, 2009.
[4]
S.F. Chen and J. Goodman. An Empirical Study of Smoothing Techniques for Language Modeling. In ACL, pages 310--318, 1996.
[5]
R. Cilibrasi and P.M.B. Vitányi. Clustering by Compression. IEEE Transactions on Information Theory, 51(4):1523--1545, 2005.
[6]
T.M. Cover and J.A. Thomas. Elements of Information Theory. Wiley-interscience, 2006.
[7]
D. Cowan. An Introduction to Modern Literary Arabic, volume 240. Cambridge University Press, 1958.
[8]
O. De Vel, A. Anderson, M. Corney, and G. Mohay. Mining E-mail Content for Author Identification Forensics. ACM Sigmod Record, 30(4):55--64, 2001.
[9]
C. Doctorow. Preliminary Analysis of LinkedIn User Passwords. http://bit.ly/L5AHo3.
[10]
T. Dunning. Statistical Identification of Language. CR Lab, New Mexico State University, 1994.
[11]
C.A. Ferguson. Word Stress in Persian. Language, 33(2):123--135, 1957.
[12]
S. Kumar, R. Zafarani, and H. Liu. Understanding User Migration Patterns in Social Media. In AAAI, pages 1204--1209, 2011.
[13]
J. Lin. Divergence Measures based on the Shannon Entropy. IEEE Transaction on Information Theory, 37(1):145--151, 1991.
[14]
A. Narayanan and V. Shmatikov. Robust De-anonymization of Large Sparse Datasets. In IEEE SSP, pages 111--125, 2008.
[15]
Daniele Perito, Claude Castelluccia, Mohamed Kaafar, and Pere Manils. How unique and traceable are usernames? In PETS, pages 1--17, 2011.
[16]
N. Perlroth. Verifying Ages Online is a Daunting Task, Even for Experts. http://nyti.ms/Tf16Gs.
[17]
Wikipedia. Keyboard Layouts. http://bit.ly/kXso.
[18]
J. Yan, A. Blackwell, R. Anderson, and A. Grant. The Memorability and Security of Passwords-Some Empirical Results. U. of Cambridge Tech. Rep., 2000.
[19]
R. Zafarani and H. Liu. Connecting Corresponding Identities across Communities. In ICWSM, pages 354--357, 2009.
[20]
R. Zheng, J. Li, H. Chen, and Z. Huang. A Framework for Authorship Identification of Online Messages: Writing-style Features and Classification Techniques. JASIST, 57(3):378--393, 2006.

Cited By

View all
  • (2024)Social Media Users Only Have Two Clusters: A United States AnalysisJournal of Information Systems Applied Research10.62273/MFUN297217:3(43-55)Online publication date: 2024
  • (2024)Topic and knowledge-enhanced modeling for edge-enabled IoT user identity linkage across social networksJournal of Cloud Computing10.1186/s13677-024-00659-z13:1Online publication date: 21-May-2024
  • (2024)DeLink: An Adversarial Framework for Defending against Cross-site User Identity LinkageACM Transactions on the Web10.1145/364382818:2(1-34)Online publication date: 5-Feb-2024
  • Show More Cited By

Index Terms

  1. Connecting users across social media sites: a behavioral-modeling approach

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    KDD '13: Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
    August 2013
    1534 pages
    ISBN:9781450321747
    DOI:10.1145/2487575
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 August 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cross-media analysis
    2. mobius
    3. user identification

    Qualifiers

    • Research-article

    Conference

    KDD' 13
    Sponsor:

    Acceptance Rates

    KDD '13 Paper Acceptance Rate 125 of 726 submissions, 17%;
    Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)100
    • Downloads (Last 6 weeks)12
    Reflects downloads up to 04 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Social Media Users Only Have Two Clusters: A United States AnalysisJournal of Information Systems Applied Research10.62273/MFUN297217:3(43-55)Online publication date: 2024
    • (2024)Topic and knowledge-enhanced modeling for edge-enabled IoT user identity linkage across social networksJournal of Cloud Computing10.1186/s13677-024-00659-z13:1Online publication date: 21-May-2024
    • (2024)DeLink: An Adversarial Framework for Defending against Cross-site User Identity LinkageACM Transactions on the Web10.1145/364382818:2(1-34)Online publication date: 5-Feb-2024
    • (2024)Network alignment based on multiple hypernetwork attributesThe European Physical Journal Special Topics10.1140/epjs/s11734-024-01144-z233:4(843-861)Online publication date: 14-Mar-2024
    • (2024)Collaborative Cross-Network Embedding Framework for Network AlignmentIEEE Transactions on Network Science and Engineering10.1109/TNSE.2024.335547911:3(2989-3001)Online publication date: May-2024
    • (2024)A Trajectory-oriented Locality-sensitive Hashing Method for User IdentificationIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.3324427(1-14)Online publication date: 2024
    • (2024)MFLink: User Identity Linkage Across Online Social Networks via Multimodal Fusion and Adversarial LearningIEEE Transactions on Emerging Topics in Computational Intelligence10.1109/TETCI.2024.33723748:5(3716-3725)Online publication date: Oct-2024
    • (2024)Topic Partition of User-Generated Texts for User Identity Linkage Across Social Networks2024 International Joint Conference on Neural Networks (IJCNN)10.1109/IJCNN60899.2024.10651152(1-7)Online publication date: 30-Jun-2024
    • (2024)Behavioral authentication for security and safetySecurity and Safety10.1051/sands/20240033(2024003)Online publication date: 30-Apr-2024
    • (2024)Integrating social media dataExpert Systems with Applications: An International Journal10.1016/j.eswa.2023.122902243:COnline publication date: 25-Jun-2024
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media