共 19 条
[1]
Ahmad W, 2017, 2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P708, DOI 10.1109/ICACCI.2017.8125925
[2]
Almishari Mishari, 2012, Computer Security - ESORICS 2012. Proceedings 17th European Symposium on Research in Computer Security, P307, DOI 10.1007/978-3-642-33167-1_18
[3]
[Anonymous], 2013, P 22 INT C WORLD WID, DOI DOI 10.1145/2488388.2488428
[4]
[Anonymous], 2003, Kdd workshop on data cleaning and object consolidation
[5]
[Anonymous], 2011, INICWSM 11
[6]
Bartunov S., 2012, 6 SNA KDD WORKSH
[7]
Goga Oana, 2015, P 21 ACM SIGKDD INT
[8]
Jain P, 2013, PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'13 COMPANION), P1259
[9]
Liu Siyuan, 2014, P 2014 ACM SIGMOD IN
[10]
Studying User Footprints in Different Online Social Networks
[J].
2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM),
2012,
:1065-1070