Skip to main content

Computational Intelligence Methods for User Matching

  • Chapter
  • First Online:
Cutting Edge Applications of Computational Intelligence Tools and Techniques

Part of the book series: Studies in Computational Intelligence ((SCI,volume 1118))

  • 139 Accesses

Abstract

User identification refers to the process of user matching accounts across various social media platforms, which has numerous real-world applications. However, there are still many issues here, mainly in efficiency and effectiveness. As the time complexity of direct one-to-one user matching is O(mn) (Suppose there are m users on one platform and n users on another platform), the computation time increases exponentially as the number of users grows. Therefore, we explored methods to reduce the number of matching pairs. Before beginning formal computation, we propose method to filter users by record data, thereby eliminating the vast majority of unlikely candidate pairs and retaining as many real candidate pairs as possible. This approach can significantly reduce computation time. Besides, current user trajectory-based methods tend to focus separately on spatial and temporal data and fail to fully leverage the interdependence between them. In contrast, our approach integrates spatial-temporal information to enhance user identification accuracy, through a three-step process. First, we use kernel density estimation to measure the similarity of users’ trajectories, taking both spatial and temporal information into account. Second, we assign weights to each check-in record to prioritize discriminative ones. Finally, we utilize inconsistencies among check-in records to compute penalties for trajectory similarity. By identifying account pairs with similarity scores above a predefined threshold, we can determine whether they belong to the same user. We evaluated our method on three ground-truth datasets, demonstrating its competitive performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. K. Shu, S. Wang, J. Tang, R. Zafarani, and H. Liu, “User identity linkage across online social networks: A review,” ACM SIGKDD Explor.Newslett., vol. 18, no. 2, pp. 5–17, 2017.

    Google Scholar 

  2. A. Sapountzi, K.E. Psannis, Social networking data analysis tools and challenges, Future Generation Computer Systems 86 (2018) 893–913.

    Google Scholar 

  3. C. Stergiou, K.E. Psannis, T. Xifilidis, A.P. Plageras, B.B. Gupta, Security and privacy of big data for social networking services in cloud, in: Proceedings of 2018 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Honolulu, HI, United states, 2018, pp. 438–443.

    Google Scholar 

  4. Z. Zhang, B.B. Gupta, Social media security and trustworthiness: overview and new direction, Future Generation Computer Systems 86 (2018) 914–925.

    Google Scholar 

  5. Y. Li, Z. Zhang, Y. Peng, et al, Matching user accounts based on user generated content across social networks, Future Generation Computer Systems 83 (2018) 104–115.

    Google Scholar 

  6. X. Zhou, X. Liang, H. Zhang, et al, Cross-platform identification of anonymous identical users in multiple social media networks, IEEE Transactions on Knowledge and Data Engineering 28 (2) (2016) 411–424.

    Google Scholar 

  7. Y. Li, W. Ji, X. Gao, Y. Deng, W. Dong, and D. Li, “Matching user accounts with spatio-temporal awareness across social networks,” Inf. Sci., vol. 570, pp. 1–15, Sep. 2021.

    Google Scholar 

  8. C. Riederer, Y. Kim, A. Chaintreau, et al, Linking users across domains with location data: theory and validation, in: Proceedings of the 25th International Conference on World Wide Web, 2016, pp. 707–719.

    Google Scholar 

  9. X. Han, L. Wang, L. Xu, and S. Zhang, “Social media account linkage using user-generated geo-location data,” in Proc. IEEE Conf. Intell. Secur. Informat. (ISI), 2016, pp. 157–162.

    Google Scholar 

  10. W. Chen, H. Yin, W. Wang, L. Zhao, and X. Zhou, “Effective and efficient user account linkage across location based social networks,” in Proc. IEEE 34th Int. Conf. Data Eng. (ICDE), Los Alamitos, CA, USA, 2018, pp. 1085–1096.

    Google Scholar 

  11. J. Feng et al., “DPLink: User identity linkage via deep neural network from heterogeneous mobility data,” in Proc. World Wide Web Conf. (WWW), New York, NY, USA, 2019, pp. 459–469.

    Google Scholar 

  12. W. Chen, H. Yin, W. Wang, et al, Exploiting spatio-temporal user behaviors for user linkage, in: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017, pp. 517–526.

    Google Scholar 

  13. W. He, Y. Li, Y. Zhang, X. Li,A Binary-Search-Based Locality-Sensitive Hashing Method for Cross-Site User Identification, IEEE Transactions on Computational Social Systems, vol. 10, no. 2, April 2023.

    Google Scholar 

  14. Y. Li, X. Li, J. Yang, and C. Gao, “Matching user accounts across large-scale social networks based on locality-sensitive hashing,” in Proc. IEEE Int. Conf. Parallel Distrib. Process. Appl., Big Data Cloud Comput., Sustain. Comput. Commun., Social Comput. Netw. (ISPA/BDCloud/SocialCom/SustainCom), 2020, pp. 802–809.

    Google Scholar 

  15. A. Gionis, P. Indyk, and R. Motwani, “Similarity search in high dimensions via hashing,” in Proc. 25th Int. Conf. Very Large Data Bases, San Francisco, CA, USA, 1999, pp. 518–529.

    Google Scholar 

  16. M. Datar, N. Immorlica, P. Indyk, and V. S. Mirrokni, “Locality-sensitive hashing scheme based on p-stable distributions,” in Proc. 20th Annu. Symp. Comput. Geometry (SCG), New York, NY, USA, 2004, pp. 253–262.

    Google Scholar 

  17. Y. Wang, H. Shen, J. Gao, and X. Cheng, “Learning binary hash codes for fast anchor link retrieval across networks,” in Proc. World Wide Web Conf., New York, NY, USA, May 2019, pp. 3335–3341.

    Google Scholar 

  18. V. Verroios and H. Garcia-Molina, “Top-K entity resolution with adaptive locality-sensitive hashing,” in Proc. IEEE 35th Int. Conf. Data Eng. (ICDE), 2019, pp. 1718–1721.

    Google Scholar 

  19. S. Har-Peled, P. Indyk, and R. Motwani, “Approximate nearest neighbor: Towards removing the curse of dimensionality,” Theory Comput., vol. 8, no. 1, pp. 321–350, Jul. 2012.

    Google Scholar 

  20. G. Salton and C. T. Yu, “On the construction of effective vocabularies for information retrieval,” in Proc. Meeting Program. Lang. Inf. Retr. (SIGPLAN), New York, NY, USA, 1973, pp. 48–60.

    Google Scholar 

  21. Y. Zhang, J. Tang, Z. Yang, J. Pei, and P. S. Yu, “COSNET: Connecting heterogeneous social networks with local and global consistency,” in Proc. 21th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, New York, NY, USA, 2015, pp. 1485–1494.

    Google Scholar 

  22. W.-H. Chong, E.-P. Lim, Tweet geolocation, Leveraging location, user and peer signals, in: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017, pp. 1279–1288.

    Google Scholar 

  23. M. Lichman and P. Smyth, “Modeling human location data with mixtures of kernel densities,” in Proc. 20th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, New York, NY, USA, 2014, pp. 35–44.

    Google Scholar 

  24. E. Raad, A. Dipanda, and R. Chbeir, “User profile matching in social networks,” in 2010 13th International Conference on Network-Based Information Systems(NBIS), Washington, DC, USA, 09 2010, pp. 297–304.

    Google Scholar 

  25. Y. Li, Y. Peng, W. Ji, Z. Zhang, and Q. Xu, “User identification based on display names across online social networks,” IEEE Access, vol. 5, pp. 17 342–17 353, 2017.

    Google Scholar 

  26. X. Zhou, X. Liang, X. Du, and J. Zhao, “Structure based user identification across social networks,” IEEE Transactions on Knowledge and Data Engineering, vol. 30, no. 6, pp. 1178–1191, 2018.

    Google Scholar 

  27. Y. Li and Z. Su, “A comment on “cross-platform identification of anonymous identical users in multiple social media networks”,” IEEE Transactions on Knowledge and Data Engineering, vol. 30, no. 7, pp. 1409–1410, 2018.

    Google Scholar 

  28. R. Zafarani and H. Liu, “Connecting users across social media sites: A behavioral-modeling approach,” in Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, NY, USA, 2013, pp. 41–49.

    Google Scholar 

  29. Li, Y., Peng, Y., Zhang, Z. et al. Matching user accounts across social networks based on username and display name. World Wide Web 22, 1075–1097 (2019).

    Google Scholar 

  30. Yongjun Li, Zhaoting Su, Jiaqi Yang, Congjie Gao: Exploiting similarities of user friendship networks across social networks for user identification. Inf. Sci. 506: 78–98 (2020).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yongjun Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Li, Y., Yang, S., He, W. (2023). Computational Intelligence Methods for User Matching. In: Daimi, K., Alsadoon, A., Coelho, L. (eds) Cutting Edge Applications of Computational Intelligence Tools and Techniques. Studies in Computational Intelligence, vol 1118. Springer, Cham. https://doi.org/10.1007/978-3-031-44127-1_4

Download citation

Publish with us

Policies and ethics