Abstract
User identification refers to the process of user matching accounts across various social media platforms, which has numerous real-world applications. However, there are still many issues here, mainly in efficiency and effectiveness. As the time complexity of direct one-to-one user matching is O(mn) (Suppose there are m users on one platform and n users on another platform), the computation time increases exponentially as the number of users grows. Therefore, we explored methods to reduce the number of matching pairs. Before beginning formal computation, we propose method to filter users by record data, thereby eliminating the vast majority of unlikely candidate pairs and retaining as many real candidate pairs as possible. This approach can significantly reduce computation time. Besides, current user trajectory-based methods tend to focus separately on spatial and temporal data and fail to fully leverage the interdependence between them. In contrast, our approach integrates spatial-temporal information to enhance user identification accuracy, through a three-step process. First, we use kernel density estimation to measure the similarity of users’ trajectories, taking both spatial and temporal information into account. Second, we assign weights to each check-in record to prioritize discriminative ones. Finally, we utilize inconsistencies among check-in records to compute penalties for trajectory similarity. By identifying account pairs with similarity scores above a predefined threshold, we can determine whether they belong to the same user. We evaluated our method on three ground-truth datasets, demonstrating its competitive performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
K. Shu, S. Wang, J. Tang, R. Zafarani, and H. Liu, “User identity linkage across online social networks: A review,” ACM SIGKDD Explor.Newslett., vol. 18, no. 2, pp. 5–17, 2017.
A. Sapountzi, K.E. Psannis, Social networking data analysis tools and challenges, Future Generation Computer Systems 86 (2018) 893–913.
C. Stergiou, K.E. Psannis, T. Xifilidis, A.P. Plageras, B.B. Gupta, Security and privacy of big data for social networking services in cloud, in: Proceedings of 2018 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Honolulu, HI, United states, 2018, pp. 438–443.
Z. Zhang, B.B. Gupta, Social media security and trustworthiness: overview and new direction, Future Generation Computer Systems 86 (2018) 914–925.
Y. Li, Z. Zhang, Y. Peng, et al, Matching user accounts based on user generated content across social networks, Future Generation Computer Systems 83 (2018) 104–115.
X. Zhou, X. Liang, H. Zhang, et al, Cross-platform identification of anonymous identical users in multiple social media networks, IEEE Transactions on Knowledge and Data Engineering 28 (2) (2016) 411–424.
Y. Li, W. Ji, X. Gao, Y. Deng, W. Dong, and D. Li, “Matching user accounts with spatio-temporal awareness across social networks,” Inf. Sci., vol. 570, pp. 1–15, Sep. 2021.
C. Riederer, Y. Kim, A. Chaintreau, et al, Linking users across domains with location data: theory and validation, in: Proceedings of the 25th International Conference on World Wide Web, 2016, pp. 707–719.
X. Han, L. Wang, L. Xu, and S. Zhang, “Social media account linkage using user-generated geo-location data,” in Proc. IEEE Conf. Intell. Secur. Informat. (ISI), 2016, pp. 157–162.
W. Chen, H. Yin, W. Wang, L. Zhao, and X. Zhou, “Effective and efficient user account linkage across location based social networks,” in Proc. IEEE 34th Int. Conf. Data Eng. (ICDE), Los Alamitos, CA, USA, 2018, pp. 1085–1096.
J. Feng et al., “DPLink: User identity linkage via deep neural network from heterogeneous mobility data,” in Proc. World Wide Web Conf. (WWW), New York, NY, USA, 2019, pp. 459–469.
W. Chen, H. Yin, W. Wang, et al, Exploiting spatio-temporal user behaviors for user linkage, in: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017, pp. 517–526.
W. He, Y. Li, Y. Zhang, X. Li,A Binary-Search-Based Locality-Sensitive Hashing Method for Cross-Site User Identification, IEEE Transactions on Computational Social Systems, vol. 10, no. 2, April 2023.
Y. Li, X. Li, J. Yang, and C. Gao, “Matching user accounts across large-scale social networks based on locality-sensitive hashing,” in Proc. IEEE Int. Conf. Parallel Distrib. Process. Appl., Big Data Cloud Comput., Sustain. Comput. Commun., Social Comput. Netw. (ISPA/BDCloud/SocialCom/SustainCom), 2020, pp. 802–809.
A. Gionis, P. Indyk, and R. Motwani, “Similarity search in high dimensions via hashing,” in Proc. 25th Int. Conf. Very Large Data Bases, San Francisco, CA, USA, 1999, pp. 518–529.
M. Datar, N. Immorlica, P. Indyk, and V. S. Mirrokni, “Locality-sensitive hashing scheme based on p-stable distributions,” in Proc. 20th Annu. Symp. Comput. Geometry (SCG), New York, NY, USA, 2004, pp. 253–262.
Y. Wang, H. Shen, J. Gao, and X. Cheng, “Learning binary hash codes for fast anchor link retrieval across networks,” in Proc. World Wide Web Conf., New York, NY, USA, May 2019, pp. 3335–3341.
V. Verroios and H. Garcia-Molina, “Top-K entity resolution with adaptive locality-sensitive hashing,” in Proc. IEEE 35th Int. Conf. Data Eng. (ICDE), 2019, pp. 1718–1721.
S. Har-Peled, P. Indyk, and R. Motwani, “Approximate nearest neighbor: Towards removing the curse of dimensionality,” Theory Comput., vol. 8, no. 1, pp. 321–350, Jul. 2012.
G. Salton and C. T. Yu, “On the construction of effective vocabularies for information retrieval,” in Proc. Meeting Program. Lang. Inf. Retr. (SIGPLAN), New York, NY, USA, 1973, pp. 48–60.
Y. Zhang, J. Tang, Z. Yang, J. Pei, and P. S. Yu, “COSNET: Connecting heterogeneous social networks with local and global consistency,” in Proc. 21th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, New York, NY, USA, 2015, pp. 1485–1494.
W.-H. Chong, E.-P. Lim, Tweet geolocation, Leveraging location, user and peer signals, in: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017, pp. 1279–1288.
M. Lichman and P. Smyth, “Modeling human location data with mixtures of kernel densities,” in Proc. 20th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, New York, NY, USA, 2014, pp. 35–44.
E. Raad, A. Dipanda, and R. Chbeir, “User profile matching in social networks,” in 2010 13th International Conference on Network-Based Information Systems(NBIS), Washington, DC, USA, 09 2010, pp. 297–304.
Y. Li, Y. Peng, W. Ji, Z. Zhang, and Q. Xu, “User identification based on display names across online social networks,” IEEE Access, vol. 5, pp. 17 342–17 353, 2017.
X. Zhou, X. Liang, X. Du, and J. Zhao, “Structure based user identification across social networks,” IEEE Transactions on Knowledge and Data Engineering, vol. 30, no. 6, pp. 1178–1191, 2018.
Y. Li and Z. Su, “A comment on “cross-platform identification of anonymous identical users in multiple social media networks”,” IEEE Transactions on Knowledge and Data Engineering, vol. 30, no. 7, pp. 1409–1410, 2018.
R. Zafarani and H. Liu, “Connecting users across social media sites: A behavioral-modeling approach,” in Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, NY, USA, 2013, pp. 41–49.
Li, Y., Peng, Y., Zhang, Z. et al. Matching user accounts across social networks based on username and display name. World Wide Web 22, 1075–1097 (2019).
Yongjun Li, Zhaoting Su, Jiaqi Yang, Congjie Gao: Exploiting similarities of user friendship networks across social networks for user identification. Inf. Sci. 506: 78–98 (2020).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Li, Y., Yang, S., He, W. (2023). Computational Intelligence Methods for User Matching. In: Daimi, K., Alsadoon, A., Coelho, L. (eds) Cutting Edge Applications of Computational Intelligence Tools and Techniques. Studies in Computational Intelligence, vol 1118. Springer, Cham. https://doi.org/10.1007/978-3-031-44127-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-031-44127-1_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-44126-4
Online ISBN: 978-3-031-44127-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)