Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1]Wikipedia,"Twitter, " http://en.wikipedia.org/wiki/Twitter. 2014. [2] Xinhuanet, "Sina Microblog Achieves over 500 MillionUsers," http://news.xinhuanet.com/tech/2012- 02/29/c_122769084.htm. 2014. [3] J. Liu, F. Zhang, X. Song, Y.I. Song, C.Y. Lin, and H.W. Hon, "What's in a name?: an unsupervised approach to link users across communities," Proc. of the 6th ACM international conference on Web search and data mining(WDM’13), pp. 495-504, 2013. [4] O. Goga, D. Perito, H. Lei, R. Teixeira, and R. Sommer, "Large-scale Correlation of Accounts across Social Networks," Tech- nical report, 2013. [5] K. Cortis, S. Scerri, I. Rivera, and S. Handschuh, "An ontology-based technique for online profile resolution," Social Informatics, Berlin: Springer, pp. 284-298, 2013. [6] F. Abel, E. Herder, G.J. Houben, N. Henze, and D. Krause, "Cross-system user modeling and personalization on the social web," User Modeling and User-Adapted Interaction, vol. 23, pp. 169-209, 2013. [7] N. Korula and S. Lattanzi, "An efficient reconciliation algorithm for social networks," arXiv preprint arXiv:1307.1690, 2013. [8] P. Jain, P. Kumaraguru, and A. Joshi, "@ i seek 'fb. me': identify- ing users across multiple online social networks," Proc. of the 22nd International Conference on World Wide Web Companion, pp. 1259-1268, 2013. [9] X. Kong, J. Zhang, and P.S. Yu, "inferring anchor links across multiple heterogeneous social networks," Proc. of the 22nd ACM International Conf. on Information and Knowledge Management (CIKM’13), pp. 179-188, 2013. [10] O. Goga, H. Lei, S.H.K. Parthasarathi, G. Friedland, R. Sommer, and R. Teixeira, "Exploiting innocuous activity for correlating us- ers across sites," Proc. 22nd international conference on World Wide Web (WWW’13),pp. 447-458, 2013. [11] R. Zafarani and H. Liu, "Connecting users across social media sites: a behavioral-modeling approach, " Proc. of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’13), pp.41-49, 2013. [12] S. Bartunov, A. Korshunov, S. Park, W. Ryu, and H. Lee, "Joint link-attribute user identity resolution in online social net- works," The 6th SNA-KDD Workshop ’12, 2012. [13] P. Jain and P. Kumaraguru, "Finding Nemo: searching and re-solving identities of users acrossonline social networks," arXiv preprint arXiv:1212.6147, 2012. [14] M. Almishari and G. Tsudik, "Exploring linkability of user re- views," Computer Security– ESORICS 2012 (ESORICS’12), pp. 307- 324, 2012. [15] D. Perito, C. Castelluccia, M.A. Kaafar, and P. Manils, "How unique and traceable are usernames?," Privacy Enhancing Technol- ogies (PETS’11), pp. 1- 17, 2011. [16] A. Acquisti, R. Gross and F. Stutzman, "Privacy in the age of aug- mented reality," Proc. National Academy of Sciences, 2011. [17] T. Iofciu, P. Fankhauser, F. Abel, and K. Bischoff, "Identifying users across social tagging systems,” Proc. of the 5th International AAAI Conference on Weblogs and Social Media, pp. 522-525, 2011. [18] B. Zhou and J. Pei, "The k-anonymity and ldiversity approaches for privacy preservation in social networks against neighborhood attacks," Knowl. Inf. Syst, vol. 28, no. 1,pp. 47-77, 2011. [19] E. Raad, R. Chbeir, and A. Dipanda, "User profile matching in social networks," Proc. Of the 13th International Conference on Network-Based Information Systems (NBiS’10), pp.297-304, 2010. [20] P. Erd?s and A. Rényi, "On random graphs I," Publ. Math. De- brecen, vol. 6, pp. 290-297, 2010. [21] R. Zafarani and H. Liu, "Connecting corresponding identities across communities," Proc. of the 3rd International ICWSM Con- ference, pp. 354- 357, 2009. [22] M. Motoyama and G. Varghese, "I seek you: searching and matching individuals in social networks," Proc. of the 11th inter- national workshop on Web Information and Data Management (WIDM’09), pp. 67-75, 2009. [23] J. Vosecky, D. Hong, and V.Y. Shen, "User identification across multiple social networks," Proc. Of the 1st International Confer- ence on Networked Digital Technologies, pp.360-365, 2009. [24] A. Narayanan and V. Shmatikov, "Deanonymizing social net- works," Proc. Of the 30th IEEE Symposium on Security and Privacy (SSP’09), pp. 173-187, 2009. [25] B. Zhou and J. Pei, "Preserving privacy in social networks against neighborhood attacks," Proc. Of the 24th IEEE International Conference on Data Engineering (ICDE’08), pp. 506–515, 2008. [26] L. Backstrom, C. Dwork, and J. Kleinberg, "Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography," Proc. of the 16th international conference on World Wide Web(WWW’07), pp. 181-190, 2007. [27] R. Zheng, J. Li, H. Chen, and Z. Huang, "A framework for au- thorship identification of online messages: writing? style fea? tures and classification techniques," J. of the American Society for Information Science and Technology, vol. 57, no. 3, pp. 378-393, 2006. [28] O. De Vel, A. Anderson, M. Corney, and G. Mohay, "Mining e-mail content for author identification forensics,” ACM Sigmod Record, vol. 30, no. 4, pp. 55-64, 2001. [29] A. L. Barabasi and R. Albert, "Emergence of scaling in random networks," Science, vol. 286, no. 5439, pp. 509-512, 1999. [30] D.J. Watts, and S.H. Strogatz, "Collective dynamics of ‘small-world’ networks," Nature, vol.393, no.6684, pp. 440-442, 1998. [31].K.Arun ,A.SrinageshandM.Ramesh,”Twitter Sentiment Analysis on Demonetization tweets in India Using R language.”International Journal of Computer Engineering in Research Trends., vol.4, no.6, pp. 252- 258, 2017. [32]TekurVijetha, M.SriLakshmi andDr.S.PremKumar,”Survey on Collaborative Filtering and content-Based Recommending.”International Journal of Computer Engineering in Research Trends., vol.2, no.9, pp. 594- 599, 2015. [33]N.Satish Kumar, SujanBabuVadde,”Typicality Based Content-BoostedCollaborative Filtering RecommendationFramework.”International Journal of Computer Engineering in Research Trends., vol.2, no.11, pp. 809-813, 2015. [34]D.Ramanjaneyulu,U.Usha Rani,”In Service- Oriented MSN ProvidingTrustworthy Service Evaluation.”International Journal of Computer Engineering in Research Trends., vol.2, no.12, pp. 1192-1197, 2015. [35]B.Kundan,N.Poorna Chandra Rao and DrS.PremKumar,”Investigation on Privacy and Secure content of location based Queries.”International Journal of Computer Engineering in Research Trends., vol.2, no.9, pp. 543-546, 2015.
![]() | V4I1005.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|