{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:17:56Z","timestamp":1730265476258,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/iihmsp.2011.57","type":"proceedings-article","created":{"date-parts":[[2011,11,21]],"date-time":"2011-11-21T21:48:12Z","timestamp":1321912092000},"page":"53-56","source":"Crossref","is-referenced-by-count":2,"title":["Content-Based De-anonymisation of Tweets"],"prefix":"10.1109","author":[{"given":"Tomotaka","family":"Okuno","sequence":"first","affiliation":[]},{"given":"Masatsugu","family":"Ichino","sequence":"additional","affiliation":[]},{"given":"Tetsuji","family":"Kuboyama","sequence":"additional","affiliation":[]},{"given":"Hiroshi","family":"Yoshiura","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"journal-title":"Automatic Domain Terminology Extraction System","year":"0","key":"ref10"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988678"},{"journal-title":"The official Google Blog we knew the web was big","year":"0","key":"ref11"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1108\/eb026526"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/361219.361220"},{"journal-title":"Mixi Infographics for finding out the newest data of mixi","year":"0","key":"ref2"},{"journal-title":"MeCab Yet Another Part-of-Speech and Morphological Analyzer","year":"0","author":"kudo","key":"ref9"},{"key":"ref1","first-page":"1","article-title":"A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet","volume":"3","author":"lawler","year":"2010","journal-title":"Journal of Information Systems Applied Research"}],"event":{"name":"2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)","start":{"date-parts":[[2011,10,14]]},"location":"Dalian, China","end":{"date-parts":[[2011,10,16]]}},"container-title":["2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6079160\/6079486\/06079532.pdf?arnumber=6079532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T17:44:02Z","timestamp":1490118242000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6079532\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/iihmsp.2011.57","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}