{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:46:44Z","timestamp":1742914004665,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578800"},{"type":"electronic","value":"9783030578817"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-57881-7_45","type":"book-chapter","created":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T14:04:16Z","timestamp":1598882656000},"page":"510-522","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Security Classification (PSC) Model for the Attributes of Social Network Users"],"prefix":"10.1007","author":[{"given":"Yao","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Junguo","family":"Liao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,1]]},"reference":[{"key":"45_CR1","unstructured":"Statistical Report on the Development of China\u2019s Internet. \nwww.cnnic.net.cn\/hlwfzyj\/hlwxzbg\/hlwtjbg\/201808\/t20180820_70488.htm\n\n. Accessed 20 Aug 2018"},{"key":"45_CR2","doi-asserted-by":"crossref","unstructured":"Zhang, Y., et al.: CosNet: connecting heterogeneous social networks with local and global consistency. In: Proceedings of the 21st ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1485\u20131494. ACM, Sydney (2015)","DOI":"10.1145\/2783258.2783268"},{"issue":"10","key":"45_CR3","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.neucom.2015.10.147","volume":"2","author":"Y Nie","year":"2016","unstructured":"Nie, Y., et al.: Identifying users across social networks based on dynamic core interests. Neurocomputing 2(10), 107\u2013115 (2016)","journal-title":"Neurocomputing"},{"issue":"2","key":"45_CR4","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/3068777.3068781","volume":"18","author":"K Shu","year":"2017","unstructured":"Shu, K., et al.: User identity linkage across online social networks: a review. ACM SIGKDD Explor. Newslett. 18(2), 5\u201317 (2017)","journal-title":"ACM SIGKDD Explor. Newslett."},{"key":"45_CR5","unstructured":"Cetto, A., et al.: Friend inspector: a serious game to enhance privacy awareness in social networks. arXiv preprint \narXiv:1402.5878\n\n (2014)"},{"key":"45_CR6","doi-asserted-by":"crossref","unstructured":"Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proceedings of the 19th International Conference on World Wide Web, pp. 351\u2013360. ACM, New York (2010)","DOI":"10.1145\/1772690.1772727"},{"key":"45_CR7","doi-asserted-by":"crossref","unstructured":"Vuokko, N., Terzi, E.: Reconstructing randomized social networks. In: Proceedings of the 2010 SIAM International Conference on Data Mining, pp. 49\u201359. SIAM (2010)","DOI":"10.1137\/1.9781611972801.5"},{"issue":"1","key":"45_CR8","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/1870096.1870102","volume":"5","author":"K Liu","year":"2010","unstructured":"Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discov. Data 5(1), 6 (2010)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"45_CR9","doi-asserted-by":"publisher","DOI":"10.4324\/9780203861264","volume-title":"Handbook of Polytomous Item Response Theory Models","author":"ML Nering","year":"2011","unstructured":"Nering, M.L., Ostini, R.: Handbook of Polytomous Item Response Theory Models. Taylor & Francis, Routledge (2011)"},{"key":"45_CR10","doi-asserted-by":"crossref","unstructured":"Wang, Y., Nepali, R.K., Nikolai, J.: Social network privacy measurement and simulation. In: International Conference on Computing, Networking and Communications, pp. 802\u2013806. IEEE, Honolulu (2014)","DOI":"10.1109\/ICCNC.2014.6785440"},{"issue":"5","key":"45_CR11","first-page":"394","volume":"5","author":"L Gao","year":"2019","unstructured":"Gao, L., Li, C.S., et al.: Research on hierarchical protection of personal information in big data application. Inf. Secur. Res. 5(5), 394\u2013399 (2019)","journal-title":"Inf. Secur. Res."},{"issue":"6","key":"45_CR12","first-page":"22","volume":"27","author":"P Lou","year":"2018","unstructured":"Lou, P., Liu, L., et al.: Classification and grading of medical data based on questionnaires. Chin. J. Med. Inf. 27(6), 22\u201327 (2018)","journal-title":"Chin. J. Med. Inf."},{"issue":"3","key":"45_CR13","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.32604\/cmc.2019.05644","volume":"60","author":"G Sun","year":"2019","unstructured":"Sun, G., et al.: Research on public opinion propagation model in social network based on blockchain. Comput. Mater. Continua 60(3), 1015\u20131027 (2019)","journal-title":"Comput. Mater. Continua"},{"issue":"3","key":"45_CR14","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.32604\/cmc.2019.06041","volume":"61","author":"D Zhu","year":"2019","unstructured":"Zhu, D., et al.: MMLUP: multi-source & multi-task learning for user profiles in social network. Comput. Mater. Continua 61(3), 1105\u20131115 (2019)","journal-title":"Comput. Mater. Continua"},{"issue":"2","key":"45_CR15","doi-asserted-by":"publisher","first-page":"533","DOI":"10.32604\/cmc.2019.05570","volume":"59","author":"P Wang","year":"2019","unstructured":"Wang, P., Wang, Z., Chen, T., Ma, Q.: Personalized privacy protecting model in mobile social network. Comput. Mater. Continua 59(2), 533\u2013546 (2019)","journal-title":"Comput. Mater. Continua"},{"key":"45_CR16","doi-asserted-by":"publisher","first-page":"13118","DOI":"10.1109\/ACCESS.2017.2720187","volume":"5","author":"E Aghasian","year":"2017","unstructured":"Aghasian, E., Garg, S., Gao, L., et al.: Scoring users\u2019 privacy disclosure across multiple online social networks. IEEE Access 5, 13118\u201313130 (2017)","journal-title":"IEEE Access"},{"issue":"10","key":"45_CR17","doi-asserted-by":"publisher","first-page":"1790","DOI":"10.3390\/app8101790","volume":"8","author":"X Li","year":"2018","unstructured":"Li, X., Yang, Y., Chen, Y., et al.: A privacy measurement framework for multiple online social networks against social identity linkage. Appl. Sci. 8(10), 1790 (2018)","journal-title":"Appl. Sci."},{"issue":"4","key":"45_CR18","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/BF02293801","volume":"46","author":"RD Bock","year":"1981","unstructured":"Bock, R.D., Aitkin, M.: Marginal maximum likelihood estimation of item parameters: Application of an EM algorithm. Psychometrika 46(4), 443\u2013459 (1981)","journal-title":"Psychometrika"},{"key":"45_CR19","unstructured":"Zhao, Q.H., Ha, M.H., Peng, G.B., et al.: Support vector machine based on half-suppressed fuzzy c-means clustering. In: International Conference on Machine Learning and Cybernetics, vol. 2, pp. 1236\u20131240. IEEE, Hebei (2009)"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57881-7_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T14:35:04Z","timestamp":1598884504000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57881-7_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030578800","9783030578817"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57881-7_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hohhot","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}