{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T10:04:29Z","timestamp":1766311469696,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031105418"},{"type":"electronic","value":"9783031105425"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10542-5_26","type":"book-chapter","created":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T06:03:02Z","timestamp":1658469782000},"page":"377-388","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Sensitive Information Detection Adopting Named Entity Recognition: A Proposed Methodology"],"prefix":"10.1007","author":[{"given":"Lelio","family":"Campanile","sequence":"first","affiliation":[]},{"given":"Maria Stella","family":"de Biase","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Marrone","sequence":"additional","affiliation":[]},{"given":"Fiammetta","family":"Marulli","sequence":"additional","affiliation":[]},{"given":"Mariapia","family":"Raimondo","sequence":"additional","affiliation":[]},{"given":"Laura","family":"Verde","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,23]]},"reference":[{"issue":"4","key":"26_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3425401","volume":"2","author":"A Aleroud","year":"2021","unstructured":"Aleroud, A., Yang, F., Pallaprolu, S.C., Chen, Z., Karabatis, G.: Anonymization of network traces data through condensation-based differential privacy. Digit. Threat. Res. Pract. 2(4), 1\u201323 (2021). https:\/\/doi.org\/10.1145\/3425401","journal-title":"Digit. Threat. Res. Pract."},{"key":"26_CR2","doi-asserted-by":"publisher","unstructured":"Ashok, V.: Fuzzy-based methods for privacy-preserving data mining, pp. 348\u2013353 (April 2011). https:\/\/doi.org\/10.1109\/ITNG.2011.68","DOI":"10.1109\/ITNG.2011.68"},{"key":"26_CR3","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.procs.2016.08.091","volume":"96","author":"Z Batmaz","year":"2016","unstructured":"Batmaz, Z., Polat, H.: Randomization-based privacy-preserving frameworks for collaborative filtering. Procedia Comput. Sci. 96, 33\u201342 (2016). https:\/\/doi.org\/10.1016\/j.procs.2016.08.091","journal-title":"Procedia Comput. Sci."},{"issue":"2","key":"26_CR4","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s41060-021-00285-x","volume":"13","author":"D Biesner","year":"2022","unstructured":"Biesner, D., et al.: Anonymization of German financial documents using neural network-based language models with contextual word representations. Int. J. Data Sci. Anal. 13(2), 151\u2013161 (2022)","journal-title":"Int. J. Data Sci. Anal."},{"issue":"1","key":"26_CR5","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSEC.2020.3012059","volume":"19","author":"L Campanile","year":"2020","unstructured":"Campanile, L., Iacono, M., Levis, A.H., Marulli, F., Mastroianni, M.: Privacy regulations, smart roads, blockchain, and liability insurance: putting technologies to work. IEEE Secur. Priv. 19(1), 34\u201343 (2020)","journal-title":"IEEE Secur. Priv."},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Campanile, L., Iacono, M., Marulli, F., Mastroianni, M.: Privacy regulations challenges on data-centric and IoT systems: a case study for smart vehicles. In: IoTBDS, pp. 507\u2013518 (2020)","DOI":"10.5220\/0009839305070518"},{"key":"26_CR7","unstructured":"Ferr\u00e1ndez, \u00d3., South, B.R., Shen, S., Friedlin, F.J., Samore, M.H., Meystre, S.M.: Generalizability and comparison of automatic clinical text de-identification methods and resources. In: AMIA Annual Symposium Proceedings, vol. 2012, p. 199. American Medical Informatics Association (2012)"},{"key":"26_CR8","doi-asserted-by":"publisher","unstructured":"Grechanik, M., Csallner, C., Fu, C., Xie, Q.: Is data privacy always good for software testing? pp. 368\u2013377 (November 2010). https:\/\/doi.org\/10.1109\/ISSRE.2010.13","DOI":"10.1109\/ISSRE.2010.13"},{"key":"26_CR9","doi-asserted-by":"publisher","unstructured":"Guo, Y., Liu, J., Tang, W., Huang, C.: Exsense: extract sensitive information from unstructured data. Comput. Secur. 102, 102156 (2021). https:\/\/doi.org\/10.1016\/j.cose.2020.102156. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404820304296","DOI":"10.1016\/j.cose.2020.102156"},{"key":"26_CR10","unstructured":"Kang, J.S.: An improvement of privacy-preserving scheme based on random substitutions (March 2022)"},{"key":"26_CR11","first-page":"80","volume":"248","author":"M Langarizadeh","year":"2018","unstructured":"Langarizadeh, M., Orooji, A., Sheikhtaheri, A.: Effectiveness of anonymization methods in preserving patients\u2019 privacy: a systematic literature review. Stud. Health Technol. Inf. 248, 80\u201387 (2018)","journal-title":"Stud. Health Technol. Inf."},{"key":"26_CR12","doi-asserted-by":"publisher","unstructured":"Liu, L., Thuraisingham, B.: The applicability of the perturbation model-based privacy preserving data mining for real-world data, pp. 507\u2013512 (January 2007). https:\/\/doi.org\/10.1109\/ICDMW.2006.155","DOI":"10.1109\/ICDMW.2006.155"},{"key":"26_CR13","doi-asserted-by":"publisher","unstructured":"Mamede, N., Baptista, J., Dias, F.: Automated anonymization of text documents, pp. 1287\u20131294 (July 2016). https:\/\/doi.org\/10.1109\/CEC.2016.7743936","DOI":"10.1109\/CEC.2016.7743936"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Martinelli, F., Marulli, F., Mercaldo, F., Marrone, S., Santone, A.: Enhanced privacy and data protection using natural language processing and artificial intelligence. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138. IEEE (2020)","DOI":"10.1109\/IJCNN48605.2020.9206801"},{"key":"26_CR15","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1007\/978-3-030-79725-6_64","volume-title":"Complex, Intelligent and Software Intensive Systems","author":"B Di Martino","year":"2021","unstructured":"Di Martino, B., Marulli, F., Graziano, M., Lupi, P.: PrettyTags: an open-source tool for easy and customizable textual multilevel semantic annotations. In: Barolli, L., Yim, K., Enokido, T. (eds.) CISIS 2021. LNNS, vol. 278, pp. 636\u2013645. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-79725-6_64"},{"key":"26_CR16","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1007\/978-3-030-50454-0_55","volume-title":"Complex, Intelligent and Software Intensive Systems","author":"B Di Martino","year":"2021","unstructured":"Di Martino, B., Marulli, F., Lupi, P., Cataldi, A.: A machine learning based methodology for automatic annotation and anonymisation of privacy-related items in textual documents for justice domain. In: Barolli, L., Poniszewska-Maranda, A., Enokido, T. (eds.) CISIS 2020. AISC, vol. 1194, pp. 530\u2013539. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-50454-0_55"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Marulli, F., Verde, L., Marrone, S., Barone, R., De Biase, M.S.: Evaluating efficiency and effectiveness of federated learning approaches in knowledge extraction tasks. In: 2021 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20136. IEEE (2021)","DOI":"10.1109\/IJCNN52387.2021.9533946"},{"key":"26_CR18","first-page":"50","volume":"3","author":"B Melinamath","year":"2014","unstructured":"Melinamath, B.: Rule based methodology for recognition of Kannada named entities. Int. J. Latest Trends Eng. Technol. (IJLTET) 3, 50\u201358 (2014)","journal-title":"Int. J. Latest Trends Eng. Technol. (IJLTET)"},{"key":"26_CR19","doi-asserted-by":"publisher","first-page":"691","DOI":"10.3233\/978-1-58603-864-9-691","volume":"136","author":"T Neubauer","year":"2008","unstructured":"Neubauer, T., Riedl, B.: Improving patients privacy with pseudonymization. Stud. Health Technol. Inf. 136, 691\u2013696 (2008). https:\/\/doi.org\/10.3233\/978-1-58603-864-9-691","journal-title":"Stud. Health Technol. Inf."},{"key":"26_CR20","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1016\/j.procs.2015.04.037","volume":"50","author":"J Panackal","year":"2015","unstructured":"Panackal, J., Pillai, A.: Adaptive utility-based anonymization model: performance evaluation on big data sets. Procedia Comput. Sci. 50, 347\u2013352 (2015). https:\/\/doi.org\/10.1016\/j.procs.2015.04.037","journal-title":"Procedia Comput. Sci."},{"key":"26_CR21","doi-asserted-by":"publisher","first-page":"101351","DOI":"10.1016\/j.csl.2022.101351","volume":"74","author":"J Perero-Codosero","year":"2022","unstructured":"Perero-Codosero, J., Espinoza-Cuadros, F.M., G\u00f3mez, L.: X-vector anonymization using autoencoders and adversarial training for preserving speech privacy. Comput. Speech Langu. 74, 101351 (2022). https:\/\/doi.org\/10.1016\/j.csl.2022.101351","journal-title":"Comput. Speech Langu."},{"key":"26_CR22","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-642-12837-0_3","volume-title":"Semantic Processing of Legal Texts","author":"P Quaresma","year":"2010","unstructured":"Quaresma, P., Gon\u00e7alves, T.: Using linguistic information and machine learning techniques to identify entities from juridical documents. In: Francesconi, E., Montemagni, S., Peters, W., Tiscornia, D. (eds.) Semantic Processing of Legal Texts. LNCS (LNAI), vol. 6036, pp. 44\u201359. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12837-0_3"},{"key":"26_CR23","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. IEEE Trans. Knowl. Data Eng. 13, 1010\u20131027 (2001). https:\/\/doi.org\/10.1109\/69.971193","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Schmitt, X., Kubler, S., Robert, J., Papadakis, M., LeTraon, Y.: A replicable comparison study of ner software: Stanfordnlp, nltk, opennlp, spacy, gate. In: 2019 6th International Conference on Social Networks Analysis, Management and Security (SNAMS). pp. 338\u2013343. IEEE (2019)","DOI":"10.1109\/SNAMS.2019.8931850"},{"key":"26_CR25","doi-asserted-by":"publisher","first-page":"102770","DOI":"10.1016\/j.system.2022.102770","volume":"106","author":"R Spring","year":"2022","unstructured":"Spring, R., Johnson, M.: The possibility of improving automated calculation of measures of lexical richness for EFL writing: a comparison of the LCA, NLTK and SpaCy tools. System 106, 102770 (2022)","journal-title":"System"},{"issue":"2","key":"26_CR26","first-page":"19","volume":"3","author":"M Vijaymeena","year":"2016","unstructured":"Vijaymeena, M., Kavitha, K.: A survey on similarity measures in text mining. Mach. Learn. Appl. Int. J. 3(2), 19\u201328 (2016)","journal-title":"Mach. Learn. Appl. Int. J."},{"issue":"5","key":"26_CR27","doi-asserted-by":"publisher","first-page":"7419","DOI":"10.1007\/s11042-021-11762-7","volume":"81","author":"W Xu","year":"2022","unstructured":"Xu, W., Nong, G.: A study for extracting keywords from data with deep learning and suffix array. Multimedia Tools Appl. 81(5), 7419\u20137437 (2022). https:\/\/doi.org\/10.1007\/s11042-021-11762-7","journal-title":"Multimedia Tools Appl."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2022 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10542-5_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T06:06:58Z","timestamp":1658470018000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10542-5_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031105418","9783031105425"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10542-5_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaga","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CyberChair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"279","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8.7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"285 Workshop submission accepted out of 815 submissions","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}