{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:12:24Z","timestamp":1742933544829,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031243363"},{"type":"electronic","value":"9783031243370"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-24337-0_23","type":"book-chapter","created":{"date-parts":[[2023,2,25]],"date-time":"2023-02-25T12:02:40Z","timestamp":1677326560000},"page":"316-331","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["dpUGC: Learn Differentially Private Representation for\u00a0User Generated Contents (Best Paper Award, Third Place, Shared)"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8820-2405","authenticated-orcid":false,"given":"Xuan-Son","family":"Vu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5912-293X","authenticated-orcid":false,"given":"Son N.","family":"Tran","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7788-3986","authenticated-orcid":false,"given":"Lili","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,26]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. ArXiv e-prints (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"23_CR2","doi-asserted-by":"publisher","unstructured":"Bansal, M., Gimpel, K., Livescu, K.: Tailoring continuous word representations for dependency parsing. In: Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), pp. 809\u2013815. Association for Computational Linguistics (2014). https:\/\/doi.org\/10.3115\/v1\/P14-2131, http:\/\/aclweb.org\/anthology\/P14-2131","DOI":"10.3115\/v1\/P14-2131"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Batmanghelich, K.N., Saeedi, A., Narasimhan, K., Gershman, S.: Nonparametric spherical topic modeling with word embeddings. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers) abs\/1604.00126, pp. 537\u2013542 (2016). http:\/\/arxiv.org\/abs\/1604.00126","DOI":"10.18653\/v1\/P16-2087"},{"key":"23_CR4","unstructured":"Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE, pp. 217\u2013228 (2005)"},{"key":"23_CR5","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1162\/tacl_a_00051","volume":"5","author":"P Bojanowski","year":"2017","unstructured":"Bojanowski, P., Grave, E., Joulin, A., Mikolov, T.: Enriching word vectors with subword information. Trans. Assoc. Comput. Linguist. 5, 135\u2013146 (2017)","journal-title":"Trans. Assoc. Comput. Linguist."},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Cynthia, D.: Differential privacy, pp. 1\u201312. ICALP (2006)","DOI":"10.1007\/11787006_1"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Dwork, C., Smithy, A.: Differential privacy for statistics: what we know and what we want to learn (2009)","DOI":"10.29012\/jpc.v1i2.570"},{"key":"23_CR8","doi-asserted-by":"publisher","unstructured":"Ebadi, H., Sands, D., Schneider, G.: Differential privacy: now it\u2019s getting personal. In: Proceedings of the 42Nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2015, pp. 69\u201381. ACM, New York (2015). https:\/\/doi.org\/10.1145\/2676726.2677005, http:\/\/doi.acm.org\/10.1145\/2676726.2677005","DOI":"10.1145\/2676726.2677005"},{"key":"23_CR9","unstructured":"Flekova, L., Gurevych, I.: Can we hide in the web? Large scale simultaneous age and gender author profiling in social media notebook for PAN at CLEF 2013. In: Working Notes for CLEF 2013 Conference, Valencia, Spain, 23\u201326 September 2013 (2013)"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, pp. 1322\u20131333 (2015)","DOI":"10.1145\/2810103.2813677"},{"key":"23_CR11","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press (2016). http:\/\/www.deeplearningbook.org"},{"key":"23_CR12","unstructured":"Kosinski, M., Matz, S., Gosling, S., Popov, V., Stillwell, D.: Facebook as a social science research tool. Am. Psychol. (2015)"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-642-24861-0_22","volume-title":"Information Security","author":"J Lee","year":"2011","unstructured":"Lee, J., Clifton, C.: How much is enough? Choosing $$\\epsilon $$ for differential privacy. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 325\u2013340. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24861-0_22"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Lee, J., Clifton, C.: Differential identifiability. In: Proceedings of KDD (2012)","DOI":"10.1145\/2339530.2339695"},{"key":"23_CR15","doi-asserted-by":"publisher","unstructured":"Levy, O., Goldberg, Y.: Linguistic regularities in sparse and explicit word representations. In: Proceedings of the Eighteenth Conference on Computational Natural Language Learning, pp. 171\u2013180. Association for Computational Linguistics (2014). https:\/\/doi.org\/10.3115\/v1\/W14-1618, http:\/\/aclweb.org\/anthology\/W14-1618","DOI":"10.3115\/v1\/W14-1618"},{"key":"23_CR16","unstructured":"McMahan, H.B., Ramage, D., Talwar, K., Zhang, L.: Learning differentially private language models without losing accuracy. CoRR abs\/1710.06963 (2017). http:\/\/arxiv.org\/abs\/1710.06963"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"McSherry, F.D.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: SIGMOD (2009)","DOI":"10.1145\/1559845.1559850"},{"key":"23_CR18","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. CoRR abs\/1301.3781 (2013). http:\/\/arxiv.org\/abs\/1301.3781"},{"key":"23_CR19","doi-asserted-by":"publisher","unstructured":"Mohsen, A.M., El-Makky, N.M., Ghanem, N.: Author identification using deep learning. In: 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 898\u2013903 (2016). https:\/\/doi.org\/10.1109\/ICMLA.2016.0161","DOI":"10.1109\/ICMLA.2016.0161"},{"key":"23_CR20","doi-asserted-by":"publisher","unstructured":"Nguyen, H.H., Imine, A., Rusinowitch, M.: Detecting communities under differential privacy. In: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, WPES 2016, pp. 83\u201393. ACM, New York (2016). https:\/\/doi.org\/10.1145\/2994620.2994624, http:\/\/doi.acm.org\/10.1145\/2994620.2994624","DOI":"10.1145\/2994620.2994624"},{"key":"23_CR21","unstructured":"Papernot, N., Song, S., Mironov, I., Raghunathan, A., Talwar, K., Erlingsson, \u00da.: Scalable private learning with PATE. In: Sixth International Conference on Learning Representation (ICLR 2018) (2018)"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., Manning, C.D.: GloVe: global vectors for word representation. In: Empirical Methods in Natural Language Processing (EMNLP), pp. 1532\u20131543 (2014), http:\/\/www.aclweb.org\/anthology\/D14-1162","DOI":"10.3115\/v1\/D14-1162"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Phan, N., Wu, X., Hu, H., Dou, D.: Adaptive laplace mechanism: differential privacy preservation in deep learning. CoRR abs\/1709.05750 (2017). http:\/\/arxiv.org\/abs\/1709.05750","DOI":"10.1109\/ICDM.2017.48"},{"key":"23_CR24","unstructured":"Popov, V., Kudinov, M., Piontkovskaya, I., Vytovtov, P., Nevidomsky, A.: Distributed fine-tuning of language models on private data. In: International Conference on Learning Representations (2018). https:\/\/openreview.net\/forum?id=HkgNdt26Z"},{"key":"23_CR25","doi-asserted-by":"publisher","unstructured":"Taddy, M.: Document classification by inversion of distributed language representations. In: Proceedings of the 53rd Annual Meeting of the ACL and the 7th International Joint Conference on Natural Language Processing (Volume 2: Short Papers), pp. 45\u201349. Association for Computational Linguistics (2015). https:\/\/doi.org\/10.3115\/v1\/P15-2008, http:\/\/aclweb.org\/anthology\/P15-2008","DOI":"10.3115\/v1\/P15-2008"},{"key":"23_CR26","unstructured":"Vu, X.S., Jiang, L.: Self-adaptive privacy concern detection for user-generated content. In: Proceedings of the 19th International Conference on Computational Linguistics and Intelligent Text Processing (CICLing), Volume 1: Long papers (2018)"},{"key":"23_CR27","doi-asserted-by":"publisher","unstructured":"Vu, X.S., Jiang, L., Br\u00e4ndstr\u00f6m, A., Elmroth, E.: Personality-based knowledge extraction for privacy-preserving data analysis. In: Proceedings of the Knowledge Capture Conference, K-CAP 2017, pp. 45:1\u201345:4. ACM, New York (2017). https:\/\/doi.org\/10.1145\/3148011.3154479, http:\/\/doi.acm.org\/10.1145\/3148011.3154479","DOI":"10.1145\/3148011.3154479"},{"key":"23_CR28","doi-asserted-by":"crossref","unstructured":"Wang, R., Wang, X., Li, Z., Tang, H., Reiter, M.K., Dong, Z.: Privacy-preserving genomic computation through program specialization, pp. 338\u2013347. CCS (2009)","DOI":"10.1145\/1653662.1653703"},{"key":"23_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1007\/978-3-030-01270-0_37","volume-title":"Computer Vision \u2013 ECCV 2018","author":"Z Wu","year":"2018","unstructured":"Wu, Z., Wang, Z., Wang, Z., Jin, H.: Towards privacy-preserving visual recognition via adversarial training: a pilot study. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11220, pp. 627\u2013645. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01270-0_37"},{"key":"23_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Ding, N., Soricut, R.: SHAPED: shared-private encoder-decoder for text style adaptation. In: The 16th Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL) (2018)","DOI":"10.18653\/v1\/N18-1138"}],"container-title":["Lecture Notes in Computer Science","Computational Linguistics and Intelligent Text Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-24337-0_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,25]],"date-time":"2023-02-25T12:10:54Z","timestamp":1677327054000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-24337-0_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031243363","9783031243370"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-24337-0_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"26 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CICLing","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Linguistics and Intelligent Text Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"La Rochelle","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cicling2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cicling.org\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"335","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"95","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}