{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:16:30Z","timestamp":1743045390881,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031723438"},{"type":"electronic","value":"9783031723445"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-72344-5_26","type":"book-chapter","created":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T14:03:01Z","timestamp":1726495381000},"page":"386-401","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Semantics-Preserved Distortion for\u00a0Personal Privacy Protection in\u00a0Information Management"],"prefix":"10.1007","author":[{"given":"Jiajia","family":"Li","sequence":"first","affiliation":[]},{"given":"Lu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Letian","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Shitou","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zuchao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,17]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Alsentzer, E., et al.: Publicly available clinical BERT embeddings. In: 2nd Clinical Natural Language Processing Workshop, pp. 72\u201378. Association for Computational Linguistics, Minneapolis (2019)","DOI":"10.18653\/v1\/W19-1909"},{"issue":"3","key":"26_CR2","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1108\/OIR-03-2017-0090","volume":"42","author":"M Batet","year":"2018","unstructured":"Batet, M., S\u00e1nchez, D.: Semantic disclosure control: semantics meets data privacy. Online Inf. Rev. 42(3), 290\u2013303 (2018)","journal-title":"Online Inf. Rev."},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Beg, S., et al.: S-box design based on optimize lft parameter selection: a practical approach in recommendation system domain. Multimedia Tools Appl. 79, 11667\u201311684 (2020)","DOI":"10.1007\/s11042-019-08464-6"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Bodenreider, O.: The unified medical language system (umls): integrating biomedical terminology. Nucleic Acids Res. 32(suppl_1), D267\u2013D270 (2004)","DOI":"10.1093\/nar\/gkh061"},{"issue":"3","key":"26_CR5","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1093\/jamia\/ocz195","volume":"27","author":"L Bonomi","year":"2020","unstructured":"Bonomi, L., Jiang, X., Ohno-Machado, L.: Protecting patient privacy in survival analyses. J. Am. Med. Inf. Assoc. 27(3), 366\u2013375 (2020)","journal-title":"J. Am. Med. Inf. Assoc."},{"key":"26_CR6","unstructured":"Clark, C., Gardner, M.: Simple and effective multi-paragraph reading comprehension. CoRR arxiv:1710.10723 (2017)"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Corso, G.M.D., Gulli, A., Romani, F.: Ranking a stream of news. In: 14th International Conference on World Wide Web, pp. 97\u2013106. ACM, Chiba (2005)","DOI":"10.1145\/1060745.1060764"},{"key":"26_CR8","unstructured":"Devlin, J., Chang, M., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. In: 57th Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 4171\u20134186. Association for Computational Linguistics, Minneapolis (2019)"},{"key":"26_CR9","unstructured":"Dozat, T., Manning, C.D.: Deep biaffine attention for neural dependency parsing. In: 5th International Conference on Learning Representations. OpenReview.net, Toulon, France (2017)"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Dreiseitl, S., Vinterbo, S.A., Ohno-Machado, L.: Disambiguation data: extracting information from anonymized sources. In: American Medical Informatics Association Annual Symposium. AMIA, Washington, DC (2001)","DOI":"10.1197\/jamia.M1240"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Gao, T., Yao, X., Chen, D.: SimCSE: simple contrastive learning of sentence embeddings. In: 46th Conference on Empirical Methods in Natural Language Processing, pp. 6894\u20136910. Association for Computational Linguistics, Online and Punta Cana (2021)","DOI":"10.18653\/v1\/2021.emnlp-main.552"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"He, X., Lyu, L., Chen, C., Xu, Q.: Extracted BERT model leaks more information than you think! In: 47th Conference on Empirical Methods in Natural Language Processing, pp. 1530\u20131537. Association for Computational Linguistics, Abu Dhabi (2022)","DOI":"10.18653\/v1\/2022.emnlp-main.99"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Hovy, D., Johannsen, A., S\u00f8gaard, A.: User review sites as a resource for large-scale sociolinguistic studies. In: 24th International Conference on World Wide Web, pp. 452\u2013461 (2015)","DOI":"10.1145\/2736277.2741141"},{"key":"26_CR14","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. In: 3rd International Conference on Learning Representations. San Diego (2015)"},{"key":"26_CR15","unstructured":"Lan, Z., Chen, M., Goodman, S., Gimpel, K., Sharma, P., Soricut, R.: ALBERT: a lite BERT for self-supervised learning of language representations. CoRR arxiv:1909.11942 (2019)"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Lee, T., Edwards, B., Molloy, I.M., Su, D.: Defending against neural network model stealing attacks using deceptive perturbations. In: 40th IEEE Symposium on Security and Privacy Workshops, pp. 43\u201349. IEEE, San Francisco (2019)","DOI":"10.1109\/SPW.2019.00020"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Lehman, E., Jain, S., Pichotta, K., Goldberg, Y., Wallace, B.: Does BERT pretrained on clinical notes reveal sensitive data? In: 59th Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Association for Computational Linguistics, Online (2021)","DOI":"10.18653\/v1\/2021.naacl-main.73"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Li, G., Yin, G., Yang, J., Chen, F.: SDRM-LDP: a recommendation model based on local differential privacy. Wirel. Commun. Mob. Comput. 2021, 6640667:1\u20136640667:15 (2021)","DOI":"10.1155\/2021\/6640667"},{"issue":"1","key":"26_CR19","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1108\/LHT-11-2018-0166","volume":"40","author":"Y Li","year":"2022","unstructured":"Li, Y., Hu, X.: Social network analysis of law information privacy protection of cybersecurity based on rough set theory. Libr. Hi Tech. 40(1), 133\u2013151 (2022)","journal-title":"Libr. Hi Tech."},{"key":"26_CR20","unstructured":"Liu, X., Li, W., Fang, Y., Kim, A., Duh, K., Gao, J.: Stochastic answer networks for squad 2.0. CoRR arxiv:1809.09194 (2018)"},{"key":"26_CR21","unstructured":"Liu, Y., et al.: Roberta: a robustly optimized BERT pretraining approach. CoRR arxiv:1907.11692 (2019)"},{"key":"26_CR22","unstructured":"Ma, H., Chen, T., Hu, T., You, C., Xie, X., Wang, Z.: Undistillable: making a nasty teacher that CANNOT teach students. In: 9th International Conference on Learning Representations. OpenReview.net, Virtual Event (2021)"},{"issue":"2","key":"26_CR23","first-page":"313","volume":"19","author":"MP Marcus","year":"1993","unstructured":"Marcus, M.P., Santorini, B., Marcinkiewicz, M.A.: Building a large annotated corpus of English: the penn treebank. Comput. Linguistics 19(2), 313\u2013330 (1993)","journal-title":"Comput. Linguistics"},{"issue":"3","key":"26_CR24","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1016\/j.datak.2007.03.009","volume":"63","author":"ME Nergiz","year":"2007","unstructured":"Nergiz, M.E., Clifton, C.: Thoughts on k-anonymization. Data Knowl. Eng. 63(3), 622\u2013645 (2007)","journal-title":"Data Knowl. Eng."},{"key":"26_CR25","unstructured":"Peng, L., Li, Z., Zhao, H.: A novel metric for evaluating semantics preservation. CoRR arxiv:2110.01176 (2021)"},{"key":"26_CR26","doi-asserted-by":"crossref","unstructured":"Peng, L., Li, Z., Zhao, H.: Contextualized semantic distance between highly overlapped texts. In: 61st Findings of the Association for Computational Linguistics, pp. 10913\u201310931. Association for Computational Linguistics, Toronto (2023)","DOI":"10.18653\/v1\/2023.findings-acl.694"},{"key":"26_CR27","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., Manning, C.: GloVe: global vectors for word representation. In: 22nd Conference on Empirical Methods in Natural Language Processing, pp. 1532\u20131543. Association for Computational Linguistics, Doha (2014)","DOI":"10.3115\/v1\/D14-1162"},{"key":"26_CR28","doi-asserted-by":"crossref","unstructured":"Rajpurkar, P., Zhang, J., Lopyrev, K., Liang, P.: SQuAD: 100,000+ questions for machine comprehension of text. In: 21st Conference on Empirical Methods in Natural Language Processing, pp. 2383\u20132392. Association for Computational Linguistics, Austin (2016)","DOI":"10.18653\/v1\/D16-1264"},{"key":"26_CR29","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1162\/tacl_a_00266","volume":"7","author":"S Reddy","year":"2019","unstructured":"Reddy, S., Chen, D., Manning, C.D.: Coqa: a conversational question answering challenge. Trans. Assoc. Comput. Linguistics 7, 249\u2013266 (2019)","journal-title":"Trans. Assoc. Comput. Linguistics"},{"key":"26_CR30","doi-asserted-by":"crossref","unstructured":"Rondeau, M.A., Hazen, T.J.: Systematic error analysis of the Stanford question answering dataset. In: 56th Proceedings of the Workshop on Machine Reading for Question Answering, pp. 12\u201320. Association for Computational Linguistics, Melbourne (2018)","DOI":"10.18653\/v1\/W18-2602"},{"key":"26_CR31","unstructured":"Schler, J., Koppel, M., Argamon, S., Pennebaker, J.W.: Effects of age and gender on blogging. In: 20th Computational Approaches to Analyzing Weblogs of AAAI Spring Symposium, pp. 199\u2013205. AAAI, Stanford (2006)"},{"issue":"3","key":"26_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/JOEUC.20210501.oa1","volume":"33","author":"M Shuai","year":"2021","unstructured":"Shuai, M., Yu, N., Wang, H., Xiong, L., Li, Y.: A lightweight three-factor anonymous authentication scheme with privacy protection for personalized healthcare applications. J. Organ. End User Comput. 33(3), 1\u201318 (2021)","journal-title":"J. Organ. End User Comput."},{"issue":"4","key":"26_CR33","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1108\/JEIM-03-2020-0088","volume":"34","author":"J Tang","year":"2021","unstructured":"Tang, J., Akram, U., Shi, W.: Why people need privacy? the role of privacy fatigue in app users\u2019 intention to disclose privacy: based on personality traits. J. Enterp. Inf. Manag. 34(4), 1097\u20131120 (2021)","journal-title":"J. Enterp. Inf. Manag."},{"key":"26_CR34","doi-asserted-by":"crossref","unstructured":"Tjong Kim\u00a0Sang, E.F., De\u00a0Meulder, F.: Introduction to the CoNLL-2003 shared task: language-independent named entity recognition. In: 7th Conference on Natural Language Learning at HLT-NAACL, pp. 142\u2013147 (2003)","DOI":"10.3115\/1119176.1119195"},{"issue":"10","key":"26_CR35","doi-asserted-by":"publisher","first-page":"1745","DOI":"10.1093\/bioinformatics\/bty869","volume":"35","author":"X Wang","year":"2019","unstructured":"Wang, X., et al.: Cross-type biomedical named entity recognition with deep multi-task learning. Bioinform. 35(10), 1745\u20131752 (2019)","journal-title":"Bioinform."},{"key":"26_CR36","unstructured":"Wang, Z., Yan, Z., Yang, J.: Sgnet: structure guided network via gradient-frequency awareness for depth map super-resolution. CoRR arxiv:2312.05799 (2023)"},{"issue":"2","key":"26_CR37","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1002\/asi.24227","volume":"71","author":"Z Wu","year":"2020","unstructured":"Wu, Z., Li, R., Zhou, Z., Guo, J., Jiang, J., Su, X.: A user sensitive subject protection approach for book search service. J. Assoc. Inf. Sci. Technol. 71(2), 183\u2013195 (2020)","journal-title":"J. Assoc. Inf. Sci. Technol."},{"issue":"6","key":"26_CR38","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1108\/EL-07-2017-0162","volume":"36","author":"Z Wu","year":"2018","unstructured":"Wu, Z., Zheng, C., Xiejian, J., Zhou, Z., Xu, G., Chen, E.: An approach for the protection of users\u2019 book browsing preference privacy in a digital library. Electron. Libr. 36(6), 1154\u20131166 (2018)","journal-title":"Electron. Libr."},{"key":"26_CR39","unstructured":"Xu, Q., He, X., Lyu, L., Qu, L., Haffari, G.: Student surpasses teacher: imitation attack for black-box NLP APIs. In: 29th International Conference on Computational Linguistics. International Committee on Computational Linguistics, Gyeongju (2022)"},{"key":"26_CR40","unstructured":"Yang, Z., Dai, Z., Yang, Y., Carbonell, J.G., Salakhutdinov, R., Le, Q.V.: Xlnet: generalized autoregressive pretraining for language understanding. CoRR arxiv:1906.08237 (2019)"},{"key":"26_CR41","unstructured":"Yu, A.W., Dohan, D., Luong, M., Zhao, R., Chen, K., Norouzi, M., Le, Q.V.: Qanet: combining local convolution with global self-attention for reading comprehension. CoRR arxiv:1804.09541 (2018)"},{"key":"26_CR42","doi-asserted-by":"crossref","unstructured":"Yu, J., Bohnet, B., Poesio, M.: Named entity recognition as dependency parsing. In: 58th Annual Meeting of the Association for Computational Linguistics, pp. 6470\u20136476. Association for Computational Linguistics, Online (2020)","DOI":"10.18653\/v1\/2020.acl-main.577"},{"key":"26_CR43","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Zhou, H., Li, Z.: Fast and accurate neural CRF constituency parsing. In: 29th International Joint Conference on Artificial Intelligence, pp. 4046\u20134053. ijcai.org (2020)","DOI":"10.24963\/ijcai.2020\/560"},{"key":"26_CR44","unstructured":"Zhang, Z., et al.: Semantics-aware BERT for language understanding. CoRR arxiv:1909.02209 (2019)"},{"key":"26_CR45","unstructured":"Zhang, Z., Yang, J., Zhao, H.: Retrospective reader for machine reading comprehension. CoRR arxiv:2001.09694 (2020)"},{"key":"26_CR46","unstructured":"Zhu, C., Zeng, M., Huang, X.: Sdnet: contextualized attention-based deep network for conversational question answering. CoRR arxiv:1812.03593 (2018)"}],"container-title":["Lecture Notes in Computer Science","Artificial Neural Networks and Machine Learning \u2013 ICANN 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-72344-5_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T14:07:54Z","timestamp":1726495674000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-72344-5_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031723438","9783031723445"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-72344-5_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"17 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lugano","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Switzerland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icann2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}