{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T05:40:22Z","timestamp":1743658822315,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031823480","type":"print"},{"value":"9783031823497","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-82349-7_4","type":"book-chapter","created":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T05:18:49Z","timestamp":1743657529000},"page":"50-64","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Plausible Deniability of\u00a0Redacted Text"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7008-5201","authenticated-orcid":false,"given":"Vaibhav","family":"Gusain","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4056-4014","authenticated-orcid":false,"given":"Douglas","family":"Leith","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,2]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308\u2013318. CCS \u201916, Association for Computing Machinery, New York, NY, USA (2016). https:\/\/doi.org\/10.1145\/2976749.2978318","DOI":"10.1145\/2976749.2978318"},{"key":"4_CR2","unstructured":"Bosch, N., Crues, R., Shaik, N., Paquette, L.: Hello, [REDACTED]: protecting student privacy in analyses of online discussion forums. Grantee Submission (2020)"},{"key":"4_CR3","doi-asserted-by":"publisher","unstructured":"Brown, H., Lee, K., Mireshghallah, F., Shokri, R., Tram\u00e8r, F.: What does it mean for a language model to preserve privacy? In: 2022 ACM Conference on Fairness, Accountability, and Transparency, pp. 2280\u20132292. FAccT \u201922, Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3531146.3534642","DOI":"10.1145\/3531146.3534642"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Bun, M., Steinke, T.: Concentrated differential privacy: simplifications, extensions, and lower bounds (2016)","DOI":"10.1007\/978-3-662-53641-4_24"},{"key":"4_CR5","doi-asserted-by":"publisher","unstructured":"Chen, S., et al.: A customized text sanitization mechanism with differential privacy. In: Findings of the Association for Computational Linguistics: ACL 2023, pp. 5747\u20135758. Association for Computational Linguistics, Toronto, Canada (2023). https:\/\/doi.org\/10.18653\/v1\/2023.findings-acl.355","DOI":"10.18653\/v1\/2023.findings-acl.355"},{"key":"4_CR6","unstructured":"Doudalis, S., Kotsogiannis, I., Haney, S., Machanavajjhala, A., Mehrotra, S.: One-sided differential privacy (2017)"},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) Theory of Cryptography, pp. 265\u2013284. Springer, Berlin, Heidelberg (2006)"},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Feyisetan, O., Balle, B., Drake, T., Diethe, T.: Privacy- and utility-preserving textual analysis via calibrated multivariate perturbations. In: Proceedings of the 13th International Conference on Web Search and Data Mining, pp. 178\u2013186. WSDM \u201920, Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3336191.3371856","DOI":"10.1145\/3336191.3371856"},{"key":"4_CR9","doi-asserted-by":"publisher","unstructured":"Kifer, D., Machanavajjhala, A.: No free lunch in data privacy. In: Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data, pp. 193\u2013204. SIGMOD \u201911, Association for Computing Machinery, New York, NY, USA (2011). https:\/\/doi.org\/10.1145\/1989323.1989345","DOI":"10.1145\/1989323.1989345"},{"key":"4_CR10","doi-asserted-by":"publisher","unstructured":"Mattern, J., Weggenmann, B., Kerschbaum, F.: The limits of word level differential privacy. In: Findings of the Association for Computational Linguistics: NAACL 2022, pp. 867\u2013881. Association for Computational Linguistics, Seattle, United States (2022). https:\/\/doi.org\/10.18653\/v1\/2022.findings-naacl.65","DOI":"10.18653\/v1\/2022.findings-naacl.65"},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"Mironov, I.: R\u00e9nyi differential privacy. In: 2017 IEEE 30th Computer Security Foundations Symposium (CSF). IEEE (2017). https:\/\/doi.org\/10.1109\/csf.2017.11","DOI":"10.1109\/csf.2017.11"},{"key":"4_CR12","doi-asserted-by":"publisher","unstructured":"Murugadoss, K., et al.: Building a best-in-class automated de-identification tool for electronic health records through ensemble learning. medRxiv (2021). https:\/\/doi.org\/10.1101\/2020.12.22.20248270","DOI":"10.1101\/2020.12.22.20248270"},{"key":"4_CR13","doi-asserted-by":"publisher","unstructured":"Noshad, M., Moon, K.R., Sekeh, S.Y., Hero, A.O.: Direct estimation of information divergence using nearest neighbor ratios. In: 2017 IEEE International Symposium on Information Theory (ISIT). IEEE (2017). https:\/\/doi.org\/10.1109\/isit.2017.8006659","DOI":"10.1109\/isit.2017.8006659"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., Manning, C.D.: Glove: global vectors for word representation. In: Empirical Methods in Natural Language Processing (EMNLP), pp. 1532\u20131543 (2014). http:\/\/www.aclweb.org\/anthology\/D14-1162","DOI":"10.3115\/v1\/D14-1162"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Reimers, N., Gurevych, I.: Sentence-BERT: sentence embeddings using Siamese BERT-networks (2019)","DOI":"10.18653\/v1\/D19-1410"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Shi, W., Shea, R., Chen, S., Zhang, C., Jia, R., Yu, Z.: Just fine-tune twice: selective differential privacy for large language models. In: Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, pp. 6327\u20136340. Association for Computational Linguistics, Abu Dhabi, United Arab Emirates (2022). https:\/\/aclanthology.org\/2022.emnlp-main.425","DOI":"10.18653\/v1\/2022.emnlp-main.425"},{"key":"4_CR17","doi-asserted-by":"publisher","unstructured":"Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1310\u20131321. CCS \u201915, Association for Computing Machinery, New York, NY, USA (2015). https:\/\/doi.org\/10.1145\/2810103.2813687","DOI":"10.1145\/2810103.2813687"},{"key":"4_CR18","unstructured":"Voigt, R., Jurgens, D., Prabhakaran, V., Jurafsky, D., Tsvetkov, Y.: RtGender: a corpus for studying differential responses to gender. In: Proceedings of the Eleventh International Conference on Language Resources and Evaluation (LREC 2018). European Language Resources Association (ELRA), Miyazaki, Japan (2018). https:\/\/aclanthology.org\/L18-1445"},{"key":"4_CR19","doi-asserted-by":"publisher","unstructured":"Wen, Z., Lu, X.H., Reddy, S.: MeDAL: medical abbreviation disambiguation dataset for natural language understanding pretraining. In: Proceedings of the 3rd Clinical Natural Language Processing Workshop. Association for Computational Linguistics (2020). https:\/\/doi.org\/10.18653\/v1\/2020.clinicalnlp-1.15","DOI":"10.18653\/v1\/2020.clinicalnlp-1.15"},{"key":"4_CR20","doi-asserted-by":"publisher","unstructured":"Yue, X., Du, M., Wang, T., Li, Y., Sun, H., Chow, S.S.M.: Differential privacy for text analytics via natural text sanitization. In: Findings of the Association for Computational Linguistics: ACL-IJCNLP 2021, pp. 3853\u20133866. Association for Computational Linguistics (2021). https:\/\/doi.org\/10.18653\/v1\/2021.findings-acl.337","DOI":"10.18653\/v1\/2021.findings-acl.337"},{"key":"4_CR21","doi-asserted-by":"publisher","unstructured":"Zhao, X., Li, L., Wang, Y.X.: Provably confidential language modelling. In: Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 943\u2013955. Association for Computational Linguistics, Seattle, United States (2022). https:\/\/doi.org\/10.18653\/v1\/2022.naacl-main.69","DOI":"10.18653\/v1\/2022.naacl-main.69"}],"container-title":["Lecture Notes in Computer Science","Computer Security. ESORICS 2024 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-82349-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T05:19:05Z","timestamp":1743657545000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-82349-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031823480","9783031823497"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-82349-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}