{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:10:13Z","timestamp":1765545013246,"version":"3.40.3"},"publisher-location":"Cham","reference-count":57,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031887079","type":"print"},{"value":"9783031887086","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-88708-6_4","type":"book-chapter","created":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T11:50:44Z","timestamp":1743767444000},"page":"49-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Measuring Actual Privacy of\u00a0Obfuscated Queries in\u00a0Information Retrieval"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-8968-9485","authenticated-orcid":false,"given":"Francesco Luigi","family":"De Faveri","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5070-2049","authenticated-orcid":false,"given":"Guglielmo","family":"Faggioli","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9219-6239","authenticated-orcid":false,"given":"Nicola","family":"Ferro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,3]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","unstructured":"Ahmad, W.U., Chang, K., Wang, H.: Intent-aware query obfuscation for privacy protection in personalized web search. In: Collins-Thompson, K., Mei, Q., Davison, B.D., Liu, Y., Yilmaz, E. (eds.) The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval, SIGIR 2018, Ann Arbor, MI, USA, July 08-12, 2018, pp. 285\u2013294. ACM (2018). https:\/\/doi.org\/10.1145\/3209978.3209983","DOI":"10.1145\/3209978.3209983"},{"key":"4_CR2","unstructured":"Anderson, C.: The long tail. Mann, Ivanov & Ferber, Effective Business Model on the Internet-Moscow (2012)"},{"key":"4_CR3","doi-asserted-by":"publisher","unstructured":"Arampatzis, A., Drosatos, G., Efraimidis, P.: A versatile tool for privacy-enhanced web search. In: Serdyukov, P., et al. (eds.) Advances in Information Retrieval - 35th European Conference on IR Research, ECIR 2013, Moscow, Russia, March 24-27, 2013. Proceedings. Lecture Notes in Computer Science, vol.\u00a07814, pp. 368\u2013379. Springer (2013). https:\/\/doi.org\/10.1007\/978-3-642-36973-5_31","DOI":"10.1007\/978-3-642-36973-5_31"},{"key":"4_CR4","unstructured":"Bavadekar, S., et al.: Google COVID-19 search trends symptoms dataset: Anonymization process description (version 1.0). CoRR abs\/2009.01265 (2020). https:\/\/arxiv.org\/abs\/2009.01265"},{"key":"4_CR5","doi-asserted-by":"publisher","unstructured":"Blanco-Justicia, A., S\u00e1nchez, D., Domingo-Ferrer, J., Muralidhar, K.: A critical review on the use (and misuse) of differential privacy in machine learning. ACM Comput. Surv. 55(8), 160:1\u2013160:16 (2023). https:\/\/doi.org\/10.1145\/3547139","DOI":"10.1145\/3547139"},{"key":"4_CR6","doi-asserted-by":"publisher","unstructured":"Bo, H., Ding, S.H.H., Fung, B.C.M., Iqbal, F.: ER-AE: differentially private text generation for authorship anonymization. In: Toutanova, K., et al. (eds.) Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL-HLT 2021, Online, June 6-11, 2021, pp. 3997\u20134007. Association for Computational Linguistics (2021). https:\/\/doi.org\/10.18653\/V1\/2021.NAACL-MAIN.314, https:\/\/doi.org\/10.18653\/v1\/2021.naacl-main.314","DOI":"10.18653\/V1\/2021.NAACL-MAIN.314"},{"key":"4_CR7","doi-asserted-by":"publisher","unstructured":"Carvalho, R.S., Vasiloudis, T., Feyisetan, O., Wang, K.: TEM: high utility metric differential privacy on text. In: Shekhar, S., Zhou, Z., Chiang, Y., Stiglic, G. (eds.) Proceedings of the 2023 SIAM International Conference on Data Mining, SDM 2023, Minneapolis-St. Paul Twin Cities, MN, USA, April 27-29, 2023, pp. 883\u2013890. SIAM (2023). https:\/\/doi.org\/10.1137\/1.9781611977653.CH99","DOI":"10.1137\/1.9781611977653.CH99"},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Chatzikokolakis, K., Andr\u00e9s, M.E., Bordenabe, N.E., Palamidessi, C.: Broadening the scope of differential privacy using metrics. In: Cristofaro, E.D., Wright, M.K. (eds.) Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings. Lecture Notes in Computer Science, vol.\u00a07981, pp. 82\u2013102. Springer (2013). https:\/\/doi.org\/10.1007\/978-3-642-39077-7_5","DOI":"10.1007\/978-3-642-39077-7_5"},{"key":"4_CR9","doi-asserted-by":"publisher","unstructured":"Chau, M., Fang, X., Sheng, O.R.L.: Analysis of the query logs of a web site search engine. J. Assoc. Inf. Sci. Technol. 56(13), 1363\u20131376 (2005). https:\/\/doi.org\/10.1002\/ASI.20210","DOI":"10.1002\/ASI.20210"},{"key":"4_CR10","doi-asserted-by":"publisher","unstructured":"Chen, S., et al.: A customized text sanitization mechanism with differential privacy. In: Rogers, A., Boyd-Graber, J., Okazaki, N. (eds.) Findings of the Association for Computational Linguistics: ACL 2023, pp. 5747\u20135758. Association for Computational Linguistics, Toronto, Canada (2023). https:\/\/doi.org\/10.18653\/v1\/2023.findings-acl.355, https:\/\/aclanthology.org\/2023.findings-acl.355","DOI":"10.18653\/v1\/2023.findings-acl.355"},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"Clau\u00df, S., Schiffner, S.: Structuring anonymity metrics. In: Juels, A., Winslett, M., Goto, A. (eds.) Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006, pp. 55\u201362. ACM (2006). https:\/\/doi.org\/10.1145\/1179529.1179539","DOI":"10.1145\/1179529.1179539"},{"key":"4_CR12","doi-asserted-by":"publisher","unstructured":"Clifton, C., Tassa, T.: On syntactic anonymity and differential privacy. In: Chan, C.Y., Lu, J., N\u00f8rv\u00e5g, K., Tanin, E. (eds.) Workshops Proceedings of the 29th IEEE International Conference on Data Engineering, ICDE 2013, Brisbane, Australia, April 8-12, 2013, pp. 88\u201393. IEEE Computer Society (2013). https:\/\/doi.org\/10.1109\/ICDEW.2013.6547433","DOI":"10.1109\/ICDEW.2013.6547433"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Craswell, N., Mitra, B., Yilmaz, E., Campos, D.: Overview of the TREC 2020 deep learning track. CoRR abs\/2102.07662 (2021). https:\/\/arxiv.org\/abs\/2102.07662","DOI":"10.6028\/NIST.SP.1266.deep-overview"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Craswell, N., Mitra, B., Yilmaz, E., Campos, D., Voorhees, E.M.: Overview of the TREC 2019 deep learning track. CoRR abs\/2003.07820 (2020). https:\/\/arxiv.org\/abs\/2003.07820","DOI":"10.6028\/NIST.SP.1266.deep-overview"},{"key":"4_CR15","unstructured":"Damie, M., Hahn, F., Peter, A.: A highly accurate query-recovery attack against searchable encryption using non-indexed documents. In: Bailey, M.D., Greenstadt, R. (eds.) 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, pp. 143\u2013160. USENIX Association (2021). https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/damie"},{"key":"4_CR16","doi-asserted-by":"publisher","unstructured":"De Faveri, F.L., Faggioli, G., Ferro, N.: py-PANTERA: a Python PAckage for Natural language obfuscaTion Enforcing pRivacy & Anonymization. In: Proceedings of the 33rd ACM International Conference on Information and Knowledge Management (CIKM \u201924), October 21-25, 2024, Boise, ID, USA. p.\u00a06. Springer (2024). https:\/\/doi.org\/10.1145\/3627673.3679173, https:\/\/doi.org\/10.1145\/3627673.3679173","DOI":"10.1145\/3627673.3679173"},{"key":"4_CR17","doi-asserted-by":"publisher","unstructured":"De Faveri, F.L., Faggioli, G., Ferro, N.: Words Blending Boxes. Obfuscating Queries in Information Retrieval using Differential Privacy. CoRR abs\/2405.09306 (2024). https:\/\/doi.org\/10.48550\/ARXIV.2405.09306","DOI":"10.48550\/ARXIV.2405.09306"},{"key":"4_CR18","doi-asserted-by":"publisher","unstructured":"Domingo-Ferrer, J., S\u00e1nchez, D., Blanco-Justicia, A.: The limits of differential privacy (and its misuse in data release and machine learning). Commun. ACM 64(7), 33\u201335 (2021). https:\/\/doi.org\/10.1145\/3433638","DOI":"10.1145\/3433638"},{"key":"4_CR19","unstructured":"Duncan, G., Keller-McNulty, S., Stokes, L.: Disclosure risk vs. data utility: the RU confidentiality map. A Los Alamos National Laboratory Technical Report LA-UR-01-6428, 1\u201330 (2001)"},{"key":"4_CR20","doi-asserted-by":"publisher","unstructured":"Dwork, C., Kohli, N., Mulligan, D.K.: Differential privacy in practice: expose your epsilons! J. Priv. Confidentiality 9(2) (2019). https:\/\/doi.org\/10.29012\/JPC.689","DOI":"10.29012\/JPC.689"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) Theory of Cryptography, pp. 265\u2013284. Springer, Berlin, Heidelberg (2006)","DOI":"10.1007\/11681878_14"},{"key":"4_CR22","doi-asserted-by":"publisher","unstructured":"Faggioli, G., Ferro, N.: Query obfuscation for information retrieval through differential privacy. In: Goharian, N., Tonellotto, N., He, Y., Lipani, A., McDonald, G., Macdonald, C., Ounis, I. (eds.) Advances in Information Retrieval - 46th European Conference on Information Retrieval, ECIR 2024, Glasgow, UK, March 24-28, 2024, Proceedings, Part I. Lecture Notes in Computer Science, vol. 14608, pp. 278\u2013294. Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-56027-9_17","DOI":"10.1007\/978-3-031-56027-9_17"},{"key":"4_CR23","unstructured":"Faveri, F.L.D., Faggioli, G., Ferro, N.: Beyond the parameters: Measuring actual privacy in obfuscated texts. In: Roitero, K., Viviani, M., Maddalena, E., Mizzaro, S. (eds.) Proceedings of the 14th Italian Information Retrieval Workshop, Udine, Italy, September 5-6, 2024. CEUR Workshop Proceedings, vol.\u00a03802, pp. 53\u201357. CEUR-WS.org (2024). https:\/\/ceur-ws.org\/Vol-3802\/paper5.pdf"},{"key":"4_CR24","doi-asserted-by":"publisher","unstructured":"Feyisetan, O., Balle, B., Drake, T., Diethe, T.: Privacy- and utility-preserving textual analysis via calibrated multivariate perturbations. In: Caverlee, J., Hu, X.B., Lalmas, M., Wang, W. (eds.) Proceedings of the 13th International Conference on Web Search and Data Mining, pp. 178\u2013186. ACM (2020). https:\/\/doi.org\/10.1145\/3336191.3371856","DOI":"10.1145\/3336191.3371856"},{"key":"4_CR25","doi-asserted-by":"publisher","unstructured":"Feyisetan, O., Kasiviswanathan, S.: Private release of text embedding vectors. In: Pruksachatkun, Y., et al. (eds.) Proceedings of the First Workshop on Trustworthy Natural Language Processing, pp. 15\u201327. Association for Computational Linguistics, Online (2021). https:\/\/doi.org\/10.18653\/v1\/2021.trustnlp-1.3, https:\/\/aclanthology.org\/2021.trustnlp-1.3","DOI":"10.18653\/v1\/2021.trustnlp-1.3"},{"key":"4_CR26","doi-asserted-by":"publisher","unstructured":"Fr\u00f6be, M., Schmidt, E.O., Hagen, M.: Efficient query obfuscation with keyqueries. In: He, J., et al. (eds.) WI-IAT \u201921: IEEE\/WIC\/ACM International Conference on Web Intelligence, Melbourne VIC Australia, December 14\u201317, 2021, pp. 154\u2013161. ACM (2021). https:\/\/doi.org\/10.1145\/3486622.3493950","DOI":"10.1145\/3486622.3493950"},{"key":"4_CR27","doi-asserted-by":"publisher","unstructured":"Habernal, I.: When differential privacy meets NLP: the devil is in the detail. In: Moens, M., Huang, X., Specia, L., Yih, S.W. (eds.) Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, EMNLP 2021, Virtual Event \/ Punta Cana, Dominican Republic, 7-11 November, 2021, pp. 1522\u20131528. Association for Computational Linguistics (2021). https:\/\/doi.org\/10.18653\/V1\/2021.EMNLP-MAIN.114","DOI":"10.18653\/V1\/2021.EMNLP-MAIN.114"},{"key":"4_CR28","doi-asserted-by":"publisher","unstructured":"Hsu, J., et al.: Differential privacy: an economic method for choosing epsilon. In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 398\u2013410. IEEE Computer Society (2014). https:\/\/doi.org\/10.1109\/CSF.2014.35, https:\/\/doi.org\/10.1109\/CSF.2014.35","DOI":"10.1109\/CSF.2014.35"},{"key":"4_CR29","unstructured":"Izacard, G., et al.: Unsupervised dense information retrieval with contrastive learning. Trans. Mach. Learn. Res. 2022 (2022). https:\/\/openreview.net\/forum?id=jKN1pXi7b0"},{"key":"4_CR30","doi-asserted-by":"publisher","unstructured":"Jansen, B.J., Spink, A., Saracevic, T.: Real life, real users, and real needs: a study and analysis of user queries on the web. Inf. Process. Manag. 36(2), 207\u2013227 (2000). https:\/\/doi.org\/10.1016\/S0306-4573(99)00056-4","DOI":"10.1016\/S0306-4573(99)00056-4"},{"key":"4_CR31","unstructured":"Kang, Y., Liu, Y., Niu, B., Tong, X., Zhang, L., Wang, W.: Input perturbation: a new paradigm between central and local differential privacy. CoRR abs\/2002.08570 (2020). https:\/\/arxiv.org\/abs\/2002.08570"},{"key":"4_CR32","doi-asserted-by":"publisher","unstructured":"Klymenko, O., Meisenbacher, S., Matthes, F.: Differential privacy in natural language processing the story so far. In: Feyisetan, O., Ghanavati, S., Thaine, P., Habernal, I., Mireshghallah, F. (eds.) Proceedings of the Fourth Workshop on Privacy in Natural Language Processing, pp. 1\u201311. Association for Computational Linguistics, Seattle, United States (2022). https:\/\/doi.org\/10.18653\/v1\/2022.privatenlp-1.1, https:\/\/aclanthology.org\/2022.privatenlp-1.1","DOI":"10.18653\/v1\/2022.privatenlp-1.1"},{"key":"4_CR33","doi-asserted-by":"publisher","unstructured":"Kohli, N., Laskowski, P.: Epsilon voting: mechanism design for parameter selection in differential privacy. In: 2018 IEEE Symposium on Privacy-Aware Computing, PAC 2018, Washington, DC, USA, September 26-28, 2018, pp. 19\u201330. IEEE (2018). https:\/\/doi.org\/10.1109\/PAC.2018.00009","DOI":"10.1109\/PAC.2018.00009"},{"key":"4_CR34","doi-asserted-by":"publisher","unstructured":"Lee, J., Clifton, C.: How much is enough? Choosing $$\\epsilon $$ for differential privacy. In: Lai, X., Zhou, J., Li, H. (eds.) Information Security, 14th International Conference, ISC 2011, Xi\u2019an, China, October 26-29, 2011. Proceedings. Lecture Notes in Computer Science, vol.\u00a07001, pp. 325\u2013340. Springer (2011). https:\/\/doi.org\/10.1007\/978-3-642-24861-0_22","DOI":"10.1007\/978-3-642-24861-0_22"},{"key":"4_CR35","doi-asserted-by":"publisher","unstructured":"Mattern, J., Weggenmann, B., Kerschbaum, F.: The limits of word level differential privacy. In: Carpuat, M., de\u00a0Marneffe, M., Ru\u00edz, I.V.M. (eds.) Findings of the Association for Computational Linguistics: NAACL 2022, Seattle, WA, United States, July 10-15, 2022, pp. 867\u2013881. Association for Computational Linguistics (2022). https:\/\/doi.org\/10.18653\/V1\/2022.FINDINGS-NAACL.65, https:\/\/doi.org\/10.18653\/v1\/2022.findings-naacl.65","DOI":"10.18653\/V1\/2022.FINDINGS-NAACL.65"},{"key":"4_CR36","unstructured":"Meisenbacher, S.J., Nandakumar, N., Klymenko, A., Matthes, F.: A comparative analysis of word-level metric differential privacy: benchmarking the privacy-utility trade-off. In: Calzolari, N., Kan, M., Hoste, V., Lenci, A., Sakti, S., Xue, N. (eds.) Proceedings of the 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation, LREC\/COLING 2024, 20-25 May, 2024, Torino, Italy, pp. 174\u2013185. ELRA and ICCL (2024). https:\/\/aclanthology.org\/2024.lrec-main.16"},{"key":"4_CR37","doi-asserted-by":"publisher","unstructured":"Miller, G.A.: WordNet: a lexical database for English. Commun. ACM 38(11), 39\u201341 (1995). https:\/\/doi.org\/10.1145\/219717.219748","DOI":"10.1145\/219717.219748"},{"key":"4_CR38","doi-asserted-by":"publisher","unstructured":"Moffat, A., Zobel, J.: Rank-biased precision for measurement of retrieval effectiveness. ACM Trans. Inf. Syst. 27(1), 2:1\u20132:27 (2008). https:\/\/doi.org\/10.1145\/1416950.1416952","DOI":"10.1145\/1416950.1416952"},{"key":"4_CR39","doi-asserted-by":"publisher","unstructured":"Moore, T., Clayton, R.: Evil searching: compromise and recompromise of internet hosts for phishing. In: Dingledine, R., Golle, P. (eds.) Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers. Lecture Notes in Computer Science, vol.\u00a05628, pp. 256\u2013272. Springer (2009). https:\/\/doi.org\/10.1007\/978-3-642-03549-4_16","DOI":"10.1007\/978-3-642-03549-4_16"},{"key":"4_CR40","doi-asserted-by":"publisher","unstructured":"National Institute of Standards and Technology: Information security. Tech. Rep. National Institute of Standards and Technology Special Publication 800-60, Volume 1 Revision 1, August, 2008, U.S. Department of Commerce, Washington, D.C. (2008). https:\/\/doi.org\/10.6028\/NIST.SP.800-60v1r1","DOI":"10.6028\/NIST.SP.800-60v1r1"},{"key":"4_CR41","unstructured":"Nguyen, T., Rosenberg, M., Song, X., Gao, J., Tiwary, S., Majumder, R., Deng, L.: MS MARCO: a human generated machine reading comprehension dataset. In: Besold, T.R., Bordes, A., d\u2019Avila Garcez, A.S., Wayne, G. (eds.) Proceedings of the Workshop on Cognitive Computation: Integrating neural and symbolic approaches 2016 co-located with the 30th Annual Conference on Neural Information Processing Systems (NIPS 2016), Barcelona, Spain, December 9, 2016. CEUR Workshop Proceedings, vol.\u00a01773. CEUR-WS.org (2016). https:\/\/ceur-ws.org\/Vol-1773\/CoCoNIPS_2016_paper9.pdf"},{"key":"4_CR42","doi-asserted-by":"publisher","unstructured":"Rao, R.S., Pais, A.R.: Jail-Phish: an improved search engine based phishing detection system. Comput. Secur. 83, 246\u2013267 (2019). https:\/\/doi.org\/10.1016\/J.COSE.2019.02.011","DOI":"10.1016\/J.COSE.2019.02.011"},{"key":"4_CR43","unstructured":"R\u00e9nyi, A.: On measures of entropy and information. In: Proceedings of the fourth Berkeley symposium on mathematical statistics and probability, volume 1: contributions to the theory of statistics, vol.\u00a04, pp. 547\u2013562. University of California Press (1961)"},{"key":"4_CR44","unstructured":"Sanh, V., Debut, L., Chaumond, J., Wolf, T.: Distilbert, a distilled version of BERT: smaller, faster, cheaper and lighter. CoRR abs\/1910.01108 (2019). http:\/\/arxiv.org\/abs\/1910.01108"},{"key":"4_CR45","doi-asserted-by":"publisher","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017, pp. 3\u201318. IEEE Computer Society (2017). https:\/\/doi.org\/10.1109\/SP.2017.41","DOI":"10.1109\/SP.2017.41"},{"key":"4_CR46","doi-asserted-by":"publisher","unstructured":"Silvestri, F.: Mining query logs: turning search usage data into knowledge. Found. Trends Inf. Retr. 4(1-2), 1\u2013174 (2010). https:\/\/doi.org\/10.1561\/1500000013","DOI":"10.1561\/1500000013"},{"key":"4_CR47","doi-asserted-by":"publisher","unstructured":"Sousa, S., Kern, R.: How to keep text private? A systematic review of deep learning methods for privacy-preserving natural language processing. Artif. Intell. Rev. 56(2), 1427\u20131492 (2023). https:\/\/doi.org\/10.1007\/S10462-022-10204-6","DOI":"10.1007\/S10462-022-10204-6"},{"key":"4_CR48","doi-asserted-by":"publisher","unstructured":"Truex, S., Liu, L., Gursoy, M.E., Wei, W., Yu, L.: Effects of differential privacy and data skewness on membership inference vulnerability. In: First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2019, Los Angeles, CA, USA, December 12-14, 2019, pp. 82\u201391. IEEE (2019). https:\/\/doi.org\/10.1109\/TPS-ISA48467.2019.00019","DOI":"10.1109\/TPS-ISA48467.2019.00019"},{"key":"4_CR49","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Guyon, I., et al. (eds.) Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4-9, 2017, Long Beach, CA, USA, pp. 5998\u20136008 (2017)"},{"key":"4_CR50","doi-asserted-by":"crossref","unstructured":"Voorhees, E.M.: Overview of the TREC 2004 robust track. In: Voorhees, E.M., Buckland, L.P. (eds.) Proceedings of the Thirteenth Text REtrieval Conference, TREC 2004, Gaithersburg, Maryland, USA, November 16-19, 2004. NIST Special Publication, vol. 500-261. National Institute of Standards and Technology (NIST) (2004). http:\/\/trec.nist.gov\/pubs\/trec13\/papers\/ROBUST.OVERVIEW.pdf","DOI":"10.6028\/NIST.SP.500-261.robust-overview"},{"key":"4_CR51","doi-asserted-by":"publisher","unstructured":"Wagner, I., Eckhoff, D.: Technical privacy metrics: a systematic survey. ACM Comput. Surv. 51(3), 57:1\u201357:38 (2018). https:\/\/doi.org\/10.1145\/3168389, https:\/\/doi.org\/10.1145\/3168389","DOI":"10.1145\/3168389"},{"key":"4_CR52","doi-asserted-by":"publisher","unstructured":"Xu, Z., Aggarwal, A., Feyisetan, O., Teissier, N.: A differentially private text perturbation method using regularized mahalanobis metric. In: Proceedings of the Second Workshop on Privacy in NLP. Association for Computational Linguistics (2020). https:\/\/doi.org\/10.18653\/v1\/2020.privatenlp-1.2","DOI":"10.18653\/v1\/2020.privatenlp-1.2"},{"key":"4_CR53","doi-asserted-by":"publisher","unstructured":"Xu, Z., Aggarwal, A., Feyisetan, O., Teissier, N.: On a utilitarian approach to privacy preserving text generation. CoRR abs\/2104.11838 (2021). https:\/\/doi.org\/10.48550\/ARXIV.2104.11838","DOI":"10.48550\/ARXIV.2104.11838"},{"key":"4_CR54","doi-asserted-by":"publisher","unstructured":"Yue, X., Du, M., Wang, T., Li, Y., Sun, H., Chow, S.S.M.: Differential privacy for text analytics via natural text sanitization. In: Zong, C., Xia, F., Li, W., Navigli, R. (eds.) Findings of the Association for Computational Linguistics: ACL-IJCNLP 2021, pp. 3853\u20133866. Association for Computational Linguistics, Online (2021). https:\/\/doi.org\/10.18653\/v1\/2021.findings-acl.337, https:\/\/aclanthology.org\/2021.findings-acl.337","DOI":"10.18653\/v1\/2021.findings-acl.337"},{"key":"4_CR55","unstructured":"Zhang, T., Kishore, V., Wu, F., Weinberger, K.Q., Artzi, Y.: Bertscore: evaluating text generation with BERT. In: 8th International Conference on Learning Representations, ICLR 2020, Addis Ababa, Ethiopia, April 26-30, 2020. OpenReview.net (2020). https:\/\/openreview.net\/forum?id=SkeHuCVFDr"},{"key":"4_CR56","doi-asserted-by":"publisher","unstructured":"Zhao, Y., Chen, J.: A survey on differential privacy for unstructured data content. ACM Comput. Surv. 54(10s), 207:1\u2013207:28 (2022). https:\/\/doi.org\/10.1145\/3490237","DOI":"10.1145\/3490237"},{"key":"4_CR57","doi-asserted-by":"publisher","unstructured":"Zimmerman, S., Thorpe, A., Fox, C., Kruschwitz, U.: Investigating the interplay between searchers\u2019 privacy concerns and their search behavior. In: Piwowarski, B., Chevalier, M., Gaussier, \u00c9., Maarek, Y., Nie, J., Scholer, F. (eds.) Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2019, Paris, France, July 21-25, 2019, pp. 953\u2013956. ACM (2019). https:\/\/doi.org\/10.1145\/3331184.3331280","DOI":"10.1145\/3331184.3331280"}],"container-title":["Lecture Notes in Computer Science","Advances in Information Retrieval"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-88708-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T11:50:56Z","timestamp":1743767456000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-88708-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031887079","9783031887086"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-88708-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"3 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECIR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Information Retrieval","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lucca","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"47","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecir2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ecir2025.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}