{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T04:11:15Z","timestamp":1743826275228,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031887192","type":"print"},{"value":"9783031887208","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-88720-8_31","type":"book-chapter","created":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T12:08:07Z","timestamp":1743768487000},"page":"190-196","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Query Obfuscation Strategies for\u00a0Information Retrieval"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-8968-9485","authenticated-orcid":false,"given":"Francesco Luigi","family":"De Faveri","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,3]]},"reference":[{"key":"31_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/978-3-642-36973-5_31","volume-title":"Advances in Information Retrieval","author":"A Arampatzis","year":"2013","unstructured":"Arampatzis, A., Drosatos, G., Efraimidis, P.S.: A versatile tool for privacy-enhanced web search. In: Serdyukov, P., et al. (eds.) ECIR 2013. LNCS, vol. 7814, pp. 368\u2013379. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36973-5_31"},{"key":"31_CR2","doi-asserted-by":"publisher","unstructured":"Carvalho, R.S., Vasiloudis, T., Feyisetan, O., Wang, K.: TEM: high utility metric differential privacy on text. In: Shekhar, S., Zhou, Z., Chiang, Y., Stiglic, G. (eds.) Proceedings of the 2023 SIAM International Conference on Data Mining, SDM 2023, Minneapolis-St. Paul Twin Cities, MN, USA, 27\u201329 April 2023, pp. 883\u2013890. SIAM (2023). https:\/\/doi.org\/10.1137\/1.9781611977653.CH99","DOI":"10.1137\/1.9781611977653.CH99"},{"key":"31_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-39077-7_5","volume-title":"Privacy Enhancing Technologies","author":"K Chatzikokolakis","year":"2013","unstructured":"Chatzikokolakis, K., Andr\u00e9s, M.E., Bordenabe, N.E., Palamidessi, C.: Broadening the scope of differential privacy using metrics. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 82\u2013102. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39077-7_5"},{"key":"31_CR4","doi-asserted-by":"publisher","unstructured":"Chen, S., et al.: A customized text sanitization mechanism with differential privacy. In: Rogers, A., Boyd-Graber, J., Okazaki, N. (eds.) Findings of the Association for Computational Linguistics: ACL 2023, Toronto, Canada, pp. 5747\u20135758. Association for Computational Linguistics (2023). https:\/\/doi.org\/10.18653\/v1\/2023.findings-acl.355. https:\/\/aclanthology.org\/2023.findings-acl.355","DOI":"10.18653\/v1\/2023.findings-acl.355"},{"issue":"8","key":"31_CR5","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1177\/1527476416644978","volume":"17","author":"J Cohn","year":"2016","unstructured":"Cohn, J.: My TiTo thinks i\u2019m gay: algorithmic culture and its discontents. Television New Media 17(8), 675\u2013690 (2016). https:\/\/doi.org\/10.1177\/1527476416644978","journal-title":"Television New Media"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Craswell, N., Mitra, B., Yilmaz, E., Campos, D., Voorhees, E.M.: Overview of the TREC 2019 deep learning track. CoRR abs\/2003.07820 (2020). https:\/\/arxiv.org\/abs\/2003.07820","DOI":"10.6028\/NIST.SP.1266.deep-overview"},{"key":"31_CR7","doi-asserted-by":"publisher","unstructured":"De Faveri, F.L., Faggioli, G., Ferro, N.: py-PANTERA: a Python package for natural language obfuscation enforcing privacy & anonymization. In: Proceedings of the 33rd ACM International Conference on Information and Knowledge Management (CIKM 2024), Boise, ID, USA, 21\u201325 October 2024, p.\u00a06. Springer (2024). https:\/\/doi.org\/10.1145\/3627673.3679173","DOI":"10.1145\/3627673.3679173"},{"key":"31_CR8","doi-asserted-by":"publisher","unstructured":"De Faveri, F.L., Faggioli, G., Ferro, N.: Words Blending Boxes. Obfuscating Queries in Information Retrieval using Differential Privacy. CoRR abs\/2405.09306 (2024). https:\/\/doi.org\/10.48550\/ARXIV.2405.09306","DOI":"10.48550\/ARXIV.2405.09306"},{"key":"31_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"key":"31_CR10","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-031-56027-9_17","volume-title":"ECIR 2024, Part I","author":"G Faggioli","year":"2024","unstructured":"Faggioli, G., Ferro, N.: Query obfuscation for information retrieval through differential privacy. In: Goharian, N., et al. (eds.) ECIR 2024, Part I. LNCS, vol. 14608, pp. 278\u2013294. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-56027-9_17"},{"key":"31_CR11","doi-asserted-by":"publisher","unstructured":"Feyisetan, O., Balle, B., Drake, T., Diethe, T.: Privacy- and utility-preserving textual analysis via calibrated multivariate perturbations. In: Caverlee, J., Hu, X.B., Lalmas, M., Wang, W. (eds.) Proceedings of the 13th International Conference on Web Search and Data Mining, pp. 178\u2013186. ACM (2020). https:\/\/doi.org\/10.1145\/3336191.3371856","DOI":"10.1145\/3336191.3371856"},{"key":"31_CR12","doi-asserted-by":"publisher","unstructured":"Fr\u00f6be, M., Schmidt, E.O., Hagen, M.: Efficient query obfuscation with keyqueries. In: He, J., et al. (eds.) WI-IAT 2021: IEEE\/WIC\/ACM International Conference on Web Intelligence, Melbourne VIC Australia, 14\u201317 December 2021, pp. 154\u2013161. ACM (2021). https:\/\/doi.org\/10.1145\/3486622.3493950","DOI":"10.1145\/3486622.3493950"},{"key":"31_CR13","doi-asserted-by":"publisher","first-page":"2132","DOI":"10.1109\/TIFS.2023.3262123","volume":"18","author":"F Houssiau","year":"2023","unstructured":"Houssiau, F., Li\u00e9nart, T., Hendrickx, J.M., de Montjoye, Y.: Web privacy: a formal adversarial model for query obfuscation. IEEE Trans. Inf. Forensics Secur. 18, 2132\u20132143 (2023). https:\/\/doi.org\/10.1109\/TIFS.2023.3262123","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"31_CR14","doi-asserted-by":"publisher","unstructured":"McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), Providence, RI, USA, Proceedings, 20\u201323 October 2007, pp. 94\u2013103. IEEE Computer Society (2007). https:\/\/doi.org\/10.1109\/FOCS.2007.41","DOI":"10.1109\/FOCS.2007.41"},{"issue":"11","key":"31_CR15","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/219717.219748","volume":"38","author":"GA Miller","year":"1995","unstructured":"Miller, G.A.: WordNet: a lexical database for English. Commun. ACM 38(11), 39\u201341 (1995). https:\/\/doi.org\/10.1145\/219717.219748","journal-title":"Commun. ACM"},{"key":"31_CR16","doi-asserted-by":"publisher","unstructured":"Pennington, J., Socher, R., Manning, C.D.: Glove: global vectors for word representation. In: Moschitti, A., Pang, B., Daelemans, W. (eds.) Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, EMNLP 2014, Doha, Qatar, 25\u201329 October 2014, A meeting of SIGDAT, a Special Interest Group of the ACL, pp. 1532\u20131543. ACL (2014). https:\/\/doi.org\/10.3115\/v1\/d14-1162","DOI":"10.3115\/v1\/d14-1162"},{"key":"31_CR17","doi-asserted-by":"publisher","unstructured":"Ragan, E.D., Kum, H., Ilangovan, G., Wang, H.: Balancing privacy and information disclosure in interactive record linkage with visual masking. In: Mandryk, R.L., Hancock, M., Perry, M., Cox, A.L. (eds.) Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI 2018, Montreal, QC, Canada, 21\u201326 April 2018, p.\u00a0326. ACM (2018). https:\/\/doi.org\/10.1145\/3173574.3173900","DOI":"10.1145\/3173574.3173900"},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Voorhees, E.M.: Overview of the TREC 2004 robust track. In: Voorhees, E.M., Buckland, L.P. (eds.) Proceedings of the Thirteenth Text REtrieval Conference, TREC 2004, Gaithersburg, Maryland, USA, 16\u201319 November 2004. NIST Special Publication, vol. 500-261. National Institute of Standards and Technology (NIST) (2004). http:\/\/trec.nist.gov\/pubs\/trec13\/papers\/ROBUST.OVERVIEW.pdf","DOI":"10.6028\/NIST.SP.500-261.robust-overview"},{"key":"31_CR19","doi-asserted-by":"publisher","unstructured":"Xu, Z., Aggarwal, A., Feyisetan, O., Teissier, N.: A differentially private text perturbation method using regularized mahalanobis metric. In: Proceedings of the Second Workshop on Privacy in NLP. Association for Computational Linguistics (2020). https:\/\/doi.org\/10.18653\/v1\/2020.privatenlp-1.2","DOI":"10.18653\/v1\/2020.privatenlp-1.2"},{"key":"31_CR20","doi-asserted-by":"publisher","unstructured":"Xu, Z., Aggarwal, A., Feyisetan, O., Teissier, N.: On a utilitarian approach to privacy preserving text generation. CoRR abs\/2104.11838 (2021). https:\/\/doi.org\/10.48550\/ARXIV.2104.11838","DOI":"10.48550\/ARXIV.2104.11838"},{"key":"31_CR21","doi-asserted-by":"publisher","unstructured":"Yue, X., Du, M., Wang, T., Li, Y., Sun, H., Chow, S.S.M.: Differential privacy for text analytics via natural text sanitization. In: Zong, C., Xia, F., Li, W., Navigli, R. (eds.) Findings of the Association for Computational Linguistics: ACL-IJCNLP 2021, pp. 3853\u20133866. Association for Computational Linguistics, Online (2021). https:\/\/doi.org\/10.18653\/v1\/2021.findings-acl.337. https:\/\/aclanthology.org\/2021.findings-acl.337","DOI":"10.18653\/v1\/2021.findings-acl.337"}],"container-title":["Lecture Notes in Computer Science","Advances in Information Retrieval"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-88720-8_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T12:08:10Z","timestamp":1743768490000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-88720-8_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031887192","9783031887208"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-88720-8_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"3 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECIR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Information Retrieval","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lucca","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"47","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecir2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ecir2025.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}