{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T20:00:56Z","timestamp":1772913656421,"version":"3.50.1"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319930398","type":"print"},{"value":"9783319930404","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93040-4_30","type":"book-chapter","created":{"date-parts":[[2018,6,16]],"date-time":"2018-06-16T13:29:41Z","timestamp":1529155781000},"page":"373-385","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Detecting Complex Sensitive Information via Phrase Structure in Recursive Neural Networks"],"prefix":"10.1007","author":[{"given":"Jan","family":"Neerbek","sequence":"first","affiliation":[]},{"given":"Ira","family":"Assent","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Dolog","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,17]]},"reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Berardi, G., Esuli, A., Macdonald, C., Ounis, I., Sebastiani, F.: Semi-automated text classification for sensitivity identification. In: CIKM, pp. 1711\u20131714 (2015)","DOI":"10.1145\/2806416.2806597"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Chow, R., Philippe, G., Staddon, J.: Detecting privacy leaks using corpus-based association rules. In: ACM SIGKDD, pp. 893\u2013901 (2008)","DOI":"10.1145\/1401890.1401997"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Cormack, G.V., Grossman, M.R., Hedin, B., Oard, D.W.: Overview of the TREC 2010 legal track. In: TREC (2010)","DOI":"10.6028\/NIST.SP.500-294.legal-overview"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Goller, C., Kuchler, A.: Learning task-dependent distributed representations by backpropagation through structure. In: IEEE ICNN, pp. 347\u2013352 (1996)","DOI":"10.1109\/ICNN.1996.548916"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Grechanik, M., McMillan, C., Dasgupta, T., Poshyvanyk, D., Gethers, M.: Redacting sensitive information in software artifacts. In: ICPC, pp. 314\u2013325 (2014)","DOI":"10.1145\/2597008.2597138"},{"key":"30_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-642-22263-4_2","volume-title":"Privacy Enhancing Technologies","author":"M Hart","year":"2011","unstructured":"Hart, M., Manadhata, P., Johnson, R.: Text classification for data loss prevention. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 18\u201337. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22263-4_2"},{"key":"30_CR7","unstructured":"Irsoy, O., Cardie, C.: Deep recursive neural networks for compositionality in language. In: NIPS, pp. 2096\u20132104 (2014)"},{"key":"30_CR8","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-540-30115-8_22","volume-title":"Machine Learning: ECML 2004","author":"B Klimt","year":"2004","unstructured":"Klimt, B., Yang, Y.: The enron corpus: a new dataset for email classification research. In: Boulicaut, J.-F., Esposito, F., Giannotti, F., Pedreschi, D. (eds.) ECML 2004. LNCS (LNAI), vol. 3201, pp. 217\u2013226. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30115-8_22"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., Manning, C.D.: Glove: global vectors for word representation. In: EMNLP, pp. 1532\u20131543 (2014)","DOI":"10.3115\/v1\/D14-1162"},{"key":"30_CR10","first-page":"148","volume":"67","author":"D S\u00e1nchez","year":"2016","unstructured":"S\u00e1nchez, D., Batet, M.: C-sanitized: a privacy model for document redaction and sanitization. JASIST 67, 148\u2013163 (2016)","journal-title":"JASIST"},{"key":"30_CR11","unstructured":"Socher, R., Huang, E.H., Pennin, J., Manning, C.D., Ng, A.Y.: Dynamic pooling and unfolding recursive autoencoders for paraphrase detection. In: NIPS (2011)"},{"key":"30_CR12","unstructured":"Socher, R., Lin, C.C., Manning, C., Ng, A.Y.: Parsing natural scenes and natural language with recursive neural networks. In: ICML, pp. 129\u2013136 (2011)"},{"key":"30_CR13","unstructured":"Socher, R., Manning, C.D., Ng, A.Y.: Learning continuous phrase representations and syntactic parsing with recursive neural networks. In: NIPS WS Deep Learning and Unsupervised Feature Learning, pp. 1\u20139 (2010)"},{"key":"30_CR14","doi-asserted-by":"crossref","unstructured":"Socher, R., Perelygin, A., Wu, J.Y., Chuang, J., Manning, C.D., Ng, A.Y., Potts, C.: Recursive deep models for semantic compositionality over a sentiment treebank. In: EMNLP, pp. 1631\u20131642 (2013)","DOI":"10.18653\/v1\/D13-1170"},{"key":"30_CR15","series-title":"Text, Speech and Language Technology","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-010-0201-1_1","volume-title":"Treebanks","author":"A Taylor","year":"2003","unstructured":"Taylor, A., Marcus, M., Santorini, B.: The Penn treebank: an overview. In: Abeill\u00e9, A. (ed.) Treebanks. Text, Speech and Language Technology, vol. 20. Springer, Dordrecht (2003). https:\/\/doi.org\/10.1007\/978-94-010-0201-1_1"},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"Tomlinson, S.: Learning task experiments in the TREC 2010 legal track. In: TREC (2010)","DOI":"10.6028\/NIST.SP.500-294.legal-ot"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93040-4_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T04:38:55Z","timestamp":1751690335000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-93040-4_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319930398","9783319930404"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93040-4_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"17 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/prada-research.net\/pakdd18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}