{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T18:40:03Z","timestamp":1746297603066,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662438855"},{"type":"electronic","value":"9783662438862"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43886-2_31","type":"book-chapter","created":{"date-parts":[[2014,7,8]],"date-time":"2014-07-08T09:11:39Z","timestamp":1404810699000},"page":"437-451","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services"],"prefix":"10.1007","author":[{"given":"Hoang-Quoc","family":"Nguyen-Son","sequence":"first","affiliation":[]},{"given":"Anh-Tu","family":"Hoang","sequence":"additional","affiliation":[]},{"given":"Minh-Triet","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Hiroshi","family":"Yoshiura","sequence":"additional","affiliation":[]},{"given":"Noboru","family":"Sonehara","sequence":"additional","affiliation":[]},{"given":"Isao","family":"Echizen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,9]]},"reference":[{"key":"31_CR1","unstructured":"Arnold, B.: Caslon Analytics privacy guide (2007). http:\/\/www.caslon.com.au\/privacyguide4.htm"},{"key":"31_CR2","unstructured":"Chang, A.X., Manning, C.: Sutime: a library for recognizing and normalizing time expressions. In: Chair, N.C.C., Choukri, K., Declerck, T., Doan, M.U., Maegaard, B., Mariani, J., Odijk, J., Piperidis, S. (eds.) Proceedings of the Eight International Conference on Language Resources and Evaluation (LREC\u201912), Istanbul, Turkey, May 2012. European Language Resources Association (ELRA) (2012)"},{"key":"31_CR3","unstructured":"Chang, C.Y., Clark, S.: Adjective deletion for linguistic steganography and secret sharing. In: Proceedings of the 24th International Conference on Computational Linguistics, pp. 493\u2013510 (2012)"},{"key":"31_CR4","unstructured":"Han, B., Cook, P., Baldwin, T.: Automatically constructing a normalisation dictionary for microblogs. In: Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, EMNLP-CoNLL \u201912, pp. 421\u2013432. Association for Computational Linguistics, Stroudsburg (2012)"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Klein, D., Manning, C.D.: Accurate unlexicalized parsing. In: Proceedings of the 41st Annual Meeting on Association for Computational Linguistics - Volume 1, ACL \u201903, pp. 423\u2013430. Association for Computational Linguistics, Stroudsburg (2003)","DOI":"10.3115\/1075096.1075150"},{"key":"31_CR6","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-540-73599-1_31","volume-title":"Artificial Intelligence in Medicine","author":"D Kokkinakis","year":"2007","unstructured":"Kokkinakis, D., Thurin, A.: Anonymisation of Swedish clinical data. In: Bellazzi, R., Abu-Hanna, A., Hunter, J. (eds.) AIME 2007. LNCS (LNAI), vol. 4594, pp. 237\u2013241. Springer, Heidelberg (2007)"},{"key":"31_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-540-89598-5_11","volume-title":"Advances in Information and Computer Security","author":"I-F Lam","year":"2008","unstructured":"Lam, I.-F., Chen, K.-T., Chen, L.-J.: Involuntary information leakage in social network services. In: Matsuura, K., Fujisaki, E. (eds.) IWSEC 2008. LNCS, vol. 5312, pp. 167\u2013183. Springer, Heidelberg (2008)"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Nguyen-Son, H.Q., Nguyen, Q.B., Tran, M.T., Nguyen, D.T., Yoshiura, H., Echizen, I.: Automatic anonymization of natural languages texts posted on social networking services and automatic detection of disclosure. In: The 7th International Workshop on Frontiers in Availability, Reliability and Security (FARES 2012) Proceedings of the International Conference on Availability, Reliability and Security (ARES 2012), pp. 358\u2013364. IEEE (2012)","DOI":"10.1109\/ARES.2012.18"},{"key":"31_CR9","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1007\/978-94-007-4516-2_77","volume-title":"Future Information Technology, Application, and Service","author":"H-Q Nguyen-Son","year":"2012","unstructured":"Nguyen-Son, H.-Q., Nguyen, Q.-B., Tran, M.-T., Nguyen, D.-T., Yoshiura, H., Echizen, I.: New approach to anonymity of user information on social networking services. In: Park, J.J., Leung, V.C.M., Wang, C.-L., Shon, T. (eds.) Future Information Technology, Application, and Service. LNEE, vol. 164, pp. 731\u2013739. Springer, Heidelberg (2012)"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Nguyen-Son, H.Q., Tran, M.T., Tran, T.D., Yoshiura, H., Sonehara, N., Echizen, I.: Automatic anonymization of natural languages texts posted on social networking services and automatic detection of disclosure. In: Proceedings of the 11th International Workshop on Digital-Forensics and Watermarking (IWDW 2012). pp. 731\u2013739. Springer (2012)","DOI":"10.1109\/ARES.2012.18"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Noro, T., Inui, T., Takamura, H., Okumura, M.: Time period identification of events in text. In: Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the Association for Computational Linguistics, ACL-44, pp. 1153\u20131160. Association for Computational Linguistics, Stroudsburg (2006)","DOI":"10.3115\/1220175.1220320"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Ounis, I., Macdonald, C., Lin, J., Soboroff, I.: Overview of the TREC-2011 microblog track. In: Proceedings of the 20th Text REtrieval Conference (TREC 2011) (2011)","DOI":"10.6028\/NIST.SP.500-296.microblog-overview"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information. In: Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, PODS \u201998, pp. 188\u2013188. ACM, New York (1998)","DOI":"10.1145\/275487.275508"},{"key":"31_CR14","unstructured":"Shuyo, N.: Language detection library for java (2010). http:\/\/code.google.com\/p\/language-detection\/"},{"key":"31_CR15","unstructured":"Str\u00f6tgen, J., Gertz, M.: Heideltime: high quality rule-based extraction and normalization of temporal expressions. In: Proceedings of the 5th International Workshop on Semantic Evaluation, SemEval \u201910, pp. 321\u2013324. Association for Computational Linguistics, Stroudsburg (2010)"},{"issue":"2","key":"31_CR16","first-page":"2","volume":"4","author":"F Stutzman","year":"2012","unstructured":"Stutzman, F., Gross, R., Acquisti, A.: Silent listeners: the evolution of privacy and disclosure on facebook. J. Priv. Confid. 4(2), 2 (2012)","journal-title":"J. Priv. Confid."},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Suchanek, F.M., Kasneci, G., Weikum, G.: Yago: a core of semantic knowledge. In: Proceedings of the 16th international Conference on World Wide Web, WWW \u201907, pp. 697\u2013706. ACM, New York (2007)","DOI":"10.1145\/1242572.1242667"},{"key":"31_CR18","unstructured":"Tam, D.: Facebook by the numbers: 1.06 billion monthly active users (2013). http:\/\/news.cnet.com\/8301-1023_3-57566550-93\/facebook-by-the-numbers-1.06-billion-monthly-active-users\/"},{"issue":"04","key":"31_CR19","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1142\/S1793351X10001097","volume":"04","author":"N UzZaman","year":"2010","unstructured":"UzZaman, N., Allen, J.F.: Event and temporal expression extraction from raw text: first step towards a temporally aware system. Int. J. Semant. Comput. 04(04), 487\u2013508 (2010)","journal-title":"Int. J. Semant. Comput."}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43886-2_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T18:11:26Z","timestamp":1746295886000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-43886-2_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662438855","9783662438862"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43886-2_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"9 July 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}