{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:46:52Z","timestamp":1726066012964},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811527661"},{"type":"electronic","value":"9789811527678"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-2767-8_31","type":"book-chapter","created":{"date-parts":[[2020,1,25]],"date-time":"2020-01-25T15:02:35Z","timestamp":1579964555000},"page":"345-356","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Any Privacy Risk if Nobody\u2019s Personal Information Being Collected?"],"prefix":"10.1007","author":[{"given":"Tingting","family":"Feng","sequence":"first","affiliation":[]},{"given":"Xiaoyu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuchun","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Ti","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhongyan","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,26]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Weinsberg, U., Bhagat, S., Ioannidis, S., Taft, N.: BlurMe: inferring and obfuscating user gender based on ratings. In: ACM Conference on Recommender Systems, pp. 195\u2013202. ACM (2012)","DOI":"10.1145\/2365952.2365989"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Otterbacher, J.: Inferring gender of movie reviewers: exploiting writing style, content and metadata, pp. 369\u2013378 (2010)","DOI":"10.1145\/1871437.1871487"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Hu, J., Zeng, H.J., Li, H., Niu, C., Chen, Z.: Demographic prediction based on user\u2019s browsing behavior. In: International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May, pp. 151\u2013160. DBLP (2007)","DOI":"10.1145\/1242572.1242594"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Feng, T., et al.: Tags and titles of videos you watched tell your gender. In: IEEE International Conference on Communications, pp. 1837\u20131842. IEEE (2014)","DOI":"10.1109\/ICC.2014.6883590"},{"key":"31_CR5","unstructured":"Li, B., Yang, Q., Xue, X.: Can movies and books collaborate? Cross-domain collaborative filtering for sparsity reduction. In: IJCAI 2009, Proceedings of the, International Joint Conference on Artificial Intelligence, Pasadena, California, Usa, vol.38, pp. 2052\u20132057. DBLP (2009)"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Li, C.R., Sanjay, A., Yang, S.W., Lin, S.D.: Transfer learning for sequential recommendation model. In: Technologies and Applications of Artificial Intelligence, pp. 154\u2013161. IEEE (2017)","DOI":"10.1109\/TAAI.2016.7880159"},{"key":"31_CR7","unstructured":"Brain&Company: Seven years: Age of reason? 2005\u20132012: Creating value(s) in the digital age (2012). \nhttp:\/\/www.bain.com\/publications\/articles\/seven-years-age-of-reason-avignon-report.aspx"},{"key":"31_CR8","unstructured":"JD Data Research Institute: 2018 JD National Reading Report (2018). \nhttp:\/\/research.jd.com"},{"key":"31_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/11760146_14","volume-title":"Intelligence and Security Informatics","author":"J He","year":"2006","unstructured":"He, J., Chu, W.W., Liu, Z.: Inferring privacy information from social networks. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 154\u2013165. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11760146_14"},{"key":"31_CR10","unstructured":"Lindamood, J., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Inferring private information using social network data. In: International Conference on World Wide Web, pp. 1145\u20131146. ACM (2015)"},{"key":"31_CR11","unstructured":"Gong, N.Z., Liu, B.: You are who you know and how you behave: attribute inference attacks via users\u2019 social friends and behaviors (2016)"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Su, Y., Fu, Y., Tian, Q., Gao, X.: Cross-database age estimation based on transfer learning. In: IEEE International Conference on Acoustics Speech and Signal Processing, vol. 23, pp. 1270\u20131273. IEEE (2010)","DOI":"10.1109\/ICASSP.2010.5495414"},{"key":"31_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-319-03731-8_8","volume-title":"Advances in Multimedia Information Processing \u2013 PCM 2013","author":"Z Yao","year":"2013","unstructured":"Yao, Z., Zhang, Z., Hu, M., Wang, Y.: Cross-view gait-based gender classification by transfer learning. In: Huet, B., Ngo, C.-W., Tang, J., Zhou, Z.-H., Hauptmann, A.G., Yan, S. (eds.) PCM 2013. LNCS, vol. 8294, pp. 79\u201387. Springer, Cham (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-319-03731-8_8"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Castillo, S.R.M., Chen, Z.: Using transfer learning to identify privacy leaks in tweets. In: IEEE International Conference on Collaboration and Internet Computing, pp. 506\u2013513. IEEE (2017)","DOI":"10.1109\/CIC.2016.078"},{"key":"31_CR15","unstructured":"Chen, L., Zheng, J., Gao, M., Zhou, A., Zeng, W., Chen, H.: TLRec: transfer learning for cross-domain recommendation. Comput. Sci. 167\u2013172 (2012)"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Yang, X., Steck, H., Guo, Y., Liu, Y.: On top-k recommendation using social networks. In: ACM Conference on Recommender Systems, pp. 67\u201374. ACM (2012)","DOI":"10.1145\/2365952.2365969"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Bilge, A., Polat, H.: An improved profile-based CF scheme with privacy. In: Fifth IEEE International Conference on Semantic Computing, pp. 133\u2013140. IEEE (2011)","DOI":"10.1109\/ICSC.2011.20"},{"issue":"2","key":"31_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-015-5466-8","volume":"59","author":"T Feng","year":"2016","unstructured":"Feng, T., Guo, Y., Chen, Y.: A novel user behavioral aggregation method based on synonym groups in online video systems. Sci. China (Inform. Sci.) 59(2), 1\u20133 (2016)","journal-title":"Sci. China (Inform. Sci.)"},{"key":"31_CR19","unstructured":"Bond, F., Paik, K.: A survey of wordnets and their licenses (2012)"}],"container-title":["Communications in Computer and Information Science","Parallel Architectures, Algorithms and Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-2767-8_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,25]],"date-time":"2020-01-25T15:07:33Z","timestamp":1579964853000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-2767-8_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811527661","9789811527678"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-2767-8_31","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"26 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAAP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Parallel Architectures, Algorithms and Programming","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"paap2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/sdcs.sysu.edu.cn\/paap2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"121","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}