{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T22:40:42Z","timestamp":1760740842587,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819534555"},{"type":"electronic","value":"9789819534562"}],"license":[{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3456-2_9","type":"book-chapter","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T07:23:57Z","timestamp":1760599437000},"page":"117-132","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Categorized Privacy Neuron Editing: Addressing Heterogeneity for\u00a0Privacy Leakage Mitigation in\u00a0Language Models"],"prefix":"10.1007","author":[{"given":"Xiaole","family":"Yang","sequence":"first","affiliation":[]},{"given":"Peng","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"9_CR1","first-page":"1877","volume":"33","author":"T Brown","year":"2020","unstructured":"Brown, T., Mann, B., Ryder, N., et al.: Language models are few-shot learners. Adv. Neural. Inf. Process. Syst. 33, 1877\u20131901 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"9_CR2","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 1: Long and Short Papers), pp. 4171\u20134186 (2019)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Thakkar, O.D., Ramaswamy, S., Mathews, R., Beaufays, F.: Understanding unintended memorization in language models under federated learning. In: Proceedings of the Third Workshop on Privacy in Natural Language Processing, pp. 1\u201310 (2021)","DOI":"10.18653\/v1\/2021.privatenlp-1.1"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Henderson, P., et al.: Ethical challenges in data-driven dialogue systems. In: Proceedings of the 2018 AAAI\/ACM Conference on AI, Ethics, and Society, pp. 123\u2013129 (2018)","DOI":"10.1145\/3278721.3278777"},{"key":"9_CR5","unstructured":"Carlini, N., et\u00a0al.: Extracting training data from large language models. In: USENIX Security Symposium, pp. 2633\u20132650 (2021)"},{"key":"9_CR6","unstructured":"Garc\u00eda-Pablos, A., P\u00e9rez, N., Cuadros, M.: Sensitive data detection and classification in Spanish clinical text: experiments with BERT. In: Proceedings of the 12th Language Resources and Evaluation Conference, pp. 4486\u20134494 (2020)"},{"issue":"2","key":"9_CR7","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1540276.1540279","volume":"10","author":"B Zhou","year":"2008","unstructured":"Zhou, B., Pei, J., Luk, W.S.: A brief survey on anonymization techniques for privacy preserving publishing of social network data. ACM SIGKDD Explor. Newsl. 10(2), 12\u201322 (2008)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"9_CR8","unstructured":"Liu, Y., et\u00a0al.: Learning to anonymize face images. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 2512\u20132521 (2017)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Abadi, M., et\u00a0al.: Deep learning with differential privacy. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 308\u2013318 (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Bourtoule, L., et al.: Machine unlearning. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 141\u2013159 (2021)","DOI":"10.1109\/SP40001.2021.00019"},{"key":"9_CR11","unstructured":"Gupta, V., Jung, C., Neel, S., Roth, A., Sharifi-Malvajerdi, S., Waites, C.: Adaptive machine unlearning. In: Advances in Neural Information Processing Systems (NeurIPS), vol. 34, pp. 16319\u201316330 (2021)"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Wu, X., et\u00a0al.: DEPN: detecting and editing privacy neurons in pretrained language models. In: International Conference on Machine Learning (2023)","DOI":"10.18653\/v1\/2023.emnlp-main.174"},{"key":"9_CR13","unstructured":"Lison, P., et\u00a0al.: Differential privacy for text analytics via neural text sanitization. In: Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics (ACL), pp. 6653\u20136668 (2021)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Chen, R., Hu, T., Feng, Y., et\u00a0al.: Learnable privacy neurons localization in language models. arXiv preprint arXiv:2405.10989 (2024)","DOI":"10.18653\/v1\/2024.acl-short.25"},{"key":"9_CR15","unstructured":"Anil, R., et al.: Exploring the limits of privacy in large language models. In: Advances in Neural Information Processing Systems (NeurIPS), vol. 34, pp. 21345\u201321358 (2021)"},{"key":"9_CR16","unstructured":"Meng, K., Bau, D., Andonian, A., Belinkov, Y.: Locating and editing factual associations in GPT. In: Advances in Neural Information Processing Systems, vol. 35, pp. 17359\u201317372 (2022)"},{"issue":"12","key":"9_CR17","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0028071","volume":"4","author":"K El Emam","year":"2009","unstructured":"El Emam, K., et al.: A systematic review of re-identification attacks on health data. PLoS ONE 4(12), e8041 (2009)","journal-title":"PLoS ONE"},{"key":"9_CR18","unstructured":"Da, Yu., et al.: Differentially private fine-tuning of language models (2021)"},{"key":"9_CR19","unstructured":"Sundararajan, M., Taly, A., Yan, Q.: Axiomatic attribution for deep networks. arXiv preprint arXiv:1703.01365 (2017)"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Geva, M., Schuster, R., Berant, J., Levy, O.: Transformer feed-forward layers are key-value memories. In: Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, pp. 5484\u20135495 (2021)","DOI":"10.18653\/v1\/2021.emnlp-main.446"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Xianjun, W., Chen, R., Zhang, Y., et al.: Mitigating privacy seesaw in large language models: augmented privacy neuron editing via activation patching. In: Findings of the Association for Computational Linguistics: ACL 2024, pp. 5319\u20135332 (2024)","DOI":"10.18653\/v1\/2024.findings-acl.315"},{"key":"9_CR22","unstructured":"Klimt, B., Yang, Y.: Introducing the Enron Corpus. In: CEAS, vol. 45, pp. 92\u201396 (2004)"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3456-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T22:04:35Z","timestamp":1760738675000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3456-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"ISBN":["9789819534555","9789819534562"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3456-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"17 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors declare no competing interests relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"The link is already mentioned in the article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Data Availability"}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kyoto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adma2025.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}