{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T02:22:04Z","timestamp":1772936524061,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":35,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819564255","type":"print"},{"value":"9789819564262","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6426-2_4","type":"book-chapter","created":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T08:08:03Z","timestamp":1772870883000},"page":"41-53","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["KSDF: A\u00a0Knowledge-Based Sensitivity Detection Framework for\u00a0Film Reviews Using Graph Convolutional Network"],"prefix":"10.1007","author":[{"given":"Ruichen","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7940-7801","authenticated-orcid":false,"given":"Jiaying","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8209-1775","authenticated-orcid":false,"given":"Jing","family":"Shan","sequence":"additional","affiliation":[]},{"given":"Xiaoxu","family":"Song","sequence":"additional","affiliation":[]},{"given":"Haiwen","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,1]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Berardi, G., Esuli, A., Macdonald, C., Ounis, I., Sebastiani, F.: Semi-automated text classification for sensitivity identification. In: Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, pp. 1711\u20131714 (2015)","DOI":"10.1145\/2806416.2806597"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Cao, H., Li, H., He, Y., Yan, X., Yang, F., Wang, H.: GCMK: detecting spam movie review based on graph convolutional network embedding movie background knowledge. In: International Conference on Artificial Neural Networks, pp. 494\u2013505. Springer (2022)","DOI":"10.1007\/978-3-031-15931-2_41"},{"issue":"1","key":"4_CR3","first-page":"4656837","volume":"2022","author":"K Cong","year":"2022","unstructured":"Cong, K., Li, T., Li, B., Gao, Z., Xu, Y., Gao, F.: Kgdetector: detecting Chinese sensitive information via knowledge graph-enhanced Bert. Secur. Commun. Netw. 2022(1), 4656837 (2022)","journal-title":"Secur. Commun. Netw."},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Ding, M., Wang, X., Wu, C., Wang, K., Yang, X.: Research on automated detection of sensitive information based on bert. In: Journal of Physics: Conference Series. vol.\u00a01757, p. 012088. IOP Publishing (2021)","DOI":"10.1088\/1742-6596\/1757\/1\/012088"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1016\/j.future.2021.01.024","volume":"118","author":"C Gan","year":"2021","unstructured":"Gan, C., Feng, Q., Zhang, Z.: Scalable multi-channel dilated cnn-bilstm model with attention mechanism for chinese textual sentiment analysis. Futur. Gener. Comput. Syst. 118, 297\u2013309 (2021)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1109\/TMM.2020.2990085","volume":"23","author":"Y Gao","year":"2020","unstructured":"Gao, Y., Gong, M., Xie, Y., Qin, A.K.: An attention-based unsupervised adversarial model for movie review spam detection. IEEE Trans. Multimedia 23, 784\u2013796 (2020)","journal-title":"IEEE Trans. Multimedia"},{"key":"4_CR7","unstructured":"Garc\u00eda\u00a0Pablos, A., Perez, N., Cuadros, M.: Sensitive data detection and classification in Spanish clinical text: experiments with BERT. In: Calzolari, N., et al., (eds.) Proceedings of the Twelfth Language Resources and Evaluation Conference, pp. 4486\u20134494. European Language Resources Association, Marseille (2020). https:\/\/aclanthology.org\/2020.lrec-1.552\/"},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Hajek, P., Barushka, A., Munk, M.: Fake consumer review detection using deep neural networks integrating word embeddings and emotion mining. Neural Comput. Appl. 32(23), 17259\u201317274 (2020). https:\/\/doi.org\/10.1007\/s00521-020-04757-2","DOI":"10.1007\/s00521-020-04757-2"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"He, X., Zannettou, S., Shen, Y., Zhang, Y.: You only prompt once: on the capabilities of prompt learning on large language models to tackle toxic content. In: 2024 IEEE Symposium on Security and Privacy (SP), pp. 770\u2013787. IEEE (2024)","DOI":"10.1109\/SP54263.2024.00061"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Hong, Q., Zheng, T., Wenli, L., Jianwei, T., Hongyu, Z.: A sensitive information detection method based on network traffic restore. In: 2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), pp. 832\u2013836. IEEE (2020)","DOI":"10.1109\/ICMTMA50254.2020.00181"},{"issue":"6","key":"4_CR11","doi-asserted-by":"publisher","first-page":"3383","DOI":"10.3390\/app13063383","volume":"13","author":"L Huo","year":"2023","unstructured":"Huo, L., Jiang, J.: Research on intelligent perception algorithm for sensitive information. Appl. Sci. 13(6), 3383 (2023)","journal-title":"Appl. Sci."},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Opinion spam and analysis. In: Proceedings of the 2008 International Conference on Web Search and Data Mining, pp. 219\u2013230 (2008)","DOI":"10.1145\/1341531.1341560"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Kati\u0107, T., Mili\u0107evi\u0107, N.: Comparing sentiment analysis and document representation methods of amazon reviews. In: 2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY), pp. 000283\u2013000286. IEEE (2018)","DOI":"10.1109\/SISY.2018.8524814"},{"key":"4_CR14","first-page":"120","volume":"1","author":"A Lerer","year":"2019","unstructured":"Lerer, A., Wu, L., Shen, J., Lacroix, T., Wehrstedt, L., Bose, A., Peysakhovich, A.: Pytorch-biggraph: a large scale graph embedding system. Proc. Mach. Learn. Syst. 1, 120\u2013131 (2019)","journal-title":"Proc. Mach. Learn. Syst."},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Li, J., Ott, M., Cardie, C., Hovy, E.: Towards a general rule for identifying deceptive opinion spam. In: Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), pp. 1566\u20131576 (2014)","DOI":"10.3115\/v1\/P14-1147"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Lin, Y., Xu, G., Xu, G., Chen, Y., Sun, D.: Sensitive information detection based on convolution neural network and bi-directional LSTM. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1614\u20131621. IEEE (2020)","DOI":"10.1109\/TrustCom50675.2020.00223"},{"key":"4_CR17","doi-asserted-by":"publisher","unstructured":"Liu, C., Zhang, W., Chen, G., Wu, X., Luu, A.T., Chang, C., Bing, L.: Zero-shot text classification via self-supervised tuning. In: Rogers, A., Boyd-Graber, J.L., Okazaki, N. (eds.) Findings of the Association for Computational Linguistics: ACL 2023, Toronto, Canada, July 9-14, 2023, pp. 1743\u20131761. Association for Computational Linguistics (2023). https:\/\/doi.org\/10.18653\/V1\/2023.FINDINGS-ACL.110","DOI":"10.18653\/V1\/2023.FINDINGS-ACL.110"},{"key":"4_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2021.101865","volume":"103","author":"Y Liu","year":"2022","unstructured":"Liu, Y., Wang, L., Shi, T., Li, J.: Detection of spam reviews through a hierarchical attention architecture with n-gram cnn and bi-lstm. Inf. Syst. 103, 101865 (2022)","journal-title":"Inf. Syst."},{"issue":"3","key":"4_CR19","first-page":"20","volume":"6","author":"Y Mao","year":"2023","unstructured":"Mao, Y., Song, B., Zhang, Z., Yang, W., Lan, Y., et al.: A lightweight image sensitive information detection model based on yolov5s. Academic J. Comput. Inf. Sci. 6(3), 20\u201327 (2023)","journal-title":"Academic J. Comput. Inf. Sci."},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-319-93040-4_30","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"J Neerbek","year":"2018","unstructured":"Neerbek, J., Assent, I., Dolog, P.: Detecting complex sensitive information via phrase structure in recursive neural networks. In: Phung, D., Tseng, V.S., Webb, G.I., Ho, B., Ganji, M., Rashidi, L. (eds.) PAKDD 2018. LNCS (LNAI), vol. 10939, pp. 373\u2013385. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93040-4_30"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Neerbeky, J., Assentz, I., Dolog, P.: Taboo: detecting unstructured sensitive information using recursive neural networks. In: 2017 IEEE 33rd International Conference on Data Engineering (ICDE), pp. 1399\u20131400. IEEE (2017)","DOI":"10.1109\/ICDE.2017.195"},{"key":"4_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102274","volume":"106","author":"A Neisari","year":"2021","unstructured":"Neisari, A., Rueda, L., Saad, S.: Spam review detection using self-organizing maps and convolutional neural networks. Comput. Secur. 106, 102274 (2021)","journal-title":"Comput. Secur."},{"key":"4_CR23","unstructured":"Nkhata, G., Gauch, S., Anjum, U., Zhan, J.: Fine-tuning Bert with bidirectional LSTM for fine-grained movie reviews sentiment analysis. arXiv preprint arXiv:2502.20682 (2025)"},{"key":"4_CR24","unstructured":"Ott, M., Choi, Y., Cardie, C., Hancock, J.T.: Finding deceptive opinion spam by any stretch of the imagination. In: Lin, D., Matsumoto, Y., Mihalcea, R. (eds.) Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, pp. 309\u2013319. Association for Computational Linguistics, Portland (2011). https:\/\/aclanthology.org\/P11-1032\/"},{"issue":"2","key":"4_CR25","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1111\/coin.12400","volume":"37","author":"S Soubraylu","year":"2021","unstructured":"Soubraylu, S., Rajalakshmi, R.: Hybrid convolutional bidirectional recurrent neural network based sentiment analysis on movie reviews. Comput. Intell. 37(2), 735\u2013757 (2021)","journal-title":"Comput. Intell."},{"key":"4_CR26","doi-asserted-by":"publisher","unstructured":"Spiegel, M., Macko, D.: Kinit at semeval-2024 task 8: fine-tuned LLMs for multilingual machine-generated text detection. In: Ojha, A.K., Dogru\u00f6z, A.S., Madabushi, H.T., Martino, G.D.S., Rosenthal, S., Ros\u00e1, A. (eds.) Proceedings of the 18th International Workshop on Semantic Evaluation, SemEval@NAACL 2024, Mexico City, Mexico, June 20-21, 2024, pp. 558\u2013564. Association for Computational Linguistics (2024). https:\/\/doi.org\/10.18653\/V1\/2024.SEMEVAL-1.84","DOI":"10.18653\/V1\/2024.SEMEVAL-1.84"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Wang, J., Cao, L., Shan, J., Song, X., Jiang, J.: Dual learning model of code summary and generation based on transformer. In: International Conference on Web Information Systems and Applications, pp. 41\u201352. Springer (2024)","DOI":"10.1007\/978-981-97-7707-5_4"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Wang, J., Hao, S., Shan, J., Song, X.: Visual language\u2013let the product say what you want. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 23841\u201323843 (2024)","DOI":"10.1609\/aaai.v38i21.30583"},{"key":"4_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114557","volume":"171","author":"J Wang","year":"2021","unstructured":"Wang, J., Shan, J., Santos, O.E., Bao, J.: High quality error-tolerant phrase mining on text corpus. Expert Syst. Appl. 171, 114557 (2021)","journal-title":"Expert Syst. Appl."},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Wang, J., Yang, H., Shan, J., Song, X., Jiang, J.: Attention-based spatial-temporal fusion networks for traffic flow prediction. In: International Conference on Web Information Systems and Applications, pp. 500\u2013511. Springer (2024)","DOI":"10.1007\/978-981-97-7707-5_41"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"Wang, Y., Shen, X., Yang, Y.: The classification of Chinese sensitive information based on Bert-CNN. In: International Symposium on Intelligence Computation and Applications, pp. 269\u2013280. Springer (2019)","DOI":"10.1007\/978-981-15-5577-0_20"},{"key":"4_CR32","doi-asserted-by":"publisher","unstructured":"Wang, Z., Pang, Y., Lin, Y., Zhu, X.: Adaptable and reliable text classification using large language models. In: IEEE International Conference on Data Mining, ICDM 2024 - Workshops, Abu Dhabi, United Arab Emirates, December 9, 2024, pp. 67\u201374. IEEE (2024). https:\/\/doi.org\/10.1109\/ICDMW65004.2024.00015","DOI":"10.1109\/ICDMW65004.2024.00015"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Xu, G., Qi, C., Yu, H., Xu, S., Zhao, C., Yuan, J.: Detecting sensitive information of unstructured text using convolutional neural network. In: 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 474\u2013479. IEEE (2019)","DOI":"10.1109\/CyberC.2019.00087"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Zhang, B.: A Bert-CNN based approach on movie review sentiment analysis. In: SHS Web of Conferences. vol.\u00a0163, p. 04007. EDP Sciences (2023)","DOI":"10.1051\/shsconf\/202316304007"},{"issue":"17","key":"4_CR35","doi-asserted-by":"publisher","first-page":"7541","DOI":"10.3390\/app14177541","volume":"14","author":"R Zhang","year":"2024","unstructured":"Zhang, R., Zhu, D., Wu, C., Xu, J., Wu, C.H.: Sensitive information detection based on deep learning models. Appl. Sci. 14(17), 7541 (2024)","journal-title":"Appl. Sci."}],"container-title":["Lecture Notes in Computer Science","Web Information Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6426-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T08:08:08Z","timestamp":1772870888000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6426-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819564255","9789819564262"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6426-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"1 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wisa22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ccf.org.cn\/Chapters\/TC\/TC_Listing\/TCIS_\/tzzw\/2025-02-21\/838214.shtml","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}