{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:41:25Z","timestamp":1742913685231,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819615445"},{"type":"electronic","value":"9789819615452"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1545-2_14","type":"book-chapter","created":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T16:55:41Z","timestamp":1739379341000},"page":"228-248","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Privacy Protection with\u00a0Large Language Model in\u00a0Social Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-8321-5982","authenticated-orcid":false,"given":"Yizhe","family":"Xie","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5319-4599","authenticated-orcid":false,"given":"Congcong","family":"Zhu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6324-1315","authenticated-orcid":false,"given":"Xinyue","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1599-5667","authenticated-orcid":false,"given":"Xiangyu","family":"Hu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5064-6526","authenticated-orcid":false,"given":"Xuan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,13]]},"reference":[{"issue":"1","key":"14_CR1","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1080\/15427951.2005.10129098","volume":"2","author":"P Berkhin","year":"2005","unstructured":"Berkhin, P.: A survey on PageRank computing. Internet Math. 2(1), 73\u2013120 (2005)","journal-title":"Internet Math."},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Bhagat, S., Cormode, G., Krishnamurthy, B., Srivastava, D.: Privacy in dynamic social networks. In: Proceedings of the 19th International Conference on World Wide Web, pp. 1059\u20131060 (2010)","DOI":"10.1145\/1772690.1772803"},{"key":"14_CR3","doi-asserted-by":"publisher","first-page":"1096","DOI":"10.1016\/j.future.2019.07.011","volume":"101","author":"KB Chaaya","year":"2019","unstructured":"Chaaya, K.B., Barhamgi, M., Chbeir, R., Arnould, P., Benslimane, D.: Context-aware system for dynamic privacy risk inference: application to smart IoT environments. Futur. Gener. Comput. Syst. 101, 1096\u20131111 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"14_CR4","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1109\/TSC.2024.3349784","volume":"17","author":"H Chen","year":"2024","unstructured":"Chen, H., Zhu, T., Liu, C., Yu, S., Zhou, W.: High-frequency matters: attack and defense for image-processing model watermarking. IEEE Trans. Serv. Comput. 17, 1565\u20131579 (2024)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"14_CR5","unstructured":"Chen, H., Zhu, T., Zhao, Y., Liu, B., Yu, X., Zhou, W.: Low-frequency image deep steganography: manipulate the frequency distribution to hide secrets with tenacious robustness. arXiv preprint arXiv:2303.13713 (2023)"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Chen, H., Zhu, T., Yu, X., Zhou, W.: Machine unlearning via null space calibration. arXiv preprint arXiv:2404.13588 (2024)","DOI":"10.24963\/ijcai.2024\/40"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Chen, W., Lin, T., Tan, Z., Zhao, M., Zhou, X.: Robust influence maximization. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 795\u2013804 (2016)","DOI":"10.1145\/2939672.2939745"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-319-61176-1_11","volume-title":"Data and Applications Security and Privacy XXXI","author":"T Georgiou","year":"2017","unstructured":"Georgiou, T., El Abbadi, A., Yan, X.: Privacy-preserving community-aware trending topic detection in online social media. In: Livraga, G., Zhu, S. (eds.) DBSec 2017. LNCS, vol. 10359, pp. 205\u2013224. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-61176-1_11"},{"key":"14_CR9","unstructured":"Geumlek, J., Song, S., Chaudhuri, K.: Renyi differential privacy mechanisms for posterior sampling. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/11760146_14","volume-title":"Intelligence and Security Informatics","author":"J He","year":"2006","unstructured":"He, J., Chu, W.W., Liu, Z.V.: Inferring privacy information from social networks. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 154\u2013165. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11760146_14"},{"issue":"15","key":"14_CR11","doi-asserted-by":"publisher","first-page":"5802","DOI":"10.1073\/pnas.1218772110","volume":"110","author":"M Kosinski","year":"2013","unstructured":"Kosinski, M., Stillwell, D., Graepel, T.: Private traits and attributes are predictable from digital records of human behavior. Proc. Natl. Acad. Sci. 110(15), 5802\u20135805 (2013)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Kumar, S., Hamilton, W.L., Leskovec, J., Jurafsky, D.: Community interaction and conflict on the web. In: Proceedings of the 2018 World Wide Web Conference on World Wide Web, pp. 933\u2013943. International World Wide Web Conferences Steering Committee (2018)","DOI":"10.1145\/3178876.3186141"},{"key":"14_CR13","unstructured":"Kwon, H., Sim, M., Song, G., Lee, M., Seo, H.: Novel approach to cryptography implementation using chatgpt. Cryptology ePrint Archive (2023)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"McAuley, J., Leskovec, J.: Hidden factors and hidden topics: understanding rating dimensions with review text. In: Proceedings of the 7th ACM Conference on Recommender Systems, pp. 165\u2013172. ACM (2013)","DOI":"10.1145\/2507157.2507163"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Mironov, I.: R\u00e9nyi differential privacy. In: 2017 IEEE 30th Computer Security Foundations Symposium (CSF), pp. 263\u2013275. IEEE (2017)","DOI":"10.1109\/CSF.2017.11"},{"issue":"1","key":"14_CR16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1075\/li.30.1.03nad","volume":"30","author":"D Nadeau","year":"2007","unstructured":"Nadeau, D., Sekine, S.: A survey of named entity recognition and classification. Lingvistic\u00e6 Investigationes 30(1), 3\u201326 (2007)","journal-title":"Lingvistic\u00e6 Investigationes"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Qu, Y., Ding, M., Sun, N., Thilakarathna, K., Zhu, T., Niyato, D.: The frontier of data erasure: machine unlearning for large language models. arXiv preprint arXiv:2403.15779 (2024)","DOI":"10.1109\/MC.2024.3405397"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Qu, Y., Yu, S., Gao, L., Niu, J.: Big data set privacy preserving through sensitive attribute-based grouping. In: 2017 IEEE International Conference on Communications (ICC), pp.\u00a01\u20136. IEEE (2017)","DOI":"10.1109\/ICC.2017.7997113"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-642-14527-8_14","volume-title":"Privacy Enhancing Technologies","author":"K Thomas","year":"2010","unstructured":"Thomas, K., Grier, C., Nicol, D.M.: unFriendly: multi-party privacy risks in social networks. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 236\u2013252. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14527-8_14"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Tian, H., Liu, B., Zhu, T., Zhou, W., Philip, S.Y.: MultiFair: model fairness with multiple sensitive attributes. IEEE Trans. Neural Netw. Learn. Syst., 1\u201314 (2024)","DOI":"10.1109\/TNNLS.2024.3384181"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Vats, A., et al.: Recovering from privacy-preserving masking with large language models. In: ICASSP 2024-2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 10771\u201310775. IEEE (2024)","DOI":"10.1109\/ICASSP48485.2024.10448234"},{"issue":"3","key":"14_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3168389","volume":"51","author":"I Wagner","year":"2018","unstructured":"Wagner, I., Eckhoff, D.: Technical privacy metrics: a systematic survey. ACM Comput. Surv. (CSUR) 51(3), 1\u201338 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"14_CR23","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1007\/s10618-012-0262-1","volume":"25","author":"C Wang","year":"2012","unstructured":"Wang, C., Chen, W., Wang, Y.: Scalable influence maximization for independent cascade model in large-scale social networks. Data Min. Knowl. Disc. 25, 545\u2013576 (2012)","journal-title":"Data Min. Knowl. Disc."},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Yao, Y., Duan, J., Xu, K., Cai, Y., Sun, Z., Zhang, Y.: A survey on large language model (LLM) security and privacy: the good, the bad, and the ugly. High-Confidence Comput. 4, 100211 (2024)","DOI":"10.1016\/j.hcc.2024.100211"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Ye, D., Zhu, T., Gao, K., Zhou, W.: Defending against label-only attacks via meta-reinforcement learning. IEEE Trans. Inf. Forensics Secur. 19, 3295\u20133308 (2024)","DOI":"10.1109\/TIFS.2024.3357292"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, L., Zhu, T., Xiong, P., Zhou, W.: The price of unlearning: Identifying unlearning risk in edge computing. ACM Trans. Multimedia Comput. Commun. Appl. (2024)","DOI":"10.1145\/3662184"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Zhou, S., Zhu, T., Ye, D., Zhou, W., Zhao, W.: Inversion-guided defense: detecting model stealing attacks by output inverting. IEEE Trans. Inf. Forensics Secur. 19, 4130\u20134145 (2024)","DOI":"10.1109\/TIFS.2024.3376190"},{"issue":"3","key":"14_CR28","doi-asserted-by":"publisher","first-page":"1151","DOI":"10.1007\/s11280-022-01026-1","volume":"25","author":"C Zhu","year":"2022","unstructured":"Zhu, C., Ye, D., Zhu, T., Zhou, W.: Time-optimal and privacy preserving route planning for carpool policy. World Wide Web 25(3), 1151\u20131168 (2022)","journal-title":"World Wide Web"},{"issue":"7","key":"14_CR29","doi-asserted-by":"publisher","first-page":"8459","DOI":"10.1109\/TVT.2023.3248613","volume":"72","author":"C Zhu","year":"2023","unstructured":"Zhu, C., Cheng, Z., Ye, D., Hussain, F.K., Zhu, T., Zhou, W.: Time-driven and privacy-preserving navigation model for vehicle-to-vehicle communication systems. IEEE Trans. Veh. Technol. 72(7), 8459\u20138470 (2023)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"14_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.111333","volume":"285","author":"C Zhu","year":"2024","unstructured":"Zhu, C., Ye, D., Huo, H., Zhou, W., Zhu, T.: A location-based advising method in teacher-student frameworks. Knowl. Based Syst. 285, 111333 (2024)","journal-title":"Knowl. Based Syst."},{"key":"14_CR31","doi-asserted-by":"publisher","first-page":"14551","DOI":"10.1109\/JIOT.2023.3342480","volume":"11","author":"C Zhu","year":"2024","unstructured":"Zhu, C., Ye, D., Zhu, T., Zhou, W.: Location-based real-time updated advising method for traffic signal control. IEEE Internet Things J. 11, 14551\u201314562 (2024)","journal-title":"IEEE Internet Things J."},{"issue":"8","key":"14_CR32","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1109\/TKDE.2017.2697856","volume":"29","author":"T Zhu","year":"2017","unstructured":"Zhu, T., Li, G., Zhou, W., Philip, S.Y.: Differentially private data publishing and analysis: a survey. IEEE Trans. Knowl. Data Eng. 29(8), 1619\u20131638 (2017)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"6","key":"14_CR33","doi-asserted-by":"publisher","first-page":"2962","DOI":"10.1109\/TKDE.2020.3015835","volume":"34","author":"T Zhu","year":"2022","unstructured":"Zhu, T., Li, J., Hu, X., Xiong, P., Zhou, W.: The dynamic privacy-preserving mechanisms for online dynamic social networks. IEEE Trans. Knowl. Data Eng. 34(6), 2962\u20132974 (2022)","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1545-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T16:55:54Z","timestamp":1739379354000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1545-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819615445","9789819615452"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1545-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ica3pp2024.scimeeting.cn\/en\/web\/index\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}