{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T21:00:26Z","timestamp":1773954026867,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2023,7,28]],"date-time":"2023-07-28T00:00:00Z","timestamp":1690502400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,28]],"date-time":"2023-07-28T00:00:00Z","timestamp":1690502400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Process Lett"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s11063-023-11368-0","type":"journal-article","created":{"date-parts":[[2023,7,28]],"date-time":"2023-07-28T16:31:11Z","timestamp":1690561871000},"page":"11131-11146","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Mitigate Gender Bias Using Negative Multi-task Learning"],"prefix":"10.1007","volume":"55","author":[{"given":"Liyuan","family":"Gao","sequence":"first","affiliation":[]},{"given":"Huixin","family":"Zhan","sequence":"additional","affiliation":[]},{"given":"Victor S.","family":"Sheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,28]]},"reference":[{"issue":"4","key":"11368_CR1","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.1016\/j.asej.2014.04.011","volume":"5","author":"W Medhat","year":"2014","unstructured":"Medhat W, Hassan A, Korashy H (2014) Sentiment analysis algorithms and applications: a survey. Ain Shams Eng J 5(4):1093\u20131113","journal-title":"Ain Shams Eng J"},{"key":"11368_CR2","doi-asserted-by":"crossref","unstructured":"Lu K, Mardziel P, Wu F, Amancharla P, Datta A (2020) Gender bias in neural natural language processing. Logic, language, and security: essays dedicated to Andre Scedrov on the occasion of his 65th birthday, pp 189\u2013202","DOI":"10.1007\/978-3-030-62077-6_14"},{"issue":"2","key":"11368_CR3","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1162\/coli_a_00379","volume":"46","author":"M Nissim","year":"2020","unstructured":"Nissim M, van Noord R, van der Goot R (2020) Fair is better than sensational: man is to doctor as woman is to doctor. Comput Linguist 46(2):487\u2013497","journal-title":"Comput Linguist"},{"key":"11368_CR4","unstructured":"Bolukbasi T, Chang K-W, Zou JY, Saligrama V, Kalai AT (2016) Man is to computer programmer as woman is to homemaker? debiasing word embeddings. Adv Neural Inf Process Syst 29"},{"key":"11368_CR5","doi-asserted-by":"crossref","unstructured":"Zhao J, Zhou Y, Li Z, Wang W, Chang K-W (2018) Learning gender-neutral word embeddings. arXiv preprint arXiv:1809.01496","DOI":"10.18653\/v1\/D18-1521"},{"key":"11368_CR6","doi-asserted-by":"crossref","unstructured":"Zhao J, Wang T, Yatskar M, Ordonez V, Chang K-W (2017) Men also like shopping: reducing gender bias amplification using corpus-level constraints. arXiv preprint arXiv:1707.09457","DOI":"10.18653\/v1\/D17-1323"},{"key":"11368_CR7","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1007\/978-3-030-62460-6_52","volume-title":"Machine learning for cyber security","author":"K Mo","year":"2020","unstructured":"Mo K, Huang T, Xiang X (2020) Querying little is enough: model inversion attack via latent information. In: Chen X, Yan H, Yan Q, Zhang X (eds) Machine learning for cyber security. Springer, Cham, pp 583\u2013591"},{"issue":"3","key":"11368_CR8","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.1109\/TII.2021.3070544","volume":"18","author":"Y Sun","year":"2021","unstructured":"Sun Y, Liu J, Yu K, Alazab M, Lin K (2021) Pmrss: privacy-preserving medical record searching scheme for intelligent diagnosis in iot healthcare. IEEE Trans Ind Inform 18(3):1981\u20131990","journal-title":"IEEE Trans Ind Inform"},{"key":"11368_CR9","doi-asserted-by":"crossref","unstructured":"Hovy D (2015) Demographic factors improve classification performance. In: Proceedings of the 53rd annual meeting of the association for computational linguistics and the 7th international joint conference on natural language processing, vol 1. Long Papers, pp 752\u2013762","DOI":"10.3115\/v1\/P15-1073"},{"key":"11368_CR10","doi-asserted-by":"crossref","unstructured":"Zhao J, Wang T, Yatskar M, Ordonez V, Chang K-W (2018) Gender bias in coreference resolution: evaluation and debiasing methods. arXiv preprint arXiv:1804.06876","DOI":"10.18653\/v1\/N18-2003"},{"key":"11368_CR11","doi-asserted-by":"crossref","unstructured":"Sheng E, Chang K-W, Natarajan P, Peng N (2019) The woman worked as a babysitter: on biases in language generation. arXiv preprint arXiv:1909.01326","DOI":"10.18653\/v1\/D19-1339"},{"key":"11368_CR12","doi-asserted-by":"crossref","unstructured":"Sun T, Gaut A, Tang S, Huang Y, ElSherief M, Zhao J, Mirza D, Belding E, Chang K-W, Wang WY (2019) Mitigating gender bias in natural language processing: literature review. arXiv preprint arXiv:1906.08976","DOI":"10.18653\/v1\/P19-1159"},{"key":"11368_CR13","doi-asserted-by":"publisher","unstructured":"Lalor J, Yang Y, Smith K, Forsgren N, Abbasi A (2022) Benchmarking intersectional biases in NLP. In: Proceedings of the 2022 conference of the North American chapter of the association for computational linguistics: human language technologies. Association for Computational Linguistics, Seattle, United States, pp 3598\u20133609. https:\/\/doi.org\/10.18653\/v1\/2022.naacl-main.263. https:\/\/aclanthology.org\/2022.naacl-main.263","DOI":"10.18653\/v1\/2022.naacl-main.263"},{"key":"11368_CR14","doi-asserted-by":"publisher","first-page":"845","DOI":"10.1162\/tacl_a_00401","volume":"9","author":"B Savoldi","year":"2021","unstructured":"Savoldi B, Gaido M, Bentivogli L, Negri M, Turchi M (2021) Gender bias in machine translation. Trans Assoc Comput Linguist 9:845\u2013874","journal-title":"Trans Assoc Comput Linguist"},{"key":"11368_CR15","unstructured":"Brunet M-E, Alkalay-Houlihan C, Anderson A, Zemel R (2019) Understanding the origins of bias in word embeddings. In: International conference on machine learning. PMLR, pp 803\u2013811"},{"key":"11368_CR16","unstructured":"Mikolov T, Sutskever I, Chen K, Corrado GS, Dean J (2013) Distributed representations of words and phrases and their compositionality. Adv Neural Inf Process Syst 26"},{"key":"11368_CR17","doi-asserted-by":"crossref","unstructured":"Pennington J, Socher R, Manning CD (2014) Glove: global vectors for word representation. In: Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), pp 1532\u20131543","DOI":"10.3115\/v1\/D14-1162"},{"key":"11368_CR18","unstructured":"Leino K, Fredrikson M (2020) Stolen memories: leveraging model memorization for calibrated $$\\{$$White-Box$$\\}$$ membership inference. In: 29th USENIX security symposium (USENIX Security 20), pp. 1605\u20131622"},{"key":"11368_CR19","unstructured":"Song C, Shmatikov V (2019) Overlearning reveals sensitive attributes. arXiv preprint arXiv:1905.11742"},{"key":"11368_CR20","doi-asserted-by":"crossref","unstructured":"Abadi M, Chu A, Goodfellow I, McMahan HB, Mironov I, Talwar K, Zhang L (2016) Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp. 308\u2013318","DOI":"10.1145\/2976749.2978318"},{"key":"11368_CR21","doi-asserted-by":"crossref","unstructured":"Coavoux M, Narayan S, Cohen SB (2018) Privacy-preserving neural representations of text. arXiv preprint arXiv:1808.09408","DOI":"10.18653\/v1\/D18-1001"},{"key":"11368_CR22","doi-asserted-by":"crossref","unstructured":"Shi W, Cui A, Li E, Jia R, Yu Z (2021) Selective differential privacy for language modeling. arXiv preprint arXiv:2108.12944","DOI":"10.18653\/v1\/2022.naacl-main.205"},{"key":"11368_CR23","unstructured":"Ruder S (2017) An overview of multi-task learning in deep neural networks. arXiv preprint arXiv:1706.05098"},{"key":"11368_CR24","unstructured":"Standley T, Zamir A, Chen D, Guibas L, Malik J, Savarese S (2020) Which tasks should be learned together in multi-task learning? In: International conference on machine learning. PMLR, pp 9120\u20139132"},{"key":"11368_CR25","unstructured":"Devlin J, Chang M-W, Lee K, Toutanova K (2018) Bert: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805"},{"key":"11368_CR26","unstructured":"Liu Y, Ott M, Goyal N, Du J, Joshi M, Chen D, Levy O, Lewis M, Zettlemoyer L, Stoyanov V (2019) Roberta: a robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692"},{"key":"11368_CR27","unstructured":"Hardt M, Price E, Srebro N (2016) Equality of opportunity in supervised learning. Adv neural inf process syst 29"}],"container-title":["Neural Processing Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-023-11368-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11063-023-11368-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-023-11368-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T00:14:26Z","timestamp":1700612066000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11063-023-11368-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,28]]},"references-count":27,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["11368"],"URL":"https:\/\/doi.org\/10.1007\/s11063-023-11368-0","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2024101\/v1","asserted-by":"object"}]},"ISSN":["1370-4621","1573-773X"],"issn-type":[{"value":"1370-4621","type":"print"},{"value":"1573-773X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,28]]},"assertion":[{"value":"11 July 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}