{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T16:30:51Z","timestamp":1775147451335,"version":"3.50.1"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3084841","type":"journal-article","created":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T19:58:28Z","timestamp":1622231908000},"page":"80451-80465","source":"Crossref","is-referenced-by-count":40,"title":["A Deep Learning Model for Information Loss Prevention From Multi-Page Digital Documents"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3280-5730","authenticated-orcid":false,"given":"Abhijit","family":"Guha","sequence":"first","affiliation":[{"name":"Department of Data Science, CHRIST (Deemed to be University), Bengaluru, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4118-2480","authenticated-orcid":false,"given":"Debabrata","family":"Samanta","sequence":"additional","affiliation":[{"name":"Department of Computer Science, CHRIST (Deemed to be University), Bengaluru, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9612-4523","authenticated-orcid":false,"given":"Amit","family":"Banerjee","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Microelectronic Technologies & Devices, National University of Singapore, Singapore"}]},{"given":"Daksh","family":"Agarwal","sequence":"additional","affiliation":[{"name":"Department of Materials Science and Engineering, University of Pennsylvania, Philadelphia, PA, USA"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2239641"},{"key":"ref38","article-title":"Data leakage detection: Challenges and prevention systems","author":"rishika","year":"2020"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-020-00515-6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1111\/j.0306-686X.2005.00597.x"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422280"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2010.52"},{"key":"ref37","first-page":"27","article-title":"Understanding data leak prevention","author":"raman","year":"2011","journal-title":"Proc 6th Annu Symp Inf Assurance (ASIA)"},{"key":"ref36","article-title":"Towards the science of security and privacy in machine learning","author":"papernot","year":"2016","journal-title":"arXiv 1611 03814"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jeconbus.2004.11.006"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1884-3_19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-019-00336-9"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.26483\/ijarcs.v8i7.4338"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805680"},{"key":"ref2","first-page":"394","article-title":"Data leakage detection and data prevention using algorithm","volume":"6","author":"ahmad","year":"2013","journal-title":"Int J Comput Sci Appl"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3824-3"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2506185"},{"key":"ref22","first-page":"1219","article-title":"The Gramm-Leach-Bliley act, information privacy, and the limits of default rules","volume":"86","author":"janger","year":"2001","journal-title":"SSRN Electron J"},{"key":"ref21","first-page":"197","article-title":"Data leak prevention system: A survey","volume":"6","author":"jadhav","year":"2019","journal-title":"Viruses"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.10.005"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-75928-9_16"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-016-0796-z"},{"key":"ref25","article-title":"Data leakage prevention: E-mail protection via gateway","volume":"933","author":"kaur","year":"2017","journal-title":"J Phys Conf Ser"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05049-5"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05272-0"},{"key":"ref52","article-title":"Pattern matching for data leak prevention","author":"zheng","year":"2019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.048"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-2053-8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1211"},{"key":"ref13","article-title":"Information leakage & data loss prevention","author":"datardina","year":"2009","journal-title":"IT Assurance Governance Inf"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-018-00426-7"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1142\/ASCAS"},{"key":"ref16","first-page":"366","article-title":"Real-time application of document classification based on machine learning","author":"guha","year":"2019","journal-title":"Proc Int Conf Inf Commun Comput Technol"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-020-1247-y"},{"key":"ref18","first-page":"2230","article-title":"The scope and potential of FTC data protection","volume":"83","author":"hartzog","year":"2014","journal-title":"Geo Wash L Rev"},{"key":"ref19","first-page":"361","article-title":"Data leakage prevention","volume":"2","author":"hauer","year":"2014","journal-title":"Proc 16th Int Conf Enterprise Inf Systems"},{"key":"ref4","first-page":"293","article-title":"A conceptual foundation for data loss prevention","volume":"5","author":"al-fedaghi","year":"2011","journal-title":"Int J Digit Content Technol Appl"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-6803.2004.00093.x"},{"key":"ref6","article-title":"A framework for data loss prevention using document semantic signature","author":"alhindi","year":"2019"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/BF02751736","article-title":"The impact of the Gramm-Leach-Bliley act on the financial services industry","volume":"28","author":"mamun","year":"2004","journal-title":"Journal of Financial Economics"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT47987.2019.8991131"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100073"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.01.019"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.jnca.2016.01.008","article-title":"A survey on data leakage prevention systems","volume":"62","author":"alneyadi","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.03.028"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.080207"},{"key":"ref48","article-title":"A machine learning approach to confirm and reduce false positive alarms generated by data leak detection processes","author":"vasseur","year":"2018","journal-title":"Proc Student-Faculty Res Day CSIS Pace Univ"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.15394\/jdfsl.2015.1196"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3603736"},{"key":"ref41","article-title":"Content-based data leakage detection using extended fingerprinting","author":"shapira","year":"2013","journal-title":"arXiv 1302 2028"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/WCCAIS.2014.6916624"},{"key":"ref43","first-page":"583","article-title":"The FTC and the new common law of privacy","volume":"114","author":"solove","year":"2014","journal-title":"Colum L Rev"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09443107.pdf?arnumber=9443107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T00:53:10Z","timestamp":1672275190000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9443107\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3084841","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}