{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:11:44Z","timestamp":1730272304464,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/iscc50000.2020.9219702","type":"proceedings-article","created":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T21:03:51Z","timestamp":1602536631000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["CES2Vec: A Confidentiality-Oriented Word Embedding for Confidential Information Detection"],"prefix":"10.1109","author":[{"given":"Jianguo","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Yue","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Min","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shaohua","family":"An","sequence":"additional","affiliation":[]},{"given":"Weiqing","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"133","article-title":"Model of security level classification for data in hybrid cloud computing","volume":"94","author":"shakir","year":"2016","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W19-3504"},{"key":"ref12","article-title":"Efficient estimation of word representations in vector space","author":"mikolov","year":"2013","journal-title":"Proc 1st Int Conf Learn Representations (ICLR&#x2019;13)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99247-1_19"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1035"},{"key":"ref16","article-title":"Bag of tricks for efficient text classification","author":"joulin","year":"2016","journal-title":"arXiv preprint arXiv 1607 01759"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref18","first-page":"3818","article-title":"Detecting rumors from microblogs with recurrent neural networks","author":"ma","year":"2016","journal-title":"IJCAI"},{"key":"ref4","first-page":"329","article-title":"Security level classification of confidential documents written in turkish","author":"alparslan","year":"2009","journal-title":"International Conference on User Centric Media"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29563-9_17"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CAIS.2019.8769490"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052671"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1056"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2489653"},{"key":"ref2","article-title":"Cidetector: Semi-supervised method for multi-topic confidential information detection","author":"jiang","year":"2013","journal-title":"The 24th European Conference on Artificial Intelligence (ECAI&#x2019;20)"},{"key":"ref1","article-title":"Keeping the good stuff in: Confidential information firewalling with the crm114 spam filter & text classifier","author":"yerazunis","year":"2010","journal-title":"White Paper Black Hat USA"},{"key":"ref9","first-page":"3111","article-title":"Distributed representations of words and phrases and their compositionality","author":"mikolov","year":"2013","journal-title":"Advances in Neural IInformation Processing Systems"}],"event":{"name":"2020 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2020,7,7]]},"location":"Rennes, France","end":{"date-parts":[[2020,7,10]]}},"container-title":["2020 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9213178\/9219543\/09219702.pdf?arnumber=9219702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:54:23Z","timestamp":1656453263000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9219702\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iscc50000.2020.9219702","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}