{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:26:44Z","timestamp":1730291204588,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/pst52912.2021.9647778","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T16:08:01Z","timestamp":1640102881000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["FOX: Fooling with Explanations : Privacy Protection with Adversarial Reactions in Social Media"],"prefix":"10.1109","author":[{"given":"Noreddine","family":"Belhadj-Cheikh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Abdessamad","family":"Imine","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael","family":"Rusinowitch","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1609\/aaai.v34i05.6311"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ICDM50108.2020.00037"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.14722\/ndss.2019.23138"},{"key":"ref13","article-title":"Adversarial black-box attacks on text classifiers using multi-objective genetic optimization guided by deep networks","author":"mathai","year":"2020","journal-title":"CoRR"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.18653\/v1\/2020.emnlp-demos.16"},{"year":"2003","author":"naber","journal-title":"A Rules Based Style and Grammar Checker","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/978-3-030-59051-2_3"},{"key":"ref17","first-page":"1","article-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","volume":"21","author":"raffel","year":"2020","journal-title":"J Mach Learn Res"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.18653\/v1\/2020.emnlp-main.365"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/2939672.2939778"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/3374136"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/3343038"},{"key":"ref6","first-page":"106","article-title":"Mixed messages? the limits of automated social media content analysis","author":"duarte","year":"2018","journal-title":"Proceedings of the 1st Conference on Fairness Accountability and Transparency"},{"key":"ref5","article-title":"BERT: pre-training of deep bidirectional transformers for language understanding","author":"devlin","year":"2018","journal-title":"CoRR"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/11760146_14"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/3154793"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/ISI.2017.8004874"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1162\/neco.1997.9.8.1735"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/11957454_3"},{"year":"2021","author":"schultz","journal-title":"How much data is created on the internet each day?","key":"ref20"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/2365952.2365989"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/3289600.3290620"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/2998181.2998364"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TAI.2021.3092698"},{"key":"ref25","article-title":"Generating textual adversarial examples for deep learning models: A survey","author":"zhang","year":"2019","journal-title":"CoRR"}],"event":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2021,12,13]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 18th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647713\/9647738\/09647778.pdf?arnumber=9647778","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:59:51Z","timestamp":1652187591000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647778\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/pst52912.2021.9647778","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}