{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T05:20:15Z","timestamp":1734499215629,"version":"3.30.2"},"reference-count":51,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T00:00:00Z","timestamp":1724803200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T00:00:00Z","timestamp":1724803200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,28]]},"DOI":"10.1109\/pst62714.2024.10788076","type":"proceedings-article","created":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T19:15:09Z","timestamp":1734376509000},"page":"1-12","source":"Crossref","is-referenced-by-count":0,"title":["\u201cI was Diagnosed with \u2026\u201d: Sensitivity Detection and Rephrasing of Amazon Reviews with ChatGPT"],"prefix":"10.1109","author":[{"given":"Costanza","family":"Alfieri","sequence":"first","affiliation":[{"name":"University of L&#x2019; Aquila,DISIM,L&#x2019;Aquila,Italy"}]},{"given":"Suriya","family":"Ganesh","sequence":"additional","affiliation":[{"name":"School of Computer Science, Carnegie Mellon University,Pittsburgh,USA"}]},{"given":"Limin","family":"Ge","sequence":"additional","affiliation":[{"name":"School of Computer Science, Carnegie Mellon University,Pittsburgh,USA"}]},{"given":"Jingxin","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Computer Science, Carnegie Mellon University,Pittsburgh,USA"}]},{"given":"Norman","family":"Sadeh","sequence":"additional","affiliation":[{"name":"School of Computer Science, Carnegie Mellon University,Pittsburgh,USA"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.3389\/fpubh.2020.602792"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1177\/1073110516667943"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"105085","DOI":"10.1016\/j.jet.2020.105085","article-title":"Insurance as a lemons market: Coverage denials and pooling","volume":"189","author":"Chade","year":"2020","journal-title":"Journal of Economic Theory"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/BigDataCongress.2017.76"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.18653\/v1\/2021.naacl-main.347"},{"key":"ref6","first-page":"627","article-title":"String sanitization: A combinato-rial approach","volume-title":"Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2019","author":"Bernardini","year":"2019"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/978-3-031-23480-4_23"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/SNAMS.2019.8931855"},{"volume-title":"String sanitization under edit distance","year":"2020","author":"Bernardini","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.18653\/v1\/2024.acl-long.741"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1177\/00222429221100750"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1177\/1470785319844146"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/SPW.2012.23"},{"volume-title":"Amazon privacy notice","year":"2023","key":"ref14"},{"key":"ref15","first-page":"98","article-title":"How to save democracy from technology: ending big tech\u2019s information monopoly","volume":"100","author":"Fukuyama","year":"2021","journal-title":"Foreign Aff"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.2196\/51523"},{"key":"ref17","first-page":"1","article-title":"Privacy preservationz techniques in big data analytics: a survey","volume":"5","author":"Ram","year":"2018","journal-title":"Journal of Big Data"},{"key":"ref18","first-page":"217","article-title":"Neural text san-itization with explicit measures of privacy risk","volume-title":"Proceedings of the 2nd Conference of the Asia-Pacific Chapter of the Association for Computational Linguistics and the 12th International Joint Conference on Natural Language Processing","author":"Papadopoulou"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.48550\/ARXIV.1706.03762"},{"volume-title":"Hagrid: A human-llm collaborative dataset for generative information-seeking with attribution","year":"2023","author":"Kamalloo","key":"ref20"},{"volume-title":"Do-not-answer: A dataset for evaluating safeguards in llms","year":"2023","author":"Wang","key":"ref21"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.15407\/csc.2023.03.054"},{"volume-title":"Health-llm: Large language models for health prediction via wearable sensor data","year":"2024","author":"Kim","key":"ref23"},{"volume-title":"Does synthetic data generation of llms help clinical text mining?","year":"2023","author":"Tang","key":"ref24"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/REW57809.2023.00048"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/CyberC.2019.00087"},{"key":"ref27","first-page":"333","article-title":"Replacing personally-identifying information in medical records, the scrub system","volume-title":"Proc AMIA Annu Fall Symp","author":"Sweeney","year":"1996"},{"volume-title":"Removing sensitive part of a text","year":"2019","author":"Architha","key":"ref28"},{"key":"ref29","article-title":"Anonymization of general practioner medical records","volume-title":"Proceedings of the second HelsIT Conference","author":"Tveit","year":"2004"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/CIC.2005.1588104"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00055"},{"volume-title":"Amazon Customer Review","year":"2021","author":"Chatterjee","key":"ref32"},{"volume-title":"Regulation (eu) 2016\/679 of the european parliament and of the council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/ec (general data protection regulation)","year":"2016","key":"ref33"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1016\/j.chb.2015.01.010"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1016\/j.dss.2019.113099"},{"volume-title":"A brief history of prompt: Leveraging language models. (through advanced prompting)","year":"2023","author":"Muktadir","key":"ref36"},{"key":"ref37","first-page":"arXiv","article-title":"Llama: Open and efficient foundation language models","author":"Touvron","year":"2023","journal-title":"arXiv e-prints"},{"key":"ref38","first-page":"24824","article-title":"Chain-of-thought prompting elicits reasoning in large language models","volume":"35","author":"Wei","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref39","article-title":"Adaptations of ROUGE and BLEU to better evaluate machine reading comprehension task","volume-title":"CoRR","volume":"abs\/1806.03578","author":"Yang","year":"2018"},{"key":"ref40","first-page":"arXiv","article-title":"Hagrid: A human-11m collaborative dataset for generative information-seeking with attribution","author":"Kamalloo","year":"2023","journal-title":"arXiv e-prints"},{"key":"ref41","article-title":"Do-not-answer: A dataset for evaluating safeguards in llms","author":"Wang","year":"2023","journal-title":"arXiv preprint"},{"key":"ref42","first-page":"74","article-title":"Rouge: A package for automatic evaluation of summaries","author":"Lin","year":"2004","journal-title":"Text summarization branches out"},{"key":"ref43","first-page":"311","article-title":"Bleu: a method for automatic evaluation of machine translation","volume-title":"Proceedings of the 40th annual meeting of the Association for Computational Linguistics","author":"Papineni","year":"2002"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1162\/coli_a_00322"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.4172\/2161-0487.1000197"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1177\/001316446002000104"},{"key":"ref47","article-title":"Beyond accuracy: Evaluating self-consistency of code llms","volume-title":"The Twelfth International Conference on Learning Representations","author":"Min","year":"2023"},{"volume-title":"Llm lies: Hallucinations are not bugs, but features as adversarial examples","year":"2023","author":"Yao","key":"ref48"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.18653\/v1\/P16-1162"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1186\/s41073-023-00133-5"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1200\/JOP.2015.004820"}],"event":{"name":"2024 21st Annual International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2024,8,28]]},"location":"Sydney, Australia","end":{"date-parts":[[2024,8,30]]}},"container-title":["2024 21st Annual International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10788036\/10788037\/10788076.pdf?arnumber=10788076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T05:51:58Z","timestamp":1734414718000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10788076\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,28]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/pst62714.2024.10788076","relation":{},"subject":[],"published":{"date-parts":[[2024,8,28]]}}}