{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T08:45:31Z","timestamp":1771922731351,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,25]]},"DOI":"10.1109\/snams67467.2025.11390950","type":"proceedings-article","created":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T20:45:45Z","timestamp":1771879545000},"page":"50-57","source":"Crossref","is-referenced-by-count":0,"title":["A Mixed-Methods Approach to Pseudonymizing Users\u2019 Social Media Profile Data"],"prefix":"10.1109","author":[{"given":"Yeong Su","family":"Lee","sequence":"first","affiliation":[{"name":"University of the Bundeswehr Munich, Research Institute CODE,Neubiberg,Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hendrik","family":"Bothe","sequence":"additional","affiliation":[{"name":"University of the Bundeswehr Munich, Research Institute CODE,Neubiberg,Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michaela","family":"Geierhos","sequence":"additional","affiliation":[{"name":"University of the Bundeswehr Munich, Research Institute CODE,Neubiberg,Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Digital 2025: Global overview report","volume-title":"Data Reportal","year":"2025"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3500374"},{"issue":"1","key":"ref3","article-title":"A Cross-Platform Personalized Recommender System for Connecting E-Commerce and Social Network","volume":"15","author":"Zhao","year":"2023","journal-title":"vFuture Internet"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"102422","DOI":"10.1016\/j.datak.2025.102422","article-title":"Privacypreserving cross-network service recommendation via federated learning of unified user representations","volume":"158","author":"Ayadi","year":"2025","journal-title":"Data & Knowledge Engineering"},{"key":"ref5","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation)","year":"2016"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045700"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSP62567.2024.00010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW55150.2022.00066"},{"key":"ref9","article-title":"Data Pseudonymisation: Advanced Techniques and Use Cases","journal-title":"ENISA"},{"key":"ref10","article-title":"Deploying Pseudonymisation Techniques: The case of the Health Sector"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2011.247177"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2706947"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataService58306.2023.00047"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.trustnlp-1.20"},{"key":"ref15","article-title":"DeID-GPT: Zero-shot Medical Text De-Identification by GPT-4","author":"Liu","year":"2023"},{"key":"ref16","first-page":"74","article-title":"Unlocking the potential of large language models for clinical text anonymization: A comparative study","volume-title":"Proceedings of the Fifth Workshop on Privacy in Natural Language Processing","author":"Pissarra"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/info16020112"},{"key":"ref18","first-page":"28922","article-title":"Robust utility-preserving text anonymization based on large language models","volume-title":"Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics","volume":"1","author":"Yang"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"e57828","DOI":"10.2196\/57828","article-title":"Harnessing ModerateSized Language Models for Reliable Patient Data Deidentification in Emergency Department Records: Algorithm Development, Validation, and Implementation Study","volume":"4","author":"Dor\u00c2emus","year":"2025","journal-title":"JMIR AI"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1075\/li.30.1.03nad"},{"key":"ref21","article-title":"Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition with Language Models","author":"Jurafsky","year":"2025","journal-title":"Online manuscript released August 24, 2025"},{"key":"ref22","article-title":"Guide to protecting the confidentiality of personally identifiable information (pii)","volume-title":"u.S. Department of Commerce.","author":"McCallister"},{"key":"ref23","article-title":"The Llama 3 Herd of Models","author":"Grattafiori"},{"key":"ref24","article-title":"Cryptography in an Algebraic Alphabet","author":"Hill","year":"2009","journal-title":"The American Mathematical Monthly"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/11546849_41"},{"key":"ref28","first-page":"6","article-title":"From Unstructured Data to Digital Twins: From Tweets to Structured Knowledge","volume-title":"Proceedings of the Thirteenth International Conference on Social Media Technologies, Communication, and Informatics, SOTICS 2023. IARIA","author":"Schultenkamper"},{"key":"ref29","article-title":"Radiology-llama2: Best-in-class large language model for radiology","volume":"abs\/2309.06419","author":"Liu","year":"2023"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102874"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/QoMEX58391.2023.10178496"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICEDCS57360.2022.00094"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.474"},{"key":"ref34","article-title":"Does Synthetic Data Generation of LLMs Help Clinical Text Mining?","volume":"abs\/2303.04360","author":"Tang","year":"2023","journal-title":"ArXiv"}],"event":{"name":"2025 12th International Conference on Social Networks Analysis, Management and Security (SNAMS)","location":"Vienna, Austria","start":{"date-parts":[[2025,11,25]]},"end":{"date-parts":[[2025,11,28]]}},"container-title":["2025 12th International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11390733\/11390881\/11390950.pdf?arnumber=11390950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T07:40:18Z","timestamp":1771918818000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11390950\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,25]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/snams67467.2025.11390950","relation":{},"subject":[],"published":{"date-parts":[[2025,11,25]]}}}