{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T01:05:11Z","timestamp":1759971911356,"version":"build-2065373602"},"reference-count":63,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1109\/tcss.2024.3521936","type":"journal-article","created":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T14:36:30Z","timestamp":1735828590000},"page":"2661-2674","source":"Crossref","is-referenced-by-count":0,"title":["Analyzing Social Media Comments to Understand and Detect Privacy Violations"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-7624-4711","authenticated-orcid":false,"given":"Yuqi","family":"Niu","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2131-7602","authenticated-orcid":false,"given":"Shuo","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2653-6669","authenticated-orcid":false,"given":"Nadin","family":"K\u00f6kciyan","sequence":"additional","affiliation":[{"name":"School of Informatics, The University of Edinburgh, Edinburgh, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6428-1655","authenticated-orcid":false,"given":"Weidong","family":"Qiu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"263","reference":[{"year":"2023","key":"ref1","article-title":"Twitter"},{"year":"2024","key":"ref2","article-title":"Reddit."},{"year":"2024","key":"ref3","article-title":"Facebook."},{"year":"2024","key":"ref4","article-title":"Instagram"},{"year":"2024","key":"ref5","article-title":"Global social network penetration\n                        rate as of April 2024, by region"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3645086"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v13i01.3354"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583873"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106573"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3092007"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2583425"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57805-3_18"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3230845"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00916-8_53"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxaa027"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0059"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-022-00324-y"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5220\/0006845602650275"},{"key":"ref19","article-title":"DEBAGREEMENT: A comment-reply dataset for\n                        (dis)agreement detection in online debates","volume-title":"Proc. Neural Inf. Process. Syst. Track Datasets Benchmarks","volume":"1","author":"Pougu\u00e9-Biyong","year":"2021"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.106"},{"key":"ref21","first-page":"3530","article-title":"K-MHAS: A multi-label hate speech detection\n                        dataset in Korean online news comment","volume-title":"Proc. 29th Int. Conf. Comput. Linguistics, Int. Committee Comput.\n                        Linguistics","author":"Lee","year":"2022"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.findings-acl.213"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3209995"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.398"},{"year":"2024","key":"ref25","article-title":"WeChat"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998288"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517675"},{"key":"ref28","first-page":"979","article-title":"You are who you know and how you behave: Attribute\n                        inference attacks via users\u2019 social friends and\n                        behaviors","volume-title":"Proc. 25th USENIX Secur.\n                        Symp., USENIX Association","author":"Gong","year":"2016"},{"key":"ref29","first-page":"497","article-title":"Analysis of privacy protections in fitness tracking\n                        social networks -or- you can run, but can you hide?","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Hassan","year":"2018"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2604383"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3291533.3291557"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195711"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2946179"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2613521"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/app10041327"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2013.6637504"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167258"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58469-0_8"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.5220\/0007390404120420"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI.2017.153"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354202"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046558"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3394231.3397919"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v16i1.19309"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665958"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101778"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3359307"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2016.078"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1142\/S1793351X17400220"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3406109"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1810.04805"},{"year":"2023","key":"ref52","article-title":"Twitter\u2019s Streaming\n                        API"},{"year":"2023","key":"ref53","article-title":"Twitter\u2019s Conversation\n                        ID"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.3115\/1119176.1119195"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10350"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"year":"2024","key":"ref57","article-title":"Models - openAI\n                    API"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583314"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.climatenlp-1.5"},{"article-title":"PopALM: Popularity-aligned language models for social\n                        media trendy response prediction","year":"2024","author":"Yu","key":"ref60"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1810.04805"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.3115\/1119176.1119195"},{"year":"2024","key":"ref63","article-title":"QuillBot"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6570650\/11194048\/10820501.pdf?arnumber=10820501","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T17:39:23Z","timestamp":1759945163000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10820501\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":63,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2024.3521936","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"type":"electronic","value":"2329-924X"},{"type":"electronic","value":"2373-7476"}],"subject":[],"published":{"date-parts":[[2025,10]]}}}