{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:44:48Z","timestamp":1756896288458,"version":"3.37.3"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["No. 2018YFB0804102"],"award-info":[{"award-number":["No. 2018YFB0804102"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Provincial Key Research and Development Program of Zhejiang China","award":["No. 2017C01055"],"award-info":[{"award-number":["No. 2017C01055"]}]},{"name":"Zhejiang Provincial Natural Science Foundation for Distinguished Young Scholars","award":["No. LR19F020003"],"award-info":[{"award-number":["No. LR19F020003"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61772466, U1936215, and U1836202"],"award-info":[{"award-number":["No. 61772466, U1936215, and U1836202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/tdsc.2019.2962440","type":"journal-article","created":{"date-parts":[[2019,12,25]],"date-time":"2019-12-25T15:54:15Z","timestamp":1577289255000},"page":"1-1","source":"Crossref","is-referenced-by-count":6,"title":["OB-WSPES: A Uniform Evaluation System for Obfuscation-based Web Search Privacy"],"prefix":"10.1109","author":[{"given":"Chengkun","family":"Wei","sequence":"first","affiliation":[]},{"given":"Qinchen","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Shouling","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Wenzhi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zonghui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Raheem","family":"Beyah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.nima.2004.12.018"},{"key":"ref38","first-page":"23","article-title":"Support vector machines","volume":"1","author":"meyer","year":"2001","journal-title":"R News"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3115\/1220175.1220304"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1146847.1146848"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646155"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_33"},{"key":"ref36","first-page":"91","article-title":"Scalable and private media consumption with popcorn","author":"gupta","year":"2016","journal-title":"Proc 13th Usenix Conf Netw Syst Des Implementation"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0010"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2664168.2664181"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488401"},{"year":"2018","key":"ref27","article-title":"Ego surfing"},{"key":"ref29","first-page":"3111","article-title":"Distributed representations of words and phrases and their compositionality","author":"mikolov","year":"2013","journal-title":"Proc 26th Int Conf Neural Inf Process Syst"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1108\/14684520910985693"},{"key":"ref1","first-page":"417","article-title":"Trackmenot: Resisting surveillance in web search","volume":"23","author":"howe","year":"2009","journal-title":"Lessons from the Identity Trail Anonymity Privacy and Identity in a Networked Society"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568022"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9473(01)00065-2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660367"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-130491"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054471"},{"article-title":"Trackmenot-so-good-after-all","year":"2010","author":"al-rfou","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-016-0044-x"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3209983"},{"article-title":"Determining search results using session based refinements","year":"2018","author":"liu","key":"ref51"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"ref56","first-page":"591","article-title":"Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy","volume":"15","author":"wang","year":"2018","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62105-0_7"},{"year":"2019","key":"ref53"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/363958.363994"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.77"},{"key":"ref11","first-page":"3286","article-title":"BING: Binarized normed gradients for objectness estimation at 300fps","author":"cheng","year":"2014","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1128\/AEM.00062-07"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488435"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3190580.3190582"},{"year":"2018","key":"ref14","article-title":"User profile"},{"key":"ref15","article-title":"Web search query privacy, an end-user perspective","volume":"8","author":"mivule","year":"2016","journal-title":"J Inf Secur"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2005.114"},{"key":"ref17","first-page":"303","article-title":"SecGraph: A uniform and open-source evaluation system for graph data anonymization and de-anonymization","author":"ji","year":"2015","journal-title":"Proc 24th USENIX Conf Secur Symp"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1108\/14684520610716135"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36973-5_10"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2013.6596035"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09885-2_21"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"article-title":"Dispa","year":"2017","author":"juarez","key":"ref5"},{"key":"ref8","first-page":"3","article-title":"Plausibly deniable search","author":"murugesan","year":"2008","journal-title":"Proc Workshop Secure Knowl Manage"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20107"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2914753"},{"key":"ref9","first-page":"768","article-title":"Providing privacy through plausibly deniable search","author":"mummoorthy","year":"2009","journal-title":"Proc SIAM Int Conf Data Mining"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.421"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.52"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3135974.3135987"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00053"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.36"},{"key":"ref44","first-page":"179","article-title":"Dissent in numbers: Making strong anonymity scale","author":"wolinsky","year":"2012","journal-title":"Presented as part 10th USENIX Symp Operating Syst Des Implementation"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.108"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/4358699\/08943281.pdf?arnumber=8943281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:37:45Z","timestamp":1641987465000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8943281\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/tdsc.2019.2962440","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2020]]}}}