{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,10]],"date-time":"2026-05-10T07:18:53Z","timestamp":1778397533260,"version":"3.51.4"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"\u201cRevealFlight\u201d Concerted Research Action (ARC) of the F\u00e9d\u00e9ration Wallonie- Bruxelles"},{"name":"Incentive Grant for Scientific Research (MIS) \u201cLearning from Pairwise Comparisons\u201d and the \u201cKORNET Project.\u201d"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tifs.2023.3262123","type":"journal-article","created":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T18:43:56Z","timestamp":1679942636000},"page":"2132-2143","source":"Crossref","is-referenced-by-count":4,"title":["Web Privacy: A Formal Adversarial Model for Query Obfuscation"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7412-4389","authenticated-orcid":false,"given":"Florimond","family":"Houssiau","sequence":"first","affiliation":[{"name":"The Alan Turing Institute, London, U.K"}]},{"given":"Thibaut","family":"Li\u00e9nart","sequence":"additional","affiliation":[{"name":"Imperial College London, London, U.K"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8214-8292","authenticated-orcid":false,"given":"Julien","family":"Hendrickx","sequence":"additional","affiliation":[{"name":"ICTEAM institute, UCLouvain, Ottignies-Louvain-la-Neuve, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2559-5616","authenticated-orcid":false,"given":"Yves-Alexandre","family":"de Montjoye","sequence":"additional","affiliation":[{"name":"Imperial College London, London, U.K"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15509-8_21"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"ref3","volume-title":"What is Web 2.0","author":"O\u2019reilly","year":"2005"},{"key":"ref4","article-title":"My family\u2019s Google searching got us a visit from counterterrorism police","author":"Catalano","year":"2013"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2015.5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1321440.1321573"},{"key":"ref7","first-page":"244","article-title":"Infodemiology: Tracking flu-related searches on the web for syndromic surveillance","volume-title":"Proc. AMIA Annu. Symp.","volume":"2006","author":"Eysenbach"},{"key":"ref8","volume-title":"Data Privacy by the Numbers","author":"Rose","year":"2014"},{"issue":"2008","key":"ref9","first-page":"8","article-title":"A face is exposed for AOL searcher No. 4417749","volume":"9","author":"Barbaro","year":"2006","journal-title":"New York Times"},{"key":"ref10","volume-title":"Government Surveillance and Internet Search Behavior","author":"Marthews","year":"2017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780195372472.003.0023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20107"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2012.6297913"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972795.66"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.77"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054471"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1108\/14684520910985693"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2914753"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3209983"},{"key":"ref20","volume-title":"Internet Noise","author":"Schultw","year":"2023"},{"key":"ref21","volume-title":"Noisy","author":"Hury","year":"2023"},{"key":"ref22","volume-title":"Needl","author":"Price","year":"2023"},{"key":"ref23","volume-title":"Web-Traffic-Generator","author":"Capuano","year":"2023"},{"key":"ref24","volume-title":"Ruin My Search History","year":"2023"},{"key":"ref25","article-title":"TrackMeNot-so-good-after-all","author":"Al-Rfou\u2019","year":"2012","journal-title":"arXiv:1211.0320"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_2"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1655188.1655204"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660367"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-016-0044-x"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.36"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.1201\/9781420057133","volume-title":"Cryptography: Theory and Practice","author":"Stinson","year":"2005"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2014.6816656"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_1"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2005.60"},{"key":"ref37","first-page":"3294","article-title":"Skip-thought vectors","volume-title":"Proc. 28th Adv. Neural Inf. Process. Syst.","volume":"2","author":"Kiros"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2769025"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1995.492461"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293443"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36973-5_31"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920918"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458176"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00069"},{"key":"ref47","first-page":"1","article-title":"TAPAS: A toolbox for adversarial privacy auditing of synthetic data","volume-title":"Proc. NeurIPS Workshop Synth. Data Empowering ML Res.","author":"Houssiau"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9970396\/10081382.pdf?arnumber=10081382","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T18:36:42Z","timestamp":1707849402000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10081382\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/tifs.2023.3262123","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}