{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T01:25:23Z","timestamp":1773797123604,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,9]],"date-time":"2012-09-09T00:00:00Z","timestamp":1347148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,9]]},"DOI":"10.1145\/2365952.2365989","type":"proceedings-article","created":{"date-parts":[[2012,9,12]],"date-time":"2012-09-12T13:01:27Z","timestamp":1347454887000},"page":"195-202","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":131,"title":["BlurMe"],"prefix":"10.1145","author":[{"given":"Udi","family":"Weinsberg","sequence":"first","affiliation":[{"name":"Technicolor, Palo Alto, CA, USA"}]},{"given":"Smriti","family":"Bhagat","sequence":"additional","affiliation":[{"name":"Technicolor, Palo Alto, CA, USA"}]},{"given":"Stratis","family":"Ioannidis","sequence":"additional","affiliation":[{"name":"Technicolor, Palo Alto, CA, USA"}]},{"given":"Nina","family":"Taft","sequence":"additional","affiliation":[{"name":"Technicolor, Palo Alto, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,9,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864708.1864722"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1348549.1348560"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639739"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-21606-5"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864708.1864736"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_3_2_1_7_1","volume-title":"AAAI","author":"McCallum A.","year":"1998","unstructured":"A. McCallum and K. Nigam . A comparison of event models for Naive Bayes text classification . In AAAI , 1998 . A. McCallum and K. Nigam. A comparison of event models for Naive Bayes text classification. In AAAI, 1998."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557090"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718519"},{"key":"e_1_3_2_1_10_1","volume-title":"AAAI","author":"O'Mahony M. P.","year":"2005","unstructured":"M. P. O'Mahony , N. J. Hurley , and G. C. M. Silvestre . Recommender systems : Attack types and strategies . In AAAI , 2005 . M. P. O'Mahony, N. J. Hurley, and G. C. M. Silvestre. Recommender systems: Attack types and strategies. In AAAI, 2005."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871487"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871985.1871993"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401969"},{"key":"e_1_3_2_1_14_1","volume-title":"Trackmenot: Enhancing the privacy of web search. CoRR, abs\/1109.4677","author":"Toubiana V.","year":"2011","unstructured":"V. Toubiana , L. Subramanian , and H. Nissenbaum . Trackmenot: Enhancing the privacy of web search. CoRR, abs\/1109.4677 , 2011 . V. Toubiana, L. Subramanian, and H. Nissenbaum. Trackmenot: Enhancing the privacy of web search. CoRR, abs\/1109.4677, 2011."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.77"}],"event":{"name":"RecSys '12: Sixth ACM Conference on Recommender Systems","location":"Dublin Ireland","acronym":"RecSys '12","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval","SIGecom Special Interest Group on Economics and Computation"]},"container-title":["Proceedings of the sixth ACM conference on Recommender systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2365952.2365989","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2365952.2365989","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:04Z","timestamp":1750239244000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2365952.2365989"}},"subtitle":["inferring and obfuscating user gender based on ratings"],"short-title":[],"issued":{"date-parts":[[2012,9,9]]},"references-count":15,"alternative-id":["10.1145\/2365952.2365989","10.1145\/2365952"],"URL":"https:\/\/doi.org\/10.1145\/2365952.2365989","relation":{},"subject":[],"published":{"date-parts":[[2012,9,9]]},"assertion":[{"value":"2012-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}