{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T19:27:43Z","timestamp":1761766063926,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,7,7]],"date-time":"2016-07-07T00:00:00Z","timestamp":1467849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,7,7]]},"DOI":"10.1145\/2911451.2911533","type":"proceedings-article","created":{"date-parts":[[2016,7,8]],"date-time":"2016-07-08T15:03:00Z","timestamp":1467990180000},"page":"365-374","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["R-Susceptibility"],"prefix":"10.1145","author":[{"given":"Joanna Asia","family":"Biega","sequence":"first","affiliation":[{"name":"Max Planck Institute for Informatics, Saarbr\u00fccken, Germany"}]},{"given":"Krishna P.","family":"Gummadi","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Software Systems, Saarbr\u00fccken, Germany"}]},{"given":"Ida","family":"Mele","sequence":"additional","affiliation":[{"name":"University of Lugano, Lugano, Switzerland"}]},{"given":"Dragan","family":"Milchevski","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Informatics, Saarbr\u00fccken, Germany"}]},{"given":"Christos","family":"Tryfonopoulos","sequence":"additional","affiliation":[{"name":"University of Peloponnese, Tripoli, Greece"}]},{"given":"Gerhard","family":"Weikum","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Informatics, Saarbr\u00fccken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2016,7,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","unstructured":"L. A. Adamic et al. Knowledge sharing and yahoo answers: Everyone knows something. WWW'08. 10.1145\/1367497.1367587","DOI":"10.1145\/1367497.1367587"},{"volume-title":"Workshop on Query Log Analysis, WWW'07","author":"Adar E.","key":"e_1_3_2_1_2_1","unstructured":"E. Adar. User 4xxxxx9: anonymizing query logs. Workshop on Query Log Analysis, WWW'07."},{"key":"e_1_3_2_1_3_1","volume-title":"Privacy-Preserving Data Mining","author":"Bertino E.","year":"2008","unstructured":"E. Bertino, D. Lin, W. Jiang:A Survey of Quantification of Privacy Preserving Data Mining Algorithms. In: Privacy-Preserving Data Mining, Springer 2008."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663715.2669609"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944937"},{"volume-title":"Information Processing & Management '15","author":"Carpineto C.","key":"e_1_3_2_1_6_1","unstructured":"C. Carpineto, G. Romano. K\u03b8-affinity privacy: Releasing infrequent query refinements safely. Information Processing & Management '15."},{"key":"e_1_3_2_1_7_1","unstructured":"Chicago Tribune Online:Social media activity might affect your credit score. www.chicagotribune.com\/lifestyles\/sns-201511020000-tms-kidmoneyctnsr-cc20151102-20151102-story.html accessed on 2016\/01\/21."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","unstructured":"A. Cooper. A survey of query log privacy-enhancing techniques from a policy perspective. TWeb'08. 10.1145\/1409220.1409222","DOI":"10.1145\/1409220.1409222"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"W. Day N. Li. Differentially Private Publishing of High-dimensional Data Using Sensitivity Control. ASIACCS' 10.1145\/2714576.2714621","DOI":"10.1145\/2714576.2714621"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","unstructured":"L. Fan et al. Monitoring Web Browsing Behavior with Differential Privacy. WWW'14. 10.1145\/2566486.2568038","DOI":"10.1145\/2566486.2568038"},{"key":"e_1_3_2_1_12_1","unstructured":"Forbes Online: How Social Media Can Help (or Hurt) Your Job Search. www.forbes.com\/sites\/jacquelynsmith\/2013\/04\/16\/how-social-media-can-help-or-hurt-your-job-search\/ accessed on 2016\/01\/21."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"O. Goga et al. Exploiting Innocuous Activity for Correlating Users Across Sites. WWW'13. 10.1145\/2488388.2488428","DOI":"10.1145\/2488388.2488428"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.26"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","unstructured":"Y. Hong et al. Differentially Private Search Log Sanitization with Optimal Output Utility. EDBT'12. 10.1145\/2247596.2247604","DOI":"10.1145\/2247596.2247604"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","unstructured":"J. Hu et al. Demographic prediction based on user's browsing behavior. WWW'07. 10.1145\/1242572.1242594","DOI":"10.1145\/1242572.1242594"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321440.1321573"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321440.1321575"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","unstructured":"A. Korolova et al. Releasing search queries and clicks privately. WWW'09. 10.1145\/1526709.1526733","DOI":"10.1145\/1526709.1526733"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","unstructured":"R. Kumar et al. On anonymizing query logs via token-based hashing. WWW'07. 10.1145\/1242572.1242657","DOI":"10.1145\/1242572.1242657"},{"volume-title":"ICDE'07","author":"Li N.","key":"e_1_3_2_1_22_1","unstructured":"N. Li, T. Li, S. Venkatasubramanian. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. ICDE'07."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516686"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","unstructured":"A. Machanavajjhala et al. L-diversity: Privacy beyond k-anonymity. TKDD'07. 10.1145\/1217299.1217302","DOI":"10.1145\/1217299.1217302"},{"volume-title":"NIPS'13","author":"Mikolov T.","key":"e_1_3_2_1_25_1","unstructured":"T. Mikolov et al. Distributed Representations of Words and Phrases and their Compositionality. NIPS'13."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.46"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2011.01.004"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.43"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","unstructured":"S. T. Peddinti et al. Cloak and swagger: Understanding data sensitivity through the lens of user anonymity IEEE S&P '14. 10.1109\/SP.2014.38","DOI":"10.1109\/SP.2014.38"},{"volume-title":"ICWSM'11","author":"Pennacchiotti M.","key":"e_1_3_2_1_31_1","unstructured":"M. Pennacchiotti, A.-M. Popescu. A machine learning approach to twitter user classification. ICWSM'11."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","unstructured":"A. Singla et al. Stochastic Privacy. AAAI'14.","DOI":"10.5555\/2893873.2893899"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2012.11.005"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835537"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721674"},{"key":"e_1_3_2_1_37_1","unstructured":"A. Zhang et al. Privacy Risk in Anonymized Heterogeneous Information Networks. EDBT'14."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","unstructured":"J. Zhang M. S. Ackerman L. Adamic. Expertise networks in online communities: Structure and algorithms. WWW'07. 10.1145\/1242572.1242603","DOI":"10.1145\/1242572.1242603"}],"event":{"name":"SIGIR '16: The 39th International ACM SIGIR conference on research and development in Information Retrieval","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Pisa Italy","acronym":"SIGIR '16"},"container-title":["Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2911451.2911533","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2911451.2911533","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:55:03Z","timestamp":1750222503000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2911451.2911533"}},"subtitle":["An IR-Centric Approach to Assessing Privacy Risks for Users in Online Communities"],"short-title":[],"issued":{"date-parts":[[2016,7,7]]},"references-count":38,"alternative-id":["10.1145\/2911451.2911533","10.1145\/2911451"],"URL":"https:\/\/doi.org\/10.1145\/2911451.2911533","relation":{},"subject":[],"published":{"date-parts":[[2016,7,7]]},"assertion":[{"value":"2016-07-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}