{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:29Z","timestamp":1750306169726,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,9,12]],"date-time":"2016-09-12T00:00:00Z","timestamp":1473638400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,9,12]]},"DOI":"10.1145\/2970398.2970417","type":"proceedings-article","created":{"date-parts":[[2016,9,9]],"date-time":"2016-09-09T14:28:57Z","timestamp":1473431337000},"page":"281-290","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A Utility Maximization Framework for Privacy Preservation of User Generated Content"],"prefix":"10.1145","author":[{"given":"Yi","family":"Fang","sequence":"first","affiliation":[{"name":"Santa Clara University, Santa Clara, CA, USA"}]},{"given":"Archana","family":"Godavarthy","sequence":"additional","affiliation":[{"name":"Santa Clara University, Santa Clara, CA, USA"}]},{"given":"Haibing","family":"Lu","sequence":"additional","affiliation":[{"name":"Santa Clara University, Santa Clara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,9,12]]},"reference":[{"volume-title":"MDAI.","year":"2011","author":"Abril D.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441878"},{"journal-title":"t-plausibility: Generalizing words to desensitize text. Transactions on Data Privacy","year":"2012","author":"Anandan B.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366190"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"E. Bier R. Chow P. Golle T. H. King and J. Staddon. The rules of redaction: Identify protect review (and repeat). W2SP 2009.  E. Bier R. Chow P. Golle T. H. King and J. Staddon. The rules of redaction: Identify protect review (and repeat). W2SP 2009.","DOI":"10.1109\/MSP.2009.183"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458194"},{"volume-title":"IAAI","year":"2011","author":"Cumby C. M.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2005.1588104"},{"volume-title":"Pew Research Center","year":"2015","author":"Duggan M.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.3115\/1219840.1219885"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"volume-title":"ICA","year":"2010","author":"Humphreys L.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.353"},{"volume-title":"ICML","year":"2014","author":"Le Q. V.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.11"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"C. D. Manning P. Raghavan H. Sch\u00fctze etal Introduction to information retrieval. Cambridge university press 2008.   C. D. Manning P. Raghavan H. Sch\u00fctze et al. Introduction to information retrieval. Cambridge university press 2008.","DOI":"10.1017\/CBO9780511809071"},{"volume-title":"SIGIR Workshop on PIR","year":"2014","author":"Marujo L.","key":"e_1_3_2_1_18_1"},{"volume-title":"SIGIR Workshop on PIR","year":"2015","author":"Marujo L.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","first-page":"10","author":"Meystre S. M.","year":"2010","journal-title":"BMC Medical Research Methodology"},{"volume-title":"HHS","year":"2003","author":"Health U. D.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.38"},{"key":"e_1_3_2_1_23_1","first-page":"12","author":"Pedregosa F.","year":"2011","journal-title":"JMLR"},{"volume-title":"AMIA Symposium","year":"2000","author":"Ruch P.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34620-0_17"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.06.042"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Y. Saygin D. Hakkani-Tur and G. Tur. Sanitization and anonymization of document repositories. Web and information security 2005.  Y. Saygin D. Hakkani-Tur and G. Tur. Sanitization and anonymization of document repositories. Web and information security 2005.","DOI":"10.4018\/978-1-59140-588-7.ch007"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2600737"},{"volume-title":"USENIX Security","year":"2007","author":"Staddon J.","key":"e_1_3_2_1_29_1"},{"volume-title":"AMIA","year":"1996","author":"Sweeney L.","key":"e_1_3_2_1_30_1"},{"volume-title":"Health","year":"2000","author":"Sweeney L.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"volume-title":"HelsIT","year":"2004","author":"Tveit A.","key":"e_1_3_2_1_33_1"},{"volume-title":"SIGIR Workshop on PIR","year":"2015","author":"Woo S. S.","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767857"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2917763"},{"volume-title":"SIGIR Workshop on PIR","year":"2015","author":"Zhang S.","key":"e_1_3_2_1_37_1"}],"event":{"name":"ICTIR '16: ACM SIGIR International Conference on the Theory of Information Retrieval","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Newark Delaware USA","acronym":"ICTIR '16"},"container-title":["Proceedings of the 2016 ACM International Conference on the Theory of Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970398.2970417","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970398.2970417","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:07Z","timestamp":1750218007000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970398.2970417"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,12]]},"references-count":37,"alternative-id":["10.1145\/2970398.2970417","10.1145\/2970398"],"URL":"https:\/\/doi.org\/10.1145\/2970398.2970417","relation":{},"subject":[],"published":{"date-parts":[[2016,9,12]]},"assertion":[{"value":"2016-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}