{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:17Z","timestamp":1750221317030,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,6]],"date-time":"2017-11-06T00:00:00Z","timestamp":1509926400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Alexander von Humboldt Foundation"},{"name":"European Research Council","award":["ERC Synergy Grant 610150 (imPACT)"],"award-info":[{"award-number":["ERC Synergy Grant 610150 (imPACT)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,6]]},"DOI":"10.1145\/3132847.3133040","type":"proceedings-article","created":{"date-parts":[[2017,11,6]],"date-time":"2017-11-06T13:30:29Z","timestamp":1509975029000},"page":"267-276","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Learning to Un-Rank"],"prefix":"10.1145","author":[{"given":"Asia J.","family":"Biega","sequence":"first","affiliation":[{"name":"Max Planck Institute for Informatics, Saarbr\u00fccken, Germany"}]},{"given":"Azin","family":"Ghazimatin","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Informatics, Saarbr\u00fccken, Germany"}]},{"given":"Hakan","family":"Ferhatosmanoglu","sequence":"additional","affiliation":[{"name":"University of Warwick, Coventry, United Kingdom"}]},{"given":"Krishna P.","family":"Gummadi","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Software Systems, Saarbr\u00fccken, Germany"}]},{"given":"Gerhard","family":"Weikum","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Informatics, Saarbr\u00fccken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2017,11,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-015-0404-3"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470658"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911533"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741691"},{"volume-title":"Facebook's privacy trainwreck: Exposure, invasion, and social convergence. Convergence","year":"2008","key":"e_1_3_2_1_5_1","unstructured":"danah boyd. 2008. Facebook's privacy trainwreck: Exposure, invasion, and social convergence. Convergence ( 2008 ). danah boyd. 2008. Facebook's privacy trainwreck: Exposure, invasion, and social convergence. Convergence (2008)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2516633.2516637"},{"key":"e_1_3_2_1_7_1","unstructured":"Ben Carterette and Rosie Jones Evaluating search engines by modeling the relationship between relevance and clicks NIPS '08.   Ben Carterette and Rosie Jones Evaluating search engines by modeling the relationship between relevance and clicks NIPS '08."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2009916.2009999"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2749451"},{"volume-title":"Krishna P Gummadi The Many Shades of Anonymity: Characterizing Anonymous Social Media Content. ICWSM '15","author":"Correa Denzil","key":"e_1_3_2_1_10_1","unstructured":"Denzil Correa , Leandro Ara\u00fajo Silva , Mainack Mondal , Fabr'\u0131cio Benevenuto , and Krishna P Gummadi The Many Shades of Anonymity: Characterizing Anonymous Social Media Content. ICWSM '15 . Denzil Correa, Leandro Ara\u00fajo Silva, Mainack Mondal, Fabr'\u0131cio Benevenuto, and Krishna P Gummadi The Many Shades of Anonymity: Characterizing Anonymous Social Media Content. ICWSM '15."},{"key":"e_1_3_2_1_11_1","unstructured":"W Bruce Croft Donald Metzler and Trevor Strohmann. 2010. Search engines. Pearson Education.  W Bruce Croft Donald Metzler and Trevor Strohmann. 2010. Search engines. Pearson Education."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10707-014-0215-5"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783311"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660367"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.26"},{"volume-title":"Xueqing Li Efficient Snapshot KNN Join Processing for Large Data Using MapReduce ICPADS '16","author":"Hu Yupeng","key":"e_1_3_2_1_16_1","unstructured":"Yupeng Hu , Chong Yang , Cun Ji , Yang Xu , and Xueqing Li Efficient Snapshot KNN Join Processing for Large Data Using MapReduce ICPADS '16 . Yupeng Hu, Chong Yang, Cun Ji, Yang Xu, and Xueqing Li Efficient Snapshot KNN Join Processing for Large Data Using MapReduce ICPADS '16."},{"volume-title":"Snoeren Pinning Down Abuse on Google Maps. In WWW '17","author":"Huang Danny Yuxing","key":"e_1_3_2_1_17_1","unstructured":"Danny Yuxing Huang , Doug Grundman , Kurt Thomas , Abhishek Kumar , Elie Bursztein , Kirill Levchenko , and Alex C . Snoeren Pinning Down Abuse on Google Maps. In WWW '17 . Danny Yuxing Huang, Doug Grundman, Kurt Thomas, Abhishek Kumar, Elie Bursztein, Kirill Levchenko, and Alex C. Snoeren Pinning Down Abuse on Google Maps. In WWW '17."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1391729.1391730"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150429"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.36"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989361"},{"key":"e_1_3_2_1_22_1","volume-title":"IRTA: An Improved Threshold Algorithm for Reverse Top-k Queries. ICEIS (1).","author":"Luo Cheng","year":"2011","unstructured":"Cheng Luo , Feng Yu , Wen-Chi Hou , Zhewei Jiang , Dunren Che , and Shan He . 2011 . IRTA: An Improved Threshold Algorithm for Reverse Top-k Queries. ICEIS (1). Cheng Luo, Feng Yu, Wen-Chi Hou, Zhewei Jiang, Dunren Che, and Shan He. 2011. IRTA: An Improved Threshold Algorithm for Reverse Top-k Queries. ICEIS (1)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3054197"},{"volume-title":"Managing online privacy via exposure USEC '14","author":"Mondal Mainack","key":"e_1_3_2_1_24_1","unstructured":"Mainack Mondal , Peter Druschel , Krishna P Gummadi , and Alan Mislove Beyond access control : Managing online privacy via exposure USEC '14 . Mainack Mondal, Peter Druschel, Krishna P Gummadi, and Alan Mislove Beyond access control: Managing online privacy via exposure USEC '14."},{"volume-title":"Aniket Kate Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data. In SOUPS '16","author":"Mondal Mainack","key":"e_1_3_2_1_25_1","unstructured":"Mainack Mondal , Johnnatan Messias , Saptarshi Ghosh , Krishna P Gummadi , and Aniket Kate Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data. In SOUPS '16 . Mainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P Gummadi, and Aniket Kate Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data. In SOUPS '16."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339677"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078846"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273221.1273222"},{"volume-title":"the case of sporadic location exposure PETS '11","author":"Shokri Reza","key":"e_1_3_2_1_29_1","unstructured":"Reza Shokri , George Theodorakopoulos , George Danezis , Jean-Pierre Hubaux , and Jean-Yves Le Boudec Quantifying location privacy : the case of sporadic location exposure PETS '11 . Reza Shokri, George Theodorakopoulos, George Danezis, Jean-Pierre Hubaux, and Jean-Yves Le Boudec Quantifying location privacy: the case of sporadic location exposure PETS '11."},{"volume-title":"VLDB '04","author":"Tao Yufei","key":"e_1_3_2_1_30_1","unstructured":"Yufei Tao , Dimitris Papadias , and Xiang Lian Reverse kNN search in arbitrary dimensionality . In VLDB '04 . Yufei Tao, Dimitris Papadias, and Xiang Lian Reverse kNN search in arbitrary dimensionality. In VLDB '04."},{"key":"e_1_3_2_1_31_1","volume-title":"The psychological meaning of words: LIWC and computerized text analysis methods. Journal of language and social psychology","author":"Tausczik Yla R","year":"2010","unstructured":"Yla R Tausczik and James W Pennebaker . 2010. The psychological meaning of words: LIWC and computerized text analysis methods. Journal of language and social psychology ( 2010 ). Yla R Tausczik and James W Pennebaker. 2010. The psychological meaning of words: LIWC and computerized text analysis methods. Journal of language and social psychology (2010)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935842"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.50"},{"volume-title":"ICDE '14","author":"Wang Peng","key":"e_1_3_2_1_34_1","unstructured":"Peng Wang and Chinya V Ravishankar On masking topical intent in keyword search . In ICDE '14 . Peng Wang and Chinya V Ravishankar On masking topical intent in keyword search. In ICDE '14."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242652"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.47"},{"volume-title":"KDD '97","author":"Zamir Oren","key":"e_1_3_2_1_37_1","unstructured":"Oren Zamir , Oren Etzioni , Omid Madani , and Richard M Karp Fast and Intuitive Clustering of Web Documents .. KDD '97 . Oren Zamir, Oren Etzioni, Omid Madani, and Richard M Karp Fast and Intuitive Clustering of Web Documents.. KDD '97."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2914732"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732951.2732952"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772886"}],"event":{"name":"CIKM '17: ACM Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Singapore Singapore","acronym":"CIKM '17"},"container-title":["Proceedings of the 2017 ACM on Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132847.3133040","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132847.3133040","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:47Z","timestamp":1750212827000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132847.3133040"}},"subtitle":["Quantifying Search Exposure for Users in Online Communities"],"short-title":[],"issued":{"date-parts":[[2017,11,6]]},"references-count":40,"alternative-id":["10.1145\/3132847.3133040","10.1145\/3132847"],"URL":"https:\/\/doi.org\/10.1145\/3132847.3133040","relation":{},"subject":[],"published":{"date-parts":[[2017,11,6]]},"assertion":[{"value":"2017-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}