{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:08:10Z","timestamp":1771466890531,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,27]],"date-time":"2018-06-27T00:00:00Z","timestamp":1530057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Basic Research Program of China (973 Program)","award":["2015CB352502"],"award-info":[{"award-number":["2015CB352502"]}]},{"name":"The Project of Thousand Youth Talents 2016"},{"name":"National Natural Science Foundation of China","award":["61702300"],"award-info":[{"award-number":["61702300"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,27]]},"DOI":"10.1145\/3209978.3209995","type":"proceedings-article","created":{"date-parts":[[2018,7,2]],"date-time":"2018-07-02T12:12:40Z","timestamp":1530533560000},"page":"295-304","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["A Personal Privacy Preserving Framework"],"prefix":"10.1145","author":[{"given":"Xuemeng","family":"Song","sequence":"first","affiliation":[{"name":"Shandong University, Qingdao, China"}]},{"given":"Xiang","family":"Wang","sequence":"additional","affiliation":[{"name":"National Unversity of Singapore, Singapore, Singapore"}]},{"given":"Liqiang","family":"Nie","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, China"}]},{"given":"Xiangnan","family":"He","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Zhumin","family":"Chen","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, China"}]},{"given":"Wei","family":"Liu","sequence":"additional","affiliation":[{"name":"Tencent AI Lab, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2018,6,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080813"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-007-5040-8"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646169"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1137\/080716542"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080830"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665958"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007379606734"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911491"},{"key":"e_1_3_2_1_10_1","volume-title":"Exploiting Music Play Sequence for Music Recommendation Proceedings of the International Joint Conference on Artificial Intelligence, IJCAI. 3654--3660","author":"Cheng Zhiyong","year":"2017"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022627411411"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441937"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01885.x"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277763"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277763"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063719"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080773"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0028106"},{"key":"e_1_3_2_1_19_1","volume-title":"International Conference on Machine Learning","volume":"96","author":"Freund Yoav","year":"1996"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767780"},{"key":"e_1_3_2_1_21_1","volume-title":"Benchmarking the Privacy-Preserving People Search. In The International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM.","author":"Han Shuguang","year":"2014"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080777"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511840371"},{"key":"e_1_3_2_1_24_1","volume-title":"Conference of International Communication Association","author":"Humphreys Lee","year":"2010"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2013.848917"},{"key":"e_1_3_2_1_26_1","first-page":"15","article-title":"The influence of personality traits and information privacy concerns on behavioral intentions","volume":"48","author":"Korzaan Melinda L","year":"2008","journal-title":"Journal of Computer Information Systems"},{"key":"e_1_3_2_1_27_1","volume-title":"Learning Task Grouping and Overlap in Multi-task Learning International Conference on Machine Learning. 1383--1390","author":"Kumar Abhishek","year":"2012"},{"key":"e_1_3_2_1_28_1","volume-title":"The measurement of observer agreement for categorical data. biometrics","author":"Richard Landis J","year":"1977"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1870096.1870102"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046558"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557090"},{"key":"e_1_3_2_1_32_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean . 2013. Distributed representations of words and phrases and their compositionality NIPS. 3111--3119.   Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean . 2013. Distributed representations of words and phrases and their compositionality NIPS. 3111--3119."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/541177"},{"key":"e_1_3_2_1_34_1","volume-title":"Boundaries of privacy: Dialectics of disclosure","author":"Sandra Petronio"},{"key":"e_1_3_2_1_35_1","volume-title":"privacy, and security online","author":"Rainie Lee","year":"2013"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466448"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2832907"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767726"},{"key":"e_1_3_2_1_39_1","volume-title":"2015 b. Interest inference via structure-constrained multi-source multi-task learning International Joint Conference on Artificial Intelligence","author":"Song Xuemeng"},{"key":"e_1_3_2_1_40_1","unstructured":"Yi Song Daniel Dahlmeier and Stephane Bressan . 2014. Not So Unique in the Crowd: a Simple and Effective Algorithm for Anonymizing Location Data The International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM 19.  Yi Song Daniel Dahlmeier and Stephane Bressan . 2014. Not So Unique in the Crowd: a Simple and Effective Algorithm for Anonymizing Location Data The International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM 19."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2609621"},{"key":"e_1_3_2_1_42_1","series-title":"Series B (Methodological)","volume-title":"Regression shrinkage and selection via the lasso. Journal of the Royal Statistical Society","author":"Robert Tibshirani","year":"1996"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21610"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767699"},{"key":"e_1_3_2_1_45_1","volume-title":"Empirical Data Analysis on User Privacy and Sentiment in Personal Blogs The International ACM SIGIR Conference on Research and Development in Information Retrieval.","author":"Woo Simon S","year":"2015"},{"key":"e_1_3_2_1_46_1","volume-title":"The International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, 41--42","author":"Zhang Sicong","year":"2014"}],"event":{"name":"SIGIR '18: The 41st International ACM SIGIR conference on research and development in Information Retrieval","location":"Ann Arbor MI USA","acronym":"SIGIR '18","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["The 41st International ACM SIGIR Conference on Research &amp; Development in Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209978.3209995","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3209978.3209995","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:48Z","timestamp":1750212468000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209978.3209995"}},"subtitle":["I Let You Know Who Can See What"],"short-title":[],"issued":{"date-parts":[[2018,6,27]]},"references-count":46,"alternative-id":["10.1145\/3209978.3209995","10.1145\/3209978"],"URL":"https:\/\/doi.org\/10.1145\/3209978.3209995","relation":{},"subject":[],"published":{"date-parts":[[2018,6,27]]},"assertion":[{"value":"2018-06-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}