{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T03:37:32Z","timestamp":1768448252923,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,30]],"date-time":"2019-01-30T00:00:00Z","timestamp":1548806400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,30]]},"DOI":"10.1145\/3289600.3291026","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T12:33:01Z","timestamp":1552307581000},"page":"213-221","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Protecting User Privacy"],"prefix":"10.1145","author":[{"given":"Ghazaleh","family":"Beigi","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Ruocheng","family":"Guo","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Alexander","family":"Nou","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Yanchao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Huan","family":"Liu","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,1,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Early Identification of Pathogenic Social MediaAccounts","author":"Alvari Hamidreza","unstructured":"Hamidreza Alvari , ElhamShaabani, and Paulo Shakarian . 2018. Early Identification of Pathogenic Social MediaAccounts . In IEEE Intelligence and SecurityInformatics (ISI). IEEE. Hamidreza Alvari, ElhamShaabani, and Paulo Shakarian. 2018. Early Identification of Pathogenic Social MediaAccounts. In IEEE Intelligence and SecurityInformatics (ISI). IEEE."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13388-017-0029-8"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.36"},{"key":"e_1_3_2_1_4_1","volume-title":"Mitigationand Applications. arXiv preprint arXiv:1808.02191","author":"Beigi Ghazaleh","year":"2018","unstructured":"Ghazaleh Beigi and HuanLiu. 2018a. Privacy in Social Media: Identification , Mitigationand Applications. arXiv preprint arXiv:1808.02191 ( 2018 ). Ghazaleh Beigi and HuanLiu. 2018a. Privacy in Social Media: Identification, Mitigationand Applications. arXiv preprint arXiv:1808.02191 (2018)."},{"key":"e_1_3_2_1_5_1","volume-title":"InternationalConference on Social Computing, Behavioral-Cultural Modeling, andPrediction","author":"Beigi Ghazaleh","unstructured":"Ghazaleh Beigi and HuanLiu. 2018b. Similar but Different: Exploiting Users' Congruityfor Recommendation Systems . In InternationalConference on Social Computing, Behavioral-Cultural Modeling, andPrediction . Springer . Ghazaleh Beigi and HuanLiu. 2018b. Similar but Different: Exploiting Users' Congruityfor Recommendation Systems. In InternationalConference on Social Computing, Behavioral-Cultural Modeling, andPrediction. Springer."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209542.3209552"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974348.10"},{"key":"e_1_3_2_1_8_1","article-title":"Latent dirichlet allocation","volume":"3","author":"Blei David M","year":"2003","unstructured":"David M Blei , Andrew Y Ng , and Michael I Jordan . 2003 . Latent dirichlet allocation . Journal of machine Learning research , Vol. 3 , Jan (2003), bibinfopages993--1022. David M Blei, Andrew YNg, and Michael I Jordan. 2003. Latent dirichlet allocation. Journal of machine Learning research, Vol. 3, Jan (2003), bibinfopages993--1022.","journal-title":"Journal of machine Learning research"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.05.009"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866310"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409220.1409222"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1137\/090779346"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660367"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.26"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080783"},{"key":"e_1_3_2_1_17_1","volume-title":"TrackMeNot: Resisting surveillance in web search. Lessons from the Identity trail: Anonymity,privacy, and identity in a networked society","author":"Howe Daniel C","year":"2009","unstructured":"Daniel C Howe and HelenNissenbaum. 2009. TrackMeNot: Resisting surveillance in web search. Lessons from the Identity trail: Anonymity,privacy, and identity in a networked society , Vol. 23 ( 2009 ), 417--436. Daniel C Howe and HelenNissenbaum. 2009. TrackMeNot: Resisting surveillance in web search. Lessons from the Identity trail: Anonymity,privacy, and identity in a networked society, Vol. 23 (2009), 417--436."},{"key":"e_1_3_2_1_18_1","unstructured":"Jingyu Hua Chang Xia and Sheng Zhong. 2015. Differentially Private Matrix Factorization.. In IJCAI. 1763--1770.   Jingyu Hua Chang Xia and Sheng Zhong. 2015. Differentially Private Matrix Factorization.. In IJCAI. 1763--1770."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1946417.1946431"},{"key":"e_1_3_2_1_20_1","article-title":"Near-optimal sensor placements in Gaussianprocesses: Theory, efficient algorithms and empirical studies","volume":"9","author":"Krause Andreas","year":"2008","unstructured":"Andreas Krause , AjitSingh, and Carlos Guestrin . 2008 . Near-optimal sensor placements in Gaussianprocesses: Theory, efficient algorithms and empirical studies . Journal of Machine Learning Research , Vol. 9 , Feb (2008), bibinfopages235--284. Andreas Krause, AjitSingh, and Carlos Guestrin. 2008. Near-optimal sensor placements in Gaussianprocesses: Theory, efficient algorithms and empirical studies. Journal of Machine Learning Research, Vol. 9, Feb (2008), bibinfopages235--284.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_21_1","volume-title":"USENIX Security Symposium .","author":"Lerner Adam","year":"2016","unstructured":"Adam Lerner , Anna KornfeldSimpson , Tadayoshi Kohno , and FranziskaRoesner. 2016 . Internet Jones and the Raiders of the LostTrackers: An Archaeological Study of Web Tracking from 1996 to 2016 .. In USENIX Security Symposium . Adam Lerner, Anna KornfeldSimpson, Tadayoshi Kohno, and FranziskaRoesner. 2016. Internet Jones and the Raiders of the LostTrackers: An Archaeological Study of Web Tracking from 1996 to 2016.. In USENIX Security Symposium ."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2009916.2009937"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14778\/1988776.1988780"},{"key":"e_1_3_2_1_24_1","first-page":"415","volume-title":"Birds of a feather: Homophily in social networks. Annual review of sociology","author":"McPherson Miller","year":"2001","unstructured":"Miller McPherson , LynnSmith-Lovin, and James M Cook . 2001. Birds of a feather: Homophily in social networks. Annual review of sociology , Vol. 27 , 1 ( 2001 ), bibinfopages 415 -- 444 . Miller McPherson, LynnSmith-Lovin, and James M Cook. 2001. Birds of a feather: Homophily in social networks. Annual review of sociology, Vol. 27, 1 (2001), bibinfopages415--444."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557090"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883034"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01588971"},{"key":"e_1_3_2_1_29_1","volume-title":"mbox","author":"Phuong Tu Minh","year":"2014","unstructured":"Tu Minh Phuong mbox . 2014 . Gender prediction using browsing history. In Knowledge and Systems Engineering . Tu Minh Phuong et almbox. 2014. Gender prediction using browsing history. In Knowledge and Systems Engineering ."},{"key":"e_1_3_2_1_30_1","volume-title":"In Proceedings of the LREC 2010Workshop on New Challenges for NLP Frameworks. Citeseer.","author":"Rehurek Radim","year":"2010","unstructured":"Radim Rehurek and PetrSojka. 2010 . Software framework for topic modelling with largecorpora . In In Proceedings of the LREC 2010Workshop on New Challenges for NLP Frameworks. Citeseer. Radim Rehurek and PetrSojka. 2010. Software framework for topic modelling with largecorpora. In In Proceedings of the LREC 2010Workshop on New Challenges for NLP Frameworks. Citeseer."},{"key":"e_1_3_2_1_31_1","volume-title":"International conference on computer andinformation technology .","author":"Sarwar Badrul M","year":"2002","unstructured":"Badrul M Sarwar , GeorgeKarypis, Joseph Konstan , and JohnRiedl. 2002 . Recommender systems for large-scale e-commerce:Scalable neighborhood formation using clustering . In International conference on computer andinformation technology . Badrul M Sarwar, GeorgeKarypis, Joseph Konstan, and JohnRiedl. 2002. Recommender systems for large-scale e-commerce:Scalable neighborhood formation using clustering. In International conference on computer andinformation technology ."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.140"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978316"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Adish Singla EricHorvitz Ece Kamar and Ryen White. 2014. Stochastic privacy.. In AAAI. 152--158.   Adish Singla EricHorvitz Ece Kamar and Ryen White. 2014. Stochastic privacy.. In AAAI. 152--158.","DOI":"10.1609\/aaai.v28i1.8734"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883040"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052714"},{"key":"e_1_3_2_1_37_1","volume-title":"AAAI workshop on recommendation systems","volume":"1","author":"Ungar Lyle H","year":"1998","unstructured":"Lyle H Ungar and Dean P Foster . 1998 . Clustering methods for collaborative filtering . In AAAI workshop on recommendation systems , Vol. 1 . 114--129. Lyle H Ungar and Dean PFoster. 1998. Clustering methods for collaborative filtering. In AAAI workshop on recommendation systems, Vol. 1. 114--129."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2917763"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.77"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2914732"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772886"},{"key":"e_1_3_2_1_42_1","volume-title":"26th Security Symposium. USENIX,bibinfopages1391--1408","author":"Zimmeck Sebastian","year":"2017","unstructured":"Sebastian Zimmeck , Jie S Li , Hyungtae Kim , Steven M Bellovin ,and Tony Jebara . 2017 . A privacy analysis of cross-device tracking . In 26th Security Symposium. USENIX,bibinfopages1391--1408 . Sebastian Zimmeck, Jie SLi, Hyungtae Kim, Steven M Bellovin,and Tony Jebara. 2017. A privacy analysis of cross-device tracking. In 26th Security Symposium. USENIX,bibinfopages1391--1408."}],"event":{"name":"WSDM '19: The Twelfth ACM International Conference on Web Search and Data Mining","location":"Melbourne VIC Australia","acronym":"WSDM '19","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3289600.3291026","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3289600.3291026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:21Z","timestamp":1750208541000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3289600.3291026"}},"subtitle":["An Approach for Untraceable Web Browsing History and Unambiguous User Profiles"],"short-title":[],"issued":{"date-parts":[[2019,1,30]]},"references-count":42,"alternative-id":["10.1145\/3289600.3291026","10.1145\/3289600"],"URL":"https:\/\/doi.org\/10.1145\/3289600.3291026","relation":{},"subject":[],"published":{"date-parts":[[2019,1,30]]},"assertion":[{"value":"2019-01-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}