{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T15:48:49Z","timestamp":1757778529439,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,23]],"date-time":"2021-07-23T00:00:00Z","timestamp":1626998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Beijing Natural Science Foundation","award":["4202002"],"award-info":[{"award-number":["4202002"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,7,23]]},"DOI":"10.1145\/3478905.3478937","type":"proceedings-article","created":{"date-parts":[[2021,9,28]],"date-time":"2021-09-28T15:58:28Z","timestamp":1632844708000},"page":"159-165","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Adversarial Text Generation for Personality Privacy Protection"],"prefix":"10.1145","author":[{"given":"Zhe","family":"Wang","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Kangfeng","family":"Zheng","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Qingbiao","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Maonan","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Xiujuan","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2021,9,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The art of deception: Controlling the human element of security","author":"Mitnick K D","year":"2011","unstructured":"Mitnick K D , Simon W L . The art of deception: Controlling the human element of security . John Wiley & Sons , 2011 . Mitnick K D, Simon W L. The art of deception: Controlling the human element of security. John Wiley & Sons, 2011."},{"key":"e_1_3_2_1_2_1","volume-title":"Social engineering deception susceptibility: Modification of personality traits susceptible to social engineering manipulation to acquire information through attack and exploitation","author":"Stewart J H","year":"2015","unstructured":"Stewart Jr J H . Social engineering deception susceptibility: Modification of personality traits susceptible to social engineering manipulation to acquire information through attack and exploitation . Colorado Technical University , 2015 . Stewart Jr J H. Social engineering deception susceptibility: Modification of personality traits susceptible to social engineering manipulation to acquire information through attack and exploitation. Colorado Technical University, 2015."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/358669.358692"},{"key":"e_1_3_2_1_4_1","volume-title":"Advanced social engineering attacks. Journal of Information Security and applications","author":"Krombholz K","year":"2015","unstructured":"Krombholz K , Hobel H , Huber M , Advanced social engineering attacks. Journal of Information Security and applications , 2015 , 22: 113-122. Krombholz K, Hobel H, Huber M, Advanced social engineering attacks. Journal of Information Security and applications, 2015, 22: 113-122."},{"key":"e_1_3_2_1_5_1","first-page":"74","article-title":"Phone-based Metric as a Predictor for Basic Personality Traits[J]","author":"Monsted","year":"2016","unstructured":"Monsted , Bjarke, Mollgaard A , Mathiesen J . Phone-based Metric as a Predictor for Basic Personality Traits[J] . Journal of Research in Personality , 2016 , 74 . Monsted, Bjarke, Mollgaard A, Mathiesen J. Phone-based Metric as a Predictor for Basic Personality Traits[J]. Journal of Research in Personality, 2016, 74.","journal-title":"Journal of Research in Personality"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2010.07.001"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2010.5588500"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 7th Multidisciplinary in International Social Networks Conference and The 3rd International Conference on Economics, Management and Technology (MISNC2020&IEMT2020)","author":"Hsin-Chang Yang","year":"2020","unstructured":"Hsin-Chang Yang , Chung-Hong Lee, and Chia-Yi Yeh . 2020 . Mining Personality Traits from Social Text Messages . In Proceedings of the 7th Multidisciplinary in International Social Networks Conference and The 3rd International Conference on Economics, Management and Technology (MISNC2020&IEMT2020) . Association for Computing Machinery, New York, NY, USA, Article 17, 1\u20135. DOI:https:\/\/doi.org\/10.1145\/3429395.3429412 10.1145\/3429395.3429412 Hsin-Chang Yang, Chung-Hong Lee, and Chia-Yi Yeh. 2020. Mining Personality Traits from Social Text Messages. In Proceedings of the 7th Multidisciplinary in International Social Networks Conference and The 3rd International Conference on Economics, Management and Technology (MISNC2020&IEMT2020). Association for Computing Machinery, New York, NY, USA, Article 17, 1\u20135. DOI:https:\/\/doi.org\/10.1145\/3429395.3429412"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2021.05.004"},{"key":"e_1_3_2_1_10_1","first-page":"1003","article-title":"Machine intelligence based personality prediction using social profile data[C]\/\/2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"2020","author":"Rohit G V","unstructured":"Rohit G V , Bharadwaj K R , Hemanth R , Machine intelligence based personality prediction using social profile data[C]\/\/2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT) . IEEE , 2020 : 1003 - 1008 . Rohit G V, Bharadwaj K R, Hemanth R, Machine intelligence based personality prediction using social profile data[C]\/\/2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT). IEEE, 2020: 1003-1008.","journal-title":"IEEE"},{"volume-title":"IEEE International Conference on Services Computing (SCC). IEEE","author":"Wang S","key":"e_1_3_2_1_11_1","unstructured":"Wang S , Cui L , Liu L , Personality Traits Prediction Based on Users\u2019 Digital Footprints in Social Networks via Attention RNN[C]\/\/202 0 IEEE International Conference on Services Computing (SCC). IEEE , 2020: 54-56. Wang S, Cui L, Liu L, Personality Traits Prediction Based on Users\u2019 Digital Footprints in Social Networks via Attention RNN[C]\/\/2020 IEEE International Conference on Services Computing (SCC). IEEE, 2020: 54-56."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3390\/info11040179"},{"issue":"3","key":"e_1_3_2_1_13_1","first-page":"1","volume":"51","author":"Almlund M","year":"2011","unstructured":"Almlund M , Duckworth A , Heckman J J , Personality Psychology and Economics . Iza Discussion Papers , 2011 , 51 ( 3 ): 1 \u2013 181 . Almlund M, Duckworth A, Heckman J J, Personality Psychology and Economics. Iza Discussion Papers, 2011, 51(3):1\u2013181.","journal-title":"Iza Discussion Papers"},{"key":"e_1_3_2_1_14_1","volume-title":"Observer ratings of personality. Handbook of research methods in personality psychology","author":"McCrae R R","year":"2007","unstructured":"McCrae R R , Weiss A. Observer ratings of personality. Handbook of research methods in personality psychology , 2007 : 259-272. McCrae R R, Weiss A. Observer ratings of personality. Handbook of research methods in personality psychology, 2007: 259-272."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/info12020081"},{"key":"e_1_3_2_1_16_1","volume-title":"Automatic personality assessment through social media language. Journal of personality and social psychology","author":"Park G","year":"2015","unstructured":"Park G , Schwartz H A , Eichstaedt J C , Automatic personality assessment through social media language. Journal of personality and social psychology , 2015 , 108(6): 934. Park G, Schwartz H A, Eichstaedt J C, Automatic personality assessment through social media language. Journal of personality and social psychology, 2015, 108(6): 934."},{"key":"e_1_3_2_1_17_1","volume-title":"Personality Predictions Based on User Behaviour on the Facebook Social Media Platform[J]","author":"Tadesse M M","year":"2018","unstructured":"Tadesse M M , Lin H , Xu B , Personality Predictions Based on User Behaviour on the Facebook Social Media Platform[J] . IEEE Access , 2018 : 1-1. Tadesse M M , Lin H , Xu B , Personality Predictions Based on User Behaviour on the Facebook Social Media Platform[J]. IEEE Access, 2018:1-1."},{"key":"e_1_3_2_1_18_1","first-page":"108886831877299","article-title":"Using Machine Learning to Advance Personality Assessment and Theory[J]","volume":"2018","author":"Bleidorn W","unstructured":"Bleidorn W , Hopwood C J . Using Machine Learning to Advance Personality Assessment and Theory[J] . Personality and Social Psychology Review , 2018 : 108886831877299 . Bleidorn W , Hopwood C J . Using Machine Learning to Advance Personality Assessment and Theory[J]. Personality and Social Psychology Review, 2018:108886831877299.","journal-title":"Personality and Social Psychology Review"},{"key":"e_1_3_2_1_19_1","volume-title":"25 Tweets to Know You: A New Model to Predict Personality with Social Media[J]","author":"Arnoux P H","year":"2017","unstructured":"Arnoux P H , Xu A , Boyette N , 25 Tweets to Know You: A New Model to Predict Personality with Social Media[J] . 2017 . Arnoux P H , Xu A , Boyette N , 25 Tweets to Know You: A New Model to Predict Personality with Social Media[J]. 2017."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISWC.2011.29"},{"key":"e_1_3_2_1_21_1","first-page":"330","volume-title":"Proceedings of the ACM International Conference on Ubiquitous Computing","author":"Staiano F.","year":"2012","unstructured":"J. Staiano , F. Pianesi , B. Lepri , N. Sebe , Friends don't lie:Inferring personality traits from social network structure . In Proceedings of the ACM International Conference on Ubiquitous Computing , 2012 , pp. 321\u2013 330 . J. Staiano, F. Pianesi, B. Lepri, N. Sebe, Friends don't lie:Inferring personality traits from social network structure. In Proceedings of the ACM International Conference on Ubiquitous Computing, 2012, pp. 321\u2013330."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685221211219173"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSII.2012.6454454"},{"key":"e_1_3_2_1_24_1","volume-title":"Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks","author":"Halevi T","year":"2015","unstructured":"Halevi T , Memon N , Nov O. Spear-Phishing in the Wild: A Real-World Study of Personality , Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks . Social Science Electronic Publishing , 2015 . Halevi T, Memon N, Nov O. Spear-Phishing in the Wild: A Real-World Study of Personality, Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks. Social Science Electronic Publishing, 2015."},{"key":"e_1_3_2_1_25_1","volume-title":"A Personality Based Model for Determining Susceptibility to Phishing Attacks","author":"Parrish J L","year":"2009","unstructured":"Parrish J L , Bailey J L , Courtney J F . A Personality Based Model for Determining Susceptibility to Phishing Attacks . 2009 . Parrish J L, Bailey J L, Courtney J F. A Personality Based Model for Determining Susceptibility to Phishing Attacks. 2009."},{"key":"e_1_3_2_1_26_1","volume-title":"Lee K","author":"Devlin J","year":"2018","unstructured":"Devlin J , Chang M W , Lee K , BERT : Pre-training of Deep Bidirectional Transformers for Language Understanding [J]. 2018 . Devlin J, Chang M W, Lee K, BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding[J]. 2018."},{"key":"e_1_3_2_1_27_1","volume-title":"Fast Gradient Projection Method for Text Adversary Generation and Adversarial Training[J]","author":"Wang X","year":"2020","unstructured":"Wang X , Yang Y , Deng Y , Fast Gradient Projection Method for Text Adversary Generation and Adversarial Training[J] . 2020 . Wang X, Yang Y, Deng Y, Fast Gradient Projection Method for Text Adversary Generation and Adversarial Training[J]. 2020."},{"key":"e_1_3_2_1_28_1","volume-title":"Seventh International AAAI Conference on Weblogs and Social Media","author":"Markovikj","year":"2013","unstructured":"Markovikj , Dejan and Gievska, Sonja and Kosinski, Michal and Stillwell, David J. Mining facebook data for predictive personality modeling . In Seventh International AAAI Conference on Weblogs and Social Media 2013 . Markovikj, Dejan and Gievska, Sonja and Kosinski, Michal and Stillwell, David J. Mining facebook data for predictive personality modeling. In Seventh International AAAI Conference on Weblogs and Social Media 2013."}],"event":{"name":"DSIT 2021: 2021 4th International Conference on Data Science and Information Technology","acronym":"DSIT 2021","location":"Shanghai China"},"container-title":["2021 4th International Conference on Data Science and Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3478905.3478937","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3478905.3478937","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:37Z","timestamp":1750191517000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3478905.3478937"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,23]]},"references-count":28,"alternative-id":["10.1145\/3478905.3478937","10.1145\/3478905"],"URL":"https:\/\/doi.org\/10.1145\/3478905.3478937","relation":{},"subject":[],"published":{"date-parts":[[2021,7,23]]},"assertion":[{"value":"2021-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}