{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T17:38:19Z","timestamp":1769276299803,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1145\/3485447.3512232","type":"proceedings-article","created":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T05:11:23Z","timestamp":1650863483000},"page":"721-731","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["DP-VAE: Human-Readable Text Anonymization for Online Reviews with Differentially Private Variational Autoencoders"],"prefix":"10.1145","author":[{"given":"Benjamin","family":"Weggenmann","sequence":"first","affiliation":[{"name":"SAP Security Research, Germany"}]},{"given":"Valentin","family":"Rublack","sequence":"additional","affiliation":[{"name":"SAP Security Research, Germany"}]},{"given":"Michael","family":"Andrejczuk","sequence":"additional","affiliation":[{"name":"University of Edinburgh, United Kingdom"}]},{"given":"Justus","family":"Mattern","sequence":"additional","affiliation":[{"name":"SAP Security Research, Germany"}]},{"given":"Florian","family":"Kerschbaum","sequence":"additional","affiliation":[{"name":"University of Waterloo, Canada"}]}],"member":"320","published-online":{"date-parts":[[2022,4,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330701"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the acl workshop on intrinsic and extrinsic evaluation measures for machine translation and\/or summarization. 65\u201372","author":"Banerjee Satanjeev","year":"2005","unstructured":"Satanjeev Banerjee and Alon Lavie. 2005. METEOR: An automatic metric for MT evaluation with improved correlation with human judgments. In Proceedings of the acl workshop on intrinsic and extrinsic evaluation measures for machine translation and\/or summarization. 65\u201372."},{"key":"e_1_3_2_1_4_1","unstructured":"M. Barbaro T. Zeller and S. Hansell. 2006. A face is exposed for AOL searcher no. 4417749. New York Times 9 2008 (9 August 2006) 8For."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2014.56"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/K16-1002"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","unstructured":"Frederik\u00a0S. B\u00e4umer Nicolai Grote Joschka Kersting and Michaela Geierhos. 2017. Privacy Matters: Detecting Nocuous Patient Data Exposure in Online Physician Reviews. In Information and Software Technologies(Communications in Computer and Information Science) Robertas Dama\u0161evi\u010diusand Vilma Mika\u0161yt\u0117 (Eds.). Springer International Publishing Cham 77\u201389. https:\/\/doi.org\/10.1007\/978-3-319-67642-5_7","DOI":"10.1007\/978-3-319-67642-5_7"},{"key":"e_1_3_2_1_9_1","unstructured":"Daniel Cer Yinfei Yang Sheng-yi Kong Nan Hua Nicole Limtiaco Rhomni\u00a0St John Noah Constant Mario Guajardo-Cespedes Steve Yuan Chris Tar 2018. Universal sentence encoder. arXiv preprint arXiv:1803.11175(2018)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2021036"},{"key":"e_1_3_2_1_11_1","volume-title":"The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation. BMC genomics 21, 1","author":"Chicco Davide","year":"2020","unstructured":"Davide Chicco and Giuseppe Jurman. 2020. The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation. BMC genomics 21, 1 (2020), 1\u201313."},{"key":"e_1_3_2_1_12_1","unstructured":"Kyunghyun Cho Bart van Merrienboer \u00c7aglar G\u00fcl\u00e7ehre Fethi Bougares Holger Schwenk and Yoshua Bengio. 2014. Learning Phrase Representations using RNN Encoder-Decoder for Statistical Machine Translation. CoRR abs\/1406.1078(2014). arxiv:1406.1078http:\/\/arxiv.org\/abs\/1406.1078"},{"key":"e_1_3_2_1_13_1","volume-title":"Ngram and Bayesian classification of documents for topic and authorship. Literary and linguistic computing 18, 4","author":"Clement Ross","year":"2003","unstructured":"Ross Clement and David Sharp. 2003. Ngram and Bayesian classification of documents for topic and authorship. Literary and linguistic computing 18, 4 (2003), 423\u2013447."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11892755_87"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Y.-A. De\u00a0Montjoye C.A. Hidalgo M. Verleysen and V.D. Blondel. 2013. Unique in the crowd: The privacy bounds of human mobility. Scientific reports 3(2013).","DOI":"10.1038\/srep01376"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_2_1_17_1","unstructured":"Carl Doersch. 2016. Tutorial on Variational Autoencoders. CoRR abs\/1606.05908(2016). arXiv:1606.05908http:\/\/arxiv.org\/abs\/1606.05908"},{"key":"e_1_3_2_1_18_1","volume-title":"Local Privacy and Statistical Minimax Rates. In 2013 IEEE 54th Annual Symposium on Foundations of Computer Science. 429\u2013438","author":"Duchi C.","year":"2013","unstructured":"J.\u00a0C. Duchi, M.\u00a0I. Jordan, and M.\u00a0J. Wainwright. 2013. Local Privacy and Statistical Minimax Rates. In 2013 IEEE 54th Annual Symposium on Foundations of Computer Science. 429\u2013438."},{"key":"e_1_3_2_1_19_1","volume-title":"Theory of Cryptography","author":"Dwork Cynthia","unstructured":"Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating Noise to Sensitivity in Private Data Analysis. In Theory of Cryptography, Shai Halevi and Tal Rabin (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 265\u2013284."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork and Aaron Roth. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9 3\u20134(2014) 211\u2013407.","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 17th International Conference on Natural Language Processing (ICON). NLP Association of India (NLPAI), Indian Institute of Technology Patna","author":"Fabien Ma\u00ebl","year":"2020","unstructured":"Ma\u00ebl Fabien, Esau Villatoro-Tello, Petr Motlicek, and Shantipriya Parida. 2020. BertAA : BERT fine-tuning for Authorship Attribution. In Proceedings of the 17th International Conference on Natural Language Processing (ICON). NLP Association of India (NLPAI), Indian Institute of Technology Patna, Patna, India, 127\u2013137. https:\/\/aclanthology.org\/2020.icon-main.16"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1082"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17138-4_6"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371856"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2019.00031"},{"key":"e_1_3_2_1_26_1","volume-title":"Implicit Reparameterization Gradients. In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018","author":"Figurnov Mikhail","year":"2018","unstructured":"Mikhail Figurnov, Shakir Mohamed, and Andriy Mnih. 2018. Implicit Reparameterization Gradients. In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, December 3-8, 2018, Montr\u00e9al, Canada, Samy Bengio, Hanna\u00a0M. Wallach, Hugo Larochelle, Kristen Grauman, Nicol\u00f2 Cesa-Bianchi, and Roman Garnett (Eds.). 439\u2013450. https:\/\/proceedings.neurips.cc\/paper\/2018\/hash\/92c8c96e4c37100777c7190b76d28233-Abstract.html"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.06.018"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiolchem.2004.09.006"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACSIS.2017.8355063"},{"key":"e_1_3_2_1_30_1","first-page":"2","article-title":"Neural networks for machine learning lecture 6a overview of mini-batch gradient descent","volume":"14","author":"Hinton Geoffrey","year":"2012","unstructured":"Geoffrey Hinton, Nitish Srivastava, and Kevin Swersky. 2012. Neural networks for machine learning lecture 6a overview of mini-batch gradient descent. Cited on 14, 8 (2012), 2.","journal-title":"Cited on"},{"key":"e_1_3_2_1_31_1","unstructured":"Ari Holtzman Jan Buys Li Du Maxwell Forbes and Yejin Choi. 2019. The curious case of neural text degeneration. arXiv preprint arXiv:1904.09751(2019)."},{"key":"e_1_3_2_1_32_1","unstructured":"Tom Huddleston Jr.2019. Can you get sued over a negative Yelp review?https:\/\/www.cnbc.com\/2019\/10\/10\/can-you-get-sued-over-a-negative-yelp-review.html"},{"key":"e_1_3_2_1_33_1","unstructured":"Jack Newsham. 2021. A Bad Glassdoor Review Led to a $1 Million Lawsuit. https:\/\/www.businessinsider.com\/bad-glassdoor-reddit-review-led-to-a-1-million-lawsuit-2021-8"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 27th Annual Computer Security Applications Conference. ACM, 227\u2013236","author":"Jawurek M.","unstructured":"M. Jawurek, M. Johns, and K. Rieck. 2011. Smart metering de-pseudonymization. In Proceedings of the 27th Annual Computer Security Applications Conference. ACM, 227\u2013236."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1041"},{"key":"e_1_3_2_1_36_1","volume-title":"Overview of the Cross-domain Authorship Attribution Task at PAN","author":"Kestemont Mike","year":"2019","unstructured":"Mike Kestemont, Efstathios Stamatatos, Enrique Manjavacas, Walter Daelemans, Martin Potthast, and Benno Stein. 2019. Overview of the Cross-domain Authorship Attribution Task at PAN 2019.. In CLEF (Working Notes)."},{"key":"e_1_3_2_1_37_1","unstructured":"Yashwant Keswani H. Trivedi Parth Mehta and Prasenjit Majumder. 2016. Author Masking through Translation. In CLEF."},{"key":"e_1_3_2_1_38_1","volume-title":"Kingma and Jimmy Ba","author":"P.","year":"2017","unstructured":"Diederik\u00a0P. Kingma and Jimmy Ba. 2017. Adam: A Method for Stochastic Optimization. arxiv:1412.6980\u00a0[cs.LG]"},{"key":"e_1_3_2_1_39_1","volume-title":"Kingma and Max Welling","author":"P.","year":"2014","unstructured":"Diederik\u00a0P. Kingma and Max Welling. 2014. Auto-Encoding Variational Bayes. In 2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, April 14-16, 2014, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.). http:\/\/arxiv.org\/abs\/1312.6114"},{"key":"e_1_3_2_1_40_1","volume-title":"Kingma and Max Welling","author":"P.","year":"2019","unstructured":"Diederik\u00a0P. Kingma and Max Welling. 2019. An Introduction to Variational Autoencoders. CoRR abs\/1906.02691(2019). arXiv:1906.02691http:\/\/arxiv.org\/abs\/1906.02691"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002472.2002491"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0058"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/0005-2795(75)90109-9"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.11"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_2_1_46_1","unstructured":"Alec Radford Jeff Wu Rewon Child David Luan Dario Amodei and Ilya Sutskever. 2019. Language Models are Unsupervised Multitask Learners. (2019)."},{"key":"e_1_3_2_1_47_1","volume-title":"USENIX Security Symposium. 85\u201396","author":"Rao J.R.","year":"2000","unstructured":"J.R. Rao, P. Rohatgi, 2000. Can pseudonymity really guarantee privacy?. In USENIX Security Symposium. 85\u201396."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1410"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0278-0984(02)11030-3"},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the 31th International Conference on Machine Learning, ICML 2014, Beijing, China, 21-26 June 2014(JMLR Workshop and Conference Proceedings, Vol.\u00a032)","author":"Rezende Danilo\u00a0Jimenez","year":"2014","unstructured":"Danilo\u00a0Jimenez Rezende, Shakir Mohamed, and Daan Wierstra. 2014. Stochastic Backpropagation and Approximate Inference in Deep Generative Models. In Proceedings of the 31th International Conference on Machine Learning, ICML 2014, Beijing, China, 21-26 June 2014(JMLR Workshop and Conference Proceedings, Vol.\u00a032). JMLR.org, 1278\u20131286. http:\/\/proceedings.mlr.press\/v32\/rezende14.html"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-1088"},{"key":"e_1_3_2_1_53_1","volume-title":"Proceedings of the 27th International Conference on Computational Linguistics. Association for Computational Linguistics","author":"Sari Yunita","year":"2018","unstructured":"Yunita Sari, Mark Stevenson, and Andreas Vlachos. 2018. Topic or Style? Exploring the Most Useful Features for Authorship Attribution. In Proceedings of the 27th International Conference on Computational Linguistics. Association for Computational Linguistics, Santa Fe, New Mexico, USA, 343\u2013353. https:\/\/aclanthology.org\/C18-1029"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33630-5_27"},{"key":"e_1_3_2_1_55_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Shetty Rakshith","year":"2018","unstructured":"Rakshith Shetty, Bernt Schiele, and Mario Fritz. 2018. A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 1633\u20131650. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/shetty"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/E17-2106"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10869-008-9070-4"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2013.6736861"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21001"},{"key":"e_1_3_2_1_60_1","volume-title":"Overview of PAN 2018. In International conference of the cross-language evaluation forum for european languages. Springer, 267\u2013285","author":"Stamatatos Efstathios","year":"2018","unstructured":"Efstathios Stamatatos, Francisco Rangel, Michael Tschuggnall, Benno Stein, Mike Kestemont, Paolo Rosso, and Martin Potthast. 2018. Overview of PAN 2018. In International conference of the cross-language evaluation forum for european languages. Springer, 267\u2013285."},{"key":"e_1_3_2_1_61_1","volume-title":"Proceedings of the 27th International Conference on Computational Linguistics. Association for Computational Linguistics","author":"Sundararajan Kalaivani","year":"2018","unstructured":"Kalaivani Sundararajan and Damon Woodard. 2018. What represents \u201cstyle\u201d in authorship attribution?. In Proceedings of the 27th International Conference on Computational Linguistics. Association for Computational Linguistics, Santa Fe, New Mexico, USA, 2814\u20132822. https:\/\/aclanthology.org\/C18-1238"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3210008"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W19-8633"}],"event":{"name":"WWW '22: The ACM Web Conference 2022","location":"Virtual Event, Lyon France","acronym":"WWW '22","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2022"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485447.3512232","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3485447.3512232","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:13Z","timestamp":1750188613000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485447.3512232"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":63,"alternative-id":["10.1145\/3485447.3512232","10.1145\/3485447"],"URL":"https:\/\/doi.org\/10.1145\/3485447.3512232","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]},"assertion":[{"value":"2022-04-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}