{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T10:48:32Z","timestamp":1761130112972,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T00:00:00Z","timestamp":1691107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,6]]},"DOI":"10.1145\/3580305.3599266","type":"proceedings-article","created":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T18:10:58Z","timestamp":1691172658000},"page":"626-637","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["CampER: An Effective Framework for Privacy-Aware Deep Entity Resolution"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-6124-3899","authenticated-orcid":false,"given":"Yuxiang","family":"Guo","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5685-7017","authenticated-orcid":false,"given":"Lu","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9578-2077","authenticated-orcid":false,"given":"Zhengjie","family":"Zhou","sequence":"additional","affiliation":[{"name":"Zhejiang University, Ningbo, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9792-9171","authenticated-orcid":false,"given":"Baihua","family":"Zheng","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2034-5501","authenticated-orcid":false,"given":"Ziquan","family":"Fang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7208-3392","authenticated-orcid":false,"given":"Zhikun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Stanford University, Palo Alto, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0550-3072","authenticated-orcid":false,"given":"Yuren","family":"Mao","sequence":"additional","affiliation":[{"name":"Zhejiang University, Ningbo, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3816-8450","authenticated-orcid":false,"given":"Yunjun","family":"Gao","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2023,8,4]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Mart\u00edn Abadi Andy Chu Ian J. Goodfellow H. Brendan McMahan Ilya Mironov Kunal Talwar and Li Zhang. 2016. Deep Learning with Differential Privacy. In CCS. 308--318. Mart\u00edn Abadi Andy Chu Ian J. Goodfellow H. Brendan McMahan Ilya Mironov Kunal Talwar and Li Zhang. 2016. Deep Learning with Differential Privacy. In CCS. 308--318.","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"e_1_3_2_2_3_1","volume-title":"Mooney","author":"Bilenko Mikhail","year":"2003","unstructured":"Mikhail Bilenko and Raymond J . Mooney . 2003 . Adaptive duplicate detection using learnable string similarity measures. In SIGKDD. 39--48. Mikhail Bilenko and Raymond J. Mooney. 2003. Adaptive duplicate detection using learnable string similarity measures. In SIGKDD. 39--48."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Riccardo Cappuzzo Paolo Papotti and Saravanan Thirumuruganathan. 2020. Creating embeddings of heterogeneous relational datasets for data integration tasks. In SIGMOD. 1335--1349. Riccardo Cappuzzo Paolo Papotti and Saravanan Thirumuruganathan. 2020. Creating embeddings of heterogeneous relational datasets for data integration tasks. In SIGMOD. 1335--1349.","DOI":"10.1145\/3318464.3389742"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Muhao Chen Yingtao Tian Mohan Yang and Carlo Zaniolo. 2017. Multilingual Knowledge Graph Embeddings for Cross-lingual Knowledge Alignment. In IJCAI. 1511--1517. Muhao Chen Yingtao Tian Mohan Yang and Carlo Zaniolo. 2017. Multilingual Knowledge Graph Embeddings for Cross-lingual Knowledge Alignment. In IJCAI. 1511--1517.","DOI":"10.24963\/ijcai.2017\/209"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Xin Luna Dong and Theodoros Rekatsinas. 2018. Data Integration and Machine Learning: A Natural Synergy. In SIGMOD. 1645--1650. Xin Luna Dong and Theodoros Rekatsinas. 2018. Data Integration and Machine Learning: A Natural Synergy. In SIGMOD. 1645--1650.","DOI":"10.1145\/3183713.3197387"},{"key":"e_1_3_2_2_7_1","first-page":"1","article-title":"Differential Privacy","volume":"4052","author":"Dwork Cynthia","year":"2006","unstructured":"Cynthia Dwork . 2006 . Differential Privacy . In ICALP , Vol. 4052. 1 -- 12 . Cynthia Dwork. 2006. Differential Privacy. In ICALP, Vol. 4052. 1--12.","journal-title":"ICALP"},{"key":"e_1_3_2_2_8_1","first-page":"1","article-title":"Differential Privacy: A Survey of Results","volume":"4978","author":"Dwork Cynthia","year":"2008","unstructured":"Cynthia Dwork . 2008 . Differential Privacy: A Survey of Results . In TAMC , Vol. 4978. 1 -- 19 . Cynthia Dwork. 2008. Differential Privacy: A Survey of Results. In TAMC, Vol. 4978. 1--19.","journal-title":"TAMC"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork and Jing Lei. 2009. Differential privacy and robust statistics. In STOC. 371--380. Cynthia Dwork and Jing Lei. 2009. Differential privacy and robust statistics. In STOC. 371--380.","DOI":"10.1145\/1536414.1536466"},{"key":"e_1_3_2_2_10_1","first-page":"1454","article-title":"Distributed Representations of Tuples for Entity Resolution","volume":"11","author":"Ebraheem Muhammad","year":"2018","unstructured":"Muhammad Ebraheem , Saravanan Thirumuruganathan , Shafiq R. Joty , Mourad Ouzzani , and Nan Tang . 2018 . Distributed Representations of Tuples for Entity Resolution . PVLDB. , Vol. 11 , 11 (2018), 1454 -- 1467 . Muhammad Ebraheem, Saravanan Thirumuruganathan, Shafiq R. Joty, Mourad Ouzzani, and Nan Tang. 2018. Distributed Representations of Tuples for Entity Resolution. PVLDB., Vol. 11, 11 (2018), 1454--1467.","journal-title":"PVLDB."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687674"},{"key":"e_1_3_2_2_12_1","volume-title":"CollaborEM: A Self-supervised Entity Matching Framework Using Multi-features Collaboration. To appear in TKDE","author":"Ge Congcong","year":"2022","unstructured":"Congcong Ge , Pengfei Wang , Lu Chen , Xiaoze Liu , Baihua Zheng , and Yunjun Gao . 2022. CollaborEM: A Self-supervised Entity Matching Framework Using Multi-features Collaboration. To appear in TKDE ( 2022 ). Congcong Ge, Pengfei Wang, Lu Chen, Xiaoze Liu, Baihua Zheng, and Yunjun Gao. 2022. CollaborEM: A Self-supervised Entity Matching Framework Using Multi-features Collaboration. To appear in TKDE (2022)."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3114026"},{"key":"e_1_3_2_2_14_1","unstructured":"Chaitanya Gokhale Sanjib Das AnHai Doan Jeffrey F. Naughton Narasimhan Rampalli Jude W. Shavlik and Xiaojin Zhu. 2014. Corleone: hands-off crowdsourcing for entity matching. In SIGMOD. 601--612. Chaitanya Gokhale Sanjib Das AnHai Doan Jeffrey F. Naughton Narasimhan Rampalli Jude W. Shavlik and Xiaojin Zhu. 2014. Corleone: hands-off crowdsourcing for entity matching. In SIGMOD. 601--612."},{"key":"e_1_3_2_2_15_1","volume-title":"Girshick","author":"He Kaiming","year":"2020","unstructured":"Kaiming He , Haoqi Fan , Yuxin Wu , Saining Xie , and Ross B . Girshick . 2020 . Momentum Contrast for Unsupervised Visual Representation Learning. In CVPR. 9726--9735. Kaiming He, Haoqi Fan, Yuxin Wu, Saining Xie, and Ross B. Girshick. 2020. Momentum Contrast for Unsupervised Visual Representation Learning. In CVPR. 9726--9735."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"Xi He Ashwin Machanavajjhala Cheryl J. Flynn and Divesh Srivastava. 2017. Composing Differential Privacy and Secure Computation: A Case Study on Scaling Private Record Linkage. In CCS. 1389--1406. Xi He Ashwin Machanavajjhala Cheryl J. Flynn and Divesh Srivastava. 2017. Composing Differential Privacy and Secure Computation: A Case Study on Scaling Private Record Linkage. In CCS. 1389--1406.","DOI":"10.1145\/3133956.3134030"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330765"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.14778\/3494124.3494131"},{"key":"e_1_3_2_2_19_1","volume-title":"Verykios","author":"Karapiperis Dimitrios","year":"2017","unstructured":"Dimitrios Karapiperis , Aris Gkoulalas-Divanis , and Vassilios S . Verykios . 2017 . Distance-Aware Encoding of Numerical Values for Privacy-Preserving Record Linkage. In ICDE. 135--138. Dimitrios Karapiperis, Aris Gkoulalas-Divanis, and Vassilios S. Verykios. 2017. Distance-Aware Encoding of Numerical Values for Privacy-Preserving Record Linkage. In ICDE. 135--138."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2761759"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2349916"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Basit Khurram and Florian Kerschbaum. 2020. SFour: A Protocol for Cryptographically Secure Record Linkage at Scale. In ICDE. 277--288. Basit Khurram and Florian Kerschbaum. 2020. SFour: A Protocol for Cryptographically Secure Record Linkage at Scale. In ICDE. 277--288.","DOI":"10.1109\/ICDE48307.2020.00031"},{"key":"e_1_3_2_2_23_1","volume-title":"Kingma and Jimmy Ba","author":"Diederik","year":"2015","unstructured":"Diederik P. Kingma and Jimmy Ba . 2015 . Adam : A Method for Stochastic Optimization. In ICLR. Diederik P. Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. In ICLR."},{"key":"e_1_3_2_2_24_1","first-page":"1197","article-title":"Magellan","volume":"9","author":"Konda Pradap","year":"2016","unstructured":"Pradap Konda , Sanjib Das , Paul Suganthan G. C. , AnHai Doan , Adel Ardalan , Jeffrey R. Ballard , Han Li , Fatemah Panahi , Haojun Zhang , Jeffrey F. Naughton , Shishir Prasad , Ganesh Krishnan , Rohit Deep , and Vijay Raghavendra . 2016 . Magellan : Toward Building Entity Matching Management Systems. PVLDB , Vol. 9 , 12 (2016), 1197 -- 1208 . Pradap Konda, Sanjib Das, Paul Suganthan G. C., AnHai Doan, Adel Ardalan, Jeffrey R. Ballard, Han Li, Fatemah Panahi, Haojun Zhang, Jeffrey F. Naughton, Shishir Prasad, Ganesh Krishnan, Rohit Deep, and Vijay Raghavendra. 2016. Magellan: Toward Building Entity Matching Management Systems. PVLDB, Vol. 9, 12 (2016), 1197--1208.","journal-title":"Toward Building Entity Matching Management Systems. PVLDB"},{"key":"e_1_3_2_2_25_1","first-page":"712","article-title":"MDedup","volume":"13","author":"Koumarelas Ioannis K.","year":"2020","unstructured":"Ioannis K. Koumarelas , Thorsten Papenbrock , and Felix Naumann . 2020 . MDedup : Duplicate Detection with Matching Dependencies. PVLDB. , Vol. 13 , 5 (2020), 712 -- 725 . Ioannis K. Koumarelas, Thorsten Papenbrock, and Felix Naumann. 2020. MDedup: Duplicate Detection with Matching Dependencies. PVLDB., Vol. 13, 5 (2020), 712--725.","journal-title":"Duplicate Detection with Matching Dependencies. PVLDB."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Bing Li Yukai Miao Yaoshu Wang Yifang Sun and Wei Wang. 2021b. Improving the Efficiency and Effectiveness for BERT-based Entity Resolution. In AAAI. 13226--13233. Bing Li Yukai Miao Yaoshu Wang Yifang Sun and Wei Wang. 2021b. Improving the Efficiency and Effectiveness for BERT-based Entity Resolution. In AAAI. 13226--13233.","DOI":"10.1609\/aaai.v35i15.17562"},{"key":"e_1_3_2_2_27_1","unstructured":"Peng Li Xiang Cheng Xu Chu Yeye He and Surajit Chaudhuri. 2021a. Auto-FuzzyJoin: Auto-Program Fuzzy Similarity Joins Without Labeled Examples. In SIGMOD. 1064--1076. Peng Li Xiang Cheng Xu Chu Yeye He and Surajit Chaudhuri. 2021a. Auto-FuzzyJoin: Auto-Program Fuzzy Similarity Joins Without Labeled Examples. In SIGMOD. 1064--1076."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.14778\/3421424.3421431"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Xiao Liu Haoyun Hong Xinghao Wang Zeyi Chen Evgeny Kharlamov Yuxiao Dong and Jie Tang. 2022. SelfKG: Self-Supervised Entity Alignment in Knowledge Graphs. In WWW. 860--870. Xiao Liu Haoyun Hong Xinghao Wang Zeyi Chen Evgeny Kharlamov Yuxiao Dong and Jie Tang. 2022. SelfKG: Self-Supervised Entity Alignment in Knowledge Graphs. In WWW. 860--870.","DOI":"10.1145\/3485447.3511945"},{"key":"e_1_3_2_2_30_1","volume-title":"RoBERTa: A Robustly Optimized BERT Pretraining Approach. CoRR","author":"Liu Yinhan","year":"2019","unstructured":"Yinhan Liu , Myle Ott , Naman Goyal , Jingfei Du , Mandar Joshi , Danqi Chen , Omer Levy , Mike Lewis , Luke Zettlemoyer , and Veselin Stoyanov . 2019. RoBERTa: A Robustly Optimized BERT Pretraining Approach. CoRR , Vol. abs\/ 1907 .11692 ( 2019 ). Yinhan Liu, Myle Ott, Naman Goyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke Zettlemoyer, and Veselin Stoyanov. 2019. RoBERTa: A Robustly Optimized BERT Pretraining Approach. CoRR, Vol. abs\/1907.11692 (2019)."},{"key":"e_1_3_2_2_31_1","volume-title":"Umap: Uniform manifold approximation and projection for dimension reduction. arXiv preprint arXiv:1802.03426","author":"McInnes Leland","year":"2018","unstructured":"Leland McInnes , John Healy , and James Melville . 2018 . Umap: Uniform manifold approximation and projection for dimension reduction. arXiv preprint arXiv:1802.03426 (2018). Leland McInnes, John Healy, and James Melville. 2018. Umap: Uniform manifold approximation and projection for dimension reduction. arXiv preprint arXiv:1802.03426 (2018)."},{"key":"e_1_3_2_2_32_1","first-page":"1273","article-title":"Communication-Efficient Learning of Deep Networks from Decentralized Data","volume":"54","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan , Eider Moore , Daniel Ramage , Seth Hampson , and Blaise Ag\u00fc era y Arcas . 2017 . Communication-Efficient Learning of Deep Networks from Decentralized Data . In AISTATS , Vol. 54. 1273 -- 1282 . Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Ag\u00fc era y Arcas. 2017. Communication-Efficient Learning of Deep Networks from Decentralized Data. In AISTATS, Vol. 54. 1273--1282.","journal-title":"AISTATS"},{"key":"e_1_3_2_2_33_1","volume-title":"Federated learning of deep networks using model averaging. arXiv preprint arXiv:1602.05629","author":"McMahan H Brendan","year":"2016","unstructured":"H Brendan McMahan , Eider Moore , Daniel Ramage , and Blaise Ag\u00fcera y Arcas . 2016. Federated learning of deep networks using model averaging. arXiv preprint arXiv:1602.05629 ( 2016 ). H Brendan McMahan, Eider Moore, Daniel Ramage, and Blaise Ag\u00fcera y Arcas. 2016. Federated learning of deep networks using model averaging. arXiv preprint arXiv:1602.05629 (2016)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3457258"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"crossref","unstructured":"Sidharth Mudgal Han Li Theodoros Rekatsinas AnHai Doan Youngchoon Park Ganesh Krishnan Rohit Deep Esteban Arcaute and Vijay Raghavendra. 2018. Deep learning for entity matching: A design space exploration. In SIGMOD. 19--34. Sidharth Mudgal Han Li Theodoros Rekatsinas AnHai Doan Youngchoon Park Ganesh Krishnan Rohit Deep Esteban Arcaute and Vijay Raghavendra. 2018. Deep learning for entity matching: A design space exploration. In SIGMOD. 19--34.","DOI":"10.1145\/3183713.3196926"},{"key":"e_1_3_2_2_36_1","first-page":"223","article-title":"Public-Key Cryptosystems Based on Composite Degree Residuosity Classes","volume":"1592","author":"Paillier Pascal","year":"1999","unstructured":"Pascal Paillier . 1999 . Public-Key Cryptosystems Based on Composite Degree Residuosity Classes . In EUROCRYPT , Vol. 1592. 223 -- 238 . Pascal Paillier. 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In EUROCRYPT, Vol. 1592. 223--238.","journal-title":"EUROCRYPT"},{"key":"e_1_3_2_2_37_1","volume-title":"REA: Robust Cross-lingual Entity Alignment Between Knowledge Graphs. In KDD. 2175--2184.","author":"Pei Shichao","year":"2020","unstructured":"Shichao Pei , Lu Yu , Guoxian Yu , and Xiangliang Zhang . 2020 . REA: Robust Cross-lingual Entity Alignment Between Knowledge Graphs. In KDD. 2175--2184. Shichao Pei, Lu Yu, Guoxian Yu, and Xiangliang Zhang. 2020. REA: Robust Cross-lingual Entity Alignment Between Knowledge Graphs. In KDD. 2175--2184."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"Xuedi Qin Chengliang Chai Nan Tang Jian Li Yuyu Luo Guoliang Li and Yaoyu Zhu. 2022. Synthesizing Privacy Preserving Entity Resolution Datasets. In ICDE. 2359--2371. Xuedi Qin Chengliang Chai Nan Tang Jian Li Yuyu Luo Guoliang Li and Yaoyu Zhu. 2022. Synthesizing Privacy Preserving Entity Resolution Datasets. In ICDE. 2359--2371.","DOI":"10.1109\/ICDE53745.2022.00222"},{"key":"e_1_3_2_2_39_1","volume-title":"Regulation EU 2016\/679 of the European Parliament and of the Council of","author":"Protection Regulation General Data","year":"2016","unstructured":"General Data Protection Regulation . 2016 . Regulation EU 2016\/679 of the European Parliament and of the Council of 27 April 2016. Official Journal of the European Union (2016). General Data Protection Regulation. 2016. Regulation EU 2016\/679 of the European Parliament and of the Council of 27 April 2016. Official Journal of the European Union (2016)."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"crossref","unstructured":"Nils Reimers and Iryna Gurevych. 2019. Sentence-BERT: Sentence Embeddings using Siamese BERT-Networks. In EMNLP-IJCNLP. 3980--3990. Nils Reimers and Iryna Gurevych. 2019. Sentence-BERT: Sentence Embeddings using Siamese BERT-Networks. In EMNLP-IJCNLP. 3980--3990.","DOI":"10.18653\/v1\/D19-1410"},{"key":"e_1_3_2_2_41_1","volume-title":"Elmagarmid","author":"Scannapieco Monica","year":"2007","unstructured":"Monica Scannapieco , Ilya Figotin , Elisa Bertino , and Ahmed K . Elmagarmid . 2007 . Privacy preserving schema and data matching. In SIGMOD. 653--664. Monica Scannapieco, Ilya Figotin, Elisa Bertino, and Ahmed K. Elmagarmid. 2007. Privacy preserving schema and data matching. In SIGMOD. 653--664."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-9-41"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3325194"},{"key":"e_1_3_2_2_44_1","volume-title":"Ahmed K. Elmagarmid, Samuel Madden, Paolo Papotti, Jorge-Arnulfo Quian\u00e9 -Ruiz, Armando Solar-Lezama, and Nan Tang.","author":"Singh Rohit","year":"2017","unstructured":"Rohit Singh , Venkata Vamsikrishna Meduri , Ahmed K. Elmagarmid, Samuel Madden, Paolo Papotti, Jorge-Arnulfo Quian\u00e9 -Ruiz, Armando Solar-Lezama, and Nan Tang. 2017 . Generating Concise Entity Matching Rules. In SIGMOD. 1635--1638. Rohit Singh, Venkata Vamsikrishna Meduri, Ahmed K. Elmagarmid, Samuel Madden, Paolo Papotti, Jorge-Arnulfo Quian\u00e9 -Ruiz, Armando Solar-Lezama, and Nan Tang. 2017. Generating Concise Entity Matching Rules. In SIGMOD. 1635--1638."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"crossref","unstructured":"Congzheng Song and Ananth Raghunathan. 2020. Information Leakage in Embedding Models. In CCS. 377--390. Congzheng Song and Ananth Raghunathan. 2020. Information Leakage in Embedding Models. In CCS. 377--390.","DOI":"10.1145\/3372297.3417270"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"crossref","unstructured":"Jianhong Tu Ju Fan Nan Tang Peng Wang Chengliang Chai Guoliang Li Ruixue Fan and Xiaoyong Du. 2022. Domain Adaptation for Deep Entity Resolution. In SIGMOD. 443--457. Jianhong Tu Ju Fan Nan Tang Peng Wang Chengliang Chai Guoliang Li Ruixue Fan and Xiaoyong Du. 2022. Domain Adaptation for Deep Entity Resolution. In SIGMOD. 443--457.","DOI":"10.1145\/3514221.3517870"},{"key":"e_1_3_2_2_47_1","first-page":"1483","article-title":"CrowdER","volume":"5","author":"Wang Jiannan","year":"2012","unstructured":"Jiannan Wang , Tim Kraska , Michael J. Franklin , and Jianhua Feng . 2012 . CrowdER : Crowdsourcing Entity Resolution. PVLDB. , Vol. 5 , 11 (2012), 1483 -- 1494 . Jiannan Wang, Tim Kraska, Michael J. Franklin, and Jianhua Feng. 2012. CrowdER: Crowdsourcing Entity Resolution. PVLDB., Vol. 5, 11 (2012), 1483--1494.","journal-title":"Crowdsourcing Entity Resolution. PVLDB."},{"key":"e_1_3_2_2_48_1","first-page":"369","article-title":"PromptEM","volume":"16","author":"Wang Pengfei","year":"2022","unstructured":"Pengfei Wang , Xiaocan Zeng , Lu Chen , Fan Ye , Yuren Mao , Junhao Zhu , and Yunjun Gao . 2022 . PromptEM : Prompt-tuning for Low-resource Generalized Entity Matching. PVLDB. , Vol. 16 , 2 (2022), 369 -- 378 . Pengfei Wang, Xiaocan Zeng, Lu Chen, Fan Ye, Yuren Mao, Junhao Zhu, and Yunjun Gao. 2022. PromptEM: Prompt-tuning for Low-resource Generalized Entity Matching. PVLDB., Vol. 16, 2 (2022), 369--378.","journal-title":"Prompt-tuning for Low-resource Generalized Entity Matching. PVLDB."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"Thomas Wolf Lysandre Debut Victor Sanh Julien Chaumond Clement Delangue Anthony Moi Pierric Cistac Tim Rault R\u00e9mi Louf Morgan Funtowicz etal 2019. HuggingFace's Transformers: State-of-the-art natural language processing. arXiv preprint arXiv:1910.03771 (2019). Thomas Wolf Lysandre Debut Victor Sanh Julien Chaumond Clement Delangue Anthony Moi Pierric Cistac Tim Rault R\u00e9mi Louf Morgan Funtowicz et al. 2019. HuggingFace's Transformers: State-of-the-art natural language processing. arXiv preprint arXiv:1910.03771 (2019).","DOI":"10.18653\/v1\/2020.emnlp-demos.6"},{"key":"e_1_3_2_2_50_1","volume-title":"Fedgnn: Federated graph neural network for privacy-preserving recommendation. arXiv preprint arXiv:2102.04925","author":"Wu Chuhan","year":"2021","unstructured":"Chuhan Wu , Fangzhao Wu , Yang Cao , Yongfeng Huang , and Xing Xie . 2021 . Fedgnn: Federated graph neural network for privacy-preserving recommendation. arXiv preprint arXiv:2102.04925 (2021). Chuhan Wu, Fangzhao Wu, Yang Cao, Yongfeng Huang, and Xing Xie. 2021. Fedgnn: Federated graph neural network for privacy-preserving recommendation. arXiv preprint arXiv:2102.04925 (2021)."},{"key":"e_1_3_2_2_51_1","unstructured":"Renzhi Wu Sanya Chaba Saurabh Sawlani Xu Chu and Saravanan Thirumuruganathan. 2020. ZeroER: Entity Resolution using Zero Labeled Examples. In SIGMOD. 1149--1164. Renzhi Wu Sanya Chaba Saurabh Sawlani Xu Chu and Saravanan Thirumuruganathan. 2020. ZeroER: Entity Resolution using Zero Labeled Examples. In SIGMOD. 1149--1164."},{"key":"e_1_3_2_2_52_1","volume-title":"FLOP: Federated Learning on Medical Datasets using Partial Networks. In SIGKDD. ACM, 3845--3853.","author":"Yang Qian","year":"2021","unstructured":"Qian Yang , Jianyi Zhang , Weituo Hao , Gregory P. Spell , and Lawrence Carin . 2021 . FLOP: Federated Learning on Medical Datasets using Partial Networks. In SIGKDD. ACM, 3845--3853. Qian Yang, Jianyi Zhang, Weituo Hao, Gregory P. Spell, and Lawrence Carin. 2021. FLOP: Federated Learning on Medical Datasets using Partial Networks. In SIGKDD. ACM, 3845--3853."},{"key":"e_1_3_2_2_53_1","unstructured":"Andrew Chi-Chih Yao. 1986. How to generate and exchange secrets. In SFCS. 162--167. Andrew Chi-Chih Yao. 1986. How to generate and exchange secrets. In SFCS. 162--167."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"crossref","unstructured":"Dezhong Yao Yuhong Gu Gao Cong Hai Jin and Xinqiao Lv. 2022. Entity Resolution with Hierarchical Graph Attention Networks. In SIGMOD. 429--442. Dezhong Yao Yuhong Gu Gao Cong Hai Jin and Xinqiao Lv. 2022. Entity Resolution with Hierarchical Graph Attention Networks. In SIGMOD. 429--442.","DOI":"10.1145\/3514221.3517872"},{"key":"e_1_3_2_2_55_1","volume-title":"Mehmet Emre Gursoy, and Stacey Truex","author":"Yu Lei","year":"2019","unstructured":"Lei Yu , Ling Liu , Calton Pu , Mehmet Emre Gursoy, and Stacey Truex . 2019 . Differentially Private Model Publishing for Deep Learning . In S&P. 332--349. Lei Yu, Ling Liu, Calton Pu, Mehmet Emre Gursoy, and Stacey Truex. 2019. Differentially Private Model Publishing for Deep Learning. In S&P. 332--349."},{"key":"e_1_3_2_2_56_1","unstructured":"Zhikun Zhang Min Chen Michael Backes Yun Shen and Yang Zhang. 2022. Inference Attacks Against Graph Neural Networks. In USENIX. 4543--4560. Zhikun Zhang Min Chen Michael Backes Yun Shen and Yang Zhang. 2022. Inference Attacks Against Graph Neural Networks. In USENIX. 4543--4560."}],"event":{"name":"KDD '23: The 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Long Beach CA USA","acronym":"KDD '23"},"container-title":["Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599266","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3580305.3599266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:15Z","timestamp":1750182675000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599266"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,4]]},"references-count":56,"alternative-id":["10.1145\/3580305.3599266","10.1145\/3580305"],"URL":"https:\/\/doi.org\/10.1145\/3580305.3599266","relation":{},"subject":[],"published":{"date-parts":[[2023,8,4]]},"assertion":[{"value":"2023-08-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}