{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T01:55:23Z","timestamp":1773107723869,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,21]]},"DOI":"10.1145\/3627673.3679537","type":"proceedings-article","created":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T19:34:21Z","timestamp":1729452861000},"page":"2950-2960","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Adaptive Differentially Private Structural Entropy Minimization for Unsupervised Social Event Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1306-3150","authenticated-orcid":false,"given":"Zhiwei","family":"Yang","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0218-948X","authenticated-orcid":false,"given":"Yuecen","family":"Wei","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1656-1278","authenticated-orcid":false,"given":"Haoran","family":"Li","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Hongkong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1612-4644","authenticated-orcid":false,"given":"Qian","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6526-6430","authenticated-orcid":false,"given":"Lei","family":"Jiang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4562-2279","authenticated-orcid":false,"given":"Li","family":"Sun","sequence":"additional","affiliation":[{"name":"North China Electric Power University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2314-7867","authenticated-orcid":false,"given":"Xiaoyan","family":"Yu","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9502-3955","authenticated-orcid":false,"given":"Chunming","family":"Hu","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0458-5977","authenticated-orcid":false,"given":"Hao","family":"Peng","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10333"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Tilman Beck Ji-Ung Lee Christina Viehmann Marcus Maurer Oliver Quiring and Iryna Gurevych. 2021. Investigating label suggestions for opinion mining in German Covid-19 social media. (2021).","DOI":"10.18653\/v1\/2021.acl-long.1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449834"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i8.28666"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies","volume":"1","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers). 4171--4186."},{"key":"e_1_3_2_1_6_1","volume-title":"International colloquium on automata, languages, and programming","author":"Dwork Cynthia","unstructured":"Cynthia Dwork. 2006. Differential privacy. In International colloquium on automata, languages, and programming. Springer, 1--12."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536466"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_10_1","first-page":"22617","article-title":"Differentially private graph learning via sensitivity-bounded personalized pagerank","volume":"35","author":"Epasto Alessandro","year":"2022","unstructured":"Alessandro Epasto, Vahab Mirrokni, Bryan Perozzi, Anton Tsitsulin, and Peilin Zhong. 2022. Differentially private graph learning via sensitivity-bounded personalized pagerank. Advances in Neural Information Processing Systems, Vol. 35 (2022), 22617--22627.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113425"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983879"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154793"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100500"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196959.3196977"},{"key":"e_1_3_2_1_17_1","volume-title":"International Conference on Machine Learning. PMLR, 14353--14375","author":"Imola Jacob","year":"2023","unstructured":"Jacob Imola, Alessandro Epasto, Mohammad Mahdian, Vincent Cohen-Addad, and Vahab Mirrokni. 2023. Differentially private hierarchical clustering with provable approximation guarantees. In International Conference on Machine Learning. PMLR, 14353--14375."},{"key":"e_1_3_2_1_18_1","volume-title":"Discovering natural communities in networks. Physica A: Statistical Mechanics and its Applications","author":"Li Angsheng","year":"2015","unstructured":"Angsheng Li, Jiankou Li, and Yicheng Pan. 2015. Discovering natural communities in networks. Physica A: Statistical Mechanics and its Applications, Vol. 436 (2015), 878--896."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2555904"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2023.3291563"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3577031"},{"key":"e_1_3_2_1_22_1","volume-title":"Locally Differentially Private Graph Embedding. arXiv preprint arXiv:2310.11060","author":"Li Zening","year":"2023","unstructured":"Zening Li, Rong-Hua Li, Meihao Liao, Fusheng Jin, and Guoren Wang. 2023. Locally Differentially Private Graph Embedding. arXiv preprint arXiv:2310.11060 (2023)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377939"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966033"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2845388"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080700"},{"key":"e_1_3_2_1_27_1","unstructured":"B\u00e9atrice Mazoyer Julia Cag\u00e9 Nicolas Herv\u00e9 and C\u00e9line Hudelot. 2020. A french corpus for event detection on twitter. (2020)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505695"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.97"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Student Research Workshop. 77--85","author":"Morabia Keval","year":"2019","unstructured":"Keval Morabia, Neti Lalita Bhanu Murthy, Aruna Malapati, and Surender Samant. 2019. SEDTWik: segmentation-based event detection from tweets using Wikipedia. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Student Research Workshop. 77--85."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250803"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/449"},{"key":"e_1_3_2_1_33_1","volume-title":"Streaming social event detection and evolution discovery in heterogeneous information networks. ACM Transactions on Knowledge Discovery from Data (TKDD)","author":"Peng Hao","year":"2021","unstructured":"Hao Peng, Jianxin Li, Yangqiu Song, Renyu Yang, Rajiv Ranjan, Philip S Yu, and Lifang He. 2021. Streaming social event detection and evolution discovery in heterogeneous information networks. ACM Transactions on Knowledge Discovery from Data (TKDD), Vol. 15, 5 (2021), 1--33."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3144993"},{"key":"e_1_3_2_1_35_1","volume-title":"Social media for crisis management: clustering approaches for sub-event detection. Multimedia tools and applications","author":"Pohl Daniela","year":"2015","unstructured":"Daniela Pohl, Abdelhamid Bouchachia, and Hermann Hellwagner. 2015. Social media for crisis management: clustering approaches for sub-event detection. Multimedia tools and applications, Vol. 74 (2015), 3901--3932."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1410"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557329"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557278"},{"key":"e_1_3_2_1_39_1","volume-title":"Transferring knowledge distillation for multilingual social event detection. arXiv preprint arXiv:2108.03084","author":"Ren Jiaqian","year":"2021","unstructured":"Jiaqian Ren, Hao Peng, Lei Jiang, Jia Wu, Yongxin Tong, Lihong Wang, Xu Bai, Bo Wang, and Qiang Yang. 2021. Transferring knowledge distillation for multilingual social event detection. arXiv preprint arXiv:2108.03084 (2021)."},{"key":"e_1_3_2_1_40_1","volume-title":"Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246","author":"Salem Ahmed","year":"2018","unstructured":"Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, and Michael Backes. 2018. Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246 (2018)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/24751839.2020.1763007"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-03717-4"},{"key":"e_1_3_2_1_43_1","volume-title":"A tutorial on spectral clustering. Statistics and computing","author":"Luxburg Ulrike Von","year":"2007","unstructured":"Ulrike Von Luxburg. 2007. A tutorial on spectral clustering. Statistics and computing, Vol. 17 (2007), 395--416."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Zhongqing Wang and Yue Zhang. 2017. A Neural Model for Joint Event Detection and Summarization.. In IJCAI. 4158--4164.","DOI":"10.24963\/ijcai.2017\/581"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM54844.2022.00063"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v29i1.9199"},{"key":"e_1_3_2_1_47_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Yuan Quan","year":"2023","unstructured":"Quan Yuan, Zhikun Zhang, Linkang Du, Min Chen, Peng Cheng, and Mingyang Sun. 2023. $$PrivGraph$$: Differentially Private Graph Data Publication by Exploiting Community Information. In 32nd USENIX Security Symposium (USENIX Security 23). 3241--3258."},{"key":"e_1_3_2_1_48_1","volume-title":"Raghav Bhaskar, Mohamed Ali Kaafar, Darren Webb, and Peter Dickinson.","author":"Hao Zhao Benjamin Zi","year":"2021","unstructured":"Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kaafar, Darren Webb, and Peter Dickinson. 2021. On the (in) feasibility of attribute inference attacks on machine learning models. In EuroS&P. IEEE, 232--251."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20161-5_34"}],"event":{"name":"CIKM '24: The 33rd ACM International Conference on Information and Knowledge Management","location":"Boise ID USA","acronym":"CIKM '24","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 33rd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3679537","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627673.3679537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:22Z","timestamp":1750294702000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3679537"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,21]]},"references-count":49,"alternative-id":["10.1145\/3627673.3679537","10.1145\/3627673"],"URL":"https:\/\/doi.org\/10.1145\/3627673.3679537","relation":{},"subject":[],"published":{"date-parts":[[2024,10,21]]},"assertion":[{"value":"2024-10-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}