{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:08:13Z","timestamp":1755907693123,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T00:00:00Z","timestamp":1731542400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Luxembourg National Research Fund (FNR)","award":["15403349"],"award-info":[{"award-number":["15403349"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,14]]},"DOI":"10.1145\/3677052.3698602","type":"proceedings-article","created":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T06:38:06Z","timestamp":1731566286000},"page":"831-838","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Transforming Unstructured Sensitive Information into Structured Knowledge"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5654-0212","authenticated-orcid":false,"given":"Braulio C.","family":"Blanco Lambruschini","sequence":"first","affiliation":[{"name":"SNT - SEDAN, University of Luxembourg, LU"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9637-2065","authenticated-orcid":false,"given":"Mats","family":"Brorsson","sequence":"additional","affiliation":[{"name":"SNT - SEDAN, University of Luxembourg, LU"}]}],"member":"320","published-online":{"date-parts":[[2024,11,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0254-8"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1177\/1847979019890771"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/1847979019890771"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.35940\/ijrte.B1074.0882S819"},{"key":"e_1_3_2_1_5_1","volume-title":"A brief survey of text mining: Classification, clustering and extraction techniques. arXiv preprint arXiv:1707.02919","author":"Allahyari Mehdi","year":"2017","unstructured":"Mehdi Allahyari, Seyedamin Pouriyeh, Mehdi Assefi, Saied Safaei, Elizabeth\u00a0D Trippe, Juan\u00a0B Gutierrez, and Krys Kochut. 2017. A brief survey of text mining: Classification, clustering and extraction techniques. arXiv preprint arXiv:1707.02919 (2017)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P15-1034"},{"key":"e_1_3_2_1_7_1","unstructured":"Deloitte. 2019. Analytics and AI-driven enterprises thrive in the Age of With. https:\/\/www2.deloitte.com\/us\/en\/insights\/topics\/analytics\/insight-driven-organization.html"},{"volume-title":"AI Servers, Researchers Say. https:\/\/www.forbes.com\/sites\/thomasbrewster\/2024\/03\/26\/hackers-breach-hundreds-of-ai-compute-servers-researchers-say\/ Accessed","year":"2024","key":"e_1_3_2_1_8_1","unstructured":"Forbes. 2024. Hackers Breached Hundreds Of Companies\u2019 AI Servers, Researchers Say. https:\/\/www.forbes.com\/sites\/thomasbrewster\/2024\/03\/26\/hackers-breach-hundreds-of-ai-compute-servers-researchers-say\/ Accessed: March 27, 2024."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102156"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22263-4_2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMCOM48794.2020.9001710"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Michael Meli Matthew\u00a0R McNiece and Bradley Reaves. 2019. How bad can it git? characterizing secret leakage in public github repositories.. In NDSS.","DOI":"10.14722\/ndss.2019.23418"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.022"},{"key":"e_1_3_2_1_14_1","volume-title":"An efficient and effective approach for multi-fact extraction from text corpus. World Wide Web","author":"Qu Jianfeng","year":"2022","unstructured":"Jianfeng Qu, Wen Hua, Dantong Ouyang, and Xiaofang Zhou. 2022. An efficient and effective approach for multi-fact extraction from text corpus. World Wide Web (2022), 1\u201324."},{"key":"e_1_3_2_1_15_1","volume-title":"Content-based data leakage detection using extended fingerprinting. arXiv preprint arXiv:1302.2028","author":"Shapira Yuri","year":"2013","unstructured":"Yuri Shapira, Bracha Shapira, and Asaf Shabtai. 2013. Content-based data leakage detection using extended fingerprinting. arXiv preprint arXiv:1302.2028 (2013)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398363"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313655"},{"key":"e_1_3_2_1_18_1","unstructured":"StanfordNLP. 2020. OpenIE. https:\/\/stanfordnlp.github.io\/CoreNLP\/openie.html"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2019.8763811"},{"key":"e_1_3_2_1_20_1","unstructured":"Bowen Yu Zhenyu Zhang Jingyang Li Haiyang Yu Tingwen Liu Jian Sun Yongbin Li and Bin Wang. 2022. Towards Generalized Open Information Extraction. arxiv:2211.15987\u00a0[cs.CL]"},{"key":"e_1_3_2_1_21_1","first-page":"593","article-title":"Information extraction from semi and unstructured data sources: A systematic literature review","volume":"14","author":"Zaman Gohar","year":"2020","unstructured":"Gohar Zaman, Hairulnizam Mahdin, Khalid Hussain, and Atta Rahman. 2020. Information extraction from semi and unstructured data sources: A systematic literature review. ICIC Express Letters 14, 6 (2020), 593\u2013603.","journal-title":"ICIC Express Letters"}],"event":{"name":"ICAIF '24: 5th ACM International Conference on AI in Finance","acronym":"ICAIF '24","location":"Brooklyn NY USA"},"container-title":["Proceedings of the 5th ACM International Conference on AI in Finance"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3677052.3698602","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3677052.3698602","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:08:39Z","timestamp":1755882519000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3677052.3698602"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,14]]},"references-count":21,"alternative-id":["10.1145\/3677052.3698602","10.1145\/3677052"],"URL":"https:\/\/doi.org\/10.1145\/3677052.3698602","relation":{},"subject":[],"published":{"date-parts":[[2024,11,14]]},"assertion":[{"value":"2024-11-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}