{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T13:40:01Z","timestamp":1755870001559,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,7,18]]},"DOI":"10.1145\/3731120.3744577","type":"proceedings-article","created":{"date-parts":[[2025,7,18]],"date-time":"2025-07-18T13:34:06Z","timestamp":1752845646000},"page":"125-135","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Characterizing Mosaicing Inference Risk: A Preliminary Study"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-2932-0923","authenticated-orcid":false,"given":"Nathaniel","family":"Rollings","sequence":"first","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1696-0407","authenticated-orcid":false,"given":"Douglas W.","family":"Oard","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1037","article-title":"Do You Have to Keep the Government's Secrets? Retroactively Classified Documents, the First Amendment, and the Power to Make Secrets out of the Public Record","volume":"163","author":"Abel Johnathan","year":"2014","unstructured":"Johnathan Abel. 2014. Do You Have to Keep the Government's Secrets? Retroactively Classified Documents, the First Amendment, and the Power to Make Secrets out of the Public Record. University of Pennsylvania Law Review, Vol. 163 (2014), 1037-1097.","journal-title":"University of Pennsylvania Law Review"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST47167.2019.9032942"},{"key":"e_1_3_2_1_3_1","volume-title":"Assessing Risks in Online Information Sharing. Conference on Human Information Interaction and Retrieval (CHIIR)","author":"Azzopardi Leif","year":"2025","unstructured":"Leif Azzopardi, Emma Nicol, Jo Briggs, Wendy Moncus, Burkhard Schafer, Callum Nash, and Melissa Duheric. 2025. Assessing Risks in Online Information Sharing. Conference on Human Information Interaction and Retrieval (CHIIR), (2025)."},{"key":"e_1_3_2_1_4_1","first-page":"509","volume-title":"Science","volume":"286","author":"Barab\u00e1si Albert-L\u00e1szl\u00f3","year":"1999","unstructured":"Albert-L\u00e1szl\u00f3 Barab\u00e1si and R\u00e9ka Albert. 1999. Emergence of Scaling in Random Networks. Science, Vol. 286, 5439 (1999), 509-512."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.147"},{"key":"e_1_3_2_1_6_1","volume-title":"Advances in Neural Information Processing Systems","volume":"26","author":"Bordes Antoine","year":"2013","unstructured":"Antoine Bordes, Nicolas Usunier, Alberto Garcia-Duran, Jason Weston, and Oksana Yakhnenko. 2013. Translating Embeddings for Modeling Multi-Relational Data. Advances in Neural Information Processing Systems, Vol. 26 (2013)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2015.07.004"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-016-0947-7"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-016-9484-8"},{"key":"e_1_3_2_1_10_1","volume-title":"Perspectives on History, (2023","author":"Charleston Jeffrey A.","year":"2023","unstructured":"Jeffrey A. Charleston. 2023. Improving Declassification: Applying Machine Learning to Diplomatic Cable Review. Perspectives on History, (2023). https:\/\/www.historians.org\/perspectives-article\/improving-declassification-applying-machine-learning-to-diplomatic-cable-review-october-2023\/"},{"key":"e_1_3_2_1_11_1","first-page":"131","volume-title":"Proceedings on Privacy Enhancing Technologies","volume":"2020","author":"Chen Xihui","year":"2019","unstructured":"Xihui Chen, Sjouke Mauw, and Yunior Ram\u00edrez-Cruz. 2019. Publishing Community-Preserving Attributed Social Graphs with a Differential Privacy Guarantee. Proceedings on Privacy Enhancing Technologies, Vol. 2020 (2019), 131 - 152. https:\/\/api.semanticscholar.org\/CorpusID:202540124"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3030076"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3381222"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1078"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1571941.1572114"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1259"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.710"},{"key":"e_1_3_2_1_18_1","article-title":"Noise-Contrastive Estimation of Unnormalized Statistical Models, with Applications to Natural Image Statistics","volume":"13","author":"Gutmann Michael U","year":"2012","unstructured":"Michael U Gutmann and Aapo Hyv\u00e4rinen. 2012. Noise-Contrastive Estimation of Unnormalized Statistical Models, with Applications to Natural Image Statistics. Journal of Machine Learning Research, Vol. 13, 2 (2012).","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453873"},{"key":"e_1_3_2_1_20_1","volume-title":"Nuclear Ship Uses Canal. The Washington Post, (6","author":"Hiatt Fred","year":"1984","unstructured":"Fred Hiatt. 1984. U.S. Nuclear Ship Uses Canal. The Washington Post, (6 November 1984). https:\/\/www.washingtonpost.com\/archive\/politics\/1984\/11\/06\/us-nuclear-ship-uses-canal\/4df3286a-62cc-4bf3-8599-89ed83bd31de\/"},{"key":"e_1_3_2_1_21_1","volume-title":"Protecting Privacy in Knowledge Graphs with Personalized Anonymization","author":"Hoang Anh-Tu","year":"2023","unstructured":"Anh-Tu Hoang, Barbara Carminati, and Elena Ferrari. 2023. Protecting Privacy in Knowledge Graphs with Personalized Anonymization. IEEE Transactions on Dependable and Secure Computing, (2023)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2982555"},{"key":"e_1_3_2_1_23_1","unstructured":"Omar Khattab Arnav Singhvi Paridhi Maheshwari Zhiyuan Zhang Keshav Santhanam Sri Vardhamanan Saiful Haq Ashutosh Sharma Thomas T Joshi Hanna Moazam et al. 2023. DSPy: Compiling Declarative Language Model Calls into Self-Improving Pipelines. arXiv preprint arXiv:2310.03714 (2023)."},{"key":"e_1_3_2_1_24_1","first-page":"571","article-title":"Preferential Attachment in Graphs with Affinities","author":"Lee Jay","year":"2015","unstructured":"Jay Lee, Manzil Zaheer, Stephan G\u00fcnnemann, and Alex Smola. 2015. Preferential Attachment in Graphs with Affinities. In Artificial Intelligence and Statistics. PMLR, 571-580.","journal-title":"Artificial Intelligence and Statistics. PMLR"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.452"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000102"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Graham McDonald. 2019. A Framework for Technology-Assisted Sensitivity Review: Using sensitivity classification to prioritise documents for review. Ph.D. Dissertation. University of Glasgow.","DOI":"10.1145\/3458537.3458544"},{"key":"e_1_3_2_1_29_1","volume-title":"Fine-Grained Evaluation of Rule- and Embedding-Based Systems for Knowledge Graph Completion. In International Workshop on the Semantic Web.","author":"Meilicke Christian","year":"2018","unstructured":"Christian Meilicke, Manuel Fink, Yanjie Wang, Daniel Ruffinelli, Rainer Gemulla, and Heiner Stuckenschmidt. 2018. Fine-Grained Evaluation of Rule- and Embedding-Based Systems for Knowledge Graph Completion. In International Workshop on the Semantic Web."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 29th International Conference on Machine Learning, ICML 2012","volume":"2","author":"Mnih Andriy","year":"2012","unstructured":"Andriy Mnih and Yee Teh. 2012. A Fast and Simple Algorithm for Training Neural Probabilistic Language Models. Proceedings of the 29th International Conference on Machine Learning, ICML 2012, Vol. 2 (06 2012)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-56069-9_29"},{"key":"e_1_3_2_1_32_1","volume-title":"Redactions: The declassified file. Website https:\/\/nsarchive.gwu.edu\/briefing-book\/foia\/2019-04-18\/redactions-declassified-file, visited","author":"George Washington University National Security Archive.","year":"2019","unstructured":"George Washington University National Security Archive. 2019. Redactions: The declassified file. Website https:\/\/nsarchive.gwu.edu\/briefing-book\/foia\/2019-04-18\/redactions-declassified-file, visited July 7, 2024."},{"key":"e_1_3_2_1_33_1","first-page":"20","volume-title":"ACM SIGIR Forum","volume":"53","author":"Olteanu Alexandra","year":"2021","unstructured":"Alexandra Olteanu, Jean Garcia-Gathright, Maarten de Rijke, Michael D Ekstrand, Adam Roegiest, Aldo Lipani, Alex Beutel, Alexandra Olteanu, Ana Lucic, Ana-Andreea Stoica, et al., 2021. FACTS-IR: Fairness, Accountability, Confidentiality, Transparency, and Safety in Information Retrieval. In ACM SIGIR Forum, Vol. 53. ACM New York, NY, USA, 20-43."},{"key":"e_1_3_2_1_34_1","volume-title":"https:\/\/platform.openai.com\/docs\/models. visited","author":"Models AI.","year":"2025","unstructured":"OpenAI. 2024. Models. https:\/\/platform.openai.com\/docs\/models. visited January 21, 2025."},{"key":"e_1_3_2_1_35_1","first-page":"3336","article-title":"Investigating Robustness and Interpretability of Link Prediction via Adversarial Modifications","author":"Pezeshkpour Pouya","year":"2019","unstructured":"Pouya Pezeshkpour, Yifan Tian, and Sameer Singh. 2019. Investigating Robustness and Interpretability of Link Prediction via Adversarial Modifications. In Proceedings of NAACL-HLT. 3336-3347.","journal-title":"Proceedings of NAACL-HLT."},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the Conference on Automated Knowledge Base Construction (AKBC).","author":"Pezeshkpour Pouya","year":"2020","unstructured":"Pouya Pezeshkpour, Yifan Tian, and Sameer Singh. 2020. Revisiting Evaluation of Knowledge Base Completion Models. In Proceedings of the Conference on Automated Knowledge Base Construction (AKBC)."},{"key":"e_1_3_2_1_37_1","first-page":"628","volume-title":"The Yale Law Journal","author":"Pozen David E","year":"2005","unstructured":"David E Pozen. 2005. The Mosaic Theory, National Security, and the Freedom of Information Act. The Yale Law Journal, (2005), 628-679."},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the 1999 Symposium on Document Image Understanding Technology.","author":"Prueitt Paul S.","year":"1999","unstructured":"Paul S. Prueitt. 1999. Similarity Analysis and the Mosaic Effect. In Proceedings of the 1999 Symposium on Document Image Understanding Technology."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2697854"},{"key":"e_1_3_2_1_40_1","unstructured":"Mahmoud F Sayed. 2021. Search Among Sensitive Content. Ph.D. Dissertation. University of Maryland College Park."},{"volume-title":"Document Recognition IV","author":"Spitz Larry","key":"e_1_3_2_1_41_1","unstructured":"Larry Spitz. 1997. Duplicate Document Detection. In Document Recognition IV, Vol. 3027. SPIE, 88-94."},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the Seventh International Conference on Learning Representations (ICLR).","author":"Sun Zhiqing","year":"2019","unstructured":"Zhiqing Sun, Zhi-Hong Deng, Jian-Yun Nie, and Jian Tang. 2019. RotatE: Knowledge Graph Embedding by Relational Rotation in Complex Space. In Proceedings of the Seventh International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"volume-title":"Proceedings of the 37th International Conference on Machine Learning, (ICML'20)","author":"Teru Komal K.","key":"e_1_3_2_1_44_1","unstructured":"Komal K. Teru, Etienne G. Denis, and William L. Hamilton. 2020. Inductive Relation Prediction by Subgraph Reasoning. In Proceedings of the 37th International Conference on Machine Learning, (ICML'20). JMLR.org, Article 876, 10 pages."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W15-4007"},{"key":"e_1_3_2_1_46_1","unstructured":"Hugo Touvron Thibaut Lavril Gautier Izacard Xavier Martinet Marie-Anne Lachaux Timoth\u00e9e Lacroix Baptiste Rozi\u00e8re Naman Goyal Eric Hambro Faisal Azhar et al. 2023. LLaMA: Open and Efficient Foundation Language Models. arXiv preprint arXiv:2302.13971 (2023)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v28i1.8870"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1412.6575"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2917763"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1259"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.naacl-long.96"},{"key":"e_1_3_2_1_52_1","unstructured":"Zhaocheng Zhu Zuobai Zhang Louis-Pascal Xhonneux and Jian Tang. 2021. Neural Bellman-Ford Networks: A General Graph Neural Network Framework for Link Prediction. In Neural Information Processing Systems."}],"event":{"name":"ICTIR '25: International ACM SIGIR Conference on Innovative Concepts and Theories in Information Retrieval","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Padua Italy","acronym":"ICTIR '25"},"container-title":["Proceedings of the 2025 International ACM SIGIR Conference on Innovative Concepts and Theories in Information Retrieval (ICTIR)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3731120.3744577","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T13:20:19Z","timestamp":1755868819000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3731120.3744577"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,18]]},"references-count":52,"alternative-id":["10.1145\/3731120.3744577","10.1145\/3731120"],"URL":"https:\/\/doi.org\/10.1145\/3731120.3744577","relation":{},"subject":[],"published":{"date-parts":[[2025,7,18]]},"assertion":[{"value":"2025-07-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}