{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T00:06:48Z","timestamp":1765498008125,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,10]]},"DOI":"10.1145\/3746252.3761470","type":"proceedings-article","created":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T23:55:33Z","timestamp":1762559733000},"page":"6708-6712","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Demonstration of PKGem: Secure Enrichment of Personal Knowledge Graphs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-3956-3160","authenticated-orcid":false,"given":"Junzhou","family":"Su","sequence":"first","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1831-0625","authenticated-orcid":false,"given":"Sriram","family":"Nutulapati","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8788-4379","authenticated-orcid":false,"given":"Chang","family":"Ge","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. What Is Entity Resolution? https:\/\/neo4j.com\/blog\/graph-database\/whatis-entity-resolution\/."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Wi-Fi Direct Specification. https:\/\/www.wi-fi.org\/file\/wi-fi-directspecification."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341981.3344241"},{"key":"e_1_3_2_1_4_1","unstructured":"Ayoub Benaissa Bilal Retiat Bogdan Cebere and Alaa Eddine Belfedhal. 2021. TenSEAL: A Library for Encrypted Tensor Operations Using Homomorphic Encryption. arXiv:2104.03152 [cs.CR]"},{"key":"e_1_3_2_1_5_1","volume-title":"Overview of Short-range Wireless Communication Protocol. In 7th International Conference on Computer and Communication Systems, ICCCS 2022","author":"Cao Shuai","year":"2022","unstructured":"Shuai Cao, Xiangning Chen, and Benchi Yuan. 2022. Overview of Short-range Wireless Communication Protocol. In 7th International Conference on Computer and Communication Systems, ICCCS 2022, Wuhan, China, April 22--25, 2022. IEEE, 519--523."},{"key":"e_1_3_2_1_6_1","volume-title":"A comprehensive survey of personal knowledge graphs. WIREs Data. Mining. Knowl. Discov. 13, 6","author":"Chakraborty Prantika","year":"2023","unstructured":"Prantika Chakraborty and Debarshi Kumar Sanyal. 2023. A comprehensive survey of personal knowledge graphs. WIREs Data. Mining. Knowl. Discov. 13, 6 (2023)."},{"key":"e_1_3_2_1_7_1","volume-title":"Attentive Knowledge-aware Graph Convolutional Networks with Collaborative Guidance for Personalized Recommendation. In 38th IEEE International Conference on Data Engineering, ICDE 2022","author":"Chen Yankai","year":"2022","unstructured":"Yankai Chen, Yaming Yang, Yujing Wang, Jing Bai, Xiangchen Song, and Irwin King. 2022. Attentive Knowledge-aware Graph Convolutional Networks with Collaborative Guidance for Personalized Recommendation. In 38th IEEE International Conference on Data Engineering, ICDE 2022, Kuala Lumpur, Malaysia, May 9--12, 2022. IEEE, 299--311."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.250581"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1561\/3300000019"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3639363"},{"volume-title":"The Foundations of Cryptography - Volume 2: Basic Applications","author":"Goldreich Oded","key":"e_1_3_2_1_12_1","unstructured":"Oded Goldreich. 2004. The Foundations of Cryptography - Volume 2: Basic Applications. Cambridge University Press."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3300360"},{"key":"e_1_3_2_1_14_1","volume-title":"Knowledge-Enhanced Personalized Review Generation with Capsule Graph Neural Network. In CIKM '20: The 29th ACM International Conference on Information and Knowledge Management","author":"Li Junyi","year":"2020","unstructured":"Junyi Li, Siqing Li,Wayne Xin Zhao, Gaole He, ZhichengWei, Nicholas Jing Yuan, and Ji-Rong Wen. 2020. Knowledge-Enhanced Personalized Review Generation with Capsule Graph Neural Network. In CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, Virtual Event, Ireland, October 19--23, 2020. ACM, 735--744."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D15-1082"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2025.104473"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2019.00063"},{"volume-title":"Microsoft Research","author":"SEAL","key":"e_1_3_2_1_18_1","unstructured":"SEAL 2023. Microsoft SEAL (release 4.1). Microsoft Research, Redmond, WA.."},{"volume-title":"The HM-GM-AM-QM Inequalities","author":"Sedrakyan Hayk","key":"e_1_3_2_1_19_1","unstructured":"Hayk Sedrakyan and Nairi Sedrakyan. 2018. The HM-GM-AM-QM Inequalities. Springer, Cham, Switzerland."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9720-4"},{"key":"e_1_3_2_1_21_1","volume-title":"Information Leakage in Embedding Models. In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","author":"Song Congzheng","year":"2020","unstructured":"Congzheng Song and Ananth Raghunathan. 2020. Information Leakage in Embedding Models. In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9--13, 2020. ACM, 377--390."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-acl.6"},{"key":"e_1_3_2_1_23_1","volume-title":"Reimagining Retrieval Augmented Language Models for Answering Queries. In Findings of the Association for Computational Linguistics: ACL 2023","author":"Tan Wang-Chiew","year":"2023","unstructured":"Wang-Chiew Tan, Yuliang Li, Pedro Rodriguez, Richard James, Xi Victoria Lin, Alon Y. Halevy, and Wen-tau Yih. 2023. Reimagining Retrieval Augmented Language Models for Answering Queries. In Findings of the Association for Computational Linguistics: ACL 2023, Toronto, Canada, July 9--14, 2023, Anna Rogers, Jordan L. Boyd-Graber, and Naoaki Okazaki (Eds.). Association for Computational Linguistics, 6131--6146."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 34th International Conference on Neural Information Processing Systems. Curran Associates Inc.","author":"Wang Wenhui","year":"2020","unstructured":"Wenhui Wang, Furu Wei, Li Dong, Hangbo Bao, Nan Yang, and Ming Zhou. 2020. MINILM: deep self-attention distillation for task-agnostic compression of pre-trained transformers. In Proceedings of the 34th International Conference on Neural Information Processing Systems. Curran Associates Inc."}],"event":{"name":"CIKM '25: The 34th ACM International Conference on Information and Knowledge Management","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Seoul Republic of Korea","acronym":"CIKM '25"},"container-title":["Proceedings of the 34th ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746252.3761470","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T00:02:55Z","timestamp":1765497775000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746252.3761470"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,10]]},"references-count":24,"alternative-id":["10.1145\/3746252.3761470","10.1145\/3746252"],"URL":"https:\/\/doi.org\/10.1145\/3746252.3761470","relation":{},"subject":[],"published":{"date-parts":[[2025,11,10]]},"assertion":[{"value":"2025-11-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}