{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T09:05:48Z","timestamp":1719911148604},"reference-count":22,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. ^|^ Syst."],"published-print":{"date-parts":[[2015]]},"DOI":"10.1587\/transinf.2014mup0016","type":"journal-article","created":{"date-parts":[[2015,1,5]],"date-time":"2015-01-05T07:25:15Z","timestamp":1420442715000},"page":"78-88","source":"Crossref","is-referenced-by-count":5,"title":["Anonymizing Personal Text Messages Posted in Online Social Networks and Detecting Disclosures of Personal Information"],"prefix":"10.1587","volume":"E98.D","author":[{"given":"Hoang-Quoc","family":"NGUYEN-SON","sequence":"first","affiliation":[{"name":"Graduate University for Advanced Studies"}]},{"given":"Minh-Triet","family":"TRAN","sequence":"additional","affiliation":[{"name":"University of Science"}]},{"given":"Hiroshi","family":"YOSHIURA","sequence":"additional","affiliation":[{"name":"The University of Electro-Communications"}]},{"given":"Noboru","family":"SONEHARA","sequence":"additional","affiliation":[{"name":"National Institute of Informatics"}]},{"given":"Isao","family":"ECHIZEN","sequence":"additional","affiliation":[{"name":"National Institute of Informatics"},{"name":"Graduate University for Advanced Studies"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] F. Stutzman, R. Gross, and A. Acquisti, \u201cSilent listeners: The evolution of privacy and disclosure on facebook,\u201d J. Priv. and Conf., vol.4, no.2, pp.7-41, 2012.","DOI":"10.29012\/jpc.v4i2.620"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] D. Kokkinakis and A. Thurin, \u201cAnonymisation of swedish clinical data,\u201d Proc. 11th AI in Medic., pp.237-241, 2007.","DOI":"10.1007\/978-3-540-73599-1_31"},{"key":"3","unstructured":"[3] B. Medlock, \u201cAn introduction to nlp-based textual anonymisation,\u201d Proc. 5th Conf. Lang. Res. and Eval., 2006."},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] H.Q. Nguyen-Son, M.T. Tran, D. Tien, H. Yoshiura, N. Sonehara, and I. Echizen, \u201cAutomatic anonymous fingerprinting of text posted on social networking services,\u201d Proc. 11th Inter. Worksh. Digit. Forens. and Waterm., pp.410-424, 2013.","DOI":"10.1007\/978-3-642-40099-5_34"},{"key":"5","unstructured":"[5] Y. Zhang, G. Blackwood, and S. Clark, \u201cSyntax-based word ordering incorporating a large-scale language model,\u201d Proc. 13th Conf. Euro. Assoc. for Comput. Ling., pp.736-746, 2012."},{"key":"6","unstructured":"[6] C.Y. Chang and S. Clark, \u201cLinguistic steganography using automatically generated paraphrases,\u201d Proc. 11th NAACL HLT, pp.591-599, 2010."},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] X. Zheng, L. Huang, Z. Chen, Z. Yu, and W. Yang, \u201cHiding information by context-based synonym substitution,\u201d Proc. 8th Inter. Worksh. Digit. Forens. and Waterm., pp.162-169, 2009.","DOI":"10.1007\/978-3-642-03688-0_16"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] I. Ounis, C. Macdonald, J. Lin, and I. Soboroff, \u201cOverview of the trec-2011 microblog track,\u201d Proc. 20th Tex. Retriev. Conf., 2011.","DOI":"10.6028\/NIST.SP.500-294.blog-overview"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] P. Samarati and L. Sweeney, \u201cGeneralizing data to provide anonymity when disclosing information,\u201d Proc. 17th ACM SIGACT-SIGMOD-SIGART, p.188, 1998.","DOI":"10.1145\/275487.275508"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] F. Suchanek, G. Kasneci, and G. Weikum, \u201cYAGO: A core of semantic knowledge,\u201d Proc. 16th Inter. Conf. WWW, pp.697-706, 2007.","DOI":"10.1145\/1242572.1242667"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] T.H. Ngoc, I. Echizen, K. Komei, and H. Yoshiura, \u201cNew approach to quantification of privacy on social network sites,\u201d Proc. 24th Adv. Infor. Netw. and Appl., pp.556-564, 2010.","DOI":"10.1109\/AINA.2010.118"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] M. Topkara, U. Topkara, and M.J. Atallah, \u201cWords are not enough: Sentence level natural language watermarking,\u201d Proc. 4th ACM Worsh. Cont. Prot. and Sec., pp.37-46, 2006.","DOI":"10.1145\/1178766.1178777"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] M.J. Atallah, V. Raskin, C.F. Hempelmann, M. Karahan, R. Sion, U. Topkara, and K.E. Triezenberg, \u201cNatural language watermarking and tamperproofing,\u201d Proc. 5th Infor. Hid., pp.196-212, 2002.","DOI":"10.1007\/3-540-36415-3_13"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] H. Kataoka, A. Utsumi, Y. Hirose, and H. Yoshiura, \u201cDisclosure control of natural language information to enable secure and enjoyable communication over the internet,\u201d Proc. 15th Inter. Worksh. Sec. Prot., pp.178-188, 2010.","DOI":"10.1007\/978-3-642-17773-6_23"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] J.C. Platt, \u201cFast training of support vector machines using sequential minimal optimization,\u201d Adv. in Ker. Meth., pp.185-208, 1999.","DOI":"10.7551\/mitpress\/1130.003.0016"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] G.A. Miller, \u201cWordnet: A lexical database for english,\u201d Commun. ACM, vol.38, no.11, pp.39-41, 1995.","DOI":"10.1145\/219717.219748"},{"key":"17","unstructured":"[17] C.Y. Chang and S. Clark, \u201cPractical linguistic steganography using contextual synonym substitution and vertex colour coding,\u201d Proc. Empirical Methods in NLP, pp.1194-1203, 2010."},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] S. Machida, S. Shimada, and I. Echizen, \u201cSettings of access control by detecting privacy leaks in sns,\u201d Proc. 9th Signal Image Technology and Internet Based Sytems, pp.660-666, 2013.","DOI":"10.1109\/SITIS.2013.108"},{"key":"19","unstructured":"[19] N. Shuyo, \u201cLanguage detection library for java,\u201d 2010."},{"key":"20","unstructured":"[20] B. Han, P. Cook, and T. Baldwin, \u201cAutomatically constructing a normalisation dictionary for microblogs,\u201d Proc. Joint Conf. Emp. Meth. in Nat. Lang. Proc. and Comput. Nat. Lang. Learn., pp.421-432, 2012."},{"key":"21","unstructured":"[21] X. Liu, S. Zhang, F. Wei, and M. Zhou, \u201cRecognizing named entities in tweets,\u201d Proc. 49th ACL HLT, pp.359-367, 2011."},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] J.W. Byun and E. Bertino, \u201cMicro-views, or on how to protect privacy while enhancing data usability: Concepts and challenges,\u201d ACM SIGMOD Record, vol.35, no.1, pp.9-13, 2006.","DOI":"10.1145\/1121995.1121997"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E98.D\/1\/E98.D_2014MUP0016\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T07:54:29Z","timestamp":1717660469000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E98.D\/1\/E98.D_2014MUP0016\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2014mup0016","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}