{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:08:51Z","timestamp":1764842931972,"version":"3.38.0"},"reference-count":27,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T00:00:00Z","timestamp":1729382400000},"content-version":"vor","delay-in-days":293,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.056008","type":"journal-article","created":{"date-parts":[[2024,10,5]],"date-time":"2024-10-05T08:38:58Z","timestamp":1728117538000},"page":"1565-1580","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["Research on Fine-Grained Recognition Method for Sensitive Information in Social Networks Based on CLIP"],"prefix":"10.32604","volume":"81","author":[{"given":"Menghan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Fangfang","family":"Shan","sequence":"additional","affiliation":[]},{"given":"Mengyao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Wang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"91311","DOI":"10.1109\/ACCESS.2020.2994408","article-title":"Towards consensus-based group decision making for co-owned data sharing in online social networks","volume":"8","author":"Akkuzu","year":"2020","journal-title":"IEEE Access"},{"key":"ref2","series-title":"2015 12th Int. Iranian Society Cryptol. Conf. Inform. Secur. Cryptol. (ISCISC)","first-page":"64","article-title":"Collaborative privacy management in P2P online social networks","author":"Zahak","year":"2015"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1049\/iet-ifs.2014.0466","article-title":"Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management","volume":"10","author":"Palomar","year":"Mar. 2016","journal-title":"IET Inf. Secur."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.comcom.2023.01.010","article-title":"A privacy-dependent condition-based privacy-preserving information sharing scheme in online social networks","volume":"200","author":"Yi","year":"Feb. 2023","journal-title":"Comput. Commun."},{"key":"ref5","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1109\/TDSC.2020.2980270","article-title":"On-the-fly privacy for location histograms","volume":"19","author":"Theodorakopoulos","year":"Jan. 1\u2013Feb. 2022","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1186\/s13638-021-01999-z","article-title":"Location-sharing protocol for privacy protection in mobile online social networks","volume":"2021","author":"Ruan","year":"2021","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref7","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/s42045-019-00021-x","article-title":"Research on sensitive content detection in social networks","volume":"2","author":"Meng","year":"2019","journal-title":"CCF Trans. Netw."},{"key":"ref8","first-page":"1058","article-title":"Utility-preserving privacy protection of textual documents via word embeddings","volume":"35","author":"Hassan","year":"Jan. 1, 2023","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref9","series-title":"Intell. Syst. Design Appl.: 18th Int. Conf. Intell. Syst. Design Appl. (ISDA 2018)","first-page":"138","article-title":"Towards an automatic detection of sensitive information in Mongo database intelligent systems design and applications","volume":"940","author":"Heni","year":"2020"},{"key":"ref10","first-page":"1","article-title":"KGDetector: Detecting chinese sensitive information via knowledge graph-enhanced BERT","volume":"2022","author":"Cong","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"ref11","unstructured":"A. Mehdi et al., \u201cA brief survey of text mining: Classification, clustering and extraction techniques,\u201d 2017, arXiv:1707.02919."},{"key":"ref12","unstructured":"J. Y. Hou, \u201cResearch on deep learning-based detection technology for sensitive text information in scene images,\u201d (in Chinese), North University, China, 2021. doi: 10.27470\/d.cnki.ghbgc.2021.001033."},{"key":"ref13","unstructured":"W. Y. Li, \u201cResearch and application of detection technology for sensitive information in images based on global feature elements,\u201d (in Chinese), University of Chinese Academy of Sciences (Institute of Computing Technology, Chinese Academy of Sciences, Shenyang), China, 2022. doi: 10.27587\/d.cnki.gksjs.2022.000019."},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3386082","article-title":"Image privacy prediction using deep neural networks","volume":"14","author":"Ashwini","year":"2020","journal-title":"ACM Trans. Web"},{"key":"ref15","article-title":"Anti-leakage method of network sensitive information data based on homomorphic encryption","volume":"32","author":"Shi","year":"2023","journal-title":"J. Intell. Syst."},{"key":"ref16","series-title":"2021 IEEE 14th Int. Conf. Cloud Comput. (CLOUD)","first-page":"261","article-title":"Knowledge & learning-based adaptable system for sensitive information identification and handling","author":"Kaul","year":"2021"},{"key":"ref17","series-title":"2021 IEEE Sixth Int. Conf. Data Sci. Cyberspace (DSC)","first-page":"47","article-title":"Sensitive image information recognition model of network community based on content text","author":"Gao","year":"2021"},{"key":"ref18","first-page":"20","article-title":"A lightweight image sensitive information detection model based on yolov5s","volume":"6","author":"Mao","year":"2023","journal-title":"Academic J. Comput. Inform. Sci."},{"key":"ref19","series-title":"Proc. IEEE Int. Conf. Acoustics, Speech Signal Process.","first-page":"7037","article-title":"MM-DFN: Multimodal dynamic fusion network for emotion recognition in conversations","author":"Hu","year":"May 23\u201327, 2022"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1080\/08839514.2021.2000688","article-title":"Multimodal sentiment analysis using multi-tensor fusion network with cross-modal modeling","volume":"36","author":"Yan","year":"2022","journal-title":"Appl. Artif. Intell."},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2022.109978","article-title":"Improving multimodal fusion with Main Modal Transformer for emotion recognition in conversation","volume":"258","author":"Zou","year":"2022","journal-title":"Knowl.-Based Syst."},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1155\/2023\/5627246","article-title":"Adaptive sensitive information recognition based on multimodal information inference in social networks","volume":"2023","author":"Ji","year":"2023","journal-title":"Secur. Commun. Netw."},{"key":"ref23","doi-asserted-by":"crossref","first-page":"3774","DOI":"10.1109\/TDSC.2021.3106780","article-title":"Checking only when it is necessary: Enabling integrity auditing based on the keyword with sensitive information privacy for encrypted cloud data","volume":"19","author":"Gao","year":"Nov. 1\u2013Dec. 2022","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref24","article-title":"Predicting implicit user preferences with multimodal feature fusion for similar user recommendation in social media","volume":"11","author":"Wang","year":"2021","journal-title":"Appl. Sci."},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.3390\/s22207918","article-title":"Visual relationship detection with multimodal fusion and reasoning","volume":"22","author":"Xiao","year":"2022","journal-title":"Sensors"},{"key":"ref26","unstructured":"M. Zhang and R. Chunara, \u201cLeveraging CLIP for inferring sensitive information and improving model fairness,\u201d 2024, arXiv:2403.10624."},{"key":"ref27","series-title":"Int. Conf. Comput. Linguist., 2022","article-title":"Different data, different modalities! reinforced data splitting for effective multimodal information extraction from social media posts","author":"Xu","year":"Oct. 12\u201317, 2022"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-1\/TSP_CMC_56008\/TSP_CMC_56008.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T02:59:56Z","timestamp":1741316396000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n1\/58356"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":27,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.056008","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-07-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-11","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-15","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}