{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:07:00Z","timestamp":1743048420493,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031237928"},{"type":"electronic","value":"9783031237935"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-23793-5_14","type":"book-chapter","created":{"date-parts":[[2023,2,25]],"date-time":"2023-02-25T07:06:09Z","timestamp":1677308769000},"page":"153-167","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Self-adaptive Privacy Concern Detection for\u00a0User-Generated Content"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8820-2405","authenticated-orcid":false,"given":"Xuan-Son","family":"Vu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7788-3986","authenticated-orcid":false,"given":"Lili","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,26]]},"reference":[{"key":"14_CR1","unstructured":"Papernot, N., McDaniel, P.D., Sinha, A., Wellman, M.P.: Towards the science of security and privacy in machine learning. CoRR (2016)"},{"key":"14_CR2","first-page":"4","volume":"17","author":"PJ McKenzie","year":"2012","unstructured":"McKenzie, P.J., Burkell, J., Wong, L., Whippey, C., Trosow, S.E., McNally, M.B.: User-generated online content 1: overview, current state and context. First Monday 17, 4\u20136 (2012)","journal-title":"First Monday"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp. 111\u2013125. SP 2008 (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1322\u20131333. CCS 2015 (2015)","DOI":"10.1145\/2810103.2813677"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"1296","DOI":"10.1037\/0022-3514.77.6.1296","volume":"77","author":"JW Pennebaker","year":"1999","unstructured":"Pennebaker, J.W., King, L.A.: Linguistic styles: language use as an individual difference. J. Personal. Soc. Psychol. 77, 1296\u20131312 (1999)","journal-title":"J. Personal. Soc. Psychol."},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Flekova, L., Gurevych, I.: Personality profiling of fictional characters using sense-level links between lexical resources. In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1805\u20131816 (2015)","DOI":"10.18653\/v1\/D15-1208"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Bollen, J., Mao, H., Zeng, X.: Twitter mood predicts the stock market. CoRR (2010)","DOI":"10.1016\/j.jocs.2010.12.007"},{"key":"14_CR8","unstructured":"Flekova, L., Gurevych, I.: Can we hide in the web? Large scale simultaneous age and gender author profiling in social media notebook for PAN at CLEF 2013. In: Working Notes for CLEF 2013 Conference, Valencia, Spain, 23\u201326 September 2013 (2013)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Vu, X.S., Jiang, L., Br\u00e4ndstr\u00f6m, A., Elmroth, E.: Personality-based knowledge extraction for privacy-preserving data analysis. In: Proceedings of the Knowledge Capture Conference, pp. 45:1\u201345:4. K-CAP 2017 (2017)","DOI":"10.1145\/3148011.3154479"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Cynthia, D.: Differential privacy. In: ICALP, pp. 1\u201312 (2006)","DOI":"10.1007\/11787006_1"},{"key":"14_CR11","first-page":"457","volume":"30","author":"F Mairesse","year":"2007","unstructured":"Mairesse, F., Walker, M.A., Mehl, M.R., Moore, R.K.: Using linguistic cues for the automatic recognition of personality in conversation and text. J. Artif. Int. Res. 30, 457\u2013500 (2007)","journal-title":"J. Artif. Int. Res."},{"key":"14_CR12","unstructured":"Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE, pp. 217\u2013228 (2005)"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Wang, R., Wang, X., Li, Z., Tang, H., Reiter, M.K., Dong, Z.: Privacy-preserving genomic computation through program specialization. In: CCS , pp. 338\u2013347(2009)","DOI":"10.1145\/1653662.1653703"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"McSherry, F.D.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: SIGMOD (2009)","DOI":"10.1145\/1559845.1559850"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Mohan, P., Thakurta, A., Shi, E., Song, D., Culler, D.: GUPT: privacy preserving data analysis made easy. In: SIGMOD (2012)","DOI":"10.1145\/2213836.2213876"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Ebadi, H., Sands, D., Schneider, G.: Differential privacy: now it\u2019s getting personal. In: Proceedings of the 42Nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. POPL 2015, pp. 69\u201381 (2015)","DOI":"10.1145\/2676726.2677005"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Jorgensen, Z., Yu, T., Cormode, G.: Conservative or liberal? Personalized differential privacy. In: 2015 IEEE 31st International Conference on Data Engineering, pp. 1023\u20131034 (2015)","DOI":"10.1109\/ICDE.2015.7113353"},{"key":"14_CR18","unstructured":"Sumner, C., Byers, A., Shearing, M.: Determining personality traits and privacy concerns from Facebook activity. In: Black Hat Briefings, pp. 197\u2013221 (2011)"},{"key":"14_CR19","unstructured":"John, O.P., Srivastava, S.: The big five trait taxonomy: History, measurement, and theoretical perspectives. In: Handbook of Personality: Theory and Research, pp. 102\u2013138 (1999)"},{"issue":"5","key":"14_CR20","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/0925-2312(91)90023-5","volume":"2","author":"F Murtagh","year":"1991","unstructured":"Murtagh, F.: Multilayer perceptrons for classification and regression. Neurocomputing 2(5), 183\u2013197 (1991)","journal-title":"Neurocomputing"},{"key":"14_CR21","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. CoRR abs\/1412.6980 (2014)"},{"key":"14_CR22","unstructured":"Rumelhart, D.E., Durbin, R., Golden, R., Chauvin, Y.: Backpropagation, pp. 1\u201334 (1995)"},{"key":"14_CR23","unstructured":"Abadi, M., et al.: TensorFlow: Large-scale machine learning on heterogeneous systems (2015). https:\/\/www.tensorflow.org\/"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Costa, P.T., McCrae, R.R.: The Revised NEO Personality Inventory (NEO-PI-R), pp. 179\u2013198 (2008)","DOI":"10.4135\/9781849200479.n9"},{"key":"14_CR25","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MIS.2017.23","volume":"32","author":"N Majumder","year":"2017","unstructured":"Majumder, N., Poria, S., Gelbukh, A., Cambria, E.: Deep learning-based document modeling for personality detection from text. IEEE Intell. Syst. 32, 74\u201379 (2017)","journal-title":"IEEE Intell. Syst."},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Farnadi, G., Zoghbi, S., Moens, M.: Cock. Recognising personality traits using Facebook status updates, M.D., pp. 14\u201318 (2013)","DOI":"10.1609\/icwsm.v7i2.14470"},{"key":"14_CR27","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s11257-016-9171-0","volume":"26","author":"G Farnadi","year":"2016","unstructured":"Farnadi, G., et al.: Computational personality recognition in social media. User Model. User-Adapt. Interact. 26, 109\u2013142 (2016)","journal-title":"User Model. User-Adapt. Interact."},{"key":"14_CR28","unstructured":"Vu, X.S., Flekova, L., Jiang, L., Gurevych, I.: Lexical-semantic resources: yet powerful resources for automatic personality classification. In: Proceedings of the 9th Global WordNet Conference (2018)"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Vu, T., Nguyen, D.Q., Vu, X.S., Nguyen, D.Q., Trenell, M.: Nihrio at semeval-2018 task 3: a simple and accurate neuralnetwork model for irony detection in twitter. In: Proceedings of the 12nd International Workshop on Semantic Evaluation (SemEval-2018), pp. 525\u2013530. Association for Computational Linguistics (2018)","DOI":"10.18653\/v1\/S18-1085"},{"key":"14_CR30","first-page":"321","volume":"16","author":"KW Bowyer","year":"2011","unstructured":"Bowyer, K.W., Chawla, N.V., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2011)","journal-title":"J. Artif. Intell. Res."},{"key":"14_CR31","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."}],"container-title":["Lecture Notes in Computer Science","Computational Linguistics and Intelligent Text Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-23793-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,25]],"date-time":"2023-02-25T07:08:50Z","timestamp":1677308930000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-23793-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031237928","9783031237935"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-23793-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"26 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CICLing","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Linguistics and Intelligent Text Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hanoi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 March 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 March 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cicling2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cicling.org\/2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}