<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Comparing LLMs and Traditional Privacy Measures to Evaluate Query Obfuscation Approaches⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Francesco Luigi</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>De Faveri</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Guglielmo</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Faggioli</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nicola</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ferro</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Information Engineering, University of Padova</institution>
          ,
          <addr-line>Padova</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>When interacting with Information Retrieval (IR) systems, users may inadvertently disclose sensitive personal information, such as medical conditions, through their search queries. Therefore, evaluating the privacy these queries aford during the retrieval process is critical. Query obfuscation has traditionally been employed to hide a user's information need by modifying the original query. -Diferential Privacy ( -DP) mechanisms perturb query terms by a privacy budget  and guarantee a grounded in mathematical proofs of privacy. However,  does not fully capture the user's subjective experience of privacy, needing additional empirical tests. Privacy assessments typically rely on lexical and semantic similarity measures to quantify the diference between the original and obfuscated queries. In this work, we investigate how Large Language Models (LLMs) can be used to perform a privacy evaluation in such scenarios. Our central research question is whether LLMs can ofer a new lens through which privacy can be assessed, and whether their scores correlate with similarity-based metrics, such as Jaccard similarity and cosine similarity between text embeddings. Our experimental results show a strong positive correlation between LLM-derived privacy assessments and cosine similarity values computed with diferent Transformers. These findings suggest that LLMs can efectively serve as proxies for traditional similarity measures in the context of privacy evaluation.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Privacy Preserving Information Retrieval</kwd>
        <kwd>Diferential Privacy</kwd>
        <kwd>Information Security</kwd>
        <kwd>Large Language Models</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Users frequently disclose sensitive information—such as medical symptoms—when interacting with
search engines, social platforms, or smart devices, often compromising their privacy [
        <xref ref-type="bibr" rid="ref2 ref3 ref4 ref5">2, 3, 4, 5</xref>
        ]. Ensuring
adequate privacy protections in Information Retrieval (IR) systems is therefore essential to comply with
regulations like the GDPR [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ]. -Diferential Privacy ( DP) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] ofers formal guarantees by injecting
noise into data, with the privacy budget  controlling the trade-of between utility and protection.
      </p>
      <p>
        However, the actual privacy experienced by users depends not only on  but also on other factors
such as data distribution and processing characteristics [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ], making empirical evaluation necessary.
In this work, we investigate the use of Large Language Models (LLMs) as pseudo-assessors to evaluate
User
the efectiveness of query obfuscation mechanisms (Figure 1). After obfuscating a query using an -DP
mechanism, we prompt an LLM to judge whether the resulting text still reveals the original need. Our
contributions are threefold: (i) we formalise the task of evaluating actual textual obfuscation, (ii) we
propose LLM-based privacy evaluation as a proxy to traditional privacy metrics, and (iii) we show that
LLM-generated scores correlate with established measures such as lexical and semantic similarity. LLM
scores tend to integrate semantic and lexical aspects, ofering a broader view of privacy evaluation.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <p>
        Query Obfuscation Protocol. Query obfuscation protocols [
        <xref ref-type="bibr" rid="ref11 ref12 ref13">11, 12, 13</xref>
        ] are a class of privacy
preserving strategies used to protect user information when interacting with IR systems. These protocols
work under the assumption that the IR system is non-collaborative towards protecting user privacy,
i.e., it does not implement any privacy mechanism to safeguard sensitive information needs. On the
client side, considered safe, the text of the original query is transformed by an obfuscation mechanism,
i.e., an algorithm that accepts the query text as input, masks the original information need, and outputs
one or more obfuscated queries. The obfuscated queries are submitted to the IR system, unsafe, and
retrieve and rank the documents in response to such queries. The -DP framework [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] provides a formal
definition of privacy to the text, ensuring the privacy of the texts by employing randomisation during
the query obfuscation phase. The level of formal privacy is controlled by the Privacy Budget parameter
 ∈ R+, which regulates the amount of statistical noise added query terms [
        <xref ref-type="bibr" rid="ref14 ref15 ref16">14, 15, 16</xref>
        ] or influences the
sampling probabilities for generating obfuscated terms [
        <xref ref-type="bibr" rid="ref17 ref18 ref19 ref20">17, 18, 19, 20</xref>
        ].  cannot be considered a perfect
proxy of the actual privacy experienced [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], as its efects depend on several aspects.
Privacy Measures. Assessing the privacy provided by an -DP mechanism remains a well-established
challenge within the research community [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ]. Wagner and Eckhof [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] define a set of aspects to assess
the obfuscations of a mechanism: lexical similarity, semantic similarity and failure rates. Lexical similarity
quantifies the term overlap between the original and the obfuscated texts. This metric is typically
assessed using indicators such as the Jaccard Score, BLEU [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], and ROUGE [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. On the other hand, the
semantic similarity usually employs Transformers [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] or BERT Scores [
        <xref ref-type="bibr" rid="ref25">25, 26</xref>
        ]. Specifically, considering
a Transformer  , the semantic similarity between the original and obfuscated text, respectively  and ˜,
is computed as the cosine similarity  between the embeddings in the latent space, i.e.,  = ‖(())‖·‖((˜˜))‖ .
Failure rates [27, 28], i.e.,  and , measure the probability of masking a word  with itself ()
and the size of the words that are used to mask the same term (). Notice that, these measures are
useful only for word-level obfuscation mechanisms and completely neglect the fact that a word can
be obfuscated with a synonym.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Privacy Assessments Generation</title>
      <p>When determining if the query’s text has been obfuscated, multiple aspects should be considered. For
instance, minor modifications–such as altering a few characters in a term or changing the term order–can
significantly alter the text’s overall meaning. Conversely, two sentences may difer syntactically while
retaining the same semantic meaning. Traditional privacy evaluation metrics based on lexical similarity
between original and obfuscated queries can be trivially fooled using synonyms to replace the query
terms. Conversely, semantic similarity measured by transformers can be more robust towards identifying
the similarities between texts. However, employing Transformers to determine whether a text has been
obfuscated presents limitations when the text is rephrased. For example, encoding the sentences “Mr.
Doe was born in 1985 and lives in LA.” and “John D., in his 40s, lives in Los Angeles.” using MiniLM [26]
and computing the cosine similarity between their embeddings is 0.56, which poorly reflects the absence
of privacy if we obfuscate the first sentence with the second. Despite reducing the cosine between the
two texts, rephrasing a sentence does not ensure adequate privacy.</p>
      <p>Prompt Template
“Evaluate the information leakage from the original text to the obfuscated texts, providing a justification for each
score given. Consider lexical and semantic similarities between original and obfuscated texts. The score should be
an integer/float between min and Max, where min indicates no information leakage, and Max indicates complete
information leakage. The original text is: original_text. The obfuscated texts are: obfuscated_texts.”
On a diferent research line, when it comes to IR evaluation, several studies [29, 30, 31, 32] investigated
the possibility of using LLMs to judge relevance. However, to the best of our knowledge, no prior research
has explored the application of LLMs for privacy assessments of textual data. To address this gap, we
propose leveraging LLMs to assess privacy, providing the first experimental insights into the LLMs
’s capabilities for understanding privacy, limiting assessment costs and time. In this task, both lexical
and contextual aspects—traditionally considered in privacy relevance assessments [33, 34]—must be
jointly analysed to understand the extent of information leakage from obfuscated versions of queries.
Thus, we develop a prompt to ask a LLM to evaluate the privacy levels attained by an obfuscated query
compared to the original one, extending beyond conventional evaluation metrics. This template takes
the original_text as the reference and the obfuscated_texts as a set of corresponding obfuscated
versions. Additionally, it specifies the expected output score domain (integer or floating values) and
the key aspects to consider when evaluating privacy, i.e., lexical and contextual similarity. The template
also requires justification with each score assigned by the LLM, ensuring a wide leakage assessment.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Experimental Evaluation</title>
      <p>
        To empirically test the methodology1, we consider two TREC collections MSMARCO Deep Learning
2019 track (DL’19)[35], consisting of 43 queries, and the TREC Medline 2004 collection (Med’04) [36],
comprising 50 queries. Adopting the Med‘04 queries represents a real obfuscation scenario, where the
user is interested in finding information about a disease and, thus, aims to protect the confidentiality
of the queries. We employ the pyPANTERA Python package[37] applying four state-of-the-art DP
mechanisms implemented in it, namely Cumulative Multivariate Perturbation (CMP) [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], Mahalanobis
perturbation [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], and their respective Vickrey’s variants [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. We selected two open-source LLMs, i.e.,
one reasoning-oriented model, DeepSeek-R1 [38]-distill-Llama70b a fine-tuned version of Llama 3.3
70B using samples generated by DeepSeek-R1, and the standard version of LLama 3.3 70B [39].
Changing the prompt: Continuous and Discrete Privacy Scores. We test two diferent prompts
for obtaining the privacy assessments. The LLMs are asked to provide: i) an information leakage score in a
continuous interval, i.e., ranging in the [
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] interval where 0 means no information leakage from the
private query, and 1 means total information leakage; ii) a discrete value using a score in a Likert scale [40, 41]
from a minimum score of 1, indicating that no information is understandable from the obfuscated query to
a maximum score of 5, suggesting that the obfuscated query is identical to the original text. The prompts
adopted for getting the scores from the LLMs are available in the paper’s online appendix. To avoid
encumbering, we report only the results on the Med‘04 queries of two mechanisms (Mahalanobis and
VickreyMhl) for three privacy setups,  ∈ {1,15,50}. The results on DL’19 and other mechanisms are equivalent
and available in the paper repository. Figure 2 presents the score distributions for the Continuous and
Discrete prompts employed to evaluate diferent obfuscation mechanisms. The results indicate that the
distributions of scores exhibit similar patterns across the diferent prompting strategies used to obtain the
privacy assessments. Under a strong privacy regime, i.e.,  = 1, the LLMs consistently evaluate queries as
highly obfuscated for both mechanisms, yielding a low information leakage score centring the distribution
around 0.0 for continuous scores while frequently assigning a score of 1 for the discrete prompt.
DeepSeekR1 identifies more information leakage compared to LLama 3.3. As  increases, the degree of obfuscation
applied to the textual data decreases, leading to a shift in privacy assessments toward higher information
1The code, the results and the appendix are available in the repository https://github.com/Kekkodf/LLM4PrivacyEval
=1
      </p>
      <p>LLama 3.3 LLM DeepSeek-R1
=15</p>
      <p>
        =50
scores for DeepSeek-R1, with most privacy scores around 0.3. At  = 15, a distinction emerges in the
obfuscation strategies, as the VickreyMhl mechanism tends to have lower leakage values: this is in line
with previous research [
        <xref ref-type="bibr" rid="ref13 ref21">13, 37, 21</xref>
        ], indicating that the evaluation approach is consistent. Finally, at  = 50,
Mahalanobis often fails to obfuscate the query, as evidenced by the large number of obfuscation queries
labelled with 1 in the continuous case or 5 in the discrete case. VickreyMhl provides a more satisfactory
degree of privacy, demonstrating the same conclusions found in [
        <xref ref-type="bibr" rid="ref15">15, 37</xref>
        ] with standard measures.
LLMs Privacy Scores &amp; Traditional Privacy Analysis. This section compares the privacy scores
obtained from the LLMs using the prompt that generated a score in the [
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] range. As traditional privacy
measures to which we compare the LLMs score, we employ three Transformers [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] architecture, namely
MiniLM [42], DistilRoBERTa [26], and MPNET [43], to compute the cosine similarity between query
obfuscations. Results on the lexical analysis are reported in the repository in the full paper [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. To validate
the correctness of the LLMs used to assess privacy, we compute the correlation between the LLMs
scores and the cosine similarities of the transformers measured as Kendall’s, Pearson’s and Spearman’s
correlations. Table 1 presents the correlation, organised by obfuscation mechanism, between the LLMs
privacy assessment scores and the cosine similarities calculated by the three diferent transformer models
on the obfuscated queries in the Med‘04. Our findings show that for all the mechanisms tested, Kendall’s
correlation is strongly positive and non-pathological, i.e., equal to 1, showing that while the measures
agree on assessing the privacy computed, they consider diferent aspects. The correlation decreases
when evaluating Vickrey’s variants, yet strong positive correlations between the measures are retained.
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>This study addressed the challenge of evaluating privacy in user queries obfuscated through -DP
mechanisms. While traditional approaches rely on lexical and semantic similarity between the original
and obfuscated queries, we explored the use of LLMs as automated privacy assessors. Our empirical
analysis shows that LLM-generated leakage scores efectively capture aspects of both lexical and semantic
similarity, producing continuous and Likert-style outputs. The positive correlation with established
semantic metrics indicates alignment with existing evaluation methods, while minor diferences with
lexical measures suggest a complementary perspective. Thus, LLM-based assessments ofer a practical
middle ground between current privacy evaluation techniques. Future work will include human
judgments to validate LLM-based scores. Additionally, we aim to investigate the internal activation
patterns of LLMs during privacy assessments, contributing to the trustworthiness of their evaluations.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used Grammarly for Readability and Spelling checks.
After using this tool, the authors reviewed and edited the content as needed and took full responsibility
for the publication’s content.
generation with BERT, in: 8th International Conference on Learning
Representations, ICLR 2020, Addis Ababa, Ethiopia, April 26-30, 2020, OpenReview.net, 2020. URL:
https://openreview.net/forum?id=SkeHuCVFDr.
[26] N. Reimers, I. Gurevych, Making monolingual sentence embeddings multilingual using
knowledge distillation, in: B. Webber, T. Cohn, Y. He, Y. Liu (Eds.), Proceedings of the 2020
Conference on Empirical Methods in Natural Language Processing, EMNLP 2020, Online,
November 16-20, 2020, Association for Computational Linguistics, 2020, pp. 4512–4525. URL:
https://doi.org/10.18653/v1/2020.emnlp-main.365. doi:10.18653/V1/2020.EMNLP-MAIN.365.
[27] O. Klymenko, S. Meisenbacher, F. Matthes, Diferential privacy in natural language processing the
story so far, in: O. Feyisetan, S. Ghanavati, P. Thaine, I. Habernal, F. Mireshghallah (Eds.), Proceedings
of the Fourth Workshop on Privacy in Natural Language Processing, Association for Computational
Linguistics, Seattle, United States, 2022, pp. 1–11. URL: https://aclanthology.org/2022.privatenlp-1.1.
doi:10.18653/v1/2022.privatenlp-1.1.
[28] A. Rényi, On measures of entropy and information, in: Proceedings of the fourth Berkeley
symposium on mathematical statistics and probability, volume 1: contributions to the theory of
statistics, volume 4, University of California Press, 1961, pp. 547–562.
[29] G. Faggioli, L. Dietz, C. L. A. Clarke, G. Demartini, M. Hagen, C. Hauf, N. Kando, E. Kanoulas,
M. Potthast, B. Stein, H. Wachsmuth, Perspectives on large language models for relevance judgment,
in: M. Yoshioka, J. Kiseleva, M. Aliannejadi (Eds.), Proceedings of the 2023 ACM SIGIR International
Conference on Theory of Information Retrieval, ICTIR 2023, Taipei, Taiwan, 23 July 2023, ACM,
2023, pp. 39–50. URL: https://doi.org/10.1145/3578337.3605136. doi:10.1145/3578337.3605136.
[30] S. Upadhyay, R. Pradeep, N. Thakur, N. Craswell, J. Lin, UMBRELA: umbrela is the
(opensource reproduction of the) bing relevance assessor, CoRR abs/2406.06519 (2024). URL: https:
//doi.org/10.48550/arXiv.2406.06519. doi:10.48550/ARXIV.2406.06519. arXiv:2406.06519.
[31] H. Zhang, R. Zhang, J. Guo, M. de Rijke, Y. Fan, X. Cheng, Are large language models good at utility
judgments?, in: G. H. Yang, H. Wang, S. Han, C. Hauf, G. Zuccon, Y. Zhang (Eds.), Proceedings
of the 47th International ACM SIGIR Conference on Research and Development in Information
Retrieval, SIGIR 2024, Washington DC, USA, July 14-18, 2024, ACM, 2024, pp. 1941–1951. URL:
https://doi.org/10.1145/3626772.3657784. doi:10.1145/3626772.3657784.
[32] Y. Xiao, Y. Jin, Y. Bai, Y. Wu, X. Yang, X. Luo, W. Yu, X. Zhao, Y. Liu, Q. Gu, H. Chen, W. Wang, W. Cheng,
Large language models can be contextual privacy protection learners, in: Y. Al-Onaizan, M. Bansal,
Y. Chen (Eds.), Proceedings of the 2024 Conference on Empirical Methods in Natural Language
Processing, EMNLP 2024, Miami, FL, USA, November 12-16, 2024, Association for Computational
Linguistics, 2024, pp. 14179–14201. URL: https://aclanthology.org/2024.emnlp-main.785.
[33] T. Diethe, O. Feyisetan, B. Balle, T. Drake, Preserving privacy in analyses of textual data (2020).</p>
      <p>URL: https://www.amazon.science/publications/preserving-privacy-in-analyses-of-textual-data.
[34] R. Xin, N. Mireshghallah, S. S. Li, M. Duan, H. Kim, Y. Choi, Y. Tsvetkov, S. Oh, P. W. Koh, A false sense
of privacy: Evaluating textual data sanitization beyond surface-level privacy leakage, in: Neurips
Safe Generative AI Workshop 2024, 2024. URL: https://openreview.net/pdf?id=3JLtuCozOU.
[35] N. Craswell, B. Mitra, E. Yilmaz, D. Campos, E. M. Voorhees, Overview of the TREC 2019 deep learning
track, CoRR abs/2003.07820 (2020). URL: https://arxiv.org/abs/2003.07820. arXiv:2003.07820.
[36] P. Ruch, C. Chichester, G. Cohen, F. Ehrler, P. Fabry, J. Marty, H. Müller, A. Geissbühler, Report on
the TREC 2004 experiment: Genomics track, in: E. M. Voorhees, L. P. Buckland (Eds.), Proceedings
of the Thirteenth Text REtrieval Conference, TREC 2004, Gaithersburg, Maryland, USA, November
16-19, 2004, volume 500-261 of NIST Special Publication, National Institute of Standards and
Technology (NIST), 2004. URL: http://trec.nist.gov/pubs/trec13/papers/uhosp-geneva.geo.pdf.
[37] F. L. De Faveri, G. Faggioli, N. Ferro, pypantera: A python package for natural language obfuscation
enforcing privacy &amp; anonymization, in: E. Serra, F. Spezzano (Eds.), Proceedings of the 33rd ACM
International Conference on Information and Knowledge Management, CIKM 2024, Boise, ID, USA,
October 21-25, 2024, ACM, 2024, pp. 5348–5353. URL: https://doi.org/10.1145/3627673.3679173.
doi:10.1145/3627673.3679173.
[38] DeepSeek-AI, Deepseek-r1: Incentivizing reasoning capability in llms via reinforcement learning,
2025. URL: https://arxiv.org/abs/2501.12948. arXiv:2501.12948.
[39] H. Touvron, T. Lavril, G. Izacard, X. Martinet, M. Lachaux, T. Lacroix, B. Rozière, N. Goyal, E. Hambro,
F. Azhar, A. Rodriguez, A. Joulin, E. Grave, G. Lample, Llama: Open and eficient foundation
language models, CoRR abs/2302.13971 (2023). URL: https://doi.org/10.48550/arXiv.2302.13971.
doi:10.48550/ARXIV.2302.13971. arXiv:2302.13971.
[40] H. M. Culbertson, What is an attitude?, The Journal of Extension 6 (1968) 9.
[41] N. Schwarz, G. Bohner, The construction of attitudes, Blackwell handbook of social psychology:</p>
      <p>Intraindividual processes (2001) 436–457.
[42] N. Reimers, I. Gurevych, Sentence-bert: Sentence embeddings using siamese bert-networks,
in: K. Inui, J. Jiang, V. Ng, X. Wan (Eds.), Proceedings of the 2019 Conference on Empirical
Methods in Natural Language Processing and the 9th International Joint Conference on Natural
Language Processing, EMNLP-IJCNLP 2019, Hong Kong, China, November 3-7, 2019, Association
for Computational Linguistics, 2019, pp. 3980–3990. URL: https://doi.org/10.18653/v1/D19-1410.
doi:10.18653/V1/D19-1410.
[43] S. M. Jayanthi, V. Embar, K. Raghunathan, Evaluating pretrained transformer models for entity
linking in task-oriented dialog, CoRR abs/2112.08327 (2021). URL: https://arxiv.org/abs/2112.08327.
arXiv:2112.08327.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>F.</given-names>
            <surname>L. De Faveri</surname>
          </string-name>
          , G. Faggioli,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ferro</surname>
          </string-name>
          ,
          <article-title>A comparative study of large language models and traditional privacy measures to evaluate query obfuscation approaches</article-title>
          , in: N.
          <string-name>
            <surname>Ferro</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Maistro</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          <string-name>
            <surname>Pasi</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Alonso</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Trotman</surname>
          </string-name>
          , S. Verberne (Eds.),
          <source>Proceedings of the 48th International ACM SIGIR Conference on Research and Development in Information Retrieval</source>
          ,
          <string-name>
            <surname>SIGIR</surname>
          </string-name>
          <year>2025</year>
          , Padua, Italy,
          <source>July 13-18</source>
          ,
          <year>2025</year>
          , ACM,
          <year>2025</year>
          , pp.
          <fpage>2711</fpage>
          -
          <lpage>2716</lpage>
          . URL: https://doi.org/10.1145/3726302.3730158. doi:
          <volume>10</volume>
          .1145/3726302.3730158.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J.</given-names>
            <surname>Cohn</surname>
          </string-name>
          ,
          <article-title>My tivo thinks i'm gay: Algorithmic culture and its discontents</article-title>
          ,
          <source>Television &amp; New Media</source>
          <volume>17</volume>
          (
          <year>2016</year>
          )
          <fpage>675</fpage>
          -
          <lpage>690</lpage>
          . URL: https://doi.org/10.1177/1527476416644978. doi:
          <volume>10</volume>
          .1177/ 1527476416644978. arXiv:https://doi.org/10.1177/1527476416644978.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Aonghusa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. J.</given-names>
            <surname>Leith</surname>
          </string-name>
          ,
          <article-title>Don't let google know i'm lonely</article-title>
          ,
          <source>ACM Trans. Priv. Secur</source>
          .
          <volume>19</volume>
          (
          <year>2016</year>
          ) 3:
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
          :
          <fpage>25</fpage>
          . URL: https://doi.org/10.1145/2937754. doi:
          <volume>10</volume>
          .1145/2937754.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Zimmerman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Thorpe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Fox</surname>
          </string-name>
          , U. Kruschwitz,
          <article-title>Privacy nudging in search: Investigating potential impacts</article-title>
          , in: L.
          <string-name>
            <surname>Azzopardi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Halvey</surname>
            , I. Ruthven,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Joho</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Murdock</surname>
          </string-name>
          , P. Qvarfordt (Eds.),
          <source>Proceedings of the 2019 Conference on Human Information Interaction and Retrieval</source>
          ,
          <string-name>
            <surname>CHIIR</surname>
          </string-name>
          <year>2019</year>
          , Glasgow, Scotland,
          <string-name>
            <surname>UK</surname>
          </string-name>
          , March
          <volume>10</volume>
          -14,
          <year>2019</year>
          , ACM,
          <year>2019</year>
          , pp.
          <fpage>283</fpage>
          -
          <lpage>287</lpage>
          . URL: https://doi.org/10.1145/3295750.3298952. doi:
          <volume>10</volume>
          .1145/3295750.3298952.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>G.</given-names>
            <surname>Chalhoub</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Flechais</surname>
          </string-name>
          ,
          <article-title>"alexa, are you spying on me?": Exploring the efect of user experience on the security and privacy of smart speaker users</article-title>
          , in: A.
          <string-name>
            <surname>Moallem</surname>
          </string-name>
          (Ed.),
          <article-title>HCI for Cybersecurity, Privacy</article-title>
          and Trust - Second International Conference, HCI-CPT
          <year>2020</year>
          ,
          <article-title>Held as Part of the 22nd HCI International Conference</article-title>
          ,
          <string-name>
            <surname>HCII</surname>
          </string-name>
          <year>2020</year>
          , Copenhagen, Denmark,
          <source>July 19-24</source>
          ,
          <year>2020</year>
          , Proceedings, volume
          <volume>12210</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2020</year>
          , pp.
          <fpage>305</fpage>
          -
          <lpage>325</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -50309-3_
          <fpage>21</fpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -50309-3\_
          <fpage>21</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>European</given-names>
            <surname>Parliament</surname>
          </string-name>
          ,
          <article-title>Council of the European Union, Regulation (EU) 2016/679 of the European Parliament and of the Council</article-title>
          , ???? URL: https://data.europa.eu/eli/reg/2016/679/oj.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Klymenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Meisenbacher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Polat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Matthes</surname>
          </string-name>
          ,
          <article-title>A systematic analysis of data protection regulations (</article-title>
          <year>2025</year>
          ). URL: https://hdl.handle.net/10125/109381. doi:
          <volume>10</volume>
          .24251/HICSS.
          <year>2025</year>
          .
          <volume>535</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>C.</given-names>
            <surname>Dwork</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>McSherry</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Nissim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Smith</surname>
          </string-name>
          ,
          <article-title>Calibrating noise to sensitivity in private data analysis</article-title>
          , in: S. Halevi, T. Rabin (Eds.),
          <source>Theory of Cryptography</source>
          , Springer Berlin Heidelberg, Berlin, Heidelberg,
          <year>2006</year>
          , pp.
          <fpage>265</fpage>
          -
          <lpage>284</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>I.</given-names>
            <surname>Wagner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Eckhof</surname>
          </string-name>
          ,
          <article-title>Technical privacy metrics: A systematic survey</article-title>
          ,
          <source>ACM Comput. Surv</source>
          .
          <volume>51</volume>
          (
          <year>2018</year>
          )
          <volume>57</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>57</lpage>
          :
          <fpage>38</fpage>
          . URL: https://doi.org/10.1145/3168389. doi:
          <volume>10</volume>
          .1145/3168389.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sousa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kern</surname>
          </string-name>
          ,
          <article-title>How to keep text private? A systematic review of deep learning methods for privacy-preserving natural language processing</article-title>
          ,
          <source>Artif. Intell. Rev</source>
          .
          <volume>56</volume>
          (
          <year>2023</year>
          )
          <fpage>1427</fpage>
          -
          <lpage>1492</lpage>
          . URL: https://doi.org/10.1007/s10462-022-10204-6. doi:
          <volume>10</volume>
          .1007/S10462-022-10204-6.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Gervais</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Shokri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Singla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Capkun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Lenders</surname>
          </string-name>
          ,
          <article-title>Quantifying web-search privacy</article-title>
          , in: G. Ahn,
          <string-name>
            <given-names>M.</given-names>
            <surname>Yung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Li</surname>
          </string-name>
          (Eds.),
          <source>Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security</source>
          , Scottsdale,
          <string-name>
            <surname>AZ</surname>
          </string-name>
          , USA, November 3-
          <issue>7</issue>
          ,
          <year>2014</year>
          , ACM,
          <year>2014</year>
          , pp.
          <fpage>966</fpage>
          -
          <lpage>977</lpage>
          . URL: https://doi.org/10.1145/2660267.2660367. doi:
          <volume>10</volume>
          .1145/2660267.2660367.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>D.</given-names>
            <surname>Bollegala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Machide</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kawarabayashi</surname>
          </string-name>
          ,
          <article-title>Query obfuscation by semantic decomposition</article-title>
          , in: N.
          <string-name>
            <surname>Calzolari</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Béchet</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Blache</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Choukri</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Cieri</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Declerck</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Goggi</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Isahara</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Maegaard</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Mariani</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Mazo</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Odijk</surname>
          </string-name>
          , S. Piperidis (Eds.),
          <source>Proceedings of the Thirteenth Language Resources and Evaluation Conference</source>
          ,
          <string-name>
            <surname>LREC</surname>
          </string-name>
          <year>2022</year>
          , Marseille, France,
          <fpage>20</fpage>
          -
          <lpage>25</lpage>
          June 2022, European Language Resources Association,
          <year>2022</year>
          , pp.
          <fpage>6200</fpage>
          -
          <lpage>6211</lpage>
          . URL: https://aclanthology.org/
          <year>2022</year>
          .lrec-
          <volume>1</volume>
          .
          <fpage>667</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>G.</given-names>
            <surname>Faggioli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ferro</surname>
          </string-name>
          ,
          <article-title>Query obfuscation for information retrieval through diferential privacy</article-title>
          , in: N.
          <string-name>
            <surname>Goharian</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Tonellotto</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>He</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Lipani</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          <string-name>
            <surname>McDonald</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Macdonald</surname>
          </string-name>
          , I. Ounis (Eds.),
          <source>Advances in Information Retrieval - 46th European Conference on Information Retrieval</source>
          ,
          <string-name>
            <surname>ECIR</surname>
          </string-name>
          <year>2024</year>
          , Glasgow, UK, March
          <volume>24</volume>
          -28,
          <year>2024</year>
          , Proceedings,
          <string-name>
            <surname>Part</surname>
            <given-names>I</given-names>
          </string-name>
          , volume
          <volume>14608</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2024</year>
          , pp.
          <fpage>278</fpage>
          -
          <lpage>294</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>031</fpage>
          -56027-9_
          <fpage>17</fpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -56027-9\_
          <fpage>17</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Aggarwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Feyisetan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Teissier</surname>
          </string-name>
          ,
          <article-title>A diferentially private text perturbation method using regularized mahalanobis metric</article-title>
          ,
          <source>in: Proceedings of the Second Workshop on Privacy in NLP, Association for Computational Linguistics</source>
          ,
          <year>2020</year>
          . doi:
          <volume>10</volume>
          .18653/v1/
          <year>2020</year>
          .privatenlp-
          <volume>1</volume>
          .2.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Aggarwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Feyisetan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Teissier</surname>
          </string-name>
          ,
          <article-title>On a utilitarian approach to privacy preserving text generation</article-title>
          ,
          <source>CoRR abs/2104</source>
          .11838 (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .48550/ARXIV.2104.11838. arXiv:
          <volume>2104</volume>
          .
          <fpage>11838</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>O.</given-names>
            <surname>Feyisetan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Balle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Drake</surname>
          </string-name>
          , T. Diethe,
          <article-title>Privacy- and utility-preserving textual analysis via calibrated multivariate perturbations</article-title>
          , in: J.
          <string-name>
            <surname>Caverlee</surname>
            ,
            <given-names>X. B.</given-names>
          </string-name>
          <string-name>
            <surname>Hu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Lalmas</surname>
          </string-name>
          , W. Wang (Eds.),
          <source>Proceedings of the 13th International Conference on Web Search and Data Mining, ACM</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>178</fpage>
          -
          <lpage>186</lpage>
          . doi:
          <volume>10</volume>
          .1145/3336191.3371856.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>S.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-Y.</given-names>
            <surname>Nie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cui</surname>
          </string-name>
          ,
          <article-title>A customized text sanitization mechanism with diferential privacy</article-title>
          , in: A.
          <string-name>
            <surname>Rogers</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Boyd-Graber</surname>
          </string-name>
          , N. Okazaki (Eds.),
          <source>Findings of the Association for Computational Linguistics: ACL</source>
          <year>2023</year>
          ,
          <article-title>Association for Computational Linguistics</article-title>
          , Toronto, Canada,
          <year>2023</year>
          , pp.
          <fpage>5747</fpage>
          -
          <lpage>5758</lpage>
          . URL: https://aclanthology.org/
          <year>2023</year>
          .findings-acl.
          <volume>355</volume>
          . doi:
          <volume>10</volume>
          .18653/v1/
          <year>2023</year>
          .findings-acl.
          <volume>355</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>R. S.</given-names>
            <surname>Carvalho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Vasiloudis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Feyisetan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>TEM: high utility metric diferential privacy on text</article-title>
          , in: S.
          <string-name>
            <surname>Shekhar</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          <string-name>
            <surname>Zhou</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Chiang</surname>
          </string-name>
          , G. Stiglic (Eds.),
          <source>Proceedings of the 2023 SIAM International Conference on Data Mining, SDM</source>
          <year>2023</year>
          ,
          <article-title>Minneapolis-St</article-title>
          . Paul Twin Cities, MN, USA, April
          <volume>27</volume>
          -
          <issue>29</issue>
          ,
          <year>2023</year>
          , SIAM,
          <year>2023</year>
          , pp.
          <fpage>883</fpage>
          -
          <lpage>890</lpage>
          . URL: https://doi.org/10.1137/1.9781611977653.ch99.
          <source>doi:10.1137/1</source>
          .9781611977653.CH99.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>D.</given-names>
            <surname>Bollegala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Otake</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Machide</surname>
          </string-name>
          , K.
          <article-title>-i. Kawarabayashi, A metric diferential privacy mechanism for sentence embeddings</article-title>
          ,
          <source>ACM Trans. Priv</source>
          . Secur. (
          <year>2024</year>
          ). URL: https://doi.org/10.1145/3708321. doi:
          <volume>10</volume>
          .1145/3708321, just Accepted.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>X.</given-names>
            <surname>Yue</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Du</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. S. M.</given-names>
            <surname>Chow</surname>
          </string-name>
          ,
          <article-title>Diferential privacy for text analytics via natural text sanitization</article-title>
          , in: C.
          <string-name>
            <surname>Zong</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Xia</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Navigli</surname>
          </string-name>
          (Eds.),
          <article-title>Findings of the Association for Computational Linguistics: ACL-IJCNLP 2021</article-title>
          ,
          <article-title>Association for Computational Linguistics</article-title>
          , Online,
          <year>2021</year>
          , pp.
          <fpage>3853</fpage>
          -
          <lpage>3866</lpage>
          . URL: https://aclanthology.org/
          <year>2021</year>
          .findings-acl.
          <volume>337</volume>
          . doi:
          <volume>10</volume>
          .18653/v1/
          <year>2021</year>
          .findings-acl.
          <volume>337</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>F. L. De Faveri</surname>
            , G. Faggioli,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Ferro</surname>
          </string-name>
          ,
          <article-title>Measuring actual privacy of obfuscated queries in information retrieval</article-title>
          ,
          <source>in: Advances in Information Retrieval: 47th European Conference on Information Retrieval</source>
          ,
          <string-name>
            <surname>ECIR</surname>
          </string-name>
          <year>2025</year>
          , Lucca, Italy, April 6-
          <issue>10</issue>
          ,
          <year>2025</year>
          , Proceedings,
          <string-name>
            <surname>Part</surname>
            <given-names>I</given-names>
          </string-name>
          , SpringerVerlag, Berlin, Heidelberg,
          <year>2025</year>
          , p.
          <fpage>49</fpage>
          -
          <lpage>66</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>031</fpage>
          -88708-
          <issue>6</issue>
          _4. doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -88708-
          <issue>6</issue>
          _
          <fpage>4</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>K.</given-names>
            <surname>Papineni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Roukos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Ward</surname>
          </string-name>
          , W. Zhu,
          <article-title>Bleu: a method for automatic evaluation of machine translation</article-title>
          ,
          <source>in: Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics, July</source>
          <volume>6</volume>
          -
          <issue>12</issue>
          ,
          <year>2002</year>
          , Philadelphia, PA, USA, ACL,
          <year>2002</year>
          , pp.
          <fpage>311</fpage>
          -
          <lpage>318</lpage>
          . URL: https://aclanthology.org/P02-1040/. doi:
          <volume>10</volume>
          .3115/1073083.1073135.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>C.-Y. Lin</surname>
            ,
            <given-names>ROUGE:</given-names>
          </string-name>
          <article-title>A package for automatic evaluation of summaries, in: Text Summarization Branches Out, Association for Computational Linguistics</article-title>
          , Barcelona, Spain,
          <year>2004</year>
          , pp.
          <fpage>74</fpage>
          -
          <lpage>81</lpage>
          . URL: https://aclanthology.org/W04-1013/.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>A.</given-names>
            <surname>Vaswani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Shazeer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Parmar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Uszkoreit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Jones</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. N.</given-names>
            <surname>Gomez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kaiser</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Polosukhin</surname>
          </string-name>
          ,
          <article-title>Attention is all you need</article-title>
          , in: I. Guyon, U. von Luxburg, S. Bengio,
          <string-name>
            <given-names>H. M.</given-names>
            <surname>Wallach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Fergus</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. V. N.</given-names>
            <surname>Vishwanathan</surname>
          </string-name>
          , R. Garnett (Eds.),
          <source>Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4-9</source>
          ,
          <year>2017</year>
          , Long Beach, CA, USA,
          <year>2017</year>
          , pp.
          <fpage>5998</fpage>
          -
          <lpage>6008</lpage>
          . URL: https: //proceedings.neurips.cc/paper/2017/hash/3f5ee243547dee91fbd053c1c4a845aa-Abstract.html.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>T.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kishore</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. Q.</given-names>
            <surname>Weinberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Artzi</surname>
          </string-name>
          , Bertscore: Evaluating text
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>