{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:45:18Z","timestamp":1742967918906,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030389604"},{"type":"electronic","value":"9783030389611"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-38961-1_37","type":"book-chapter","created":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T01:34:32Z","timestamp":1579656872000},"page":"418-426","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Generative Adversarial Nets Enhanced Continual Data Release Using Differential Privacy"],"prefix":"10.1007","author":[{"given":"Stella","family":"Ho","sequence":"first","affiliation":[]},{"given":"Youyang","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Longxing","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Jianxin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,22]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Audebert, N., Le Saux, B., Lefevre, S.: Generative adversarial networks for realistic synthesis of hyperspectral samples. In: IGARSS 2018\u20132018 IEEE International Geoscience and Remote Sensing Symposium, pp. 4359\u20134362 (2018)","DOI":"10.1109\/IGARSS.2018.8518321"},{"key":"37_CR2","first-page":"1281","volume":"9","author":"Y Cao","year":"2018","unstructured":"Cao, Y., Yoshikawa, M., Xiao, Y., Xiong, L.: Quantifying differential privacy in continuous data release under temporal correlations. IEEE Trans. Knowl. Data Eng. 9, 1281\u20131295 (2018)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"37_CR3","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/2043621.2043626","volume":"14","author":"THH Chan","year":"2011","unstructured":"Chan, T.H.H., Shi, E., Song, D.: Private and continual release of statistics. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(3), 26 (2011)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"37_CR4","unstructured":"Dheeru, D., Karra Taniskidou, E.: UCI machine learning repository (2017). http:\/\/archive.ics.uci.edu\/ml"},{"key":"37_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Dwork, C., Naor, M., Pitassi, T., Rothblum, G.N.: Differential privacy under continual observation. In: Proceedings of the Forty-Second ACM Symposium on Theory of Computing, pp. 715\u2013724. ACM (2010)","DOI":"10.1145\/1806689.1806787"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends\u00ae Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","DOI":"10.1561\/0400000042"},{"key":"37_CR8","unstructured":"Goodfellow, I.J., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, 8\u201313 December 2014, Montreal, Quebec, Canada, pp. 2672\u20132680 (2014)"},{"key":"37_CR9","unstructured":"Inan, A., Gursoy, M.E., Saygin, Y.: Sensitivity analysis for non-interactive differential privacy: bounds and efficient algorithms. IEEE Trans. Dependable Secur. Comput. (2018)"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Kawai, Y., Seo, M., Chen, Y.: Automatic generation of facial expression using generative adversarial nets. In: 2018 IEEE 7th Global Conference on Consumer Electronics (GCCE), pp. 278\u2013280 (2018)","DOI":"10.1109\/GCCE.2018.8574866"},{"key":"37_CR11","unstructured":"Li, C., Xu, T., Zhu, J., Zhang, B.: Triple generative adversarial nets. In: Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 4\u20139 December 2017, Long Beach, CA, USA, pp. 4091\u20134101 (2017)"},{"key":"37_CR12","unstructured":"Ou, L., Qin, Z., Liao, S., Hong, Y., Jia, X.: Releasing correlated trajectories: towards high utility and optimal differential privacy. IEEE Trans. Dependable Secur. Comput. (2018)"},{"issue":"3","key":"37_CR13","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1109\/TCSS.2018.2861775","volume":"5","author":"Y Qu","year":"2018","unstructured":"Qu, Y., Yu, S., Gao, L., Zhou, W., Peng, S.: A hybrid privacy protection scheme in cyber-physical social networks. IEEE Trans. Comput. Soc. Syst. 5(3), 773\u2013784 (2018)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"Qu, Y., Yu, S., Zhang, J., Binh, H.T.T., Gao, L., Zhou, W.: GAN-DP: generative adversarial net driven differentially privacy-preserving big data publishing. In: ICC 2019\u20132019 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/ICC.2019.8761070"},{"issue":"6","key":"37_CR15","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MWC.2017.1800112","volume":"25","author":"Y Qu","year":"2018","unstructured":"Qu, Y., Yu, S., Zhou, W., Peng, S., Wang, G., Xiao, K.: Privacy of things: emerging challenges and opportunities in wireless Internet of Things. IEEE Wireless Commun. 25(6), 91\u201397 (2018)","journal-title":"IEEE Wireless Commun."},{"key":"37_CR16","unstructured":"Radford, A., Metz, L., Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434 (2015)"},{"key":"37_CR17","unstructured":"Salimans, T., Goodfellow, I., Zaremba, W., Cheung, V., Radford, A., Chen, X.: Improved techniques for training GANs. In: Advances in Neural Information Processing Systems, pp. 2234\u20132242 (2016)"},{"issue":"6","key":"37_CR18","doi-asserted-by":"publisher","first-page":"1418","DOI":"10.1109\/TIFS.2017.2663337","volume":"12","author":"J Soria-Comas","year":"2017","unstructured":"Soria-Comas, J., Domingo-Ferrer, J., S\u00e1nchez, D., Meg\u00edas, D.: Individual differential privacy: a utility-preserving formulation of differential privacy guarantees. IEEE Trans. Inf. Forensics Secur. 12(6), 1418\u20131429 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"37_CR19","unstructured":"Springenberg, J.T.: Unsupervised and semi-supervised learning with categorical generative adversarial networks. arXiv preprint arXiv:1511.06390 (2015)"},{"issue":"9","key":"37_CR20","doi-asserted-by":"publisher","first-page":"2358","DOI":"10.1109\/TIFS.2019.2897874","volume":"14","author":"C Xu","year":"2019","unstructured":"Xu, C., Ren, J., Zhang, D., Zhang, Y., Qin, Z., Ren, K.: GANobfuscator: mitigating information leakage under GAN via differential privacy. IEEE Trans. Inf. Forensics Secur. 14(9), 2358\u20132371 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"37_CR21","doi-asserted-by":"publisher","first-page":"3081","DOI":"10.1109\/TIFS.2017.2737966","volume":"12","author":"C Xu","year":"2017","unstructured":"Xu, C., Ren, J., Zhang, Y., Qin, Z., Ren, K.: DPPro: differentially private high-dimensional data release via random projection. IEEE Trans. Inf. Forensics Secur. 12(12), 3081\u20133093 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-38961-1_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T08:10:01Z","timestamp":1657872601000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-38961-1_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030389604","9783030389611"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-38961-1_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ica3pp2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"251","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"73","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}