{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T13:01:27Z","timestamp":1765976487393,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030782696"},{"type":"electronic","value":"9783030782702"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-78270-2_11","type":"book-chapter","created":{"date-parts":[[2021,6,11]],"date-time":"2021-06-11T17:03:12Z","timestamp":1623430992000},"page":"66-70","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Protecting Student Privacy with\u00a0Synthetic Data from Generative Adversarial Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4809-8951","authenticated-orcid":false,"given":"Peter","family":"Bautista","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8192-3485","authenticated-orcid":false,"given":"Paul Salvador","family":"Inventado","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,12]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-1-4614-3305-7_4","volume-title":"Learning Analytics","author":"RS Baker","year":"2014","unstructured":"Baker, R.S., Inventado, P.S.: Educational data mining and learning analytics. In: Larusson, J.A., White, B. (eds.) Learning Analytics, pp. 61\u201375. Springer, New York (2014). https:\/\/doi.org\/10.1007\/978-1-4614-3305-7_4"},{"issue":"3","key":"11_CR2","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1093\/jamia\/ocy142","volume":"26","author":"MK Baowaly","year":"2019","unstructured":"Baowaly, M.K., Lin, C.C., Liu, C.L., Chen, K.T.: Synthesizing electronic health records using improved generative adversarial networks. J. Am. Med. Inform. Assoc. 26(3), 228\u2013241 (2019)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Behjati, R., Arisholm, E., Bedregal, M., Tan, C.: Synthetic test data generation using recurrent neural networks: a position paper. In: 2019 IEEE\/ACM 7th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering (RAISE), pp. 22\u201327 (2019)","DOI":"10.1109\/RAISE.2019.00012"},{"key":"11_CR4","unstructured":"Choi, E., Biswal, S., Malin, B., Duke, J., Stewart, W.F., Sun, J.: Generating multi-label discrete patient records using generative adversarial networks (2018)"},{"key":"11_CR5","unstructured":"Goodfellow, I.J., et al.: Generative adversarial networks (2014)"},{"issue":"1","key":"11_CR6","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/TLT.2016.2607747","volume":"10","author":"ME Gursoy","year":"2016","unstructured":"Gursoy, M.E., Inan, A., Nergiz, M.E., Saygin, Y.: Privacy-preserving learning analytics: challenges and techniques. IEEE Trans. Learn. Technol. 10(1), 68\u201381 (2016)","journal-title":"IEEE Trans. Learn. Technol."},{"issue":"4","key":"11_CR7","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/s10708-014-9601-7","volume":"80","author":"R Kitchin","year":"2014","unstructured":"Kitchin, R., Lauriault, T.P.: Small data in the era of big data. GeoJournal 80(4), 463\u2013475 (2014). https:\/\/doi.org\/10.1007\/s10708-014-9601-7","journal-title":"GeoJournal"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Kyritsi, K.H., Zorkadis, V., Stavropoulos, E.C., Verykios, V.S.: The pursuit of patterns in educational data mining as a threat to student privacy. J. Interact. Media Educ. 2019(1) (2019)","DOI":"10.5334\/jime.502"},{"key":"11_CR9","doi-asserted-by":"publisher","unstructured":"Lan, J., Guo, Q., Sun, H.: Demand side data generating based on conditional generative adversarial networks. Energy Procedia 152, 1188\u20131193 (2018). https:\/\/doi.org\/10.1016\/j.egypro.2018.09.157. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S187661021830701X. Cleaner Energy for Cleaner Cities","DOI":"10.1016\/j.egypro.2018.09.157"},{"key":"11_CR10","doi-asserted-by":"publisher","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy. SP 2008, pp. 111\u2013125. IEEE Computer Society, USA (2008). https:\/\/doi.org\/10.1109\/SP.2008.33","DOI":"10.1109\/SP.2008.33"},{"issue":"3","key":"11_CR11","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1111\/bjet.12152","volume":"45","author":"A Pardo","year":"2014","unstructured":"Pardo, A., Siemens, G.: Ethical and privacy principles for learning analytics. Br. J. Edu. Technol. 45(3), 438\u2013450 (2014)","journal-title":"Br. J. Edu. Technol."},{"issue":"1","key":"11_CR12","first-page":"43","volume":"3","author":"MJ Rodr\u00edguez-Triana","year":"2016","unstructured":"Rodr\u00edguez-Triana, M.J., Mart\u00ednez-Mon\u00e9s, A., Villagr\u00e1-Sobrino, S.: Learning analytics in small-scale teacher-led innovations: ethical and data privacy issues. J. Learn. Anal. 3(1), 43\u201365 (2016)","journal-title":"J. Learn. Anal."},{"key":"11_CR13","unstructured":"Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression (1998)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Swenson, J.: Establishing an ethical literacy for learning analytics. In: Proceedings of the Fourth International Conference on Learning Analytics and Knowledge, pp. 246\u2013250 (2014)","DOI":"10.1145\/2567574.2567613"},{"issue":"5","key":"11_CR15","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1007\/s11423-016-9463-4","volume":"64","author":"JE Willis","year":"2016","unstructured":"Willis, J.E., Slade, S., Prinsloo, P.: Ethical oversight of student data in learning analytics: a typology derived from a cross-continental, cross-institutional perspective. Educ. Tech. Res. Dev. 64(5), 881\u2013901 (2016). https:\/\/doi.org\/10.1007\/s11423-016-9463-4","journal-title":"Educ. Tech. Res. Dev."},{"key":"11_CR16","first-page":"339","volume":"8","author":"E Zeide","year":"2015","unstructured":"Zeide, E.: Student privacy principles for the age of big data: moving beyond FERPA and FIPPS. Drexel L. Rev. 8, 339 (2015)","journal-title":"Drexel L. Rev."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence in Education"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-78270-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,11]],"date-time":"2021-06-11T17:04:45Z","timestamp":1623431085000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-78270-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030782696","9783030782702"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-78270-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"12 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIED","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence in Education","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Utrecht","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aied2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aied2021.science.uu.nl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"209","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"76","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}