{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T22:11:05Z","timestamp":1744150265267,"version":"3.40.3"},"publisher-location":"Cham","reference-count":87,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030987947"},{"type":"electronic","value":"9783030987954"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-98795-4_7","type":"book-chapter","created":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T18:03:58Z","timestamp":1649354638000},"page":"130-155","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Machine Learning Meets Data Modification"],"prefix":"10.1007","author":[{"given":"Giuseppe","family":"Garofalo","sequence":"first","affiliation":[]},{"given":"Manel","family":"Slokom","sequence":"additional","affiliation":[]},{"given":"Davy","family":"Preuveneers","sequence":"additional","affiliation":[]},{"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[]},{"given":"Martha","family":"Larson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,8]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"This thing called fairness: disciplinary confusion realizing a value in technology. Proc. ACM Hum.-Comput. Interact. 3(CSCW), 1\u201336 (2019)","DOI":"10.1145\/3359221"},{"key":"7_CR2","unstructured":"Amazon Rekognition: Automate your image and video analysis with machine learning. (2020). https:\/\/aws.amazon.com\/rekognition\/. Accessed 07 Feb 2021"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308\u2013318 (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/978-3-030-10925-7_31","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"NC Abay","year":"2019","unstructured":"Abay, N.C., Zhou, Y., Kantarcioglu, M., Thuraisingham, B., Sweeney, L.: Privacy preserving synthetic data release using deep learning. In: Berlingerio, M., Bonchi, F., G\u00e4rtner, T., Hurley, N., Ifrim, G. (eds.) ECML PKDD 2018. LNCS (LNAI), vol. 11051, pp. 510\u2013526. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-10925-7_31"},{"issue":"6","key":"7_CR5","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1109\/TKDE.2018.2855136","volume":"31","author":"G Acs","year":"2018","unstructured":"Acs, G., Melis, L., Castelluccia, C., De Cristofaro, E.: Differentially private mixture of generative neural networks. IEEE Trans. Knowl. Data Eng. 31(6), 1109\u20131121 (2018)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7_CR6","series-title":"Advances in Database Systems","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-0-387-70992-5_6","volume-title":"Privacy-Preserving Data Mining","author":"CC Aggarwal","year":"2008","unstructured":"Aggarwal, C.C., Philip, S.Y.: A survey of randomization methods for privacy-preserving data mining. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining. Advances in Database Systems, vol. 34, pp. 137\u2013156. Springer, Boston (2008). https:\/\/doi.org\/10.1007\/978-0-387-70992-5_6"},{"issue":"12","key":"7_CR7","doi-asserted-by":"publisher","first-page":"2648","DOI":"10.1109\/TIFS.2016.2594132","volume":"11","author":"M Al-Rubaie","year":"2016","unstructured":"Al-Rubaie, M., Chang, J.M.: Reconstruction attacks against mobile-based continuous authentication systems in the cloud. IEEE Trans. Inf. Forensics Secur. 11(12), 2648\u20132663 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"7_CR8","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSEC.2018.2888775","volume":"17","author":"M Al-Rubaie","year":"2019","unstructured":"Al-Rubaie, M., Chang, J.M.: Privacy-preserving machine learning: threats and solutions. IEEE Secur. Priv. 17(2), 49\u201358 (2019)","journal-title":"IEEE Secur. Priv."},{"issue":"7","key":"7_CR9","doi-asserted-by":"publisher","first-page":"5827","DOI":"10.1109\/JIOT.2019.2952146","volume":"7","author":"PCM Arachchige","year":"2019","unstructured":"Arachchige, P.C.M., Bertok, P., Khalil, I., Liu, D., Camtepe, S., Atiquzzaman, M.: Local differential privacy for deep learning. IEEE Internet Things J. 7(7), 5827\u20135842 (2019)","journal-title":"IEEE Internet Things J."},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Backes, M., Berrang, P., Humbert, M., Manoharan, P.: Membership privacy in microRNA-based studies. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 319\u2013330 (2016)","DOI":"10.1145\/2976749.2978355"},{"key":"7_CR11","unstructured":"Bellamy, R.K., et al.: AI fairness 360: an extensible toolkit for detecting, understanding, and mitigating unwanted algorithmic bias. arXiv preprint arXiv:1810.01943 (2018)"},{"key":"7_CR12","unstructured":"Bennett, J., Lanning, S., et al.: The Netflix prize. In: Proceedings of the Annual Knowledge Discovery and Data Mining Cup and Workshop, p. 35 (2007)"},{"issue":"5","key":"7_CR13","first-page":"481","volume":"10","author":"V Bindschaedler","year":"2017","unstructured":"Bindschaedler, V., Shokri, R., Gunter, C.A.: Plausible deniability for privacy-preserving data synthesis. Proc. Very Large Data Base Endow. 10(5), 481\u2013492 (2017)","journal-title":"Proc. Very Large Data Base Endow."},{"key":"7_CR14","unstructured":"Calmon, F.P., Wei, D., Vinzamuri, B., Ramamurthy, K.N., Varshney, K.R.: Optimized pre-processing for discrimination prevention. In: Proceedings of the 31st International Conference on Neural Information Processing Systems, pp. 3995\u20134004. Curran Associates Inc. (2017)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: The IEEE International Conference on Computer Science and Electronics Engineering, vol. 1, pp. 647\u2013651 (2012)","DOI":"10.1109\/ICCSEE.2012.193"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Chhabra, S., Singh, R., Vatsa, M., Gupta, G.: Anonymizing k-facial attributes via adversarial perturbations. In: Proceedings of the 27th International Joint Conference on Artificial Intelligence, pp. 656\u2013662 (2018)","DOI":"10.24963\/ijcai.2018\/91"},{"key":"7_CR17","first-page":"286","volume":"68","author":"E Choi","year":"2017","unstructured":"Choi, E., Biswal, S., Malin, B., Duke, J., Stewart, W.F., Sun, J.: Generating multi-label discrete patient records using generative adversarial networks. Proc. Mach. Learn. Res. 68, 286\u2013305 (2017)","journal-title":"Proc. Mach. Learn. Res."},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/3-540-47804-3_9","volume-title":"Inference Control in Statistical Databases","author":"RA Dandekar","year":"2002","unstructured":"Dandekar, R.A., Cohen, M., Kirkendall, N.: Sensitive micro data protection using latin hypercube sampling technique. In: Domingo-Ferrer, J. (ed.) Inference Control in Statistical Databases. LNCS, vol. 2316, pp. 117\u2013125. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-47804-3_9"},{"key":"7_CR19","unstructured":"De Cristofaro, E.: An overview of privacy in machine learning. arXiv preprint arXiv:2005.08679 (2020)"},{"issue":"2","key":"7_CR20","first-page":"288","volume":"2020","author":"D Desfontaines","year":"2020","unstructured":"Desfontaines, D., Pej\u00f3, B.: SoK: differential privacies. Proc. Priv. Enhanc. Technol. 2020(2), 288\u2013313 (2020)","journal-title":"Proc. Priv. Enhanc. Technol."},{"key":"7_CR21","series-title":"Advances in Database Systems","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-0-387-70992-5_3","volume-title":"Privacy-Preserving Data Mining","author":"J Domingo-Ferrer","year":"2008","unstructured":"Domingo-Ferrer, J.: A survey of inference control methods for privacy-preserving data mining. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining. Advances in Database Systems, vol. 34, pp. 53\u201380. Springer, Boston (2008). https:\/\/doi.org\/10.1007\/978-0-387-70992-5_3"},{"key":"7_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0326-5","volume-title":"Synthetic Datasets for Statistical Disclosure Control: Theory and Implementation","author":"J Drechsler","year":"2011","unstructured":"Drechsler, J.: Synthetic Datasets for Statistical Disclosure Control: Theory and Implementation, vol. 201. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-1-4614-0326-5"},{"issue":"3","key":"7_CR23","first-page":"105","volume":"1","author":"J Drechsler","year":"2008","unstructured":"Drechsler, J., Bender, S., R\u00e4ssler, S.: Comparing fully and partially synthetic datasets for statistical disclosure control in the German IAB establishment panel. Trans. Data Priv. 1(3), 105\u2013130 (2008)","journal-title":"Trans. Data Priv."},{"issue":"12","key":"7_CR24","doi-asserted-by":"publisher","first-page":"3232","DOI":"10.1016\/j.csda.2011.06.006","volume":"55","author":"J Drechsler","year":"2011","unstructured":"Drechsler, J., Reiter, J.P.: An empirical evaluation of easily implemented, nonparametric methods for generating synthetic datasets. Comput. Stat. Data Anal. 55(12), 3232\u20133243 (2011)","journal-title":"Comput. Stat. Data Anal."},{"issue":"3\u20134","key":"7_CR25","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends\u00ae Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends\u00ae Theor. Comput. Sci."},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Dwork, C., Smith, A., Steinke, T., Ullman, J., Vadhan, S.: Robust traceability from trace amounts. In: 2015 IEEE 56th Annual Symposium on Foundations of Computer Science, pp. 650\u2013669 (2015)","DOI":"10.1109\/FOCS.2015.46"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1322\u20131333 (2015)","DOI":"10.1145\/2810103.2813677"},{"issue":"4","key":"7_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1749603.1749605","volume":"42","author":"BCM Fung","year":"2010","unstructured":"Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 1\u201353 (2010)","journal-title":"ACM Comput. Surv."},{"key":"7_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-030-18419-3_2","volume-title":"Foundations and Practice of Security","author":"S Gambs","year":"2019","unstructured":"Gambs, S.: Privacy and ethical challenges in big data. In: Zincir-Heywood, N., Bonfante, G., Debbabi, M., Garcia-Alfaro, J. (eds.) FPS 2018. LNCS, vol. 11358, pp. 17\u201326. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-18419-3_2"},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Garofalo, G., Van hamme, T., Preuveneers, D., Joosen, W.: A siamese adversarial anonymizer for data minimization in biometric applications. In: IEEE European Symposium on Security and Privacy Workshops, pp. 334\u2013343 (2020)","DOI":"10.1109\/EuroSPW51379.2020.00052"},{"key":"7_CR31","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-030-42504-3_14","volume-title":"Privacy and Identity Management. Data for Better Living: AI and Privacy","author":"G Garofalo","year":"2020","unstructured":"Garofalo, G., Preuveneers, D., Joosen, W.: Data privatizer for biometric applications and online identity management. In: Friedewald, M., \u00d6nen, M., Lievens, E., Krenn, S., Fricker, S. (eds.) Privacy and Identity 2019. IAICT, vol. 576, pp. 209\u2013225. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-42504-3_14"},{"key":"7_CR32","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1214\/088342305000000043","volume":"20","author":"S Gomatam","year":"2005","unstructured":"Gomatam, S., Karr, A.F., Reiter, J.P., Sanil, A.P.: Data dissemination and disclosure limitation in a world without microdata: a risk-utility framework for remote access analysis servers. Stat. Sci. 20, 163\u2013177 (2005)","journal-title":"Stat. Sci."},{"key":"7_CR33","unstructured":"Goodfellow, I., et al.: Generative adversarial Nets. In: Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N.D., Weinberger, K.Q. (eds.) Advances in Neural Information Processing Systems, vol. 27, pp. 2672\u20132680. Curran Associates, Inc. (2014)"},{"key":"7_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/11767831_15","volume-title":"Privacy Enhancing Technologies","author":"R Gross","year":"2006","unstructured":"Gross, R., Airoldi, E., Malin, B., Sweeney, L.: Integrating utility into face de-identification. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 227\u2013242. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11767831_15"},{"key":"7_CR35","unstructured":"Gross, R., Sweeney, L., De la Torre, F., Baker, S.: Model-based face de-identification. In: International Computer Vision and Pattern Recognition Workshop, p. 161 (2006)"},{"key":"7_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11023-020-09516-9","volume":"30","author":"T Hagendorff","year":"2020","unstructured":"Hagendorff, T.: The ethics of AI ethics: an evaluation of guidelines. Minds Mach. 30, 1\u201322 (2020)","journal-title":"Minds Mach."},{"issue":"2","key":"7_CR37","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s40708-016-0042-6","volume":"3","author":"A Holzinger","year":"2016","unstructured":"Holzinger, A.: Interactive machine learning for health informatics: when do we need the human-in-the-loop? Brain Inform. 3(2), 119\u2013131 (2016). https:\/\/doi.org\/10.1007\/s40708-016-0042-6","journal-title":"Brain Inform."},{"issue":"12","key":"7_CR38","doi-asserted-by":"publisher","first-page":"656","DOI":"10.3390\/e19120656","volume":"19","author":"C Huang","year":"2017","unstructured":"Huang, C., Kairouz, P., Chen, X., Sankar, L., Rajagopal, R.: Context-aware generative adversarial privacy. Entropy 19(12), 656 (2017)","journal-title":"Entropy"},{"key":"7_CR39","unstructured":"Huang, H., Ma, X., Erfani, S.M., Bailey, J., Wang, Y.: Unlearnable examples: making personal data unexploitable. In: International Conference on Learning Representations (2021)"},{"key":"7_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/978-3-030-33720-9_44","volume-title":"Advances in Visual Computing","author":"H Hukkel\u00e5s","year":"2019","unstructured":"Hukkel\u00e5s, H., Mester, R., Lindseth, F.: DeepPrivacy: a generative adversarial network for face anonymization. In: Bebis, G., et al. (eds.) ISVC 2019. LNCS, vol. 11844, pp. 565\u2013578. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-33720-9_44"},{"key":"7_CR41","doi-asserted-by":"publisher","DOI":"10.1002\/9781118348239","volume-title":"Statistical Disclosure Control","author":"A Hundepool","year":"2012","unstructured":"Hundepool, A., et al.: Statistical Disclosure Control. Wiley, Hoboken (2012)"},{"key":"7_CR42","doi-asserted-by":"crossref","unstructured":"Jiang, L., Tan, R., Lou, X., Lin, G.: On lightweight privacy-preserving collaborative learning for internet-of-things objects. In: Proceedings of the International Conference on Internet of Things Design and Implementation, pp. 70\u201381 (2019)","DOI":"10.1145\/3302505.3310070"},{"issue":"1","key":"7_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10115-011-0463-8","volume":"33","author":"F Kamiran","year":"2012","unstructured":"Kamiran, F., Calders, T.: Data preprocessing techniques for classification without discrimination. Knowl. Inf. Syst. 33(1), 1\u201333 (2012)","journal-title":"Knowl. Inf. Syst."},{"key":"7_CR44","unstructured":"Kop, M.: Machine learning & EU data sharing practices. Stanford-Vienna Transatlantic Technology Law Forum, Transatlantic Antitrust (2020)"},{"key":"7_CR45","unstructured":"Larson, M., Liu, Z., Brugman, S., Zhao, Z.: Pixel privacy. Increasing image appeal while blocking automatic inference of sensitive scene information. In: Working Notes Proceedings of the MediaEval Workshop (2018)"},{"key":"7_CR46","doi-asserted-by":"crossref","unstructured":"Li, S.C., Tai, B.C., Huang, Y.: Evaluating variational autoencoder as a private data release mechanism for tabular data. In: 24th IEEE Pacific Rim International Symposium on Dependable Computing, pp. 198\u20131988 (2019)","DOI":"10.1109\/PRDC47002.2019.00050"},{"key":"7_CR47","doi-asserted-by":"crossref","unstructured":"Li, T., Lin, L.: AnonymousNet: natural face de-identification with measurable privacy. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops (2019)","DOI":"10.1109\/CVPRW.2019.00013"},{"issue":"3","key":"7_CR48","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1145\/3979.4017","volume":"10","author":"CK Liew","year":"1985","unstructured":"Liew, C.K., Choi, U.J., Liew, C.J.: A data distortion by probability distribution. ACM Trans. Database Syst. 10(3), 395\u2013411 (1985)","journal-title":"ACM Trans. Database Syst."},{"key":"7_CR49","unstructured":"Liu, C., Chakraborty, S., Mittal, P.: DEEProtect: enabling inference-based access control on mobile sensing applications. arXiv preprint arXiv:1702.06159 (2017)"},{"key":"7_CR50","doi-asserted-by":"crossref","unstructured":"Lu, P.H., Wang, P.C., Yu, C.M.: Empirical evaluation on synthetic data generation with generative adversarial network. In: Proceedings of the 9th International Conference on Web Intelligence, Mining and Semantics, pp. 1\u20136 (2019)","DOI":"10.1145\/3326467.3326474"},{"key":"7_CR51","doi-asserted-by":"crossref","unstructured":"Malekzadeh, M., Clegg, R.G., Cavallaro, A., Haddadi, H.: Mobile sensor data anonymization. In: ACM Proceedings of the International Conference on Internet of Things Design and Implementation, pp. 49\u201358 (2019)","DOI":"10.1145\/3302505.3310068"},{"key":"7_CR52","unstructured":"McNamee, R., Parakilas, S.: The Facebook breach makes it clear: data must be regulated. The Guardian (2018). https:\/\/www.theguardian.com\/commentisfree\/2018\/mar\/19\/facebook-data-cambridge-analytica-privacy-breach. Accessed 07 Feb 2021"},{"issue":"1","key":"7_CR53","doi-asserted-by":"publisher","first-page":"60","DOI":"10.3390\/e20010060","volume":"20","author":"B Meden","year":"2018","unstructured":"Meden, B., Emer\u0161i\u010d, \u017d, \u0160truc, V., Peer, P.: K-same-net: K-anonymity with generative deep neural networks for face deidentification. Entropy 20(1), 60 (2018)","journal-title":"Entropy"},{"key":"7_CR54","unstructured":"Mehrabi, N., Morstatter, F., Saxena, N., Lerman, K., Galstyan, A.: A survey on bias and fairness in machine learning. arXiv preprint arXiv:1908.09635 (2019)"},{"issue":"6","key":"7_CR55","doi-asserted-by":"publisher","first-page":"1236","DOI":"10.1093\/bib\/bbx044","volume":"19","author":"R Miotto","year":"2018","unstructured":"Miotto, R., Wang, F., Wang, S., Jiang, X., Dudley, J.T.: Deep learning for healthcare: review, opportunities and challenges. Brief. Bioinform. 19(6), 1236\u20131246 (2018)","journal-title":"Brief. Bioinform."},{"key":"7_CR56","doi-asserted-by":"crossref","unstructured":"Mirjalili, V., Raschka, S., Ross, A.: Gender privacy: an ensemble of semi adversarial networks for confounding arbitrary gender classifiers. In: the 9th IEEE International Conference on Biometrics Theory, Applications and Systems, pp. 1\u201310 (2018)","DOI":"10.1109\/BTAS.2018.8698605"},{"key":"7_CR57","doi-asserted-by":"publisher","first-page":"9400","DOI":"10.1109\/TIP.2020.3024026","volume":"29","author":"V Mirjalili","year":"2020","unstructured":"Mirjalili, V., Raschka, S., Ross, A.: PrivacyNet: semi-adversarial networks for multi-attribute face privacy. IEEE Trans. Image Process. 29, 9400\u20139412 (2020)","journal-title":"IEEE Trans. Image Process."},{"key":"7_CR58","doi-asserted-by":"crossref","unstructured":"Mirjalili, V., Raschka, S., Namboodiri, A., Ross, A.: Semi-adversarial networks: convolutional autoencoders for imparting privacy to face images. In: International Conference on Biometrics, pp. 82\u201389. IEEE (2018)","DOI":"10.1109\/ICB2018.2018.00023"},{"issue":"5","key":"7_CR59","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1287\/mnsc.1050.0503","volume":"52","author":"K Muralidhar","year":"2006","unstructured":"Muralidhar, K., Sarathy, R.: Data shuffling: a new masking approach for numerical data. Manage. Sci. 52(5), 658\u2013670 (2006)","journal-title":"Manage. Sci."},{"key":"7_CR60","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: IEEE Symposium on Security and Privacy, pp. 111\u2013125 (2008)","DOI":"10.1109\/SP.2008.33"},{"issue":"2","key":"7_CR61","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/TKDE.2005.32","volume":"17","author":"EM Newton","year":"2005","unstructured":"Newton, E.M., Sweeney, L., Malin, B.: Preserving privacy by de-identifying face images. IEEE Trans. Knowl. Data Eng. 17(2), 232\u2013243 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7_CR62","doi-asserted-by":"crossref","unstructured":"Oh, S.J., Fritz, M., Schiele, B.: Adversarial image perturbation for privacy protection \u2013 a game theory perspective. In: International Conference on Computer Vision (ICCV) (2017)","DOI":"10.1109\/ICCV.2017.165"},{"key":"7_CR63","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1007\/978-3-030-20873-8_31","volume-title":"Computer Vision \u2013 ACCV 2018","author":"W Oleszkiewicz","year":"2019","unstructured":"Oleszkiewicz, W., Kairouz, P., Piczak, K., Rajagopal, R., Trzci\u0144ski, T.: Siamese generative adversarial privatizer for biometric data. In: Jawahar, C.V., Li, H., Mori, G., Schindler, K. (eds.) ACCV 2018. LNCS, vol. 11365, pp. 482\u2013497. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-20873-8_31"},{"issue":"2128","key":"7_CR64","doi-asserted-by":"publisher","first-page":"20170364","DOI":"10.1098\/rsta.2017.0364","volume":"376","author":"SC Olhede","year":"2018","unstructured":"Olhede, S.C., Wolfe, P.J.: The growing ubiquity of algorithms in society: implications, impacts and innovations. Philos. Trans. R. Soc. A: Math. Phys. Eng. Sci. 376(2128), 20170364 (2018)","journal-title":"Philos. Trans. R. Soc. A: Math. Phys. Eng. Sci."},{"key":"7_CR65","doi-asserted-by":"publisher","first-page":"4505","DOI":"10.1109\/JIOT.2020.2967734","volume":"7","author":"SA Osia","year":"2020","unstructured":"Osia, S.A., et al.: A hybrid deep learning architecture for privacy-preserving mobile analytics. IEEE Internet Things J. 7, 4505\u20134518 (2020)","journal-title":"IEEE Internet Things J."},{"key":"7_CR66","doi-asserted-by":"crossref","unstructured":"Pan, Y.L., Haung, M.J., Ding, K.T., Wu, J.L., Jang, J.S.: k-Same-Siamese-GAN: k-same algorithm with generative adversarial network for facial image de-identification with hyperparameter tuning and mixed precision training. In: IEEE proceedings of the 16th International Conference on Advanced Video and Signal Based Surveillance, pp. 1\u20138 (2019)","DOI":"10.1109\/AVSS.2019.8909866"},{"key":"7_CR67","doi-asserted-by":"crossref","unstructured":"Ren, Z., Jae Lee, Y., Ryoo, M.S.: Learning to anonymize faces for privacy preserving action detection. In: Proceedings of the European Conference on Computer Vision, pp. 620\u2013636 (2018)","DOI":"10.1007\/978-3-030-01246-5_38"},{"issue":"2","key":"7_CR68","first-page":"461","volume":"9","author":"DB Rubin","year":"1993","unstructured":"Rubin, D.B.: Discussion statistical disclosure limitation. J. Off. Stat. 9(2), 461 (1993)","journal-title":"J. Off. Stat."},{"key":"7_CR69","doi-asserted-by":"publisher","first-page":"5994","DOI":"10.1109\/ACCESS.2018.2889996","volume":"7","author":"Z Rui","year":"2018","unstructured":"Rui, Z., Yan, Z.: A survey on biometric authentication: toward secure and privacy-preserving identification. IEEE Access 7, 5994\u20136009 (2018)","journal-title":"IEEE Access"},{"key":"7_CR70","doi-asserted-by":"crossref","unstructured":"Salter, C., Saydjari, O.S., Schneier, B., Wallner, J.: Toward a secure system engineering methodolgy. In: Proceedings of the 1998 Workshop on New Security Paradigms, pp. 2\u201310. ACM (1998)","DOI":"10.1145\/310889.310900"},{"key":"7_CR71","unstructured":"Shan, S., Wenger, E., Zhang, J., Li, H., Zheng, H., Zhao, B.Y.: Fawkes: protecting personal privacy against unauthorized deep learning models. In: Proceeding of USENIX Security (2020)"},{"key":"7_CR72","unstructured":"Shokri, R., Strobel, M., Zick, Y.: Privacy risks of explaining machine learning models. arXiv preprint arXiv:1907.00164 (2019)"},{"key":"7_CR73","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: Symposium on Security and Privacy, pp. 3\u201318. IEEE (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"7_CR74","unstructured":"Slokom, M., Larson, M., Hanjalic, A.: Data masking for recommender systems: prediction performance and rating hiding. In: Late Breaking Results, in Conjunction with the 13th ACM Conference on Recommender Systems (2019)"},{"issue":"1","key":"7_CR75","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3287168","volume":"11","author":"D Srivastava","year":"2019","unstructured":"Srivastava, D., Scannapieco, M., Redman, T.C.: Ensuring high-quality private data for responsible data science: vision and challenges. J. Data Inf. Qual. 11(1), 1\u20139 (2019)","journal-title":"J. Data Inf. Qual."},{"issue":"05","key":"7_CR76","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Internat. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 571\u2013588 (2002)","journal-title":"Internat. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"7_CR77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50272-4","volume-title":"Statistical Disclosure Control for Microdata: Methods and Applications in R","author":"M Templ","year":"2017","unstructured":"Templ, M.: Statistical Disclosure Control for Microdata: Methods and Applications in R. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-319-50272-4"},{"key":"7_CR78","unstructured":"Tim, V., Denny, B., Lente, V.H., Ruben, V.D.H.: Google employees are eavesdropping, even in your living room VRT NWS has discovered (2019). https:\/\/www.vrt.be\/vrtnws\/en\/2019\/07\/10\/google-employees-are-eavesdropping-even-in-flemish-living-rooms\/. Accessed 07 Feb 2021"},{"key":"7_CR79","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1007\/978-0-387-09823-4_35","volume-title":"Data Mining and Knowledge Discovery Handbook","author":"V Torra","year":"2009","unstructured":"Torra, V.: Privacy in data mining. In: Maimon, O., Rokach, L. (eds.) Data Mining and Knowledge Discovery Handbook, pp. 687\u2013716. Springer, Boston (2009). https:\/\/doi.org\/10.1007\/978-0-387-09823-4_35"},{"key":"7_CR80","series-title":"Studies in Big Data","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-319-57358-8_6","volume-title":"Data Privacy: Foundations, New Developments and the Big Data Challenge","author":"V Torra","year":"2017","unstructured":"Torra, V.: Masking methods. In: Torra, V. (ed.) Data Privacy: Foundations, New Developments and the Big Data Challenge. Studies in Big Data, vol. 28, pp. 191\u2013238. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-57358-8_6"},{"key":"7_CR81","doi-asserted-by":"crossref","unstructured":"Tripathy, A., Wang, Y., Ishwar, P.: Privacy-preserving adversarial networks. In: 57th IEEE Annual Allerton Conference on Communication, Control, and Computing, pp. 495\u2013505 (2019)","DOI":"10.1109\/ALLERTON.2019.8919758"},{"key":"7_CR82","first-page":"1117","volume":"84","author":"FT Wu","year":"2013","unstructured":"Wu, F.T.: Defining privacy and utility in data sets. Univ. Colorado Law Rev. 84, 1117 (2013)","journal-title":"Univ. Colorado Law Rev."},{"key":"7_CR83","unstructured":"Xu, L., Skoularidou, M., Cuesta-Infante, A., Veeramachaneni, K.: Modeling tabular data using conditional GAN. In: Wallach, H., Larochelle, H., Beygelzimer, A., d\u00c1lch\u00e9-Buc, F., Fox, E., Garnett, R. (eds.) Advances in Neural Information Processing Systems, vol. 32, pp. 7335\u20137345 (2019)"},{"key":"7_CR84","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-27696-0","volume-title":"Secure Data Management in Decentralized Systems","author":"T Yu","year":"2007","unstructured":"Yu, T., Jajodia, S.: Secure Data Management in Decentralized Systems, vol. 33. Springer, Boston (2007). https:\/\/doi.org\/10.1007\/978-0-387-27696-0"},{"key":"7_CR85","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Liu, Z., Larson, M.: Towards large yet imperceptible adversarial image perturbations with perceptual color distance. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 2020","DOI":"10.1109\/CVPR42600.2020.00112"},{"key":"7_CR86","doi-asserted-by":"crossref","unstructured":"Rechberger, C., Walch, R.: Privacy-preserving machine learning using cryptography. In: Batina, L., B\u00e4ck, T., Buhan, I., Picek, S. (eds.) Security and Artificial Intelligence. LNCS, vol. 13049, pp. 109\u2013129. Springer, Cham (2022)","DOI":"10.1007\/978-3-030-98795-4_6"},{"key":"7_CR87","doi-asserted-by":"crossref","unstructured":"Hern\u00e1ndez-Castro, C.J., Liu, Z., Serban, A., Tsingenopoulos, I., Joosen, W.: Adversarial machine learning. In: Batina, L., B\u00e4ck, T., Buhan, I., Picek, S. (eds.) Security and Artificial Intelligence. LNCS, vol. 13049, pp. 287\u2013312. Springer, Cham (2022)","DOI":"10.1007\/978-3-030-98795-4_12"}],"container-title":["Lecture Notes in Computer Science","Security and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-98795-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:39:10Z","timestamp":1675211950000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-98795-4_7"}},"subtitle":["The Potential of Pre-processing for Privacy Enchancement"],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030987947","9783030987954"],"references-count":87,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-98795-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"8 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}