{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T19:17:12Z","timestamp":1776280632488,"version":"3.50.1"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031106835","type":"print"},{"value":"9783031106842","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10684-2_2","type":"book-chapter","created":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T07:05:06Z","timestamp":1657609506000},"page":"15-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Utility and\u00a0Privacy Assessment of\u00a0Synthetic Microbiome Data"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3363-6270","authenticated-orcid":false,"given":"Markus","family":"Hittmeir","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0424-5999","authenticated-orcid":false,"given":"Rudolf","family":"Mayer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3682-1364","authenticated-orcid":false,"given":"Andreas","family":"Ekelhart","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,7,13]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","unstructured":"Berger, B., Cho, H.: Emerging technologies towards enhancing privacy in genomic data sharing. Genome Biol. 20(128) (2019). https:\/\/doi.org\/10.1186\/s13059-019-1741-0","DOI":"10.1186\/s13059-019-1741-0"},{"issue":"7","key":"2_CR2","doi-asserted-by":"publisher","first-page":"2219","DOI":"10.3748\/wjg.v22.i7.2219","volume":"22","author":"E Distrutti","year":"2016","unstructured":"Distrutti, E., Monaldi, L., Ricci, P., Fiorucci, S.: Gut microbiota role in irritable bowel syndrome: new therapeutic strategies. World J. Gastroenterol. 22(7), 2219 (2016)","journal-title":"World J. Gastroenterol."},{"issue":"14","key":"2_CR3","doi-asserted-by":"publisher","first-page":"6477","DOI":"10.1073\/pnas.1000162107","volume":"107","author":"N Fierer","year":"2010","unstructured":"Fierer, N., Lauber, C.L., Zhou, N., McDonald, D., Costello, E.K., Knight, R.: Forensic identification using skin bacterial communities. PNAS 107(14), 6477\u20136481 (2010)","journal-title":"PNAS"},{"issue":"22","key":"2_CR4","doi-asserted-by":"publisher","first-page":"E2930","DOI":"10.1073\/pnas.1423854112","volume":"112","author":"E Franzosa","year":"2015","unstructured":"Franzosa, E., Huang, K., Meadow, J., Gevers, D., Lemon, K., Bohannan, B.: Identifying personal microbiomes using metagenomic codes. PNAS 112(22), E2930\u2013E2938 (2015)","journal-title":"PNAS"},{"key":"2_CR5","doi-asserted-by":"publisher","unstructured":"Hittmeir, M., Ekelhart, A., Mayer, R.: On the utility of synthetic data: an empirical evaluation on machine learning tasks. In: International Conference on Availability, Reliability and Security. ARES. ACM Press, Canterbury (2019). https:\/\/doi.org\/10.1145\/3339252.3339281","DOI":"10.1145\/3339252.3339281"},{"key":"2_CR6","doi-asserted-by":"publisher","unstructured":"Hittmeir, M., Mayer, R., Ekelhart, A.: A baseline for attribute disclosure risk in synthetic data. In: ACM Conference on Data and Application Security and Privacy. CODASPY. ACM, New Orleans, March 2020. https:\/\/doi.org\/10.1145\/3374664.3375722","DOI":"10.1145\/3374664.3375722"},{"key":"2_CR7","doi-asserted-by":"publisher","unstructured":"Hittmeir, M., Mayer, R., Ekelhart, A.: Distance-based techniques for personal microbiome identification. In: International Conference on Availability, Reliability and Security, ARES. ACM, Vienna, August 2022. https:\/\/doi.org\/10.1145\/3538969.3538985","DOI":"10.1145\/3538969.3538985"},{"issue":"7122","key":"2_CR8","doi-asserted-by":"publisher","first-page":"1022","DOI":"10.1038\/4441022a","volume":"444","author":"R Ley","year":"2006","unstructured":"Ley, R., Turnbaugh, P., Klein, S., Gordon, J.: Microbial ecology: human gut microbes associated with obesity. Nature 444(7122), 1022\u20131023 (2006)","journal-title":"Nature"},{"issue":"1","key":"2_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cmpb.2011.02.013","volume":"108","author":"G Li","year":"2012","unstructured":"Li, G., Wang, Y., Su, X.: Improvements on a privacy-protection algorithm for DNA sequences with generalization lattices. Comput. Methods Programs Biomed. 108(1), 1\u20139 (2012)","journal-title":"Comput. Methods Programs Biomed."},{"key":"2_CR10","doi-asserted-by":"publisher","unstructured":"Liu, Q., et al.: Gut microbiota dynamics in a prospective cohort of patients with post-acute COVID-19 syndrome. Gut 71(3) (2022). https:\/\/doi.org\/10.1136\/gutjnl-2021-325989","DOI":"10.1136\/gutjnl-2021-325989"},{"issue":"5","key":"2_CR11","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1055\/s-0038-1634025","volume":"44","author":"BA Malin","year":"2005","unstructured":"Malin, B.A.: Protecting genomic sequence anonymity with generalization lattices. Methods Inf. Med. 44(5), 687\u2013692 (2005)","journal-title":"Methods Inf. Med."},{"issue":"10","key":"2_CR12","doi-asserted-by":"publisher","first-page":"2277","DOI":"10.2337\/dc10-0556","volume":"33","author":"G Musso","year":"2010","unstructured":"Musso, G., Gambino, R., Cassader, M.: Obesity, diabetes, and gut microbiota: the hygiene hypothesis expanded? Diabetes Care 33(10), 2277\u20132284 (2010)","journal-title":"Diabetes Care"},{"key":"2_CR13","doi-asserted-by":"publisher","unstructured":"Nowok, B., Raab, G., Dibben, C.: synthpop: Bespoke creation of synthetic data in R. J. Stat. Softw. Art. 74(11) (2016). https:\/\/doi.org\/10.18637\/jss.v074.i11","DOI":"10.18637\/jss.v074.i11"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"D733","DOI":"10.1093\/nar\/gkv1189","volume":"44","author":"N O\u2019Leary","year":"2016","unstructured":"O\u2019Leary, N., Wright, M., Brister, J., et al.: Reference sequence (RefSeq) database at NCBI: current status, taxonomic expansion, and functional annotation. Nucleic Acids Res 44, D733\u2013D745 (2016)","journal-title":"Nucleic Acids Res"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Patki, N., Wedge, R., Veeramachaneni, K.: The synthetic data vault. In: IEEE International Conference on Data Science and Advanced Analytics (DSAA). Montreal, QC, Canada, 17\u201319 October 2016","DOI":"10.1109\/DSAA.2016.49"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Ping, H., Stoyanovich, J., Howe, B.: Datasynthesizer: privacy-preserving synthetic datasets. In: International Conference on Scientific and Statistical Database Management. Chicago, IL, USA, 27\u201329 June 2017","DOI":"10.1145\/3085504.3091117"},{"issue":"6","key":"2_CR17","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1038\/mp.2016.50","volume":"21","author":"G Rogers","year":"2016","unstructured":"Rogers, G., Keating, D., Young, R., Wong, M., Licinio, J., Wesselingh, S.: From gut dysbiosis to altered brain function and mental illness: mechanisms and pathways. Mol. Psychiatry 21(6), 738\u2013748 (2016)","journal-title":"Mol. Psychiatry"},{"key":"2_CR18","series-title":"Wiley Series in Probability and Statistics","doi-asserted-by":"publisher","DOI":"10.1002\/9780470316696","volume-title":"Multiple Imputation for Nonresponse in Surveys","year":"1987","unstructured":"Rubin, D.B. (ed.): Multiple Imputation for Nonresponse in Surveys. Wiley Series in Probability and Statistics, Wiley, Hoboken (1987). https:\/\/doi.org\/10.1002\/9780470316696"},{"issue":"3","key":"2_CR19","first-page":"95","volume":"6","author":"H Surendra","year":"2017","unstructured":"Surendra, H., Mohan, H.S.: A review of synthetic data generation methods for privacy preserving data publishing. Int. J. Sci. Technol. Res. 6(3), 95\u2013101 (2017)","journal-title":"Int. J. Sci. Technol. Res."},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-319-99771-1_9","volume-title":"Privacy in Statistical Databases","author":"J Taub","year":"2018","unstructured":"Taub, J., Elliot, M., Pampaka, M., Smith, D.: Differential correct attribution probability for synthetic data: an exploration. In: Domingo-Ferrer, J., Montes, F. (eds.) PSD 2018. LNCS, vol. 11126, pp. 122\u2013137. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99771-1_9"},{"key":"2_CR21","doi-asserted-by":"publisher","unstructured":"Vangay, P., Hillmann, B.M., Knights, D.: Microbiome Learning Repo (ML Repo): a public repository of microbiome regression and classification tasks. GigaScience 8(5) (2019). https:\/\/doi.org\/10.1093\/gigascience\/giz042","DOI":"10.1093\/gigascience\/giz042"},{"key":"2_CR22","doi-asserted-by":"publisher","unstructured":"Wagner, J., Paulson, J.N., Wang, X., Bhattacharjee, B., Corrada Bravo, H.: Privacy-preserving microbiome analysis using secure computation. Bioinformatics 32(12) (2016). https:\/\/doi.org\/10.1093\/bioinformatics\/btw073","DOI":"10.1093\/bioinformatics\/btw073"},{"key":"2_CR23","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.fsigen.2018.10.003","volume":"38","author":"AE Woerner","year":"2019","unstructured":"Woerner, A.E., et al.: Forensic human identification with targeted microbiome markers using nearest neighbor classification. Forensic Sci. Int. Genet. 38, 130\u2013139 (2019)","journal-title":"Forensic Sci. Int. Genet."},{"issue":"7402","key":"2_CR24","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1038\/nature11053","volume":"486","author":"T Yatsunenko","year":"2012","unstructured":"Yatsunenko, T.: Human gut microbiome viewed across age and geography. Nature 486(7402), 222\u2013227 (2012)","journal-title":"Nature"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXVI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10684-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T07:07:20Z","timestamp":1657609640000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10684-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031106835","9783031106842"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10684-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"13 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Newark, NJ","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"36","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cs.iit.edu\/~dbsec2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}