{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T10:45:11Z","timestamp":1750675511386,"version":"3.40.3"},"publisher-location":"Cham","reference-count":52,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031491863"},{"type":"electronic","value":"9783031491870"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-49187-0_1","type":"book-chapter","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T12:02:36Z","timestamp":1701345756000},"page":"3-23","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Exploring Privacy-Preserving Techniques on\u00a0Synthetic Data as\u00a0a\u00a0Defense Against Model Inversion Attacks"],"prefix":"10.1007","author":[{"given":"Manel","family":"Slokom","sequence":"first","affiliation":[]},{"given":"Peter-Paul","family":"de Wolf","sequence":"additional","affiliation":[]},{"given":"Martha","family":"Larson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,1]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/978-3-030-10925-7_31","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"NC Abay","year":"2019","unstructured":"Abay, N.C., Zhou, Y., Kantarcioglu, M., Thuraisingham, B., Sweeney, L.: Privacy preserving synthetic data release using deep learning. In: Berlingerio, M., Bonchi, F., G\u00e4rtner, T., Hurley, N., Ifrim, G. (eds.) ECML PKDD 2018. LNCS (LNAI), vol. 11051, pp. 510\u2013526. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-10925-7_31"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the ACM International Conference on Management of Data, vol. 29, pp. 439\u2013450 (2000)","DOI":"10.1145\/335191.335438"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Andreou, A., Goga, O., Loiseau, P.: Identity vs. attribute disclosure risks for users with multiple social profiles. In: Proceedings of the IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 163\u2013170 (2017)","DOI":"10.1145\/3110025.3110046"},{"key":"1_CR4","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9780262029735.001.0001","volume-title":"Obfuscation: A User\u2019s Guide for Privacy and Protest","author":"F Brunton","year":"2015","unstructured":"Brunton, F., Nissenbaum, H.: Obfuscation: A User\u2019s Guide for Privacy and Protest. MIT Press, Cambridge (2015)"},{"key":"1_CR5","unstructured":"Burger, J., Buelens, B., de Jong, T., Gootzen, Y.: Replacing a survey question by predictive modeling using register data. In: ISI World Statistics Congress, pp. 1\u20136 (2019)"},{"issue":"1","key":"1_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12864-019-6413-7","volume":"21","author":"D Chicco","year":"2020","unstructured":"Chicco, D., Jurman, G.: The advantages of the Matthews Correlation Coefficient (MCC) over F1 score and accuracy in binary classification evaluation. BMC Genom. 21(1), 1\u201313 (2020)","journal-title":"BMC Genom."},{"key":"1_CR7","unstructured":"Choi, E., Biswal, S., Malin, B., Duke, J., Stewart, W.F., Sun, J.: Generating multi-label discrete patient records using generative adversarial networks. In: Doshi-Velez, F., Fackler, J., Kale, D., Ranganath, R., Wallace, B., Wiens, J. (eds.) Proceedings of the 2nd Machine Learning for Healthcare Conference, vol. 68, pp. 286\u2013305 (2017)"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/3-540-47804-3_9","volume-title":"Inference Control in Statistical Databases","author":"RA Dandekar","year":"2002","unstructured":"Dandekar, R.A., Cohen, M., Kirkendall, N.: Sensitive micro data protection using Latin hypercube sampling technique. In: Domingo-Ferrer, J. (ed.) Inference Control in Statistical Databases. LNCS, vol. 2316, pp. 117\u2013125. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-47804-3_9"},{"key":"1_CR9","series-title":"Advances in Database Systems","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-0-387-70992-5_3","volume-title":"Privacy-Preserving Data Mining","author":"J Domingo-Ferrer","year":"2008","unstructured":"Domingo-Ferrer, J.: A survey of inference control methods for privacy-preserving data mining. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining. Advances in Database Systems, vol. 34, pp. 53\u201380. Springer, Boston (2008). https:\/\/doi.org\/10.1007\/978-0-387-70992-5_3"},{"key":"1_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0326-5","volume-title":"Synthetic Datasets for Statistical Disclosure Control: Theory and Implementation","author":"J Drechsler","year":"2011","unstructured":"Drechsler, J.: Synthetic Datasets for Statistical Disclosure Control: Theory and Implementation, vol. 201. Springer, New York (2011). https:\/\/doi.org\/10.1007\/978-1-4614-0326-5"},{"issue":"3","key":"1_CR11","first-page":"105","volume":"1","author":"J Drechsler","year":"2008","unstructured":"Drechsler, J., Bender, S., R\u00e4ssler, S.: Comparing fully and partially synthetic datasets for statistical disclosure control in the German IAB establishment panel. Trans. Data Priv. 1(3), 105\u2013130 (2008)","journal-title":"Trans. Data Priv."},{"issue":"12","key":"1_CR12","doi-asserted-by":"publisher","first-page":"3232","DOI":"10.1016\/j.csda.2011.06.006","volume":"55","author":"J Drechsler","year":"2011","unstructured":"Drechsler, J., Reiter, J.P.: An empirical evaluation of easily implemented, nonparametric methods for generating synthetic datasets. Comput. Stat. Data Anal. 55(12), 3232\u20133243 (2011)","journal-title":"Comput. Stat. Data Anal."},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-031-09342-5_17","volume-title":"Artificial Intelligence in Medicine","author":"ML Fang","year":"2022","unstructured":"Fang, M.L., Dhami, D.S., Kersting, K.: DP-CTGAN: differentially private medical data generation using CTGANs. In: Michalowski, M., Abidi, S.S.R., Abidi, S. (eds.) AIME 2022. LNCS, vol. 13263, pp. 178\u2013188. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-09342-5_17"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM Conference on Computer and Communications Security, pp. 1322\u20131333 (2015)","DOI":"10.1145\/2810103.2813677"},{"key":"1_CR15","unstructured":"Fredrikson, M., Lantz, E., Jha, S., Lin, S., Page, D., Ristenpart, T.: Privacy in pharmacogenetics: an end-to-end case study of personalized warfarin dosing. In: 23rd USENIX Security Symposium, pp. 17\u201332. USENIX Association (2014)"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-030-98795-4_7","volume-title":"Security and Artificial Intelligence","author":"G Garofalo","year":"2022","unstructured":"Garofalo, G., Slokom, M., Preuveneers, D., Joosen, W., Larson, M.: Machine learning meets data modification. In: Batina, L., B\u00e4ck, T., Buhan, I., Picek, S. (eds.) Security and Artificial Intelligence. LNCS, vol. 13049, pp. 130\u2013155. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-98795-4_7"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Heyburn, R., et al.: Machine learning using synthetic and real data: similarity of evaluation metrics for different healthcare datasets and for different algorithms. In: Data Science and Knowledge Engineering for Sensing Decision Support: Proceedings of the 13th International FLINS Conference, pp. 1281\u20131291. World Scientific (2018)","DOI":"10.1142\/9789813273238_0160"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Hidano, S., Murakami, T., Katsumata, S., Kiyomoto, S., Hanaoka, G.: Exposing private user behaviors of collaborative filtering via model inversion techniques. In: Proceedings on Privacy Enhancing Technologies, no. 3, pp. 264\u2013283 (2020)","DOI":"10.2478\/popets-2020-0052"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Hittmeir, M., Mayer, R., Ekelhart, A.: A baseline for attribute disclosure risk in synthetic data. In: Proceedings of the 10th ACM Conference on Data and Application Security and Privacy, pp. 133\u2013143 (2020)","DOI":"10.1145\/3374664.3375722"},{"key":"1_CR20","doi-asserted-by":"publisher","DOI":"10.1002\/9781118348239","volume-title":"Statistical Disclosure Control","author":"A Hundepool","year":"2012","unstructured":"Hundepool, A., et al.: Statistical Disclosure Control. Wiley, Hoboken (2012)"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Jayaraman, B., Evans, D.: Are attribute inference attacks just imputation? In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 1569\u20131582 (2022)","DOI":"10.1145\/3548606.3560663"},{"issue":"13","key":"1_CR22","first-page":"1677","volume":"7","author":"H Li","year":"2014","unstructured":"Li, H., Xiong, L., Zhang, L., Jiang, X.: DPSynthesizer: differentially private data synthesizer for privacy preserving data sharing. Proc. Very Large Data Bases (VLDB Endow.) 7(13), 1677\u20131680 (2014)","journal-title":"Proc. Very Large Data Bases (VLDB Endow.)"},{"issue":"3","key":"1_CR23","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1145\/3979.4017","volume":"10","author":"CK Liew","year":"1985","unstructured":"Liew, C.K., Choi, U.J., Liew, C.J.: A data distortion by probability distribution. ACM Trans. Database Syst. 10(3), 395\u2013411 (1985)","journal-title":"ACM Trans. Database Syst."},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-031-13945-1_17","volume-title":"Privacy in Statistical Databases","author":"C Little","year":"2022","unstructured":"Little, C., Elliot, M., Allmendinger, R.: Comparing the utility and disclosure risk of synthetic data with samples of microdata. In: Domingo-Ferrer, J., Laurent, M. (eds.) PSD 2022. LNCS, vol. 13463, pp. 234\u2013249. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-13945-1_17"},{"issue":"2","key":"1_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3436755","volume":"54","author":"B Liu","year":"2021","unstructured":"Liu, B., Ding, M., Shaham, S., Rahayu, W., Farokhi, F., Lin, Z.: When machine learning meets privacy: a survey and outlook. ACM Comput. Surv. 54(2), 1\u201336 (2021)","journal-title":"ACM Comput. Surv."},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Lu, P.H., Wang, P.C., Yu, C.M.: Empirical evaluation on synthetic data generation with generative adversarial network. In: Proceedings of the 9th International Conference on Web Intelligence, Mining and Semantics, pp. 1\u20136 (2019)","DOI":"10.1145\/3326467.3326474"},{"key":"1_CR27","unstructured":"Elliot, M.: Final report on the disclosure risk associated with synthetic data produced by the SYLLS team (2014). http:\/\/hummedia.manchester.ac.uk\/institutes\/cmist\/archive-publications\/reports\/. Accessed 13 Oct 2023"},{"key":"1_CR28","unstructured":"Mehnaz, S., Dibbo, S.V., Kabir, E., Li, N., Bertino, E.: Are your sensitive attributes private? novel model inversion attribute inference attacks on classification models. In: Proceedings of the 31st USENIX Security Symposium, pp. 4579\u20134596. USENIX Association (2022)"},{"issue":"5","key":"1_CR29","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1287\/mnsc.1050.0503","volume":"52","author":"K Muralidhar","year":"2006","unstructured":"Muralidhar, K., Sarathy, R.: Data shuffling: a new masking approach for numerical data. Manage. Sci. 52(5), 658\u2013670 (2006)","journal-title":"Manage. Sci."},{"issue":"11","key":"1_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v074.i11","volume":"74","author":"B Nowok","year":"2016","unstructured":"Nowok, B., Raab, G.M., Dibben, C.: Synthpop: bespoke creation of synthetic data in R. J. Stat. Softw. 74(11), 1\u201326 (2016)","journal-title":"J. Stat. Softw."},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"Park, N., Mohammadi, M., Gorde, K., Jajodia, S., Park, H., Kim, Y.: Data synthesis based on Generative Adversarial Networks. In: Proceedings of the 44th International Conference on Very Large Data Bases (VLDB Endowment), vol. 11, no. 10, pp. 1071\u20131083 (2018)","DOI":"10.14778\/3231751.3231757"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Patki, N., Wedge, R., Veeramachaneni, K.: The synthetic data vault. In: IEEE International Conference on Data Science and Advanced Analytics, pp. 399\u2013410 (2016)","DOI":"10.1109\/DSAA.2016.49"},{"key":"1_CR33","unstructured":"Polat, H., Du, W.: Privacy-preserving collaborative filtering using randomized perturbation techniques. In: Proceedings of the 3rd IEEE International Conference on Data Mining, pp. 625\u2013628 (2003)"},{"key":"1_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-031-13945-1_18","volume-title":"Privacy in Statistical Databases","author":"GM Raab","year":"2022","unstructured":"Raab, G.M.: Utility and disclosure risk for differentially private synthetic categorical data. In: Domingo-Ferrer, J., Laurent, M. (eds.) PSD 2022. LNCS, vol. 13463, pp. 250\u2013265. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-13945-1_18"},{"issue":"3","key":"1_CR35","first-page":"441","volume":"21","author":"JP Reiter","year":"2005","unstructured":"Reiter, J.P.: Using CART to generate partially synthetic public use microdata. J. Off. Stat. 21(3), 441 (2005)","journal-title":"J. Off. Stat."},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"Reiter, J.P., Mitra, R.: Estimating risks of identification disclosure in partially synthetic data. J. Priv. Confidentiality 1(1) (2009)","DOI":"10.29012\/jpc.v1i1.567"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Reiter, J.P., Wang, Q., Zhang, B.: Bayesian estimation of disclosure risks for multiply imputed, synthetic data. J. Priv. Confidentiality 6(1) (2014)","DOI":"10.29012\/jpc.v6i1.635"},{"issue":"2","key":"1_CR38","first-page":"461","volume":"9","author":"DB Rubin","year":"1993","unstructured":"Rubin, D.B.: Discussion statistical disclosure limitation. J. Off. Stat. 9(2), 461\u2013468 (1993)","journal-title":"J. Off. Stat."},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"Salter, C., Saydjari, O.S., Schneier, B., Wallner, J.: Toward a secure system engineering methodology. In: Proceedings of the Workshop on New Security Paradigms, pp. 2\u201310 (1998)","DOI":"10.1145\/310889.310900"},{"issue":"2","key":"1_CR40","first-page":"13","volume":"86","author":"N Shlomo","year":"2022","unstructured":"Shlomo, N.: How to measure disclosure risk in microdata? Surv. Stat. 86(2), 13\u201321 (2022)","journal-title":"Surv. Stat."},{"key":"1_CR41","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: IEEE Symposium on Security and Privacy, pp. 3\u201318 (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"1_CR42","doi-asserted-by":"crossref","unstructured":"Slokom, M., de Wolf, P.P., Larson, M.: When machine learning models leak: an exploration of synthetic training data. In: Domingo-Ferrer, J., Laurent, M. (eds.) Proceedings of the International Conference on Privacy in Statistical Databases (2022). Corrected and updated version on arXiv at https:\/\/arxiv.org\/abs\/2310.08775","DOI":"10.1007\/978-3-031-13945-1_20"},{"key":"1_CR43","unstructured":"Stadler, T., Oprisanu, B., Troncoso, C.: Synthetic data-anonymisation groundhog day. In: Proceedings of the 29th USENIX Security Symposium. USENIX Association (2020)"},{"key":"1_CR44","doi-asserted-by":"crossref","unstructured":"Sun, M., Li, C., Zha, H.: Inferring private demographics of new users in recommender systems. In: Proceedings of the 20th ACM International Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems, pp. 237\u2013244 (2017)","DOI":"10.1145\/3127540.3127566"},{"issue":"04","key":"1_CR45","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1142\/S0218001409007326","volume":"23","author":"Y Sun","year":"2009","unstructured":"Sun, Y., Wong, A.K., Kamel, M.S.: Classification of imbalanced data: a review. Int. J. Pattern Recognit. Artif. Intell. 23(04), 687\u2013719 (2009)","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"key":"1_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-319-99771-1_9","volume-title":"Privacy in Statistical Databases","author":"J Taub","year":"2018","unstructured":"Taub, J., Elliot, M., Pampaka, M., Smith, D.: Differential correct attribution probability for synthetic data: an exploration. In: Domingo-Ferrer, J., Montes, F. (eds.) PSD 2018. LNCS, vol. 11126, pp. 122\u2013137. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99771-1_9"},{"key":"1_CR47","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1007\/978-0-387-09823-4_35","volume-title":"Data Mining and Knowledge Discovery Handbook","author":"V Torra","year":"2009","unstructured":"Torra, V.: Privacy in data mining. In: Maimon, O., Rokach, L. (eds.) Data Mining and Knowledge Discovery Handbook, pp. 687\u2013716. Springer, Boston (2009). https:\/\/doi.org\/10.1007\/978-0-387-09823-4_35"},{"key":"1_CR48","doi-asserted-by":"crossref","unstructured":"Tripathy, A., Wang, Y., Ishwar, P.: Privacy-preserving adversarial networks. In: 57th IEEE Annual Allerton Conference on Communication, Control, and Computing, pp. 495\u2013505 (2019)","DOI":"10.1109\/ALLERTON.2019.8919758"},{"key":"1_CR49","unstructured":"Wang, K.C., Fu, Y., Li, K., Khisti, A.J., Zemel, R., Makhzani, A.: Variational model inversion attacks. In: Beygelzimer, A., Dauphin, Y., Liang, P., Vaughan, J.W. (eds.) Advances in Neural Information Processing Systems, vol. 34, pp. 9706\u20139719 (2021)"},{"key":"1_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/11930242_17","volume-title":"Privacy in Statistical Databases","author":"P-P Wolf","year":"2006","unstructured":"Wolf, P.-P.: Risk, utility and PRAM. In: Domingo-Ferrer, J., Franconi, L. (eds.) PSD 2006. LNCS, vol. 4302, pp. 189\u2013204. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11930242_17"},{"key":"1_CR51","unstructured":"Xu, L., Skoularidou, M., Cuesta-Infante, A., Veeramachaneni, K.: Modeling tabular data using conditional GAN. In: Wallach, H., Larochelle, H., Beygelzimer, A., d\u2019Alche Buc, F., Fox, E., Garnett, R. (eds.) Advances in Neural Information Processing Systems, vol. 32, pp. 7335\u20137345 (2019)"},{"issue":"4","key":"1_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3134428","volume":"42","author":"J Zhang","year":"2017","unstructured":"Zhang, J., Cormode, G., Procopiuc, C.M., Srivastava, D., Xiao, X.: PrivBayes: private data release via Bayesian networks. ACM Trans. Database Syst. 42(4), 1\u201341 (2017)","journal-title":"ACM Trans. Database Syst."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-49187-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T21:35:14Z","timestamp":1744148114000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-49187-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031491863","9783031491870"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-49187-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Groningen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isc23.cs.rug.nl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}