{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T16:02:55Z","timestamp":1765382575338,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031696503"},{"type":"electronic","value":"9783031696510"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-69651-0_8","type":"book-chapter","created":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T07:30:40Z","timestamp":1726126240000},"page":"115-128","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Generating Synthetic Data is Complicated: Know Your Data and\u00a0Know Your Generator"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1825-0097","authenticated-orcid":false,"given":"Jonathan","family":"Latner","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9137-5785","authenticated-orcid":false,"given":"Marcel","family":"Neunhoeffer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5790-3394","authenticated-orcid":false,"given":"J\u00f6rg","family":"Drechsler","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,13]]},"reference":[{"issue":"5","key":"8_CR1","doi-asserted-by":"publisher","first-page":"21","DOI":"10.3390\/app11052158","volume":"11","author":"FK Dankar","year":"2021","unstructured":"Dankar, F.K., Ibrahim, M.: Fake it till you make it: guidelines for effective synthetic data generation. Appl. Sci. 11(5), 21\u201358 (2021)","journal-title":"Appl. Sci."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Drechsler, J., Haensch, A.C.: 30 years of synthetic data. arXiv preprint arXiv:2304.02107 (2023)","DOI":"10.1214\/24-STS927"},{"issue":"4","key":"8_CR3","first-page":"589","volume":"25","author":"J Drechsler","year":"2009","unstructured":"Drechsler, J., Reiter, J.: Disclosure risk and data utility for partially synthetic data: an empirical study using the German IAB establishment survey. J. Official Stat. 25(4), 589\u2013603 (2009)","journal-title":"J. Official Stat."},{"key":"8_CR4","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, vol. 27 (2014)"},{"key":"8_CR5","unstructured":"Jordon, J., et al.: Synthetic data \u2013 what, why and how? (2022)"},{"issue":"3","key":"8_CR6","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1145\/3979.4017","volume":"10","author":"CK Liew","year":"1985","unstructured":"Liew, C.K., Choi, U.J., Liew, C.J.: A data distortion by probability distribution. ACM Trans. Database Syst. (TODS) 10(3), 395\u2013411 (1985)","journal-title":"ACM Trans. Database Syst. (TODS)"},{"key":"8_CR7","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-031-13945-1_17","volume-title":"PSD 2022","author":"C Little","year":"2022","unstructured":"Little, C., Elliot, M., Allmendinger, R.: Comparing the utility and disclosure risk of synthetic data with samples of microdata. In: Domingo-Ferrer, J., Laurent, M. (eds.) PSD 2022. LNCS, vol. 13463, pp. 234\u2013249. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-13945-1_17"},{"key":"8_CR8","first-page":"407","volume":"9","author":"RJ Little","year":"1993","unstructured":"Little, R.J., et al.: Statistical analysis of masked data. J. Official Stat. 9, 407\u2013407 (1993)","journal-title":"J. Official Stat."},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v074.i11","volume":"74","author":"B Nowok","year":"2016","unstructured":"Nowok, B., Raab, G.M., Dibben, C.: synthpop: bespoke creation of synthetic data in R. J. Stat. Softw. 74, 1\u201326 (2016)","journal-title":"J. Stat. Softw."},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Park, N., Mohammadi, M., Gorde, K., Jajodia, S., Park, H., Kim, Y.: Data synthesis based on generative adversarial networks. arXiv preprint arXiv:1806.03384 (2018)","DOI":"10.14778\/3231751.3231757"},{"key":"8_CR11","doi-asserted-by":"publisher","unstructured":"Patki, N., Wedge, R., Veeramachaneni, K.: The synthetic data vault. In: IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 399\u2013410 (2016). https:\/\/doi.org\/10.1109\/DSAA.2016.49","DOI":"10.1109\/DSAA.2016.49"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Ping, H., Stoyanovich, J., Howe, B.: Datasynthesizer: privacy-preserving synthetic datasets. In: Proceedings of the 29th International Conference on Scientific and Statistical Database Management, pp.\u00a01\u20135 (2017)","DOI":"10.1145\/3085504.3091117"},{"key":"8_CR13","unstructured":"Raab, G.M., Nowok, B., Dibben, C.: Guidelines for producing useful synthetic data. arXiv preprint arXiv:1712.04078 (2017)"},{"issue":"2","key":"8_CR14","first-page":"461","volume":"9","author":"DB Rubin","year":"1993","unstructured":"Rubin, D.B.: Statistical disclosure limitation. J. Official Stat. 9(2), 461\u2013468 (1993)","journal-title":"J. Official Stat."},{"issue":"3","key":"8_CR15","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1111\/rssa.12358","volume":"181","author":"J Snoke","year":"2018","unstructured":"Snoke, J., Raab, G.M., Nowok, B., Dibben, C., Slavkovic, A.: General and specific utility measures for synthetic data. J. R. Stat. Soc. Ser. A Stat. Soc. 181(3), 663\u2013688 (2018)","journal-title":"J. R. Stat. Soc. Ser. A Stat. Soc."},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Woo, M.J., Reiter, J.P., Oganian, A., Karr, A.F.: Global measures of data utility for microdata masked for disclosure limitation. J. Priv. Confidentiality 1(1) (2009)","DOI":"10.29012\/jpc.v1i1.568"},{"key":"8_CR17","unstructured":"Xu, L., Skoularidou, M., Cuesta-Infante, A., Veeramachaneni, K.: Modeling tabular data using conditional GAN. In: Advances in Neural Information Processing Systems (2019)"},{"issue":"4","key":"8_CR18","first-page":"549","volume":"25","author":"J Young","year":"2009","unstructured":"Young, J., Graham, P., Penny, R.: Using Bayesian networks to create synthetic data. J. Official Stat. 25(4), 549\u2013567 (2009)","journal-title":"J. Official Stat."},{"issue":"4","key":"8_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3134428","volume":"42","author":"J Zhang","year":"2017","unstructured":"Zhang, J., Cormode, G., Procopiuc, C.M., Srivastava, D., Xiao, X.: PrivBayes: private data release via Bayesian networks. ACM Trans. Database Syst. (TODS) 42(4), 1\u201341 (2017)","journal-title":"ACM Trans. Database Syst. (TODS)"}],"container-title":["Lecture Notes in Computer Science","Privacy in Statistical Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-69651-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T07:31:31Z","timestamp":1726126291000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-69651-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031696503","9783031696510"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-69651-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"13 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"PSD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Privacy in Statistical Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Antibes Juan-les-Pins","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"psd2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/crises-deim.urv.cat\/psd2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}