{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T04:36:47Z","timestamp":1776746207373,"version":"3.51.2"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032052803","type":"print"},{"value":"9783032052810","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T00:00:00Z","timestamp":1758153600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T00:00:00Z","timestamp":1758153600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-05281-0_11","type":"book-chapter","created":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T12:48:25Z","timestamp":1758199705000},"page":"164-180","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Pasteur: Scaling Privacy-Aware Data Synthesis"],"prefix":"10.1007","author":[{"given":"Antheas","family":"Kapenekakis","sequence":"first","affiliation":[]},{"given":"Daniele","family":"Dell\u2019Aglio","sequence":"additional","affiliation":[]},{"given":"Martin","family":"B\u00f8gsted","sequence":"additional","affiliation":[]},{"given":"Minos","family":"Garofalakis","sequence":"additional","affiliation":[]},{"given":"Katja","family":"Hose","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,18]]},"reference":[{"key":"11_CR1","unstructured":"Alam, S., et al.: Kedro (2022)"},{"key":"11_CR2","unstructured":"Bradbury, J., et al.: JAX: composable transformations of Python+NumPy programs (2018)"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Cai, K., Wei, J., Lei, X., Xiao, X.: Data synthesis via differentially private markov random fields. VLDB (2021)","DOI":"10.14778\/3476249.3476272"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Cai, K., Xiao, X., Cormode, G.: PrivLava: synthesizing relational data with foreign keys under differential privacy. Proc. ACM Manag. Data 1(2), 1\u201325 (2023)","DOI":"10.1145\/3589287"},{"key":"11_CR5","unstructured":"Dask Development Team: Dask: Library for dynamic task scheduling (2016)"},{"key":"11_CR6","unstructured":"Dua, D., Graff, C.: UCI machine learning repository (2017)"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy (2006)","DOI":"10.1007\/11787006_1"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Ho, S., Qu, Y., Gu, B., Gao, L., Li, J., Xiang, Y.: DP-GAN: differentially private consecutive data publishing using generative adversarial nets (2021)","DOI":"10.1016\/j.jnca.2021.103066"},{"key":"11_CR9","unstructured":"Johnson, A., Bulgarelli, L., Pollard, T., Horng, S., Celi, L.A., Mark, R.: MIMIC-IV"},{"key":"11_CR10","unstructured":"Jordon, J., Yoon, J., van\u00a0der Schaar, M.: PATE-GAN: generating synthetic data with differential privacy guarantees (2018)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Liu, B., Ding, M., Shaham, S., Rahayu, W., Farokhi, F., Lin, Z.: When machine learning meets privacy: a survey and outlook. ACM Comput., Surv. (2022)","DOI":"10.1145\/3436755"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"McKenna, R., Miklau, G., Sheldon, D.: Winning the NIST contest: a scalable and general approach to differentially private synthetic data (2021)","DOI":"10.29012\/jpc.778"},{"key":"11_CR13","unstructured":"McKenna, R., Mullins, B., Sheldon, D., Miklau, G.: AIM: an adaptive and iterative mechanism for differentially private synthetic data (2022)"},{"key":"11_CR14","unstructured":"Mckenna, R., Sheldon, D., Miklau, G.: Graphical-model based estimation and inference for differential privacy. In: Proceedings of the 36th International Conference on Machine Learning, pp. 4435\u20134444. PMLR (2019)"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"McKinney, W.: Data structures for statistical computing in Python. In: van\u00a0der Walt, S., Millman, J. (eds.) Proceedings of the 9th Python in Science Conference, pp. 56\u201361 (2010)","DOI":"10.25080\/Majora-92bf1922-00a"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Patki, N., Wedge, R., Veeramachaneni, K.: The synthetic data vault (2016)","DOI":"10.1109\/DSAA.2016.49"},{"key":"11_CR17","unstructured":"Qian, Z., Cebere, B.C., van\u00a0der Schaar, M.: Synthcity: facilitating innovative use cases of synthetic data in different data modalities (2023)"},{"key":"11_CR18","unstructured":"Tao, Y., McKenna, R., Hay, M., Machanavajjhala, A., Miklau, G.: Benchmarking differentially private synthetic data generation algorithms (2021)"},{"key":"11_CR19","unstructured":"Xu, L., Skoularidou, M., Cuesta-Infante, A., Veeramachaneni, K.: Modeling tabular data using conditional GAN (2019)"},{"issue":"8","key":"11_CR20","doi-asserted-by":"publisher","first-page":"2378","DOI":"10.1109\/JBHI.2020.2980262","volume":"24","author":"J Yoon","year":"2020","unstructured":"Yoon, J., Drumright, L.N., Schaar, M.: Anonymization through data synthesis using generative adversarial networks (ADS-GAN). IEEE J. Biomed. Health Inform. 24(8), 2378\u20132388 (2020)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Zaharia, M., et al.: Apache spark: a unified engine for big data processing (2016)","DOI":"10.1145\/2934664"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, J., Cormode, G., Procopiuc, C.M., Srivastava, D., Xiao, X.: PrivBayes: private data release via Bayesian networks. ACM Trans. Database Syst. 42(4), 1\u201341 (2017)","DOI":"10.1145\/3134428"},{"key":"11_CR23","unstructured":"Zhang, Z., et al.: PrivSyn: differentially private data synthesis"}],"container-title":["Lecture Notes in Computer Science","Advances in Databases and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-05281-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T03:42:31Z","timestamp":1776742951000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-05281-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,18]]},"ISBN":["9783032052803","9783032052810"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-05281-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,18]]},"assertion":[{"value":"18 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADBIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Advances in Databases and Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tampere","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Finland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adbis2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adbis2025.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}