{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:16:50Z","timestamp":1743031010031,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":36,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819707973"},{"type":"electronic","value":"9789819707980"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-0798-0_8","type":"book-chapter","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T08:03:04Z","timestamp":1709193784000},"page":"121-138","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Synthetic Data Generation for\u00a0Differential Privacy Using Maximum Weight Matching"],"prefix":"10.1007","author":[{"given":"Miao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xinxin","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,1]]},"reference":[{"key":"8_CR1","unstructured":"NIST. 2021 differential privacy synthetic data challenge. https:\/\/github.com\/ryan112358\/nist-synthetic-data-2021"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308\u2013318 (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"8_CR3","unstructured":"Asuncion, A., Newman, D., Bache, K., Lichman, M.: UCI machine learning repository. Meta 2003 (2003)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Barak, B., Chaudhuri, K., Dwork, C., Kale, S., McSherry, F., Talwar, K.: Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In: Proceedings of the Twenty-Sixth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 273\u2013282 (2007)","DOI":"10.1145\/1265530.1265569"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/978-3-662-53641-4_24","volume-title":"Theory of Cryptography","author":"M Bun","year":"2016","unstructured":"Bun, M., Steinke, T.: Concentrated differential privacy: simplifications, extensions, and lower bounds. In: Hirt, M., Smith, A. (eds.) TCC 2016. LNCS, vol. 9985, pp. 635\u2013658. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53641-4_24"},{"issue":"11","key":"8_CR6","doi-asserted-by":"publisher","first-page":"2190","DOI":"10.14778\/3476249.3476272","volume":"14","author":"K Cai","year":"2021","unstructured":"Cai, K., Lei, X., Wei, J., Xiao, X.: Data synthesis via differentially private Markov random fields. Proc. VLDB Endow. 14(11), 2190\u20132202 (2021)","journal-title":"Proc. VLDB Endow."},{"key":"8_CR7","unstructured":"Chen, D., Kerkouche, R., Fritz, M.: Private set generation with discriminative information. arXiv preprint arXiv:2211.04446 (2022)"},{"key":"8_CR8","unstructured":"Chen, D., Orekondy, T., Fritz, M.: GS-WGAN: a gradient-sanitized approach for learning differentially private generators. In: 34th Conference on Neural Information Processing Systems, pp. 12673\u201312684. Curran Associates, Inc. (2020)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Chen, R., Xiao, Q., Zhang, Y., Xu, J.: Differentially private high-dimensional data publication via sampling-based inference. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, vol. 2015, p. 129 (2015)","DOI":"10.1145\/2783258.2783379"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Chen, X., Wang, C., Yang, Q., et al.: Locally differentially private high-dimensional data synthesis (2023)","DOI":"10.1007\/s11432-022-3583-x"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Dwork, C., Rothblum, G.N., Vadhan, S.: Boosting and differential privacy. In: Proceedings of the 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, pp. 51\u201360 (2010)","DOI":"10.1109\/FOCS.2010.12"},{"key":"8_CR14","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-030-61133-0_3","volume-title":"Software Foundations for Data Interoperability and Large Scale Graph Data Analytics","author":"W Yu","year":"2020","unstructured":"Yu, W., Iranmanesh, S., Haldar, A., Zhang, M., Ferhatosmanoglu, H.: An axiomatic role similarity measure based on graph topology. In: Qin, L., et al. (eds.) SFDI LSGDA 2020. CCIS, vol. 1281, pp. 33\u201348. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-61133-0_3"},{"key":"8_CR15","unstructured":"Harder, F., Adamczewski, K., Park, M.: DP-MERF: differentially private mean embeddings with random features for practical privacy-preserving data generation. In: Proceedings of the 24th International Conference on Artificial Intelligence and Statistics (AISTATS 2021), vol. 130, pp. 1819\u20131827. PMLR (2021)"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Kato, F., Takahashi, T., Takagi, S., Cao, Y., Liew, S.P., Yoshikawa, M.: HDPView: differentially private materialized view for exploring high dimensional relational data. arXiv preprint arXiv:2203.06791 (2022)","DOI":"10.14778\/3538598.3538601"},{"key":"8_CR17","unstructured":"Kohavi, R.: Scaling up the accuracy of Naive-Bayes classifiers: a decision-tree hybrid. In: Second International Conference on Knowledge Discovery and Data Mining, pp. 202\u2013207 (1996)"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Li, J., Gan, W., Gui, Y., Wu, Y., Yu, P.S.: Frequent itemset mining with local differential privacy. In: Proceedings of the 31st ACM International Conference on Information & Knowledge Management, pp. 1146\u20131155 (2022)","DOI":"10.1145\/3511808.3557327"},{"issue":"5","key":"8_CR19","doi-asserted-by":"publisher","first-page":"136","DOI":"10.3390\/fi13050136","volume":"13","author":"CA Libbi","year":"2021","unstructured":"Libbi, C.A., Trienes, J., Trieschnigg, D., Seifert, C.: Generating synthetic training data for supervised de-identification of electronic health records. Future Internet 13(5), 136 (2021)","journal-title":"Future Internet"},{"key":"8_CR20","unstructured":"Liu, F.: Model-based differentially private data synthesis and statistical inference in multiply synthetic differentially private data. arXiv e-prints, pp. arXiv-1606 (2016)"},{"key":"8_CR21","unstructured":"Long, Y., et al.: G-pate: scalable differentially private data generator via private aggregation of teacher discriminators. In: 35th Conference on Neural Information Processing Systems, NeurIPS 2021, pp. 2965\u20132977. Neural Information Processing Systems Foundation (2021)"},{"key":"8_CR22","unstructured":"McKenna, R., Sheldon, D., Miklau, G.: Graphical-model based estimation and inference for differential privacy. In: International Conference on Machine Learning, pp. 4435\u20134444. PMLR (2019)"},{"key":"8_CR23","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.dss.2014.03.001","volume":"62","author":"S Moro","year":"2014","unstructured":"Moro, S., Cortez, P., Rita, P.: A data-driven approach to predict the success of bank telemarketing. Decis. Support Syst. 62, 22\u201331 (2014)","journal-title":"Decis. Support Syst."},{"key":"8_CR24","first-page":"145","volume":"1","author":"M Olave","year":"1989","unstructured":"Olave, M., Rajkovic, V., Bohanec, M.: An application for admission in public school systems. Expert Syst. Public Adm. 1, 145\u2013160 (1989)","journal-title":"Expert Syst. Public Adm."},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Qardaji, W., Yang, W., Li, N.: Priview: practical differentially private release of marginal contingency tables. In: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, pp. 1435\u20131446 (2014)","DOI":"10.1145\/2588555.2588575"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Takagi, S., Takahashi, T., Cao, Y., Yoshikawa, M.: P3GM: private high-dimensional data release via privacy preserving phased generative model. In: 2021 IEEE 37th International Conference on Data Engineering (ICDE), pp. 169\u2013180. IEEE Computer Society (2021)","DOI":"10.1109\/ICDE51399.2021.00022"},{"key":"8_CR27","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1016\/j.ins.2021.12.018","volume":"586","author":"A Torfi","year":"2022","unstructured":"Torfi, A., Fox, E.A., Reddy, C.K.: Differentially private synthetic medical data generation using convolutional GANs. Inf. Sci. 586, 485\u2013500 (2022)","journal-title":"Inf. Sci."},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Torkzadehmahani, R., Kairouz, P., Paten, B.: DP-CGAN: differentially private synthetic data and label generation. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 98\u2013104. IEEE (2019)","DOI":"10.1109\/CVPRW.2019.00018"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Wang, T., Lopuhaa-Zwakenberg, M., Li, Z., Skoric, B., Li, N.: Locally differentially private frequency estimation with consistency. In: NDSS 2020: Proceedings of the NDSS Symposium (2020)","DOI":"10.14722\/ndss.2020.24157"},{"key":"8_CR30","unstructured":"Xie, L., Lin, K., Wang, S., Wang, F., Zhou, J.: Differentially private generative adversarial network. arXiv preprint arXiv:1802.06739 (2018)"},{"key":"8_CR31","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1007\/s00778-013-0309-y","volume":"22","author":"J Xu","year":"2013","unstructured":"Xu, J., Zhang, Z., Xiao, X., Yang, Y., Yu, G., Winslett, M.: Differentially private histogram publication. VLDB J. 22, 797\u2013822 (2013)","journal-title":"VLDB J."},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Yue, X., et al.: Synthetic text generation with differential privacy: a simple and practical recipe. arXiv preprint arXiv:2210.14348 (2022)","DOI":"10.18653\/v1\/2023.acl-long.74"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, J., Cormode, G., Procopiuc, C.M., Srivastava, D., Xiao, X.: Privbayes: private data release via Bayesian networks. In: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, pp. 1423\u20131434 (2014)","DOI":"10.1145\/2588555.2588573"},{"issue":"4","key":"8_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3134428","volume":"42","author":"J Zhang","year":"2017","unstructured":"Zhang, J., Cormode, G., Procopiuc, C.M., Srivastava, D., Xiao, X.: Privbayes: private data release via Bayesian networks. ACM Trans. Database Syst. (TODS) 42(4), 1\u201341 (2017)","journal-title":"ACM Trans. Database Syst. (TODS)"},{"key":"8_CR35","unstructured":"Zhang, Z., et al.: PrivSyn: differentially private data synthesis. In: Proceedings of the 30th USENIX Security Symposium (2021)"},{"issue":"8","key":"8_CR36","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1109\/TKDE.2017.2697856","volume":"29","author":"T Zhu","year":"2017","unstructured":"Zhu, T., Li, G., Zhou, W., Yu, P.S.: Differentially private data publishing and analysis: a survey. IEEE Trans. Knowl. Data Eng. 29(8), 1619\u20131638 (2017)","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-0798-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T08:04:37Z","timestamp":1709193877000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-0798-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819707973","9789819707980"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-0798-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/tjutanklab.com\/ica3pp2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Online submission system","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"439","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"145","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}