{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:58:23Z","timestamp":1760597903125,"version":"3.37.3"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T00:00:00Z","timestamp":1563926400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T00:00:00Z","timestamp":1563926400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["300000"],"award-info":[{"award-number":["300000"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s10489-019-01515-3","type":"journal-article","created":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T10:55:07Z","timestamp":1563965707000},"page":"341-353","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Using deep learning to preserve data confidentiality"],"prefix":"10.1007","volume":"50","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3135-0447","authenticated-orcid":false,"given":"Wei","family":"Li","sequence":"first","affiliation":[]},{"given":"Pengqiu","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Xiaohui","family":"Cui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,24]]},"reference":[{"key":"1515_CR1","unstructured":"Rubin DB (1993) Discussion: Statistical disclosure limitation. J Off Stat 9"},{"key":"1515_CR2","unstructured":"Min CL, Mitra R, Lazaridis E, An CL, Yong KG, Yap WS Data privacy preserving scheme using generalized linear models. Computers Security 2016"},{"key":"1515_CR3","volume-title":"Interna- tional conference on computing, analytics and security trends, pages 533\u2013538","author":"SPS Gurjar","year":"2017","unstructured":"Gurjar SPS, Pasupuleti SK (2017) A privacy-preserving multi- keyword ranked search scheme over encrypted cloud data using mir-tree. In: Interna- tional conference on computing, analytics and security trends, pages 533\u2013538"},{"key":"1515_CR4","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-540-73451-2_49","volume-title":"International conference on rough sets and intelligent systems paradigms","author":"P Andruszkiewicz","year":"2007","unstructured":"Andruszkiewicz P (2007) Optimization for mask scheme in privacy preserving data mining for association rules. In: International conference on rough sets and intelligent systems paradigms, pp 465\u2013474"},{"key":"1515_CR5","doi-asserted-by":"crossref","unstructured":"Willenborg L, De Waal T (2001) Elements of statistical disclosure control. Springer","DOI":"10.1007\/978-1-4613-0121-9"},{"key":"1515_CR6","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-540-25955-8_2","volume-title":"Privacy in Statistical Databases","author":"Stephen E. Fienberg","year":"2004","unstructured":"Fienberg SE, Mcintyre J (2004) Data swapping: variations on a theme by dalenius and reiss. In International Workshop on Privacy in Statistical Databases, pages:14\u201329"},{"key":"1515_CR7","unstructured":"Fuller WA (1993) Masking procedures for microdata disclosure limitation. J Off Stat 9(2)"},{"key":"1515_CR8","unstructured":"Diederik P Kingma and Jimmy Ba. Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014"},{"issue":"1","key":"1515_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/2200000006","volume":"2","author":"Y Bengio","year":"2009","unstructured":"Bengio Y (2009) Learning deep architectures for ai. Foundations Trends R in Machine Learning 2(1):1\u2013127","journal-title":"Foundations Trends R in Machine Learning"},{"key":"1515_CR10","first-page":"2672","volume-title":"International conference on neural information processing systems","author":"IJ Goodfellow","year":"2014","unstructured":"Goodfellow IJ, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: International conference on neural information processing systems, pp 2672\u20132680"},{"key":"1515_CR11","unstructured":"Martin Arjovsky, Soumith Chintala, and L\u2019eon Bottou. Wasserstein gan. arXiv preprint arXiv:1701.07875, 2017"},{"issue":"58","key":"1515_CR12","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1071\/EA9720502","volume":"12","author":"NJ Barrow","year":"1972","unstructured":"Barrow NJ, Campbell NA (1972) Methods of measuring residual value of fertilizers. Aus- tralian Journal of Experimental Agriculture 12(58):502\u2013510","journal-title":"Aus- tralian Journal of Experimental Agriculture"},{"issue":"399","key":"1515_CR13","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1080\/01621459.1987.10478501","volume":"82","author":"DG Simpson","year":"1987","unstructured":"Simpson DG (1987) Minimum hellinger distance estimation for the analysis of count data. J Am Stat Assoc 82(399):802\u2013807","journal-title":"J Am Stat Assoc"},{"key":"1515_CR14","unstructured":"Rubin DB (2009) Statistical Disclosure Limitation. Springer US"},{"key":"1515_CR15","doi-asserted-by":"crossref","unstructured":"Li N, Li T, Venkatasubramanian S (2007) T-closeness: privacy beyond k-anonymity and l-diversity. In: Data engineering, 2007. ICDE 2007. IEEE 23rd international conference on. IEEE, pp 106\u2013115","DOI":"10.1109\/ICDE.2007.367856"},{"key":"1515_CR16","doi-asserted-by":"crossref","unstructured":"Dwork C (2008) Differential privacy: a survey of results. In: International conference on theory and applications of models of computation. Springer, pp 1\u201319","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"1515_CR17","unstructured":"Van Tilborg HCA, Jajodia S (2014) Encyclopedia of cryptography and security. Springer Science & Business Media"},{"key":"1515_CR18","unstructured":"Yang W, Li T, Jia H (2004) Simulation and experiment of machine vision guidance of agriculture vehicles. Transactions of the Chinese Society of Agricultural Engineering"},{"issue":"3","key":"1515_CR19","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/BF01230162","volume":"18","author":"JR Dormand","year":"1978","unstructured":"Dormand JR, Prince PJ (1978) New runge-kutta algorithms for numerical simulation in dynamical astronomy. Celest Mech 18(3):223\u2013232","journal-title":"Celest Mech"},{"issue":"6","key":"1515_CR20","first-page":"2154","volume":"23","author":"A Stukowski","year":"2009","unstructured":"Stukowski A (2009) Visualization and analysis of atomistic simulation data with ovito-the open visualization tool. IEEE Trans Fuzzy Syst 23(6):2154\u20132162","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"7","key":"1515_CR21","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.compenvurbsys.2013.09.001","volume":"42","author":"N Devia","year":"2013","unstructured":"Devia N, Weber R (2013) Generating crime data using agent-based simulation. Comput Environ Urban Syst 42(7):26\u201341","journal-title":"Comput Environ Urban Syst"},{"key":"1515_CR22","doi-asserted-by":"crossref","unstructured":"Phillips A, Cardelli L (2007) Efficient, correct simulation of biological processes in the stochastic pi-calculus. In International Conference on Computational Methods in Systems Biology, pages:184\u2013199","DOI":"10.1007\/978-3-540-75140-3_13"},{"key":"1515_CR23","doi-asserted-by":"crossref","unstructured":"Roe C, Meliopoulos AP, Meisel J, Overbye T (2008) Power system level impacts of plug-in hybrid electric vehicles using simulation data. In: Energy 2030 conference. Energy, pp 1\u20136, 2008","DOI":"10.1109\/ENERGY.2008.4781048"},{"key":"1515_CR24","unstructured":"Radford A, Metz L, Chintala S (2015) Unsupervised representation learning with deep convolutional generative adversarial networks. Comput Therm Sci"},{"key":"1515_CR25","unstructured":"Mirza M, Osindero S (2014) Conditional generative adversarial nets. Comput Therm Sci:2672\u20132680"},{"key":"1515_CR26","volume-title":"Least squares generative adversarial networks","author":"X Mao","year":"2016","unstructured":"Xudong Mao, Qing Li, Haoran Xie, Raymond Y. K Lau, Zhen Wang, and Stephen Paul Smolley. Least squares generative adversarial networks. 2016"},{"key":"1515_CR27","doi-asserted-by":"crossref","unstructured":"Dai F, Zhang D, Li J (2013) Encoder\/decoder for privacy protection video with privacy region detection and scrambling. In: International conference on multimedia modeling. Springer, pp 525\u2013527","DOI":"10.1007\/978-3-642-35728-2_58"},{"key":"1515_CR28","doi-asserted-by":"crossref","unstructured":"Ismini Psychoula, Erinc Merdivan, Deepika Singh, Liming Chen, Feng Chen, Sten Hanke, Johannes Kropf, Andreas Holzinger, and Matthieu Geist. A deep learning ap- proach for privacy preservation in assisted living. arXiv preprint arXiv:1802.09359, 2018","DOI":"10.1109\/PERCOMW.2018.8480247"},{"key":"1515_CR29","volume-title":"Navdeep Jaitly, and Ian Goodfellow. Adversarial autoencoders. In ICLR","author":"A Makhzani","year":"2016","unstructured":"Alireza Makhzani, Jonathon Shlens, Navdeep Jaitly, Ian Goodfellow, Alireza Makhzani, Jonathon Shlens, Navdeep Jaitly, and Ian Goodfellow. Adversarial autoencoders. In ICLR, 2016"},{"key":"1515_CR30","doi-asserted-by":"crossref","unstructured":"Daskalakis C, Goldberg PW, Papadimitriou CH (2009) The com- plexity of computing a Nash equilibrium. ACM","DOI":"10.1145\/1461928.1461951"},{"key":"1515_CR31","unstructured":"Xu B, Wang N, Chen T, Li M (2015) Empirical evaluation of rectified activations in convolutional network. Comput Therm Sci"},{"issue":"1","key":"1515_CR32","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava N, Hinton G, Krizhevsky A, Sutskever I, Salakhutdinov R (2014) Dropout: a simple way to prevent neural networks from overfitting. The Journal of Machine Learning Research 15(1):1929\u20131958","journal-title":"The Journal of Machine Learning Research"},{"key":"1515_CR33","volume-title":"Auto-encoding variational bayes","author":"DP Kingma","year":"2013","unstructured":"Diederik P Kingma and Max Welling. Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 (2013), 2013"},{"key":"1515_CR34","unstructured":"Xi Chen, Diederik P Kingma, Tim Salimans, Yan Duan, Prafulla Dhariwal, John Schul- man, Ilya Sutskever, and Pieter Abbeel. Variational lossy autoencoder arXiv preprint arXiv:1611.02731, 2016"},{"key":"1515_CR35","first-page":"448","volume-title":"Batch normalization: accelerating deep network training by reducing internal covariate shift","author":"S Ioffe","year":"2015","unstructured":"Ioffe S, Szegedy C (2015) Batch normalization: accelerating deep network training by reducing internal covariate shift, pp 448\u2013456"},{"key":"1515_CR36","unstructured":"Hardt M, Recht B, Singer Y (2015) Train faster, generalize better: stability of stochastic gradient descent. Mathematics"},{"key":"1515_CR37","volume-title":"The marginal value of adaptive gradient methods in machine learning","author":"AC Wilson","year":"2017","unstructured":"Ashia C. Wilson, Rebecca Roelofs, Mitchell Stern, Nathan Srebro, and Benjamin Recht. The marginal value of adaptive gradient methods in machine learning. 2017"},{"issue":"3","key":"1515_CR38","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/S0734-189X(87)80186-X","volume":"39","author":"SM Pizer","year":"1987","unstructured":"Pizer SM, Amburn EP, Austin JD, Cromartie R, Geselowitz A, Greer T, ter Haar Romeny B, Zimmerman JB, Zuiderveld K (1987) Adap- tive histogram equalization and its variations. Computer vision, graphics, and image processing 39(3):355\u2013368","journal-title":"Computer vision, graphics, and image processing"},{"key":"1515_CR39","first-page":"271","volume-title":"Advances in neural in- formation processing systems","author":"S Nowozin","year":"2016","unstructured":"Nowozin S, Cseke B, Tomioka R (2016) F-Gan: training generative neural samplers using variational divergence minimization. In: Advances in neural in- formation processing systems, pp 271\u2013279"},{"issue":"3","key":"1515_CR40","first-page":"1737","volume":"10","author":"A Bordes","year":"2009","unstructured":"Bordes A, Bottou L, Gallinari P (2009) Sgdqn: Careful quasi-newton stochastic gradient descent. J Mach Learn Res 10(3):1737\u20131754","journal-title":"J Mach Learn Res"},{"key":"1515_CR41","volume-title":"Rmsprop: divide the gradient by a running average of its recent magnitude. COURSERA: neural networks for machine learning","author":"T Tieleman","year":"2012","unstructured":"T. Tieleman and G. Hinton. Rmsprop: divide the gradient by a running average of its recent magnitude. COURSERA: neural networks for machine learning., 2012"},{"issue":"7","key":"1515_CR42","first-page":"257","volume":"12","author":"J Duchi","year":"2011","unstructured":"Duchi J, Hazan E, Singer Y (2011) Adaptive subgradient methods for online learning and stochastic optimization. J Mach Learn Res 12(7):257\u2013269","journal-title":"J Mach Learn Res"},{"key":"1515_CR43","doi-asserted-by":"crossref","unstructured":"Aleksandar Botev, Guy Lever, and David Barber. Nesterov\u2019s accelerated gradient and momentum as approximations to regularised update descent. 2016","DOI":"10.1109\/IJCNN.2017.7966082"},{"key":"1515_CR44","first-page":"5767","volume-title":"Advances in neural information processing systems","author":"I Gulrajani","year":"2017","unstructured":"Gulrajani I, Ahmed F, Arjovsky M, Dumoulin V, Courville AC (2017) Improved training of wasserstein gans. In: Advances in neural information processing systems, pp 5767\u20135777"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-019-01515-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10489-019-01515-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-019-01515-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T23:41:15Z","timestamp":1595461275000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10489-019-01515-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,24]]},"references-count":44,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["1515"],"URL":"https:\/\/doi.org\/10.1007\/s10489-019-01515-3","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2019,7,24]]},"assertion":[{"value":"24 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}