{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T13:27:56Z","timestamp":1774618076295,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T00:00:00Z","timestamp":1774569600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T00:00:00Z","timestamp":1774569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Data Sci Anal"],"published-print":{"date-parts":[[2026,12]]},"DOI":"10.1007\/s41060-026-01095-9","type":"journal-article","created":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T12:42:50Z","timestamp":1774615370000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FT-BERT-GAN: an enhanced Feature-Type-Aware BERT (FT-BERT) with GAN for privacy-preserving synthetic text generation"],"prefix":"10.1007","volume":"22","author":[{"given":"Raman","family":"Kumar","sequence":"first","affiliation":[]},{"given":"S.","family":"Narayanasamy","sequence":"additional","affiliation":[]},{"given":"Chappidi Sreenivasa","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Vimal","family":"Parmar","sequence":"additional","affiliation":[]},{"given":"Gadug","family":"Sudhamsu","sequence":"additional","affiliation":[]},{"given":"Murari Devakannan","family":"Kamalesh","sequence":"additional","affiliation":[]},{"given":"Sarbeswara","family":"Hota","sequence":"additional","affiliation":[]},{"given":"Vikas","family":"Wasson","sequence":"additional","affiliation":[]},{"given":"Rajesh","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Sanchi","family":"Kaushik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,27]]},"reference":[{"key":"1095_CR1","doi-asserted-by":"crossref","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K. Bert: Pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 conference of the North American chapter of the association for computational linguistics: human language technologies, volume 1 (long and short papers)\u00a0(pp. 4171\u20134186) (2019).","DOI":"10.18653\/v1\/N19-1423"},{"key":"1095_CR2","unstructured":"Huang, X., Khetan, A., Cvitkovic, M., Karnin, Z. Tabtransformer: Tabular data modeling using contextual embeddings.\u00a0arXiv preprint arXiv:2012.06678 (2020)."},{"key":"1095_CR3","doi-asserted-by":"crossref","unstructured":"Ribeiro, L. F., Schmitt, M., Sch\u00fctze, H., Gurevych, I. Investigating pretrained language models for graph-to-text generation.\u00a0arXiv preprint arXiv:2007.08426 (2020).","DOI":"10.18653\/v1\/2021.nlp4convai-1.20"},{"key":"1095_CR4","unstructured":"Goodfellow, I. J., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Bengio, Y. Generative adversarial nets. Adv. Neural Inf. Process. Syst. 27 (2014)."},{"key":"1095_CR5","unstructured":"Xu, L., Skoularidou, M., Cuesta-Infante, A., Veeramachaneni, K. Modeling tabular data using conditional gan.\u00a0Adv. Neural Inf. Process. Syst.\u00a032 (2019)."},{"key":"1095_CR6","unstructured":"Xu, L., & Veeramachaneni, K. Synthesizing tabular data using generative adversarial networks.\u00a0arXiv preprint arXiv:1811.11264 (2018)."},{"key":"1095_CR7","unstructured":"Radford, A., Narasimhan, K., Salimans, T., Sutskever, I. Improving language understanding by generative pre-training (2018)."},{"key":"1095_CR8","unstructured":"Xu, J., Ren, X., Lin, J., Sun, X. Dp-gan: diversity-promoting generative adversarial network for generating informative and diversified text.\u00a0arXiv preprint arXiv:1802.01345 (2018)."},{"key":"1095_CR9","unstructured":"Papernot, N., Abadi, M., Erlingsson, U., Goodfellow, I., & Talwar, K. Semi-supervised knowledge transfer for deep learning from private training data.\u00a0arXiv preprint arXiv:1610.05755 (2016)."},{"key":"1095_CR10","unstructured":"Li, J., Zhao, Z., Yee, K., Javaid, U., Sikdar, B. Taegan: generating synthetic tabular data for data augmentation.\u00a0arXiv preprint arXiv:2410.01933 (2024)."},{"key":"1095_CR11","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2023.1296508","volume":"6","author":"Z Zhao","year":"2024","unstructured":"Zhao, Z., Kunar, A., Birke, R., Van der Scheer, H., Chen, L.Y.: CTAB-GAN+: enhancing tabular data synthesis. Front. Big Data 6, 1296508 (2024)","journal-title":"Front. Big Data"},{"key":"1095_CR12","unstructured":"Somepalli, G., Goldblum, M., Schwarzschild, A., Bruss, C. B., Goldstein, T. Saint: Improved neural networks for tabular data via row attention and contrastive pre-training.\u00a0arXiv preprint arXiv:2106.01342 (2021)."},{"key":"1095_CR13","doi-asserted-by":"crossref","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A. Calibrating noise to sensitivity in private data analysis. In: Theory of cryptography conference\u00a0(pp. 265\u2013284). Berlin, Heidelberg: Springer Berlin Heidelberg (2006).","DOI":"10.1007\/11681878_14"},{"key":"1095_CR14","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V. Membership inference attacks against machine learning models. In: 2017 IEEE symposium on security and privacy (SP)\u00a0(pp. 3\u201318). IEEE (2017).","DOI":"10.1109\/SP.2017.41"},{"key":"1095_CR15","unstructured":"Tran, T. V., Xiong, L. Differentially private tabular data synthesis using large language models.\u00a0arXiv preprint arXiv:2406.01457 (2024)."},{"key":"1095_CR16","first-page":"100196","volume":"37","author":"Y Wang","year":"2024","unstructured":"Wang, Y., Feng, D., Dai, Y., Chen, Z., Huang, J., Ananiadou, S., Xie, Q., Wang, H.: HARMONIC: harnessing LLMs for tabular data synthesis and privacy protection. Adv. Neural. Inf. Process. Syst. 37, 100196\u2013100212 (2024)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"1095_CR17","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1007\/s11036-023-02096-9","volume":"28","author":"Y Wang","year":"2023","unstructured":"Wang, Y., Meng, X., Liu, X.: Differentially private recurrent variational autoencoder for text privacy preservation. Mob. Netw. Appl. 28, 1565\u20131580 (2023). https:\/\/doi.org\/10.1007\/s11036-023-02096-9","journal-title":"Mob. Netw. Appl."},{"key":"1095_CR18","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"key":"1095_CR19","unstructured":"Mariani, G., Scheidegger, F., Istrate, R., Bekas, C., Malossi, C. (2018). Bagan: Data augmentation with balancing gan.\u00a0arXiv preprint arXiv:1803.09655."},{"key":"1095_CR20","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1016\/j.eswa.2017.09.030","volume":"91","author":"G Douzas","year":"2018","unstructured":"Douzas, G., Bacao, F.: Effective data generation for imbalanced learning using conditional generative adversarial networks. Expert Syst. Appl. 91, 464\u2013471 (2018)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"1095_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/sdata.2016.35","volume":"3","author":"AE Johnson","year":"2016","unstructured":"Johnson, A.E., Pollard, T.J., Shen, L., Lehman, L.W.H., Feng, M., Ghassemi, M., Mark, R.G.: MIMIC-III, a freely accessible critical care database. Sci. Data 3(1), 1\u20139 (2016)","journal-title":"Sci. Data"},{"key":"1095_CR22","doi-asserted-by":"publisher","unstructured":"Becker, B., Kohavi, R. (1996). Adult . UCI Machine Learning Repository. https:\/\/doi.org\/10.24432\/C5XW20.","DOI":"10.24432\/C5XW20"},{"key":"1095_CR23","doi-asserted-by":"crossref","unstructured":"McAuley, J., Leskovec. J. Hidden factors and hidden topics: understanding rating dimensions with review text. RecSys (2013).","DOI":"10.1145\/2507157.2507163"},{"issue":"4","key":"1095_CR24","first-page":"35","volume":"24","author":"A Singhal","year":"2001","unstructured":"Singhal, A.: Modern information retrieval: a brief overview. IEEE Data Eng. Bull. 24(4), 35\u201343 (2001)","journal-title":"IEEE Data Eng. Bull."},{"key":"1095_CR25","unstructured":"Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., & Hochreiter, S. (2017). Gans trained by a two time-scale update rule converge to a local nash equilibrium.\u00a0Adv. Neural Inf. Process. Syst.\u00a030."},{"key":"1095_CR26","doi-asserted-by":"crossref","unstructured":"Naidu, G., Zuva, T., Sibanda, E.M. A review of evaluation metrics in machine learning algorithms. In: Computer science on-line conference\u00a0(pp. 15\u201325). Cham: Springer International Publishing (2023).","DOI":"10.1007\/978-3-031-35314-7_2"}],"container-title":["International Journal of Data Science and Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-026-01095-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41060-026-01095-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-026-01095-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T12:43:01Z","timestamp":1774615381000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41060-026-01095-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,27]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,12]]}},"alternative-id":["1095"],"URL":"https:\/\/doi.org\/10.1007\/s41060-026-01095-9","relation":{},"ISSN":["2364-415X","2364-4168"],"issn-type":[{"value":"2364-415X","type":"print"},{"value":"2364-4168","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,27]]},"assertion":[{"value":"24 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"117"}}