{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T07:26:41Z","timestamp":1777534001350,"version":"3.51.4"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,1,27]],"date-time":"2025-01-27T00:00:00Z","timestamp":1737936000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,1,27]],"date-time":"2025-01-27T00:00:00Z","timestamp":1737936000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["npj Digit. Med."],"DOI":"10.1038\/s41746-024-01359-3","type":"journal-article","created":{"date-parts":[[2025,1,26]],"date-time":"2025-01-26T23:18:21Z","timestamp":1737933501000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":54,"title":["A scoping review of privacy and utility metrics in medical synthetic data"],"prefix":"10.1038","volume":"8","author":[{"given":"Bayrem","family":"Kaabachi","sequence":"first","affiliation":[]},{"given":"J\u00e9r\u00e9mie","family":"Despraz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8168-7067","authenticated-orcid":false,"given":"Thierry","family":"Meurers","sequence":"additional","affiliation":[]},{"given":"Karen","family":"Otte","sequence":"additional","affiliation":[]},{"given":"Mehmed","family":"Halilovic","sequence":"additional","affiliation":[]},{"given":"Bogdan","family":"Kulynych","sequence":"additional","affiliation":[]},{"given":"Fabian","family":"Prasser","sequence":"additional","affiliation":[]},{"given":"Jean Louis","family":"Raisaro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,27]]},"reference":[{"key":"1359_CR1","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1111\/cts.12884","volume":"14","author":"KB Johnson","year":"2021","unstructured":"Johnson, K. B. et al. Precision medicine, AI, and the future of personalized health care. Clin. Transl. Sci. 14, 86\u201393 (2021).","journal-title":"Clin. Transl. Sci."},{"key":"1359_CR2","doi-asserted-by":"publisher","first-page":"6967166","DOI":"10.1155\/2021\/6967166","volume":"2021","author":"D Xiang","year":"2021","unstructured":"Xiang, D. & Cai, W. Privacy protection and secondary use of health data: strategies and methods. BioMed. Res. Int. 2021, 6967166 (2021).","journal-title":"BioMed. Res. Int."},{"key":"1359_CR3","unstructured":"U.S. Department of Health & Human Services. Health Information Privacy. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/index.html (2024)."},{"key":"1359_CR4","unstructured":"European Union. General Data Protection Regulation (GDPR) Official Legal Text. https:\/\/gdpr-info.eu\/ (2024)."},{"key":"1359_CR5","unstructured":"EMA. External guidance on the implementation of European Medicines Agency policy publication clinical data for medicinal products human use. https:\/\/www.ema.europa.eu\/en\/human-regulatory\/marketing-authorisation\/clinical-data-publication\/support-industry\/external-guidance-implementation-european-medicines-agency-policy-publication-clinical-data (2018)."},{"key":"1359_CR6","unstructured":"Aggarwal, C. C. On k-anonymity and the curse of dimensionality. In Proc. 31st International Conference on Very Large Data Bases, VLDB \u201905, 901\u2013909 (VLDB Endowment, 2005)."},{"key":"1359_CR7","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1038\/s41551-021-00751-8","volume":"5","author":"RJ Chen","year":"2021","unstructured":"Chen, R. J., Lu, M. Y., Chen, T. Y., Williamson, D. F. K. & Mahmood, F. Synthetic data in machine learning for medicine and healthcare. Nat. Biomed. Eng. 5, 493\u2013497 (2021).","journal-title":"Nat. Biomed. Eng."},{"key":"1359_CR8","unstructured":"Goodfellow, I. et al. Generative adversarial nets. Adv. Neural Inform. Process. Syst. 27, 2672\u20132680 (2014)."},{"key":"1359_CR9","unstructured":"Zhang, H. et al. Mixed-Type Tabular Data Synthesis with Score-based Diffusion in Latent Space. In The Twelfth International Conference on Learning Representations (ICLR, 2024)."},{"key":"1359_CR10","unstructured":"Brown, T. et al. Language models are few-shot learners. Adv. Neural Inform. Process. Syst. 33, 1877\u20131901 (2020)."},{"key":"1359_CR11","doi-asserted-by":"publisher","unstructured":"Wang, Z., Myles, P. & Tucker, A. Generating and evaluating synthetic UK Primary Care Data: Preserving Data Utility & Patient Privacy. In 2019 IEEE 32nd International Symposium on Computer-Based Medical Systems (CBMS), 126\u2013131 (IEEE) https:\/\/doi.org\/10.1109\/CBMS.2019.00036 (2019).","DOI":"10.1109\/CBMS.2019.00036"},{"key":"1359_CR12","doi-asserted-by":"publisher","first-page":"e043497","DOI":"10.1136\/bmjopen-2020-043497","volume":"11","author":"Z Azizi","year":"2021","unstructured":"Azizi, Z., Zheng, C., Mosquera, L., Pilote, L. & El Emam, K. Can synthetic data be a proxy for real clinical trial data? A validation study. BMJ Open 11, e043497 (2021).","journal-title":"BMJ Open"},{"key":"1359_CR13","doi-asserted-by":"publisher","unstructured":"Cockrell, C., Schobel-McHugh, S., Lisboa, F., Vodovotz, Y. & An, G. Generating synthetic data with a mechanism-based critical illness digital twin: Demonstration for post traumatic acute respiratory distress syndrome https:\/\/doi.org\/10.1101\/2022.11.22.517524 (2022).","DOI":"10.1101\/2022.11.22.517524"},{"key":"1359_CR14","unstructured":"Stadler, T., Oprisanu, B. & Troncoso, C. Synthetic data \u2013 anonymisation groundhog day. In 31st USENIX Security Symposium (USENIX Security 22), 1451\u20131468 (USENIX Association, 2022)."},{"key":"1359_CR15","unstructured":"Houssiau, F. et al. TAPAS: a toolbox for adversarial privacy auditing of synthetic data. CoRR abs\/2211.06550 (2022)."},{"key":"1359_CR16","doi-asserted-by":"publisher","unstructured":"Shokri, R., Stronati, M., Song, C. & Shmatikov, V. Membership Inference Attacks Against Machine Learning Models. In 2017 IEEE Symposium on Security and Privacy (SP), 3\u201318 (IEEE) https:\/\/doi.org\/10.1109\/SP.2017.41 (2017).","DOI":"10.1109\/SP.2017.41"},{"key":"1359_CR17","doi-asserted-by":"publisher","first-page":"12320","DOI":"10.3390\/app122312320","volume":"12","author":"A Appenzeller","year":"2022","unstructured":"Appenzeller, A., Leitner, M., Philipp, P., Krempel, E. & Beyerer, J. Privacy and utility of private synthetic data for medical data analyses. Appl. Sci. 12, 12320 (2022).","journal-title":"Appl. Sci."},{"key":"1359_CR18","doi-asserted-by":"publisher","unstructured":"Arthur, L. et al. On the challenges of deploying privacy-preserving synthetic data in the enterprise. CoRR abs\/2307.04208 https:\/\/doi.org\/10.48550\/ARXIV.2307.04208 (2023).","DOI":"10.48550\/ARXIV.2307.04208"},{"key":"1359_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3168389","volume":"51","author":"I Wagner","year":"2019","unstructured":"Wagner, I. & Eckhoff, D. Technical privacy metrics: a systematic survey. ACM Comput. Surv. 51, 1\u201338 (2019).","journal-title":"ACM Comput. Surv."},{"key":"1359_CR20","doi-asserted-by":"publisher","first-page":"2733","DOI":"10.3390\/math10152733","volume":"10","author":"A Figueira","year":"2022","unstructured":"Figueira, A. & Vaz, B. Survey on synthetic data generation, evaluation methods and GANs. Mathematics 10, 2733 (2022).","journal-title":"Mathematics"},{"key":"1359_CR21","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.neucom.2022.04.053","volume":"493","author":"M Hernandez","year":"2022","unstructured":"Hernandez, M., Epelde, G., Alberdi, A., Cilla, R. & Rankin, D. Synthetic data generation for tabular health records: A systematic review. Neurocomputing 493, 28\u201345 (2022).","journal-title":"Neurocomputing"},{"key":"1359_CR22","doi-asserted-by":"crossref","unstructured":"Vallevik, V. B. et al. Can i trust my fake data\u2013a comprehensive quality assessment framework for synthetic tabular data in healthcare. Int. J. Med. Inform. 22,105413 (2024).","DOI":"10.1016\/j.ijmedinf.2024.105413"},{"key":"1359_CR23","unstructured":"The Synthetic Data Vault. https:\/\/sdv.dev\/ (2024)."},{"key":"1359_CR24","unstructured":"Brenninkmeijer, B. Table Evaluator. https:\/\/github.com\/Baukebrenninkmeijer\/table-evaluator (2023)."},{"key":"1359_CR25","doi-asserted-by":"publisher","unstructured":"Qian, Z., Cebere, B.-C. & van der Schaar, M. Synthcity: facilitating innovative use cases of synthetic data in different data modalities https:\/\/doi.org\/10.48550\/ARXIV.2301.07573 (2023).","DOI":"10.48550\/ARXIV.2301.07573"},{"key":"1359_CR26","doi-asserted-by":"publisher","first-page":"679939","DOI":"10.3389\/fdata.2021.679939","volume":"4","author":"M Platzer","year":"2021","unstructured":"Platzer, M. & Reutterer, T. Holdout-based empirical assessment of mixed-type synthetic data. Front. Big Data 4, 679939 (2021).","journal-title":"Front. Big Data"},{"key":"1359_CR27","doi-asserted-by":"publisher","unstructured":"Zhang, Z., Yan, C., Lasko, T. A., Sun, J. & Malin, B. A. SynTEG: a framework for temporal structured electronic health data simulation https:\/\/doi.org\/10.1093\/JAMIA\/OCAA262 (2021).","DOI":"10.1093\/JAMIA\/OCAA262"},{"key":"1359_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v074.i11","volume":"74","author":"B Nowok","year":"2016","unstructured":"Nowok, B., Raab, G. M. & Dibben, C. Synthpop: bespoke creation of synthetic data in R. J. Stat. Softw. 74, 1\u201326 (2016).","journal-title":"J. Stat. Softw."},{"key":"1359_CR29","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1093\/jamiaopen\/ooaa060","volume":"3","author":"RE Foraker","year":"2021","unstructured":"Foraker, R. E. et al. Spot the difference: comparing results of analyses from real patient data and synthetic derivatives. JAMIA Open 3, 557\u2013566 (2021).","journal-title":"JAMIA Open"},{"key":"1359_CR30","doi-asserted-by":"publisher","first-page":"e19","DOI":"10.1055\/s-0042-1760247","volume":"62","author":"M Hernadez","year":"2023","unstructured":"Hernadez, M., Epelde, G., Alberdi, A., Cilla, R. & Rankin, D. Synthetic tabular data evaluation in the health domain covering resemblance, utility, and privacy dimension. Methods Inf. Med. 62, e19\u2013e38 (2023).","journal-title":"Methods Inf. Med."},{"key":"1359_CR31","doi-asserted-by":"publisher","unstructured":"Ganev, G. & Cristofaro, E. D. On the inadequacy of similarity-based privacy metrics: Reconstruction attacks against \u201ctruly anonymous synthetic data\". CoRR abs\/2312.05114 https:\/\/doi.org\/10.48550\/ARXIV.2312.05114 (2023).","DOI":"10.48550\/ARXIV.2312.05114"},{"key":"1359_CR32","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1561\/0400000042","volume":"9","author":"C Dwork","year":"2013","unstructured":"Dwork, C. & Roth, A. The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9, 211\u2013407 (2013).","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"1359_CR33","first-page":"701","volume":"16","author":"J Bambauer","year":"2013","unstructured":"Bambauer, J., Muralidhar, K. & Sarathy, R. Fool\u2019s gold: an illustrated critique of differential privacy. Vand. J. Ent. Tech. L. 16, 701 (2013).","journal-title":"Vand. J. Ent. Tech. L."},{"key":"1359_CR34","doi-asserted-by":"crossref","unstructured":"Kulynych, B., Hsu, H., Troncoso, C. & Calmon, F. P. Arbitrary decisions are a hidden cost of differentially private training. In Proc. 2023 ACM Conference on Fairness, Accountability, and Transparency, 1609\u20131623 (2023).","DOI":"10.1145\/3593013.3594103"},{"key":"1359_CR35","unstructured":"Bagdasaryan, E., Poursaeed, O. & Shmatikov, V. Differential Privacy Has Disparate Impact on Model Accuracy. In Advances in Neural Information Processing Systems, 15479-15488 (Curran Associates, 2019)."},{"key":"1359_CR36","doi-asserted-by":"publisher","unstructured":"McKenna, R., Gerome, M. & Sheldon, D. Winning the NIST Contest: A Scalable and General Approach to Differentially Private Synthetic Data. J Priv Confidentiality 11. https:\/\/doi.org\/10.29012\/jpc.778 (2021).","DOI":"10.29012\/jpc.778"},{"key":"1359_CR37","doi-asserted-by":"publisher","first-page":"2599","DOI":"10.14778\/3551793.3551817","volume":"15","author":"R McKenna","year":"2022","unstructured":"McKenna, R., Mullins, B., Sheldon, D. & Miklau, G. AIM: an adaptive and iterative mechanism for differentially private synthetic data. Proc. VLDB Endow. 15, 2599\u20132612 (2022).","journal-title":"Proc. VLDB Endow."},{"key":"1359_CR38","unstructured":"Vietri, G. et al. Private synthetic data for multitask learning and marginal queries. Adv. Neural Inform. Process. Syst. 35, 18282\u201318295 (2022)."},{"key":"1359_CR39","doi-asserted-by":"publisher","first-page":"e0297271","DOI":"10.1371\/journal.pone.0297271","volume":"19","author":"M Pereira","year":"2024","unstructured":"Pereira, M. et al. Assessment of differentially private synthetic data for utility and fairness in end-to-end machine learning pipelines for tabular data. PLOS ONE 19, e0297271 (2024).","journal-title":"PLOS ONE"},{"key":"1359_CR40","doi-asserted-by":"publisher","unstructured":"Kulynych, B., G\u00f3mez, J. F., Kaissis, G., du Pin Calmon, F. & Troncoso, C. Attack-aware noise calibration for differential privacy. CoRR abs\/2407.02191 https:\/\/doi.org\/10.48550\/ARXIV.2407.02191 (2024).","DOI":"10.48550\/ARXIV.2407.02191"},{"key":"1359_CR41","doi-asserted-by":"crossref","unstructured":"Ziller, A. et al. Reconciling privacy and accuracy in AI for medical imaging. Nat. Mach. Intell. 6, 764\u2013774 (2024).","DOI":"10.1038\/s42256-024-00858-y"},{"key":"1359_CR42","doi-asserted-by":"publisher","unstructured":"Ganev, G., Annamalai, M. S. M. S. & Cristofaro, E. D. The elusive pursuit of replicating PATE-GAN: benchmarking, auditing, debugging. CoRR abs\/2406.13985 https:\/\/doi.org\/10.48550\/ARXIV.2406.13985 (2024).","DOI":"10.48550\/ARXIV.2406.13985"},{"key":"1359_CR43","unstructured":"Nasr, M. et al. Tight auditing of differentially private machine learning. In 32nd USENIX Security Symposium (USENIX Security 23), 1631\u20131648 (USENIX Association, 2023)."},{"key":"1359_CR44","unstructured":"IEEE Standards Association. Synthetic Data Activity. https:\/\/standards.ieee.org\/industry-connections\/synthetic-data\/ (2024)."},{"key":"1359_CR45","unstructured":"European Commission. Maximising the Potential of Synthetic Data Generation in Healthcare Applications. https:\/\/ec.europa.eu\/info\/funding-tenders\/opportunities\/portal\/screen\/opportunities\/topic-details\/horizon-ju-ihi-2023-05-04 (2024)."},{"key":"1359_CR46","unstructured":"PRISMA. PRISMA for Scoping Reviews. https:\/\/www.prisma-statement.org\/scoping (2018)."},{"key":"1359_CR47","doi-asserted-by":"publisher","unstructured":"Jordon, J. et al. Synthetic data \u2013 what, why and how? CoRRabs\/2205.03257 https:\/\/doi.org\/10.48550\/ARXIV.2205.03257 (2022).","DOI":"10.48550\/ARXIV.2205.03257"},{"key":"1359_CR48","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.3390\/e23091165","volume":"23","author":"K Bhanot","year":"2021","unstructured":"Bhanot, K., Qi, M., Erickson, J. S., Guyon, I. & Bennett, K. P. The problem of fairness in synthetic healthcare data. Entropy 23, 1165 (2021).","journal-title":"Entropy"},{"key":"1359_CR49","doi-asserted-by":"publisher","first-page":"ooac083","DOI":"10.1093\/jamiaopen\/ooac083","volume":"5","author":"K El Emam","year":"2022","unstructured":"El Emam, K., Mosquera, L. & Fang, X. Validating a membership disclosure metric for synthetic health data. JAMIA Open 5, ooac083 (2022).","journal-title":"JAMIA Open"}],"container-title":["npj Digital Medicine"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.nature.com\/articles\/s41746-024-01359-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s41746-024-01359-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s41746-024-01359-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,26]],"date-time":"2025-01-26T23:18:33Z","timestamp":1737933513000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.nature.com\/articles\/s41746-024-01359-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,27]]},"references-count":49,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1359"],"URL":"https:\/\/doi.org\/10.1038\/s41746-024-01359-3","relation":{"has-preprint":[{"id-type":"doi","id":"10.1101\/2023.11.28.23299124","asserted-by":"object"}]},"ISSN":["2398-6352"],"issn-type":[{"value":"2398-6352","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,27]]},"assertion":[{"value":"9 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 November 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"60"}}