{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T11:04:22Z","timestamp":1778151862230,"version":"3.51.4"},"reference-count":140,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100006464","name":"Birla Institute of Technology and Science, Pilani","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006464","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3546618","type":"journal-article","created":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T18:51:05Z","timestamp":1740768665000},"page":"40354-40385","source":"Crossref","is-referenced-by-count":25,"title":["Enhancing Data Privacy: A Comprehensive Survey of Privacy-Enabling Technologies"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-5352-6870","authenticated-orcid":false,"given":"Qaiser","family":"Razi","sequence":"first","affiliation":[{"name":"Department of Electrical and Electronics Engineering, Birla Institute of Technology and Science (BITS) Pilani, Pilani Campus, Rajasthan, India"}]},{"given":"Raja","family":"Piyush","sequence":"additional","affiliation":[{"name":"School of Computer Engineering, Kalinga Institute of Industrial Technology (KIIT), Bhubaneswar, Odisha, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4364-7172","authenticated-orcid":false,"given":"Arjab","family":"Chakrabarti","sequence":"additional","affiliation":[{"name":"School of Computer Engineering, Kalinga Institute of Industrial Technology (KIIT), Bhubaneswar, Odisha, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0274-808X","authenticated-orcid":false,"given":"Anushka","family":"Singh","sequence":"additional","affiliation":[{"name":"School of Computer Engineering, Kalinga Institute of Industrial Technology (KIIT), Bhubaneswar, Odisha, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9023-1661","authenticated-orcid":false,"given":"Vikas","family":"Hassija","sequence":"additional","affiliation":[{"name":"School of Computer Engineering, Kalinga Institute of Industrial Technology (KIIT), Bhubaneswar, Odisha, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4087-7208","authenticated-orcid":false,"given":"G. S. S.","family":"Chalapathi","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronics Engineering, Birla Institute of Technology and Science (BITS) Pilani, Pilani Campus, Rajasthan, India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3290237"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.25"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.43"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.37"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2021.3092702"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2866769"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3014246"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3177953"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2773646"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3163752"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2980235"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3297646"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s12553-017-0179-1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.88"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2937640"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CLEI56649.2022.9959918"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2705807"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCCC51823.2021.9478088"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2017.105"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3288901"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2435777"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2952332"},{"issue":"11","key":"ref23","first-page":"1","article-title":"Differential privacy for Bayesian inference through posterior sampling","volume":"18","author":"Dimitrakakis","year":"2017","journal-title":"J. Mach. Learn. Res."},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3051556"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3064896"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3212865"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045700"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2633620"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2020.9010031"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2360516"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2787661"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.13052\/jwe1540-9589.20613"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.48"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.93"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.42"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxu102"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2017.17"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2012.2212281"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2914832"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/348.349"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2010.10.016"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2022.3190741"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2878309"},{"key":"ref45","first-page":"984","article-title":"ARX\u2014A comprehensive tool for anonymizing biomedical data","volume-title":"Proc. AMIA Annu. Symp.","author":"Pra\u00dfer"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v067.i04"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2022.104880"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.158"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.107"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW58674.2023.00028"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.03.014"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2013.2288173"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3208471"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2012.2185850"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2952774"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3229593"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3352146"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2995568"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2020.2980262"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3183201"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2015.2425798"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2702172"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3296781"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2769645"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2020.2963921"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/LSENS.2021.3063326"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2938910"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3064356"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2953715"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2020.3047920"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(10)70006-4"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1641\/1\/012042"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922685"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2385778"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2953300"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.13052\/jwe1540-9589.2151"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/LOCS.2019.2911063"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMMST.2018.8632026"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3101638"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/PDGC.2016.7913249"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN53446.2022.9687160"},{"key":"ref82","volume-title":"What Is.NET Framework?","year":"2024"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2128\/1\/012021"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354228"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3062403"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/LPT.2020.3021797"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2469659"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2021.9381772"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/LPT.2021.3122510"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2012.091712.120269"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3197708"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2973623"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2382590"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3282577"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2586301"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2997725"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3275134"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3310257"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/LSENS.2020.3009179"},{"key":"ref100","article-title":"Generation and simulation of synthetic datasets with copulas","author":"Houssou","year":"2022","journal-title":"arXiv:2203.17250"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref102","article-title":"REaLTabFormer: Generating realistic relational and tabular data using transformers","author":"Solatorio","year":"2023","journal-title":"arXiv:2302.02041"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2017.8285168"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2932750"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ICECET61485.2024.10698494"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2024.3525149"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2017.2698213"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2022.3216793"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2022.3229289"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1016\/S0048-7333(00)00135-9"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2014.2330333"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICCICA52458.2021.9697232"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2012.27"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3230671"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2944748"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2663337"},{"key":"ref117","volume-title":"Synthetic Document Image With Albumentations, Imgaug and Augraphy","year":"2023"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE55969.2022.00016"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pdig.0000082"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2023.3331024"},{"key":"ref121","article-title":"RetailSynth: Synthetic data generation for retail AI systems evaluation","author":"Xia","year":"2023","journal-title":"arXiv:2312.14095"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/3383455.3422554"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3343910"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3002567"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2015.2419371"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2023.3272904"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC60942.2024.10732935"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3041854"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00088"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3073062"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref132","article-title":"Differentially private generative adversarial network","author":"Xie","year":"2018","journal-title":"arXiv:1802.06739"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-09342-5_17"},{"key":"ref134","article-title":"(k,\u03b5)-anonymity: k-anonymity with \u03b5-differential privacy","author":"Holohan","year":"2017","journal-title":"arXiv:1710.01615"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TMLCN.2023.3302811"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2864168"},{"key":"ref137","volume-title":"NVIDIA Releases Open Synthetic Data Generation Pipeline for Training Large Language Models","year":"2025"},{"key":"ref138","article-title":"Synthetic network traffic data generation: A comparative study","author":"Ammara","year":"2024","journal-title":"arXiv:2410.16326"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3058181"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TTS.2021.3073886"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/10908383.pdf?arnumber=10908383","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T04:54:25Z","timestamp":1741668865000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10908383\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":140,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3546618","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}