{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T21:31:23Z","timestamp":1764192683367,"version":"3.40.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3549680","type":"journal-article","created":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T17:43:22Z","timestamp":1741628602000},"page":"44497-44509","source":"Crossref","is-referenced-by-count":2,"title":["Utility Meets Privacy: A Critical Evaluation of Tabular Data Synthesizers"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3689-3328","authenticated-orcid":false,"given":"Julian","family":"H\u00f6llig","sequence":"first","affiliation":[{"name":"Research Institute CODE, University of the Bundeswehr Munich, Neubiberg, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8180-5606","authenticated-orcid":false,"given":"Michaela","family":"Geierhos","sequence":"additional","affiliation":[{"name":"Research Institute CODE, University of the Bundeswehr Munich, Neubiberg, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"volume-title":"Identity Theft Resource Center 2023 Annual Data Breach Report Reveals Record Number of Compromises; 72 Percent Increase Over Previous High","year":"2024","key":"ref1"},{"volume-title":"REGULATION (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons With Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95\/46\/EC (General Data Protection Regulation)","year":"2016","key":"ref2"},{"issue":"250","key":"ref3","first-page":"82462","article-title":"Standards for privacy of individually identifiable health information","volume":"65","year":"2000","journal-title":"Dept. Health Hum. Services, Office of the Secretary, Federal Register"},{"volume-title":"California Consumer Privacy Act (CCPA)","year":"2024","author":"Bonta","key":"ref4"},{"volume-title":"Artificial Intelligence in Health Care: Benefits and Challenges of Machine Learning in Drug Development","year":"2019","author":"Persons","key":"ref5"},{"article-title":"Artificial intelligence in healthcare, applications, risks, and ethical and societal impacts","year":"2022","author":"Lekadi","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107687"},{"key":"ref8","article-title":"Synthetic data for social good","author":"Howe","year":"2017","journal-title":"arXiv:1710.08874"},{"issue":"2","key":"ref9","first-page":"461","article-title":"Statistical disclosure limitation (SDL)","volume":"9","author":"Rubin","year":"1993","journal-title":"J. Official Statist."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-7447-2_43"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/dsaa.2016.49"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2196\/16492"},{"issue":"1","key":"ref13","first-page":"559","article-title":"Imbalanced-learn: A Python toolbox to tackle the curse of imbalanced datasets in machine learning","volume":"18","author":"Lema\u00eetre","year":"2017","journal-title":"J. Mach. Learn. Res."},{"volume-title":"MCGEN-Private-Synthetic-Data-Generator","year":"2023","author":"Li","key":"ref14"},{"volume-title":"DPART | Differentially Private Auto-Regressive Tabular","year":"2023","author":"Mahiou","key":"ref15"},{"volume-title":"ARF","year":"2023","author":"Watson","key":"ref16"},{"key":"ref17","article-title":"CorGAN: Correlation-capturing convolutional generative adversarial networks for generating synthetic healthcare records","author":"Torfi","year":"2020","journal-title":"arXiv:2001.09346"},{"volume-title":"Jfcrenshaw\/Pzflow: V3.1.3","year":"2024","author":"Crenshaw","key":"ref18"},{"article-title":"Language models are realistic tabular data generators","volume-title":"Proc. 11th Int. Conf. Learn. Represent.","author":"Borisov","key":"ref19"},{"key":"ref20","first-page":"5357","article-title":"Adversarial random forests for density estimation and generative modeling","volume-title":"Proc. 26th Int. Conf. Artif. Intell. Statist.","volume":"206","author":"Watson"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i7.20697"},{"key":"ref22","article-title":"TabuLa: Harnessing language models for tabular data synthesis","author":"Zhao","year":"2023","journal-title":"arXiv:2310.12746"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3339281"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/app11052158"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.110239"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3144765"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"ref28","first-page":"335","article-title":"CorGAN: Correlation-capturing convolutional generative adversarial networks for generating synthetic healthcare records","volume-title":"Proc. 33rd Int. Florida Artif. Intell. Res. Soc. Conf.","author":"Torfi"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2767007"},{"volume-title":"Your Machine Learning and Data Science Community","year":"2024","key":"ref30"},{"volume-title":"The UCI Machine Learning Repository","year":"2024","author":"Kelly","key":"ref31"},{"issue":"4","key":"ref32","first-page":"589","article-title":"Disclosure risk and data utility for partially synthetic data: An empirical study using the German IAB establishment survey","volume":"25","author":"Drechsler","year":"2009","journal-title":"J. Off. Statist."},{"volume-title":"Utility of Synthetic Microdata Generated Using Tree-based Methods","year":"2015","author":"Nowok","key":"ref33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1186\/s12874-020-00977-1"},{"key":"ref35","article-title":"Utility assessment of synthetic data generation methods","author":"Khan","year":"2022","journal-title":"arXiv:2211.14428"},{"issue":"1","key":"ref36","first-page":"1","article-title":"The impact of synthetic data generation on data utility with application to the 1991 UK samples of anonymised records","volume":"13","author":"Taub","year":"2020","journal-title":"Trans. Data Privacy"},{"issue":"3","key":"ref37","first-page":"105","article-title":"Comparing fully and partially synthetic datasets for statistical disclosure control in the German IAB establishment panel","volume":"1","author":"Drechsler","year":"2008","journal-title":"Trans. Data Privacy"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.2196\/18910"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/tai.2022.3229289"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3134428"},{"key":"ref42","first-page":"209","article-title":"Using CART to generate partially synthetic public use microdata","volume":"21","author":"Reiter","year":"2005","journal-title":"J. Off. Statist."},{"key":"ref43","first-page":"7335","article-title":"Modeling tabular data using conditional GAN","volume-title":"Adv. Neural Inf. Proc. Syst.","volume":"32","author":"Xu","year":"2019"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2011.06.006"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/bigcomp60711.2024.00020"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/10918632.pdf?arnumber=10918632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T17:47:30Z","timestamp":1742233650000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10918632\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3549680","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}