{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T05:59:38Z","timestamp":1763445578102,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,10]],"date-time":"2022-11-10T00:00:00Z","timestamp":1668038400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,10]],"date-time":"2022-11-10T00:00:00Z","timestamp":1668038400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,10]]},"DOI":"10.1109\/asonam55673.2022.10068615","type":"proceedings-article","created":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T13:38:09Z","timestamp":1679578689000},"page":"293-297","source":"Crossref","is-referenced-by-count":6,"title":["Using Synthetic Data to Reduce Model Convergence Time in Federated Learning"],"prefix":"10.1109","author":[{"given":"Fida K.","family":"Dankar","sequence":"first","affiliation":[{"name":"NYUAD,Computer Science program,Abu Dhabi,UAE"}]},{"given":"Nisha","family":"Madathil","sequence":"additional","affiliation":[{"name":"UAEU,Information Systems and Security,Al Ain,UAE"}]}],"member":"263","reference":[{"journal-title":"Could Synthetic Data Be the Future of Data Sharing","year":"0","author":"el emam","key":"ref13"},{"journal-title":"Synthesizing Tabular Data using Conditional GAN","year":"2020","author":"lei","key":"ref12"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1910.12191"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99771-1_5"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14778\/3231751.3231757"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3338466.3358926"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1602.05629"},{"key":"ref17","article-title":"Utility of synthetic microdata generated using tree-based methods","author":"nowok","year":"2015","journal-title":"UNECE Stat Data Confidentiality Work Sess"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.12.007"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/app11052158"},{"key":"ref18","article-title":"An introduction to classification and regression tree (CART) analysis","volume":"14","author":"lewis","year":"2000","journal-title":"Annual Meeting of the Society for Academic Emergency Medicine in San Francisco"},{"journal-title":"data world | The Cloud-Native Data Catalog","year":"0","key":"ref24"},{"journal-title":"Kaggle Your machine learning and data science community","year":"0","key":"ref23"},{"journal-title":"Federated Regression Analysis on Personal Data Stores","year":"2021","author":"van aarle","key":"ref26"},{"journal-title":"Real-World Data solution Cerner","year":"0","key":"ref25"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3144765"},{"journal-title":"UCI Machine Learning Repository","year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocaa249"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v074.i11","article-title":"synthpop: Bespoke creation of synthetic data in R","volume":"74","author":"nowok","year":"2016","journal-title":"J Stat Softw"},{"key":"ref8","first-page":"5132","article-title":"SCAFFOLD: Stochastic Controlled Averaging for Federated Learning","author":"karimireddy","year":"2020","journal-title":"Proceedings of the 37th International Conference on Machine Learning"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2106.10874"},{"journal-title":"Bayesian Estimation of Attribute and Identification Disclosure Risks in Synthetic Data","year":"0","author":"hu","key":"ref9"},{"journal-title":"Privacy-preserving statistical analysis using secure multi-party computation","year":"2015","author":"kamm","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2953131"},{"journal-title":"Using Robust Estimation Theory to Design Efficient Secure Multiparty Linear Regression","year":"0","author":"dankar","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2196\/12702"}],"event":{"name":"2022 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","start":{"date-parts":[[2022,11,10]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2022,11,13]]}},"container-title":["2022 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10068562\/10068565\/10068615.pdf?arnumber=10068615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T13:33:16Z","timestamp":1681738396000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10068615\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,10]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/asonam55673.2022.10068615","relation":{},"subject":[],"published":{"date-parts":[[2022,11,10]]}}}