{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T05:24:41Z","timestamp":1750397081324,"version":"3.33.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100018693","name":"Horizon Europe","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10825316","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:31:23Z","timestamp":1737052283000},"page":"7104-7109","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing Synthetic Data Generation for Class Imbalance and Privacy Preservation"],"prefix":"10.1109","author":[{"given":"Weijie","family":"Niu","sequence":"first","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics,Z&#x00FC;rich,Switzerland,CH-8050"}]},{"given":"Alberto","family":"Huertas","sequence":"additional","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics,Z&#x00FC;rich,Switzerland,CH-8050"}]},{"given":"Jingjing","family":"Li","sequence":"additional","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics,Z&#x00FC;rich,Switzerland,CH-8050"}]},{"given":"Burkhard","family":"Stiller","sequence":"additional","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics,Z&#x00FC;rich,Switzerland,CH-8050"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref2","article-title":"Modeling tabular data using conditional gan","volume-title":"Advances in neural information processing systems","volume":"32","author":"Xu"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.3389\/fdata.2023.1296508"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ICDM51629.2021.00103"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/3631908.3631909"},{"year":"2024","author":"Li","article-title":"Implementation of b-tgan and b-tpca","key":"ref6"},{"key":"ref7","first-page":"18 932","article-title":"Revisiting deep learning models for tabular data","volume-title":"Advances in Neural Information Processing Systems","volume":"34","author":"Gorishniy"},{"key":"ref8","first-page":"17 564","article-title":"Tabddpm: Modelling tabular data with diffusion models","volume-title":"International Conference on Machine Learning","author":"Kotelnikov"},{"key":"ref9","first-page":"97","article-title":"Ctab-gan: Effective table data synthesizing","volume-title":"Asian Conference on Machine Learning","author":"Zhao"},{"volume-title":"ICLR Workshop on Deep Generative Models for Highly Structured Data","author":"Wen","article-title":"Causal-tgan: Modeling tabular data using causally-aware gan","key":"ref10"},{"key":"ref11","article-title":"Generative adversarial nets","volume-title":"Advances in neural information processing systems","volume":"27","author":"Goodfellow"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref13","article-title":"Adult","volume-title":"UCI Machine Learning Repository","author":"Becker","year":"1996"},{"key":"ref14","article-title":"Covertype","volume-title":"UCI Machine Learning Repository","author":"Blackard","year":"1998"},{"volume-title":"Kaggle Datasets","year":"2018","article-title":"Network Intrusion Detection","key":"ref15"},{"volume-title":"Kaggle Datasets","year":"2017","article-title":"Credit Card Fraud Detection","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1093\/jamia\/ocx084"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","start":{"date-parts":[[2024,12,15]]},"location":"Washington, DC, USA","end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10825316.pdf?arnumber=10825316","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T08:25:31Z","timestamp":1737102331000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10825316\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10825316","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}