{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:16:13Z","timestamp":1766733373799,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/icc.2019.8761070","type":"proceedings-article","created":{"date-parts":[[2019,7,16]],"date-time":"2019-07-16T00:16:31Z","timestamp":1563236191000},"page":"1-6","source":"Crossref","is-referenced-by-count":23,"title":["GAN-DP: Generative Adversarial Net Driven Differentially Privacy-Preserving Big Data Publishing"],"prefix":"10.1109","author":[{"given":"Youyang","family":"Qu","sequence":"first","affiliation":[]},{"given":"Shui","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Jingwen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Huynh Thi Thanh","family":"Binh","sequence":"additional","affiliation":[]},{"given":"Longxiang","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Wanlei","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"L-diversity: Privacy beyond k-anonymity","volume":"1","author":"machanavajjhala","year":"2007","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.139"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1007\/11761679_29","article-title":"Our data, ourselves: Privacy via distributed noise generation","author":"dwork","year":"2006","journal-title":"Advances in Cryptology - EUROCRYPT 2006 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2855740"},{"key":"ref16","first-page":"591","article-title":"Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy","volume":"15","author":"wang","year":"2018","journal-title":"IEEE Trans Dependable Sec Comput"},{"key":"ref17","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Advances in Neural Information Processing Systems 27 Annual Conference on Neural Information Processing Systems 2014"},{"key":"ref18","first-page":"214","article-title":"Wasserstein generative adversarial networks","author":"arjovsky","year":"2017","journal-title":"Proceedings of the 34th International Conference on Machine Learning ICML 2017"},{"key":"ref19","first-page":"4091","article-title":"Triple generative adversarial nets","author":"li","year":"2017","journal-title":"Advances in Neural Information Processing Systems 30 Annual Conference on Neural Information Processing Systems 2017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2485222"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2018.2861775"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2738018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1800112"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2577036"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2571718"},{"year":"2018","key":"ref2","article-title":"Data never sleeps"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aah3449"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2013.6736861"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1310","DOI":"10.1145\/2810103.2813687","article-title":"Privacy-preserving deep learning","author":"shokri","year":"2015","journal-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa9375"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220076"},{"key":"ref23","first-page":"715","article-title":"Differentially private mixture of generative neural networks","author":"\u00e1cs","year":"2017","journal-title":"2017 IEEE International Conference on Data Mining ICDM 2017"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/978-1-4419-5906-5_752","article-title":"Differential privacy","author":"dwork","year":"2011","journal-title":"Encyclopedia of Cryptography and Security"},{"article-title":"UCI machine learning repository","year":"2017","author":"dheeru","key":"ref25"}],"event":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","start":{"date-parts":[[2019,5,20]]},"location":"Shanghai, China","end":{"date-parts":[[2019,5,24]]}},"container-title":["ICC 2019 - 2019 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8753818\/8761046\/08761070.pdf?arnumber=8761070","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:21:52Z","timestamp":1657855312000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8761070\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icc.2019.8761070","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}