{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:18:55Z","timestamp":1760710735160,"version":"3.37.3"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,12]],"date-time":"2021-07-12T00:00:00Z","timestamp":1626048000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,12]],"date-time":"2021-07-12T00:00:00Z","timestamp":1626048000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,12]],"date-time":"2021-07-12T00:00:00Z","timestamp":1626048000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006778","name":"Georgia Institute of Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006778","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,12]]},"DOI":"10.1109\/iisa52424.2021.9555521","type":"proceedings-article","created":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:35:02Z","timestamp":1633908902000},"page":"1-9","source":"Crossref","is-referenced-by-count":6,"title":["Differentially Private Synthetic Mixed-Type Data Generation For Unsupervised Learning"],"prefix":"10.1109","author":[{"given":"Uthaipon Tao","family":"Tantipongpipat","sequence":"first","affiliation":[]},{"given":"Chris","family":"Waites","sequence":"additional","affiliation":[]},{"given":"Digvijay","family":"Boob","sequence":"additional","affiliation":[]},{"given":"Amaresh Ankit","family":"Siva","sequence":"additional","affiliation":[]},{"given":"Rachel","family":"Cummings","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Advances in Neural Information Processing Systems 27 ser NIPS&#x2019;14"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1946.0056"},{"key":"ref30","first-page":"2234","article-title":"Improved techniques for training GANs","author":"salimans","year":"2016","journal-title":"Advances in Neural Information Processing Systems 29 ser NIPS&#x2019;16"},{"key":"ref10","first-page":"510","article-title":"Privacy preserving synthetic data release using deep learning","volume":"11051","author":"abay","year":"2018","journal-title":"Machine Learning and Knowledge Discovery in Databases (ECML PKDD&#x2019;18) ser Lecture Notes in Computer Science"},{"key":"ref11","article-title":"Differentially private data generative models","author":"chen","year":"2018","journal-title":"arXiv preprint 1812 02274"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2016.35"},{"journal-title":"UCI Machine Learning Repository","year":"2017","author":"dua","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22312-0_11"},{"key":"ref15","article-title":"Differentially private generative adversarial network","author":"xie","year":"2018","journal-title":"arXiv preprint 1802 06739"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2855136"},{"key":"ref17","first-page":"2339","article-title":"A simple and practical algorithm for differentially private data release","author":"hardt","year":"2012","journal-title":"Advances in Neural Information Processing Systems 25 ser NIPS&#x2019;12"},{"key":"ref18","first-page":"1170","article-title":"Dual query: Practical private query release for high dimensional data","author":"gaboardi","year":"2014","journal-title":"Proceedings of the 31st International Conference on Machine Learning ser ICML&#x2019;14"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3134428"},{"key":"ref28","first-page":"286","article-title":"Generating multi-label discrete patient records using generative adversarial networks","author":"choi","year":"2017","journal-title":"Proceedings of Machine Learning for Healthcare"},{"key":"ref4","first-page":"267","article-title":"The secret sharer: Evaluating and testing unintended memorization in neural networks","author":"carlini","year":"2019","journal-title":"Proceedings of the 28th USENIX Security Symposium ser USENIX Security&#x2019;19"},{"journal-title":"Tensorflow Privacy","year":"2018","key":"ref27"},{"key":"ref3","first-page":"1701","article-title":"Broken promises of privacy: Responding to the surprising failure of anonymization","volume":"57","author":"ohm","year":"2010","journal-title":"UCLA Law Review"},{"key":"ref6","first-page":"33","article-title":"Generating artificial data for private deep learning","author":"triastcyn","year":"2018","journal-title":"Proceedings of the PAL Privacy-Enhancing Artificial Intelligence and Language Technologies ser PAL&#x2019;18"},{"key":"ref29","first-page":"15 479","article-title":"Differential privacy has disparate impact on model accuracy","author":"bagdasaryan","year":"2019","journal-title":"Advances in Neural Information Processing Systems 32 ser NeurIPS&#x2019;19"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.85"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374464"},{"journal-title":"A Face is Exposed for AOL Searcher no 4417749","year":"2006","author":"barbaro","key":"ref2"},{"key":"ref9","article-title":"Auto-encoding variational bayes","author":"kingma","year":"2013","journal-title":"arXiv preprintarXiv 1312 6114"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"ref20","first-page":"42:1","article-title":"DataSynthesizer: Privacypreserving synthetic datasets","author":"ping","year":"2017","journal-title":"Proceedings of the 29th International Conference on Scientific and Statistical Database Management ser SSDBM&#x2019;17"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref21","first-page":"95","article-title":"A review of synthetic data generation methods for privacy preserving data publishing","volume":"6","author":"surendra","year":"2017","journal-title":"International Journal of Scientific and Technology"},{"key":"ref24","first-page":"896","article-title":"DP-EM: Differentially Private Expectation Maximization","author":"park","year":"2017","journal-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics ser AISTATS&#x2019;17"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.11"},{"key":"ref26","article-title":"Wasserstein GAN","author":"arjovsky","year":"2017","journal-title":"arXiv preprint 1701 07875"},{"key":"ref25","article-title":"Differentially private releasing via deep generative model (technical report)","author":"zhang","year":"2018","journal-title":"arXiv preprint 1801 01594"}],"event":{"name":"2021 12th International Conference on Information, Intelligence, Systems & Applications (IISA)","start":{"date-parts":[[2021,7,12]]},"location":"Chania Crete, Greece","end":{"date-parts":[[2021,7,14]]}},"container-title":["2021 12th International Conference on Information, Intelligence, Systems &amp; Applications (IISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9555494\/9555495\/09555521.pdf?arnumber=9555521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:47:02Z","timestamp":1652197622000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9555521\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,12]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/iisa52424.2021.9555521","relation":{},"subject":[],"published":{"date-parts":[[2021,7,12]]}}}