{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T03:43:34Z","timestamp":1777520614306,"version":"3.51.4"},"reference-count":92,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Emerg. Sel. Topics Circuits Syst."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/jetcas.2024.3477976","type":"journal-article","created":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T17:23:35Z","timestamp":1728581015000},"page":"1-1","source":"Crossref","is-referenced-by-count":7,"title":["Auditing and Generating Synthetic Data with Controllable Trust Trade-offs"],"prefix":"10.1109","author":[{"given":"Brian","family":"Belgodere","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5688-6005","authenticated-orcid":false,"given":"Pierre","family":"Dognin","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Ivankay","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Melnyk","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8798-1267","authenticated-orcid":false,"given":"Youssef","family":"Mroueh","sequence":"additional","affiliation":[]},{"given":"Aleksandra","family":"Mojsilovic","sequence":"additional","affiliation":[]},{"given":"Jiri","family":"Navratil","sequence":"additional","affiliation":[]},{"given":"Apoorva","family":"Nitsure","sequence":"additional","affiliation":[]},{"given":"Inkit","family":"Padhi","sequence":"additional","affiliation":[]},{"given":"Mattia","family":"Rigotti","sequence":"additional","affiliation":[]},{"given":"Jerret","family":"Ross","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0748-3706","authenticated-orcid":false,"given":"Yair","family":"Schiff","sequence":"additional","affiliation":[]},{"given":"Radhika","family":"Vedpathak","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0240-8224","authenticated-orcid":false,"given":"Richard A.","family":"Young","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594083"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3522664.3528600"},{"key":"ref3","first-page":"1","article-title":"Black-box adversarial entry in finance through credit card fraud detection","volume-title":"Proc. CIKM Workshops","author":"Agarwal"},{"key":"ref4","first-page":"1","article-title":"Trade-offs between fairness and privacy in machine learning","volume-title":"Proc. IJCAI Workshop AI Social Good","author":"Agarwal"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.eacl-main.75"},{"key":"ref6","first-page":"290","article-title":"How faithful is your synthetic data? Sample-level metrics for evaluating and auditing generative models","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Alaa"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3490354.3494378"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2019.2942288"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i11.21540"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3383455.3422554"},{"key":"ref11","article-title":"Synthetic data from diffusion models improves imageNet classification","author":"Azizi","year":"2023","journal-title":"Trans. Mach. Learn. Res."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1021\/acs.jcim.1c00600"},{"key":"ref13","article-title":"Imperceptible adversarial attacks on tabular data","volume-title":"Proc. NeurIPS Workshop Robust AI Financial Services, Data, Fairness, Explainability, Trustworthiness Privacy (Robust AI FS)","author":"Ballet"},{"key":"ref14","volume-title":"Fairness Maching Learning: Limitations Opportunities","author":"Barocas","year":"2019"},{"key":"ref15","article-title":"AI fairness 360: An extensible toolkit for detecting, understanding, and mitigating unwanted algorithmic bias","author":"Bellamy","year":"2018","journal-title":"arXiv:1810.01943"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/e23091165"},{"key":"ref17","article-title":"On the opportunities and risks of foundation models","author":"Bommasani","year":"2021","journal-title":"arXiv:2108.07258"},{"key":"ref18","article-title":"Large scale GAN training for high fidelity natural image synthesis","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Brock"},{"key":"ref19","first-page":"1877","article-title":"Language models are few-shot learners","volume-title":"Proc. Neural Inf. Process. Syst.","volume":"33","author":"Brown"},{"key":"ref20","first-page":"77","article-title":"Gender shades: Intersectional accuracy disparities in commercial gender classification","volume-title":"Proc. 1st Conf. Fairness, Accountability Transparency","volume":"81","author":"Buolamwini"},{"key":"ref21","article-title":"A data augmentation perspective on diffusion models and retrieval","author":"Burg","year":"2023","journal-title":"arXiv:2304.10253"},{"key":"ref22","article-title":"Optimized pre-processing for discrimination prevention","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Calmon"},{"key":"ref23","first-page":"2633","article-title":"Extracting training data from large language models","volume-title":"Proc. USENIX Secur. Symp.","volume":"6","author":"Carlini"},{"key":"ref24","article-title":"Adversarial attacks for tabular data: Application to fraud detection and imbalanced data","author":"Cartella","year":"2021","journal-title":"arXiv:2101.08030"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3185773"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417238"},{"key":"ref27","article-title":"Why is my classifier discriminatory?","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"31","author":"Chen"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1038\/s41551-021-00751-8"},{"key":"ref29","first-page":"1887","article-title":"Fair generative modeling via weak supervision","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Choi"},{"key":"ref30","article-title":"Deep reinforcement learning from human preferences","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Christiano"},{"key":"ref31","article-title":"Fair mixup: Fairness via interpolation","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Chuang"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/s19051181"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref34","first-page":"8780","article-title":"Diffusion models beat GANs on image synthesis","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Dhariwal"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cageo.2016.10.008"},{"key":"ref37","volume-title":"Recruitement Dataset","year":"2020"},{"key":"ref38","volume-title":"Gartner","year":"2022"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3458723"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s11205-017-1832-9"},{"issue":"1","key":"ref41","first-page":"723","article-title":"A kernel two-sample test","volume":"13","author":"Gretton","year":"2012","journal-title":"J. Mach. Learn. Res."},{"key":"ref42","article-title":"A systematic study of bias amplification","author":"Hall","year":"2022","journal-title":"arXiv:2201.11706"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1017\/S1537592707070065"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref45","first-page":"6626","article-title":"GANs trained by a two time-scale update rule converge to a local Nash equilibrium","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Heusel"},{"key":"ref46","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Ho"},{"key":"ref47","article-title":"A framework for auditable synthetic data generation","author":"Houssiau","year":"2022","journal-title":"arXiv:2211.11540"},{"key":"ref48","article-title":"TAPAS: A toolbox for adversarial privacy auditing of synthetic data","author":"Houssiau","year":"2022","journal-title":"arXiv:2211.06550"},{"key":"ref49","volume-title":"Snippets Auditing Workflows","year":"2023"},{"key":"ref50","first-page":"22205","article-title":"Auditing differentially private machine learning: How private is private SGD?","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Jagielski"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-49461-2_30"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2016.35"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.3390\/jintelligence9030046"},{"key":"ref54","first-page":"1403","article-title":"A witness two-sample test","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"K\u00fcbler"},{"key":"ref55","first-page":"3929","article-title":"Improved precision and recall metric for assessing generative models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Kynk\u00e4\u00e4nniemi"},{"key":"ref56","first-page":"146","article-title":"Discrete adversarial attacks and submodular optimization with applications to text classification","volume-title":"Proc. Mach. Learn. Syst.","volume":"1","author":"Lei"},{"key":"ref57","article-title":"Large language models can be strong differentially private learners","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Li"},{"key":"ref58","article-title":"Holistic evaluation of language models","author":"Liang","year":"2022","journal-title":"arXiv:2211.09110"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/S2589-7500(22)00003-6"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1093\/bib\/bbac409"},{"key":"ref61","article-title":"Differentially private decoding in large language models","author":"Majmudar","year":"2022","journal-title":"arXiv:2205.13621"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108377"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.778"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-11012-2"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287596"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s11023-022-09612-y"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-023-00289-2"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2014.03.001"},{"key":"ref69","article-title":"Adversarial robustness toolbox v1.0.0","author":"Nicolae","year":"2018","journal-title":"arXiv:1807.01069"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414142"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.49"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-acl.847"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198296034.001.0001"},{"key":"ref74","article-title":"Synthcity: Facilitating innovative use cases of synthetic data in different data modalities","author":"Qian","year":"2023","journal-title":"arXiv:2301.07573"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372873"},{"key":"ref76","article-title":"Hierarchical text-conditional image generation with CLIP latents","author":"Ramesh","year":"2022","journal-title":"arXiv:2204.06125"},{"key":"ref77","first-page":"28983","article-title":"Differentially private sampling from distributions","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Raskhodnikova"},{"key":"ref78","first-page":"5389","article-title":"Do imageNet classifiers generalize to imageNet?","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Recht"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1038\/s41597-021-01110-7"},{"key":"ref80","first-page":"35894","article-title":"Fair infinitesimal jackknife: Mitigating the influence of biased training data points without refitting","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"35","author":"Sattigeri"},{"key":"ref81","article-title":"Robust learning meets generative models: Can proxy distributions improve adversarial robustness?","author":"Sehwag","year":"2021","journal-title":"arXiv:2104.09425"},{"key":"ref82","article-title":"On accurate evaluation of GANs for language generation","author":"Semeniuta","year":"2018","journal-title":"arXiv:1806.04936"},{"key":"ref83","first-page":"2256","article-title":"Deep unsupervised learning using nonequilibrium thermodynamics","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Sohl-Dickstein"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.4324\/9780203449721"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-021-09568-9"},{"key":"ref86","article-title":"Membership inference attacks against synthetic data through overfitting detection","author":"van Breugel","year":"2023","journal-title":"arXiv:2302.12580"},{"key":"ref87","article-title":"On provable copyright protection for generative models","author":"Vyas","year":"2023","journal-title":"arXiv:2302.10870"},{"key":"ref88","article-title":"LSAC national longitidunal bar passage study","author":"Wightman","year":"1998"},{"key":"ref89","article-title":"Differentially private generative adversarial network","author":"Xie","year":"2018","journal-title":"arXiv:1802.06739"},{"issue":"1","key":"ref90","first-page":"1613","article-title":"Greedy attack and Gumbel attack: Generating adversarial examples for discrete data","volume":"21","author":"Yang","year":"2020","journal-title":"J. Mach. Learn. Res."},{"key":"ref91","first-page":"1","article-title":"PATE-GAN: Generating synthetic data with differential privacy guarantees","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Yoon"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278779"}],"container-title":["IEEE Journal on Emerging and Selected Topics in Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/5503868\/5751207\/10713321.pdf?arnumber=10713321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T06:54:28Z","timestamp":1734159268000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10713321\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":92,"URL":"https:\/\/doi.org\/10.1109\/jetcas.2024.3477976","relation":{},"ISSN":["2156-3357","2156-3365"],"issn-type":[{"value":"2156-3357","type":"print"},{"value":"2156-3365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}