{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:26:14Z","timestamp":1773512774224,"version":"3.50.1"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["H2020-871042"],"award-info":[{"award-number":["H2020-871042"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"name":"ICREA Acad&#x00E8;mia Prize to J. Domingo-Ferrer","award":["2021 SGR 00115"],"award-info":[{"award-number":["2021 SGR 00115"]}]},{"name":"ICREA Acad&#x00E8;mia Prize to J. Domingo-Ferrer","award":["MCIN\/AEI\/10.13039\/501100011033"],"award-info":[{"award-number":["MCIN\/AEI\/10.13039\/501100011033"]}]},{"name":"ERDF A way of making Europe","award":["PID2021-123637NB-I00"],"award-info":[{"award-number":["PID2021-123637NB-I00"]}]},{"DOI":"10.13039\/501100013410","name":"Instituto Nacional de Ciberseguridad","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100013410","id-type":"DOI","asserted-by":"publisher"}]},{"name":"European Union NextGenerationEU\/PRTR"},{"name":"INCIBE-URV Cybersecurity Chair"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1109\/tdsc.2024.3525149","type":"journal-article","created":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T19:46:08Z","timestamp":1735847168000},"page":"3155-3165","source":"Crossref","is-referenced-by-count":5,"title":["Synthetic Data Generation via the Permutation Paradigm With Optional k-Anonymity"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7213-4962","authenticated-orcid":false,"given":"Josep","family":"Domingo-Ferrer","sequence":"first","affiliation":[{"name":"CYBERCAT-Center for Cybersecurity Research of Catalonia Department of Computer Engineering and Mathematics, Universitat Rovira i Virgili, Tarragona, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7239-7356","authenticated-orcid":false,"given":"Krishnamurty","family":"Muralidhar","sequence":"additional","affiliation":[{"name":"Price College of Business, University of Oklahoma, Norman, OK, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3941-5348","authenticated-orcid":false,"given":"Sergio","family":"Mart\u00ednez","sequence":"additional","affiliation":[{"name":"CYBERCAT-Center for Cybersecurity Research of Catalonia Department of Computer Engineering and Mathematics, Universitat Rovira i Virgili, Tarragona, Spain"}]}],"member":"263","reference":[{"key":"ref1","article-title":"One step to efficient synthetic data","author":"Awan","year":"2022"},{"key":"ref2","article-title":"Adult income data set","author":"Becker","year":"1996"},{"key":"ref3","article-title":"Reference data sets to test and compare SDC methods for protection of numerical microdata","author":"Brand","year":"2002"},{"key":"ref4","article-title":"Synthetic data for official statistics: A starter guide","author":"Burnett-Isaacs","year":"2022"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025658621216"},{"key":"ref6","article-title":"Modeling and generating random vectors with arbitrary marginal distributions and correlation matrix","author":"Cario","year":"1997"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33627-0_12"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/69.979982"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.12.014"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2968027"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3433638"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.04.021"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-005-0007-5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0326-5"},{"key":"ref16","article-title":"Neural spline flows","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Durkan"},{"key":"ref17","first-page":"703","article-title":"Differential privacy for functions and functional data","volume":"14","author":"Hall","year":"2013","journal-title":"J. Mach. Learn. Res."},{"key":"ref18","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Ho"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/9781118348239"},{"key":"ref20","article-title":"PATE-GAN: Generating synthetic data with differential privacy guarantees","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Jordon"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/wics.1256"},{"key":"ref22","first-page":"10236","article-title":"Glow: Generative flow with invertible 1x1 convolutions","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Kingma"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1958.10501481"},{"key":"ref24","volume-title":"Simulation Modeling and Analysis","author":"Law","year":"2015"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3979.4017"},{"key":"ref26","article-title":"Model-based differentially private data synthesis and statistical inference in multiply synthetic differentially private data","author":"Liu","year":"2021"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25955-8_24"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11257-2_25"},{"issue":"3","key":"ref30","first-page":"535","article-title":"Differential privacy and statistical disclosure risk measures: An investigation with binary synthetic data","volume":"5","author":"McClure","year":"2012","journal-title":"Trans. Data Privacy"},{"key":"ref31","article-title":"Researchers finally get access to data on Facebook\u2019s role in political disclosure","author":"Mervis","year":"2020","journal-title":"Science"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025610705286"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1050.0503"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v074.i11"},{"issue":"1","key":"ref35","first-page":"1","article-title":"Multiple imputation for statistical disclosure limitation","volume":"19","author":"Raghunathan","year":"2003","journal-title":"J. Official Statist."},{"issue":"3","key":"ref36","first-page":"441","article-title":"Using CART to generate partially synthetic public use microdata","volume":"21","author":"Reiter","year":"2005","journal-title":"J. Official Statist."},{"issue":"2","key":"ref37","first-page":"461","article-title":"Statistical disclosure limitation","volume":"9","author":"Rubin","year":"1993","journal-title":"J. Official Statist."},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.48.12.1613.439"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1111\/rssa.12358"},{"key":"ref40","article-title":"Denoising diffusion implicit models","author":"Song","year":"2020"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2017.97"},{"key":"ref42","article-title":"Generating differentially private data sets using GANs","author":"Triastcyn","year":"2018"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v1i1.568"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2897874"},{"key":"ref45","first-page":"7335","article-title":"Modeling tabular data using conditional GAN","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Xu"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3134428"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/10992672\/10820070.pdf?arnumber=10820070","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T03:17:16Z","timestamp":1747797436000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10820070\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":46,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2024.3525149","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5]]}}}