{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:54:40Z","timestamp":1773510880064,"version":"3.50.1"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100012338","name":"Alan Turing Institute","doi-asserted-by":"publisher","award":["EP\/N510129\/1"],"award-info":[{"award-number":["EP\/N510129\/1"]}],"id":[{"id":"10.13039\/100012338","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003825","name":"Hungarian Academy of Sciences","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003825","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100009567","name":"Budapest University of Technology and Economics","doi-asserted-by":"crossref","award":["BME FIKP-MI\/FM"],"award-info":[{"award-number":["BME FIKP-MI\/FM"]}],"id":[{"id":"10.13039\/100009567","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001665","name":"French National Research Agency","doi-asserted-by":"crossref","award":["ANR-15-IDEX-02"],"award-info":[{"award-number":["ANR-15-IDEX-02"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2019,6,1]]},"DOI":"10.1109\/tkde.2018.2855136","type":"journal-article","created":{"date-parts":[[2018,7,11]],"date-time":"2018-07-11T19:11:45Z","timestamp":1531336305000},"page":"1109-1121","source":"Crossref","is-referenced-by-count":72,"title":["Differentially Private Mixture of Generative Neural Networks"],"prefix":"10.1109","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4437-0110","authenticated-orcid":false,"given":"Gergely","family":"Acs","sequence":"first","affiliation":[]},{"given":"Luca","family":"Melis","sequence":"additional","affiliation":[]},{"given":"Claude","family":"Castelluccia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7097-6346","authenticated-orcid":false,"given":"Emiliano","family":"De Cristofaro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"1177","article-title":"Random features for large-scale kernel machines","author":"rahimi","year":"2007","journal-title":"Proc 20th Int Conf Neural Inf Process Syst"},{"key":"ref38","first-page":"1846","article-title":"Spherical random features for polynomial kernels","author":"pennington","year":"2015","journal-title":"Proc 28th Int Conf Neural Inf Process Syst"},{"key":"ref33","article-title":"Model-based differential private data synthesis","author":"liu","year":"2016"},{"key":"ref32","first-page":"475","article-title":"Differentially private synthesization of multi-dimensional data using copula functions","author":"li","year":"2014","journal-title":"Proc Intl Conf Extending Database Technology"},{"key":"ref31","article-title":"Discriminatively boosted image clustering with fully convolutional auto-encoders","author":"li","year":"2017"},{"key":"ref30","article-title":"Photo-realistic single image super-resolution using a generative adversarial network","author":"ledig","year":"2016"},{"key":"ref37","article-title":"Semi-supervised knowledge transfer for deep learning from private training data","author":"papernot","year":"2017","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref36","first-page":"535","article-title":"Differential privacy and statistical disclosure risk measures: An investigation with binary synthetic data","volume":"5","author":"mcclure","year":"2012","journal-title":"Trans Data Privacy"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"ref34","first-page":"2579","article-title":"Visualizing data using T-SNE","volume":"9","author":"maaten","year":"2008","journal-title":"J Mach Learn Res"},{"key":"ref60","article-title":"Variational deep embedding: A generative approach to clustering","author":"zheng","year":"2016"},{"key":"ref28","article-title":"Auto-encoding variational bayes","author":"kingma","year":"2014","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref27","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87471-3_20"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref22","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Proc 27th Int Conf Neural Inf Process Syst"},{"key":"ref21","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2745702"},{"key":"ref23","first-page":"2339","article-title":"A simple and practical algorithm for differentially private data release","author":"hardt","year":"2012","journal-title":"Proc 25th Int Conf Neural Inf Process Syst"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.06.013"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2014.272"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.5244\/C.24.2"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1198\/jasa.2009.tm08651"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588573"},{"key":"ref58","article-title":"Semantic image inpainting with perceptual and contextual losses","author":"yeh","year":"2016"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.556"},{"key":"ref56","article-title":"Towards k-means-friendly spaces: Simultaneous deep learning and clustering","author":"yang","year":"2016"},{"key":"ref55","first-page":"478","article-title":"Unsupervised deep embedding for clustering analysis","author":"xie","year":"2016","journal-title":"Proc 33rd Int Conf Int Conf Mach Learn"},{"key":"ref54","first-page":"478","article-title":"Unsupervised deep embedding for clustering analysis","author":"xie","year":"2016","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989348"},{"key":"ref52","article-title":"Differentially private stochastic gradient descent for in-RDBMS analytics","author":"wu","year":"2016"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401904"},{"key":"ref11","first-page":"111","article-title":"Stochastic spectral descent for restricted boltzmann machines","author":"carlson","year":"2015","journal-title":"Proc Int Conf Artif Intell Statist"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v1i1.567"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v2i2.589"},{"key":"ref13","first-page":"1069","article-title":"Differentially private empirical risk minimization","author":"chaudhuri","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1087","DOI":"10.14778\/3402707.3402744","article-title":"Publishing set-valued data via differential privacy","volume":"4","author":"chen","year":"2011","journal-title":"Proc VLDB Endowment"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.61"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014118"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.612"},{"key":"ref18","first-page":"3","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Foundations and Trends\ufffd in Theoretical Computer Science"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2014.56"},{"key":"ref3","first-page":"901","article-title":"On k-anonymity and the curse of dimensionality","author":"aggarwal","year":"2005","journal-title":"Proc Int Conf On Very Large Data Bases"},{"key":"ref6","first-page":"899","article-title":"Generalized denoising auto-encoders as generative models","author":"bengio","year":"2013","journal-title":"Proc 26th Int Conf Neural Inf Process Syst"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1101\/159756"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065184"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14778\/3055540.3055542"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390290"},{"key":"ref9","article-title":"Differentially private data synthesis methods","author":"bowen","year":"2016"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857708"},{"key":"ref48","article-title":"A note on the evaluation of generative models","author":"theis","year":"2015"},{"key":"ref47","article-title":"Lossy image compression with compressive autoencoders","author":"theis","year":"2017"},{"key":"ref42","first-page":"2234","article-title":"Improved techniques for training GANs","author":"salimans","year":"2016","journal-title":"Proc 30th Int Conf Neural Inf Process Syst"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v6i1.635"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"1310","DOI":"10.1145\/2810103.2813687","article-title":"Privacy-preserving deep learning","author":"shokri","year":"2015","journal-title":"Proc ACM SIGSAC Conf Comput Commun Security"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1162\/089976698300017467"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/8703188\/08410021.pdf?arnumber=8410021","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,27]],"date-time":"2022-08-27T07:52:38Z","timestamp":1661586758000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8410021\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,1]]},"references-count":60,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2018.2855136","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,1]]}}}