{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T04:06:45Z","timestamp":1774066005675,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T00:00:00Z","timestamp":1472428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,29]]},"DOI":"10.1145\/2970030.2970034","type":"proceedings-article","created":{"date-parts":[[2016,8,31]],"date-time":"2016-08-31T12:32:08Z","timestamp":1472646728000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["A Genetic Algorithm Approach to Synthetic Data Production"],"prefix":"10.1145","author":[{"given":"Yingrui","family":"Chen","sequence":"first","affiliation":[{"name":"University of Manchester, Manchester"}]},{"given":"Mark","family":"Elliot","sequence":"additional","affiliation":[{"name":"University of Manchester, Manchester"}]},{"given":"Joseph","family":"Sakshaug","sequence":"additional","affiliation":[{"name":"University of Manchester, Manchester"}]}],"member":"320","published-online":{"date-parts":[[2016,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Berlin Heidelberg: Springer. 282--289.","author":"Abowd J. M.","year":"2004","unstructured":"Abowd , J. M. , and Lane , J . 2004 . New approaches to confidentiality protection: Synthetic data, remote access and research data centres. In J. Doming-Ferrer, and V. Torra (eds), Privacy in statistical databases, Berlin Heidelberg: Springer. 282--289. Abowd, J. M., and Lane, J. 2004. New approaches to confidentiality protection: Synthetic data, remote access and research data centres. In J. Doming-Ferrer, and V. Torra (eds), Privacy in statistical databases, Berlin Heidelberg: Springer. 282--289."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Alba P. and Marsili Libelli S. 2000. Adaptive Mutation in Genetic algorithms. Soft computing 4 2 76--78.  Alba P. and Marsili Libelli S. 2000. Adaptive Mutation in Genetic algorithms. Soft computing 4 2 76--78.","DOI":"10.1007\/s005000000042"},{"key":"e_1_3_2_1_3_1","first-page":"1053","article-title":"Comparison of Selection Methods and Crossover Operations using Steady State Genetic Based Intrusion Detection System","volume":"3","author":"Alabsi F.","year":"2012","unstructured":"Alabsi , F. , and Naoum , R. 2012 . Comparison of Selection Methods and Crossover Operations using Steady State Genetic Based Intrusion Detection System . Journal of Emerging Trends in Computing and Information Sciences , 3 , 7, 1053 -- 1058 . Alabsi, F., and Naoum, R. 2012. Comparison of Selection Methods and Crossover Operations using Steady State Genetic Based Intrusion Detection System. Journal of Emerging Trends in Computing and Information Sciences, 3, 7, 1053--1058.","journal-title":"Journal of Emerging Trends in Computing and Information Sciences"},{"key":"e_1_3_2_1_4_1","first-page":"2","article-title":"A Comparison of Selection Schemes used in Genetic Algorithms","volume":"11","author":"Blickle T.","year":"1995","unstructured":"Blickle , T. , and Thiele , L. 1995 . A Comparison of Selection Schemes used in Genetic Algorithms , TIK Report 11 , 2 (December, 1995). DOI=ftp:\/\/129.132.2.212\/pub\/publications\/TIK-Report11.pdf Blickle, T., and Thiele, L. 1995. A Comparison of Selection Schemes used in Genetic Algorithms, TIK Report 11, 2 (December, 1995). DOI=ftp:\/\/129.132.2.212\/pub\/publications\/TIK-Report11.pdf","journal-title":"TIK Report"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/info2030528"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2003.814633"},{"key":"e_1_3_2_1_7_1","volume-title":"2011 Comparison of Parents Selection Methods of Genetic Algorithm for TSP. In International Conference on Computer Communication and Networks CSI-COMNET-2011","author":"Chudasama C.","unstructured":"Chudasama , C. , Shah , S.M. , and Panchal , M . 2011 Comparison of Parents Selection Methods of Genetic Algorithm for TSP. In International Conference on Computer Communication and Networks CSI-COMNET-2011 . 85--87. Chudasama, C., Shah, S.M., and Panchal, M. 2011 Comparison of Parents Selection Methods of Genetic Algorithm for TSP. In International Conference on Computer Communication and Networks CSI-COMNET-2011. 85--87."},{"key":"e_1_3_2_1_8_1","volume-title":"Modern Optimization with R","author":"Cortez P.","unstructured":"Cortez , P. 2014. Modern Optimization with R . New York : Springer . v. Cortez, P. 2014. Modern Optimization with R. New York: Springer. v."},{"key":"e_1_3_2_1_9_1","volume-title":"Dubuque, IA: Kendall Hunt Publishing Company.","author":"Dillard B. L.","year":"2016","unstructured":"Dillard , B. L. , and Gibson , H. R . 2016 . Elementary Statistics ; 4 th Edition. Dubuque, IA: Kendall Hunt Publishing Company. Dillard, B. L., and Gibson, H. R. 2016. Elementary Statistics; 4th Edition. Dubuque, IA: Kendall Hunt Publishing Company.","edition":"4"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1698790.1698811"},{"key":"e_1_3_2_1_11_1","volume-title":"Using support vector machines for generating synthetic datasets. Privacy in Statistical Databases","author":"Drechsler J.","unstructured":"Drechsler , J. 2010. Using support vector machines for generating synthetic datasets. Privacy in Statistical Databases , Berlin Heidelberg : Springer : 148--161. Drechsler, J. 2010. Using support vector machines for generating synthetic datasets. Privacy in Statistical Databases, Berlin Heidelberg: Springer: 148--161."},{"key":"e_1_3_2_1_12_1","volume-title":"UK","author":"Drechsler J.","year":"2014","unstructured":"Drechsler , J. 2014 . Synthetic data, where do we come from? Where do we want to go? Presentation at Synthetic Data Workshop, Office of National Statistics (Titchfield , UK , December, 2014). Drechsler, J. 2014. Synthetic data, where do we come from? Where do we want to go? Presentation at Synthetic Data Workshop, Office of National Statistics (Titchfield, UK, December, 2014)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7802-8"},{"key":"e_1_3_2_1_14_1","first-page":"9","article-title":"Multi-objective optimization using genetic algorithms: A tutorial","volume":"91","author":"Konaka A.","year":"2006","unstructured":"Konaka , A. , Coitb , D. , and Smith , A. 2006 . Multi-objective optimization using genetic algorithms: A tutorial . Reliability Engineering and System Safety , 91 , 9 . 992--1007. Konaka, A., Coitb, D., and Smith, A. 2006. Multi-objective optimization using genetic algorithms: A tutorial. Reliability Engineering and System Safety, 91, 9. 992--1007.","journal-title":"Reliability Engineering and System Safety"},{"key":"e_1_3_2_1_15_1","volume-title":"Statistical Analysis of Masked Data","author":"Little R.","unstructured":"Little , R. 1993. Statistical Analysis of Masked Data ; Journal of Official Statistics , 9, 2. 407--426. Little, R. 1993. Statistical Analysis of Masked Data; Journal of Official Statistics, 9, 2. 407--426."},{"key":"e_1_3_2_1_16_1","volume-title":"O. Maimon and L. Rokach (eds). Data Mining and Knowledge Discovery Handbook.","author":"Torra V.","unstructured":"Torra , V. 2010. Privacy in Data Mining . In O. Maimon and L. Rokach (eds). Data Mining and Knowledge Discovery Handbook. New York : Springer Science & Business Media , 687--716. Torra, V. 2010. Privacy in Data Mining. In O. Maimon and L. Rokach (eds). Data Mining and Knowledge Discovery Handbook. New York: Springer Science & Business Media, 687--716."},{"key":"e_1_3_2_1_17_1","volume-title":"Privacy in Statistical Databases.","author":"Mateo-Sanz J. M.","unstructured":"Mateo-Sanz , J. M. , Mart &iota;nez-Balleste, A., and Domingo-Ferrer , J. 2004. Fast generation of accurate synthetic microdata . In J. Domingo-Ferrer and V. Torra (eds.) Privacy in Statistical Databases. Berlin Heidelberg : Springer . 298--306. Mateo-Sanz, J. M., Mart&iota;nez-Balleste, A., and Domingo-Ferrer, J. 2004. Fast generation of accurate synthetic microdata. In J. Domingo-Ferrer and V. Torra (eds.) Privacy in Statistical Databases. Berlin Heidelberg: Springer. 298--306."},{"key":"e_1_3_2_1_18_1","volume-title":"An Introduction to Genetic Algorithms","author":"Mitchell M.","unstructured":"Mitchell , M. 1998. An Introduction to Genetic Algorithms . Cambridge MA : MIT Press . Mitchell, M. 1998. An Introduction to Genetic Algorithms. Cambridge MA: MIT Press."},{"key":"e_1_3_2_1_19_1","first-page":"3","article-title":"Genetic Algorithms, Tournament Selection, and the Effects of Noise","volume":"9","author":"Miller B.","year":"1995","unstructured":"Miller , B. , and Goldberg , D. 1995 . Genetic Algorithms, Tournament Selection, and the Effects of Noise , Complex Systems , 9 , 3 . 193--212. Miller, B., and Goldberg, D. 1995. Genetic Algorithms, Tournament Selection, and the Effects of Noise, Complex Systems, 9, 3. 193--212.","journal-title":"Complex Systems"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1068\/a38335"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2005.10.005"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/21.286385"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of Automatic Object Recognition IV of SPIE Aerosense; Naval Surface Warfare Center Dahlgren (Virginia.","author":"Wallet B. C.","year":"1996","unstructured":"Wallet , B. C. , Marchette , D. J. , and Solka , J. L . 1996. A matrix Representation for Genetic Algorithms . In Proceedings of Automatic Object Recognition IV of SPIE Aerosense; Naval Surface Warfare Center Dahlgren (Virginia. May , 1996 ). 206--214. Wallet, B. C., Marchette, D. J., and Solka, J. L. 1996. A matrix Representation for Genetic Algorithms. In Proceedings of Automatic Object Recognition IV of SPIE Aerosense; Naval Surface Warfare Center Dahlgren (Virginia. May, 1996). 206--214."},{"key":"e_1_3_2_1_24_1","first-page":"1197","article-title":"An Improved Fast-convergent Genetic Algorithm. In Proceedings of 2003 IEEE International Conference on, Robotics","volume":"2","author":"Wei G.","year":"2003","unstructured":"Wei , G. 2003 . An Improved Fast-convergent Genetic Algorithm. In Proceedings of 2003 IEEE International Conference on, Robotics , Intelligent Systems and Signal Processing , 2 : 1197 -- 1202 . Wei, G. 2003. An Improved Fast-convergent Genetic Algorithm. In Proceedings of 2003 IEEE International Conference on, Robotics, Intelligent Systems and Signal Processing, 2: 1197--1202.","journal-title":"Intelligent Systems and Signal Processing"}],"event":{"name":"PrAISe '16: International Workshop on AI for Privacy and Security","location":"The Hague Netherlands","acronym":"PrAISe '16"},"container-title":["Proceedings of the 1st International Workshop on AI for Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970030.2970034","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970030.2970034","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:00Z","timestamp":1750218600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970030.2970034"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,29]]},"references-count":24,"alternative-id":["10.1145\/2970030.2970034","10.1145\/2970030"],"URL":"https:\/\/doi.org\/10.1145\/2970030.2970034","relation":{},"subject":[],"published":{"date-parts":[[2016,8,29]]},"assertion":[{"value":"2016-08-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}