{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:10:12Z","timestamp":1771701012428,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,27]],"date-time":"2017-06-27T00:00:00Z","timestamp":1498521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000936","name":"Gordon and Betty Moore Foundation","doi-asserted-by":"publisher","award":["2013-10-29"],"award-info":[{"award-number":["2013-10-29"]}],"id":[{"id":"10.13039\/100000936","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000879","name":"Alfred P. Sloan Foundation","doi-asserted-by":"publisher","award":["3835"],"award-info":[{"award-number":["3835"]}],"id":[{"id":"10.13039\/100000879","id-type":"DOI","asserted-by":"publisher"}]},{"name":"United States-Israel Binational Science Foundation","award":["2014391"],"award-info":[{"award-number":["2014391"]}]},{"name":"University of Washington Information School"},{"DOI":"10.13039\/100006112","name":"Microsoft","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006112","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1464327, 1539856"],"award-info":[{"award-number":["1464327, 1539856"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,27]]},"DOI":"10.1145\/3085504.3091117","type":"proceedings-article","created":{"date-parts":[[2017,6,5]],"date-time":"2017-06-05T12:50:05Z","timestamp":1496667005000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":114,"title":["DataSynthesizer"],"prefix":"10.1145","author":[{"given":"Haoyue","family":"Ping","sequence":"first","affiliation":[{"name":"Drexel University, USA"}]},{"given":"Julia","family":"Stoyanovich","sequence":"additional","affiliation":[{"name":"Drexel University, USA"}]},{"given":"Bill","family":"Howe","sequence":"additional","affiliation":[{"name":"University of Washington, USA and University of Washington Information School, Microsoft"}]}],"member":"320","published-online":{"date-parts":[[2017,6,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Machine Bias. ProPublica (23","author":"Angwin Julia","year":"2016","unstructured":"Julia Angwin , Jeff Larson , Surya Mattu , and Lauren Kirchner . 2016. Machine Bias. ProPublica (23 May 2016 ). https:\/\/www.propublica.org\/article\/machine-bias-risk-assessments-in-criminal-sentencing Julia Angwin, Jeff Larson, Surya Mattu, and Lauren Kirchner. 2016. Machine Bias. ProPublica (23 May 2016). https:\/\/www.propublica.org\/article\/machine-bias-risk-assessments-in-criminal-sentencing"},{"key":"e_1_3_2_1_2_1","volume-title":"Bhardwaj and others","author":"Anant","year":"2015","unstructured":"Anant P. Bhardwaj and others . 2015 . DataHub: Collaborative Data Science & Dataset Version Management at Scale. In CIDR. Anant P. Bhardwaj and others. 2015. DataHub: Collaborative Data Science & Dataset Version Management at Scale. In CIDR."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882931"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882957"},{"key":"e_1_3_2_1_6_1","unstructured":"M. Lichman. 2013. UCI Machine Learning Repository. (2013). http:\/\/archive.ics.uci.edu\/ml  M. Lichman. 2013. UCI Machine Learning Repository. (2013). http:\/\/archive.ics.uci.edu\/ml"},{"key":"e_1_3_2_1_7_1","unstructured":"Wentian Lu and others. 2014. Generating private synthetic databases for untrusted system evaluation. In ICDE.  Wentian Lu and others. 2014. Generating private synthetic databases for untrusted system evaluation. In ICDE."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588573"}],"event":{"name":"SSDBM '17: 29th International Conference on Scientific and Statistical Database Management","location":"Chicago IL USA","acronym":"SSDBM '17","sponsor":["Northwestern University Northwestern University"]},"container-title":["Proceedings of the 29th International Conference on Scientific and Statistical Database Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3085504.3091117","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3085504.3091117","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3085504.3091117","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:36:57Z","timestamp":1750282617000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3085504.3091117"}},"subtitle":["Privacy-Preserving Synthetic Datasets"],"short-title":[],"issued":{"date-parts":[[2017,6,27]]},"references-count":8,"alternative-id":["10.1145\/3085504.3091117","10.1145\/3085504"],"URL":"https:\/\/doi.org\/10.1145\/3085504.3091117","relation":{},"subject":[],"published":{"date-parts":[[2017,6,27]]},"assertion":[{"value":"2017-06-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}