{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T03:23:32Z","timestamp":1775100212498,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T00:00:00Z","timestamp":1602720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,15]]},"DOI":"10.1145\/3383455.3422554","type":"proceedings-article","created":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T14:51:48Z","timestamp":1633618308000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":157,"title":["Generating synthetic data in finance"],"prefix":"10.1145","author":[{"given":"Samuel A.","family":"Assefa","sequence":"first","affiliation":[{"name":"J.P. Morgan AI Research"}]},{"given":"Danial","family":"Dervovic","sequence":"additional","affiliation":[{"name":"J.P. Morgan AI Research, London, UK"}]},{"given":"Mahmoud","family":"Mahfouz","sequence":"additional","affiliation":[{"name":"J.P. Morgan AI Research, London, UK"}]},{"given":"Robert E.","family":"Tillman","sequence":"additional","affiliation":[{"name":"J.P. Morgan AI Research"}]},{"given":"Prashant","family":"Reddy","sequence":"additional","affiliation":[{"name":"J.P. Morgan AI Research"}]},{"given":"Manuela","family":"Veloso","sequence":"additional","affiliation":[{"name":"J.P. Morgan AI Research"}]}],"member":"320","published-online":{"date-parts":[[2021,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"Abay Nazmiye Ceren","unstructured":"Nazmiye Ceren Abay , Yan Zhou , Murat Kantarcioglu , Bhavani Thuraisingham , and Latanya Sweeney . 2019. Privacy Preserving Synthetic Data Release Using Deep Learning . In Machine Learning and Knowledge Discovery in Databases , Michele Berlingerio , Francesco Bonchi, Thomas G\u00e4rtner, Neil Hurley, and Georgiana Ifrim (Eds.). Springer International Publishing , Cham, 510--526. Nazmiye Ceren Abay, Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham, and Latanya Sweeney. 2019. Privacy Preserving Synthetic Data Release Using Deep Learning. In Machine Learning and Knowledge Discovery in Databases, Michele Berlingerio, Francesco Bonchi, Thomas G\u00e4rtner, Neil Hurley, and Georgiana Ifrim (Eds.). Springer International Publishing, Cham, 510--526."},{"key":"e_1_3_2_1_2_1","volume-title":"Limit Order Books","author":"Abergel Fr\u00e9d\u00e9ric","unstructured":"Fr\u00e9d\u00e9ric Abergel , Marouane Anane , Anirban Chakraborti , Aymen Jedidi , and Ioane Muni Toke . 2016. Limit Order Books . Cambridge University Press . Fr\u00e9d\u00e9ric Abergel, Marouane Anane, Anirban Chakraborti, Aymen Jedidi, and Ioane Muni Toke. 2016. Limit Order Books. Cambridge University Press."},{"key":"e_1_3_2_1_3_1","volume-title":"Abowd and Lars Vilhuber","author":"John","year":"2008","unstructured":"John M. Abowd and Lars Vilhuber . 2008 . How Protective Are Synthetic Data?. In Privacy in Statistical Databases, Josep Domingo-Ferrer and Y\u00fccel Saygin (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 239--246. John M. Abowd and Lars Vilhuber. 2008. How Protective Are Synthetic Data?. In Privacy in Statistical Databases, Josep Domingo-Ferrer and Y\u00fccel Saygin (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 239--246."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2855136"},{"key":"e_1_3_2_1_5_1","first-page":"256","article-title":"Informational Inequality: How High Frequency Traders Use Premier Access to Information to Prey on Institutional Investors","volume":"14","author":"Adrian Jacob","year":"2016","unstructured":"Jacob Adrian . 2016 . Informational Inequality: How High Frequency Traders Use Premier Access to Information to Prey on Institutional Investors . Duke Law Technology Review 14 (2016), 256 -- 279 . Jacob Adrian. 2016. Informational Inequality: How High Frequency Traders Use Premier Access to Information to Prey on Institutional Investors. Duke Law Technology Review 14 (2016), 256--279.","journal-title":"Duke Law Technology Review"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1083592.1083696"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.47"},{"key":"e_1_3_2_1_8_1","unstructured":"Maryam Archie Sophie Gershon Abigail Katcoff and Aaron Zeng. 2018. Who's Watching?De-anonymization of Netflix Reviews using Amazon Reviews. Technical Report. MIT. Maryam Archie Sophie Gershon Abigail Katcoff and Aaron Zeng. 2018. Who's Watching?De-anonymization of Netflix Reviews using Amazon Reviews . Technical Report. MIT."},{"key":"e_1_3_2_1_9_1","first-page":"2","article-title":"Exploring Agent-Based Methods for the Analysis of Payment Systems: A Crisis Model for StarLogo TNG","volume":"12","author":"Arciero Luca","year":"2009","unstructured":"Luca Arciero , Claudia Biancotti , Leandro D'Aurizio , and Claudio Impenna . 2009 . Exploring Agent-Based Methods for the Analysis of Payment Systems: A Crisis Model for StarLogo TNG . Journal of Artificial Societies and Social Simulation 12 , 1 (2009), 2 . Luca Arciero, Claudia Biancotti, Leandro D'Aurizio, and Claudio Impenna. 2009. Exploring Agent-Based Methods for the Analysis of Payment Systems: A Crisis Model for StarLogo TNG. Journal of Artificial Societies and Social Simulation 12, 1 (2009), 2.","journal-title":"Journal of Artificial Societies and Social Simulation"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/3398761.3398969"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Michael Bain and Claude Sammut. 1995. A Framework for Behavioural Cloning. In Machine Intelligence 15. 103--129. Michael Bain and Claude Sammut. 1995. A Framework for Behavioural Cloning. In Machine Intelligence 15 . 103--129.","DOI":"10.1093\/oso\/9780198538677.003.0006"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1111\/jofi.12840"},{"key":"e_1_3_2_1_13_1","volume-title":"quotes and prices: financial markets under the microscope","author":"Bouchaud Jean-Philippe","unstructured":"Jean-Philippe Bouchaud , Julius Bonart , Jonathan Donier , and Martin Gould . 2018. Trades , quotes and prices: financial markets under the microscope . Cambridge University Press , Cambridge . Jean-Philippe Bouchaud, Julius Bonart, Jonathan Donier, and Martin Gould. 2018. Trades, quotes and prices: financial markets under the microscope. Cambridge University Press, Cambridge."},{"key":"e_1_3_2_1_14_1","volume-title":"Comparative Study of Differentially Private Data Synthesis Methods. arXiv:1602.01063 [stat.ME]","author":"McKay Bowen Claire","year":"2019","unstructured":"Claire McKay Bowen and Fang Liu . 2019. Comparative Study of Differentially Private Data Synthesis Methods. arXiv:1602.01063 [stat.ME] ( 2019 ). Claire McKay Bowen and Fang Liu. 2019. Comparative Study of Differentially Private Data Synthesis Methods. arXiv:1602.01063 [stat.ME] (2019)."},{"key":"e_1_3_2_1_15_1","volume-title":"ABIDES: Towards High-Fidelity Market Simulation for AI Research. arXiv:1904.12066 [cs.MA]","author":"Byrd David","year":"2019","unstructured":"David Byrd , Maria Hybinette , and Tucker Hybinette Balch . 2019 . ABIDES: Towards High-Fidelity Market Simulation for AI Research. arXiv:1904.12066 [cs.MA] (2019). David Byrd, Maria Hybinette, and Tucker Hybinette Balch. 2019. ABIDES: Towards High-Fidelity Market Simulation for AI Research. arXiv:1904.12066 [cs.MA] (2019)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3066722"},{"key":"e_1_3_2_1_17_1","first-page":"1","article-title":"Random Forests for Generating Partially Synthetic, Categorical Data","volume":"3","author":"Caiola Gregory","year":"2010","unstructured":"Gregory Caiola and Jerome P. Reiter . 2010 . Random Forests for Generating Partially Synthetic, Categorical Data . Trans. Data Privacy 3 , 1 (April 2010), 27--42. Gregory Caiola and Jerome P. Reiter. 2010. Random Forests for Generating Partially Synthetic, Categorical Data. Trans. Data Privacy 3, 1 (April 2010), 27--42.","journal-title":"Trans. Data Privacy"},{"key":"e_1_3_2_1_18_1","volume-title":"Nicol\u00e1s Emilio Bordenabe, and Catuscia Palamidessi","author":"Chatzikokolakis Konstantinos","year":"2013","unstructured":"Konstantinos Chatzikokolakis , Miguel E. Andr\u00e9s , Nicol\u00e1s Emilio Bordenabe, and Catuscia Palamidessi . 2013 . Broadening the Scope of Differential Privacy Using Metrics. In Privacy Enhancing Technologies, Emiliano De Cristofaro and Matthew Wright (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 82--102. Konstantinos Chatzikokolakis, Miguel E. Andr\u00e9s, Nicol\u00e1s Emilio Bordenabe, and Catuscia Palamidessi. 2013. Broadening the Scope of Differential Privacy Using Metrics. In Privacy Enhancing Technologies, Emiliano De Cristofaro and Matthew Wright (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 82--102."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1211"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 2nd Machine Learning for Healthcare Conference (Proceedings of Machine Learning Research), Finale Doshi-Velez","author":"Choi Edward","unstructured":"Edward Choi , Siddharth Biswal , Bradley Malin , Jon Duke , Walter F. Stewart , and Jimeng Sun . 2017. Generating Multi-label Discrete Patient Records using Generative Adversarial Networks . In Proceedings of the 2nd Machine Learning for Healthcare Conference (Proceedings of Machine Learning Research), Finale Doshi-Velez , Jim Fackler, David Kale, Rajesh Ranganath, Byron Wallace, and Jenna Wiens (Eds.), Vol. 68 . PMLR , Boston, Massachusetts , 286--305. Edward Choi, Siddharth Biswal, Bradley Malin, Jon Duke, Walter F. Stewart, and Jimeng Sun. 2017. Generating Multi-label Discrete Patient Records using Generative Adversarial Networks. In Proceedings of the 2nd Machine Learning for Healthcare Conference (Proceedings of Machine Learning Research), Finale Doshi-Velez, Jim Fackler, David Kale, Rajesh Ranganath, Byron Wallace, and Jenna Wiens (Eds.), Vol. 68. PMLR, Boston, Massachusetts, 286--305."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the Machine Learning for Health Care Conference, MLHC 2017","author":"Choi Edward","year":"2017","unstructured":"Edward Choi , Siddharth Biswal , Bradley A. Malin , Jon Duke , Walter F. Stewart , and Jimeng Sun . 2017 . Generating Multi-label Discrete Patient Records using Generative Adversarial Networks . In Proceedings of the Machine Learning for Health Care Conference, MLHC 2017 , Boston, Massachusetts, USA, 18- -19 August 2017 (Proceedings of Machine Learning Research), Finale Doshi-Velez, Jim Fackler, David C. Kale, Rajesh Ranganath, Byron C. Wallace, and Jenna Wiens (Eds.), Vol. 68. PMLR, 286--305. Edward Choi, Siddharth Biswal, Bradley A. Malin, Jon Duke, Walter F. Stewart, and Jimeng Sun. 2017. Generating Multi-label Discrete Patient Records using Generative Adversarial Networks. In Proceedings of the Machine Learning for Health Care Conference, MLHC 2017, Boston, Massachusetts, USA, 18--19 August 2017 (Proceedings of Machine Learning Research), Finale Doshi-Velez, Jim Fackler, David C. Kale, Rajesh Ranganath, Byron C. Wallace, and Jenna Wiens (Eds.), Vol. 68. PMLR, 286--305."},{"key":"e_1_3_2_1_22_1","unstructured":"IEX cloud. 2020. https:\/\/iexcloud.io\/ IEX cloud. 2020. https:\/\/iexcloud.io\/"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2018.5630"},{"key":"e_1_3_2_1_24_1","unstructured":"Douglas Crockford. 2001. JSON. https:\/\/www.json.org Douglas Crockford. 2001. JSON. https:\/\/www.json.org"},{"key":"e_1_3_2_1_25_1","first-page":"9","article-title":"Privacy, Anonymity, and Big Data in the Social","volume":"57","author":"Daries Jon P.","year":"2014","unstructured":"Jon P. Daries , Justin Reich , Jim Waldo , Elise M. Young , Jonathan Whittinghill , Andrew Dean Ho , Daniel Thomas Seaton , and Isaac Chuang . 2014 . Privacy, Anonymity, and Big Data in the Social Sciences. Commun. ACM 57 , 9 (Sept. 2014), 56--63. Jon P. Daries, Justin Reich, Jim Waldo, Elise M. Young, Jonathan Whittinghill, Andrew Dean Ho, Daniel Thomas Seaton, and Isaac Chuang. 2014. Privacy, Anonymity, and Big Data in the Social Sciences. Commun. ACM 57, 9 (Sept. 2014), 56--63.","journal-title":"Sciences. Commun. ACM"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/10618600.2017.1384734"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1888848.1888865"},{"key":"e_1_3_2_1_28_1","unstructured":"Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1873601.1873617"},{"key":"e_1_3_2_1_30_1","volume-title":"Theory of Cryptography","author":"Dwork Cynthia","unstructured":"Cynthia Dwork , Frank McSherry , Kobbi Nissim , and Adam Smith . 2006. Calibrating Noise to Sensitivity in Private Data Analysis . In Theory of Cryptography , Shai Halevi and Tal Rabin (Eds.). Springer Berlin Heidelberg, Berlin , Heidelberg , 265--284. Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating Noise to Sensitivity in Private Data Analysis. In Theory of Cryptography, Shai Halevi and Tal Rabin (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 265--284."},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the Forty-second ACM Symposium on Theory of Computing","author":"Dwork Cynthia","unstructured":"Cynthia Dwork , Moni Naor , Toniann Pitassi , and Guy N. Rothblum . 2010. Differential Privacy Under Continual Observation . In Proceedings of the Forty-second ACM Symposium on Theory of Computing ( Cambridge, Massachusetts, USA) (STOC '10). ACM, New York, NY, USA, 715--724. Cynthia Dwork, Moni Naor, Toniann Pitassi, and Guy N. Rothblum. 2010. Differential Privacy Under Continual Observation. In Proceedings of the Forty-second ACM Symposium on Theory of Computing (Cambridge, Massachusetts, USA) (STOC '10). ACM, New York, NY, USA, 715--724."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms. SIAM, 560--578","author":"Eli\u00e1\u0161 Marek","year":"2020","unstructured":"Marek Eli\u00e1\u0161 , Michael Kapralov , Janardhan Kulkarni , and Yin Tat Lee . 2020 . Differentially Private Release of Synthetic Graphs . In Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms. SIAM, 560--578 . Marek Eli\u00e1\u0161, Michael Kapralov, Janardhan Kulkarni, and Yin Tat Lee. 2020. Differentially Private Release of Synthetic Graphs. In Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms. SIAM, 560--578."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.55"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5486\/PMD.1959.6.3-4.12"},{"key":"e_1_3_2_1_35_1","first-page":"1","article-title":"Optstream: Releasing Time Series Privately","volume":"65","author":"Fioretto Ferdinando","year":"2019","unstructured":"Ferdinando Fioretto and Pascal Van Hentenryck . 2019 . Optstream: Releasing Time Series Privately . J. Artif. Int. Res. 65 , 1 (May 2019), 423--456. Ferdinando Fioretto and Pascal Van Hentenryck. 2019. Optstream: Releasing Time Series Privately. J. Artif. Int. Res. 65, 1 (May 2019), 423--456.","journal-title":"J. Artif. Int. Res."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.09.029"},{"key":"e_1_3_2_1_37_1","volume-title":"Time Series Simulation by Conditional Generative Adversarial Net. arXiv:1904.11419 [stat.ML]","author":"Fu Rao","year":"2019","unstructured":"Rao Fu , Jie Chen , Shutian Zeng , Yiping Zhuang , and Agus Sudjianto . 2019. Time Series Simulation by Conditional Generative Adversarial Net. arXiv:1904.11419 [stat.ML] ( 2019 ). Rao Fu, Jie Chen, Shutian Zeng, Yiping Zhuang, and Agus Sudjianto. 2019. Time Series Simulation by Conditional Generative Adversarial Net. arXiv:1904.11419 [stat.ML] (2019)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jedc.2010.11.001"},{"key":"e_1_3_2_1_39_1","volume-title":"Explaining Explanations: An Overview of Interpretability of Machine Learning. The 5th IEEE International Conference on Data Science and Advanced Analytics (DSAA 2018","author":"Gilpin L. H.","year":"2018","unstructured":"L. H. Gilpin , D. Bau , Yuan B. Z., A. Bajwa , M. Specter , and L. Kagal . 2018 . Explaining Explanations: An Overview of Interpretability of Machine Learning. The 5th IEEE International Conference on Data Science and Advanced Analytics (DSAA 2018 ). ( 2018 ). L. H. Gilpin, D. Bau, Yuan B. Z., A. Bajwa, M. Specter, and L. Kagal. 2018. Explaining Explanations: An Overview of Interpretability of Machine Learning. The 5th IEEE International Conference on Data Science and Advanced Analytics (DSAA 2018). (2018)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1080\/14697688.2013.803148"},{"key":"e_1_3_2_1_41_1","first-page":"1","article-title":"A Kernel Two-sample Test","volume":"13","author":"Gretton Arthur","year":"2012","unstructured":"Arthur Gretton , Karsten M. Borgwardt , Malte J. Rasch , Bernhard Sch\u00f6lkopf , and Alexander Smola . 2012 . A Kernel Two-sample Test . Journal of Machine Learning Research 13 , 1 (March 2012), 723--773. Arthur Gretton, Karsten M. Borgwardt, Malte J. Rasch, Bernhard Sch\u00f6lkopf, and Alexander Smola. 2012. A Kernel Two-sample Test. Journal of Machine Learning Research 13, 1 (March 2012), 723--773.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_42_1","volume-title":"Reverse stress testing interbank networks. Scientific Reports 7, 1 (15","author":"Grigat Daniel","year":"2017","unstructured":"Daniel Grigat and Fabio Caccioli . 2017. Reverse stress testing interbank networks. Scientific Reports 7, 1 (15 Nov 2017 ), 15616. Daniel Grigat and Fabio Caccioli. 2017. Reverse stress testing interbank networks. Scientific Reports 7, 1 (15 Nov 2017), 15616."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/3295222.3295408"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/13600834.2019.1573501"},{"key":"e_1_3_2_1_45_1","volume-title":"PATE-GAN: Generating Synthetic Data with Differential Privacy Guarantees. In 7th International Conference on Learning Representations, ICLR 2019","author":"Jordon James","year":"2019","unstructured":"James Jordon , Jinsung Yoon , and Mihaela van der Schaar. 2019 . PATE-GAN: Generating Synthetic Data with Differential Privacy Guarantees. In 7th International Conference on Learning Representations, ICLR 2019 , New Orleans, LA, USA, May 6--9 , 2019 . OpenReview.net. https:\/\/openreview.net\/forum?id=S1zk9iRqF7 James Jordon, Jinsung Yoon, and Mihaela van der Schaar. 2019. PATE-GAN: Generating Synthetic Data with Differential Privacy Guarantees. In 7th International Conference on Learning Representations, ICLR 2019, New Orleans, LA, USA, May 6--9, 2019. OpenReview.net. https:\/\/openreview.net\/forum?id=S1zk9iRqF7"},{"key":"e_1_3_2_1_46_1","volume-title":"Value at Risk: The New Benchmark for Managing Financial Risk","author":"Jorion Philippe","unstructured":"Philippe Jorion . 2006. Value at Risk: The New Benchmark for Managing Financial Risk ( 3 rd ed.). McGraw-Hill . Philippe Jorion. 2006. Value at Risk: The New Benchmark for Managing Financial Risk (3rd ed.). McGraw-Hill.","edition":"3"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1080\/23322039.2019.1645584"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732977.2732989"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213556.2213571"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41109-019-0195-3"},{"key":"e_1_3_2_1_51_1","first-page":"7","article-title":"Protecting the 2020","volume":"62","author":"Kugler Logan","year":"2019","unstructured":"Logan Kugler . 2019 . Protecting the 2020 Census. Commun. ACM 62 , 7 (June 2019), 17--19. Logan Kugler. 2019. Protecting the 2020 Census. Commun. ACM 62, 7 (June 2019), 17--19.","journal-title":"Census. Commun. ACM"},{"key":"e_1_3_2_1_52_1","volume-title":"Handbook of Computational Economics, Leigh Tesfatsion and Kenneth L","author":"LeBaron Blake","unstructured":"Blake LeBaron . 2006. Agent-based Computational Finance . In Handbook of Computational Economics, Leigh Tesfatsion and Kenneth L . Judd (Eds.). Handbook of Computational Economics, Vol . 2. Elsevier , Chapter 24, 1187--1233. Blake LeBaron. 2006. Agent-based Computational Finance. In Handbook of Computational Economics, Leigh Tesfatsion and Kenneth L. Judd (Eds.). Handbook of Computational Economics, Vol. 2. Elsevier, Chapter 24, 1187--1233."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273559"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.14778\/2733004.2733059"},{"key":"e_1_3_2_1_55_1","volume-title":"Wellman","author":"Li Junyi","year":"2019","unstructured":"Junyi Li , Xintong Wang , Yaoyang Lin , Arunesh Sinha , and Michael P . Wellman . 2019 . Generating Realistic Stock Market Order Streams . https:\/\/openreview.net\/forum?id=rke41hC5Km Junyi Li, Xintong Wang, Yaoyang Lin, Arunesh Sinha, and Michael P. Wellman. 2019. Generating Realistic Stock Market Order Streams. https:\/\/openreview.net\/forum?id=rke41hC5Km"},{"key":"e_1_3_2_1_57_1","volume-title":"Using the RetSim Fraud Simulation Tool to Set Thresholds for Triage of Retail Fraud","author":"Lopez-Rojas Edgar Alonso","unstructured":"Edgar Alonso Lopez-Rojas and Stefan Axelsson . 2015. Using the RetSim Fraud Simulation Tool to Set Thresholds for Triage of Retail Fraud . In Secure IT Systems, Sonja Buchegger and Mads Dam (Eds.). Springer International Publishing , Cham , 156--171. Edgar Alonso Lopez-Rojas and Stefan Axelsson. 2015. Using the RetSim Fraud Simulation Tool to Set Thresholds for Triage of Retail Fraud. In Secure IT Systems, Sonja Buchegger and Mads Dam (Eds.). Springer International Publishing, Cham, 156--171."},{"key":"e_1_3_2_1_58_1","volume-title":"2018 ICML Workshop on Theoretical Foundations and Applications of Deep Generative Models. arXiv:1807","author":"Mottini Alejandro","year":"2019","unstructured":"Alejandro Mottini , Alix Lheritier , and Rodrigo Acuna-Agost . 2019 . Airline Passenger Name Record Generation using Generative Adversarial Networks . Presented at the 2018 ICML Workshop on Theoretical Foundations and Applications of Deep Generative Models. arXiv:1807 .06657 [cs.LG] (2019). Alejandro Mottini, Alix Lheritier, and Rodrigo Acuna-Agost. 2019. Airline Passenger Name Record Generation using Generative Adversarial Networks. Presented at the 2018 ICML Workshop on Theoretical Foundations and Applications of Deep Generative Models. arXiv:1807.06657 [cs.LG] (2019)."},{"key":"e_1_3_2_1_59_1","unstructured":"NASDAQ TotalView. 2020. https:\/\/www.nasdaq.com\/solutions\/nasdaq-totalview NASDAQ TotalView. 2020. https:\/\/www.nasdaq.com\/solutions\/nasdaq-totalview"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.066117"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.14778\/3231751.3231757"},{"key":"e_1_3_2_1_62_1","first-page":"3","article-title":"PeGS: Perturbed Gibbs Samplers That Generate Privacy-Compliant Synthetic Data","volume":"7","author":"Park Yubin","year":"2014","unstructured":"Yubin Park and Joydeep Ghosh . 2014 . PeGS: Perturbed Gibbs Samplers That Generate Privacy-Compliant Synthetic Data . Trans. Data Privacy 7 , 3 (Dec. 2014), 253--282. Yubin Park and Joydeep Ghosh. 2014. PeGS: Perturbed Gibbs Samplers That Generate Privacy-Compliant Synthetic Data. Trans. Data Privacy 7, 3 (Dec. 2014), 253--282.","journal-title":"Trans. Data Privacy"},{"key":"e_1_3_2_1_63_1","volume-title":"The Synthetic Data Vault. In 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA). 399--410","author":"Patki N.","unstructured":"N. Patki , R. Wedge , and K. Veeramachaneni . 2016 . The Synthetic Data Vault. In 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA). 399--410 . N. Patki, R. Wedge, and K. Veeramachaneni. 2016. The Synthetic Data Vault. In 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA). 399--410."},{"key":"e_1_3_2_1_64_1","volume-title":"A Comparison of Economic Agent-Based Model Calibration Methods. arXiv:1902.05938 [q-fin.CP]","author":"Platt D.","year":"2019","unstructured":"D. Platt . 2019. A Comparison of Economic Agent-Based Model Calibration Methods. arXiv:1902.05938 [q-fin.CP] ( 2019 ). D. Platt. 2019. A Comparison of Economic Agent-Based Model Calibration Methods. arXiv:1902.05938 [q-fin.CP] (2019)."},{"key":"e_1_3_2_1_65_1","unstructured":"Polygon Financial Data Platform. 2020. https:\/\/polygon.io\/ Polygon Financial Data Platform. 2020. https:\/\/polygon.io\/"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2020.113303"},{"key":"e_1_3_2_1_67_1","unstructured":"A. Rahimi and B. Recht. 2017. Reflections on Random Kitchen Sinks. (2017). http:\/\/www.argmin.net\/2017\/12\/05\/kitchen-sinks\/ A. Rahimi and B. Recht. 2017. Reflections on Random Kitchen Sinks. (2017). http:\/\/www.argmin.net\/2017\/12\/05\/kitchen-sinks\/"},{"key":"e_1_3_2_1_68_1","volume-title":"Private Analysis of Graph Data","author":"Raskhodnikova Sofya","unstructured":"Sofya Raskhodnikova and Adam Smith . 2014. Private Analysis of Graph Data . Springer Berlin Heidelberg , Berlin, Heidelberg , 1--6. Sofya Raskhodnikova and Adam Smith. 2014. Private Analysis of Graph Data. Springer Berlin Heidelberg, Berlin, Heidelberg, 1--6."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.5555\/3327345.3327429"},{"key":"e_1_3_2_1_70_1","volume-title":"Proceedings of the 19th International Conference on World Wide Web","author":"Sala Alessandra","unstructured":"Alessandra Sala , Lili Cao , Christo Wilson , Robert Zablit , Haitao Zheng , and Ben Y. Zhao . 2010. Measurement-Calibrated Graph Models for Social Network Experiments . In Proceedings of the 19th International Conference on World Wide Web ( Raleigh, North Carolina, USA) (WWW '10). Association for Computing Machinery, New York, NY, USA, 861--870. Alessandra Sala, Lili Cao, Christo Wilson, Robert Zablit, Haitao Zheng, and Ben Y. Zhao. 2010. Measurement-Calibrated Graph Models for Social Network Experiments. In Proceedings of the 19th International Conference on World Wide Web (Raleigh, North Carolina, USA) (WWW '10). Association for Computing Machinery, New York, NY, USA, 861--870."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.5555\/3157096.3157346"},{"key":"e_1_3_2_1_73_1","volume-title":"International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=r1lWUoA9FQ","author":"Shafahi Ali","year":"2019","unstructured":"Ali Shafahi , W. Ronny Huang , Christoph Studer , Soheil Feizi , and Tom Goldstein . 2019 . Are adversarial examples inevitable? . In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=r1lWUoA9FQ Ali Shafahi, W. Ronny Huang, Christoph Studer, Soheil Feizi, and Tom Goldstein. 2019. Are adversarial examples inevitable?. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=r1lWUoA9FQ"},{"key":"e_1_3_2_1_74_1","volume-title":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing(Allerton). 909--910","author":"Shokri R.","unstructured":"R. Shokri and V. Shmatikov . 2015. Privacy-preserving deep learning . In 2015 53rd Annual Allerton Conference on Communication, Control, and Computing(Allerton). 909--910 . R. Shokri and V. Shmatikov. 2015. Privacy-preserving deep learning. In 2015 53rd Annual Allerton Conference on Communication, Control, and Computing(Allerton). 909--910."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1525\/jer.2007.2.1.101"},{"key":"e_1_3_2_1_76_1","first-page":"95","article-title":"A Review Of Synthetic Data Generation Methods For Privacy Preserving Data Publishing","volume":"4","author":"Surendra H.","year":"2015","unstructured":"H. Surendra and H. S. Mohan . 2015 . A Review Of Synthetic Data Generation Methods For Privacy Preserving Data Publishing . International Journal of Scientific & Technology Research 4 , 8 (2015), 95 -- 101 . H. Surendra and H. S. Mohan. 2015. A Review Of Synthetic Data Generation Methods For Privacy Preserving Data Publishing. International Journal of Scientific & Technology Research 4, 8 (2015), 95--101.","journal-title":"International Journal of Scientific & Technology Research"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1111\/j.1740-9713.2018.01139.x","article-title":"What can we learn from the Facebook---Cambridge Analytica scandal","volume":"15","author":"Tarran Brian","year":"2018","unstructured":"Brian Tarran . 2018 . What can we learn from the Facebook---Cambridge Analytica scandal ? Significance 15 , 3 (2018), 4 -- 5 . Brian Tarran. 2018. What can we learn from the Facebook---Cambridge Analytica scandal? Significance 15, 3 (2018), 4--5.","journal-title":"Significance"},{"key":"e_1_3_2_1_78_1","unstructured":"L. Theis A. van den Oord and M. Bethge. 2016. A note on the evaluation of generative models. arXiv:1511.01844 [stat.ML] (2016). L. Theis A. van den Oord and M. Bethge. 2016. A note on the evaluation of generative models. arXiv:1511.01844 [stat.ML] (2016)."},{"key":"e_1_3_2_1_79_1","volume-title":"Privacy and Anonymization in Social Networks","author":"Tripathy B. K.","unstructured":"B. K. Tripathy , M. S. Sishodia , Sumeet Jain , and Anirban Mitra . 2014. Privacy and Anonymization in Social Networks . Springer International Publishing , Cham , 243--270. B. K. Tripathy, M. S. Sishodia, Sumeet Jain, and Anirban Mitra. 2014. Privacy and Anonymization in Social Networks. Springer International Publishing, Cham, 243--270."},{"key":"e_1_3_2_1_80_1","volume-title":"Analysis of Financial Time Series","author":"Tsay Ruey","unstructured":"Ruey Tsay . 2010. Analysis of Financial Time Series ( 3 rd ed.). Wiley & Sons . Ruey Tsay. 2010. Analysis of Financial Time Series (3rd ed.). Wiley & Sons.","edition":"3"},{"key":"e_1_3_2_1_81_1","volume-title":"Quant GANs: Deep Generation of Financial Time Series. arXiv:1907.06673 [q-fin.MF]","author":"Wiese Magnus","year":"2019","unstructured":"Magnus Wiese , Robert Knobloch , Ralf Korn , and Peter Kretschmer . 2019. Quant GANs: Deep Generation of Financial Time Series. arXiv:1907.06673 [q-fin.MF] ( 2019 ). Magnus Wiese, Robert Knobloch, Ralf Korn, and Peter Kretschmer. 2019. Quant GANs: Deep Generation of Financial Time Series. arXiv:1907.06673 [q-fin.MF] (2019)."},{"key":"e_1_3_2_1_82_1","volume-title":"Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019","author":"Xu Lei","year":"2019","unstructured":"Lei Xu , Maria Skoularidou , Alfredo Cuesta-Infante , and Kalyan Veeramachaneni . 2019 . Modeling Tabular data using Conditional GAN . In Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019 , NeurIPS 2019, 8--14 December 2019, Vancouver, BC, Canada, Hanna M. Wallach, Hugo Larochelle, Alina Beygelzimer, Florence d'Alch\u00e9-Buc, Emily B. Fox, and Roman Garnett (Eds.). 7333--7343. Lei Xu, Maria Skoularidou, Alfredo Cuesta-Infante, and Kalyan Veeramachaneni. 2019. Modeling Tabular data using Conditional GAN. In Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, 8--14 December 2019, Vancouver, BC, Canada, Hanna M. Wallach, Hugo Larochelle, Alina Beygelzimer, Florence d'Alch\u00e9-Buc, Emily B. Fox, and Roman Garnett (Eds.). 7333--7343."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588573"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/1540276.1540279"}],"event":{"name":"ICAIF '20: ACM International Conference on AI in Finance","location":"New York New York","acronym":"ICAIF '20","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the First ACM International Conference on AI in Finance"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3383455.3422554","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3383455.3422554","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:10Z","timestamp":1750197670000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3383455.3422554"}},"subtitle":["opportunities, challenges and pitfalls"],"short-title":[],"issued":{"date-parts":[[2020,10,15]]},"references-count":82,"alternative-id":["10.1145\/3383455.3422554","10.1145\/3383455"],"URL":"https:\/\/doi.org\/10.1145\/3383455.3422554","relation":{},"subject":[],"published":{"date-parts":[[2020,10,15]]},"assertion":[{"value":"2021-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}