{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:01Z","timestamp":1750220521828,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Regional Development Fund (ERDF)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,25]]},"DOI":"10.1145\/3407023.3407024","type":"proceedings-article","created":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T10:24:32Z","timestamp":1598351072000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards using differentially private synthetic data for machine learning in collaborative data science projects"],"prefix":"10.1145","author":[{"given":"Michael","family":"Holmes","sequence":"first","affiliation":[{"name":"Cardiff University, United Kingdom"}]},{"given":"George","family":"Theodorakopoulos","sequence":"additional","affiliation":[{"name":"Cardiff University, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2020,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1161\/CIRCOUTCOMES.118.005122"},{"volume-title":"Encyclopedia of Statistics in Quality & Reliability","author":"Ben-Gal I","key":"e_1_3_2_1_2_1","unstructured":"I Ben-Gal . 2007. Bayesian Networks . In Encyclopedia of Statistics in Quality & Reliability , F Ruggeri, F Faltin, and R Kenett (Eds.). Wiley & Sons . I Ben-Gal. 2007. Bayesian Networks. In Encyclopedia of Statistics in Quality & Reliability, F Ruggeri, F Faltin, and R Kenett (Eds.). Wiley & Sons."},{"key":"e_1_3_2_1_3_1","volume-title":"The Role of Differential Privacy in GDPR Compliance. In Workshop on Responsible Recommendation. ACM","author":"Cummings Rachel","year":"2018","unstructured":"Rachel Cummings and Deven Desai . 2018 . The Role of Differential Privacy in GDPR Compliance. In Workshop on Responsible Recommendation. ACM , New York, NY, USA, 2. Rachel Cummings and Deven Desai. 2018. The Role of Differential Privacy in GDPR Compliance. In Workshop on Responsible Recommendation. ACM, New York, NY, USA, 2."},{"key":"e_1_3_2_1_4_1","unstructured":"Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml  Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml"},{"volume-title":"Differential Privacy","author":"Dwork Cynthia","key":"e_1_3_2_1_5_1","unstructured":"Cynthia Dwork . 2006. Differential Privacy . In Automata, Languages and Programming, Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 1--12. Cynthia Dwork. 2006. Differential Privacy. In Automata, Languages and Programming, Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1--12."},{"key":"e_1_3_2_1_6_1","volume-title":"Caroline Tudor Editor","author":"Elliot Mark","year":"2016","unstructured":"Mark Elliot , Elaine Mackey , Caroline Tudor Editor , and Kieron O'Hara. 2016 . The Anonymisation Decision Making Framework. Technical Report. UK Anonymisation Network . 171 pages. https:\/\/ukanon.net Mark Elliot, Elaine Mackey, Caroline Tudor Editor, and Kieron O'Hara. 2016. The Anonymisation Decision Making Framework. Technical Report. UK Anonymisation Network. 171 pages. https:\/\/ukanon.net"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3339281"},{"key":"e_1_3_2_1_8_1","volume-title":"Synthetic Data for Social Good. arXiv:1710.08874 [cs] (Oct","author":"Howe Bill","year":"2017","unstructured":"Bill Howe , Julia Stoyanovich , Haoyue Ping , Bernease Herman , and Matt Gee . 2017. Synthetic Data for Social Good. arXiv:1710.08874 [cs] (Oct . 2017 ). http:\/\/arxiv.org\/abs\/1710.08874 arXiv: 1710.08874. Bill Howe, Julia Stoyanovich, Haoyue Ping, Bernease Herman, and Matt Gee. 2017. Synthetic Data for Social Good. arXiv:1710.08874 [cs] (Oct. 2017). http:\/\/arxiv.org\/abs\/1710.08874 arXiv: 1710.08874."},{"key":"e_1_3_2_1_9_1","unstructured":"Ioannis Kaloskampis David Pugh Chaitanya Joshi and Louisa Nolan. 2019. Synthetic data for public good. https:\/\/datasciencecampus.ons.gov.uk\/projects\/synthetic-data-for-public-good\/  Ioannis Kaloskampis David Pugh Chaitanya Joshi and Louisa Nolan. 2019. Synthetic data for public good. https:\/\/datasciencecampus.ons.gov.uk\/projects\/synthetic-data-for-public-good\/"},{"key":"e_1_3_2_1_10_1","volume-title":"On information and sufficiency. The annals of mathematical statistics. 22, 1","author":"Kullback S","year":"1951","unstructured":"S Kullback and RA Leibler . 1951. On information and sufficiency. The annals of mathematical statistics. 22, 1 ( 1951 ), 79. S Kullback and RA Leibler. 1951. On information and sufficiency. The annals of mathematical statistics. 22, 1 (1951), 79."},{"key":"e_1_3_2_1_11_1","volume-title":"Scalable Differentially Private Generative Student Model via PATE. arXiv:1906.09338 [cs, stat] (June","author":"Long Yunhui","year":"2019","unstructured":"Yunhui Long , Suxin Lin , Zhuolin Yang , Carl A. Gunter , and Bo Li. 2019. Scalable Differentially Private Generative Student Model via PATE. arXiv:1906.09338 [cs, stat] (June 2019 ). http:\/\/arxiv.org\/abs\/1906.09338 arXiv: 1906.09338. Yunhui Long, Suxin Lin, Zhuolin Yang, Carl A. Gunter, and Bo Li. 2019. Scalable Differentially Private Generative Student Model via PATE. arXiv:1906.09338 [cs, stat] (June 2019). http:\/\/arxiv.org\/abs\/1906.09338 arXiv: 1906.09338."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3233\/SJI-150153"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3085504.3091117"},{"key":"e_1_3_2_1_15_1","first-page":"462","article-title":"Discussion: Statistical Disclosure Limitation","volume":"9","author":"Rubin D. B.","year":"1993","unstructured":"D. B. Rubin . 1993 . Discussion: Statistical Disclosure Limitation . Journal of Official Statistics 9 (1993), 462 -- 468 . D. B. Rubin. 1993. Discussion: Statistical Disclosure Limitation. Journal of Official Statistics 9 (1993), 462--468.","journal-title":"Journal of Official Statistics"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/02664763.2014.909778"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41592-019-0686-2"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2663337"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Reihaneh Torkzadehmahani Peter Kairouz and Benedict Paten. 2019. DP-CGAN: Differentially Private Synthetic Data and Label Generation. (2019) 7.  Reihaneh Torkzadehmahani Peter Kairouz and Benedict Paten. 2019. DP-CGAN: Differentially Private Synthetic Data and Label Generation. (2019) 7.","DOI":"10.1109\/CVPRW.2019.00018"},{"key":"e_1_3_2_1_20_1","volume-title":"Generating Artificial Data for Private Deep Learning. arXiv:1803.03148 [cs, stat] (March","author":"Triastcyn Aleksei","year":"2018","unstructured":"Aleksei Triastcyn and Boi Faltings . 2018. Generating Artificial Data for Private Deep Learning. arXiv:1803.03148 [cs, stat] (March 2018 ). http:\/\/arxiv.org\/abs\/1803.03148 arXiv: 1803.03148. Aleksei Triastcyn and Boi Faltings. 2018. Generating Artificial Data for Private Deep Learning. arXiv:1803.03148 [cs, stat] (March 2018). http:\/\/arxiv.org\/abs\/1803.03148 arXiv: 1803.03148."},{"key":"e_1_3_2_1_21_1","volume-title":"Cyber Security Breaches Survey","author":"Vaidya Rishi","year":"2019","unstructured":"Rishi Vaidya . 2019. Cyber Security Breaches Survey 2019 . Technical Report. Department for Digital , Culture, Media and Sport. 66 pages. Rishi Vaidya. 2019. Cyber Security Breaches Survey 2019. Technical Report. Department for Digital, Culture, Media and Sport. 66 pages."},{"key":"e_1_3_2_1_22_1","volume-title":"Differentially Private Generative Adversarial Network. arXiv:1802.06739 [cs, stat] (Feb","author":"Xie Liyang","year":"2018","unstructured":"Liyang Xie , Kaixiang Lin , Shu Wang , Fei Wang , and Jiayu Zhou . 2018. Differentially Private Generative Adversarial Network. arXiv:1802.06739 [cs, stat] (Feb . 2018 ). http:\/\/arxiv.org\/abs\/1802.06739 arXiv: 1802.06739. Liyang Xie, Kaixiang Lin, Shu Wang, Fei Wang, and Jiayu Zhou. 2018. Differentially Private Generative Adversarial Network. arXiv:1802.06739 [cs, stat] (Feb. 2018). http:\/\/arxiv.org\/abs\/1802.06739 arXiv: 1802.06739."},{"key":"e_1_3_2_1_23_1","volume-title":"Synthesizing Tabular Data using Generative Adversarial Networks. arXiv preprint arXiv:1811.11264","author":"Xu Lei","year":"2018","unstructured":"Lei Xu and Kalyan Veeramachaneni . 2018. Synthesizing Tabular Data using Generative Adversarial Networks. arXiv preprint arXiv:1811.11264 ( 2018 ). Lei Xu and Kalyan Veeramachaneni. 2018. Synthesizing Tabular Data using Generative Adversarial Networks. arXiv preprint arXiv:1811.11264 (2018)."},{"key":"e_1_3_2_1_24_1","volume-title":"Using Bayesian Networks to Create Synthetic Data. Journal of Official Statistics","author":"Young Jim","year":"2009","unstructured":"Jim Young , Patrick Graham , and Richard Penny . 2009. Using Bayesian Networks to Create Synthetic Data. Journal of Official Statistics ( 2009 ), 19. Jim Young, Patrick Graham, and Richard Penny. 2009. Using Bayesian Networks to Create Synthetic Data. Journal of Official Statistics (2009), 19."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588573"},{"key":"e_1_3_2_1_26_1","volume-title":"echnical Report). arXiv:1801.01594 [cs] (Jan.","author":"Zhang Xinyang","year":"2018","unstructured":"Xinyang Zhang , Shouling Ji , and Ting Wang . 2018. Differentially Private Releasing via Deep Generative Model ( T echnical Report). arXiv:1801.01594 [cs] (Jan. 2018 ). http:\/\/arxiv.org\/abs\/1801.01594 arXiv: 1801.01594. Xinyang Zhang, Shouling Ji, and Ting Wang. 2018. Differentially Private Releasing via Deep Generative Model (Technical Report). arXiv:1801.01594 [cs] (Jan. 2018). http:\/\/arxiv.org\/abs\/1801.01594 arXiv: 1801.01594."}],"event":{"name":"ARES 2020: The 15th International Conference on Availability, Reliability and Security","acronym":"ARES 2020","location":"Virtual Event Ireland"},"container-title":["Proceedings of the 15th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407023.3407024","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3407023.3407024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:41Z","timestamp":1750195481000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407023.3407024"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,25]]},"references-count":25,"alternative-id":["10.1145\/3407023.3407024","10.1145\/3407023"],"URL":"https:\/\/doi.org\/10.1145\/3407023.3407024","relation":{},"subject":[],"published":{"date-parts":[[2020,8,25]]},"assertion":[{"value":"2020-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}