{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T14:59:27Z","timestamp":1777042767538,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":119,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Army Research Laboratory","award":["W911NF-13-2-0045"],"award-info":[{"award-number":["W911NF-13-2-0045"]}]},{"name":"National Science Foundation","award":["2040675"],"award-info":[{"award-number":["2040675"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,27]]},"DOI":"10.1145\/3419394.3423643","type":"proceedings-article","created":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T20:30:22Z","timestamp":1603398622000},"page":"464-483","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":180,"title":["Using GANs for Sharing Networked Time Series Data"],"prefix":"10.1145","author":[{"given":"Zinan","family":"Lin","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Alankar","family":"Jain","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Chen","family":"Wang","sequence":"additional","affiliation":[{"name":"IBM, New York, NY"}]},{"given":"Giulia","family":"Fanti","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Vyas","family":"Sekar","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]}],"member":"320","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"[n. d.]. FIO's documentation. ([n. d.]). https:\/\/fio.readthedocs.io\/en\/latest\/#"},{"key":"e_1_3_2_2_2_1","unstructured":"[n. d.]. The internet topology data kit -2011--04. ([n. d.]). http:\/\/www.caida. org\/data\/active\/internet-topology-data-kit."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_2_4_1","unstructured":"Galen Andrew Steve Chien and Nicolas Papernot. 2019. TensorFlow Privacy. https:\/\/github.com\/tensorflow\/privacy. (2019)."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/974044.974078"},{"key":"e_1_3_2_2_6_1","volume-title":"Wasserstein gan. arXiv preprint arXiv:1701.07875","author":"Arjovsky Martin","year":"2017","unstructured":"Martin Arjovsky, Soumith Chintala, and L\u00e9on Bottou. 2017. Wasserstein gan. arXiv preprint arXiv:1701.07875 (2017)."},{"key":"e_1_3_2_2_7_1","volume-title":"Do gans actually learn the distribution? an empirical study. arXiv preprint arXiv:1706.08224","author":"Arora Sanjeev","year":"2017","unstructured":"Sanjeev Arora and Yi Zhang. 2017. Do gans actually learn the distribution? an empirical study. arXiv preprint arXiv:1706.08224 (2017)."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242598"},{"key":"e_1_3_2_2_9_1","unstructured":"Eugene Bagdasaryan Omid Poursaeed and Vitaly Shmatikov. 2019. Differential privacy has disparate impact on model accuracy. In Advances in Neural Information Processing Systems. 15453--15462."},{"key":"e_1_3_2_2_10_1","unstructured":"Jushan Bai and Shuzhong Shi. 2011. Estimating high dimensional covariance matrices and its applications. (2011)."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663725"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_7"},{"key":"e_1_3_2_2_13_1","volume-title":"Chris Williams, and Casey S Greene.","author":"Beaulieu-Jones Brett K","year":"2017","unstructured":"Brett K Beaulieu-Jones, Zhiwei Steven Wu, Chris Williams, and Casey S Greene. 2017. Privacy-preserving generative deep neural networks support clinical data sharing. BioRxiv (2017), 159756."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1161\/CIRCOUTCOMES.118.005122"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879175"},{"key":"e_1_3_2_2_16_1","volume-title":"Characterizing and Improving the Reliability of Broadband Internet Access. arXiv preprint arXiv:1709.09349","author":"Bischof Zachary S","year":"2017","unstructured":"Zachary S Bischof, Fabian E Bustamante, and Nick Feamster. 2017. Characterizing and Improving the Reliability of Broadband Internet Access. arXiv preprint arXiv:1709.09349 (2017)."},{"key":"e_1_3_2_2_17_1","volume-title":"Imanol Perez Arribas, and Ben Wood","author":"Buehler Hans","year":"2020","unstructured":"Hans Buehler, Blanka Horvath, Terry Lyons, Imanol Perez Arribas, and Ben Wood. 2020. A Data-driven Market Simulator for Small Data Environments. Available at SSRN 3632431 (2020)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1214\/15-EJS1081"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2856127"},{"key":"e_1_3_2_2_20_1","volume-title":"28th {USENIX} Security Symposium ({USENIX} Security 19). 267--284.","author":"Carlini Nicholas","unstructured":"Nicholas Carlini, Chang Liu, \u00dalfar Erlingsson, Jernej Kos, and Dawn Song. 2019. The secret sharer: Evaluating and testing unintended memorization in neural networks. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 267--284."},{"key":"e_1_3_2_2_21_1","volume-title":"Optimization of resource provisioning cost in cloud computing","author":"Chaisiri Sivadon","year":"2011","unstructured":"Sivadon Chaisiri, Bu-Sung Lee, and Dusit Niyato. 2011. Optimization of resource provisioning cost in cloud computing. IEEE transactions on services Computing 5, 2 (2011), 164--177."},{"key":"e_1_3_2_2_22_1","volume-title":"Gan-leaks: A taxonomy of membership inference attacks against gans. arXiv preprint arXiv:1909.03935","author":"Chen Dingfan","year":"2019","unstructured":"Dingfan Chen, Ning Yu, Yang Zhang, and Mario Fritz. 2019. Gan-leaks: A taxonomy of membership inference attacks against gans. arXiv preprint arXiv:1909.03935 (2019)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230551"},{"key":"e_1_3_2_2_24_1","volume-title":"Generating multi-label discrete patient records using generative adversarial networks. arXiv preprint arXiv:1703.06490","author":"Choi Edward","year":"2017","unstructured":"Edward Choi, Siddharth Biswal, Bradley Malin, Jon Duke, Walter F Stewart, and Jimeng Sun. 2017. Generating multi-label discrete patient records using generative adversarial networks. arXiv preprint arXiv:1703.06490 (2017)."},{"key":"e_1_3_2_2_25_1","unstructured":"Federal Communications Commission. 2018. Raw Data - Measuring Broadband America - Seventh Report. (2018). https:\/\/www.fcc.gov\/reportsresearch\/ reports\/measuring-broadband-america\/raw-data-measuringbroadband- america-seventh."},{"key":"e_1_3_2_2_26_1","unstructured":"Hazy Company. 2020. Hazy builds on new technique to generate sequential and time\u00e2\u00c3&OElig;series synthetic data. https:\/\/hazy.com\/blog\/2020\/07\/09\/how-togenerate- sequential-data. (2020)."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807152"},{"key":"e_1_3_2_2_28_1","unstructured":"De Meer Fernando. 2019. Generating Financial Series with Generative Adversarial Networks. (2019)."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2004.1303297"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2303"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-014-1131-z"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11312"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_2_34_1","unstructured":"Crist\u00f3bal Esteban Stephanie L Hyland and Gunnar R\u00e4tsch. [n. d.]. RCGAN code repository. ([n. d.]). https:\/\/github.com\/ratschlab\/RGAN."},{"key":"e_1_3_2_2_35_1","volume-title":"arXiv preprint arXiv:1706.02633","author":"Esteban Crist\u00f3bal","year":"2017","unstructured":"Crist\u00f3bal Esteban, Stephanie L Hyland, and Gunnar R\u00e4tsch. 2017. Real-valued (medical) time series generation with recurrent conditional GANs. arXiv preprint arXiv:1706.02633 (2017)."},{"key":"e_1_3_2_2_36_1","volume-title":"MaskGAN: better text generation via filling in the_. arXiv preprint arXiv:1801.07736","author":"Fedus William","year":"2018","unstructured":"William Fedus, Ian Goodfellow, and Andrew M Dai. 2018. MaskGAN: better text generation via filling in the_. arXiv preprint arXiv:1801.07736 (2018)."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.06.010"},{"key":"e_1_3_2_2_38_1","volume-title":"23rd {USENIX} Security Symposium ({USENIX} Security 14). 17--32.","author":"Fredrikson Matthew","unstructured":"Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, and Thomas Ristenpart. 2014. Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing. In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 17--32."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISBI.2018.8363576"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22312-0_11"},{"key":"e_1_3_2_2_41_1","volume-title":"Time Series Simulation by Conditional Generative Adversarial Net. arXiv preprint arXiv:1904.11419","author":"Fu Rao","year":"2019","unstructured":"Rao Fu, Jie Chen, Shutian Zeng, Yiping Zhuang, and Agus Sudjianto. 2019. Time Series Simulation by Conditional Generative Adversarial Net. arXiv preprint arXiv:1904.11419 (2019)."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1362622.1362678"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2010.5452742"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2004.840412"},{"key":"e_1_3_2_2_45_1","volume-title":"NIPS 2016 tutorial: Generative adversarial networks. arXiv preprint arXiv:1701","author":"Goodfellow Ian","year":"2016","unstructured":"Ian Goodfellow. 2016. NIPS 2016 tutorial: Generative adversarial networks. arXiv preprint arXiv:1701.00160 (2016)."},{"key":"e_1_3_2_2_46_1","unstructured":"Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu DavidWarde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in neural information processing systems. 2672--2680."},{"key":"e_1_3_2_2_47_1","unstructured":"Google. 2018. Web Traffic Time Series Forecasting. (2018). https:\/\/www.kaggle. com\/c\/web-traffic-time-series-forecasting."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626334"},{"key":"e_1_3_2_2_49_1","volume-title":"Synthetic medical images from dual generative adversarial networks. arXiv preprint arXiv:1709.01872","author":"Guibas John T","year":"2017","unstructured":"John T Guibas, Tejpal S Virdi, and Peter S Li. 2017. Synthetic medical images from dual generative adversarial networks. arXiv preprint arXiv:1709.01872 (2017)."},{"key":"e_1_3_2_2_50_1","unstructured":"Ishaan Gulrajani Faruk Ahmed Martin Arjovsky Vincent Dumoulin and Aaron C Courville. 2017. Improved training of wasserstein gans. In Advances in Neural Information Processing Systems. 5767--5777."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2009.36"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISBI.2018.8363678"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0008"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504740"},{"key":"e_1_3_2_2_55_1","unstructured":"Martin Heusel Hubert Ramsauer Thomas Unterthiner Bernhard Nessler and Sepp Hochreiter. 2017. Gans trained by a two time-scale update rule converge to a local nash equilibrium. In Advances in neural information processing systems. 6626--6637."},{"key":"e_1_3_2_2_56_1","unstructured":"Geoffrey Hinton Nitish Srivastava and Kevin Swersky. 2012. Neural networks for machine learning lecture 6a overview of mini-batch gradient descent. (2012). http:\/\/www.cs.toronto.edu\/~hinton\/coursera\/lecture6\/lec6.pdf."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"e_1_3_2_2_58_1","volume-title":"Long short-term memory. Neural computation 9, 8","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735--1780."},{"key":"e_1_3_2_2_59_1","volume-title":"Introduction to network simulator NS2","author":"Issariyakul Teerawat","unstructured":"Teerawat Issariyakul and Ekram Hossain. 2009. Introduction to network simulator 2 (NS2). In Introduction to network simulator NS2. Springer, 1--18."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934907"},{"key":"e_1_3_2_2_61_1","volume-title":"CFA: A Practical Prediction System for Video QoE Optimization.. In NSDI. 137--150.","author":"Jiang Junchen","year":"2016","unstructured":"Junchen Jiang, Vyas Sekar, Henry Milner, Davis Shepherd, Ion Stoica, and Hui Zhang. 2016. CFA: A Practical Prediction System for Video QoE Optimization.. In NSDI. 137--150."},{"key":"e_1_3_2_2_62_1","unstructured":"James Jordon Daniel Jarrett Jinsung Yoon Paul Elbers Patrick Thoral Ari Ercole Cheng Zhang Danielle Belgrave and Mihaela van der Schaar. [n. d.]. NeurIPS 2020 hide-and-seek privacy challenge. https:\/\/www.vanderschaarlab. com\/privacy-challenge\/. ([n. d.])."},{"key":"e_1_3_2_2_63_1","unstructured":"James Jordon Jinsung Yoon and Mihaela van der Schaar. 2018. PATE-GAN: Generating synthetic data with differential privacy guarantees. (2018)."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06605-9_17"},{"key":"e_1_3_2_2_65_1","volume-title":"Progressive growing of gans for improved quality, stability, and variation. arXiv preprint arXiv:1710.10196","author":"Karras Tero","year":"2017","unstructured":"Tero Karras, Timo Aila, Samuli Laine, and Jaakko Lehtinen. 2017. Progressive growing of gans for improved quality, stability, and variation. arXiv preprint arXiv:1710.10196 (2017)."},{"key":"e_1_3_2_2_66_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557079"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2667222"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278547"},{"key":"e_1_3_2_2_70_1","unstructured":"Zinan Lin Ashish Khetan Giulia Fanti and Sewoong Oh. 2018. PacGAN: The power of two samples in generative adversarial networks. In Advances in Neural Information Processing Systems. 1505--1514."},{"key":"e_1_3_2_2_71_1","volume-title":"A hierarchical framework of cloud resource allocation and power management using deep reinforcement learning","author":"Liu Ning","unstructured":"Ning Liu, Zhe Li, Jielong Xu, Zhiyuan Xu, Sheng Lin, Qinru Qiu, Jian Tang, and Yanzhi Wang. 2017. A hierarchical framework of cloud resource allocation and power management using deep reinforcement learning. In ICDCS. IEEE, 372--382."},{"key":"e_1_3_2_2_72_1","unstructured":"Mario Lucic Karol Kurach Marcin Michalski Sylvain Gelly and Olivier Bousquet. 2018. Are gans created equal? a large-scale study. In Advances in neural information processing systems. 700--709."},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.08.016"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005750"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.4236\/cn.2014.63021"},{"key":"e_1_3_2_2_76_1","volume-title":"ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","author":"Marti Gautier","unstructured":"Gautier Marti. 2020. CorrGAN: Sampling Realistic Financial Correlation Matrices Using Generative Adversarial Networks. In ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 8459--8463."},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12334-4_12"},{"key":"e_1_3_2_2_78_1","volume-title":"Performance Evaluation of Computer and Communication Systems","author":"Melamed Benjamin","unstructured":"Benjamin Melamed. 1993. An overview of TES processes and modeling methodology. In Performance Evaluation of Computer and Communication Systems. Springer, 359--393."},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.1993.718399"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/167293.167319"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.700899"},{"key":"e_1_3_2_2_82_1","volume-title":"C-RNN-GAN: Continuous recurrent neural networks with adversarial training. arXiv preprint arXiv:1611.09904","author":"Mogren Olof","year":"2016","unstructured":"Olof Mogren. 2016. C-RNN-GAN: Continuous recurrent neural networks with adversarial training. arXiv preprint arXiv:1611.09904 (2016)."},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230564"},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2314661"},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.78"},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2792745.2792775"},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.5555\/3305890.3305954"},{"key":"e_1_3_2_2_89_1","first-page":"1701","article-title":"Broken promises of privacy: Responding to the surprising failure of anonymization","volume":"57","author":"Ohm Paul","year":"2009","unstructured":"Paul Ohm. 2009. Broken promises of privacy: Responding to the surprising failure of anonymization. Ucla L. Rev. 57 (2009), 1701.","journal-title":"Ucla L. Rev."},{"key":"e_1_3_2_2_90_1","volume-title":"Google cluster-usage traces: format+ schema","author":"Reiss Charles","year":"2011","unstructured":"Charles Reiss, John Wilkes, and Joseph L Hellerstein. 2011. Google cluster-usage traces: format+ schema. Google Inc., White Paper (2011), 1--14."},{"key":"e_1_3_2_2_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2012.6212064"},{"key":"e_1_3_2_2_92_1","unstructured":"Tim Salimans Ian Goodfellow Wojciech Zaremba Vicki Cheung Alec Radford and Xi Chen. 2016. Improved techniques for training gans. In Advances in Neural Information Processing Systems. 2234--2242."},{"key":"e_1_3_2_2_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2253320"},{"key":"e_1_3_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_2_95_1","volume-title":"Internet of People, and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld)","author":"Sliwko Leszek","unstructured":"Leszek Sliwko and Vladimir Getov. 2016. AGOCS\u00e2\u0102\u0164Accurate Google Cloud Simulator Framework. In 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld). IEEE, 550--558."},{"key":"e_1_3_2_2_96_1","unstructured":"Boogie Software. 2020. Synthesizing series of transactions with a Generative Adversarial Network. https:\/\/blog.boogiesoftware.com\/2020\/02\/synthesizingseries- of-transactions.html. (2020)."},{"key":"e_1_3_2_2_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028798"},{"key":"e_1_3_2_2_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935055"},{"key":"e_1_3_2_2_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028799"},{"key":"e_1_3_2_2_100_1","doi-asserted-by":"publisher","DOI":"10.2307\/1412159"},{"key":"e_1_3_2_2_101_1","volume-title":"Veegan: Reducing mode collapse in gans using implicit variational learning. In Advances in Neural Information Processing Systems. 3308--3318.","author":"Srivastava Akash","year":"2017","unstructured":"Akash Srivastava, Lazar Valkov, Chris Russell, Michael U Gutmann, and Charles Sutton. 2017. Veegan: Reducing mode collapse in gans using implicit variational learning. In Advances in Neural Information Processing Systems. 3308--3318."},{"key":"e_1_3_2_2_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846188"},{"key":"e_1_3_2_2_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382262"},{"key":"e_1_3_2_2_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131382"},{"key":"e_1_3_2_2_105_1","first-page":"1","article-title":"Simple demographics often identify people uniquely","volume":"671","author":"Sweeney Latanya","year":"2000","unstructured":"Latanya Sweeney. 2000. Simple demographics often identify people uniquely. Health (San Francisco) 671 (2000), 1--34.","journal-title":"Health (San Francisco)"},{"key":"e_1_3_2_2_106_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_2_107_1","volume-title":"Filebench: A flexible framework for file system benchmarking. USENIX","author":"Tarasov Vasily","year":"2016","unstructured":"Vasily Tarasov, Erez Zadok, and Spencer Shepler. 2016. Filebench: A flexible framework for file system benchmarking. USENIX; login 41, 1 (2016), 6--12."},{"key":"e_1_3_2_2_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2014.80"},{"key":"e_1_3_2_2_109_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2020830"},{"key":"e_1_3_2_2_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/1140086.1140094"},{"key":"e_1_3_2_2_111_1","volume-title":"A learning algorithm for continually running fully recurrent neural networks. Neural computation 1, 2","author":"Williams Ronald J","year":"1989","unstructured":"Ronald J Williams and David Zipser. 1989. A learning algorithm for continually running fully recurrent neural networks. Neural computation 1, 2 (1989), 270--280."},{"key":"e_1_3_2_2_112_1","volume-title":"Differentially private generative adversarial network. arXiv preprint arXiv:1802.06739","author":"Xie Liyang","year":"2018","unstructured":"Liyang Xie, Kaixiang Lin, Shu Wang, Fei Wang, and Jiayu Zhou. 2018. Differentially private generative adversarial network. arXiv preprint arXiv:1802.06739 (2018)."},{"key":"e_1_3_2_2_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2897874"},{"key":"e_1_3_2_2_114_1","volume-title":"An empirical study on evaluation metrics of generative adversarial networks. arXiv preprint arXiv:1806.07755","author":"Xu Qiantong","year":"2018","unstructured":"Qiantong Xu, Gao Huang, Yang Yuan, Chuan Guo, Yu Sun, Felix Wu, and Kilian Weinberger. 2018. An empirical study on evaluation metrics of generative adversarial networks. arXiv preprint arXiv:1806.07755 (2018)."},{"key":"e_1_3_2_2_115_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2315204"},{"key":"e_1_3_2_2_116_1","unstructured":"Jinsung Yoon. [n. d.]. TimeGAN code repository. ([n. d.]). https:\/\/bitbucket.org\/mvdschaar\/mlforhealthlabpub\/src\/ 02edab3b2b6d635470fa80184bbfd03b8bf8082d\/alg\/timegan\/."},{"key":"e_1_3_2_2_117_1","unstructured":"Jinsung Yoon Daniel Jarrett and Mihaela van der Schaar. 2019. Time-series Generative Adversarial Networks. In Advances in Neural Information Processing Systems. 5509--5519."},{"key":"e_1_3_2_2_118_1","unstructured":"Lantao Yu Weinan Zhang Jun Wang and Yong Yu. 2017. SeqGAN: Sequence Generative Adversarial Nets with Policy Gradient.. In AAAI. 2852--2858."},{"key":"e_1_3_2_2_119_1","volume-title":"Recurrent Conditional GANs for Time Series Sensor Modelling. In Time Series Workshop at International Conference on Machine Learning","author":"Zec Edvin Listo","year":"2019","unstructured":"Edvin Listo Zec, Henrik Arnelid, and Nasser Mohammadiha. 2019. Recurrent Conditional GANs for Time Series Sensor Modelling. In Time Series Workshop at International Conference on Machine Learning, (Long Beach, California)."}],"event":{"name":"IMC '20: ACM Internet Measurement Conference","location":"Virtual Event USA","acronym":"IMC '20","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["Proceedings of the ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423643","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419394.3423643","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419394.3423643","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:36:04Z","timestamp":1765841764000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423643"}},"subtitle":["Challenges, Initial Promise, and Open Questions"],"short-title":[],"issued":{"date-parts":[[2020,10,27]]},"references-count":119,"alternative-id":["10.1145\/3419394.3423643","10.1145\/3419394"],"URL":"https:\/\/doi.org\/10.1145\/3419394.3423643","relation":{},"subject":[],"published":{"date-parts":[[2020,10,27]]},"assertion":[{"value":"2020-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}