{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T15:11:02Z","timestamp":1767625862504,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,3,8]],"date-time":"2021-03-08T00:00:00Z","timestamp":1615161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,8]]},"DOI":"10.1145\/3437963.3441712","type":"proceedings-article","created":{"date-parts":[[2021,3,6]],"date-time":"2021-03-06T04:34:28Z","timestamp":1615005268000},"page":"1105-1108","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Data-Sharing Economy: Value-Addition from Data meets Privacy"],"prefix":"10.1145","author":[{"given":"Piyush","family":"Bagad","sequence":"first","affiliation":[{"name":"IIT Kanpur &amp; Adobe, Kanpur, India"}]},{"given":"Subrata","family":"Mitra","sequence":"additional","affiliation":[{"name":"Adobe, Bangalore, India"}]},{"given":"Sunny","family":"Dhamnani","sequence":"additional","affiliation":[{"name":"Adobe, Bangalore, India"}]},{"given":"Atanu R.","family":"Sinha","sequence":"additional","affiliation":[{"name":"Adobe, Bangalore, India"}]},{"given":"Raunak","family":"Gautam","sequence":"additional","affiliation":[{"name":"IIT Delhi &amp; Adobe, Delhi, India"}]},{"given":"Haresh","family":"Khanna","sequence":"additional","affiliation":[{"name":"IIT Roorkee &amp; Adobe, Roorkee, India"}]}],"member":"320","published-online":{"date-parts":[[2021,3,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Rui Chen Qian Xiao Yu Zhang and Jianliang Xu. 2015. Differentially Private High-Dimensional Data Publication via Sampling-Based Inference. In KDD. - -.  Rui Chen Qian Xiao Yu Zhang and Jianliang Xu. 2015. Differentially Private High-Dimensional Data Publication via Sampling-Based Inference. In KDD. - -.","DOI":"10.1145\/2783258.2783379"},{"key":"e_1_3_2_1_2_1","unstructured":"Simon Field. 2019. How to capitalise on the power of modern data sharing. https:\/\/www.information-age.com\/capitalise-power-modern-data-sharing-123481528\/.  Simon Field. 2019. How to capitalise on the power of modern data sharing. https:\/\/www.information-age.com\/capitalise-power-modern-data-sharing-123481528\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Ishaan Gulrajani Faruk Ahmed Martin Arjovsky Vincent Dumoulin and Aaron C Courville. 2017. Improved training of wasserstein gans. In NIPS. - Long Beach --.  Ishaan Gulrajani Faruk Ahmed Martin Arjovsky Vincent Dumoulin and Aaron C Courville. 2017. Improved training of wasserstein gans. In NIPS. - Long Beach --."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Jeffrey Mervis. 2019. Privacy concerns could derail Facebook data-sharing plan.  Jeffrey Mervis. 2019. Privacy concerns could derail Facebook data-sharing plan.","DOI":"10.1126\/science.365.6460.1360"},{"key":"e_1_3_2_1_5_1","unstructured":"Larry Myler. 2017. Data Sharing Can Be A Catalyst For B2B Innovation. https:\/\/www.forbes.com\/sites\/larrymyler\/2017\/09\/11\/data-sharing-can-be-a-catalyst-for-b2b-innovation\/.  Larry Myler. 2017. Data Sharing Can Be A Catalyst For B2B Innovation. https:\/\/www.forbes.com\/sites\/larrymyler\/2017\/09\/11\/data-sharing-can-be-a-catalyst-for-b2b-innovation\/."},{"volume-title":"How To Break Anonymity of the Netflix Prize Dataset. CoRR","author":"Narayanan Arvind","key":"e_1_3_2_1_6_1","unstructured":"Arvind Narayanan and Vitaly Shmatikov . 2006. How To Break Anonymity of the Netflix Prize Dataset. CoRR , Vol. -, - (2006), --. http:\/\/arxiv.org\/abs\/cs\/ 0610105 Arvind Narayanan and Vitaly Shmatikov. 2006. How To Break Anonymity of the Netflix Prize Dataset. CoRR, Vol. -, - (2006), --. http:\/\/arxiv.org\/abs\/cs\/0610105"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Noseong Park Mahmoud Mohammadi Kshitij Gorde Sushil Jajodia Hongkyu Park and Youngmin Kim. 2018. Data Synthesis Based on Generative Adversarial Networks. In VLDB. - - --.  Noseong Park Mahmoud Mohammadi Kshitij Gorde Sushil Jajodia Hongkyu Park and Youngmin Kim. 2018. Data Synthesis Based on Generative Adversarial Networks. In VLDB. - - --.","DOI":"10.14778\/3231751.3231757"},{"key":"e_1_3_2_1_8_1","unstructured":"Thierry Pellegrino. 2019. Protecting Data Privacy in a Data-Sharing World. https:\/\/www.cio.com\/article\/3393966\/protecting-data-privacy-in-a-data-sharing-world.html .  Thierry Pellegrino. 2019. Protecting Data Privacy in a Data-Sharing World. https:\/\/www.cio.com\/article\/3393966\/protecting-data-privacy-in-a-data-sharing-world.html ."},{"volume-title":"Putting Statistical Disclosure Control into Practice: The ARX Data Anonymization Tool","author":"Prasser Fabian","key":"e_1_3_2_1_9_1","unstructured":"Fabian Prasser , Florian Kohlmayer , Gkoulalas-Divanis, Aris, and Grigorios Loukides . 2015. Putting Statistical Disclosure Control into Practice: The ARX Data Anonymization Tool . Springer , -, 111--148. Fabian Prasser, Florian Kohlmayer, Gkoulalas-Divanis, Aris, and Grigorios Loukides. 2015. Putting Statistical Disclosure Control into Practice: The ARX Data Anonymization Tool .Springer, -, 111--148."},{"key":"e_1_3_2_1_10_1","volume-title":"K-anonymity: A Model for Protecting Privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst.","author":"Sweeney Latanya","year":"2002","unstructured":"Latanya Sweeney . 2002 . K-anonymity: A Model for Protecting Privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. , Vol. -, - (Oct. 2002), 557-- 570 . Latanya Sweeney. 2002. K-anonymity: A Model for Protecting Privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., Vol. -, - (Oct. 2002), 557--570."},{"key":"e_1_3_2_1_11_1","unstructured":"UCI. 2017. UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml  UCI. 2017. UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml"},{"volume-title":"NeurIPS. -","author":"Xu Lei","key":"e_1_3_2_1_12_1","unstructured":"Lei Xu , Maria Skoularidou , Alfredo Cuesta-Infante , and Kalyan Veeramachaneni . 2019. Modeling tabular data using conditional gan . In NeurIPS. - , Vancouver , --. Lei Xu, Maria Skoularidou, Alfredo Cuesta-Infante, and Kalyan Veeramachaneni. 2019. Modeling tabular data using conditional gan. In NeurIPS. -, Vancouver, --."},{"key":"e_1_3_2_1_13_1","unstructured":"Lei Xu and Kalyan Veeramachaneni. 2018. Synthesizing tabular data using generative adversarial networks. arXiv preprint arXiv:1811.11264 Vol. - - (2018) --.  Lei Xu and Kalyan Veeramachaneni. 2018. Synthesizing tabular data using generative adversarial networks. arXiv preprint arXiv:1811.11264 Vol. - - (2018) --."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Jun Zhang Graham Cormode Cecilia M. Procopiuc Divesh Srivastava and Xiaokui Xiao. 2017. PrivBayes: Private Data Release via Bayesian Networks. ACM Trans. Database Syst. Vol. - - (Oct. 2017) --.  Jun Zhang Graham Cormode Cecilia M. Procopiuc Divesh Srivastava and Xiaokui Xiao. 2017. PrivBayes: Private Data Release via Bayesian Networks. ACM Trans. Database Syst. Vol. - - (Oct. 2017) --.","DOI":"10.1145\/3134428"}],"event":{"name":"WSDM '21: The Fourteenth ACM International Conference on Web Search and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Virtual Event Israel","acronym":"WSDM '21"},"container-title":["Proceedings of the 14th ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437963.3441712","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3437963.3441712","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:27Z","timestamp":1750195467000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437963.3441712"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,8]]},"references-count":14,"alternative-id":["10.1145\/3437963.3441712","10.1145\/3437963"],"URL":"https:\/\/doi.org\/10.1145\/3437963.3441712","relation":{},"subject":[],"published":{"date-parts":[[2021,3,8]]},"assertion":[{"value":"2021-03-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}