{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:46:06Z","timestamp":1775069166267,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,18]],"date-time":"2022-04-18T00:00:00Z","timestamp":1650240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,18]]},"DOI":"10.1145\/3510548.3519377","type":"proceedings-article","created":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T10:15:01Z","timestamp":1650708901000},"page":"35-45","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["PriveTAB"],"prefix":"10.1145","author":[{"given":"Anantaa","family":"Kotal","sequence":"first","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, MD, USA"}]},{"given":"Aritran","family":"Piplai","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, MD, USA"}]},{"given":"Sai Sree Laya","family":"Chukkapalli","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, MD, USA"}]},{"given":"Anupam","family":"Joshi","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,4,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"REFERENCES [1] 2013. General Data Protection Regulation (GDPR) -- Official Legal Text. https: \/\/gdpr-info.eu\/. (Accessed on 02\/24\/2021).  REFERENCES [1] 2013. General Data Protection Regulation (GDPR) -- Official Legal Text. https: \/\/gdpr-info.eu\/. (Accessed on 02\/24\/2021)."},{"key":"e_1_3_2_1_2_1","volume-title":"International conference on machine learning. PMLR, 214--223","author":"Arjovsky Martin","year":"2017","unstructured":"Martin Arjovsky , Soumith Chintala , and L\u00e9on Bottou . 2017 . Wasserstein generative adversarial networks . In International conference on machine learning. PMLR, 214--223 . Martin Arjovsky, Soumith Chintala, and L\u00e9on Bottou. 2017. Wasserstein generative adversarial networks. In International conference on machine learning. PMLR, 214--223."},{"key":"e_1_3_2_1_3_1","volume-title":"Consumer Information Privacy and the Problems (s) of Third-Party Disclosures. Nw. J. Tech. & Intell. Prop. 11","author":"Asay Clark D","year":"2012","unstructured":"Clark D Asay . 2012. Consumer Information Privacy and the Problems (s) of Third-Party Disclosures. Nw. J. Tech. & Intell. Prop. 11 ( 2012 ), xxxi. Clark D Asay. 2012. Consumer Information Privacy and the Problems (s) of Third-Party Disclosures. Nw. J. Tech. & Intell. Prop. 11 (2012), xxxi."},{"key":"e_1_3_2_1_4_1","unstructured":"Brooke Auxier Lee Rainie Monica Anderson Andrew Perrin Madhu Kumar and Erica Turner. 2019. Americans and Privacy: Concerned Confused and Feeling Lack of Control Over Their Personal Information | Pew Research Center. https:\/\/pewrsr.ch\/3ywnkLl. (Accessed on 02\/24\/2021).  Brooke Auxier Lee Rainie Monica Anderson Andrew Perrin Madhu Kumar and Erica Turner. 2019. Americans and Privacy: Concerned Confused and Feeling Lack of Control Over Their Personal Information | Pew Research Center. https:\/\/pewrsr.ch\/3ywnkLl. (Accessed on 02\/24\/2021)."},{"key":"e_1_3_2_1_5_1","volume-title":"Salah El hadaj, and Mohamed Idhammad","author":"Belouch Mustapha","year":"2018","unstructured":"Mustapha Belouch , Salah El hadaj, and Mohamed Idhammad . 2018 . Performance evaluation of intrusion detection based on machine learning using Apache Spark. Procedia Computer Science 127 (01 2018), 1--6. https:\/\/doi.org\/10.1016\/j.procs. 2018.01.091 Mustapha Belouch, Salah El hadaj, and Mohamed Idhammad. 2018. Performance evaluation of intrusion detection based on machine learning using Apache Spark. Procedia Computer Science 127 (01 2018), 1--6. https:\/\/doi.org\/10.1016\/j.procs. 2018.01.091"},{"key":"e_1_3_2_1_6_1","volume-title":"Large scale GAN training for high fidelity natural image synthesis. arXiv preprint arXiv:1809.11096","author":"Brock Andrew","year":"2018","unstructured":"Andrew Brock , Jeff Donahue , and Karen Simonyan . 2018. Large scale GAN training for high fidelity natural image synthesis. arXiv preprint arXiv:1809.11096 ( 2018 ). Andrew Brock, Jeff Donahue, and Karen Simonyan. 2018. Large scale GAN training for high fidelity natural image synthesis. arXiv preprint arXiv:1809.11096 (2018)."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 30th International Conference on Neural Information Processing Systems. 2180--2188","author":"Chen Xi","year":"2016","unstructured":"Xi Chen , Yan Duan , Rein Houthooft , John Schulman , Ilya Sutskever , and Pieter Abbeel . 2016 . Infogan: Interpretable representation learning by information maximizing generative adversarial nets . In Proceedings of the 30th International Conference on Neural Information Processing Systems. 2180--2188 . Xi Chen, Yan Duan, Rein Houthooft, John Schulman, Ilya Sutskever, and Pieter Abbeel. 2016. Infogan: Interpretable representation learning by information maximizing generative adversarial nets. In Proceedings of the 30th International Conference on Neural Information Processing Systems. 2180--2188."},{"key":"e_1_3_2_1_8_1","unstructured":"Federal Trade Commission et al. 2016. Children's online privacy protection rule (\"coppa\"). Retrieved on September 16 (2016).  Federal Trade Commission et al. 2016. Children's online privacy protection rule (\"coppa\"). Retrieved on September 16 (2016)."},{"key":"e_1_3_2_1_9_1","unstructured":"PCI Security Standards Council. 2016. Official PCI Security Standards Council Site - Verify PCI Compliance Download Data Security and Credit Card Security Standards. https:\/\/bit.ly\/3ywnthR. (Accessed on 02\/24\/2021).  PCI Security Standards Council. 2016. Official PCI Security Standards Council Site - Verify PCI Compliance Download Data Security and Credit Card Security Standards. https:\/\/bit.ly\/3ywnthR. (Accessed on 02\/24\/2021)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98812-2_35"},{"key":"e_1_3_2_1_11_1","unstructured":"DHS. 1987. National Indonesia Contraceptive Prevalence Survey 1987 - Summary Report. https:\/\/dhsprogram.com\/pubs\/pdf\/SR9\/SR9.pdf. (Accessed on 10\/15\/2021).  DHS. 1987. National Indonesia Contraceptive Prevalence Survey 1987 - Summary Report. https:\/\/dhsprogram.com\/pubs\/pdf\/SR9\/SR9.pdf. (Accessed on 10\/15\/2021)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.11.011"},{"key":"e_1_3_2_1_13_1","volume-title":"Effective data generation for imbalanced learning using Conditional Generative Adversarial Networks. Expert Systems with Applications 91 (09","author":"Douzas Georgios","year":"2017","unstructured":"Georgios Douzas and Fernando Ba\u00e7\u00e3o . 2017. Effective data generation for imbalanced learning using Conditional Generative Adversarial Networks. Expert Systems with Applications 91 (09 2017 ). https:\/\/doi.org\/10.1016\/j.eswa.2017.09.030 Georgios Douzas and Fernando Ba\u00e7\u00e3o. 2017. Effective data generation for imbalanced learning using Conditional Generative Adversarial Networks. Expert Systems with Applications 91 (09 2017). https:\/\/doi.org\/10.1016\/j.eswa.2017.09.030"},{"key":"e_1_3_2_1_14_1","unstructured":"Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository. http: \/\/archive.ics.uci.edu\/ml  Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository. http: \/\/archive.ics.uci.edu\/ml"},{"key":"e_1_3_2_1_15_1","volume-title":"Theory of cryptography conference","author":"Dwork Cynthia","unstructured":"Cynthia Dwork , Frank McSherry , Kobbi Nissim , and Adam Smith . 2006. Calibrating noise to sensitivity in private data analysis . In Theory of cryptography conference . Springer , 265--284. Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. Springer, 265--284."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M2716"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-1809.1936.tb02137.x"},{"key":"e_1_3_2_1_18_1","volume-title":"Performance analysis of Snort-based Intrusion Detection System. (01","author":"Garg Akash","year":"2016","unstructured":"Akash Garg and Prachi Maheshwari . 2016. Performance analysis of Snort-based Intrusion Detection System. (01 2016 ), 1--5. https:\/\/doi.org\/10.1109\/ICACCS. 2016.7586351 Akash Garg and Prachi Maheshwari. 2016. Performance analysis of Snort-based Intrusion Detection System. (01 2016), 1--5. https:\/\/doi.org\/10.1109\/ICACCS. 2016.7586351"},{"key":"e_1_3_2_1_19_1","volume-title":"Generative adversarial nets. Advances in neural information processing systems 27","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow , Jean Pouget-Abadie , Mehdi Mirza , Bing Xu , David Warde-Farley , Sherjil Ozair , Aaron Courville , and Yoshua Bengio . 2014. Generative adversarial nets. Advances in neural information processing systems 27 ( 2014 ). Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. Advances in neural information processing systems 27 (2014)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9005668"},{"key":"e_1_3_2_1_22_1","volume-title":"Tabular Playground Series -","year":"2021","unstructured":"kaggle.com. 2021. Tabular Playground Series - Oct 2021 | Kaggle . https:\/\/www. kaggle.com\/c\/tabular-playground-series-oct-2021. (Accessed on 10\/15\/2021). kaggle.com. 2021. Tabular Playground Series - Oct 2021 | Kaggle. https:\/\/www. kaggle.com\/c\/tabular-playground-series-oct-2021. (Accessed on 10\/15\/2021)."},{"key":"e_1_3_2_1_23_1","first-page":"202","article-title":"Scaling up the accuracy of naive-bayes classifiers: A decision-tree hybrid","volume":"96","author":"Ron Kohavi","year":"1996","unstructured":"Ron Kohavi et al. 1996 . Scaling up the accuracy of naive-bayes classifiers: A decision-tree hybrid .. In Kdd , Vol. 96. 202 -- 207 . Ron Kohavi et al. 1996. Scaling up the accuracy of naive-bayes classifiers: A decision-tree hybrid.. In Kdd, Vol. 96. 202--207.","journal-title":"Kdd"},{"key":"e_1_3_2_1_24_1","volume-title":"Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom)","author":"Kotal Anantaa","unstructured":"Anantaa Kotal , Anupam Joshi , and Karuna Pande Joshi . [n. d.]. The Effect of Text Ambiguity on creating Policy Knowledge Graphs. In 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications , Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom) . IEEE , 1491--1500. Anantaa Kotal, Anupam Joshi, and Karuna Pande Joshi. [n. d.]. The Effect of Text Ambiguity on creating Policy Knowledge Graphs. In 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom). IEEE, 1491--1500."},{"key":"e_1_3_2_1_25_1","volume-title":"Karuna Pande Joshi, and Anupam Joshi","author":"Kotal Anantaa","year":"2020","unstructured":"Anantaa Kotal , Karuna Pande Joshi, and Anupam Joshi . 2020 . ViCLOUD: Measuring Vagueness in Cloud Service Privacy Policies and Terms of Services. UMBC Information Systems Department ( 2020). Anantaa Kotal, Karuna Pande Joshi, and Anupam Joshi. 2020. ViCLOUD: Measuring Vagueness in Cloud Service Privacy Policies and Terms of Services. UMBC Information Systems Department (2020)."},{"key":"e_1_3_2_1_26_1","first-page":"313","article-title":"Measures of disclosure risk and harm","volume":"9","author":"Lambert Diane","year":"1993","unstructured":"Diane Lambert . 1993 . Measures of disclosure risk and harm . JOURNAL OF OFFICIAL STATISTICS-STOCKHOLM- 9 (1993), 313 -- 313 . Diane Lambert. 1993. Measures of disclosure risk and harm. JOURNAL OF OFFICIAL STATISTICS-STOCKHOLM- 9 (1993), 313--313.","journal-title":"JOURNAL OF OFFICIAL STATISTICS-STOCKHOLM-"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382914"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_1_29_1","volume-title":"Pattern recognition and machine learning","author":"Bishop Christopher M","year":"2006","unstructured":"Christopher M Bishop . 2006. Pattern recognition and machine learning . Springer ( 2006 ). Christopher M Bishop. 2006. Pattern recognition and machine learning. Springer (2006)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_1_31_1","volume-title":"Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784","author":"Mirza Mehdi","year":"2014","unstructured":"Mehdi Mirza and Simon Osindero . 2014. Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784 ( 2014 ). Mehdi Mirza and Simon Osindero. 2014. Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784 (2014)."},{"key":"e_1_3_2_1_32_1","volume-title":"Intrusion Detection using Naive Bayes Classifier with Feature Reduction. Procedia Technology 4 (12","author":"Mukherjee Saurabh","year":"2012","unstructured":"Saurabh Mukherjee and Neelam Sharma . 2012. Intrusion Detection using Naive Bayes Classifier with Feature Reduction. Procedia Technology 4 (12 2012 ), 119--128. https:\/\/doi.org\/10.1016\/j.protcy.2012.05.017 Saurabh Mukherjee and Neelam Sharma. 2012. Intrusion Detection using Naive Bayes Classifier with Feature Reduction. Procedia Technology 4 (12 2012), 119--128. https:\/\/doi.org\/10.1016\/j.protcy.2012.05.017"},{"key":"e_1_3_2_1_33_1","volume-title":"Deep reinforcement learning for cyber security. arXiv preprint arXiv:1906.05799","author":"Nguyen Thanh Thi","year":"2019","unstructured":"Thanh Thi Nguyen and Vijay Janapa Reddi . 2019. Deep reinforcement learning for cyber security. arXiv preprint arXiv:1906.05799 ( 2019 ). Thanh Thi Nguyen and Vijay Janapa Reddi. 2019. Deep reinforcement learning for cyber security. arXiv preprint arXiv:1906.05799 (2019)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00020"},{"key":"e_1_3_2_1_35_1","volume-title":"Using Knowledge Graphs and Reinforcement Learning for Malware Analysis. In 2020 IEEE International Conference on Big Data (Big Data). IEEE, 2626--2633","author":"Piplai Aritran","year":"2020","unstructured":"Aritran Piplai , Priyanka Ranade , Anantaa Kotal , Sudip Mittal , Sandeep Nair Narayanan , and Anupam Joshi . 2020 . Using Knowledge Graphs and Reinforcement Learning for Malware Analysis. In 2020 IEEE International Conference on Big Data (Big Data). IEEE, 2626--2633 . Aritran Piplai, Priyanka Ranade, Anantaa Kotal, Sudip Mittal, Sandeep Nair Narayanan, and Anupam Joshi. 2020. Using Knowledge Graphs and Reinforcement Learning for Malware Analysis. In 2020 IEEE International Conference on Big Data (Big Data). IEEE, 2626--2633."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2019.9010051"},{"key":"e_1_3_2_1_37_1","volume-title":"5: programs for machine learning","author":"Quinlan J Ross","unstructured":"J Ross Quinlan . 2014. C4. 5: programs for machine learning . Elsevier . J Ross Quinlan. 2014. C4. 5: programs for machine learning. Elsevier."},{"key":"e_1_3_2_1_38_1","volume-title":"Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434","author":"Radford Alec","year":"2015","unstructured":"Alec Radford , Luke Metz , and Soumith Chintala . 2015. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434 ( 2015 ). Alec Radford, Luke Metz, and Soumith Chintala. 2015. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434 (2015)."},{"key":"e_1_3_2_1_39_1","volume-title":"Carlo Tomasi, and Leonidas J Guibas","author":"Rubner Yossi","year":"2000","unstructured":"Yossi Rubner , Carlo Tomasi, and Leonidas J Guibas . 2000 . The earth mover's distance as a metric for image retrieval. International journal of computer vision 40, 2 (2000), 99--121. Yossi Rubner, Carlo Tomasi, and Leonidas J Guibas. 2000. The earth mover's distance as a metric for image retrieval. International journal of computer vision 40, 2 (2000), 99--121."},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the annual symposium on computer application in medical care. American Medical Informatics Association, 261","author":"Smith Jack W","year":"1988","unstructured":"Jack W Smith , James E Everhart , WC Dickson , William C Knowler , and Robert Scott Johannes . 1988 . Using the ADAP learning algorithm to forecast the onset of diabetes mellitus . In Proceedings of the annual symposium on computer application in medical care. American Medical Informatics Association, 261 . Jack W Smith, James E Everhart, WC Dickson, William C Knowler, and Robert Scott Johannes. 1988. Using the ADAP learning algorithm to forecast the onset of diabetes mellitus. In Proceedings of the annual symposium on computer application in medical care. American Medical Informatics Association, 261."},{"key":"e_1_3_2_1_41_1","unstructured":"Secure Hash Standard. 2009. The cryptographic Hash algorithm family: Revision of the secure Hash standard and ongoing competition for new hash algorithms. (2009).  Secure Hash Standard. 2009. The cryptographic Hash algorithm family: Revision of the secure Hash standard and ongoing competition for new hash algorithms. (2009)."},{"key":"e_1_3_2_1_42_1","volume-title":"Workshops at the Thirty-First AAAI Conference on Artificial Intelligence.","author":"Tuor Aaron","year":"2017","unstructured":"Aaron Tuor , Samuel Kaplan , Brian Hutchinson , Nicole Nichols , and Sean Robinson . 2017 . Deep learning for unsupervised insider threat detection in structured cybersecurity data streams . In Workshops at the Thirty-First AAAI Conference on Artificial Intelligence. Aaron Tuor, Samuel Kaplan, Brian Hutchinson, Nicole Nichols, and Sean Robinson. 2017. Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. In Workshops at the Thirty-First AAAI Conference on Artificial Intelligence."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00917"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700291"},{"key":"e_1_3_2_1_45_1","volume-title":"Modeling tabular data using conditional gan. arXiv preprint arXiv:1907.00503","author":"Xu Lei","year":"2019","unstructured":"Lei Xu , Maria Skoularidou , Alfredo Cuesta-Infante , and Kalyan Veeramachaneni . 2019. Modeling tabular data using conditional gan. arXiv preprint arXiv:1907.00503 ( 2019 ). Lei Xu, Maria Skoularidou, Alfredo Cuesta-Infante, and Kalyan Veeramachaneni. 2019. Modeling tabular data using conditional gan. arXiv preprint arXiv:1907.00503 (2019)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.629"},{"key":"e_1_3_2_1_47_1","unstructured":"Jiong Zhang and Mohammad Zulkern  Jiong Zhang and Mohammad Zulkern"}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","location":"Baltimore MD USA","acronym":"CODASPY '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510548.3519377","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510548.3519377","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:19Z","timestamp":1750191139000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510548.3519377"}},"subtitle":["Secure and Privacy-Preserving sharing of Tabular Data"],"short-title":[],"issued":{"date-parts":[[2022,4,18]]},"references-count":47,"alternative-id":["10.1145\/3510548.3519377","10.1145\/3510548"],"URL":"https:\/\/doi.org\/10.1145\/3510548.3519377","relation":{},"subject":[],"published":{"date-parts":[[2022,4,18]]},"assertion":[{"value":"2022-04-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}