{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T04:46:32Z","timestamp":1770353192396,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T00:00:00Z","timestamp":1697846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSERC","award":["Discovery Grant"],"award-info":[{"award-number":["Discovery Grant"]}]},{"name":"ANR","award":["22-PECY-0002 IPOP"],"award-info":[{"award-number":["22-PECY-0002 IPOP"]}]},{"name":"CIFAR","award":["CIFAR-MILA-IVADO-MITACS Catalyst Grant"],"award-info":[{"award-number":["CIFAR-MILA-IVADO-MITACS Catalyst Grant"]}]},{"name":"Canada Research Chair program"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,21]]},"DOI":"10.1145\/3583780.3614754","type":"proceedings-article","created":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T07:45:42Z","timestamp":1697874342000},"page":"5010-5014","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["SNAKE Challenge: Sanitization Algorithms under Attack"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2777-0027","authenticated-orcid":false,"given":"Tristan","family":"Allard","sequence":"first","affiliation":[{"name":"Univ Rennes, CNRS, IRISA, Rennes, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4974-3492","authenticated-orcid":false,"given":"Louis","family":"B\u00e9ziaud","sequence":"additional","affiliation":[{"name":"Univ Rennes, CNRS, IRISA &amp; Universit\u00e9 du Qu\u00e9bec \u00e0 Montr\u00e9al, Rennes, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7326-7377","authenticated-orcid":false,"given":"S\u00e9bastien","family":"Gambs","sequence":"additional","affiliation":[{"name":"Universit\u00e9 du Qu\u00e9bec \u00e0 Montr\u00e9al, Montr\u00e9al, PQ, Canada"}]}],"member":"320","published-online":{"date-parts":[[2023,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"RESSI 2020 - Rendez-vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information. Nouan-le-Fuzelier, France. https:\/\/inria.hal.science\/hal-02512677","author":"Boutet Antoine","year":"2020","unstructured":"Antoine Boutet , Mathieu Cunche , S\u00e9bastien Gambs , Benjamin Nguyen , and Antoine Laurent . 2020 . DARC : Data Anonymization and Re-identification Challenge . In RESSI 2020 - Rendez-vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information. Nouan-le-Fuzelier, France. https:\/\/inria.hal.science\/hal-02512677 Antoine Boutet, Mathieu Cunche, S\u00e9bastien Gambs, Benjamin Nguyen, and Antoine Laurent. 2020. DARC : Data Anonymization and Re-identification Challenge. In RESSI 2020 - Rendez-vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information. Nouan-le-Fuzelier, France. https:\/\/inria.hal.science\/hal-02512677"},{"key":"e_1_3_2_1_2_1","first-page":"3","article-title":"The Algorithmic Foundations of Differential Privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork and Aaron Roth . 2014 . The Algorithmic Foundations of Differential Privacy . Foundations and Trends in Theoretical Computer Science , Vol. 9 , 3 -- 4 (2014), 211--407. https:\/\/doi.org\/10.1561\/0400000042 10.1561\/0400000042 Cynthia Dwork and Aaron Roth. 2014. The Algorithmic Foundations of Differential Privacy. Foundations and Trends in Theoretical Computer Science, Vol. 9, 3--4 (2014), 211--407. https:\/\/doi.org\/10.1561\/0400000042","journal-title":"Foundations and Trends in Theoretical Computer Science"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 28th USENIX Security Symposium (USENIX Security '19)","author":"Gadotti Andrea","year":"2019","unstructured":"Andrea Gadotti , Florimond Houssiau , Luc Rocher , Benjamin Livshits , and Yves-Alexandre de Montjoye . 2019 . When the Signal is in the Noise: Exploiting Diffix's Sticky Noise . In Proceedings of the 28th USENIX Security Symposium (USENIX Security '19) . 1081--1098. Andrea Gadotti, Florimond Houssiau, Luc Rocher, Benjamin Livshits, and Yves-Alexandre de Montjoye. 2019. When the Signal is in the Noise: Exploiting Diffix's Sticky Noise. In Proceedings of the 28th USENIX Security Symposium (USENIX Security '19). 1081--1098."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0067"},{"key":"e_1_3_2_1_6_1","volume-title":"Camila Rangel Smith, and Lukasz Szpruch","author":"Houssiau Florimond","year":"2022","unstructured":"Florimond Houssiau , James Jordon , Samuel N. Cohen , Owen Daniel , Andrew Elliott , James Geddes , Callum D. Mole , Camila Rangel Smith, and Lukasz Szpruch . 2022 . TAPAS: a Toolbox for Adversarial Privacy Auditing of Synthetic Data. CoRR , Vol. abs\/ 2211 .06550 (2022). Florimond Houssiau, James Jordon, Samuel N. Cohen, Owen Daniel, Andrew Elliott, James Geddes, Callum D. Mole, Camila Rangel Smith, and Lukasz Szpruch. 2022. TAPAS: a Toolbox for Adversarial Privacy Auditing of Synthetic Data. CoRR, Vol. abs\/2211.06550 (2022)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3523273"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557546"},{"key":"e_1_3_2_1_9_1","unstructured":"Economic Policy Institute. 2023. Current Population Survey Extracts. https:\/\/microdata.epi.org\/ Version 1.0.40.  Economic Policy Institute. 2023. Current Population Survey Extracts. https:\/\/microdata.epi.org\/ Version 1.0.40."},{"key":"e_1_3_2_1_10_1","volume-title":"Patient Re-identification. In Proceedings of the NeurIPS 2020 Competition and Demonstration Track (NeurIPS '20)","volume":"215","author":"Jordon James","unstructured":"James Jordon , Daniel Jarrett , Evgeny Saveliev , Jinsung Yoon , Paul W. G. Elbers , Patrick Thoral , Ari Ercole , Cheng Zhang , Danielle Belgrave , and Mihaela van der Schaar. 2020. Hide-and-Seek Privacy Challenge: Synthetic Data Generation vs . Patient Re-identification. In Proceedings of the NeurIPS 2020 Competition and Demonstration Track (NeurIPS '20) (Proceedings of Machine Learning Research , Vol. 133), Hugo Jair Escalante and Katja Hofmann (Eds.). PMLR, 206-- 215 . http:\/\/proceedings.mlr.press\/v133\/jordon21a.html James Jordon, Daniel Jarrett, Evgeny Saveliev, Jinsung Yoon, Paul W. G. Elbers, Patrick Thoral, Ari Ercole, Cheng Zhang, Danielle Belgrave, and Mihaela van der Schaar. 2020. Hide-and-Seek Privacy Challenge: Synthetic Data Generation vs. Patient Re-identification. In Proceedings of the NeurIPS 2020 Competition and Demonstration Track (NeurIPS '20) (Proceedings of Machine Learning Research, Vol. 133), Hugo Jair Escalante and Katja Hofmann (Eds.). PMLR, 206--215. http:\/\/proceedings.mlr.press\/v133\/jordon21a.html"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 7th International Conference on Learning Representations (ICLR '19)","author":"Jordon James","unstructured":"James Jordon , Jinsung Yoon , and Mihaela van der Schaar. 2019. PATE-GAN: Generating Synthetic Data with Differential Privacy Guarantees . In Proceedings of the 7th International Conference on Learning Representations (ICLR '19) . James Jordon, Jinsung Yoon, and Mihaela van der Schaar. 2019. PATE-GAN: Generating Synthetic Data with Differential Privacy Guarantees. In Proceedings of the 7th International Conference on Learning Representations (ICLR '19)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bty350"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.778"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning (ICML '19)","volume":"4444","author":"McKenna Ryan","year":"2019","unstructured":"Ryan McKenna , Daniel Sheldon , and Gerome Miklau . 2019 . Graphical-model based estimation and inference for differential privacy . In Proceedings of the 36th International Conference on Machine Learning (ICML '19) (Proceedings of Machine Learning Research , Vol. 97), Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.). PMLR, 4435-- 4444 . http:\/\/proceedings.mlr.press\/v97\/mckenna19a.html Ryan McKenna, Daniel Sheldon, and Gerome Miklau. 2019. Graphical-model based estimation and inference for differential privacy. In Proceedings of the 36th International Conference on Machine Learning (ICML '19) (Proceedings of Machine Learning Research, Vol. 97), Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.). PMLR, 4435--4444. http:\/\/proceedings.mlr.press\/v97\/mckenna19a.html"},{"key":"e_1_3_2_1_15_1","volume-title":"MICO: Membership Inference Competition. https:\/\/github.com\/microsoft\/mico","year":"2023","unstructured":"Microsoft. 2023 . MICO: Membership Inference Competition. https:\/\/github.com\/microsoft\/mico Microsoft. 2023. MICO: Membership Inference Competition. https:\/\/github.com\/microsoft\/mico"},{"key":"e_1_3_2_1_16_1","unstructured":"Callum Mole. 2023. Reprosyn. https:\/\/github.com\/alan-turing-institute\/reprosyn  Callum Mole. 2023. Reprosyn. https:\/\/github.com\/alan-turing-institute\/reprosyn"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0014"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 5th International Conference on Learning Representations (ICLR '17)","author":"Papernot Nicolas","year":"2017","unstructured":"Nicolas Papernot , Mart'i n Abadi , \u00da lfar Erlingsson, Ian J. Goodfellow , and Kunal Talwar . 2017 . Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data . In Proceedings of the 5th International Conference on Learning Representations (ICLR '17) . Nicolas Papernot, Mart'i n Abadi, \u00da lfar Erlingsson, Ian J. Goodfellow, and Kunal Talwar. 2017. Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data. In Proceedings of the 5th International Conference on Learning Representations (ICLR '17)."},{"key":"#cr-split#-e_1_3_2_1_20_1.1","doi-asserted-by":"crossref","unstructured":"Diane Ridgeway Mary F Theofanos Terese W Manley and Christine Task. 2021. Challenge design and lessons learned from the 2018 differential privacy challenges. https:\/\/doi.org\/10.6028\/nist.tn.2151 10.6028\/nist.tn.2151","DOI":"10.6028\/NIST.TN.2151"},{"key":"#cr-split#-e_1_3_2_1_20_1.2","doi-asserted-by":"crossref","unstructured":"Diane Ridgeway Mary F Theofanos Terese W Manley and Christine Task. 2021. Challenge design and lessons learned from the 2018 differential privacy challenges. https:\/\/doi.org\/10.6028\/nist.tn.2151","DOI":"10.6028\/NIST.TN.2151"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2022.100543"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00027"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134428"}],"event":{"name":"CIKM '23: The 32nd ACM International Conference on Information and Knowledge Management","location":"Birmingham United Kingdom","acronym":"CIKM '23","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 32nd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583780.3614754","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3583780.3614754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:31Z","timestamp":1750178791000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583780.3614754"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,21]]},"references-count":24,"alternative-id":["10.1145\/3583780.3614754","10.1145\/3583780"],"URL":"https:\/\/doi.org\/10.1145\/3583780.3614754","relation":{},"subject":[],"published":{"date-parts":[[2023,10,21]]},"assertion":[{"value":"2023-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}