{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T00:50:21Z","timestamp":1771980621401,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Spanish Ministry of Economic Affairs and Digital Transformation","award":["TSI-063000-2021-141 TSI-063000-2021-142 TSI-063000-2021-146 TSI-063000-2021-147"],"award-info":[{"award-number":["TSI-063000-2021-141 TSI-063000-2021-142 TSI-063000-2021-146 TSI-063000-2021-147"]}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["101168311"],"award-info":[{"award-number":["101168311"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1145\/3672608.3707864","type":"proceedings-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T18:26:21Z","timestamp":1747247181000},"page":"114-121","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-Preserving Data Obfuscation for Credit Scoring"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5377-2651","authenticated-orcid":false,"given":"Vittorio","family":"Prodomo","sequence":"first","affiliation":[{"name":"University Carlos III of Madrid, Madrid, Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1143-9882","authenticated-orcid":false,"given":"Roberto","family":"Gonzalez","sequence":"additional","affiliation":[{"name":"NEC Labs Europe, Heidelberg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9494-1853","authenticated-orcid":false,"given":"Marco","family":"Gramaglia","sequence":"additional","affiliation":[{"name":"University Carlos III of Madrid, Madrid, Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5876-0382","authenticated-orcid":false,"given":"Simon Pietro","family":"Romano","sequence":"additional","affiliation":[{"name":"University Federico II of Naples, Naples, Naples, Italy"}]}],"member":"320","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"L. Andolfo et al. 2021. Privacy-Preserving Credit Scoring via Functional Encryption. In Computational Science and Its Applications - ICCSA 2021 O. Gervasi et al. (Eds.). Springer International Publishing Cham 31\u201343.","DOI":"10.1007\/978-3-030-87010-2_3"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging10100239"},{"key":"e_1_3_2_1_3_1","volume-title":"Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28\u201330, 2011. Proceedings 8. Springer, 253\u2013273","year":"2011","unstructured":"Boneh et al. 2011. Functional encryption: Definitions and challenges. In Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28\u201330, 2011. Proceedings 8. Springer, 253\u2013273."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.11.041"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383455.3422562"},{"key":"e_1_3_2_1_6_1","unstructured":"De Cristofaro et al. 2020. An overview of privacy in machine learning. arXiv preprint arXiv:2005.08679 (2020)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35535-6_1"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR).","year":"2016","unstructured":"Dosovitskiy et al. 2016. Inverting Visual Representations With Convolutional Networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"C. Dwork et al. 2006. Calibrating Noise to Sensitivity in Private Data Analysis. In Theory of Cryptography S. Halevi et al. (Eds.). Springer Berlin Heidelberg Berlin Heidelberg 265.","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_10_1","volume-title":"International conference on machine learning. PMLR, 201\u2013210","year":"2016","unstructured":"Gilad-Bachrach et al. 2016. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In International conference on machine learning. PMLR, 201\u2013210."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of International Conference on Data Science and Applications, Mukesh Saraswat et al. (Eds.). Springer Nature Singapore","unstructured":"Ioannis Grigoriadis et al. 2023. Machine Learning as a Service (MLaaS)\u2014An Enterprise Perspective. In Proceedings of International Conference on Data Science and Applications, Mukesh Saraswat et al. (Eds.). Springer Nature Singapore, Singapore, 261\u2013273."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359824"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118878"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"Leiser et al. 2020. Governing machine-learning models: challenging the personal data presumption. International Data Privacy Law 10 3 (08 2020) 187\u2013200. arXiv:https:\/\/academic.oup.com\/idpl\/article-pdf\/10\/3\/187\/43969793\/idpl_10_3_187.pdf 10.1093\/idpl\/ipaa009","DOI":"10.1093\/idpl\/ipaa009"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"LendingClub et al. [n. d.]. https:\/\/lendingclub.com. Accessed: 2024-07-05.","DOI":"10.47362\/EJSSS.2024.5501"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403125"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"N. Li et al. 2007. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. 106\u2013115.","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_1_19_1","unstructured":"Maeng et al. 2022. Measuring and Controlling Split Layer Privacy Leakage Using Fisher Information. arXiv preprint arXiv:2209.10119 (2022)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3426955"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.12.115"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems. 3\u201318","year":"2020","unstructured":"Mireshghallah et al. 2020. Shredder: Learning noise distributions to protect inference privacy. In Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems. 3\u201318."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the Web Conference","year":"2021","unstructured":"Mireshghallah et al. 2021. Not all features are equal: Discovering essential features for preserving prediction privacy. In Proceedings of the Web Conference 2021. 669\u2013680."},{"key":"e_1_3_2_1_24_1","first-page":"54","article-title":"Deep private-feature extraction","volume":"32","year":"2018","unstructured":"Osia et al. 2018. Deep private-feature extraction. IEEE Transactions on Knowledge and Data Engineering 32, 1 (2018), 54\u201366.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2967734"},{"key":"e_1_3_2_1_26_1","unstructured":"Singh et al. 2023. Posthoc privacy guarantees for collaborative inference with modified Propose-Test-Release. In Advances in Neural Information Processing Systems A. Oh T. Naumann A. Globerson K. Saenko M. Hardt and S. Levine (Eds.) Vol. 36. Curran Associates Inc. 26438\u201326451. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2023\/file\/5433b79562b9fa85bd5da0c95a78c907-Paper-Conference.pdf"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3023084"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Y. Wen et al. 2016. A Discriminative Feature Learning Approach for Deep Face Recognition. In Computer Vision - ECCV 2016. Springer International Publishing Cham 499\u2013515.","DOI":"10.1007\/978-3-319-46478-7_31"},{"key":"e_1_3_2_1_30_1","unstructured":"R. Xu et al. 2021. CoRR abs\/2108.04417 (2021). arXiv:2108.04417 https:\/\/arxiv.org\/abs\/2108.04417"},{"key":"e_1_3_2_1_31_1","unstructured":"Yeo et al. 2023. A comprehensive review on financial explainable AI. arXiv preprint arXiv:2309.11960 (2023)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3388992"}],"event":{"name":"SAC '25: 40th ACM\/SIGAPP Symposium on Applied Computing","location":"Catania International Airport Catania Italy","acronym":"SAC '25","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707864","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672608.3707864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:33Z","timestamp":1750298253000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707864"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":32,"alternative-id":["10.1145\/3672608.3707864","10.1145\/3672608"],"URL":"https:\/\/doi.org\/10.1145\/3672608.3707864","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]},"assertion":[{"value":"2025-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}