{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:59Z","timestamp":1750309559699,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T00:00:00Z","timestamp":1732147200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,21]]},"DOI":"10.1145\/3708657.3708761","type":"proceedings-article","created":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T11:13:43Z","timestamp":1748517223000},"page":"644-651","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["EDPP-GAN: Synthesizing Tabular Data with Enhanced Dual Conditional Discriminators and Proximal-Pessimistic Nets"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7162-3067","authenticated-orcid":false,"given":"Gongju","family":"Wang","sequence":"first","affiliation":[{"name":"China Unicom Data Intelligence (Hangzhou) Co., Ltd., Beijing, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3698-2152","authenticated-orcid":false,"given":"Yang","family":"Li","sequence":"additional","affiliation":[{"name":"China Unicom Data Intelligence (Hangzhou) Co., Ltd., Beijing, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3009-3674","authenticated-orcid":false,"given":"Long","family":"Yan","sequence":"additional","affiliation":[{"name":"China Unicom Data Intelligence (Hangzhou) Co., Ltd., Beijing, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4936-728X","authenticated-orcid":false,"given":"Julaiti","family":"Juxihong","sequence":"additional","affiliation":[{"name":"China Unicom Data Intelligence (Hangzhou) Co., Ltd., Beijing, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5726-6928","authenticated-orcid":false,"given":"Dazhong","family":"Li","sequence":"additional","affiliation":[{"name":"China Unicom Data Intelligence (Hangzhou) Co., Ltd., Beijing, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4279-2715","authenticated-orcid":false,"given":"Yinjun","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology,, Beijing Jiaotong University, Beijing, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1029-7823","authenticated-orcid":false,"given":"Yulun","family":"Song","sequence":"additional","affiliation":[{"name":"China Unicom Data Intelligence (Hangzhou) Co., Ltd., Beijing, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2025,5,29]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"Jonas Adler and Sebastian Lunz. 2018. Banach wasserstein gan. Advances in neural information processing systems 31 (2018)."},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Alankrita Aggarwal Mamta Mittal and Gopi Battineni. 2021. Generative adversarial network: An overview of theory and applications. International Journal of Information Management Data Insights 1 1 (2021) 100004.","DOI":"10.1016\/j.jjimei.2020.100004"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Shahnawaz Ahmed Carlos\u00a0S\u00e1nchez Mu\u00f1oz Franco Nori and Anton\u00a0Frisk Kockum. 2021. Quantum state tomography with conditional generative adversarial networks. Physical Review Letters 127 14 (2021) 140502.","DOI":"10.1103\/PhysRevLett.127.140502"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Manal AlAmir and Manal AlGhamdi. 2022. The Role of generative adversarial network in medical image analysis: An in-depth survey. Comput. Surveys 55 5 (2022) 1\u201336.","DOI":"10.1145\/3527849"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Karim Armanious Chenming Jiang Marc Fischer Thomas K\u00fcstner Tobias Hepp Konstantin Nikolaou Sergios Gatidis and Bin Yang. 2020. MedGAN: Medical image translation using GANs. Computerized medical imaging and graphics 79 (2020) 101684.","DOI":"10.1016\/j.compmedimag.2019.101684"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Zahra Azizi Chaoyi Zheng Lucy Mosquera Louise Pilote and Khaled El\u00a0Emam. 2021. Can synthetic data be a proxy for real clinical trial data? A validation study. BMJ open 11 4 (2021) e043497.","DOI":"10.1136\/bmjopen-2020-043497"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00266"},{"key":"e_1_3_3_1_9_2","unstructured":"G\u00c3\u0160rard Biau Maxime Sangnier and Ugo Tanielian. 2021. Some theoretical insights into Wasserstein GANs. Journal of Machine Learning Research 22 119 (2021) 1\u201345."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Christoph Buck John Clarke Rui\u00a0Torres de Oliveira Kevin\u00a0C Desouza and Parisa Maroufkhani. 2023. Digital transformation in asset-intensive organisations: The light and the dark side. Journal of Innovation & Knowledge 8 2 (2023) 100335.","DOI":"10.1016\/j.jik.2023.100335"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Justin Engelmann and Stefan Lessmann. 2021. Conditional Wasserstein GAN-based oversampling of tabular data for imbalanced learning. Expert Systems with Applications 174 (2021) 114582.","DOI":"10.1016\/j.eswa.2021.114582"},{"key":"e_1_3_3_1_12_2","first-page":"1587","volume-title":"International conference on machine learning","author":"Fujimoto Scott","year":"2018","unstructured":"Scott Fujimoto, Herke Hoof, and David Meger. 2018. Addressing function approximation error in actor-critic methods. In International conference on machine learning. PMLR, 1587\u20131596."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-0619-0_53"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-8731-3_8"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Mikel Hernadez Gorka Epelde Ane Alberdi Rodrigo Cilla and Debbie Rankin. 2023. Synthetic tabular data evaluation in the health domain covering resemblance utility and privacy dimensions. Methods of Information in Medicine (2023).","DOI":"10.1055\/s-0042-1760247"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Stefanie James Chris Harbron Janice Branson and Mimmi Sundler. 2021. Synthetic data use: exploring use cases to optimise data utility. Discover Artificial Intelligence 1 1 (2021) 15.","DOI":"10.1007\/s44163-021-00016-y"},{"key":"e_1_3_3_1_17_2","unstructured":"Liming Jiang Bo Dai Wayne Wu and Chen\u00a0Change Loy. 2021. Deceive d: Adaptive pseudo augmentation for gan training with limited data. Advances in Neural Information Processing Systems 34 (2021) 21655\u201321667."},{"key":"e_1_3_3_1_18_2","unstructured":"James Jordon Lukasz Szpruch Florimond Houssiau Mirko Bottarelli Giovanni Cherubin Carsten Maple Samuel\u00a0N Cohen and Adrian Weller. 2022. Synthetic Data\u2013what why and how? arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2205.03257 (2022)."},{"key":"e_1_3_3_1_19_2","volume-title":"International conference on learning representations","author":"Jordon James","year":"2018","unstructured":"James Jordon, Jinsung Yoon, and Mihaela Van Der\u00a0Schaar. 2018. PATE-GAN: Generating synthetic data with differential privacy guarantees. In International conference on learning representations."},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Inda Kreso Amra Kapo and Lejla Turulja. 2021. Data mining privacy preserving: Research agenda. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 11 1 (2021) e1392.","DOI":"10.1002\/widm.1392"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Moritz Laurer and Timo Seidl. 2021. Regulating the European data-driven economy: A case study on the general data protection regulation. Policy & Internet 13 2 (2021) 257\u2013277.","DOI":"10.1002\/poi3.246"},{"key":"e_1_3_3_1_22_2","unstructured":"Jung\u00a0Wan Lee. 2021. The Data Sharing Economy and Open Governance of Big Data as Public Good. Lee Jung Wan (2021). The Data Sharing Economy and Open Governance of Big Data as Public Good. Journal of Asian Finance Economics and Business 8 11 (2021) 87\u201396."},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33014213"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Wei Li Li Fan Zhenyu Wang Chao Ma and Xiaohui Cui. 2021. Tackling mode collapse in multi-generator GANs with orthogonal vectors. Pattern Recognition 110 (2021) 107646.","DOI":"10.1016\/j.patcog.2020.107646"},{"key":"e_1_3_3_1_25_2","unstructured":"Zinan Lin Ashish Khetan Giulia Fanti and Sewoong Oh. 2018. Pacgan: The power of two samples in generative adversarial networks. Advances in neural information processing systems 31 (2018)."},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3532044"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"crossref","unstructured":"Jianguo Liu and Sheng Zhou. 2021. Application research of data mining technology in personal privacy protection and material data analysis. Integrated Ferroelectrics 216 1 (2021) 29\u201342.","DOI":"10.1080\/10584587.2021.1911255"},{"key":"e_1_3_3_1_28_2","unstructured":"Arvind Mahankali Tatsunori\u00a0B Hashimoto and Tengyu Ma. 2023. One step of gradient descent is provably the optimal in-context learner with one layer of linear self-attention. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2307.03576 (2023)."},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"crossref","unstructured":"Chiara Marcolla Victor Sucasas Marc Manzano Riccardo Bassoli Frank\u00a0HP Fitzek and Najwa Aaraj. 2022. Survey on fully homomorphic encryption theory and applications. Proc. IEEE 110 10 (2022) 1572\u20131609.","DOI":"10.1109\/JPROC.2022.3205665"},{"key":"e_1_3_3_1_30_2","unstructured":"Mehdi Mirza and Simon Osindero. 2014. Conditional generative adversarial nets. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1411.1784 (2014)."},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"crossref","unstructured":"Hajra Murtaza Musharif Ahmed Naurin\u00a0Farooq Khan Ghulam Murtaza Saad Zafar and Ambreen Bano. 2023. Synthetic data generation: State of the art in health care domain. Computer Science Review 48 (2023) 100546.","DOI":"10.1016\/j.cosrev.2023.100546"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3490354.3494393"},{"key":"e_1_3_3_1_33_2","unstructured":"Noseong Park Mahmoud Mohammadi Kshitij Gorde Sushil Jajodia Hongkyu Park and Youngmin Kim. 2018. Data synthesis based on generative adversarial networks. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1806.03384 (2018)."},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00110"},{"key":"e_1_3_3_1_35_2","unstructured":"John Schulman Filip Wolski Prafulla Dhariwal Alec Radford and Oleg Klimov. 2017. Proximal policy optimization algorithms. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1707.06347 (2017)."},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"crossref","unstructured":"Zhuang Shao Fengqi Si Huaijiang Wu and Xiaozhong Tong. 2021. An agile and intelligent dynamic economic emission dispatcher based on multi-objective proximal policy optimization. Applied Soft Computing 102 (2021) 107047.","DOI":"10.1016\/j.asoc.2020.107047"},{"key":"e_1_3_3_1_37_2","unstructured":"Unknown. 2022. Ctab-gan+: Enhancing tabular data synthesis. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2204.00401 (2022). https:\/\/arxiv.org\/abs\/2204.00401"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"crossref","unstructured":"Jun Wang Erlei Zhang Shan Cui Jiaxin Wang Qunxi Zhang Jianping Fan and Jinye Peng. 2023. GGD-GAN: Gradient-Guided dual-Branch adversarial networks for relic sketch generation. Pattern Recognition 141 (2023) 109586.","DOI":"10.1016\/j.patcog.2023.109586"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20050-2_18"},{"key":"e_1_3_3_1_40_2","volume-title":"ICLR Workshop on Deep Generative Models for Highly Structured Data","author":"Wen Bingyang","year":"2022","unstructured":"Bingyang Wen, Yupeng Cao, Fan Yang, Koduvayur Subbalakshmi, and Rajarathnam Chandramouli. 2022. Causal-tgan: Modeling tabular data using causally-aware gan. In ICLR Workshop on Deep Generative Models for Highly Structured Data."},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"crossref","unstructured":"Steve Wilkinson. 2020. Artificial intelligence facial recognition technology and data privacy. Journal of Data Protection & Privacy 3 2 (2020) 186\u2013198.","DOI":"10.69554\/ADGP4642"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"crossref","unstructured":"Chuan-Chun Wu and Hsin-Chung Chu. 2021. Critical factors in central government information and data governance-Empirical study. Rev. Cercet. si Interv. Soc 73 (2021) 248\u2013261.","DOI":"10.33788\/rcis.73.15"},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"crossref","unstructured":"Dingyi Xiang Wei Cai et\u00a0al. 2021. Privacy protection and secondary use of health data: Strategies and methods. BioMed Research International 2021 (2021).","DOI":"10.1155\/2021\/6967166"},{"key":"e_1_3_3_1_44_2","unstructured":"Lei Xu Maria Skoularidou Alfredo Cuesta-Infante and Kalyan Veeramachaneni. 2019. Modeling tabular data using conditional gan. Advances in neural information processing systems 32 (2019)."},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"crossref","unstructured":"Mengmeng Yang Taolin Guo Tianqing Zhu Ivan Tjuawinata Jun Zhao and Kwok-Yan Lam. 2023. Local differential privacy and its applications: A comprehensive survey. Computer Standards & Interfaces (2023) 103827.","DOI":"10.1016\/j.csi.2023.103827"},{"key":"e_1_3_3_1_46_2","unstructured":"Chao Yu Akash Velu Eugene Vinitsky Jiaxuan Gao Yu Wang Alexandre Bayen and Yi Wu. 2022. The surprising effectiveness of ppo in cooperative multi-agent games. Advances in Neural Information Processing Systems 35 (2022) 24611\u201324624."},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"crossref","unstructured":"Yaling Zhang and Jin Han. 2021. Differential privacy fuzzy C-means clustering algorithm based on gaussian kernel function. Plos one 16 3 (2021) e0248737.","DOI":"10.1371\/journal.pone.0248737"},{"key":"e_1_3_3_1_48_2","unstructured":"Zilong Zhao Aditya Kunar Robert Birke and Lydia\u00a0Y Chen. 2022. Ctab-gan+: Enhancing tabular data synthesis. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2204.00401 (2022)."}],"event":{"name":"ICCIP 2024: 2024 the 10th International Conference on Communication and Information Processing","acronym":"ICCIP 2024","location":"Lingshui Hainan China"},"container-title":["Proceedings of the 2024 10th International Conference on Communication and Information Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708657.3708761","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708657.3708761","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:58Z","timestamp":1750295938000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708657.3708761"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,21]]},"references-count":47,"alternative-id":["10.1145\/3708657.3708761","10.1145\/3708657"],"URL":"https:\/\/doi.org\/10.1145\/3708657.3708761","relation":{},"subject":[],"published":{"date-parts":[[2024,11,21]]},"assertion":[{"value":"2025-05-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}