{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T07:32:17Z","timestamp":1766820737374,"version":"3.43.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,25]]},"DOI":"10.1145\/3708821.3736187","type":"proceedings-article","created":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T06:33:18Z","timestamp":1755066798000},"page":"790-806","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards Usability of Data with Privacy: A Unified Framework for Privacy-Preserving Data Sharing with High Utility"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4286-3774","authenticated-orcid":false,"given":"M.A.P.","family":"Chamikara","sequence":"first","affiliation":[{"name":"CSIRO's Data61, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0544-7982","authenticated-orcid":false,"given":"Seung Ick","family":"Jang","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2263-9430","authenticated-orcid":false,"given":"Ian","family":"Oppermann","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0221-2571","authenticated-orcid":false,"given":"Dongxi","family":"Liu","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8324-7900","authenticated-orcid":false,"given":"Musotto","family":"Roberto","sequence":"additional","affiliation":[{"name":"D'Angelo Legal, Perth, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8698-6709","authenticated-orcid":false,"given":"Sushmita","family":"Ruj","sequence":"additional","affiliation":[{"name":"University of New South Wales, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5710-7464","authenticated-orcid":false,"given":"Arindam","family":"Pal","sequence":"additional","affiliation":[{"name":"TechSoftX, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0619-6361","authenticated-orcid":false,"given":"Meisam","family":"Mohammady","sequence":"additional","affiliation":[{"name":"Iowa State University, Iowa, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6353-8359","authenticated-orcid":false,"given":"Seyit","family":"Camtepe","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4779-0760","authenticated-orcid":false,"given":"Sylvia","family":"Young","sequence":"additional","affiliation":[{"name":"Department of Health, Perth, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1066-6184","authenticated-orcid":false,"given":"Chris","family":"Dorrian","sequence":"additional","affiliation":[{"name":"Department of Health, Perth, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9983-7082","authenticated-orcid":false,"given":"Nasir","family":"David","sequence":"additional","affiliation":[{"name":"Department of Health, Perth, Australia"}]}],"member":"320","published-online":{"date-parts":[[2025,8,24]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"2019. Directive (EU) 2019\/1024 on open data and the re-use of public sector information. Official Journal of the EU L0a0172 26 June 2019 p.56. https:\/\/eur-lex.europa.eu\/eli\/dir\/2019\/1024\/oj"},{"key":"e_1_3_3_2_3_2","unstructured":"2019. Foundations for Evidence-Based Policymaking Act of 2018 Public Law 115-435. 132 Stat. 529 (Jan. 14 2019) (Title II: Open Government Data Act). https:\/\/www.congress.gov\/115\/plaws\/publ435\/PLAW-115publ435.pdf"},{"key":"e_1_3_3_2_4_2","unstructured":"2023. Intergovernmental Agreement on National Digital Health 2023\u20132027. Agreement between the Commonwealth of Australia and state\/territory governments. https:\/\/federation.gov.au\/about\/agreements\/intergovernmental-agreement-national-digital-health-2023-2027"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"John\u00a0M Abowd and Ian\u00a0M Schmutte. 2019. An economic analysis of privacy protection and statistical accuracy as social choices. American Economic Review 109 1 (2019) 171\u2013202.","DOI":"10.1257\/aer.20170627"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.8"},{"key":"e_1_3_3_2_8_2","unstructured":"Moustafa Alzantot and Mani Srivastava. 2019. Differential Privacy Synthetic Data Generation using WGANs. https:\/\/github.com\/nesl\/nist_differential_privacy_synthetic_data_challenge\/"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Pathum Chamikara\u00a0Mahawaga Arachchige Peter Bertok Ibrahim Khalil Dongxi Liu Seyit Camtepe and Mohammed Atiquzzaman. 2019. Local differential privacy for deep learning. IEEE Internet of Things Journal 7 7 (2019) 5827\u20135842.","DOI":"10.1109\/JIOT.2019.2952146"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Elisa Bertino Igor\u00a0Nai Fovino and Loredana\u00a0Parasiliti Provenza. 2005. A framework for evaluating privacy preserving data mining algorithms. Data Mining and Knowledge Discovery 11 2 (2005) 121\u2013154.","DOI":"10.1007\/s10618-005-0006-6"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-70992-5_8"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"crossref","unstructured":"Rajendra Bhatia and Chandler Davis. 1995. A Cauchy-Schwarz inequality for operators with applications. Linear algebra and its applications 223 (1995) 119\u2013129.","DOI":"10.1016\/0024-3795(94)00344-D"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"Vincent Bindschaedler Reza Shokri and Carl\u00a0A Gunter. 2017. Plausible Deniability for Privacy-Preserving Data Synthesis. Proceedings of the VLDB Endowment 10 5 (2017).","DOI":"10.14778\/3055540.3055542"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Avrim Blum Katrina Ligett and Aaron Roth. 2013. A learning theory approach to noninteractive database privacy. Journal of the ACM (JACM) 60 2 (2013) 1\u201325.","DOI":"10.1145\/2450142.2450148"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_24"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"crossref","unstructured":"Mahawaga Arachchige\u00a0Pathum Chamikara Peter Bert\u00f3k Ibrahim Khalil Dongxi Liu and Seyit Camtepe. 2020. Privacy preserving face recognition utilizing differential privacy. Computers & Security 97 (2020) 101951.","DOI":"10.1016\/j.cose.2020.101951"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"crossref","unstructured":"Mahawaga Arachchige\u00a0Pathum Chamikara Peter Bert\u00f3k Dongxi Liu Seyit Camtepe and Ibrahim Khalil. 2020. Efficient privacy preservation of big data for accurate data mining. Information Sciences 527 (2020) 420\u2013443.","DOI":"10.1016\/j.ins.2019.05.053"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714621"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1209-4_1"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_29"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Aaron Roth et\u00a0al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9 3\u20134 (2014) 211\u2013407.","DOI":"10.1561\/0400000042"},{"key":"e_1_3_3_2_23_2","unstructured":"Marco Gaboardi James Honaker Gary King Jack Murtagh Kobbi Nissim Jonathan Ullman and Salil Vadhan. 2016. PSI ({\u03a8}): a private data sharing interface. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1609.04340 (2016)."},{"key":"e_1_3_3_2_24_2","first-page":"6944","volume-title":"International Conference on Machine Learning","author":"Ganev Georgi","year":"2022","unstructured":"Georgi Ganev, Bristena Oprisanu, and Emiliano De\u00a0Cristofaro. 2022. Robin Hood and Matthew Effects: Differential Privacy Has Disparate Impact on Synthetic Data. In International Conference on Machine Learning. PMLR, 6944\u20136959."},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"crossref","unstructured":"Yogesh Gupta Ashish Saini and AK Saxena. 2015. A new fuzzy logic based ranking function for efficient information retrieval system. Expert Systems with Applications 42 3 (2015) 1223\u20131234.","DOI":"10.1016\/j.eswa.2014.09.009"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"crossref","unstructured":"ASM Hasan Qingshan Jiang Jun Luo Chengming Li and Lifei Chen. 2016. An effective value swapping method for privacy preserving data publishing. Security and Communication Networks 9 16 (2016) 3219\u20133228.","DOI":"10.1002\/sec.1527"},{"key":"e_1_3_3_2_27_2","first-page":"1895","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Jayaraman Bargav","year":"2019","unstructured":"Bargav Jayaraman and David Evans. 2019. Evaluating differentially private machine learning in practice. In 28th USENIX Security Symposium (USENIX Security 19). 1895\u20131912."},{"key":"e_1_3_3_2_28_2","volume-title":"International Conference on Learning Representations","author":"Jordon James","year":"2018","unstructured":"James Jordon, Jinsung Yoon, and Mihaela Van Der\u00a0Schaar. 2018. PATE-GAN: Generating synthetic data with differential privacy guarantees. In International Conference on Learning Representations."},{"key":"e_1_3_3_2_29_2","first-page":"475","volume-title":"Advances in database technology: proceedings. International conference on extending database technology","author":"Li Haoran","year":"2014","unstructured":"Haoran Li, Li Xiong, and Xiaoqian Jiang. 2014. Differentially private synthesization of multi-dimensional data using copula functions. In Advances in database technology: proceedings. International conference on extending database technology , Vol.\u00a02014. NIH Public Access, 475."},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17140-6_10"},{"key":"e_1_3_3_2_31_2","unstructured":"Ryan McKenna. 2019. private-pgm: An implementation of the tools described in the paper entitled \"Graphical-model based estimation and inference for differential privacy\". https:\/\/github.com\/ryan112358\/private-pgm\/"},{"key":"e_1_3_3_2_32_2","first-page":"4435","volume-title":"International Conference on Machine Learning","author":"McKenna Ryan","year":"2019","unstructured":"Ryan McKenna, Daniel Sheldon, and Gerome Miklau. 2019. Graphical-model based estimation and inference for differential privacy. In International Conference on Machine Learning. PMLR, 4435\u20134444."},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"crossref","unstructured":"Krishnamurty Muralidhar Rahul Parsa and Rathindra Sarathy. 1999. A general additive data perturbation method for database security. management science 45 10 (1999) 1399\u20131415.","DOI":"10.1287\/mnsc.45.10.1399"},{"key":"e_1_3_3_2_35_2","unstructured":"Parliament of Australia. 2022. Data Availability and Transparency Act 2022. https:\/\/www.legislation.gov.au\/C2022A00011\/latest\/text. https:\/\/www.legislation.gov.au\/C2022A00011\/latest\/text Act No. 11 of 2022."},{"key":"e_1_3_3_2_36_2","unstructured":"Yuchao Tao Ryan McKenna Michael Hay Ashwin Machanavajjhala and Gerome Miklau. 2021. Benchmarking differentially private synthetic data generation algorithms. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2112.09238 (2021)."},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.92"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/NWeSP.2008.41"},{"key":"e_1_3_3_2_39_2","unstructured":"Liyang Xie Kaixiang Lin Shu Wang Fei Wang and Jiayu Zhou. 2018. Differentially private generative adversarial network. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1802.06739 (2018)."},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"crossref","unstructured":"Lei Xu Chunxiao Jiang Yan Chen Yong Ren and KJ\u00a0Ray Liu. 2015. Privacy or utility in data collection? A contract theoretic approach. IEEE Journal of Selected Topics in Signal Processing 9 7 (2015) 1256\u20131269.","DOI":"10.1109\/JSTSP.2015.2425798"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"crossref","unstructured":"Jun Zhang Graham Cormode Cecilia\u00a0M Procopiuc Divesh Srivastava and Xiaokui Xiao. 2017. Privbayes: Private data release via bayesian networks. ACM Transactions on Database Systems (TODS) 42 4 (2017) 1\u201341.","DOI":"10.1145\/3134428"},{"key":"e_1_3_3_2_42_2","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Zhang Zhikun","year":"2021","unstructured":"Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, and Yang Zhang. 2021. Privsyn: Differentially private data synthesis. In 30th USENIX Security Symposium (USENIX Security 21)."},{"key":"e_1_3_3_2_43_2","first-page":"97","volume-title":"Asian Conference on Machine Learning","author":"Zhao Zilong","year":"2021","unstructured":"Zilong Zhao, Aditya Kunar, Robert Birke, and Lydia\u00a0Y Chen. 2021. Ctab-gan: Effective table data synthesizing. In Asian Conference on Machine Learning. PMLR, 97\u2013112."},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"crossref","unstructured":"Zilong Zhao Aditya Kunar Robert Birke Hiek Van\u00a0der Scheer and Lydia\u00a0Y Chen. 2024. Ctab-gan+: Enhancing tabular data synthesis. Frontiers in big Data 6 (2024) 1296508.","DOI":"10.3389\/fdata.2023.1296508"}],"event":{"name":"ASIA CCS '25: 20th ACM Asia Conference on Computer and Communications Security","location":"Hanoi Vietnam","acronym":"ASIA CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 20th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708821.3736187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T07:26:43Z","timestamp":1755070003000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708821.3736187"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,24]]},"references-count":43,"alternative-id":["10.1145\/3708821.3736187","10.1145\/3708821"],"URL":"https:\/\/doi.org\/10.1145\/3708821.3736187","relation":{},"subject":[],"published":{"date-parts":[[2025,8,24]]},"assertion":[{"value":"2025-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}