{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T09:55:29Z","timestamp":1766570129150,"version":"3.48.0"},"reference-count":61,"publisher":"Association for Computing Machinery (ACM)","issue":"1","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2026,2,28]]},"abstract":"<jats:p>\n                    In the current artificial intelligence (AI) era, the scale and quality of the dataset play a crucial role in training a high-quality AI model. However, often original data cannot be shared due to privacy concerns and regulations. A potential solution is to release a synthetic dataset with a similar distribution to the private dataset. Nevertheless, in some scenarios, the attributes required to train an AI model are distributed among different parties, and the parties cannot share the local data for synthetic data construction due to privacy regulations. In PETS 2024, we recently introduced the\n                    <jats:italic toggle=\"yes\">first<\/jats:italic>\n                    Vertical Federated Learning-based Generative Adversarial Network (VFLGAN) for publishing vertically partitioned static data. However, VFLGAN cannot effectively handle time-series data, which contains both temporal and attribute dimensions. In this article, we proposed VFLGAN-TS, which combines the ideas of attribute discriminator and vertical federated learning to generate synthetic time-series data in the vertically partitioned scenario. The performance of VFLGAN-TS is close to that of its centralized counterpart, which represents the upper limit for VFLGAN-TS. To further protect privacy, we apply a Gaussian mechanism to make VFLGAN-TS satisfy an (\u03b5 ,\u03b4)-differential privacy. Besides, we develop an enhanced privacy auditing scheme to evaluate the potential privacy breach through the framework of VFLGAN-TS and synthetic datasets.\n                  <\/jats:p>","DOI":"10.1145\/3776587","type":"journal-article","created":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T07:07:14Z","timestamp":1762931234000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["VFLGAN-TS: Vertical Federated Learning-based Generative Adversarial Networks for Publication of Vertically Partitioned Time-series Data"],"prefix":"10.1145","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-7285-3010","authenticated-orcid":false,"given":"Yuan","family":"Xun","sequence":"first","affiliation":[{"name":"National University of Singapore","place":["Singapore, Singapore"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6549-3414","authenticated-orcid":false,"given":"Zilong","family":"Zhao","sequence":"additional","affiliation":[{"name":"National University of Singapore","place":["Singapore, Singapore"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2603-9421","authenticated-orcid":false,"given":"Jiayu","family":"Li","sequence":"additional","affiliation":[{"name":"National University of Singapore","place":["Singapore, Singapore"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6055-6578","authenticated-orcid":false,"given":"Prosanta","family":"Gope","sequence":"additional","affiliation":[{"name":"Computer Science, The University of Sheffield","place":["Sheffield, United Kingdom of Great Britain and Northern Ireland"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0084-4647","authenticated-orcid":false,"given":"Biplab","family":"Sikdar","sequence":"additional","affiliation":[{"name":"National University of Singapore","place":["Singapore, Singapore"]}]}],"member":"320","published-online":{"date-parts":[[2025,12,24]]},"reference":[{"key":"e_1_3_3_2_2","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1145\/2976749.2978318","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","author":"Abadi Martin","year":"2016","unstructured":"Martin Abadi, Andy Chu, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. 2016. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 308\u2013318."},{"key":"e_1_3_3_3_2","volume-title":"Proceedings of the International Conference on Learning Representations","author":"Alaa Ahmed","year":"2021","unstructured":"Ahmed Alaa, Alex James Chan, and Mihaela van der Schaar. 2021. Generative time-series modeling with Fourier flows. In Proceedings of the International Conference on Learning Representations."},{"key":"e_1_3_3_4_2","first-page":"35","volume-title":"Proceedings of KDD Cup and Workshop","volume":"2007","author":"Bennett James","year":"2007","unstructured":"James Bennett and Stan Lanning. 2007. The Netflix prize. In Proceedings of KDD Cup and Workshop, Vol. 2007. 35."},{"key":"e_1_3_3_5_2","unstructured":"Fred B. Bryant and Paul R. Yarnold. 1995. Principal-components analysis and exploratory and confirmatory factor analysis. (1995)."},{"key":"e_1_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.24432\/C5VC8G"},{"key":"e_1_3_3_7_2","first-page":"12673","article-title":"GS-WGAN: A gradient-sanitized approach for learning differentially private generators","volume":"33","author":"Chen Dingfan","year":"2020","unstructured":"Dingfan Chen, Tribhuvanesh Orekondy, and Mario Fritz. 2020. GS-WGAN: A gradient-sanitized approach for learning differentially private generators. Advances in Neural Information Processing Systems 33 (2020), 12673\u201312684.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_3_8_2","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1145\/3372297.3417238","volume-title":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","author":"Chen Dingfan","year":"2020","unstructured":"Dingfan Chen, Ning Yu, Yang Zhang, and Mario Fritz. 2020. GAN-Leaks: A taxonomy of membership inference attacks against generative models. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. 343\u2013362."},{"key":"e_1_3_3_9_2","doi-asserted-by":"crossref","first-page":"1243","DOI":"10.1145\/3133956.3134061","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","author":"Chen Hao","year":"2017","unstructured":"Hao Chen, Kim Laine, and Peter Rindal. 2017. Fast private set intersection from homomorphic encryption. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 1243\u20131255."},{"key":"e_1_3_3_10_2","first-page":"670","volume-title":"Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing","author":"Conneau Alexis","year":"2017","unstructured":"Alexis Conneau, Douwe Kiela, Holger Schwenk, Lo\u00efc Barrault, and Antoine Bordes. 2017. Supervised learning of universal sentence representations from natural language inference data. In Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, Copenhagen, Denmark, 670\u2013680. DOI:10.18653\/v1\/D17-1070"},{"key":"e_1_3_3_11_2","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1109\/CVPR.2009.5206848","volume-title":"Proceedings of the 2009 IEEE Conference on Computer Vision and Pattern Recognition","author":"Deng Jia","year":"2009","unstructured":"Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. 2009. Imagenet: A large-scale hierarchical image database. In Proceedings of the 2009 IEEE Conference on Computer Vision and Pattern Recognition. IEEE, 248\u2013255."},{"key":"e_1_3_3_12_2","first-page":"1","volume-title":"International Colloquium on Automata, Languages, and Programming","author":"Dwork Cynthia","year":"2006","unstructured":"Cynthia Dwork. 2006. Differential privacy. In International Colloquium on Automata, Languages, and Programming. Springer, 1\u201312."},{"key":"e_1_3_3_13_2","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1007\/11761679_29","volume-title":"Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings 25","author":"Dwork Cynthia","year":"2006","unstructured":"Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor. 2006. Our data, ourselves: Privacy via distributed noise generation. In Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings 25. Springer, 486\u2013503."},{"issue":"3","key":"e_1_3_3_14_2","first-page":"211","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork and Aaron Roth. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9, 3\u20134 (2014), 211\u2013407.","journal-title":"Foundations and Trends\u00ae in Theoretical Computer Science"},{"key":"e_1_3_3_15_2","unstructured":"Crist\u00f3bal Esteban Stephanie L. Hyland and Gunnar R\u00e4tsch. 2017. Real-valued (medical) time series generation with recurrent conditional GANs. arXiv:1706.02633. Retrieved from https:\/\/arxiv.org\/abs\/1706.02633"},{"key":"e_1_3_3_16_2","article-title":"Generative adversarial nets","volume":"27","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. Advances in Neural Information Processing Systems 27 (2014).","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_3_17_2","article-title":"Improved training of Wasserstein GANs","volume":"30","author":"Gulrajani Ishaan","year":"2017","unstructured":"Ishaan Gulrajani, Faruk Ahmed, Martin Arjovsky, Vincent Dumoulin, and Aaron C. Courville. 2017. Improved training of Wasserstein GANs. Advances in Neural Information Processing Systems 30 (2017).","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_3_18_2","article-title":"Logan: Membership inference attacks against generative models","author":"Hayes Jamie","year":"2019","unstructured":"Jamie Hayes, Luca Melis, George Danezis, and Emiliano De Cristofaro. 2019. Logan: Membership inference attacks against generative models. Proceedings on Privacy Enhancing Technologies (2019).","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"e_1_3_3_19_2","doi-asserted-by":"crossref","DOI":"10.2478\/popets-2019-0067","article-title":"Monte Carlo and reconstruction membership inference attacks against generative models.","author":"Hilprecht Benjamin","year":"2019","unstructured":"Benjamin Hilprecht, Martin H\u00e4rterich, and Daniel Bernau. 2019. Monte Carlo and reconstruction membership inference attacks against generative models. Proceedings on Privacy Enhancing Technologies (2019).","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"e_1_3_3_20_2","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)","author":"Huang Yan","year":"2012","unstructured":"Yan Huang, David Evans, and Jonathan Katz. 2012. Private set intersection: Are garbled circuits better than custom protocols?. In Proceedings of the Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_3_21_2","first-page":"22205","article-title":"Auditing differentially private machine learning: How private is private SGD?","volume":"33","author":"Jagielski Matthew","year":"2020","unstructured":"Matthew Jagielski, Jonathan Ullman, and Alina Oprea. 2020. Auditing differentially private machine learning: How private is private SGD? Advances in Neural Information Processing Systems 33 (2020), 22205\u201322216.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_3_22_2","first-page":"36999","article-title":"GT-GAN: General purpose time series synthesis with generative adversarial networks","volume":"35","author":"Jeon Jinsung","year":"2022","unstructured":"Jinsung Jeon, Jeonghak Kim, Haryong Song, Seunghyeon Cho, and Noseong Park. 2022. GT-GAN: General purpose time series synthesis with generative adversarial networks. Advances in Neural Information Processing Systems 35 (2022), 36999\u201337010.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_3_23_2","volume-title":"Proceedings on Privacy Enhancing Technologies","author":"Jiang Xue","year":"2023","unstructured":"Xue Jiang, Yufei Zhang, Xuebing Zhou, and Jens Grossklags. 2023. Distributed GAN-Based privacy-preserving publication of vertically-partitioned data. In Proceedings on Privacy Enhancing Technologies."},{"key":"e_1_3_3_24_2","volume-title":"Proceedings of the International Conference on Learning Representations","author":"Jordon James","year":"2018","unstructured":"James Jordon, Jinsung Yoon, and Mihaela Van Der Schaar. 2018. PATE-GAN: Generating synthetic data with differential privacy guarantees. In Proceedings of the International Conference on Learning Representations."},{"key":"e_1_3_3_25_2","unstructured":"Diederik P. Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv:1412.6980. Retrieved from https:\/\/arxiv.org\/abs\/1412.6980"},{"key":"e_1_3_3_26_2","article-title":"Unleashing the power of randomization in auditing differentially private ML","author":"Pillutla Galen Andrew Krishna","year":"2023","unstructured":"Galen Andrew Krishna Pillutla, Peter Kairouz, H. Brendan McMahan, Alina Oprea, and Sewoong Oh. 2023. Unleashing the power of randomization in auditing differentially private ML. Advances in Neural Information Processing Systems (2023).","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2025.3566595"},{"key":"e_1_3_3_28_2","unstructured":"Yang Liu Yan Kang Tianyuan Zou Yanhong Pu Yuanqin He Xiaozhou Ye Ye Ouyang Ya-Qin Zhang and Qiang Yang. 2022. Vertical federated learning. arXiv:2211.12814. Retrieved from https:\/\/arxiv.org\/abs\/2211.12814"},{"key":"e_1_3_3_29_2","first-page":"4165","article-title":"A general framework for auditing differentially private machine learning","volume":"35","author":"Lu Fred","year":"2022","unstructured":"Fred Lu, Joseph Munoz, Maya Fuchs, Tyler LeBlond, Elliott Zaresky-Williams, Edward Raff, Francis Ferraro, and Brian Testa. 2022. A general framework for auditing differentially private machine learning. Advances in Neural Information Processing Systems 35 (2022), 4165\u20134176.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_3_30_2","article-title":"Learning disentangled representations for recommendation","volume":"32","author":"Ma Jianxin","year":"2019","unstructured":"Jianxin Ma, Chang Zhou, Peng Cui, Hongxia Yang, and Wenwu Zhu. 2019. Learning disentangled representations for recommendation. Advances in Neural Information Processing Systems 32 (2019).","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_3_31_2","first-page":"1273","volume-title":"Proceedings of the International Conference on Artificial Intelligence and Statistics","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Proceedings of the International Conference on Artificial Intelligence and Statistics. PMLR, 1273\u20131282."},{"key":"e_1_3_3_32_2","unstructured":"Matthieu Meeus Florent Guepin Ana-Maria Cretu and Yves-Alexandre de Montjoye. 2023. Achilles\u2019 heels: Vulnerable record identification in synthetic data publishing. arXiv:2306.10308. Retrieved from https:\/\/arxiv.org\/abs\/2306.10308"},{"key":"e_1_3_3_33_2","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1109\/EuroSPW54576.2021.00041","volume-title":"Proceedings of the 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","author":"Mehner Luise","year":"2021","unstructured":"Luise Mehner, Saskia Nu\u00f1ez von Voigt, and Florian Tschorsch. 2021. Towards explaining epsilon: A worst-case study of differential privacy risks. In Proceedings of the 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 328\u2013331."},{"key":"e_1_3_3_34_2","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1109\/CSF.2017.11","volume-title":"Proceedings of the 2017 IEEE 30th Computer Security Foundations Symposium (CSF)","author":"Mironov Ilya","year":"2017","unstructured":"Ilya Mironov. 2017. R\u00e9nyi differential privacy. In Proceedings of the 2017 IEEE 30th Computer Security Foundations Symposium (CSF). IEEE, 263\u2013275."},{"key":"e_1_3_3_35_2","unstructured":"Olof Mogren. 2016. C-RNN-GAN: Continuous recurrent neural networks with adversarial training. arXiv:1611.09904. Retrieved from https:\/\/arxiv.org\/abs\/1611.09904"},{"key":"e_1_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.22"},{"key":"e_1_3_3_37_2","volume-title":"Proceedings of the International Conference on Learning Representations","author":"Papernot Nicolas","year":"2018","unstructured":"Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, and Ulfar Erlingsson. 2018. Scalable private learning with PATE. In Proceedings of the International Conference on Learning Representations."},{"key":"e_1_3_3_38_2","unstructured":"Giorgia Ramponi Pavlos Protopapas Marco Brambilla and Ryan Janssen. 2018. T-CGAN: Conditional generative adversarial network for data augmentation in noisy time series with irregular sampling. arXiv:1811.08295. Retrieved from https:\/\/arxiv.org\/abs\/1811.08295"},{"key":"e_1_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.24432\/C57G7J"},{"key":"e_1_3_3_40_2","first-page":"32777","article-title":"Generating multivariate time series with common source coordinated GAN (COSCI-GAN)","volume":"35","author":"Seyfi Ali","year":"2022","unstructured":"Ali Seyfi, Jean-Francois Rajotte, and Raymond Ng. 2022. Generating multivariate time series with common source coordinated GAN (COSCI-GAN). Advances in Neural Information Processing Systems 35 (2022), 32777\u201332788.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_3_41_2","doi-asserted-by":"crossref","first-page":"1310","DOI":"10.1145\/2810103.2813687","volume-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","author":"Shokri Reza","year":"2015","unstructured":"Reza Shokri and Vitaly Shmatikov. 2015. Privacy-preserving deep learning. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 1310\u20131321."},{"key":"e_1_3_3_42_2","volume-title":"Proceedings of the USENIX Security Symposium","author":"Stadler Theresa","year":"2022","unstructured":"Theresa Stadler, Bristena Oprisanu, and Carmela Troncoso. 2022. Synthetic data - Anonymisation groundhog day. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_3_43_2","article-title":"Privacy auditing with one (1) training run","volume":"36","author":"Steinke Thomas","year":"2024","unstructured":"Thomas Steinke, Milad Nasr, and Matthew Jagielski. 2024. Privacy auditing with one (1) training run. Advances in Neural Information Processing Systems 36 (2024).","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2905237"},{"key":"e_1_3_3_45_2","unstructured":"Iulia Turc Ming-Wei Chang Kenton Lee and Kristina Toutanova. 2019. Well-read students learn better: On the importance of pre-training compact models. arXiv:1908.08962v2. Retrieved from https:\/\/arxiv.org\/abs\/1908.08962v2"},{"key":"e_1_3_3_46_2","volume-title":"Proceedings of the International Conference on Artificial Intelligence and Statistics (AISTATS)","author":"Breugel Boris van","year":"2023","unstructured":"Boris van Breugel, Hao Sun, Zhaozhi Qian, and Mihaela van der Schaar. 2023. Membership inference attacks against synthetic data through overfitting detection. In Proceedings of the International Conference on Artificial Intelligence and Statistics (AISTATS)."},{"issue":"11","key":"e_1_3_3_47_2","article-title":"Visualizing data using t-SNE.","volume":"9","author":"Maaten Laurens Van der","year":"2008","unstructured":"Laurens Van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of Machine Learning Research 9, 11 (2008).","journal-title":"Journal of Machine Learning Research"},{"issue":"3152676","key":"e_1_3_3_48_2","first-page":"10","article-title":"The EU general data protection regulation (GDPR)","volume":"10","author":"Voigt Paul","year":"2017","unstructured":"Paul Voigt and Axel Von dem Bussche. 2017. The EU general data protection regulation (GDPR). A Practical Guide, 1st Ed., Cham: Springer International Publishing 10, 3152676 (2017), 10\u20135555.","journal-title":"A Practical Guide, 1st Ed., Cham: Springer International Publishing"},{"key":"e_1_3_3_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3530700"},{"key":"e_1_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3074382"},{"key":"e_1_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3129417"},{"key":"e_1_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3023588"},{"key":"e_1_3_3_53_2","first-page":"1226","volume-title":"Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics","author":"Wang Yu-Xiang","year":"2019","unstructured":"Yu-Xiang Wang, Borja Balle, and Shiva Prasad Kasiviswanathan. 2019. Subsampled R\u00e9nyi differential privacy and analytical moments accountant. In Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics. PMLR, 1226\u20131235."},{"key":"e_1_3_3_54_2","unstructured":"Wikipedia. 2024. Wasserstein metric. Retrieved from https:\/\/en.wikipedia.org\/wiki\/Wasserstein_metric"},{"key":"e_1_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2024.3510382"},{"key":"e_1_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2024.3375150"},{"key":"e_1_3_3_57_2","article-title":"A federated learning-based data augmentation method for privacy preservation under heterogeneous data","author":"Xiao Yunpeng","year":"2025","unstructured":"Yunpeng Xiao, Dengke Zhao, Xufeng Li, Tun Li, Rong Wang, and Guoyin Wang. 2025. A federated learning-based data augmentation method for privacy preservation under heterogeneous data. IEEE Transactions on Mobile Computing (2025).","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_3_58_2","unstructured":"Liyang Xie Kaixiang Lin Shu Wang Fei Wang and Jiayu Zhou. 2018. Differentially private generative adversarial network. arXiv:1802.06739. Retrieved from https:\/\/arxiv.org\/abs\/1802.06739"},{"key":"e_1_3_3_59_2","first-page":"3093","volume-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201922)","author":"Ye Jiayuan","year":"2022","unstructured":"Jiayuan Ye, Aadyaa Maddi, Sasi Kumar Murakonda, Vincent Bindschaedler, and Reza Shokri. 2022. Enhanced membership inference attacks against machine learning models. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201922). ACM, New York, NY, USA, 3093\u20133106."},{"key":"e_1_3_3_60_2","article-title":"Time-series generative adversarial networks","volume":"32","author":"Yoon Jinsung","year":"2019","unstructured":"Jinsung Yoon, Daniel Jarrett, and Mihaela Van der Schaar. 2019. Time-series generative adversarial networks. Advances in Neural Information Processing Systems 32 (2019).","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_3_61_2","volume-title":"Proceedings on Privacy Enhancing Technologies","author":"Yuan Xun","year":"2024","unstructured":"Xun Yuan, Yang Yang, Prosanta Gope, Aryan Pasikhani, and Biplab Sikdar. 2024. VFLGAN: Vertical federated learning-based generative adversarial network for vertically partitioned data publication. In Proceedings on Privacy Enhancing Technologies."},{"key":"e_1_3_3_62_2","doi-asserted-by":"crossref","unstructured":"Xinyang Zhang Shouling Ji and Ting Wang. 2018. Differentially private releasing via deep generative model (technical report). arXiv:1801.01594. Retrieved from https:\/\/arxiv.org\/abs\/1801.01594","DOI":"10.1121\/1.5067948"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3776587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T09:53:16Z","timestamp":1766569996000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3776587"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,24]]},"references-count":61,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2,28]]}},"alternative-id":["10.1145\/3776587"],"URL":"https:\/\/doi.org\/10.1145\/3776587","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"type":"print","value":"2471-2566"},{"type":"electronic","value":"2471-2574"}],"subject":[],"published":{"date-parts":[[2025,12,24]]},"assertion":[{"value":"2025-02-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-11-05","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-12-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}