{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:11:31Z","timestamp":1775913091987,"version":"3.50.1"},"reference-count":257,"publisher":"Association for Computing Machinery (ACM)","issue":"14s","license":[{"start":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T00:00:00Z","timestamp":1689552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2023,12,31]]},"abstract":"<jats:p>The exponential growth of collected, processed, and shared microdata has given rise to concerns about individuals\u2019 privacy. As a result, laws and regulations have emerged to control what organisations do with microdata and how they protect it. Statistical Disclosure Control seeks to reduce the risk of confidential information disclosure by de-identifying them. Such de-identification is guaranteed through privacy-preserving techniques (PPTs). However, de-identified data usually results in loss of information, with a possible impact on data analysis precision and model predictive performance. The main goal is to protect the individual\u2019s privacy while maintaining the interpretability of the data (i.e., its usefulness). Statistical Disclosure Control is an area that is expanding and needs to be explored since there is still no solution that guarantees optimal privacy and utility. This survey focuses on all steps of the de-identification process. We present existing PPTs used in microdata de-identification, privacy measures suitable for several disclosure types, and information loss and predictive performance measures. In this survey, we discuss the main challenges raised by privacy constraints, describe the main approaches to handle these obstacles, review the taxonomies of PPTs, provide a theoretical analysis of existing comparative studies, and raise multiple open issues.<\/jats:p>","DOI":"10.1145\/3588765","type":"journal-article","created":{"date-parts":[[2023,3,29]],"date-time":"2023-03-29T06:41:43Z","timestamp":1680072103000},"page":"1-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Survey on Privacy-Preserving Techniques for Microdata Publication"],"prefix":"10.1145","volume":"55","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7700-1955","authenticated-orcid":false,"given":"T\u00e2nia","family":"Carvalho","sequence":"first","affiliation":[{"name":"University of Porto"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4322-1076","authenticated-orcid":false,"given":"Nuno","family":"Moniz","sequence":"additional","affiliation":[{"name":"INESC TEC\/University of Porto"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1633-7887","authenticated-orcid":false,"given":"Pedro","family":"Faria","sequence":"additional","affiliation":[{"name":"TekPrivacy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9988-594X","authenticated-orcid":false,"given":"Lu\u00eds","family":"Antunes","sequence":"additional","affiliation":[{"name":"University of Porto"}]}],"member":"320","published-online":{"date-parts":[[2023,7,17]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/76894.76895"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.5555\/1391239"},{"key":"e_1_3_2_4_2","unstructured":"Aircloak GmbH. 2021. Aircloak. Retrieved November 1 2021 from https:\/\/aircloak.com\/."},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2390-x"},{"key":"e_1_3_2_6_2","first-page":"214","volume-title":"Proceedings of the International Conference on Machine Learning","author":"Arjovsky Martin","year":"2017","unstructured":"Martin Arjovsky, Soumith Chintala, and L\u00e9on Bottou. 2017. Wasserstein generative adversarial networks. In Proceedings of the International Conference on Machine Learning. 214\u2013223."},{"key":"e_1_3_2_7_2","unstructured":"ARX. 2013. ARX Data Anonymization Tool. Retrieved November 1 2021 from https:\/\/arx.deidentifier.org\/."},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001661"},{"key":"e_1_3_2_9_2","volume-title":"Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems (NeurIPS\u201919). 15453\u201315462.","author":"Bagdasaryan Eugene","year":"2019","unstructured":"Eugene Bagdasaryan, Omid Poursaeed, and Vitaly Shmatikov. 2019. Differential privacy has disparate impact on model accuracy. In Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems (NeurIPS\u201919). 15453\u201315462.https:\/\/proceedings.neurips.cc\/paper\/2019\/hash\/fc0de4e0396fff257ea362983c2dda5a-Abstract.html."},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102572"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.42"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1161\/CIRCOUTCOMES.118.005122"},{"key":"e_1_3_2_13_2","first-page":"1","article-title":"Privacy and synthetic datasets","volume":"22","author":"Bellovin Steven M.","year":"2019","unstructured":"Steven M. Bellovin, Preetam K. Dutta, and Nathan Reitinger. 2019. Privacy and synthetic datasets. Stanford Technology Law Review 22 (2019), 1.","journal-title":"Stanford Technology Law Review"},{"key":"e_1_3_2_14_2","article-title":"Individual risk of disclosure using sampling design information","volume":"1412003","author":"Benedetti Roberto","year":"1998","unstructured":"Roberto Benedetti, A. Capobianchi, and L. Franconi. 1998. Individual risk of disclosure using sampling design information. Contributi Istat 1412003 (1998), 1\u201315.","journal-title":"Contributi Istat"},{"key":"e_1_3_2_15_2","unstructured":"Thijs Benschop Cathrine Machingauta and Matthew Welch. 2019. Statistical disclosure control: A practice guide. Read the Docs. Retrieved April 5 2023 from https:\/\/buildmedia.readthedocs.org\/media\/pdf\/sdcpractice\/latest\/sdcpractice.pdf."},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1990.10475304"},{"key":"e_1_3_2_17_2","article-title":"A critical review on the use (and misuse) of differential privacy in machine learning","author":"Blanco-Justicia Alberto","year":"2022","unstructured":"Alberto Blanco-Justicia, David Sanchez, Josep Domingo-Ferrer, and Krishnamurty Muralidhar. 2022. A critical review on the use (and misuse) of differential privacy in machine learning. arXiv preprint arXiv:2206.04621 (2022).","journal-title":"arXiv preprint arXiv:2206.04621"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1137\/21M1449944"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47804-3_8"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401904"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.3390\/info10120362"},{"key":"e_1_3_2_22_2","first-page":"1619","volume-title":"Proceedings of the 2012 35th International Convention MIPRO","author":"Buratovi\u0107 Ines","year":"2012","unstructured":"Ines Buratovi\u0107, Mario Mili\u010devi\u0107, and Krunoslav \u017dubrini\u0107. 2012. Effects of data anonymization on the data mining results. In Proceedings of the 2012 35th International Convention MIPRO. IEEE, Los Alamitos, CA, 1619\u20131623."},{"key":"e_1_3_2_23_2","doi-asserted-by":"crossref","unstructured":"Jianneng Cao and Panagiotis Karras. 2012. Publishing microdata with a robust privacy guarantee. Proceedings of the VLDB Endowment 5 11 (2012) 1388\u20131399.","DOI":"10.14778\/2350229.2350255"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0252169"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-74251-5_34"},{"key":"e_1_3_2_26_2","unstructured":"T\u00e2nia Carvalho Nuno Moniz Pedro Faria and Lu\u00eds Antunes. 2022. Towards a data privacy-predictive performance trade-off. arxiv:2201.05226 [cs.LG] (2022)."},{"key":"e_1_3_2_27_2","article-title":"Privacy-preserving data synthetisation for secure information sharing","author":"Carvalho T\u00e2nia","year":"2022","unstructured":"T\u00e2nia Carvalho, Nuno Moniz, Pedro Faria, Lu\u00eds Antunes, and Nitesh Chawla. 2022. Privacy-preserving data synthetisation for secure information sharing. arXiv preprint arXiv:2212.00484 (2022).","journal-title":"arXiv preprint arXiv:2212.00484"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_3_2_29_2","first-page":"286","volume-title":"Proceedings of the Machine Learning for Healthcare Conference","author":"Choi Edward","year":"2017","unstructured":"Edward Choi, Siddharth Biswal, Bradley Malin, Jon Duke, Walter F. Stewart, and Jimeng Sun. 2017. Generating multi-label discrete patient records using generative adversarial networks. In Proceedings of the Machine Learning for Healthcare Conference. 286\u2013305."},{"key":"e_1_3_2_30_2","unstructured":"Cornell Database Group. 2009. Cornell Anonymization Toolkit. Retrieved November 1 2021 from https:\/\/sourceforge.net\/projects\/anony-toolkit\/."},{"key":"e_1_3_2_31_2","unstructured":"Council of Europe. 1981. Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data. Retrieved December 1 2022 from https:\/\/rm.coe.int\/1680078b37."},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1980.10477481"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78461-8_1"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100403"},{"key":"e_1_3_2_35_2","first-page":"202","article-title":"A simple procedure for controlled rounding","volume":"3","author":"Dalenius Tore","year":"1981","unstructured":"Tore Dalenius. 1981. A simple procedure for controlled rounding. Statistik Tidskrift 3 (1981), 202\u2013208.","journal-title":"Statistik Tidskrift"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/0378-3758(82)90058-1"},{"key":"e_1_3_2_37_2","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/3-540-47804-3_12","volume-title":"Inference Control in Statistical Databases","author":"Dandekar Ramesh A.","year":"2002","unstructured":"Ramesh A. Dandekar, Josep Domingo-Ferrer, and Francesc Seb\u00e9. 2002. LHS-based hybrid microdata vs rank swapping and microaggregation for numeric microdata protection. In Inference Control in Statistical Databases. Springer, 153\u2013162."},{"key":"e_1_3_2_38_2","unstructured":"George Danezis Josep Domingo-Ferrer Marit Hansen Jaap-Henk Hoepman Daniel Le M\u00e9tayer Rodica Tirtea and Stefan Schiffner. 2014. Privacy and Data Protection by Design\u2014From Policy to Engineering. European Union Agency for Network and Information Security (ENISA) Heraklion Greece."},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-12-66"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.3390\/app11052158"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.1979.4766909"},{"key":"e_1_3_2_42_2","volume-title":"Proceedings of the 1996 Annual Research Conference","author":"Waal A. G. De","year":"1996","unstructured":"A. G. De Waal, A. J. Hundepool, and L. C. R. J. Willenborg. 1996. Argus: Software for statistical disclosure control of microdata. In Proceedings of the 1996 Annual Research Conference."},{"issue":"1","key":"e_1_3_2_43_2","first-page":"95","article-title":"A view on statistical disclosure control for microdata","volume":"22","author":"Waal Ton De","year":"1996","unstructured":"Ton De Waal and Leon Cornelis Roelof Johannes Willenborg. 1996. A view on statistical disclosure control for microdata. Survey Methodology 22, 1 (1996), 95\u2013103.","journal-title":"Survey Methodology"},{"key":"e_1_3_2_44_2","first-page":"195","volume-title":"Proceedings of the 1992 Symposium on Design and Analysis of Longitudinal Surveys","author":"Defays D.","year":"1993","unstructured":"D. Defays and P. Nanopoulos. 1993. Panels of enterprises and confidentiality: The small aggregates method. In Proceedings of the 1992 Symposium on Design and Analysis of Longitudinal Surveys. 195\u2013204."},{"key":"e_1_3_2_45_2","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/978-0-387-70992-5_3","volume-title":"Privacy-Preserving Data Mining","author":"Domingo-Ferrer Josep","year":"2008","unstructured":"Josep Domingo-Ferrer. 2008. A survey of inference control methods for privacy-preserving data mining. In Privacy-Preserving Data Mining. Springer, 53\u201380."},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.04.011"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.04.005"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0007-0"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/69.979982"},{"key":"e_1_3_2_50_2","first-page":"807","volume-title":"Pre-Proceedings of ETK-NTTS","volume":"2","author":"Domingo-Ferrer Josep","year":"2001","unstructured":"Josep Domingo-Ferrer, Josep M. Mateo-Sanz, and Vincenc Torra. 2001. Comparing SDC methods for microdata on the basis of information loss and disclosure risk. In Pre-Proceedings of ETK-NTTS, Vol. 2. 807\u2013826."},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001594"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.2200\/S00690ED1V01Y201512SPT015"},{"key":"e_1_3_2_53_2","first-page":"91","article-title":"Disclosure control methods and information loss for microdata","author":"Domingo-Ferrer Josep","year":"2001","unstructured":"Josep Domingo-Ferrer and Vicenc Torra. 2001. Disclosure control methods and information loss for microdata. Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies 2001 (2001), 91\u2013110.","journal-title":"Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies"},{"key":"e_1_3_2_54_2","first-page":"243","article-title":"Distance-based and probabilistic record linkage for re-identification of records with categorical variables","author":"Domingo-Ferrer Josep","year":"2002","unstructured":"Josep Domingo-Ferrer and Vicen\u00e7 Torra. 2002. Distance-based and probabilistic record linkage for re-identification of records with categorical variables. Butllet\u00ed de lACIA, Associaci\u00f3 Catalana dIntellig\u00e8ncia Artificial 2002 (2002), 243\u2013250.","journal-title":"Butllet\u00ed de lACIA, Associaci\u00f3 Catalana dIntellig\u00e8ncia Artificial"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-0427(03)00643-5"},{"key":"e_1_3_2_56_2","first-page":"135","article-title":"Disclosure limitation methods and information loss for tabular data","year":"2001","unstructured":"George Duncan and Stephen Roehrig. 2001. Disclosure limitation methods and information loss for tabular data. Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies 2001 (2001), 135\u2013166.","journal-title":"Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies"},{"key":"e_1_3_2_57_2","volume-title":"Dissemination of Microdata Files: Principles Procedures and Practices","author":"Dupriez Olivier","year":"2010","unstructured":"Olivier Dupriez and Ernie Boyko. 2010. Dissemination of Microdata Files: Principles Procedures and Practices. International Household Survey Network."},{"key":"e_1_3_2_58_2","first-page":"1","volume-title":"Automata, Languages and Programming","author":"Dwork Cynthia","year":"2006","unstructured":"Cynthia Dwork. 2006. Differential privacy. In Automata, Languages and Programming. Lecture Notes in Computer Science, Vol. 4052. Springer, 1\u201312."},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M2716"},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001600"},{"key":"e_1_3_2_61_2","unstructured":"European Commission. 2014. Guidelines on output checking. CROS. Retrieved November 1 2022 from https:\/\/ec.europa.eu\/eurostat\/cros\/content\/guidelines-output-checking_en."},{"key":"e_1_3_2_62_2","unstructured":"European Commission. 2014. Opinion 05\/2014 on Anonymisation Techniques. Retrieved February 5 2021 from https:\/\/ec.europa.eu\/justice\/article-29\/documentation\/opinion-recommendation\/files\/2014\/wp216_en.pdf."},{"key":"e_1_3_2_63_2","unstructured":"European Commission. 2017. Guidelines on Personal Data Breach Notification Under Regulation 2016\/679 (wp250rev.01). Retrieved September 1 2021 from https:\/\/ec.europa.eu\/newsroom\/article29\/item-detail.cfm?item_id=612052."},{"key":"e_1_3_2_64_2","unstructured":"European Commission. 2021. Statistical Disclosure Control for Business Microdata. Retrieved September 1 2021 from https:\/\/ec.europa.eu\/eurostat\/documents\/54610\/7779382\/Statistical-Disclosure-Control-in-business-statistics.pdf."},{"key":"e_1_3_2_65_2","unstructured":"European Commission. 2022. Microdata Access. Retrieved November 1 2022 from https:\/\/ec.europa.eu\/eurostat\/cros\/content\/microdata-access_en."},{"key":"e_1_3_2_66_2","unstructured":"European Data Protection Board. 2021. Guidelines 07\/2020 on the Concepts of Controller and Processor in the GDPR. Retrieved October 1 2021 from https:\/\/edpb.europa.eu\/our-work-tools\/our-documents\/guidelines\/guidelines-072020-concepts-controller-and-processor-gdpr_en."},{"key":"e_1_3_2_67_2","unstructured":"European Data Protection Supervisor. 2022. Accountability. Retrieved December 1 2022 from https:\/\/edps.europa.eu\/data-protection\/our-work\/subjects\/accountability_en."},{"key":"e_1_3_2_68_2","unstructured":"European Union. 1995. Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. EUR-Lex. Retrieved December 1 2022 from https:\/\/eur-lex.europa.eu\/eli\/dir\/1995\/46\/oj."},{"key":"e_1_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-009-0513-9_4"},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.09.069"},{"key":"e_1_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-09342-5_17"},{"key":"e_1_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1969.10501049"},{"key":"e_1_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25955-8_2"},{"key":"e_1_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.3390\/math10152733"},{"key":"e_1_3_2_75_2","unstructured":"Marco Fiore Panagiota Katsikouli Elli Zavou Mathieu Cunche Fran\u00e7oise Fessant Dominique Le Hello Ulrich Matchi A\u00efvodji Baptiste Olivier Tony Quertier and Razvan Stanica. 2019. Privacy of trajectory micro-data: A survey. arxiv:1903.12211 (2019)."},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.7763\/IJCTE.2015.V7.924"},{"key":"e_1_3_2_77_2","first-page":"26","article-title":"Disclosure risk for high dimensional business microdata","author":"Foschi Flavio","year":"2011","unstructured":"Flavio Foschi. 2011. Disclosure risk for high dimensional business microdata. In Proceedings of the Joint UNECE-Eurostat Work Session on Statistical Data Confidentiality.26\u201328.","journal-title":"Proceedings of the Joint UNECE-Eurostat Work Session on Statistical Data Confidentiality."},{"key":"e_1_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1983.10478008"},{"key":"e_1_3_2_79_2","first-page":"17","volume-title":"Proceedings of the 23rd USENIX Security Symposium (USENIX Security\u201914)","author":"Fredrikson Matthew","year":"2014","unstructured":"Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, and Thomas Ristenpart. 2014. Privacy in pharmacogenetics: An end-to-end study of personalized warfarin dosing. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security\u201914). 17\u201332."},{"key":"e_1_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"e_1_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.5555\/1855031"},{"key":"e_1_3_2_82_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2008.4565028"},{"key":"e_1_3_2_83_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2008.12.001"},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.143"},{"key":"e_1_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.3138\/cpp.2020-026"},{"key":"e_1_3_2_86_2","doi-asserted-by":"publisher","DOI":"10.1016\/S1473-3099(20)30635-6"},{"issue":"4","key":"e_1_3_2_87_2","first-page":"463","article-title":"Post randomisation for statistical disclosure control: Theory and implementation","volume":"14","author":"Gouweleeuw Jos\u00e9","year":"1998","unstructured":"Jos\u00e9 Gouweleeuw, Peter Kooiman, Leon Willenborg, and Paul P. de Wolf. 1998. Post randomisation for statistical disclosure control: Theory and implementation. Journal of Official Statistics 14, 4 (1998), 463.","journal-title":"Journal of Official Statistics"},{"key":"e_1_3_2_88_2","unstructured":"Gretel. 2019. Gretel. Accessed December 1 2022 from https:\/\/gretel.ai\/."},{"key":"e_1_3_2_89_2","unstructured":"Gretel. 2020. Gretel Synthetics. Retrieved December 1 2022 from https:\/\/github.com\/gretelai\/gretel-synthetics."},{"key":"e_1_3_2_90_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15838-4_24"},{"key":"e_1_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.8.12.3096-3104"},{"key":"e_1_3_2_92_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1209020"},{"key":"e_1_3_2_93_2","article-title":"A simple and practical algorithm for differentially private data release","volume":"25","author":"Hardt Moritz","year":"2012","unstructured":"Moritz Hardt, Katrina Ligett, and Frank McSherry. 2012. A simple and practical algorithm for differentially private data release. In Advances in Neural Information Processing Systems 25.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_94_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1527"},{"key":"e_1_3_2_95_2","first-page":"111","volume-title":"New Frontiers in Applied Data Mining","author":"He Xianmang","year":"2012","unstructured":"Xianmang He, Yanghua Xiao, Yujia Li, Qing Wang, Wei Wang, and Baile Shi. 2012. Permutation anonymization: Improving anatomy for privacy preservation in data publication. In New Frontiers in Applied Data Mining, Longbing Cao, Joshua Zhexue Huang, James Bailey, Yun Sing Koh, and Jun Luo (Eds.). Springer, Berlin, Germany, 111\u2013123."},{"key":"e_1_3_2_96_2","first-page":"261","volume-title":"Proceedings of the International Seminar on Statistical Confidentiality","author":"Heer G. R.","year":"1993","unstructured":"G. R. Heer. 1993. A bootstrap procedure to preserve statistical confidentiality in contingency tables. In Proceedings of the International Seminar on Statistical Confidentiality. 261\u2013271."},{"key":"e_1_3_2_97_2","doi-asserted-by":"publisher","DOI":"10.5555\/1534235"},{"key":"e_1_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3339281"},{"key":"e_1_3_2_99_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9005476"},{"key":"e_1_3_2_100_2","doi-asserted-by":"publisher","DOI":"10.1145\/356546.356548"},{"issue":"4","key":"e_1_3_2_101_2","first-page":"499","article-title":"Applying Pitman\u2019s sampling formula to microdata disclosure risk assessment","volume":"17","author":"Hoshino Nobuaki","year":"2001","unstructured":"Nobuaki Hoshino. 2001. Applying Pitman\u2019s sampling formula to microdata disclosure risk assessment. Journal of Official Statistics 17, 4 (2001), 499.","journal-title":"Journal of Official Statistics"},{"key":"e_1_3_2_102_2","doi-asserted-by":"publisher","DOI":"10.1145\/3360498"},{"key":"e_1_3_2_103_2","article-title":"Handbook on Statistical Disclosure Control","author":"Hundepool Anco","year":"2010","unstructured":"Anco Hundepool, Josep Domingo-Ferrer, Luisa Franconi, Sarah Giessing, Rainer Lenz, Jane Longhurst, E. Schulte Nordholt, Giovanni Seri, and P. Wolf. 2010. Handbook on Statistical Disclosure Control. ESSnet on Statistical Disclosure Control.","journal-title":"ESSnet on Statistical Disclosure Control."},{"key":"e_1_3_2_104_2","doi-asserted-by":"publisher","DOI":"10.1002\/9781118348239"},{"issue":"4","key":"e_1_3_2_105_2","first-page":"437","article-title":"Models and methods for the microdata protection problem","volume":"14","author":"Hurkens C. A. J.","year":"1998","unstructured":"C. A. J. Hurkens and S. R. Tiourine. 1998. Models and methods for the microdata protection problem. Journal of Official Statistics 14, 4 (1998), 437.","journal-title":"Journal of Official Statistics"},{"key":"e_1_3_2_106_2","volume-title":"Automated Machine Learning: Methods, Systems, Challenges","author":"Hutter Frank","year":"2018","unstructured":"Frank Hutter, Lars Kotthoff, and Joaquin Vanschoren (Eds.). 2018. Automated Machine Learning: Methods, Systems, Challenges. Springer."},{"key":"e_1_3_2_107_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1751-5823.2009.00079.x"},{"key":"e_1_3_2_108_2","first-page":"662","volume-title":"Proceedings of the 22nd International Conference on Extending Database Technology (EDBT\u201919)","author":"Iftikhar Masooma","year":"2019","unstructured":"Masooma Iftikhar, Qing Wang, and Yu Lin. 2019. Publishing differentially private datasets via stable microaggregation. In Proceedings of the 22nd International Conference on Extending Database Technology (EDBT\u201919). 662\u2013665."},{"key":"e_1_3_2_109_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.19"},{"key":"e_1_3_2_110_2","unstructured":"Information Commissioner\u2019s Office. 2022. Accountability and governance. ICO. Retrieved December 1 2022 from https:\/\/ico.org.uk\/for-organisations\/guide-to-data-protection\/guide-to-the-general-data-protection-regulation-gdpr\/accountability-and-governance\/."},{"key":"e_1_3_2_111_2","unstructured":"Information Commissioner\u2019s Office. 2022. What does it mean if you are a controller? ICO. Retrieved December 1 2022 fromhttps:\/\/ico.org.uk\/for-organisations\/guide-to-data-protection\/guide-to-the-general-data-protection-regulation-gdpr\/controllers-and-processors\/what-does-it-mean-if-you-are-a-controller\/."},{"key":"e_1_3_2_112_2","first-page":"1","volume-title":"Proceedings of Privacy in Statistical Databases","author":"Ito Shinsuke","year":"2014","unstructured":"Shinsuke Ito and Naomi Hoshino. 2014. Data swapping as a more efficient tool to create anonymized census microdata in Japan. In Proceedings of Privacy in Statistical Databases. 1\u201314."},{"key":"e_1_3_2_113_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99771-1_14"},{"key":"e_1_3_2_114_2","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775089"},{"key":"e_1_3_2_115_2","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1989.10478785"},{"key":"e_1_3_2_116_2","volume-title":"Proceedings of the International Conference on Learning Representations","author":"Jordon James","year":"2018","unstructured":"James Jordon, Jinsung Yoon, and Mihaela Van Der Schaar. 2018. PATE-GAN: Generating synthetic data with differential privacy guarantees. In Proceedings of the International Conference on Learning Representations."},{"key":"e_1_3_2_117_2","doi-asserted-by":"publisher","DOI":"10.3389\/fpubh.2020.00305"},{"key":"e_1_3_2_118_2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.5090060209"},{"key":"e_1_3_2_119_2","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142499"},{"key":"e_1_3_2_120_2","first-page":"303","volume-title":"Proceedings of the Section on Survey Research Methods","author":"Kim Jay J.","year":"1986","unstructured":"Jay J. Kim. 1986. A method for limiting disclosure in microdata based on random noise and transformation. In Proceedings of the Section on Survey Research Methods. American Statistical Association, Alexandria, VA, 303\u2013308."},{"key":"e_1_3_2_121_2","doi-asserted-by":"publisher","DOI":"10.1145\/3510548.3519377"},{"key":"e_1_3_2_122_2","unstructured":"A. Kowarik M. Templ B. Meindl and F. Fonteneau. 2013. sdcMicroGUI: Graphical user interface for package sdcMicro. Retrieved April 5 2023 from https:\/\/rdrr.io\/cran\/sdcMicroGUI\/."},{"key":"e_1_3_2_123_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007452223027"},{"key":"e_1_3_2_124_2","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729694"},{"key":"e_1_3_2_125_2","article-title":"Effective and privacy preserving tabular data synthesizing","author":"Kunar Aditya","year":"2021","unstructured":"Aditya Kunar. 2021. Effective and privacy preserving tabular data synthesizing. arXiv preprint arXiv:2108.10064 (2021).","journal-title":"arXiv preprint arXiv:2108.10064"},{"key":"e_1_3_2_126_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.112"},{"key":"e_1_3_2_127_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.78"},{"key":"e_1_3_2_128_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24861-0_22"},{"key":"e_1_3_2_129_2","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066164"},{"key":"e_1_3_2_130_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.101"},{"key":"e_1_3_2_131_2","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150435"},{"key":"e_1_3_2_132_2","doi-asserted-by":"crossref","unstructured":"Boyu Li Kun He and Geng Sun. 2023. Local generalization and bucketization technique for personalized privacy preservation. Journal of King Saud University: Computer and Information Sciences 35 1 (2023) 393\u2013404.","DOI":"10.1016\/j.jksuci.2022.12.008"},{"key":"e_1_3_2_133_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2773069"},{"key":"e_1_3_2_134_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2011.07.001"},{"key":"e_1_3_2_135_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-010-9270-0"},{"key":"e_1_3_2_136_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_137_2","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557079"},{"key":"e_1_3_2_138_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.236"},{"key":"e_1_3_2_139_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.02.002"},{"key":"e_1_3_2_140_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.05.071"},{"issue":"2","key":"e_1_3_2_141_2","first-page":"407","article-title":"Statistical analysis of masked data","volume":"9","author":"Little Roderick J. A.","year":"1993","unstructured":"Roderick J. A. Little. 1993. Statistical analysis of masked data. Journal of Official Statistics 9, 2 (1993), 407.","journal-title":"Journal of Official Statistics"},{"key":"e_1_3_2_142_2","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1002\/0470090456.ch13","article-title":"Statistical disclosure techniques based on multiple imputation","author":"Little Roderick J. A.","year":"2004","unstructured":"Roderick J. A. Little, Fang Liu, and Trivellore E. Raghunathan. 2004. Statistical disclosure techniques based on multiple imputation. In Applied Bayesian Modeling and Causal Inference from Incomplete-Data Perspectives: An Essential Journey with Donald Rubin\u2019s Statistical Family, Andrew Gelman and Xiao-Li Meng (Eds.). Wiley, 141\u2013152.","journal-title":"Applied Bayesian Modeling and Causal Inference from Incomplete-Data Perspectives: An Essential Journey with Donald Rubin\u2019s Statistical Family,"},{"key":"e_1_3_2_143_2","article-title":"Generalization techniques empirically outperform differential privacy against membership inference","author":"Liu Jiaxiang","year":"2021","unstructured":"Jiaxiang Liu, Simon Oya, and Florian Kerschbaum. 2021. Generalization techniques empirically outperform differential privacy against membership inference. arXiv preprint arXiv:2110.05524 (2021). https:\/\/arxiv.org\/abs\/2110.05524.","journal-title":"arXiv preprint arXiv:2110.05524"},{"key":"e_1_3_2_144_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-18576-3"},{"key":"e_1_3_2_145_2","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8892954"},{"key":"e_1_3_2_146_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS47876.2019.00150"},{"key":"e_1_3_2_147_2","doi-asserted-by":"publisher","DOI":"10.1109\/SMC42975.2020.9283102"},{"key":"e_1_3_2_148_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"e_1_3_2_149_2","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_150_2","volume-title":"The Anonymisation Decision-Making Framework","author":"Mackey Elaine","year":"2016","unstructured":"Elaine Mackey, Mark Elliot, and Kieron O\u2019Hara. 2016. The Anonymisation Decision-Making Framework. UKAN Publications."},{"key":"e_1_3_2_151_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045700"},{"key":"e_1_3_2_152_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-007-0078-6"},{"key":"e_1_3_2_153_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.04.003"},{"key":"e_1_3_2_154_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25955-8_16"},{"key":"e_1_3_2_155_2","doi-asserted-by":"publisher","DOI":"10.1214\/11-SS074"},{"key":"e_1_3_2_156_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09885-2_4"},{"key":"e_1_3_2_157_2","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287596"},{"key":"e_1_3_2_158_2","article-title":"Utilizing noise addition for data privacy, an overview","author":"Mivule Kato","year":"2013","unstructured":"Kato Mivule. 2013. Utilizing noise addition for data privacy, an overview. arXiv preprint arXiv:1309.3958 (2013).","journal-title":"arXiv preprint arXiv:1309.3958"},{"key":"e_1_3_2_159_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.09.295"},{"key":"e_1_3_2_160_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2012.09.050"},{"key":"e_1_3_2_161_2","doi-asserted-by":"publisher","DOI":"10.1145\/1857947.1857950"},{"key":"e_1_3_2_162_2","volume-title":"Controlled Data-Swapping Techniques for Masking Public Use Microdata Sets","author":"Moore Richard","year":"1996","unstructured":"Richard Moore. 1996. Controlled Data-Swapping Techniques for Masking Public Use Microdata Sets. U.S. Census Bureau."},{"key":"e_1_3_2_163_2","unstructured":"MOSTLY AI. 2017. MOSTLY AI. Retrieved December 1 2022 from https:\/\/mostly.ai\/."},{"key":"e_1_3_2_164_2","unstructured":"MOSTLY AI. 2020. Virtual Data Lab (VDL). Retrieved December 1 2022 from https:\/\/github.com\/mostly-ai\/virtualdatalab."},{"key":"e_1_3_2_165_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45381-1_17"},{"key":"e_1_3_2_166_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57521-2_2"},{"key":"e_1_3_2_167_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025610705286"},{"key":"e_1_3_2_168_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025614806194"},{"key":"e_1_3_2_169_2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1050.0503"},{"key":"e_1_3_2_170_2","doi-asserted-by":"publisher","DOI":"10.1007\/11930242_15"},{"key":"e_1_3_2_171_2","article-title":"Privacy preserving techniques applied to CPNI data: Analysis and recommendations","author":"Jr. Jeffrey Murray","year":"2021","unstructured":"Jeffrey Murray Jr., Afra Mashhadi, Brent Lagesse, and Michael Stiber. 2021. Privacy preserving techniques applied to CPNI data: Analysis and recommendations. arXiv preprint arXiv:2101.09834 (2021).","journal-title":"arXiv preprint arXiv:2101.09834"},{"key":"e_1_3_2_172_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-020-09572-w"},{"key":"e_1_3_2_173_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_2_174_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-80568-5_26"},{"issue":"3","key":"e_1_3_2_175_2","first-page":"527","article-title":"Statistical properties of multiplicative noise masking for confidentiality protection","volume":"27","author":"Nayak Tapan K.","year":"2011","unstructured":"Tapan K. Nayak, Bimal Sinha, and Laura Zayatz. 2011. Statistical properties of multiplicative noise masking for confidentiality protection. Journal of Official Statistics 27, 3 (2011), 527.","journal-title":"Journal of Official Statistics"},{"key":"e_1_3_2_176_2","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247554"},{"key":"e_1_3_2_177_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.03.009"},{"key":"e_1_3_2_178_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.07.006"},{"key":"e_1_3_2_179_2","article-title":"Utility of synthetic microdata generated using tree-based methods","author":"Nowok Beata","year":"2015","unstructured":"Beata Nowok. 2015. Utility of synthetic microdata generated using tree-based methods. In Proceedings of the UNECE Statistical Data Confidentiality Work Session. 1\u201311.","journal-title":"Proceedings of the UNECE Statistical Data Confidentiality Work Session."},{"key":"e_1_3_2_180_2","article-title":"Reidentification of Individuals in Chicago\u2019s Homicide Database: A Technical and Legal Study","author":"Ochoa Salvador","year":"2001","unstructured":"Salvador Ochoa, Jamie Rasmussen, Christine Robson, and Michael Salib. 2001. Reidentification of Individuals in Chicago\u2019s Homicide Database: A Technical and Legal Study. Massachusetts Institute of Technology, Cambridge, MA.","journal-title":"Massachusetts Institute of Technology"},{"key":"e_1_3_2_181_2","first-page":"1701","article-title":"Broken promises of privacy: Responding to the surprising failure of anonymization","volume":"57","author":"Ohm Paul","year":"2009","unstructured":"Paul Ohm. 2009. Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review 57 (2009), 1701.","journal-title":"UCLA Law Review"},{"key":"e_1_3_2_182_2","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M1241"},{"issue":"1","key":"e_1_3_2_183_2","first-page":"37","article-title":"Privacy preserving clustering by data transformation","volume":"1","author":"Oliveira Stanley R. M.","year":"2010","unstructured":"Stanley R. M. Oliveira and Osmar R. Zaiane. 2010. Privacy preserving clustering by data transformation. Journal of Information and Data Management 1, 1 (2010), 37.","journal-title":"Journal of Information and Data Management"},{"key":"e_1_3_2_184_2","unstructured":"OpenAIRE. 2021. Amnesia. Retrieved November 1 2021 from https:\/\/amnesia.openaire.eu."},{"key":"e_1_3_2_185_2","article-title":"Improving suppression to reduce disclosure risk and enhance data utility","author":"Orooji Marmar","year":"2019","unstructured":"Marmar Orooji and Gerald M. Knapp. 2019. Improving suppression to reduce disclosure risk and enhance data utility. arXiv preprint arXiv:1901.00716 (2019).","journal-title":"arXiv preprint arXiv:1901.00716"},{"key":"e_1_3_2_186_2","article-title":"Some Results of Individual Ranking Method on the System of Enterprise Accounts Annual Survey","author":"Pagliuca D.","year":"1999","unstructured":"D. Pagliuca and G. Seri. 1999. Some Results of Individual Ranking Method on the System of Enterprise Accounts Annual Survey. Esprit SDC Project, Deliverable MI-3\/S1. Esprit.","journal-title":"Esprit SDC Project, Deliverable MI-3\/S1. Esprit."},{"key":"e_1_3_2_187_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.49"},{"key":"e_1_3_2_188_2","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-020-0181-6"},{"key":"e_1_3_2_189_2","doi-asserted-by":"publisher","DOI":"10.1145\/3085504.3091117"},{"key":"e_1_3_2_190_2","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2812"},{"key":"e_1_3_2_191_2","doi-asserted-by":"publisher","DOI":"10.3414\/ME16-01-0012"},{"key":"e_1_3_2_192_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsx.2020.06.063"},{"key":"e_1_3_2_193_2","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1971.10482356"},{"key":"e_1_3_2_194_2","doi-asserted-by":"publisher","DOI":"10.2196\/18910"},{"key":"e_1_3_2_195_2","doi-asserted-by":"publisher","DOI":"10.1198\/016214505000000619"},{"issue":"3","key":"e_1_3_2_196_2","first-page":"441","article-title":"Using CART to generate partially synthetic public use microdata","volume":"21","author":"Reiter Jerome P.","year":"2005","unstructured":"Jerome P. Reiter. 2005. Using CART to generate partially synthetic public use microdata. Journal of Official Statistics 21, 3 (2005), 441.","journal-title":"Journal of Official Statistics"},{"key":"e_1_3_2_197_2","doi-asserted-by":"publisher","DOI":"10.5555\/539927"},{"issue":"3","key":"e_1_3_2_198_2","first-page":"103","article-title":"UK release practices for official microdata","volume":"26","author":"Ritchie Felix","year":"2009","unstructured":"Felix Ritchie. 2009. UK release practices for official microdata. Statistical Journal of the IAOS 26, 3, 4 (2009), 103\u2013111.","journal-title":"Statistical Journal of the IAOS"},{"key":"e_1_3_2_199_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-019-10933-3"},{"key":"e_1_3_2_200_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0190200"},{"issue":"2","key":"e_1_3_2_201_2","first-page":"54","article-title":"Efficient anonymization algorithms to prevent generalized losses and membership disclosure in microdata","volume":"2","author":"Rohilla Shivani","year":"2017","unstructured":"Shivani Rohilla and Manish Bhardwaj. 2017. Efficient anonymization algorithms to prevent generalized losses and membership disclosure in microdata. American Journal of Data Mining and Knowledge Discovery 2, 2 (2017), 54\u201361.","journal-title":"American Journal of Data Mining and Knowledge Discovery"},{"key":"e_1_3_2_202_2","article-title":"Differentially private synthetic data: Applied evaluations and enhancements","author":"Rosenblatt Lucas","year":"2020","unstructured":"Lucas Rosenblatt, Xiaoyan Liu, Samira Pouyanfar, Eduardo de Leon, Anuj Desai, and Joshua Allen. 2020. Differentially private synthetic data: Applied evaluations and enhancements. arXiv preprint arXiv:2011.05537 (2020).","journal-title":"arXiv preprint arXiv:2011.05537"},{"key":"e_1_3_2_203_2","doi-asserted-by":"publisher","DOI":"10.1016\/0377-0427(87)90125-7"},{"issue":"2","key":"e_1_3_2_204_2","first-page":"461","article-title":"Discussion statistical disclosure limitation","volume":"9","author":"Rubin Donald B.","year":"1993","unstructured":"Donald B. Rubin. 1993. Discussion statistical disclosure limitation. Journal of Official Statistics 9, 2 (1993), 461.","journal-title":"Journal of Official Statistics"},{"key":"e_1_3_2_205_2","first-page":"365","article-title":"Towards a global data privacy standard","volume":"71","author":"Rustad Michael L.","year":"2019","unstructured":"Michael L. Rustad and Thomas H. Koenig. 2019. Towards a global data privacy standard. Florida Law Review 71 (2019), 365.","journal-title":"Florida Law Review"},{"key":"e_1_3_2_206_2","unstructured":"Safe Data Access Professionals Working Group. 2019. Handbook on Statistical Disclosure Control for Outputs. Retrieved November 1 2022 from https:\/\/ukdataservice.ac.uk\/app\/uploads\/thf_datareport_aw_web.pdf."},{"key":"e_1_3_2_207_2","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_3_2_208_2","first-page":"1","volume-title":"Proceedings of the 2020 International Conference on Electrical Engineering and Informatics (ICELTICs\u201920)","author":"Sari W. Widodo, Irma Permata","year":"2020","unstructured":"W. Widodo, Irma Permata Sari, and Murien Nugraheni. 2020. ASENVA: Summarizing anatomy model by aggregating sensitive values. In Proceedings of the 2020 International Conference on Electrical Engineering and Informatics (ICELTICs\u201920). IEEE, Los Alamitos, CA, 1\u20134."},{"issue":"4","key":"e_1_3_2_209_2","first-page":"361","article-title":"Estimating the re-identification risk per record in microdata","volume":"14","author":"Skinner C. J.","year":"1998","unstructured":"C. J. Skinner and David J. Holmes. 1998. Estimating the re-identification risk per record in microdata. Journal of Official Statistics 14, 4 (1998), 361.","journal-title":"Journal of Official Statistics"},{"key":"e_1_3_2_210_2","first-page":"31","article-title":"Disclosure control for census microdata","volume":"10","author":"Skinner Chris","year":"1994","unstructured":"Chris Skinner, Catherine Marsh, Stan Openshaw, and Colin Wymer. 1994. Disclosure control for census microdata. Journal of Official Statistics\u2013Stockholm 10 (1994), 31.","journal-title":"Journal of Official Statistics\u2013Stockholm"},{"key":"e_1_3_2_211_2","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9868.00365"},{"key":"e_1_3_2_212_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-014-0351-4"},{"key":"e_1_3_2_213_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-014-0351-4"},{"key":"e_1_3_2_214_2","first-page":"602","article-title":"The confidentiality and analytic usefulness of masked business microdata","author":"Spruill Nancy","year":"1983","unstructured":"Nancy Spruill. 1983. The confidentiality and analytic usefulness of masked business microdata. Proceedings of the Section on Survey Research Methods 1983 (1983), 602\u2013607.","journal-title":"Proceedings of the Section on Survey Research Methods 1983"},{"key":"e_1_3_2_215_2","unstructured":"Statistics Netherlands. 2014. \\(\\mu\\) -ARGUS. Retrieved November 1 2021 from https:\/\/github.com\/sdcTools\/muargus."},{"key":"e_1_3_2_216_2","doi-asserted-by":"publisher","DOI":"10.5555\/916488"},{"key":"e_1_3_2_217_2","doi-asserted-by":"publisher","DOI":"10.1186\/s40064-016-2490-0"},{"issue":"2000","key":"e_1_3_2_218_2","first-page":"1","article-title":"Simple demographics often identify people uniquely","volume":"671","author":"Sweeney Latanya","year":"2000","unstructured":"Latanya Sweeney. 2000. Simple demographics often identify people uniquely. Health (San Francisco) 671, 2000 (2000), 1\u201334.","journal-title":"Health (San Francisco)"},{"key":"e_1_3_2_219_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_220_2","unstructured":"Akimichi Takemura. 1999. Local Recoding by Maximum Weight Matching for Disclosure Control of Microdata Sets. CIRJE F-Series CIRJE-F-40 CIRJE Faculty of Economics University of Tokyo."},{"key":"e_1_3_2_221_2","first-page":"45","volume-title":"Proceedings of the Conference on Statistical Data Protection","year":"1999","unstructured":"Akimichi Takemura. 1999. Some superpopulation models for estimating the number of population uniques. In Proceedings of the Conference on Statistical Data Protection. 45\u201358."},{"key":"e_1_3_2_222_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.65"},{"key":"e_1_3_2_223_2","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v067.i04"},{"key":"e_1_3_2_224_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87471-3_15"},{"key":"e_1_3_2_225_2","doi-asserted-by":"publisher","DOI":"10.1016\/0378-3758(91)90047-I"},{"key":"e_1_3_2_226_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25955-8_13"},{"key":"e_1_3_2_227_2","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-319-57358-8_5","volume-title":"Data Privacy: Foundations, New Developments and the Big Data Challenge","author":"Torra Vicen\u00e7","year":"2017","unstructured":"Vicen\u00e7 Torra. 2017. Privacy models and disclosure risk measures. In Data Privacy: Foundations, New Developments and the Big Data Challenge. Springer, 111\u2013189."},{"key":"e_1_3_2_228_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-12837-0"},{"key":"e_1_3_2_229_2","doi-asserted-by":"publisher","DOI":"10.1007\/11930242_20"},{"key":"e_1_3_2_230_2","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-28222-X_20"},{"key":"e_1_3_2_231_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2006.116"},{"key":"e_1_3_2_232_2","unstructured":"UT Dallas Data Security and Privacy Lab. 2012. UTD Anonymisation ToolBox. http:\/\/cs.utdallas.edu\/dspl\/cgi-bin\/toolbox\/. Accessed Nov 2021."},{"key":"e_1_3_2_233_2","doi-asserted-by":"publisher","DOI":"10.5555\/1032649.1033459"},{"key":"e_1_3_2_234_2","doi-asserted-by":"publisher","DOI":"10.1145\/3289430.3289435"},{"key":"e_1_3_2_235_2","doi-asserted-by":"publisher","DOI":"10.1145\/3168389"},{"key":"e_1_3_2_236_2","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150449"},{"key":"e_1_3_2_237_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.96"},{"key":"e_1_3_2_238_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2004.10110"},{"key":"e_1_3_2_239_2","doi-asserted-by":"publisher","DOI":"10.5555\/2449288.2449295"},{"key":"e_1_3_2_240_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4028-0"},{"key":"e_1_3_2_241_2","volume-title":"Elements of Statistical Disclosure Control","author":"Willenborg Leon Cornelis Roelof Johannes","year":"2000","unstructured":"Leon Cornelis Roelof Johannes Willenborg and Ton De Waal. 2000. Elements of Statistical Disclosure Control. Lecture Notes in Statistics, Vol. 144. Springer."},{"key":"e_1_3_2_242_2","doi-asserted-by":"publisher","DOI":"10.4018\/jdm.2003040102"},{"key":"e_1_3_2_243_2","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150499"},{"key":"e_1_3_2_244_2","first-page":"139","volume-title":"Proceedings of the 32nd International Conference on Very Large Data Bases","author":"Xiao Xiaokui","year":"2006","unstructured":"Xiaokui Xiao and Yufei Tao. 2006. Anatomy: Simple and effective privacy preservation. In Proceedings of the 32nd International Conference on Very Large Data Bases. 139\u2013150."},{"key":"e_1_3_2_245_2","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247556"},{"key":"e_1_3_2_246_2","article-title":"Differentially private generative adversarial network","author":"Xie Liyang","year":"2018","unstructured":"Liyang Xie, Kaixiang Lin, Shu Wang, Fei Wang, and Jiayu Zhou. 2018. Differentially private generative adversarial network. arXiv preprint arXiv:1802.06739 (2018).","journal-title":"arXiv preprint arXiv:1802.06739"},{"key":"e_1_3_2_247_2","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150504"},{"key":"e_1_3_2_248_2","article-title":"Modeling tabular data using conditional GAN","author":"Xu Lei","year":"2019","unstructured":"Lei Xu, Maria Skoularidou, Alfredo Cuesta-Infante, and Kalyan Veeramachaneni. 2019. Modeling tabular data using conditional GAN. In Advances in Neural Information Processing Systems 32.","journal-title":"Advances in Neural Information Processing Systems 32."},{"key":"e_1_3_2_249_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.12.136"},{"key":"e_1_3_2_250_2","unstructured":"YData. 2019. YData. Retrieved December 1 2022 from https:\/\/ydata.ai\/."},{"key":"e_1_3_2_251_2","unstructured":"YData. 2021. YData Synthetic. Retrieved December 1 2022 from https:\/\/github.com\/ydataai\/ydata-synthetic."},{"key":"e_1_3_2_252_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2017.8108955"},{"key":"e_1_3_2_253_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00027"},{"key":"e_1_3_2_254_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367857"},{"key":"e_1_3_2_255_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00025"},{"key":"e_1_3_2_256_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISPACS.2017.8266478"},{"key":"e_1_3_2_257_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2980235"},{"key":"e_1_3_2_258_2","article-title":"Privacy preserving classification over differentially private data","author":"Zorarpac\u0131 Ezgi","year":"2020","unstructured":"Ezgi Zorarpac\u0131 and Selma Ay\u015fe \u00d6zel. 2020. Privacy preserving classification over differentially private data. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery. Early access, December 13, 2020.","journal-title":"Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery."}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3588765","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3588765","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:36Z","timestamp":1750178856000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3588765"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,17]]},"references-count":257,"journal-issue":{"issue":"14s","published-print":{"date-parts":[[2023,12,31]]}},"alternative-id":["10.1145\/3588765"],"URL":"https:\/\/doi.org\/10.1145\/3588765","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,17]]},"assertion":[{"value":"2022-01-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-10","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-07-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}