{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T02:27:47Z","timestamp":1774578467650,"version":"3.50.1"},"reference-count":74,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Union","award":["16KISA128K"],"award-info":[{"award-number":["16KISA128K"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>In the European Union, Data Controllers and Data Processors, who work with personal data, have to comply with the General Data Protection Regulation and other applicable laws. This affects the storing and processing of personal data. But some data processing in data mining or statistical analyses does not require any personal reference to the data. Thus, personal context can be removed. For these use cases, to comply with applicable laws, any existing personal information has to be removed by applying the so-called anonymization. However, anonymization should maintain data utility. Therefore, the concept of anonymization is a double-edged sword with an intrinsic trade-off: privacy enforcement vs. utility preservation. The former might not be entirely guaranteed when anonymized data are published as Open Data. In theory and practice, there exist diverse approaches to conduct and score anonymization. This explanatory synthesis discusses the technical perspectives on the anonymization of tabular data with a special emphasis on the European Union\u2019s legal base. The studied methods for conducting anonymization, and scoring the anonymization procedure and the resulting anonymity are explained in unifying terminology. The examined methods and scores cover both categorical and numerical data. The examined scores involve data utility, information preservation, and privacy models. In practice-relevant examples, methods and scores are experimentally tested on records from the UCI Machine Learning Repository\u2019s \u201cCensus Income (Adult)\u201d dataset.<\/jats:p>","DOI":"10.3390\/info14090487","type":"journal-article","created":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T02:43:20Z","timestamp":1693795400000},"page":"487","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Anonymization Procedures for Tabular Data: An Explanatory Technical and Legal Synthesis"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-0986-3504","authenticated-orcid":false,"given":"Robert","family":"Aufschl\u00e4ger","sequence":"first","affiliation":[{"name":"Technology Campus Vilshofen, Deggendorf Institute of Technology, 94474 Vilshofen an der Donau, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8428-1916","authenticated-orcid":false,"given":"Jakob","family":"Folz","sequence":"additional","affiliation":[{"name":"Technology Campus Vilshofen, Deggendorf Institute of Technology, 94474 Vilshofen an der Donau, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7732-9238","authenticated-orcid":false,"given":"Elena","family":"M\u00e4rz","sequence":"additional","affiliation":[{"name":"Faculty of Law, University of Augsburg, 86159 Augsburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6341-3404","authenticated-orcid":false,"given":"Johann","family":"Guggumos","sequence":"additional","affiliation":[{"name":"Faculty of Law, University of Augsburg, 86159 Augsburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7303-113X","authenticated-orcid":false,"given":"Michael","family":"Heigl","sequence":"additional","affiliation":[{"name":"Technology Campus Vilshofen, Deggendorf Institute of Technology, 94474 Vilshofen an der Donau, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1438-5127","authenticated-orcid":false,"given":"Benedikt","family":"Buchner","sequence":"additional","affiliation":[{"name":"Faculty of Law, University of Augsburg, 86159 Augsburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6206-2969","authenticated-orcid":false,"given":"Martin","family":"Schramm","sequence":"additional","affiliation":[{"name":"Technology Campus Vilshofen, Deggendorf Institute of Technology, 94474 Vilshofen an der Donau, Germany"}]}],"member":"1968","published-online":{"date-parts":[[2023,9,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1093\/idpl\/ipac008","article-title":"The GDPR and unstructured data: Is anonymization possible?","volume":"12","author":"Weitzenboeck","year":"2022","journal-title":"Int. Data Priv. Law"},{"key":"ref_2","unstructured":"Samarati, P., and Sweeney, L. (1998, January 3\u20136). Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"K-Anonymity: A Model for Protecting Privacy","volume":"10","author":"Sweeney","year":"2002","journal-title":"Int. J. Uncertain. Fuzziness-Knowl.-Based Syst."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Ford, E., Tyler, R., Johnston, N., Spencer-Hughes, V., Evans, G., Elsom, J., Madzvamuse, A., Clay, J., Gilchrist, K., and Rees-Roberts, M. (2023). Challenges Encountered and Lessons Learned when Using a Novel Anonymised Linked Dataset of Health and Social Care Records for Public Health Intelligence: The Sussex Integrated Dataset. Information, 14.","DOI":"10.3390\/info14020106"},{"key":"ref_5","unstructured":"Becker, B., and Kohavi, R. (2023, May 15). Adult. UCI Machine Learning Repository. Available online: https:\/\/archive-beta.ics.uci.edu\/dataset\/2\/adult."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"8512","DOI":"10.1109\/ACCESS.2020.3045700","article-title":"Anonymization Techniques for Privacy Preserving Data Publishing: A Comprehensive Survey","volume":"9","author":"Majeed","year":"2021","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"101513","DOI":"10.1016\/j.compenvurbsys.2020.101513","article-title":"A context sensitive approach to anonymizing public participation GIS data: From development to the assessment of anonymization effects on data quality","volume":"83","author":"Hasanzadeh","year":"2020","journal-title":"Comput. Environ. Urban Syst."},{"key":"ref_8","unstructured":"Olatunji, I.E., Rauch, J., Katzensteiner, M., and Khosla, M. (2022). Big Data, Mary Ann Liebert, Inc."},{"key":"ref_9","unstructured":"Prasser, F., and Kohlmayer, F. (2015). Medical Data Privacy Handbook, Springer."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1038\/s41597-020-00773-y","article-title":"Design and evaluation of a data anonymization pipeline to promote Open Science on COVID-19","volume":"7","author":"Jakob","year":"2020","journal-title":"Sci. Data"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/s00439-011-1042-5","article-title":"Identifiability in biobanks: Models, measures, and mitigation strategies","volume":"130","author":"Malin","year":"2011","journal-title":"Hum. Genet."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1186\/s40537-018-0141-8","article-title":"Privacy preservation techniques in big data analytics: A survey","volume":"5","year":"2018","journal-title":"J. Big Data"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"bbac440","DOI":"10.1093\/bib\/bbac440","article-title":"Open tools for quantitative anonymization of tabular phenotype data: Literature review","volume":"23","author":"Haber","year":"2022","journal-title":"Briefings Bioinform."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3168389","article-title":"Technical Privacy Metrics","volume":"51","author":"Wagner","year":"2018","journal-title":"ACM Comput. Surv."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1177\/1073110520917025","article-title":"Lost in Anonymization\u2014A Data Anonymization Reference Classification Merging Legal and Technical Considerations","volume":"48","author":"Vokinger","year":"2020","journal-title":"J. Law Med. Ethics"},{"key":"ref_16","unstructured":"Ro\u00dfnagel, H., Wagner, S., and H\u00fchnlein, D. (2019, January 28\u201329). Anonymization Is Dead\u2014Long Live Privacy. Proceedings of the Open Identity Summit 2019, Garmisch-Partenkirchen, Germany."},{"key":"ref_17","unstructured":"Rights (OCR), Office for Civil (2023, July 21). Methods for De-Identification of PHI. HHS.gov, Available online: https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/special-topics\/de-identification\/index.html."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1109\/TKDE.2008.129","article-title":"k-Anonymization with Minimal Loss of Information","volume":"21","author":"Gionis","year":"2009","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s00778-010-0192-8","article-title":"Local and global recoding methods for anonymizing set-valued data","volume":"20","author":"Terrovitis","year":"2011","journal-title":"VLDB J."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Agrawal, R., and Srikant, R. (2000, January 16\u201318). Privacy-Preserving Data Mining. Proceedings of the SIGMOD \u201900: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, Dallas, TX, USA.","DOI":"10.1145\/342009.335438"},{"key":"ref_21","unstructured":"Bayardo, R., and Agrawal, R. (2005, January 5\u20138). Data privacy through optimal k-anonymization. Proceedings of the 21st International Conference on Data Engineering (ICDE\u201905), Tokyo, Japan."},{"key":"ref_22","first-page":"1","article-title":"Differential Privacy","volume":"Volume 4052","author":"Dwork","year":"2006","journal-title":"Automata, Languages and Programming, Proceedings of the 33rd International Colloquium on Automata, Languages and Programming, Part II (ICALP 2006), Venice, Italy, 10\u201314 July 2006"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Wang, T., Zhang, X., Feng, J., and Yang, X. (2020). A Comprehensive Survey on Local Differential Privacy toward Data Statistics and Analysis. Sensors, 20.","DOI":"10.3390\/s20247030"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork","year":"2014","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"ref_25","unstructured":"Wang, Y., Wu, X., and Hu, D. (2016, January 15). Using Randomized Response for Differential Privacy Preserving Data Collection. Proceedings of the EDBT\/ICDT Workshops, Bordeaux, France."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Abadi, M., Chu, A., Goodfellow, I., McMahan, H.B., Mironov, I., Talwar, K., and Zhang, L. (2016, January 24\u201328). Deep Learning with Differential Privacy. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria.","DOI":"10.1145\/2976749.2978318"},{"key":"ref_27","unstructured":"van der Maaten, L., and Hannun, A.Y. (2020). The Trade-Offs of Private Prediction. arXiv."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"McKenna, R., Miklau, G., and Sheldon, D. (2021). Winning the NIST Contest: A scalable and general approach to differentially private synthetic data. arXiv.","DOI":"10.29012\/jpc.778"},{"key":"ref_29","unstructured":"Aggarwal, C.C., and Yu, P.S. (2004). Advances in Database Technology-EDBT 2004, Proceedings of the International Conference on Extending Database Technology, Crete, Greece, 14\u201318 March 2004, Springer."},{"key":"ref_30","first-page":"19","article-title":"Differential-Private Data Publishing Through Component Analysis","volume":"6","author":"Jiang","year":"2013","journal-title":"Trans. Data Priv."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/s10115-006-0001-2","article-title":"Singular value decomposition based data distortion strategy for privacy protection","volume":"10","author":"Xu","year":"2006","journal-title":"Knowl. Inf. Syst."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Soria-Comas, J., and Domingo-Ferrer, J. (2019, January 4\u20136). Mitigating the Curse of Dimensionality in Data Anonymization. Proceedings of the Modeling Decisions for Artificial Intelligence: 16th International Conference, MDAI 2019, Milan, Italy.","DOI":"10.1007\/978-3-030-26773-5_30"},{"key":"ref_33","unstructured":"Xu, L., and Veeramachaneni, K. (2018). Synthesizing Tabular Data using Generative Adversarial Networks. arXiv."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Park, N., Mohammadi, M., Gorde, K., Jajodia, S., Park, H., and Kim, Y. (2018). Data Synthesis based on Generative Adversarial Networks. arXiv.","DOI":"10.14778\/3231751.3231757"},{"key":"ref_35","unstructured":"Xu, L., Skoularidou, M., Cuesta-Infante, A., and Veeramachaneni, K. (2019). Modeling Tabular data using Conditional GAN. arXiv."},{"key":"ref_36","unstructured":"Xie, L., Lin, K., Wang, S., Wang, F., and Zhou, J. (2018). Differentially Private Generative Adversarial Network. arXiv."},{"key":"ref_37","unstructured":"Kunar, A., Birke, R., Zhao, Z., and Chen, L. (2021). DTGAN: Differential Private Training for Tabular GANs. arXiv."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Zakerzadeh, H., Aggrawal, C.C., and Barker, K. (2014, January 24\u201326). Towards Breaking the Curse of Dimensionality for High-Dimensional Privacy. Proceedings of the 2014 SIAM International Conference on Data Mining, Philadelphia, PA, USA.","DOI":"10.1137\/1.9781611973440.84"},{"key":"ref_39","unstructured":"Aggarwal, C.C. (September, January 30). On K-Anonymity and the Curse of Dimensionality. Proceedings of the VLDB \u201905: 31st International Conference on Very Large Data Bases, Trondheim, Norway."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Salas, J., and Torra, V. (2018, January 6\u20137). A General Algorithm for k-anonymity on Dynamic Databases. Proceedings of the DPM\/CBT@ESORICS, Barcelona, Spain.","DOI":"10.1007\/978-3-030-00305-0_28"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1145\/1233321.1233324","article-title":"Utility-based anonymization for privacy preservation with less information loss","volume":"8","author":"Xu","year":"2006","journal-title":"SIGKDD Explor."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D., and Ramakrishnan, R. (2006, January 3\u20138). Mondrian Multidimensional K-Anonymity. Proceedings of the 22nd International Conference on Data Engineering (ICDE\u201906), Atlanta, GA, USA.","DOI":"10.1109\/ICDE.2006.101"},{"key":"ref_43","first-page":"1","article-title":"L\u2014Diversity-Based Semantic Anonymaztion for Data Publishing","volume":"7","author":"Elabd","year":"2015","journal-title":"Int. J. Inf. Technol. Comput. Sci."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1109\/TVCG.2017.2745139","article-title":"A Utility-Aware Visual Approach for Anonymizing Multi-Attribute Tabular Data","volume":"24","author":"Wang","year":"2018","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., and Venkitasubramaniam, M. (2006, January 3\u20138). L-diversity: Privacy beyond k-anonymity. Proceedings of the 22nd International Conference on Data Engineering (ICDE\u201906), Atlanta, GA, USA.","DOI":"10.1109\/ICDE.2006.1"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., and Venkatasubramanian, S. (2006\u201320, January 15). t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. Proceedings of the 2007 IEEE 23rd International Conference on Data Engineering, Istanbul, Turkey.","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"804","DOI":"10.1111\/bjet.13223","article-title":"Privacy risk quantification in education data using Markov model","volume":"53","author":"Vatsalan","year":"2022","journal-title":"Br. J. Educ. Technol."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"D\u00edaz, J.S.P., and Garc\u00eda, \u00c1.L. (2023). Comparison of machine learning models applied on anonymized data with different techniques. arXiv.","DOI":"10.1109\/CSR57506.2023.10224917"},{"key":"ref_49","unstructured":"CSIRO (2023, June 04). Metrics and Frameworks for Privacy Risk Assessments, CSIRO: Canberra, Australia, Adopted on 12 July 2021. Available online: https:\/\/www.csiro.au\/en\/research\/technology-space\/cyber\/Metrics-and-frameworks-for-privacy-risk-assessments."},{"key":"ref_50","unstructured":"Bellman, R. (1957). Dynamic Programming, Princeton University Press. [1st ed.]."},{"key":"ref_51","unstructured":"Ding, C., and Peng, H. (2003, January 11\u201314). Minimum redundancy feature selection from microarray gene expression data. Proceedings of the 2003 IEEE Bioinformatics Conference. CSB2003, Stanford, CA, USA."},{"key":"ref_52","unstructured":"Domingo-Ferrer, J., and Soria-Comas, J. (2020). Multi-Dimensional Randomized Response. arXiv."},{"key":"ref_53","unstructured":"K\u00fchling, J., and Buchner, B. (2020). Datenschutz-Grundverordnung BDSG: Kommentar, C.H.Beck. [3rd ed.]."},{"key":"ref_54","unstructured":"(2023, May 05). Article 29 Data Protection Working Party. Opinion 4\/2007 on the Concept of Personal Data, WP136, Adopted on 20 June 2007. Available online: https:\/\/ec.europa.eu\/justice\/article-29\/documentation\/opinion-recommendation\/files\/2007\/wp136en.pdf."},{"key":"ref_55","unstructured":"Auer-Reinsdorff, A., and Conrad, I. (2016). Handbuch IT-und Datenschutzrecht, C.H.Beck. [2nd ed.]."},{"key":"ref_56","unstructured":"Paal, B.P., Pauly, D.A., and Ernst, S. (2021). Datenschutz-Grundverordnung, Bundesdatenschutzgesetz, C.H.Beck."},{"key":"ref_57","unstructured":"Specht, L., and Mantz, R. (2019). Bereichsspezifischer Datenschutz in Privatwirtschaft und \u00f6ffentlichem Sektor, C.H.Beck."},{"key":"ref_58","unstructured":"(2023). Single Resolution Board v European Data Protection Supervisor. ECLI:EU:T:2023:219 (Standard No. Case T-557\/20). Available online: https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:62020TA0557."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"498","DOI":"10.21552\/edpl\/2020\/4\/6","article-title":"Anonymised data and the rule of law","volume":"6","author":"Groos","year":"2020","journal-title":"Eur. Data Prot. L. Rev."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1093\/idpl\/ipz026","article-title":"They who must not be identified\u2014distinguishing personal from non-personal data under the GDPR","volume":"10","author":"Finck","year":"2020","journal-title":"Int. Data Priv. Law"},{"key":"ref_61","unstructured":"Article 29 Data Protection Working Party (2014). Opinion 5\/2014 on Anonymisation Techniques, Directorate-General for Justice and Consumers. Available online: https:\/\/ec.europa.eu\/justice\/article-29\/documentation\/opinion-recommendation\/files\/2014\/wp216_en.pdf."},{"key":"ref_62","first-page":"345","article-title":"Die Bestimmbarkeit als Grundproblem des Datenschutzrechts\u2014\u00dcberblick \u00fcber den Theorienstreit und L\u00f6sungsvorschlag","volume":"365","author":"Bergt","year":"2015","journal-title":"Z. Datenschutz"},{"key":"ref_63","unstructured":"Burkert, C., Federrath, H., Marx, M., and Schwarz, M. (2023, May 11). Positionspapier zur Anonymisierung unter der DSGVO unter Besonderer Ber\u00fccksichtigung der TK-Branche. Konsultationsverfahren des BfDI. Available online: https:\/\/www.bfdi.bund.de\/SharedDocs\/Downloads\/DE\/Konsultationsverfahren\/1_Anonymisierung\/Positionspapier-Anonymisierung.html."},{"key":"ref_64","unstructured":"(2016). Patrick Breyer v Bundesrepublik Deutschland. ECLI:EU:C:2016:779 (Standard No. Case C-582\/14). Available online: https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:62014CJ0582."},{"key":"ref_65","unstructured":"Schwartmann, R., Jaspers, A., Lepperhoff, N., Wei\u00df, S., and Meier, M. (2023, June 10). Practice Guide to Anonymising Personal Data; Foundation for Data Protection, Leipzig 2022. Available online: https:\/\/stiftungdatenschutz.org\/fileadmin\/Redaktion\/Dokumente\/Anonymisierung_personenbezogener_Daten\/SDS_Practice_Guide_to_Anonymising-Web-EN.pdf."},{"key":"ref_66","first-page":"309","article-title":"Pseudonymisierung und Anonymisierung von personenbezogenen Forschungsdaten im Rahmen klinischer Pr\u00fcfungen von Arzneimitteln (Teil I)-Gesetzliche Anforderungen","volume":"6","author":"Bischoff","year":"2020","journal-title":"Pharma Recht"},{"key":"ref_67","unstructured":"Simitis, S., Hornung, G., and Spiecker gen. D\u00f6hmann, I. (2019). Datenschutzrecht: DSGVO mit BDSG, Nomos."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Cs\u00e1nyi, G.M., Nagy, D., V\u00e1gi, R., Vad\u00e1sz, J.P., and Orosz, T. (2021). Challenges and Open Problems of Legal Document Anonymization. Symmetry, 13.","DOI":"10.3390\/sym13081490"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1038\/s41597-022-01669-9","article-title":"Statistical biases due to anonymization evaluated in an open clinical dataset from COVID-19 patients","volume":"9","author":"Koll","year":"2022","journal-title":"Sci. Data"},{"key":"ref_70","unstructured":"Dewes, A. (2022). Datenwirtschaft und Datentechnologie: Wie aus Daten Wert Entsteht, Springer."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Giomi, M., Boenisch, F., Wehmeyer, C., and Tasn\u00e1di, B. (2022). A Unified Framework for Quantifying Privacy Risk in Synthetic Data. arXiv.","DOI":"10.56553\/popets-2023-0055"},{"key":"ref_72","unstructured":"L\u00f3pez, C.A.F. (2022, January 2). On the legal nature of synthetic data. Proceedings of the NeurIPS 2022 Workshop on Synthetic Data for Empowering ML Research, New Orleans, LA, USA."},{"key":"ref_73","first-page":"20180083","article-title":"Algorithms that Remember: Model Inversion Attacks and Data Protection Law","volume":"376","author":"Veale","year":"2018","journal-title":"Philos. Trans. R. Soc. Math. Phys. Eng. Sci."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1080\/17579961.2018.1452176","article-title":"The law of everything. Broad concept of personal data and future of EU data protection law","volume":"10","author":"Purtova","year":"2018","journal-title":"Law Innov. Technol."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/14\/9\/487\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:45:10Z","timestamp":1760129110000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/14\/9\/487"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,1]]},"references-count":74,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2023,9]]}},"alternative-id":["info14090487"],"URL":"https:\/\/doi.org\/10.3390\/info14090487","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,1]]}}}