{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:12:41Z","timestamp":1743153161423,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031696503"},{"type":"electronic","value":"9783031696510"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-69651-0_16","type":"book-chapter","created":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T07:30:40Z","timestamp":1726126240000},"page":"240-253","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Synthetic Data Outliers: Navigating Identity Disclosure"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-3950-2533","authenticated-orcid":false,"given":"Carolina","family":"Trindade","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9988-594X","authenticated-orcid":false,"given":"Lu\u00eds","family":"Antunes","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7700-1955","authenticated-orcid":false,"given":"T\u00e2nia","family":"Carvalho","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4322-1076","authenticated-orcid":false,"given":"Nuno","family":"Moniz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,13]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Allen, K., Berry, M.M., Luehrs\u00a0Jr., F.U., Perry, J.W.: Machine literature searching viii. operational criteria for designing information retrieval systems. Am. Doc. (pre-1986) 6(2), 93 (1955)","DOI":"10.1002\/asi.5090060209"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: 21st International Conference on Data Engineering (ICDE 2005), pp. 217\u2013228. IEEE (2005)","DOI":"10.1109\/ICDE.2005.42"},{"key":"16_CR3","unstructured":"van Breugel, B., Sun, H., Qian, Z., van\u00a0der Schaar, M.: Membership inference attacks against synthetic data through overfitting detection. arXiv preprint arXiv:2302.12580 (2023)"},{"key":"16_CR4","unstructured":"de\u00a0Bruin, J.: Recordlinkage. Online (2016). https:\/\/pypi.org\/project\/recordlinkage\/. Accessed March 2023"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Carvalho, T., Moniz, N., Faria, P., Antunes, L.: Survey on privacy-preserving techniques for microdata publication. ACM Comput. Surv. (2023)","DOI":"10.1145\/3588765"},{"key":"16_CR6","unstructured":"DataCebo, I.: SDV. Online (2018). https:\/\/github.com\/sdv-dev\/SDV. Accessed January 2023"},{"key":"16_CR7","unstructured":"DataCebo, I.: Sdmetrics. Online (2020). https:\/\/github.com\/sdv-dev\/SDMetrics. Accessed January 2023"},{"key":"16_CR8","unstructured":"Dua, D., Graff, C.: Credit risk dataset. Online (2020). https:\/\/www.kaggle.com\/datasets\/laotse\/credit-risk-dataset. Accessed April 2023"},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"issue":"11","key":"16_CR10","doi-asserted-by":"publisher","first-page":"e23139","DOI":"10.2196\/23139","volume":"22","author":"K El Emam","year":"2020","unstructured":"El Emam, K., Mosquera, L., Bass, J.: Evaluating identity disclosure risk in fully synthetic health data: model development and validation. J. Med. Internet Res. 22(11), e23139 (2020)","journal-title":"J. Med. Internet Res."},{"key":"16_CR11","unstructured":"El\u00a0Emam, K., Mosquera, L., Hoptroff, R.: Practical Synthetic Data Generation: Balancing Privacy and the Broad Availability of Data. O\u2019Reilly Media (2020)"},{"issue":"328","key":"16_CR12","doi-asserted-by":"publisher","first-page":"1183","DOI":"10.1080\/01621459.1969.10501049","volume":"64","author":"IP Fellegi","year":"1969","unstructured":"Fellegi, I.P., Sunter, A.B.: A theory for record linkage. J. Am. Stat. Assoc. 64(328), 1183\u20131210 (1969)","journal-title":"J. Am. Stat. Assoc."},{"issue":"15","key":"16_CR13","doi-asserted-by":"publisher","first-page":"2733","DOI":"10.3390\/math10152733","volume":"10","author":"A Figueira","year":"2022","unstructured":"Figueira, A., Vaz, B.: Survey on synthetic data generation, evaluation methods and GANs. Mathematics 10(15), 2733 (2022)","journal-title":"Mathematics"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Giomi, M., Boenisch, F., Wehmeyer, C., Tasn\u00e1di, B.: A unified framework for quantifying privacy risk in synthetic data. arXiv preprint arXiv:2211.10459 (2022)","DOI":"10.56553\/popets-2023-0055"},{"key":"16_CR15","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, vol. 27 (2014)"},{"issue":"1","key":"16_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/00401706.1969.10490657","volume":"11","author":"FE Grubbs","year":"1969","unstructured":"Grubbs, F.E.: Procedures for detecting outlying observations in samples. Technometrics 11(1), 1\u201321 (1969)","journal-title":"Technometrics"},{"issue":"31","key":"16_CR17","doi-asserted-by":"publisher","first-page":"e2104906119","DOI":"10.1073\/pnas.2104906119","volume":"119","author":"VJ Hotz","year":"2022","unstructured":"Hotz, V.J., et al.: Balancing data privacy and usability in the federal statistical system. Proc. Nat. Acad. Sci. 119(31), e2104906119 (2022)","journal-title":"Proc. Nat. Acad. Sci."},{"key":"16_CR18","unstructured":"Houssiau, F., et al.: TAPAS: a toolbox for adversarial privacy auditing of synthetic data. arXiv preprint arXiv:2211.06550 (2022)"},{"key":"16_CR19","unstructured":"Kingma, D.P., Welling, M.: Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 (2013)"},{"key":"16_CR20","unstructured":"Mahiou, S., Xu, K., Ganev, G.: Dpart: differentially private autoregressive tabular, a general framework for synthetic data generation. arXiv preprint arXiv:2207.05810 (2022)"},{"key":"16_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-25955-8_16","volume-title":"Privacy in Statistical Databases","author":"JM Mateo-Sanz","year":"2004","unstructured":"Mateo-Sanz, J.M., Seb\u00e9, F., Domingo-Ferrer, J.: Outlier protection in continuous microdata masking. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol. 3050, pp. 201\u2013215. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-25955-8_16"},{"key":"16_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-319-45381-1_17","volume-title":"Privacy in Statistical Databases","author":"K Muralidhar","year":"2016","unstructured":"Muralidhar, K., Domingo-Ferrer, J.: Rank-based record linkage for re-identification risk assessment. In: Domingo-Ferrer, J., Peji\u0107-Bach, M. (eds.) PSD 2016. LNCS, vol. 9867, pp. 225\u2013236. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45381-1_17"},{"key":"16_CR23","unstructured":"Nikolenko, S.I.: Synthetic data for deep learning. arXiv preprint arXiv:1909.11512 (2019)"},{"key":"16_CR24","unstructured":"Pagliuca, D., Seri, G.: Some results of individual ranking method on the system of enterprise accounts annual survey. Esprit SDC Proj. Deliverable MI-3 D 2, 1999 (1999)"},{"key":"16_CR25","unstructured":"Party, A.D.P.W.: Opinion 05\/2014 on anonymisation techniques. European Commission (2014)"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Patki, N., Wedge, R., Veeramachaneni, K.: The synthetic data vault. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 399\u2013410. IEEE (2016)","DOI":"10.1109\/DSAA.2016.49"},{"issue":"45","key":"16_CR27","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1086\/100259","volume":"2","author":"B Peirce","year":"1852","unstructured":"Peirce, B.: Criterion for the rejection of doubtful observations. Astron. J. 2(45), 161\u2013163 (1852)","journal-title":"Astron. J."},{"issue":"2","key":"16_CR28","first-page":"461","volume":"9","author":"DB Rubin","year":"1993","unstructured":"Rubin, D.B.: Statistical disclosure limitation. J. Off. Stat. 9(2), 461\u2013468 (1993)","journal-title":"J. Off. Stat."},{"issue":"6","key":"16_CR29","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"16_CR30","unstructured":"Mahiou, S., Xu, K., G.G.: Dpart. Online (2022). https:\/\/github.com\/hazy\/dpart. Accessed May 2023"},{"key":"16_CR31","unstructured":"Stadler, T., Oprisanu, B., Troncoso, C.: Synthetic data\u2013anonymisation groundhog day. In: 31st USENIX Security Symposium (USENIX Security 2022), pp. 1451\u20131468 (2022)"},{"key":"16_CR32","unstructured":"Tao, Y., McKenna, R., Hay, M., Machanavajjhala, A., Miklau, G.: Benchmarking differentially private synthetic data generation algorithms. arXiv preprint arXiv:2112.09238 (2021)"},{"key":"16_CR33","unstructured":"Tukey, J.W., et al.: Exploratory Data Analysis, vol. 2. Reading (1977)"}],"container-title":["Lecture Notes in Computer Science","Privacy in Statistical Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-69651-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T01:15:44Z","timestamp":1732756544000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-69651-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031696503","9783031696510"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-69651-0_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"13 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PSD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Privacy in Statistical Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Antibes Juan-les-Pins","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"psd2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/crises-deim.urv.cat\/psd2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}