{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:35:21Z","timestamp":1743143721833,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031696503"},{"type":"electronic","value":"9783031696510"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-69651-0_27","type":"book-chapter","created":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T07:30:40Z","timestamp":1726126240000},"page":"403-419","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Relational Or Single: A Comparative Analysis of\u00a0Data Synthesis Approaches for\u00a0Privacy and\u00a0Utility on\u00a0a\u00a0Use Case from\u00a0Statistical Office"],"prefix":"10.1007","author":[{"given":"Manel","family":"Slokom","sequence":"first","affiliation":[]},{"given":"Shruti","family":"Agrawal","sequence":"additional","affiliation":[]},{"given":"Nynke C.","family":"Krol","sequence":"additional","affiliation":[]},{"given":"Peter-Paul","family":"de Wolf","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,13]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: Xgboost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794 (2016)","DOI":"10.1145\/2939672.2939785"},{"key":"27_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/3-540-47804-3_9","volume-title":"Inference Control in Statistical Databases","author":"RA Dandekar","year":"2002","unstructured":"Dandekar, R.A., Cohen, M., Kirkendall, N.: Sensitive micro data protection using Latin hypercube sampling technique. In: Domingo-Ferrer, J. (ed.) Inference Control in Statistical Databases. LNCS, vol. 2316, pp. 117\u2013125. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-47804-3_9"},{"key":"27_CR3","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/S0377-0427(03)00643-5","volume":"164\u2013165","author":"J Domingo-Ferrer","year":"2004","unstructured":"Domingo-Ferrer, J., Torra, V.: Disclosure risk assessment in statistical data protection. J. Comput. Appl. Math. 164\u2013165, 285\u2013293 (2004). proceedings of the 10th International Congress on Computational and Applied Mathematics","journal-title":"J. Comput. Appl. Math."},{"issue":"3","key":"27_CR4","first-page":"105","volume":"1","author":"J Drechsler","year":"2008","unstructured":"Drechsler, J., Bender, S., R\u00e4ssler, S.: Comparing fully and partially synthetic datasets for statistical disclosure control in the German IAB establishment panel. Trans. Data Priv. 1(3), 105\u2013130 (2008)","journal-title":"Trans. Data Priv."},{"issue":"12","key":"27_CR5","doi-asserted-by":"publisher","first-page":"3232","DOI":"10.1016\/j.csda.2011.06.006","volume":"55","author":"J Drechsler","year":"2011","unstructured":"Drechsler, J., Reiter, J.P.: An empirical evaluation of easily implemented, nonparametric methods for generating synthetic datasets. Comput. Stat. Data Anal. 55(12), 3232\u20133243 (2011)","journal-title":"Comput. Stat. Data Anal."},{"key":"27_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-0326-5","volume-title":"Synthetic Datasets for Statistical Disclosure Control: Theory and Implementation","author":"J Drechsler","year":"2011","unstructured":"Drechsler, J.: Synthetic Datasets for Statistical Disclosure Control: Theory and Implementation, vol. 201. Springer, New York (2011)"},{"key":"27_CR7","unstructured":"Nations Economic Commission\u00a0for Europe, U., et\u00a0al.: Synthetic data for official statistics: a starter guide (2023)"},{"key":"27_CR8","unstructured":"European Parliament and Council of the European Union: Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 april 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95\/46\/EC (General Data Protection Regulation). OJ 2016 L 119, pp. 1\u201388 (2016)"},{"issue":"12","key":"27_CR9","doi-asserted-by":"publisher","first-page":"1962","DOI":"10.14778\/3407790.3407802","volume":"13","author":"J Fan","year":"2020","unstructured":"Fan, J., Chen, J., Liu, T., Shen, Y., Li, G., Du, X.: Relational data synthesis using generative adversarial networks: a design space exploration. Proc. VLDB Endow. 13(12), 1962\u20131975 (2020)","journal-title":"Proc. VLDB Endow."},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Gao, C., Jajodia, S., Pugliese, A., Subrahmanian, V.: FakeDB: generating fake synthetic databases. IEEE Trans. Dependable Secure Comput. 1\u201312 (2024)","DOI":"10.1109\/TDSC.2024.3379434"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Hittmeir, M., Mayer, R., Ekelhart, A.: A baseline for attribute disclosure risk in synthetic data. In: Proceedings of the 10th ACM Conference on Data and Application Security and Privacy, pp. 133\u2013143 (2020)","DOI":"10.1145\/3374664.3375722"},{"key":"27_CR12","doi-asserted-by":"publisher","DOI":"10.1002\/9781118348239","volume-title":"Statistical Disclosure Control","author":"A Hundepool","year":"2012","unstructured":"Hundepool, A., et al.: Statistical Disclosure Control. Wiley, Hoboken (2012)"},{"key":"27_CR13","unstructured":"Li, J., Tay, Y.: IRG: generating synthetic relational databases using GANs. arXiv preprint arXiv:2312.15187 (2023)"},{"issue":"3","key":"27_CR14","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1145\/3979.4017","volume":"10","author":"CK Liew","year":"1985","unstructured":"Liew, C.K., Choi, U.J., Liew, C.J.: A data distortion by probability distribution. ACM Trans. Database Syst. 10(3), 395\u2013411 (1985)","journal-title":"ACM Trans. Database Syst."},{"key":"27_CR15","unstructured":"Elliot, M.: Final report on the disclosure risk associated with synthetic data produced by the SYLLS team (2014). http:\/\/hummedia.manchester.ac.uk\/institutes\/cmist\/archive-publications\/reports\/. Accessed 13 Oct 2023"},{"issue":"11","key":"27_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v074.i11","volume":"74","author":"B Nowok","year":"2016","unstructured":"Nowok, B., Raab, G.M., Dibben, C.: synthpop: bespoke creation of synthetic data in R. J. Stat. Softw. 74(11), 1\u201326 (2016)","journal-title":"J. Stat. Softw."},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Park, N., Mohammadi, M., Gorde, K., Jajodia, S., Park, H., Kim, Y.: Data synthesis based on Generative Adversarial Networks. In: Proceedings of the 44th International Conference on Very Large Data Bases (VLDB Endowment), vol. 11, no. 10, pp. 1071\u20131083 (2018)","DOI":"10.14778\/3231751.3231757"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Patki, N., Wedge, R., Veeramachaneni, K.: The synthetic data vault. In: IEEE International Conference on Data Science and Advanced Analytics, pp. 399\u2013410 (2016)","DOI":"10.1109\/DSAA.2016.49"},{"issue":"2","key":"27_CR19","first-page":"461","volume":"9","author":"DB Rubin","year":"1993","unstructured":"Rubin, D.B.: Discussion statistical disclosure limitation. J. Official Stat. 9(2), 461\u2013468 (1993)","journal-title":"J. Official Stat."},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Salter, C., Saydjari, O.S., Schneier, B., Wallner, J.: Toward a secure system engineering methodology. In: Proceedings of the Workshop on New Security Paradigms, pp. 2\u201310. NSPW (1998)","DOI":"10.1145\/310889.310900"},{"key":"27_CR21","first-page":"13","volume":"86","author":"N Schlomo","year":"2022","unstructured":"Schlomo, N.: How to measure disclosure risk in microdata? Surv. Stat. 86, 13\u201321 (2022)","journal-title":"Surv. Stat."},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Slokom, M., de\u00a0Wolf, P.P., Larson, M.: When machine learning models leak: an exploration of synthetic training data. In: Domingo-Ferrer, J., Laurent, M. (eds.) Proceedings of the International Conference on Privacy in Statistical Databases: Corrected and updated version on arXiv at:https:\/\/arxiv.org\/abs\/2310.08775 (2022)","DOI":"10.1007\/978-3-031-13945-1_20"},{"key":"27_CR23","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-031-49187-0_1","volume-title":"ISC 2023","author":"M Slokom","year":"2023","unstructured":"Slokom, M., de Wolf, P.P., Larson, M.: Exploring privacy-preserving techniques on synthetic data as a defense against model inversion attacks. In: Athanasopoulos, E., Mennink, B. (eds.) ISC 2023. LNCS, vol. 14411, pp. 3\u201323. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-49187-0_1"},{"key":"27_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-319-99771-1_9","volume-title":"Privacy in Statistical Databases","author":"J Taub","year":"2018","unstructured":"Taub, J., Elliot, M., Pampaka, M., Smith, D.: Differential correct attribution probability for synthetic data: an exploration. In: Domingo-Ferrer, J., Montes, F. (eds.) PSD 2018. LNCS, vol. 11126, pp. 122\u2013137. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99771-1_9"},{"key":"27_CR25","unstructured":"Xu, L., Skoularidou, M., Cuesta-Infante, A., Veeramachaneni, K.: Modeling tabular data using conditional GAN. In: Wallach, H., Larochelle, H., Beygelzimer, A., d\u2019Alche Buc, F., Fox, E., Garnett, R. (eds.) Advances in Neural Information Processing Systems, vol. 32, pp. 7335\u20137345 (2019)"}],"container-title":["Lecture Notes in Computer Science","Privacy in Statistical Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-69651-0_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T07:35:42Z","timestamp":1726126542000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-69651-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031696503","9783031696510"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-69651-0_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"13 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PSD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Privacy in Statistical Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Antibes Juan-les-Pins","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"psd2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/crises-deim.urv.cat\/psd2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}