ORIGINAL RESEARCH article
Front. Comput. Sci.
Sec. Computer Security
Privacy-Preserving Process Data Generation Based on Dual-Discriminator Conditional Generative Adversarial Networks
Provisionally accepted- 1Tongji University, Shanghai, China
- 2Donghua University, Shanghai, China
Select one of your emails
You have multiple emails registered with Frontiers:
Notify me on publication
Please enter your email address:
If you already have an account, please login
You don't have a Frontiers account ? You can register here
The expanding adoption of data-centric business analytics demands effective safeguarding techniques for process data that contains procedural details. Although Petri net-driven process mining successfully derives operational knowledge from activity sequences, current protection approaches frequently reduce analytical value. Therefore, maintaining process-related information while ensuring privacy protection remains a critical challenge. This work presents a Privacy-Preserving Process Data Generation method based on Dual-Discriminator Conditional Generative Adversarial Networks (P3DGAN) to generate privacy-preserving process data. To avoid mode collapse during model training, P3DGAN employs two discriminators that separately model the dataflow and workflow characteristics of process data. Furthermore, we propose a game optimization strategy based on Petri net theory to capture the global distribution characteristics of process data. Additionally, we introduce a workflow-level privacy metric based on the Euclidean distance of trace variants (ED-TV) for comprehensive risk assessment. Experimental results on four real process datasets demonstrate that our method can generate high-quality process data with excellent privacy protection compared to its competitive peers.
Keywords: Differential privacy, Dual-Discriminator, Generative Adversarial Networks, Petri nets, Privacy protection, Process data, workflow analysis
Received: 24 Nov 2025; Accepted: 30 Jan 2026.
Copyright: © 2026 Guo and Li. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence: Zhong Li
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.
