Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
119 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Practical considerations on using private sampling for synthetic data (2312.07139v1)

Published 12 Dec 2023 in cs.CR

Abstract: Artificial intelligence and data access are already mainstream. One of the main challenges when designing an artificial intelligence or disclosing content from a database is preserving the privacy of individuals who participate in the process. Differential privacy for synthetic data generation has received much attention due to the ability of preserving privacy while freely using the synthetic data. Private sampling is the first noise-free method to construct differentially private synthetic data with rigorous bounds for privacy and accuracy. However, this synthetic data generation method comes with constraints which seem unrealistic and not applicable for real-world datasets. In this paper, we provide an implementation of the private sampling algorithm and discuss the realism of its constraints in practical cases.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (8)
  1. \APACrefYearMonthDay2021. \APACrefbtitlePrivate sampling: a noiseless approach for generating differentially private synthetic data. Private sampling: a noiseless approach for generating differentially private synthetic data. \PrintBackRefs\CurrentBib
  2. \APACrefYear2022. \APACrefbtitleData Act – The path to the digital decade Data act – the path to the digital decade. \APACaddressPublisherPublications Office of the European Union. {APACrefDOI} \doidoi/10.2775/98413 \PrintBackRefs\CurrentBib
  3. \APACrefYearMonthDay2014. \BBOQ\APACrefatitleThe Algorithmic Foundations of Differential Privacy. The algorithmic foundations of differential privacy.\BBCQ \APACjournalVolNumPagesFoundations and Trends in Theoretical Computer Science93-4211-407. {APACrefURL} http://dblp.uni-trier.de/db/journals/fttcs/fttcs9.html#DworkR14 \PrintBackRefs\CurrentBib
  4. \APACinsertmetastarUCI{APACrefauthors}Frank, A.  \APACrefYearMonthDay2010. \BBOQ\APACrefatitleUCI machine learning repository Uci machine learning repository.\BBCQ \APACjournalVolNumPageshttp://archive. ics. uci. edu/ml. \PrintBackRefs\CurrentBib
  5. \APACrefYearMonthDay2018. \APACrefbtitleLOGAN: Membership Inference Attacks Against Generative Models. Logan: Membership inference attacks against generative models. \PrintBackRefs\CurrentBib
  6. \APACrefYearMonthDay2022Jun.. \BBOQ\APACrefatitleDifferentially Private Normalizing Flows for Synthetic Tabular Data Generation Differentially private normalizing flows for synthetic tabular data generation.\BBCQ \APACjournalVolNumPagesProceedings of the AAAI Conference on Artificial Intelligence3677345-7353. {APACrefURL} https://ojs.aaai.org/index.php/AAAI/article/view/20697 {APACrefDOI} \doi10.1609/aaai.v36i7.20697 \PrintBackRefs\CurrentBib
  7. \APACrefYearMonthDay2021. \APACrefbtitleWinning the NIST Contest: A scalable and general approach to differentially private synthetic data. Winning the nist contest: A scalable and general approach to differentially private synthetic data. \PrintBackRefs\CurrentBib
  8. \APACrefYearMonthDay1998. \BBOQ\APACrefatitleProtecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression.\BBCQ. {APACrefURL} https://api.semanticscholar.org/CorpusID:2181340 \PrintBackRefs\CurrentBib
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (3)
  1. Clément Pierquin (3 papers)
  2. Bastien Zimmermann (1 paper)
  3. Matthieu Boussard (5 papers)
Citations (1)

Summary

We haven't generated a summary for this paper yet.