2025-08-10
DP-TLDM: Differentially Private Tabular Latent Diffusion Model
Publication
Publication
Synthetic data from generative models emerges as the privacy-preserving data sharing solution. Such a synthetic data set shall resemble the original data without revealing identifiable private information. Till date, the prior focus on limited types of tabular synthesizers and small number of privacy attacks, particularly on Generative Adversarial Networks, and overlooks membership inference attacks and defense strategies, i.e., differential privacy. Motivated by the conundrum of keeping high data quality and low privacy risk of synthetic data tables, we propose DP-TLDM, Differentially Private Tabular Latent Diffusion Model, which is composed of an autoencoder network to encode the tabular data and a latent diffusion model to synthesize the latent tables. Following the emerging f-DP framework, we apply DP-SGD to train the auto-encoder in combination with batch clipping and use the separation value as the privacy metric to better capture the privacy gain from DP algorithms. Our empirical evaluation demonstrates that DP-TLDM is capable of achieving a meaningful theoretical privacy guarantee while also significantly enhancing the utility of synthetic data. Specifically, compared to other DP-protected tabular generative models, DP-TLDM improves the synthetic quality by an average of 35% in data resemblance, 15% in the utility for downstream tasks, and 50% in data discriminability, all while preserving a comparable level of privacy risk.
| Additional Metadata | |
|---|---|
| , , | |
| doi.org/10.1007/978-3-032-00624-0_17 | |
| Lecture Notes in Computer Science/Lecture Notes in Artificial Intelligence | |
| International Conference on Availability, Reliability and Security, 2025 | |
| Organisation | Centrum Wiskunde & Informatica, Amsterdam (CWI), The Netherlands |
|
Zhu, C. (Chaoyi), Tang, J. (Jiayi), Pérez, J.F. (Juan F.), van Dijk, M., & Chen, L.Y. (Lydia Y.). (2025). DP-TLDM: Differentially Private Tabular Latent Diffusion Model. In Proceedings of the International Conference on Availability, Reliability and Security. doi:10.1007/978-3-032-00624-0_17 |
|