{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T05:08:39Z","timestamp":1775538519071,"version":"3.50.1"},"reference-count":71,"publisher":"Association for Computing Machinery (ACM)","issue":"6","funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-2220433, OAC-2319988"],"award-info":[{"award-number":["CNS-2220433, OAC-2319988"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100030807","name":"Commonwealth Cyber Initiative","doi-asserted-by":"crossref","award":["cci award"],"award-info":[{"award-number":["cci award"]}],"id":[{"id":"10.13039\/100030807","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. ACM Manag. Data"],"published-print":{"date-parts":[[2025,12,4]]},"abstract":"<jats:p>Differentially private (DP) tabular data synthesis generates artificial data that preserves the statistical properties of private data while safeguarding individual privacy. The emergence of diverse algorithms in recent years has introduced challenges in practical applications, such as inconsistent data processing methods, the lack of in-depth algorithm analysis, and incomplete comparisons due to overlapping development timelines. These factors create significant obstacles to selecting appropriate algorithms. In this paper, we address these challenges by proposing a benchmark for evaluating tabular data synthesis methods. We present a unified evaluation framework that integrates data preprocessing, feature selection, and synthesis modules, facilitating fair and comprehensive comparisons. Our evaluation reveals that a significant utility-efficiency trade-off exists among current state-of-the-art methods. Some statistical methods are superior in synthesis utility, but their efficiency is not as good as most deep learning-based methods. Furthermore, we conduct an in-depth analysis of each module with experimental validation, offering theoretical insights into the strengths and limitations of different strategies. Our code is open-sourced via the link.. https:\/\/github.com\/KaiChen9909\/tab_bench<\/jats:p>","DOI":"10.1145\/3769764","type":"journal-article","created":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:32:13Z","timestamp":1764995533000},"page":"1-25","source":"Crossref","is-referenced-by-count":0,"title":["Benchmarking Differentially Private Tabular Data Synthesis: [Experiments &amp; Analysis]"],"prefix":"10.1145","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-9461-8929","authenticated-orcid":false,"given":"Kai","family":"Chen","sequence":"first","affiliation":[{"name":"University of Virginia, Charlottesville, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3722-4783","authenticated-orcid":false,"given":"Xiaochen","family":"Li","sequence":"additional","affiliation":[{"name":"UNC Greensboro, Greensboro, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6178-4118","authenticated-orcid":false,"given":"Chen","family":"Gong","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4950-1952","authenticated-orcid":false,"given":"Ryan","family":"Mckenna","sequence":"additional","affiliation":[{"name":"Google Research, Seattle, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9017-7947","authenticated-orcid":false,"given":"Tianhao","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,12,5]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2016. Higgs particle dataset. https:\/\/www.openml.org\/search?type=data&status=active&id=4532"},{"key":"e_1_2_1_2_1","unstructured":"2020. Loan dataset. https:\/\/www.kaggle.com\/datasets\/devanshi23\/loan-data-2007-2014"},{"key":"e_1_2_1_3_1","volume-title":"International Conference on Machine Learning. PMLR, 457-467","author":"Aydore Sergul","year":"2021","unstructured":"Sergul Aydore, William Brown, Michael Kearns, Krishnaram Kenthapadi, Luca Melis, Aaron Roth, and Ankit A Siva. 2021. Differentially private query release through adaptive projection. In International Conference on Machine Learning. PMLR, 457-467."},{"key":"e_1_2_1_4_1","unstructured":"Microsoft Azure. 2025. Virtual Machines Pricing. https:\/\/azure.microsoft.com\/en-us\/pricing\/details\/virtual-machines\/linux\/."},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Andr\u00e9s F. Barrientos Alexander Bolton Tom Balmat Jerome P. Reiter John M. de Figueiredo Ashwin Machanavajjhala Yan Chen Charley Kneifel and Mark DeLong. 2018. Providing Access to Confidential Research Data Through Synthesis and Verification: An Application to Data on Employees of the U.S. Federal Government. arXiv:1705.07872 [stat.AP] https:\/\/arxiv.org\/abs\/1705.07872","DOI":"10.1214\/18-AOAS1194"},{"key":"e_1_2_1_6_1","volume-title":"Gunter","author":"Bindschaedler Vincent","year":"2017","unstructured":"Vincent Bindschaedler, Reza Shokri, and Carl A. Gunter. 2017. Plausible Deniability for Privacy-Preserving Data Synthesis. arXiv:1708.07975 [cs.CR] https:\/\/arxiv.org\/abs\/1708.07975"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14778\/3476249.3476272"},{"key":"e_1_2_1_8_1","first-page":"421","article-title":"Bounding, concentrating, and truncating: Unifying privacy loss composition for data analytics. In Algorithmic Learning Theory","author":"Cesar Mark","year":"2021","unstructured":"Mark Cesar and Ryan Rogers. 2021. Bounding, concentrating, and truncating: Unifying privacy loss composition for data analytics. In Algorithmic Learning Theory. PMLR, 421-457.","journal-title":"PMLR"},{"key":"e_1_2_1_9_1","volume-title":"Introduction to multivariate analysis","author":"Chatfield Chris","unstructured":"Chris Chatfield. 2018. Introduction to multivariate analysis. Routledge."},{"key":"e_1_2_1_10_1","volume-title":"Benchmarking differentially private tabular data synthesis. arXiv preprint arXiv:2504.14061","author":"Chen Kai","year":"2025","unstructured":"Kai Chen, Xiaochen Li, Chen Gong, Ryan McKenna, and Tianhao Wang. 2025. Benchmarking differentially private tabular data synthesis. arXiv preprint arXiv:2504.14061 (2025)."},{"key":"e_1_2_1_11_1","volume-title":"Mathematical methods of statistics","author":"Cram\u00e9r Harald","unstructured":"Harald Cram\u00e9r. 1999. Mathematical methods of statistics. Vol. 9. Princeton university press."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3469830.3470893"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2218605120"},{"key":"e_1_2_1_14_1","volume-title":"Retiring Adult: New Datasets for Fair Machine Learning. Advances in Neural Information Processing Systems 34","author":"Ding Frances","year":"2021","unstructured":"Frances Ding, Moritz Hardt, John Miller, and Ludwig Schmidt. 2021. Retiring Adult: New Datasets for Fair Machine Learning. Advances in Neural Information Processing Systems 34 (2021)."},{"key":"e_1_2_1_15_1","unstructured":"Tim Dockhorn Tianshi Cao Arash Vahdat and Karsten Kreis. 2023. Differentially Private Diffusion Models. arXiv:2210.09929 [stat.ML] https:\/\/arxiv.org\/abs\/2210.09929"},{"key":"e_1_2_1_16_1","volume-title":"Towards principled assessment of tabular data synthesis algorithms. arXiv preprint arXiv:2402.06806","author":"Du Yuntao","year":"2024","unstructured":"Yuntao Du and Ninghui Li. 2024. Towards principled assessment of tabular data synthesis algorithms. arXiv preprint arXiv:2402.06806 (2024)."},{"key":"e_1_2_1_17_1","volume-title":"The AAAI Workshop on Privacy-Preserving Artificial Intelligence","volume":"8","author":"Fan Liyue","year":"2020","unstructured":"Liyue Fan. 2020. A survey of differentially private generative adversarial networks. In The AAAI Workshop on Privacy-Preserving Artificial Intelligence, Vol. 8."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-09342-5_17"},{"key":"e_1_2_1_19_1","volume-title":"Justin Hsu, Aaron Roth, and Zhiwei Steven Wu.","author":"Gaboardi Marco","year":"2015","unstructured":"Marco Gaboardi, Emilio Jes\u00fas Gallego Arias, Justin Hsu, Aaron Roth, and Zhiwei Steven Wu. 2015. Dual Query: Practical Private Query Release for High Dimensional Data. arXiv:1402.1526 [cs.DS] https:\/\/arxiv.org\/abs\/1402.1526"},{"key":"e_1_2_1_20_1","volume-title":"Sofiane Mahiou, and Emiliano De Cristofaro.","author":"Ganev Georgi","year":"2025","unstructured":"Georgi Ganev, Meenatchi Sundaram Muthu Selva Annamalai, Sofiane Mahiou, and Emiliano De Cristofaro. 2025. The Importance of Being Discrete: Measuring the Impact of Discretization in End-to-End Differentially Private Synthetic Data. arXiv:2504.06923 [cs.CR] https:\/\/arxiv.org\/abs\/2504.06923"},{"key":"e_1_2_1_21_1","volume-title":"DPImageBench: A Unified Benchmark for Differentially Private Image Synthesis. arXiv preprint arXiv:2503.14681","author":"Gong Chen","year":"2025","unstructured":"Chen Gong, Kecen Li, Zinan Lin, and Tianhao Wang. 2025. DPImageBench: A Unified Benchmark for Differentially Private Image Synthesis. arXiv preprint arXiv:2503.14681 (2025)."},{"key":"e_1_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Chen Gong Kecen Li Zinan Lin and Tianhao Wang. 2025. DPImageBench: A Unified Benchmark for Differentially Private Image Synthesis. arXiv:2503.14681 [cs.CR] https:\/\/arxiv.org\/abs\/2503.14681","DOI":"10.1145\/3719027.3765045"},{"key":"e_1_2_1_23_1","volume-title":"International conference on artificial intelligence and statistics. PMLR","author":"Harder Frederik","year":"2021","unstructured":"Frederik Harder, Kamil Adamczewski, and Mijung Park. 2021. Dp-merf: Differentially private mean embeddings with randomfeatures for practical privacy-preserving data generation. In International conference on artificial intelligence and statistics. PMLR, 1819-1827."},{"key":"e_1_2_1_24_1","volume-title":"A simple and practical algorithm for differentially private data release. Advances in neural information processing systems 25","author":"Hardt Moritz","year":"2012","unstructured":"Moritz Hardt, Katrina Ligett, and Frank McSherry. 2012. A simple and practical algorithm for differentially private data release. Advances in neural information processing systems 25 (2012)."},{"key":"e_1_2_1_25_1","first-page":"61","article-title":"A multiplicative weights mechanism for privacy-preserving data analysis. In 2010 IEEE 51st annual symposium on foundations of computer science","author":"Hardt Moritz","year":"2010","unstructured":"Moritz Hardt and Guy N Rothblum. 2010. A multiplicative weights mechanism for privacy-preserving data analysis. In 2010 IEEE 51st annual symposium on foundations of computer science. IEEE, 61-70.","journal-title":"IEEE"},{"key":"e_1_2_1_26_1","volume-title":"Chang Ge, Bolin Ding, David Forsyth, Bo Li, and Dawn Song.","author":"Hu Yuzheng","year":"2023","unstructured":"Yuzheng Hu, FanWu, Qinbin Li, Yunhui Long, Gonzalo Munilla Garrido, Chang Ge, Bolin Ding, David Forsyth, Bo Li, and Dawn Song. 2023. SoK: Privacy-Preserving Data Synthesis. arXiv:2307.02106 [cs.CR] https:\/\/arxiv.org\/abs\/2307.02106"},{"key":"e_1_2_1_27_1","volume-title":"IPUMS: Integrated Public Use Microdata Series. https:\/\/www.ipums.org\/. https:\/\/www.ipums.org\/","author":"IPUMS.","year":"2025","unstructured":"IPUMS. 2025. IPUMS: Integrated Public Use Microdata Series. https:\/\/www.ipums.org\/. https:\/\/www.ipums.org\/"},{"key":"e_1_2_1_28_1","volume-title":"International conference on learning representations.","author":"Jordon James","year":"2018","unstructured":"James Jordon, Jinsung Yoon, and Mihaela Van Der Schaar. 2018. PATE-GAN: Generating synthetic data with differential privacy guarantees. In International conference on learning representations."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2004.10.016"},{"key":"e_1_2_1_30_1","volume-title":"Farkhund Iqbal, Khalil Al-Hussaeni, and Mohammed Hussain.","author":"Khokhar Rashid Hussain","year":"2023","unstructured":"Rashid Hussain Khokhar, Benjamin CM Fung, Farkhund Iqbal, Khalil Al-Hussaeni, and Mohammed Hussain. 2023. Differentially private release of heterogeneous network for managing healthcare data. ACM Transactions on Knowledge Discovery from Data 17, 6 (2023), 1-30."},{"key":"e_1_2_1_31_1","volume-title":"International Conference on Machine Learning. PMLR, 17564-17579","author":"Kotelnikov Akim","year":"2023","unstructured":"Akim Kotelnikov, Dmitry Baranchuk, Ivan Rubachev, and Artem Babenko. 2023. Tabddpm: Modelling tabular data with diffusion models. In International Conference on Machine Learning. PMLR, 17564-17579."},{"key":"e_1_2_1_32_1","volume-title":"On information and sufficiency. The annals of mathematical statistics 22, 1","author":"Kullback Solomon","year":"1951","unstructured":"Solomon Kullback and Richard A Leibler. 1951. On information and sufficiency. The annals of mathematical statistics 22, 1 (1951), 79-86."},{"key":"e_1_2_1_33_1","volume-title":"International conference on extending database technology","volume":"2014","author":"Li Haoran","year":"2014","unstructured":"Haoran Li, Li Xiong, and Xiaoqian Jiang. 2014. Differentially private synthesization of multi-dimensional data using copula functions. In Advances in database technology: proceedings. International conference on extending database technology, Vol. 2014. NIH Public Access, 475."},{"key":"e_1_2_1_34_1","first-page":"4837","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Li Kecen","year":"2024","unstructured":"Kecen Li, Chen Gong, Zhixiang Li, Yuzhong Zhao, Xinwen Hou, and Tianhao Wang. 2024. {PrivImage}: Differentially Private Synthetic Image Generation using Diffusion Models with {Semantic-Aware} Pretraining. In 33rd USENIX Security Symposium (USENIX Security 24). 4837-4854."},{"key":"e_1_2_1_35_1","unstructured":"Ninghui Li Zhikun Zhang and Tianhao Wang. 2021. DPSyn: Experiences in the NIST Differential Privacy Data Synthesis Challenges. arXiv:2106.12949 [cs.CR] https:\/\/arxiv.org\/abs\/2106.12949"},{"key":"e_1_2_1_36_1","volume-title":"International Conference on Machine Learning. PMLR, 22009-22027","author":"Liu Terrance","year":"2023","unstructured":"Terrance Liu, Jingwu Tang, Giuseppe Vietri, and Steven Wu. 2023. Generating private synthetic data with genetic algorithms. In International Conference on Machine Learning. PMLR, 22009-22027."},{"key":"e_1_2_1_37_1","first-page":"690","article-title":"Iterative methods for private synthetic data: Unifying framework and new methods","volume":"34","author":"Liu Terrance","year":"2021","unstructured":"Terrance Liu, Giuseppe Vietri, and Steven ZWu. 2021. Iterative methods for private synthetic data: Unifying framework and new methods. Advances in Neural Information Processing Systems 34 (2021), 690-702.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14778\/3231751.3231769"},{"key":"e_1_2_1_39_1","volume-title":"Winning the NIST Contest: A scalable and general approach to differentially private synthetic data. arXiv preprint arXiv:2108.04978","author":"McKenna Ryan","year":"2021","unstructured":"Ryan McKenna, Gerome Miklau, and Daniel Sheldon. 2021. Winning the NIST Contest: A scalable and general approach to differentially private synthetic data. arXiv preprint arXiv:2108.04978 (2021)."},{"key":"e_1_2_1_40_1","volume-title":"Aim: An adaptive and iterative mechanism for differentially private synthetic data. arXiv preprint arXiv:2201.12677","author":"McKenna Ryan","year":"2022","unstructured":"Ryan McKenna, Brett Mullins, Daniel Sheldon, and Gerome Miklau. 2022. Aim: An adaptive and iterative mechanism for differentially private synthetic data. arXiv preprint arXiv:2201.12677 (2022)."},{"key":"e_1_2_1_41_1","volume-title":"International Conference on Machine Learning. PMLR, 4435-4444","author":"McKenna Ryan","year":"2019","unstructured":"Ryan McKenna, Daniel Sheldon, and Gerome Miklau. 2019. Graphical-model based estimation and inference for differential privacy. In International Conference on Machine Learning. PMLR, 4435-4444."},{"key":"e_1_2_1_42_1","first-page":"263","article-title":"R\u00e9nyi differential privacy. In 2017 IEEE 30th computer security foundations symposium (CSF)","author":"Mironov Ilya","year":"2017","unstructured":"Ilya Mironov. 2017. R\u00e9nyi differential privacy. In 2017 IEEE 30th computer security foundations symposium (CSF). IEEE, 263-275.","journal-title":"IEEE"},{"key":"e_1_2_1_43_1","volume-title":"R'enyi differential privacy of the sampled gaussian mechanism. arXiv preprint arXiv:1908.10530","author":"Mironov Ilya","year":"2019","unstructured":"Ilya Mironov, Kunal Talwar, and Li Zhang. 2019. R'enyi differential privacy of the sampled gaussian mechanism. arXiv preprint arXiv:1908.10530 (2019)."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","unstructured":"S. Moro P. Rita and P. Cortez. 2014. Bank Marketing. UCI Machine Learning Repository. DOI: https:\/\/doi.org\/10.24432\/C5K306.","DOI":"10.24432\/C5K306"},{"key":"e_1_2_1_45_1","unstructured":"Seth Neel Aaron Roth and Zhiwei Steven Wu. 2018. How to Use Heuristics for Differential Privacy. arXiv:1811.07765 [cs.LG] https:\/\/arxiv.org\/abs\/1811.07765"},{"key":"e_1_2_1_46_1","unstructured":"NIST. 2018. 2018 Differential Privacy Synthetic Data Challenge. Available at https:\/\/www.nist.gov\/ctl\/pscr\/openinnovation- prize-challenges\/past-prize-challenges\/2018-differential-privacy-synthetic."},{"key":"e_1_2_1_47_1","unstructured":"NIST. 2020. 2020 Differential Privacy Temporal Map Challenge. Available at https:\/\/www.nist.gov\/ctl\/pscr\/openinnovation- prize-challenges\/past-prize-challenges\/2020-differential-privacy-temporal."},{"key":"e_1_2_1_48_1","volume-title":"ClavaDDPM: Multi-relational Data Synthesis with Cluster-guided Diffusion Models. arXiv preprint arXiv:2405.17724","author":"Pang Wei","year":"2024","unstructured":"Wei Pang, Masoumeh Shafieinejad, Lucy Liu, and Xi He. 2024. ClavaDDPM: Multi-relational Data Synthesis with Cluster-guided Diffusion Models. arXiv preprint arXiv:2405.17724 (2024)."},{"key":"e_1_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Gabriel Peyr\u00e9 Marco Cuturi et al. 2019. Computational optimal transport: With applications to data science. Foundations and Trends\u00ae in Machine Learning 11 5-6 (2019) 355-607.","DOI":"10.1561\/2200000073"},{"key":"e_1_2_1_50_1","unstructured":"Google Cloud Platform. 2025. Google Cloud Compute Engine Pricing. https:\/\/cloud.google.com\/compute\/all-pricing."},{"key":"e_1_2_1_51_1","unstructured":"Runpod. 2025. RTX 6000 Ada Generation Pricing. https:\/\/www.runpod.io\/gpu-models\/rtx-6000-ada."},{"key":"e_1_2_1_52_1","unstructured":"Alexandre Sablayrolles Yue Wang and Brian Karrer. 2023. Privately generating tabular data using language models. arXiv:2306.04803 [cs.LG] https:\/\/arxiv.org\/abs\/2306.04803"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/1206212X.2021.2024958"},{"key":"e_1_2_1_54_1","unstructured":"Amazon Web Services. 2025. EC2 On-Demand Pricing. https:\/\/aws.amazon.com\/cn\/ec2\/pricing\/on-demand\/."},{"key":"e_1_2_1_55_1","unstructured":"Mani Srivastava and Moustafa Alzantot. 2019. Differentially Private Dataset Release using Wasserstein GANs. https:\/\/github.com\/nesl\/nist_differential_privacy_synthetic_data_challenge. Accessed 2023-xx-xx."},{"key":"e_1_2_1_56_1","unstructured":"Theresa Stadler Bristena Oprisanu and Carmela Troncoso. 2022. Synthetic Data - Anonymisation Groundhog Day. arXiv:2011.07018 [cs.LG] https:\/\/arxiv.org\/abs\/2011.07018"},{"key":"e_1_2_1_57_1","volume-title":"Deep Neuroevolution: Genetic Algorithms Are a Competitive Alternative for Training Deep Neural Networks for Reinforcement Learning. arXiv:1712.06567 [cs.NE] https:\/\/arxiv.org\/abs\/1712.06567","author":"Such Felipe Petroski","year":"2018","unstructured":"Felipe Petroski Such, Vashisht Madhavan, Edoardo Conti, Joel Lehman, Kenneth O. Stanley, and Jeff Clune. 2018. Deep Neuroevolution: Genetic Algorithms Are a Competitive Alternative for Training Deep Neural Networks for Reinforcement Learning. arXiv:1712.06567 [cs.NE] https:\/\/arxiv.org\/abs\/1712.06567"},{"key":"e_1_2_1_58_1","first-page":"845","article-title":"Online non-convex learning: Following the perturbed leader is optimal. In Algorithmic Learning Theory","author":"Suggala Arun Sai","year":"2020","unstructured":"Arun Sai Suggala and Praneeth Netrapalli. 2020. Online non-convex learning: Following the perturbed leader is optimal. In Algorithmic Learning Theory. PMLR, 845-861.","journal-title":"PMLR"},{"key":"e_1_2_1_59_1","volume-title":"International Conference on Machine Learning. PMLR, 2159-2168","author":"Syrgkanis Vasilis","year":"2016","unstructured":"Vasilis Syrgkanis, Akshay Krishnamurthy, and Robert Schapire. 2016. Efficient algorithms for adversarial contextual learning. In International Conference on Machine Learning. PMLR, 2159-2168."},{"key":"e_1_2_1_60_1","unstructured":"Yuchao Tao Ryan McKenna Michael Hay Ashwin Machanavajjhala and Gerome Miklau. 2022. Benchmarking Differentially Private Synthetic Data Generation Algorithms. arXiv:2112.09238 [cs.CR] https:\/\/arxiv.org\/abs\/2112.09238"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00018"},{"key":"e_1_2_1_62_1","volume-title":"Differentially Private Tabular Data Synthesis using Large Language Models. arXiv preprint arXiv:2406.01457","author":"Tran Toan V","year":"2024","unstructured":"Toan V Tran and Li Xiong. 2024. Differentially Private Tabular Data Synthesis using Large Language Models. arXiv preprint arXiv:2406.01457 (2024)."},{"key":"e_1_2_1_63_1","article-title":"Visualizing data using t-SNE","volume":"9","author":"der Maaten Laurens Van","year":"2008","unstructured":"Laurens Van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research 9, 11 (2008).","journal-title":"Journal of machine learning research"},{"key":"e_1_2_1_64_1","first-page":"18282","article-title":"Private synthetic data for multitask learning and marginal queries","volume":"35","author":"Vietri Giuseppe","year":"2022","unstructured":"Giuseppe Vietri, Cedric Archambeau, Sergul Aydore, William Brown, Michael Kearns, Aaron Roth, Ankit Siva, Shuai Tang, and Steven Z Wu. 2022. Private synthetic data for multitask learning and marginal queries. Advances in Neural Information Processing Systems 35 (2022), 18282-18295.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_2_1_65_1","unstructured":"Giuseppe Vietri Grace Tian Mark Bun Thomas Steinke and Zhiwei StevenWu. 2020. New Oracle-Efficient Algorithms for Private Synthetic Data Release. arXiv:2007.05453 [cs.LG] https:\/\/arxiv.org\/abs\/2007.05453"},{"key":"e_1_2_1_66_1","volume-title":"Differentially private generative adversarial network. arXiv preprint arXiv:1802.06739","author":"Xie Liyang","year":"2018","unstructured":"Liyang Xie, Kaixiang Lin, Shu Wang, Fei Wang, and Jiayu Zhou. 2018. Differentially private generative adversarial network. arXiv preprint arXiv:1802.06739 (2018)."},{"key":"e_1_2_1_67_1","volume-title":"Tabular Data Synthesis with Differential Privacy: A Survey. arXiv preprint arXiv:2411.03351","author":"Yang Mengmeng","year":"2024","unstructured":"Mengmeng Yang, Chi-Hung Chi, Kwok-Yan Lam, Jie Feng, Taolin Guo, and Wei Ni. 2024. Tabular Data Synthesis with Differential Privacy: A Survey. arXiv preprint arXiv:2411.03351 (2024)."},{"key":"e_1_2_1_68_1","volume-title":"Opacus: User-Friendly Differential Privacy Library in PyTorch. arXiv preprint arXiv:2109.12298","author":"Yousefpour Ashkan","year":"2021","unstructured":"Ashkan Yousefpour, Igor Shilov, Alexandre Sablayrolles, Davide Testuggine, Karthik Prasad, Mani Malek, John Nguyen, Sayan Ghosh, Akash Bharadwaj, Jessica Zhao, Graham Cormode, and Ilya Mironov. 2021. Opacus: User-Friendly Differential Privacy Library in PyTorch. arXiv preprint arXiv:2109.12298 (2021)."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134428"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882928"},{"key":"e_1_2_1_71_1","first-page":"929","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Zhang Zhikun","year":"2021","unstructured":"Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, and Yang Zhang. 2021. {PrivSyn}: Differentially private data synthesis. In 30th USENIX Security Symposium (USENIX Security 21). 929-946."}],"container-title":["Proceedings of the ACM on Management of Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3769764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T04:26:06Z","timestamp":1775535966000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3769764"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,4]]},"references-count":71,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,12,4]]}},"alternative-id":["10.1145\/3769764"],"URL":"https:\/\/doi.org\/10.1145\/3769764","relation":{},"ISSN":["2836-6573"],"issn-type":[{"value":"2836-6573","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,4]]}}}