pith. sign in

arxiv: 2605.17432 · v1 · pith:YSESX7FOnew · submitted 2026-05-17 · 💻 cs.LG · cs.CR

DP-SelFT: Differentially Private Selective Fine-Tuning for Large Language Models

Pith reviewed 2026-05-20 13:30 UTC · model grok-4.3

classification 💻 cs.LG cs.CR
keywords differential privacyfine-tuninglarge language modelsselective updatesprivacy-utility tradeoffsynthetic datalayer selectiongradient noise
0
0 comments X

The pith

Selective layer fine-tuning chosen on a DP synthetic dataset improves utility under the same privacy budget for large language models.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper establishes that differentially private fine-tuning of large language models can avoid much of its usual utility loss by updating only a carefully chosen subset of layers rather than all parameters. Selection happens entirely on a lightweight DP synthetic dataset that incurs no extra privacy cost, with temporary training runs that inject worst-case perturbations scaled exactly to the noise level of the final private updates. This produces layer choices that remain stable and effective once real private training with clipping and noise begins. A sympathetic reader would care because the approach keeps formal privacy guarantees fixed while raising downstream task performance above standard DP baselines.

Core claim

DP-SelFT first builds a DP synthetic dataset, then evaluates candidate layer subsets by temporarily training each on a synthetic training split and scoring them on a synthetic validation split under perturbation magnitudes matched to the downstream DP noise. The best subset is retained for the actual private fine-tuning on real data. Because the entire selection stage uses only the synthetic data, it consumes none of the privacy budget; the matched worst-case perturbations ensure the chosen layers tolerate the clipping and noise that will appear in the real run.

What carries the argument

Layer-level selection performed on a DP synthetic dataset via temporary training under worst-case perturbations whose scale matches the noise of the final private fine-tuning step.

If this is right

  • For any fixed privacy budget the resulting model reaches higher accuracy on benchmark tasks than full-parameter DP fine-tuning or existing DP-LoRA baselines.
  • The selection stage adds no privacy cost because it runs exclusively on the synthetic dataset.
  • Chosen layers remain useful after gradient clipping and noise addition because the temporary training already simulates those effects.
  • The method can be combined with existing parameter-efficient techniques without changing the privacy accounting.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • The same synthetic-data selection idea could be tested on vision or multimodal models where full fine-tuning is also expensive.
  • If the selected layers turn out to be consistent across tasks, the approach might allow pre-computing reusable layer masks that further reduce per-task compute.
  • Extending the perturbation matching to other DP mechanisms such as DP-SGD variants could broaden applicability.

Load-bearing premise

Layer subsets that perform well in temporary training on synthetic data with matched worst-case perturbations will remain the best choices when the same selection is applied to real private data.

What would settle it

On a real downstream dataset, private fine-tuning with the DP-SelFT selected layers produces no higher accuracy than private fine-tuning with randomly chosen layers or with all layers, under identical privacy parameters.

Figures

Figures reproduced from arXiv: 2605.17432 by Haichao Sha, Hong Chen, Wei Dong, Yuncheng Wu, Zihao Wang.

Figure 1
Figure 1. Figure 1: Overview of DP-SelFT. We construct the synthetic dataset in two stages. Let Dpri = {(𝑥𝑖 , 𝑦𝑖)}𝑛 𝑖=1 denote the private dataset. We first generate an unla￾beled candidate pool C = {𝑥˜𝑗 } 𝑚 𝑗=1 (4) using a remote commercial API queried with a task-level prompt template 𝜋. Here, 𝜋 captures only the high-level task semantics (e.g., review writing or question answering) and contains no private examples or datas… view at source ↗
Figure 2
Figure 2. Figure 2: Impact of Top-𝑘 on MNLI under 𝜀 = 5 and RoBERTa￾Large. Left: comparison between DP-SFT and DP Full Parame￾ter. Right: comparison between DP-SFT+LoRA and DP-LoRA. selection because validation loss and validation accuracy respond differently to DP-induced perturbations. Loss is sensitive to con￾fidence calibration and probability margins over all classes, even when the predicted label does not change. As a r… view at source ↗
Figure 6
Figure 6. Figure 6: Prompt template for SST-5 paraphrasing. Prompt Template for MNLI Synthetic Data Generation Generate a premise-hypothesis sentence pair for the MultiNLI task. entailment: the hypothesis is definitely true given the premise. neutral: the hypothesis may or may not be true given the premise. contradiction: the hypothesis is definitely false given the premise. Output ONLY the premise and hypothesis separated by… view at source ↗
Figure 4
Figure 4. Figure 4: Prompt template for SST-2 paraphrasing. Prompt Template for SST-5 Synthetic Data Generation Generate a short movie review snippet in the style of the SST-5 dataset. Snippets are concise opinionated fragments (5-25 words) taken from real movie reviews. The sentiment must be one of five categories: very negative, negative, neutral, positive, or very positive [PITH_FULL_IMAGE:figures/full_fig_p016_4.png] view at source ↗
Figure 5
Figure 5. Figure 5: Prompt template for SST-5 synthetic data genera [PITH_FULL_IMAGE:figures/full_fig_p016_5.png] view at source ↗
Figure 9
Figure 9. Figure 9: Prompt template for QQP synthetic data generation. [PITH_FULL_IMAGE:figures/full_fig_p017_9.png] view at source ↗
Figure 10
Figure 10. Figure 10: Prompt template for QQP paraphrasing. the method is reasonably stable across a range of 𝑘 values, auto￾matically determining an appropriate selection budget would make the framework more practical and easier to deploy. Future work may explore adaptive or data-dependent strategies for selecting 𝑘 under privacy constraints. Second, our approach assumes that the remote API can generate task-relevant candidat… view at source ↗
read the original abstract

Large language models (LLMs) are commonly adapted to downstream tasks through fine-tuning, but fine-tuning data often contains sensitive information that may be leaked by the resulting model. Differential privacy (DP) offers formal protection against such leakage, yet DP fine-tuning of LLMs still suffers from substantial utility degradation due to gradient clipping and noise injection. Existing work improves this trade-off by combining DP with parameter-efficient fine-tuning methods such as LoRA, which constrain the form of updates. In this work, we study a complementary direction: selective fine-tuning, which constrains where updates are applied. We propose DP-SelFT, a framework for differentially private selective fine-tuning of LLMs. DP-SelFT addresses three DP-specific challenges in parameter selection: avoiding repeated privacy cost, improving stability under noisy estimates, and selecting parameters that remain useful under clipped and noisy updates. It first constructs a lightweight DP synthetic dataset and performs selection only on this synthetic data, so the selection stage incurs no additional privacy cost. It then conducts layer-level selection by temporarily training candidate layer subsets on a synthetic training split and evaluating them on a synthetic validation split. Crucially, this temporary training is performed under a perturbation regime matched to downstream DP fine-tuning, with worst-case perturbations of the same scale as DP noise. This favors layer subsets that are not only learnable but also robust to noisy private updates. Experiments on benchmark tasks show that DP-SelFT consistently improves the privacy--utility trade-off over existing DP fine-tuning baselines under the same privacy guarantees.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 2 minor

Summary. The paper proposes DP-SelFT, a framework for differentially private selective fine-tuning of large language models. It constructs a lightweight DP synthetic dataset on which layer-level selection is performed by temporarily training candidate layer subsets on a synthetic training split and evaluating on a synthetic validation split. This temporary training uses a perturbation regime with worst-case perturbations matched in scale to the downstream DP noise. The selection incurs no additional privacy cost due to the use of synthetic data. The authors claim that experiments on benchmark tasks show DP-SelFT consistently improves the privacy-utility trade-off over existing DP fine-tuning baselines under identical privacy guarantees.

Significance. If the synthetic-to-real transfer of selected layers holds, the method offers a useful complement to parameter-efficient techniques such as LoRA by focusing updates on layers that remain effective under clipping and noise. The design choice to match perturbation regimes during selection is a clear strength that directly targets DP-specific robustness. The approach avoids extra privacy expenditure for selection, which is a practical advantage. The manuscript provides a coherent description of the three DP-specific challenges it addresses.

major comments (2)
  1. [§3] §3 (Method): The central claim depends on the assumption that layer subsets chosen by temporary training on the DP synthetic dataset under matched worst-case perturbations remain effective when the actual DP fine-tuning is performed on real private data. No analysis of gradient statistics, feature scale, or noise interaction differences between synthetic and real data is provided, and no quantitative validation (e.g., overlap between synthetic-selected and oracle real-selected layers) is reported.
  2. [§4] §4 (Experiments): The reported improvements over baselines are not accompanied by ablations that isolate the contribution of the selection procedure or that test sensitivity to mismatches between the synthetic data distribution and the downstream task, leaving the load-bearing transfer assumption untested.
minor comments (2)
  1. [Abstract] Abstract: The phrase 'benchmark tasks' is used without naming the specific datasets or tasks, which would aid immediate assessment of scope.
  2. [§3] Notation: The description of the 'perturbation regime matched to downstream DP fine-tuning' would benefit from an explicit equation or pseudocode showing how the worst-case perturbation scale is computed and applied during the temporary training step.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for the constructive feedback and positive assessment of the work's significance. We address each major comment below and describe the revisions we will make to strengthen the manuscript.

read point-by-point responses
  1. Referee: [§3] §3 (Method): The central claim depends on the assumption that layer subsets chosen by temporary training on the DP synthetic dataset under matched worst-case perturbations remain effective when the actual DP fine-tuning is performed on real private data. No analysis of gradient statistics, feature scale, or noise interaction differences between synthetic and real data is provided, and no quantitative validation (e.g., overlap between synthetic-selected and oracle real-selected layers) is reported.

    Authors: We agree that direct quantitative validation such as layer overlap with an oracle selection performed on real data would provide stronger support for the transfer assumption. However, constructing such an oracle would require non-private access to the real data, which is incompatible with the DP setting. The matched perturbation regime during selection is specifically designed to simulate the noise and clipping conditions of downstream DP fine-tuning, thereby favoring robust layers even if gradient statistics differ. In the revised manuscript we will add a new paragraph in §3 discussing expected differences in gradient norms and feature scales between the DP synthetic data and real data, supported by non-private auxiliary experiments on public proxies. We will also report the stability of selected layers across multiple synthetic data realizations. revision: yes

  2. Referee: [§4] §4 (Experiments): The reported improvements over baselines are not accompanied by ablations that isolate the contribution of the selection procedure or that test sensitivity to mismatches between the synthetic data distribution and the downstream task, leaving the load-bearing transfer assumption untested.

    Authors: We acknowledge that isolating the selection procedure and testing robustness to synthetic-real distribution mismatch would strengthen the experimental section. In the revised version we will add an ablation that compares DP-SelFT against (i) full-layer DP fine-tuning and (ii) random layer selection, all under identical privacy budgets and perturbation scales. We will also include results using synthetic datasets generated at different privacy levels (higher and lower ε) and with an alternative synthesis method to quantify sensitivity to distribution mismatch. These additions will directly test the transfer assumption. revision: yes

Circularity Check

0 steps flagged

No circularity detected in DP-SelFT derivation or claims

full rationale

The paper presents a practical method for layer selection in DP fine-tuning that constructs a lightweight DP synthetic dataset and performs temporary training under a matched perturbation regime to choose subsets robust to noise. This procedure is justified by standard differential privacy composition (selection on synthetic data incurs no extra privacy cost) and does not reduce any claimed result to its inputs by definition, fitted parameters renamed as predictions, or self-citation chains. No equations or uniqueness theorems are invoked that collapse the selection criterion to the downstream data or prior author work; the experimental improvements are presented as empirical outcomes on benchmarks rather than tautological consequences of the construction. The approach is self-contained against external DP baselines.

Axiom & Free-Parameter Ledger

0 free parameters · 0 axioms · 0 invented entities

Abstract-only review provides no explicit free parameters, axioms, or invented entities; the approach relies on standard differential privacy definitions and the unstated assumption that synthetic data can proxy real data for selection purposes.

pith-pipeline@v0.9.0 · 5818 in / 1120 out tokens · 52773 ms · 2026-05-20T13:30:21.678772+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Lean theorems connected to this paper

Citations machine-checked in the Pith Canon. Every link opens the source theorem in the public Lean library.

  • IndisputableMonolith/Cost/FunctionalEquation.lean washburn_uniqueness_aczel unclear
    ?
    unclear

    Relation between the paper passage and the cited Recognition theorem.

    DP-SelFT performs layer-level selection by temporarily training candidate layer subsets on a synthetic training split and evaluating them on a synthetic validation split under a perturbation regime matched to downstream DP fine-tuning, with worst-case perturbations of the same scale as DP noise.

  • IndisputableMonolith/Foundation/RealityFromDistinction.lean reality_from_one_distinction unclear
    ?
    unclear

    Relation between the paper passage and the cited Recognition theorem.

    Theorem 1 decomposes the effect of a noisy private update into a descent term and a perturbation-induced error term... dΛσ²C² captures the DP noise damage, which decreases with the number of trainable parameters.

What do these tags mean?
matches
The paper's claim is directly supported by a theorem in the formal canon.
supports
The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
extends
The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
uses
The paper appears to rely on the theorem as machinery.
contradicts
The paper's claim conflicts with a theorem or certificate in the canon.
unclear
Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.

Reference graph

Works this paper leans on

51 extracted references · 51 canonical work pages · 5 internal anchors

  1. [1]

    Martin Abadi, Andy Chu, Ian Goodfellow, H Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. 2016. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. 308–318

  2. [2]

    Accountability Act. 1996. Health insurance portability and accountability act of 1996.Public law104 (1996), 191

  3. [3]

    Rohan Anil, Badih Ghazi, Vineet Gupta, Ravi Kumar, and Pasin Manurangsi

  4. [4]

    InFindings of the Association for Computational Linguistics: EMNLP 2022

    Large-scale differentially private BERT. InFindings of the Association for Computational Linguistics: EMNLP 2022. 6481–6491

  5. [5]

    Daniel Cer, Mona Diab, Eneko Agirre, Inigo Lopez-Gazpio, and Lucia Specia. 2017. SemEval-2017 task 1: Semantic textual similarity multilingual and crosslingual focused evaluation. InProceedings of the 11th international workshop on semantic evaluation (SemEval-2017). 1–14

  6. [6]

    Linkang Du, Zhikun Zhang, Shaojie Bai, Changchang Liu, Shouling Ji, Peng Cheng, and Jiming Chen. 2021. AHEAD: adaptive hierarchical decomposition for range query under local differential privacy. InProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. 1266–1288

  7. [7]

    Yuntao Du, Yujia Hu, Zhikun Zhang, Ziquan Fang, Lu Chen, Baihua Zheng, and Yunjun Gao. 2023. Ldptrace: Locally differentially private trajectory synthesis. arXiv preprint arXiv:2302.06180(2023)

  8. [8]

    Cynthia Dwork. 2008. Differential privacy: A survey of results. InInternational conference on theory and applications of models of computation. Springer, 1–19

  9. [9]

    Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Cali- brating noise to sensitivity in private data analysis. InTheory of cryptography conference. Springer, 265–284

  10. [10]

    Cynthia Dwork and Aaron Roth. 2014. The algorithmic foundations of differential privacy.Foundations and trends®in theoretical computer science9, 3-4 (2014), 211–487

  11. [11]

    Badih Ghazi, Noah Golowich, Ravi Kumar, Pasin Manurangsi, and Chiyuan Zhang. 2021. Deep learning with label differential privacy.Advances in neural information processing systems34 (2021), 27131–27145

  12. [12]

    Haoyu He, Jianfei Cai, Jing Zhang, Dacheng Tao, and Bohan Zhuang. 2023. Sensitivity-aware visual parameter-efficient fine-tuning. InProceedings of the IEEE/CVF international conference on computer vision. 11825–11835

  13. [13]

    Sanghyun Hong, Pietro Frigo, Yiğitcan Kaya, Cristiano Giuffrida, and Tudor Dumitras,. 2019. Terminal brain damage: Exposing the graceless degradation in deep neural networks under hardware fault attacks. In28th USENIX Security Symposium (USENIX Security 19). 497–514

  14. [14]

    Neil Houlsby, Andrei Giurgiu, Stanislaw Jastrzebski, Bruna Morrone, Quentin De Laroussilhe, Andrea Gesmundo, Mona Attariyan, and Sylvain Gelly. 2019. Parameter-efficient transfer learning for NLP. InInternational conference on machine learning. PMLR, 2790–2799

  15. [15]

    Edward J Hu, Yelong Shen, Phillip Wallis, Zeyuan Allen-Zhu, Yuanzhi Li, Shean Wang, Liang Wang, Weizhu Chen, et al. 2022. Lora: Low-rank adaptation of large language models.Iclr1, 2 (2022), 3

  16. [16]

    Rabeeh Karimi Mahabadi, James Henderson, and Sebastian Ruder. 2021. Com- pacter: Efficient low-rank hypercomplex adapter layers.Advances in neural information processing systems34 (2021), 1022–1035

  17. [17]

    Alexey Kurakin, Natalia Ponomareva, Umar Syed, Liam MacDermed, and An- dreas Terzis. 2023. Harnessing large-language models to generate private syn- thetic text.arXiv preprint arXiv:2306.01684(2023)

  18. [18]

    Xuechen Li, Florian Tramer, Percy Liang, and Tatsunori Hashimoto. 2021. Large language models can be strong differentially private learners.arXiv preprint arXiv:2110.05679(2021)

  19. [19]

    Zinan Lin, Sivakanth Gopi, Janardhan Kulkarni, Harsha Nori, and Sergey Yekhanin. 2023. Differentially private synthetic data via foundation model apis 1: Images.arXiv preprint arXiv:2305.15560(2023)

  20. [20]

    Michael F Liu, Saiyue Lyu, Margarita Vinaroz, and Mijung Park. 2023. Differen- tially private latent diffusion models.arXiv preprint arXiv:2305.15759(2023)

  21. [21]

    Yinhan Liu, Myle Ott, Naman Goyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke Zettlemoyer, and Veselin Stoyanov. 2019. Roberta: A robustly optimized bert pretraining approach.arXiv preprint arXiv:1907.11692 (2019)

  22. [22]

    Ashwin Machanavajjhala, Daniel Kifer, John Abowd, Johannes Gehrke, and Lars Vilhuber. 2008. Privacy: Theory meets practice on the map. In2008 IEEE 24th international conference on data engineering. IEEE, 277–286

  23. [23]

    Justus Mattern, Zhijing Jin, Benjamin Weggenmann, Bernhard Schoelkopf, and Mrinmaya Sachan. 2022. Differentially private language models for secure data sharing. InProceedings of the 2022 Conference on Empirical Methods in Natural Language Processing. 4860–4873

  24. [24]

    Ilya Mironov, Kunal Talwar, and Li Zhang. 2019. R\’enyi differential privacy of the sampled gaussian mechanism.arXiv preprint arXiv:1908.10530(2019)

  25. [25]

    Nicolas Papernot, Martín Abadi, Ulfar Erlingsson, Ian Goodfellow, and Kunal Talwar. 2016. Semi-supervised knowledge transfer for deep learning from private training data.arXiv preprint arXiv:1610.05755(2016)

  26. [26]

    Jinseong Park, Hoki Kim, Yujin Choi, and Jaewook Lee. 2023. Differentially pri- vate sharpness-aware training. InInternational Conference on Machine Learning. PMLR, 27204–27224

  27. [27]

    Victor Sanh, Lysandre Debut, Julien Chaumond, and Thomas Wolf. 2019. Dis- tilBERT, a distilled version of BERT: smaller, faster, cheaper and lighter.arXiv preprint arXiv:1910.01108(2019)

  28. [28]

    Baifeng Shi, Siyu Gai, Trevor Darrell, and Xin Wang. 2023. Toast: Transfer learning via attention steering.arXiv preprint arXiv:2305.15542(2023)

  29. [29]

    Yifan Shi, Yingqi Liu, Kang Wei, Li Shen, Xueqian Wang, and Dacheng Tao

  30. [30]

    In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition

    Make landscape flatter in differentially private federated learning. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 24552–24562

  31. [31]

    Richard Socher, Alex Perelygin, Jean Wu, Jason Chuang, Christopher D Manning, Andrew Y Ng, and Christopher Potts. 2013. Recursive deep models for semantic compositionality over a sentiment treebank. InProceedings of the 2013 conference on empirical methods in natural language processing. 1631–1642

  32. [32]

    Yu-Lin Tsai, Yizhe Li, Chia-Mu Yu, Xuebin Ren, Po-Yu Chen, Zekai Chen, and Francois Buet-Golfouse. 2025. Differentially private fine-tuning of diffusion models. InProceedings of the IEEE/CVF International Conference on Computer Vision. 4561–4571

  33. [33]

    Alex Wang, Amanpreet Singh, Julian Michael, Felix Hill, Omer Levy, and Samuel R. Bowman. 2019. GLUE: A Multi-Task Benchmark and Analysis Platform for Natural Language Understanding. In7th International Conference on Learning Representations, ICLR 2019, New Orleans, LA, USA, May 6-9, 2019. https://openreview.net/forum?id=rJ4km2R5t7

  34. [34]

    Haiming Wang, Zhikun Zhang, Tianhao Wang, Shibo He, Michael Backes, Jiming Chen, and Yang Zhang. 2023. {PrivTrace}: Differentially private trajectory synthesis by adaptive markov models. In32nd USENIX Security Symposium (USENIX Security 23). 1649–1666

  35. [35]

    Tianhao Wang, Joann Qiongna Chen, Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, and Somesh Jha. 2021. Continuous release of data streams under both centralized and local differential privacy. InProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. 1237–1253

  36. [36]

    Zihao Wang, Di Tang, XiaoFeng Wang, Wei He, Zhaoyang Geng, and Wenhao Wang. 2024. Tossing in the dark: Practical {Bit-Flipping} on gray-box deep neural networks for runtime trojan injection. In33rd USENIX Security Symposium (USENIX Security 24). 1331–1348

  37. [37]

    Zihao Wang, Rui Zhu, Dongruo Zhou, Zhikun Zhang, John Mitchell, Haixu Tang, and XiaoFeng Wang. 2024. {DPAdapter}: Improving Differentially Private Deep Learning through Noise Tolerance Pre-training. In33rd USENIX Security Symposium (USENIX Security 24). 991–1008

  38. [38]

    Zihao Wang, Rui Zhu, Dongruo Zhou, Zhikun Zhang, XiaoFeng Wang, and Haixu Tang. 2025. Sharpness-Aware Initialization: Improving Differentially Private Machine Learning from First Principles. In34th USENIX Security Symposium (USENIX Security 25). 3103–3122

  39. [39]

    Chengkun Wei, Minghu Zhao, Zhikun Zhang, Min Chen, Wenlong Meng, Bo Liu, Yuan Fan, and Wenzhi Chen. 2023. Dpmlbench: Holistic evaluation of differentially private machine learning. InProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. 2621–2635

  40. [40]

    Adina Williams, Nikita Nangia, and Samuel Bowman. 2018. A broad-coverage challenge corpus for sentence understanding through inference. InProceedings of the 2018 Conference of the North American Chapter of the Association for Com- putational Linguistics: Human Language Technologies, Volume 1 (Long Papers). 1112–1122

  41. [41]

    Chulin Xie, Zinan Lin, Arturs Backurs, Sivakanth Gopi, Da Yu, Huseyin A Inan, Harsha Nori, Haotian Jiang, Huishuai Zhang, Yin Tat Lee, et al. 2024. Differen- tially private synthetic data via foundation model apis 2: Text.arXiv preprint arXiv:2403.01749(2024)

  42. [42]

    Da Yu, Saurabh Naik, Arturs Backurs, Sivakanth Gopi, Huseyin A Inan, Gautam Kamath, Janardhan Kulkarni, Yin Tat Lee, Andre Manoel, Lukas Wutschitz, et al

  43. [43]

    Differentially private fine-tuning of language models.arXiv preprint arXiv:2110.06500(2021)

  44. [44]

    Da Yu, Huishuai Zhang, Wei Chen, and Tie-Yan Liu. 2021. Do not let privacy overbill utility: Gradient embedding perturbation for private learning.arXiv preprint arXiv:2102.12677(2021)

  45. [45]

    Quan Yuan, Zhikun Zhang, Linkang Du, Min Chen, Peng Cheng, and Mingyang Sun. 2023. {PrivGraph}: Differentially private graph data publication by ex- ploiting community information. In32nd USENIX Security Symposium (USENIX Security 23). 3241–3258

  46. [46]

    Xiang Yue, Huseyin Inan, Xuechen Li, Girish Kumar, Julia McAnallen, Hoda Shajari, Huan Sun, David Levitan, and Robert Sim. 2023. Synthetic text generation with differential privacy: A simple and practical recipe. InProceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). 1321–1342

  47. [47]

    Jiaqi Zhang, Kai Zheng, Wenlong Mou, and Liwei Wang. 2017. Efficient private ERM for smooth objectives.arXiv preprint arXiv:1703.09947(2017)

  48. [48]

    Susan Zhang, Stephen Roller, Naman Goyal, Mikel Artetxe, Moya Chen, Shuohui Chen, Christopher Dewan, Mona Diab, Xian Li, Xi Victoria Lin, et al. 2022. Opt: Haichao Sha, Zihao Wang, Yuncheng Wu, Hong Chen, and Wei Dong Open pre-trained transformer language models.arXiv preprint arXiv:2205.01068 (2022)

  49. [49]

    Zhikun Zhang, Tianhao Wang, Ninghui Li, Shibo He, and Jiming Chen. 2018. CALM: Consistent adaptive local marginal for marginal release under local dif- ferential privacy. InProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 212–229

  50. [50]

    Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, and Yang Zhang. 2021. {PrivSyn}: Differentially private data synthesis. In30th USENIX Security Symposium (USENIX Security 21). 929–946

  51. [51]

    Zhi Zhang, Qizhe Zhang, Zijun Gao, Renrui Zhang, Ekaterina Shutova, Shiji Zhou, and Shanghang Zhang. 2024. Gradient-based parameter selection for efficient fine-tuning. InProceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 28566–28577. Ethical Considerations We conducted this research in accordance with established ethical g...