Differentially Private Model Merging
Pith reviewed 2026-05-21 08:16 UTC · model grok-4.3
The pith
Two post-processing techniques let you combine existing models trained on the same data to meet any target differential privacy level without retraining.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
Given models trained on the same dataset with different privacy budgets, post-processing via random selection or linear combination yields a final model that satisfies any target differential privacy parameter. The privacy of these operations is accounted for using Rényi DP and privacy loss distributions both in general settings and for private mean estimation, where the resulting utility tradeoffs are precisely characterized and compared between the two mechanisms.
What carries the argument
Random selection and linear combination as post-processing rules that merge privacy loss distributions from models trained at different privacy levels while preserving an overall Rényi DP bound.
If this is right
- Any target privacy parameter can be achieved by post-processing from the existing set of models without new training.
- The privacy accounting holds for general machine learning problems through Rényi DP and privacy loss distributions.
- For private mean estimation the two mechanisms permit exact characterization of the privacy-utility frontier and direct comparison.
- No access to the original training data is needed after the initial models are obtained.
Where Pith is reading between the lines
- Organizations could maintain a small library of models at graded privacy levels and quickly adapt outputs when policies shift.
- The same post-processing logic may extend to federated or distributed settings where each model carries its own privacy constraint.
- Adaptive selection rules that incorporate observed utility could further improve the privacy-utility curve beyond fixed random or linear merging.
Load-bearing premise
The existing models were trained on the same dataset and their privacy loss distributions can be combined via the chosen post-processing rule while preserving the overall Rényi DP bound.
What would settle it
An empirical measurement showing that the privacy loss distribution or attack success rate after random selection or linear combination exceeds the bound calculated by the Rényi DP accounting for the target privacy parameter would disprove the claims.
Figures
read the original abstract
In machine learning, privacy requirements at inference or deployment time often evolve due to changing policies, regulations, or user preferences. In this work, we aim to construct a magnitude of models to satisfy any target differential privacy (DP) requirement without additional training, given a set of existing models trained on the same dataset with different privacy/utility tradeoffs. We propose two post-processing techniques, namely random selection and linear combination, to generate final private models satisfying any target privacy parameter. We provide privacy accounting of these approaches from the lens of R'enyi DP and privacy loss distributions on general problems, as well as on private mean estimation, where we precisely characterize the privacy/utility tradeoffs and compare the two mechanisms. Empirically, we demonstrate the effectiveness of our approaches and validate our analyses on several models and both synthetic and real-world datasets.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript proposes two post-processing techniques—random selection and linear combination—to merge models trained on the same dataset with different privacy-utility tradeoffs into a final model satisfying any target differential privacy parameter without retraining. It provides privacy accounting via Rényi DP and privacy loss distributions for general problems, plus an exact characterization and comparison for private mean estimation, with empirical validation on synthetic and real-world datasets.
Significance. If the accounting holds, the ability to tune privacy post-hoc would be useful for adapting deployed models to changing regulations or preferences. The exact characterization on private mean estimation is a strength, as it allows precise comparison of the two mechanisms and provides a concrete benchmark for privacy-utility tradeoffs.
major comments (1)
- [general problems accounting] In the general-problems accounting (prior to the mean-estimation section): the derivation that random selection and linear combination of PLDs from same-dataset models yields a tunable Rényi DP bound does not address the joint distribution induced by shared training data. Because every model observes the identical records, the outputs are statistically dependent; the effective PLD after mixture or weighting is not necessarily a simple functional of the marginal PLDs, which undermines the claim that arbitrary target parameters are achievable without retraining.
minor comments (2)
- The notation for the linear-combination weights and the random-selection probabilities is introduced without an explicit definition or table summarizing the parameters.
- Figure captions for the empirical results could more clearly state the number of runs and error bars used to generate the plotted curves.
Simulated Author's Rebuttal
We thank the referee for their careful reading of the manuscript and for identifying this subtlety in the general-problems accounting. We address the concern directly below and will incorporate clarifications into the revised version.
read point-by-point responses
-
Referee: In the general-problems accounting (prior to the mean-estimation section): the derivation that random selection and linear combination of PLDs from same-dataset models yields a tunable Rényi DP bound does not address the joint distribution induced by shared training data. Because every model observes the identical records, the outputs are statistically dependent; the effective PLD after mixture or weighting is not necessarily a simple functional of the marginal PLDs, which undermines the claim that arbitrary target parameters are achievable without retraining.
Authors: We appreciate the referee drawing attention to the dependence arising from shared training data. Although the models are trained on identical records and are therefore statistically dependent, the privacy analysis for both post-processing techniques operates on the marginal output distributions together with the individual Rényi DP guarantees already established for each model. For random selection, the merged mechanism produces an output distribution that is a convex combination of the marginals; because the selection variable is chosen independently of the data, the Rényi divergence of the resulting mixture is bounded by a convex combination of the individual Rényi divergences (or simply by their maximum when the target is the worst-case bound). An analogous argument applies to linear combination, which can be viewed as a deterministic post-processing of the selected model. Consequently, the target privacy parameter remains tunable by the selection probability or the combination weights without retraining. We will revise the general-problems section to explicitly note the dependence, supply the short proof that the marginal bounds suffice, and confirm that the same tunable guarantees hold for the dependent case. revision: yes
Circularity Check
No circularity: privacy accounting follows from standard Rényi DP and PLD rules applied to post-processing
full rationale
The derivation applies established Rényi DP composition and privacy loss distribution properties to the random selection and linear combination post-processing rules. The accounting for general problems and private mean estimation is presented as a direct characterization of the output distribution under these rules, without fitting target privacy parameters to evaluation data or redefining quantities in terms of themselves. No load-bearing step reduces to a self-citation chain, an ansatz smuggled via prior work, or a fitted input relabeled as a prediction. The central claim that arbitrary target privacy levels are achievable via merging is supported by the derived bounds rather than assumed by construction. The paper remains self-contained against external DP benchmarks.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption Models are trained on identical data with known per-model privacy parameters that can be combined via selection or linear weights.
Lean theorems connected to this paper
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
Theorem 5.1 (α,ε_RS_α)-RDP: ε_RS_α(π)≤1/(α−1)log(∑π_i e^{(α−1)ε_α,i}) and Theorem 5.2 sup H_ε(P_RS,Q_RS)≤∑π_i H_ε(P_i,Q_i) via joint convexity of hockey-stick divergence.
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
IEEE, 2017a. Mironov, I. R´enyi differential privacy. In2017 IEEE 30th computer security foundations symposium (CSF), pp. 263–
-
[2]
Ponomareva, N., Hazimeh, H., Kurakin, A., Xu, Z., Denison, C., McMahan, H
IEEE, 2017b. Ponomareva, N., Hazimeh, H., Kurakin, A., Xu, Z., Denison, C., McMahan, H. B., Vassilvitskii, S., Chien, S., and Thakurta, A. G. How to dp-fy ml: A practical guide to machine learning with differential privacy.Journal of Artificial Intelligence Research, 77:1113–1201, 2023. Puccetti, G. and Wang, R. Extremal dependence concepts. 2015. Shejwal...
-
[3]
and σ2 LC(λ) =λ 2σ2 1 + (1−λ) 2σ2
-
[4]
Next we prove εRS α =D α Pπ∥Qπ ≥ α∆2 2σ2 RS(π) +o(∆ 2)
Thus εLC α = α∆2 2σ2 LC(λ) . Next we prove εRS α =D α Pπ∥Qπ ≥ α∆2 2σ2 RS(π) +o(∆ 2). Writepfor the density ofP π and note thatQ π’s densityq(x) =p(x−∆). Define Jχ(P) := Z R (p′(x))2 p(x) dx. Step 1.We show that Dα(Pπ∥Qπ)≥ α 2 Jχ(Pπ) ∆2 +o(∆ 2).(12) 12 Differentially Private Model Merging Consider Ψα(∆) := log R p(x)α p(x−∆) 1−α dx, so that Dα(Pπ∥Qπ) = Ψα(...
work page 2015
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.