# scalable_dpsgd_shuffling_vs_poisson_subsampling__a85bf69a.pdf Scalable DP-SGD: Shuffling vs. Poisson Subsampling Lynn Chua Google Research chualynn@google.com Badih Ghazi Google Research badihghazi@gmail.com Pritish Kamath Google Research pritishk@google.com Ravi Kumar Google Research ravi.k53@gmail.com Pasin Manurangsi Google Research pasin@google.com Amer Sinha Google Research amersinha@google.com Chiyuan Zhang Google Research chiyuan@google.com We provide new lower bounds on the privacy guarantee of the multi-epoch Adaptive Batch Linear Queries (ABLQ) mechanism with shuffled batch sampling, demonstrating substantial gaps when compared to Poisson subsampling; prior analysis was limited to a single epoch. Since the privacy analysis of Differentially Private Stochastic Gradient Descent (DP-SGD) is obtained by analyzing the ABLQ mechanism, this brings into serious question the common practice of implementing shuffling-based DP-SGD, but reporting privacy parameters as if Poisson subsampling was used. To understand the impact of this gap on the utility of trained machine learning models, we introduce a practical approach to implement Poisson subsampling at scale using massively parallel computation, and efficiently train models with the same. We compare the utility of models trained with Poissonsubsampling-based DP-SGD, and the optimistic estimates of utility when using shuffling, via our new lower bounds on the privacy guarantee of ABLQ with shuffling. 1 Introduction A common approach for private training of differentiable models, such as neural networks, is to apply first-order methods with noisy gradients. This general framework is known as DP-SGD (Differentially Private Stochastic Gradient Descent) [Abadi et al., 2016]; the framework itself is compatible with any optimization sub-routine. Multiple open source implementations exist for applying DP-SGD in practice, namely, Tensorflow Privacy, JAX Privacy [Balle et al., 2022] and Py Torch Opacus [Yousefpour et al., 2021]; and DP-SGD has been applied widely in various machine learning domains [e.g., Tramer and Boneh, 2020, De et al., 2022, Bu et al., 2022, Chen et al., 2020, Dockhorn et al., 2023, Anil et al., 2022, He et al., 2022, Igamberdiev et al., 2024, Tang et al., 2024]. DP-SGD (Algorithm 1) processes the training data in a sequence of steps, where at each step, a noisy estimate of the average gradient over a mini-batch is computed and used to perform a first-order update over the differentiable model. To obtain the noisy (average) gradient, the gradient g for each example in the mini-batch is clipped to have norm at most C (a pre-determined fixed bound), by setting [g]C := g min{1, C/ g 2}, and computing the sum over the batch; then independent zero-mean noise drawn from the Gaussian distribution of scale σC is added to each coordinate of the summed gradient. This could then be scaled by the target mini-batch size to obtain a noisy 38th Conference on Neural Information Processing Systems (Neur IPS 2024). Algorithm 1 DP-SGD: Differentially Private Stochastic Gradient Descent [Abadi et al., 2016] Params: Batch sampler B (samples T batches, with target batch size b), differentiable loss ℓ: Rd X Rd, initial model state w0, clipping norm C, noise scale σ. Input: Dataset x = (x1, . . . , xn). Output: Final model state w T Rd. (S1, . . . , ST ) B(n) for t = 1, . . . , T do b N(0, σ2C2Id) + P x St[ wℓ(w; x)]C wt wt 1 ηtgt Could also be some other optimization method. return w T average gradient.1 The privacy guarantee of the mechanism depends on the following parameters: the noise scale σ, the number of examples in the training dataset, the size of mini-batches, the number of training steps, and the mini-batch generation process. In practice, almost all deep learning systems generate mini-batches of fixed-size by sequentially going over the dataset, possibly applying a global shuffling of all the examples in the dataset for each training epoch; each epoch corresponds to a single pass over the dataset, and the ordering of the examples may be kept the same or resampled between different epochs. However, performing the privacy analysis for such a mechanism has appeared to be technically difficult due to correlation between the different mini-batches. Abadi et al. [2016] instead consider a different mini-batch generation process of Poisson subsampling, wherein each mini-batch is generated independently by including each example with a fixed probability. This mini-batch generation process is however rarely implemented in practice, and consequently it has become common practice to use some form of shuffling in applications, but to report privacy parameters as if Poisson subsampling was used (see, e.g., the survey by Ponomareva et al. [2023, Section 4.3]). A notable exception is the Py Torch Opacus library [Yousefpour et al., 2021] that supports the option of Poisson subsampling; however, this implementation only works well for datasets that allow efficient random access (for instance by loading it entirely into memory). To the best of knowledge, Poisson subsampling has not been used for training with DP-SGD on massive datasets. The privacy analysis of DP-SGD is usually performed by viewing it as a post-processing of an Adaptive Batch Linear Queries (ABLQ) mechanism that releases the estimates of a sequence of adaptively chosen linear queries on the mini-batches (formal definitions in Section 2.1). Chua et al. [2024] showed that the privacy loss of ABLQ with shuffling can be significantly higher than that with Poisson subsampling for small values of σ. Even though their analysis only applied to a single epoch mechanism, this has put under serious question the aforementioned common practice of implementing DP-SGD with some form of shuffling while reporting privacy parameters assuming Poisson subsampling. The motivating question for our work is: Which batch sampler provides the best utility for models trained with DP-SGD, when applied with the correct corresponding privacy accounting? 1.1 Contributions Our contributions are summarized as follows. Privacy Analysis of Multi-Epoch ABLQ with Shuffling. We provide lower bounds on the privacy guarantees of shuffling-based ABLQ to handle multiple epochs. We consider the cases of both (i) Persistent Shuffling, wherein the examples are globally shuffled once and the order is kept the same between epochs, and (ii) Dynamic Shuffling, wherein the examples are globally shuffled independently for each epoch. Since our technique provides a lower bound on the privacy guarantee, the utility of the models obtained via shuffling-based DP-SGD with this privacy accounting is an optimistic estimate of the utility under the correct accounting. Scalable Implementation of DP-SGD with Poisson Subsampling via Truncation. Variable batches are typically inconvenient to handle in deep learning systems. For example, upon a change in the input shape, jax.jit triggers a recompilation of the computation graph, and tf.function will 1As explained later, for Poisson batch sampler, the mini-batch size is not a constant, but the scaling has to be done with the target mini-batch size, and not the realized mini-batch size. retrace the computation graph. Additionally, Google TPUs require all operations to have fixed input and output shapes. We introduce truncated Poisson subsampling to circumvent variable batch sizes. In particular, we choose an upper bound on the maximum batch size B that our training can handle, and given any variable size batch b, if b B, we randomly sub-select B examples to retain in the batch, and if b < B, we pad the batch with B b dummy examples with zero weight. This deviates slightly from the standard Poisson subsampling process since our batch sizes can never exceed B. We choose B to be sufficiently larger than the expected batch size, so that the probability that the sampled batch size b exceeds the maximum allowed batch size B is small. We provide a modification to the analysis of ABLQ with Poisson subsampling in order to handle this difference. Generating these truncated Poisson subsampled batches can be difficult when the dataset is too large to fit in memory. We provide a scalable approach to the generation of batches with truncated Poisson subsampling using massively parallel computation [Dean and Ghemawat, 2004]. This can be easily specified using frameworks like beam [Apache Beam] and implemented on distributed platforms such as Apache Flink, Apache Spark, or Google Cloud Dataflow. Our detailed experimental results are presented in Section 4, and summarized below: DP-SGD with Shuffle batch samplers performs similarly to Poisson subsampling for the same σ. However, DP-SGD with Shuffle batch samplers, with our optimistic privacy accounting, perform worse than Poisson subsampling in high privacy regimes (small values of ε). Thus, our results suggest that Poisson subsampling is a viable option for implementing DP-SGD at scale, with almost no loss in utility compared to the traditional approach that uses shuffling with (incorrect) accounting assuming Poisson subsampling. 1.2 Related Work Chua et al. [2024] demonstrated gaps in the privacy analysis of ABLQ using shuffling and Poisson subsampling, by providing a lower bound on the privacy guarantee of ABLQ with shuffling; their technique, however, was specialized for one epoch. We extend their technique to the multi-epoch version of ABLQ with shuffling and provide lower bounds for both persistent and dynamic batching. Lebeda et al. [2024] also point out gaps in the privacy analysis of ABLQ with Poisson subsampling and with sampling batches of fixed size independently, showing that the latter has worse privacy guarantees than Poisson subsampling. We do not cover this sampling in our experimental study, since sampling independent batches of fixed size is not commonly implemented in practice, and DP-SGD using this sampling is only expected to be worse as compared to Poisson subsampling. Yousefpour et al. [2021] report the model utility (and computational cost overhead) under training with DP-SGD with Poisson subsampling. However, to the best of our knowledge, there is no prior work that has compared the model utility of DP-SGD under Poisson subsampling with that under shuffling, let alone compared it against DP-SGD under (Dynamic/Persistent) shuffling or studied the gaps between the privacy accounting of the two approaches. One possible gap between the privacy analysis of DP-SGD and ABLQ is that the former only releases the final iterate, whereas the latter releases the responses to all the queries. An interesting result by Annamalai [2024] shows that in general the privacy analysis of the last-iterate of DP-SGD cannot be improved over that of ABLQ, when using Poisson subsampling. This suggests that at least without any further assumptions, e.g., on the loss function, it is not possible to improve the privacy analysis of DP-SGD beyond that provided by ABLQ; this is in contrast to the techniques of privacy amplification by iteration for convex loss functions [e.g. Feldman et al., 2018, Altschuler and Talwar, 2022]. 2 Preliminaries A differentially private (DP) mechanism M : X O can be viewed as a mapping from input datasets to distributions over an output space, namely, on input dataset x = (x1, . . . , xn) where each example xi X, M(x) is a probability measure over the output space O; for ease of notation, we often refer to the corresponding random variable also as M(x). Two datasets x and x are said to be adjacent, denoted x x , if they differ in one example ; in particular, we use the zeroing-out adjacency defined shortly. Algorithm 2 ABLQB: Adaptive Batch Linear Queries (as formalized in Chua et al. [2024]) Params: Batch sampler B (samples T batches), noise scale σ, and (adaptive) query method A : (Rd) X Bd. Input: Dataset x = (x1, . . . , xn). Output: Query estimates g1, . . . , g T Rd (S1, . . . , ST ) B(n) for t = 1, . . . , T do ψt( ) := A(g1, . . . , gt 1; ) gt et + P i St ψt(xi) for et N(0, σ2Id) return (g1, . . . , g T ) Algorithm 3 Πb,T (n; π): Permutation Batch Sampler Params: Batch size b, number of batches T. Input: Number of examples n s.t. E := b T/n is an integer (number of epochs), S := n/b is an integer (number of steps per epoch); a list π = π0, . . . , πE 1, where each πe is a permutation of [n]. Output: Seq. S1, . . . , ST [n] of batches. for e = 0, . . . , E 1 do for s = 0, . . . , S 1 do t = e S + s + 1 St {πe(sb + 1), . . . , πe(sb + b)} return S1, . . . , ST Algorithm 4 Pb,B,T : Truncated Poisson Batch Sampler Params: Target batch size b, max batch size B, number of batches T. Input: Number of examples n. Output: Seq. S1, . . . , ST [n] of batches, with |St| B. for t = 1, . . . , T do St for i = 1, . . . , n do ( St {i} with prob. b/n St with prob. 1 b/n if |St| > B then St arbitrary subset of St of size B return S1, . . . , ST Definition 2.1 (DP). For ε, δ 0, a mechanism M satisfies (ε, δ)-DP if for all adjacent datasets x x , and for any (measurable) event Γ it holds that Pr[M(x) Γ] eε Pr[M(x ) Γ] + δ. For any mechanism M, we use δM : R 0 [0, 1] to denote its privacy loss curve, namely δM(ε) is the smallest δ such that M satisfies (ε, δ)-DP; εM : [0, 1] R 0 is defined similarly. 2.1 Adaptive Batch Linear Queries Mechanism Following the notation in Chua et al. [2024], we study the adaptive batch linear queries mechanism ABLQB (Algorithm 2) using a batch sampler B and an adaptive query method A, defined. The batch sampler B can be any algorithm that randomly samples a sequence S1, . . . , ST of batches. ABLQB operates by processing the batches in a sequential order, and produces a sequence (g1, . . . , g T ), where the response gt Rd is produced as the sum of ψt(x) over the batch St with added zero-mean Gaussian noise of scale σ to all coordinates, where the query ψt : X Bd (for Bd := {v Rd : v 2 1}) is produced by the adaptive query method A, based on the previous responses g1, . . . , gt 1. DP-SGD can be viewed as a post-processing of an adaptive query method that maps examples to the clipped gradient at the last iterate, namely ψt(x) := [ wℓ(wt 1, x)]1 (we treat the clipping norm C = 1 for simplicity, as it is just a scaling term). In this work, we consider the following multi-epoch batch samplers: Deterministic Db,T , Persistent Shuffle S b,T , and Dynamic Shuffle S b,T batch sampler defined as instantiations of Algorithm 3 in Figure 1 and truncated Poisson Pb,B,T (Algorithm 4); we drop the subscripts of each sampler whenever it is clear from context. Note that, while Pb,B,T has no restriction on the value of n, the samplers Db,T , S b,T , and S b,T require that the number of examples n is such that E := b T/n and S := n/b are integers, where E corresponds to the number of epochs and S corresponds to the number of steps per epoch. We call the tuple (n, b, T) as valid if that holds, and we will often implicitly assume that this holds. Also note that Pb,B,T corresponds to the standard Poisson subsampling without truncation when B = . We use δB(ε) to denote the privacy loss curve of ABLQB for any B {D, P, S , S }, where other parameters such as σ, T, etc. are implicit. Namely, for all ε > 0, let δB(ε) be the smallest δ 0 such that ABLQB satisfies (ε, δ)-DP for all choices of the underlying adaptive query method A. We define εB(δ) similarly. Finally, we define σB(ε, δ) as the smallest σ such that ABLQB satisfies (ε, δ)-DP, with other parameters being implicit in B. Deterministic Batch Sampler Db,T (n): Realized as Πb,T (n; Id, Id, . . .). where Id is the identity permutation, i.e., the data is not permuted. Persistent Shuffle Batch Sampler S b,T : Realized as Πb,T (n; π, π, . . .), where π is a random permutation over [n], i.e., the data is shuffled once and the order is persistent across epochs. Dynamic Shuffle Batch Sampler S b,T : Realized as Πb,T (n; π0, π1, . . .), where πe s are i.i.d. random permutations over [n], i.e., the data is reshuffled in each epoch. Figure 1: Various natural instantiations of the permutation batch sampler. Adjacency notion. The common notion of Add-Remove adjacency is not applicable for mechanisms such as ABLQD, ABLQS , ABLQS because these methods require that b T/n and n/b are integers, and changing n by 1 does not respect this requirement. And while the other common notion of Substitution is applicable for all the mechanisms we consider, the standard analysis for ABLQP is done w.r.t Add-Remove adjacency [Abadi et al., 2016, Mironov, 2017]. Therefore, we use the Zeroing-out adjacency introduced by Kairouz et al. [2021], namely we consider the augmented input space X := X { } where any adaptive query method A is extended as A(g1, . . . , gt; ) := 0 for all g1, . . . , gt Rd. Datasets x, x X n are said to be zero-out adjacent if there exists i such that x i = x i, and exactly one of {xi, x i} is in X and the other is . We use x z x to specifically denote adjacent datasets with xi X and x i = . Thus x x if either x z x or x z x. 2.2 Dominating Pairs For two probability density functions P and Q and α, β R 0, we use αP + βQ to denote the weighted sum of the density functions. We use P Q to denote the product distribution sampled as (ω1, ω2) for ω1 P, ω2 Q, and, P T to denote the T-fold product distribution P P. For all ε R, the eε-hockey stick divergence between P and Q is Deε(P Q) := supΓ P(Γ) eεQ(Γ). Thus, by definition a mechanism M satisfies (ε, δ)-DP iff for all adjacent x x , it holds that Deε(M(x) M(x )) δ. Definition 2.2 (Dominating Pair [Zhu et al., 2022]). The pair (P, Q) dominates the pair (A, B) (denoted (P, Q) (A, B)) if Deε(P Q) Deε(A B) holds for all ε R. We say that (P, Q) dominates a mechanism M (denoted (P, Q) M) if (P, Q) (M(x), M(x )) for all adjacent x z x . If (P, Q) M, then for all ε 0, it holds that δM(ε) max{Deε(P Q), Deε(Q P)}, and conversely, if there exists adjacent datasets x z x such that (M(x), M(x )) (P, Q), then δM(ε) max{Deε(P Q), Deε(Q P)}. When both of these hold, we say that (P, Q) tightly dominates the mechanism M (denoted (P, Q) M) and in this case it holds that δM(ε) = max{Deε(P Q), Deε(Q P)}. Thus, tightly dominating pairs completely characterize the privacy loss of a mechanism (although they are not guaranteed to exist for all mechanisms). Dominating pairs behave nicely under mechanism compositions: if (P1, Q1) M1 and (P2, Q2) M2, then (P1 P2, Q1 Q2) M1 M2, where M1 M2 denotes the (adaptively) composed mechanism. 3 Privacy analysis of multi-epoch ABLQB We discuss the privacy analysis of ABLQB for B {D, P, S , S } via dominating pairs. Privacy analysis for ABLQD. A single epoch of the ABLQD mechanism corresponds to a Gaussian mechanism with noise scale σ. And thus, E := b T/n epochs of the ABLQD mechanism corresponds to an E-fold composition of the Gaussian mechanism, which is privacy-wise equivalent to a Gaussian mechanism with noise scale σ/ E [Dong et al., 2019, Corollary 3.3]. Thus, a closed-form expression for δD(ε) exists via the dominating pair (PD = N(1, σ2 E ), QD = N(0, σ2 Theorem 3.1 (Balle and Wang [2018, Theorem 8]). For all σ > 0, ε 0, and valid n, b, T, it holds that δD(ε) = Φ σ ε + 1 2σ eεΦ σ ε 1 2σ , where σ = σ and Φ( ) is the cumulative density function (CDF) of the standard normal random variable N(0, 1). Privacy analysis of ABLQP. First, let us consider the case of Poisson subsampling without truncation, namely B = . Zhu et al. [2022] showed2 that the tightly dominating pair for a single step of ABLQP, a Poisson sub-sampled Gaussian mechanism, is given by the pair (U = (1 q)N(0, σ2) + q N(1, σ2), V = N(0, σ2)), where q is the sub-sampling probability of each example, namely q = b/n. Since ABLQP is a T-fold composition of this Poisson subsampled Gaussian mechanism, it follows that (PP := U T , QP := V T ) ABLQP. A finite value of B however changes the mechanism slightly. In order to handle this, we use the following proposition, where d TV(P, P ) denotes the statistical distance between P and P . Proposition 3.2. For distributions P, P , Q, Q such that d TV(P, P ), d TV(Q, Q ) η, and Deε(P Q ) δ, then Deε(P Q) δ + η(1 + eε). Proof. For any event Γ we have that P(Γ) (i) P (Γ) + η (ii) eεQ (Γ) + δ + η (iii) eε(Q(Γ) + η) + δ + η = eεQ(Γ) + δ + η(1 + eε), where (i) follows from d TV(P, P ) η, (ii) follows from Deε(P Q ) δ and (iii) follows from d TV(Q, Q ) η. Thus, we get that Deε(P Q) δ + η(1 + eε). The batch size |St| before truncation in Pb,B,T is distributed as the binomial distribution Bin(n, b/n), and thus, by a union bound over the events that the sampled batch size |St| > B at any step, it follows that for any input dataset x, d TV(ABLQPb,B,T (x), ABLQPb, ,T (x)) T Ψ(n, b, B), where Ψ(n, b, B) := Prr Bin(n,b/n)[r > B]. Applying Proposition 3.2 we get Theorem 3.3. For all σ > 0, ε 0, and integers b, n b, B b, T, it holds that δP(ε) max{Deε(PP QP), Deε(QP PP)} + T (1 + eε) Ψ(n, b, B). While the hockey stick divergences Deε(PP QP) and Deε(QP PP) do not have closed-form expressions, upper bounds on these can be obtained using privacy accountants based on the methods of Rényi DP (RDP) [Mironov, 2017] and privacy loss distributions (PLD) [Meiser and Mohammadi, 2018, Sommer et al., 2019]; the latter admits numerically accurate algorithms [Koskela et al., 2020, Gopi et al., 2021, Ghazi et al., 2022, Doroshenko et al., 2022], with multiple open-source implementations [Prediger and Koskela, 2020, Google s DP Library., 2020, Microsoft., 2021]. Note that Ψ(n, b, B) can be made arbitrarily small by increasing B, which affects the computation cost. In particular, given a target privacy parameter (ε, δ), we can, for example, work backwards to first choose B such that Ψ(n, b, B) T (1 + eε) 10 5 δ, and then choose the noise scale σ such that max{Deε(PP QP), Deε(QP PP)} (1 10 5) δ, using aforementioned privacy accounting libraries. Notice that our use of Proposition 3.2 is likely not the optimal approach to account for the batch truncation. We do not optimize this further because we find that this approach already provides very minimal degradation to the choice of σ for a modest value of B relative to b. A more careful analysis could at best result in a slightly smaller B, which we do not consider as significant; see Figures 3 and 4 for more details. Privacy analysis of ABLQS . Obtaining the exact privacy guarantee for ABLQS has been an open problem in the literature. Our starting point is the approach introduced by Chua et al. [2024] to prove a lower bound in the single epoch setting. Let the input space be X = [ 1, 1], the (non-adaptive) query method A that produces the query ψt(x) = x, and consider the adjacent datasets: x = (x1 = 1, . . . , xn 1 = 1, xn = 1) and x = (x1 = 1, . . . , xn 1 = 1, xn = ) . Recall that the number of epochs is E := b T/n and the number of steps per epoch is S := n/b. By considering the same setting, it is easy to see that the distributions U = ABLQS (x) and V = ABLQS (x ) are given as: U = PS s=1 1 S N( b 1 + 2fs, σ2IT ), and V = PS s=1 1 S N( b 1 + fs, σ2IT ), 2Also implicit in prior work [Koskela et al., 2020]. where fs RT is the sum of basis vectors PE 1 ℓ=0 eℓS+s, and 1 denotes the all-1 s vector in RT . Basically, fs is the indicator vector encoding the batches that the differing example gets assigned to; in persistent shuffling, an example gets assigned to the sth batch within each epoch for a random s {1, . . . , S}. Shifting the distributions by b 1 and projecting to the span of {fs : s [S]} does not change the hockey stick divergence Deε(U V ), hence we might as well consider the pair U := PS s=1 1 S N(2 Ees, σ2IS) and V := PS s=1 1 S N( Ees, σ2IS). By scaling down the distributions by E on all coordinates we arrive at the following pair: PS := PS s=1 1 S N(2es, σ2 E I) and QS := PS s=1 1 S N(es, σ2 The pair (PS , QS ) is essentially same as the pair obtained by Chua et al. [2024], with σ replaced by σ/ E, and we get the following: Proposition 3.4. For all σ > 0, ε 0 and all valid n, b, T, it holds that δS (ε) max{Deε(PS QS ), Deε(QS PS )}. Following Chua et al. [2024], we can obtain a lower bound as δS (ε) PS (Γ) eεQS (Γ) for any Γ, and in particular, we consider events of the form ΓC := {w RS : maxs ws > C} for various values of C. PS (ΓC) and QS (ΓC) are efficient to compute as PS (ΓC) = 1 Φ C 2 σ/ S 1 and QS (ΓC) = 1 Φ C 1 σ/ Thus, using Proposition 3.4, we get that Theorem 3.5. For all σ > 0, ε 0, and all valid n, b, T, it holds that δS (ε) sup C R PS (ΓC) QS (ΓC). Privacy analysis of ABLQS . Our starting point for providing a lower bound on δS (ε) is the pair (PS, QS) as defined below that provides a lower bound in the case of a single epoch. PS := PS s=1 1 S N(2es, σ2I) and QS := PS s=1 1 S N(es, σ2I). ABLQS is an E-fold composition of the single-epoch mechanism. Hence by composition of dominating pairs, it follows that δS (ε) max{Deε(PS QS ), Deε(QS PS )}, where PS := P E S and QS := Q E S . However, it is tricky to directly identify an event Γ for which the lower bound PS (Γ) eεQS (Γ) is non-trivial and PS (Γ), QS (Γ) are easy to compute. So in order to lower bound Deε(PS QS ), below we construct a pair ( PS, QS) of discrete distributions such that (PS, QS) ( PS, QS) and thus (PS , QS ) ( P E S , Q E S ). For probability measures P and Q over a measurable space Ω, and a finite partition3 G = (G1, . . . , Gm) of Ω, we can consider the discrete distributions P G and QG defined over {1, . . . , m} such that P G(i) = P(Gi) and QG(i) = Q(Gi). The post-processing property of DP implies: Proposition 3.6 (DP Post-processing [Dwork and Roth, 2014]). For all partitions E of Ω, it holds that (P, Q) (P E, QE). We construct the pair ( PS, QS) by instantiating Proposition 3.6 with the set G = {G0, G1, . . . , Gm+1} parameterized by a sequence C1 < < Cm of values defined as follows: G0 := {w RS : maxs ws C1}, Gi := {w RS : Ci < maxs ws Ci+1} for 1 i m and Em+1 := {w RS : Cm < maxs ws}; in other words, G0 = RS ΓC1, Gi = ΓCi ΓCi+1 for 1 i m and Gm+1 = ΓCm. Theorem 3.7. For all σ > 0, ε 0, all valid n, b, T, and any finite sequence C1, . . . , Cm of values used to define PS, QS as above, it holds that δS (ε) max{Deε( P E S Q E S ), Deε( Q E S P E S )}. 3Gi s are pairwise disjoint and m i=1Gi = Ω. Map Add weight and sample batch indices Training Examples Reduce Group by batch index Batch 1 4 x1 wt=1 Map Truncate / Pad Random subset of two examples is sampled. Dummy example with weight = 0 is added. Random subset of two examples is sampled. Figure 2: Visualization of the massively parallel computation approach for Poisson subsampling at scale. Consider 6 records x1, . . . , x6 sub-sampled into 4 batches with a maximum batch size of B = 2. The Map operation adds a weight parameter of 1 to all examples, and samples indices of batches to which each example will belong. The Reduce operation groups by the batch indices. The final Map operation truncates batches with more than B examples (e.g., batches 1 and 3 above), and pads dummy examples with weight 0 in batches with fewer than B examples (e.g., batch 4 above). We use the dp_accounting library [Google s DP Library., 2020] to numerically compute a lower bound on the quantity above, using PLD. In particular, we choose C1 and Cm such that PS(G0) and PS(Gm+1) are sufficiently small and choose other Ci s to get a sufficiently fine discretization of the interval between C1 and Cm.4 An illustration of these accounting methods is presented in Figure 3, which demonstrates the significant gap where the optimal σ for dynamic/persistent shuffling is significantly larger than compared to Poisson subsampling, even when using an optimistic estimate for shuffling as above. We provide the implementation of our privacy accounting methods described above in an i Python notebook5 hosted on Google Colab, executable using the freely available Python CPU runtime. 4 Experiments We compare DP-SGD using the following batch sampling algorithms at corresponding noise scales: Deterministic batches (using nearly exact value of σD(ε, δ) via Theorem 3.1), Truncated Poisson subsampled batches (using upper bound on σP(ε, δ) via Theorem 3.3), Persistent shuffled batches (using lower bound on σS (ε, δ) via Theorem 3.5), and Dynamic shuffled batches (using lower bound on σS (ε, δ) via Theorem 3.7). As a comparison, we also evaluate DP-SGD with dynamic shuffled batches, but using noise that is an upper bound on σP(ε, δ) (with no truncation, i.e. B = ), to capture the incorrect, but commonly employed approach in practice. Finally, in order to understand the impact of using different batch sampling to model training in isolation, we compare models trained with SGD under truncated Poisson subsampling, and dynamic and persistent shuffling without any clipping or noise. We use massively parallel computation (Map-Reduce operations [Dean and Ghemawat, 2004]) to generate batches with truncated Poisson subsampling in a scalable manner as visualized in Figure 2; the details, with a beam pipeline implementation, is provided in Appendix A. 4In our evaluation, we choose C1 and Cm to ensure PS(G0) + PS(Gm+1) e 40. We chose other Ci s to be equally spaced in between C1 and Cm with a gap of σ2, where is the desired discretization of the PLD. This heuristic choice is guided by the intuition that the privacy loss is approximately linear in maxt xt/σ2, and thus the chosen gap means that this approximate privacy loss varies by between buckets. 5https://colab.research.google.com/drive/1v Cij MEQq RCm0x3EOUUKomc Znwx76sz64?usp=sharing Figure 3: AUC (left) and bounds on σB values (middle) for ε = 5, δ = 2.7 10 8 and using 1 epoch (top) and 5 epochs (bottom) of training on a linear-log scale; AUC (right) is with non-private training. We run our experiments on the Criteo Display Ads p CTR Dataset [Jean-Baptiste Tien, 2014], which contains around 46 million examples from a week of Criteo ads traffic. Each example has 13 integer features and 26 categorical features, and the objective is to predict the probability of clicking on an ad given these features. We use the labeled training set from the dataset, split chronologically into a 80%/10%/10% partition of train/validation/test sets. We use the binary cross entropy loss and report the AUC on the labeled test split, averaged over three runs with different random seeds. These are plotted with error bars indicating a single standard deviation. We include more details about the model architectures and training in Appendix B. We run experiments varying the (expected) batch size from 1 024 to 262 144, for both private training with (ε = 5, δ = 2.7 10 8) and non-private training and with 1 or 5 epochs. We plot the results in Figure 3. As mostly expected, we observe that the model utility generally improves with smaller σ. Truncated Poisson subsampling performs similarly to dynamic shuffling for the same value of σ, although it performs worse for non-private training. The latter could be attributed to the fact that when using truncated Poisson subsampling, a substantial fraction6 of examples are never seen in the training with high probability. However, this does not appear to significantly affect the private training model utility for the range of parameters that we consider, since we observe that truncated Poisson subsampling behaves similarly to dynamic shuffling with noise scale of σP(ε, δ) (the values of σ for P and S (P accounting) visually overlap in Figure 3; the values for P are only negligibly larger, since it accounts for truncation). Truncated Poisson subsampling performs better when compared to shuffling when the latter using our lower bound on σS (ε, δ), which suggests that shuffling with correct accounting (that is, with potentially even larger σ) would only perform worse. We also run experiments with a fixed batch size 65 536 and varying ε from 1 to 256, fixing δ = 2.7 10 8. We plot the results and the corresponding σ values in Figure 4. We again observe that shuffling (with our lower bound accounting) performs worse than truncated Poisson subsampling in the high privacy (low ε) regime, but performs slightly better in the low privacy (high ε) regime (this is because at large ε the noise required under Poisson subsampling is in fact larger than that under shuffling). Moreover, we observe that shuffling performs similarly to truncated Poisson subsampling when we use similar value of σ, consistent with our observations from Figure 3. Finally, as a comparison, we compute the upper bounds on σS(ε, δ) via the privacy amplification by shuffling bounds by Feldman et al. [2021]. We find that these bounds tend to be vacuous in many regime of parameters, namely they are no better than σD(ε, δ), which is clearly an upper bound on σS(ε, δ). Details are provided in Appendix C. 6The expected number of examples that are never used even once during training is at least (1 b n)T , which approaches e E in the limit as b/n 0, for a fixed number of epochs E = b T/n. Figure 4: AUC (left) and σ values (right) with varying ε, fixing δ = 2.7 10 8 and using (top) 1 epoch and (bottom) 5 epochs of training. σ is in log scale to highlight the differences at high ε. 5 Conclusion We provide new lower bounds on the privacy analysis of Adaptive Batch Linear Query mechanisms, under persistent and dynamic shuffling batch samplers, extending the prior work of Chua et al. [2024] that analyzed the single epoch case. Our lower bound method continues to identify separations in the multi-epoch setting, showing that the amplification guarantees due to even dynamic shuffling can be significantly limited compared to the amplification due to Poisson subsampling in regimes of practical interest. We also provide evaluation of DP-SGD with various batch samplers with the corresponding privacy accounting, and propose an approach for implementing Poisson subsampling at scale using massively parallel computation. Our findings suggest that with provable privacy guarantees on model training, Poisson-subsampling-based DP-SGD has better privacy-utility trade-off than shuffling-based DPSGD in many practical parameter regimes of interest, and in fact, essentially match the utility of shuffling-based DP-SGD at the same noise level. Thus, we consider Poisson-subsampling-based DP-SGD as a viable approach for implementing DP-SGD at scale, given the lower bound on the privacy analysis when using shuffling. Several interesting directions remain to be investigated. Firstly, our technique only provides a lower bound on the privacy guarantee when using persistent / dynamic shuffled batches. While some privacy amplification results are known [Feldman et al., 2021, 2023], providing a tight (non-vacuous) upper bound on the privacy guarantee in these settings remains an open challenge. This can be important in regimes where shuffling does provide better privacy guarantees than Poisson subsampling. Another important point to note is that persistent and dynamic shuffling are not the only forms of shuffling used in practice. For example, methods such as tf.data.Dataset.shuffle or torchdata.datapipes.iter.Shuffler provide a uniformly random shuffle, only when the size of its buffer is larger than the dataset. Otherwise, for buffer size b, it returns a random record among the first b records, and immediately replaces it with the next record ((b + 1)th in this case), and repeats this process, which leads to an asymmetric form of shuffling. Such batch samplers merit more careful privacy analysis. Acknowledgements We would like to thank Charlie Harrison and Ethan Leeman for valuable discussions, as well as anonymous reviewers for their thoughtful feedback that helped improve the quality of the paper. Martín Abadi, Andy Chu, Ian J. Goodfellow, H. Brendan Mc Mahan, Ilya Mironov, Kunal Talwar, and Li Zhang. Deep learning with differential privacy. In CCS, pages 308 318, 2016. Jason M. Altschuler and Kunal Talwar. Privacy of noisy stochastic gradient descent: More iterations without more privacy loss. In Neur IPS, 2022. Rohan Anil, Badih Ghazi, Vineet Gupta, Ravi Kumar, and Pasin Manurangsi. Large-scale differentially private BERT. In EMNLP (Findings), pages 6481 6491, 2022. Meenatchi Sundaram Muthu Selva Annamalai. It s our loss: No privacy amplification for hidden state DP-SGD with non-convex loss. Co RR, abs/2407.06496, 2024. Apache Beam. URL https://beam.apache.org/. Apache Flink. URL https://flink.apache.org/. Apache Spark. URL https://spark.apache.org/. Borja Balle and Yu-Xiang Wang. Improving the gaussian mechanism for differential privacy: Analytical calibration and optimal denoising. In ICML, pages 403 412, 2018. Borja Balle, Leonard Berrada, Soham De, Sahra Ghalebikesabi, Jamie Hayes, Aneesh Pappu, Samuel L Smith, and Robert Stanforth. JAX-Privacy: Algorithms for privacy-preserving machine learning in JAX, 2022. URL http://github.com/google-deepmind/jax_privacy. Zhiqi Bu, Jialin Mao, and Shiyun Xu. Scalable and efficient training of large convolutional neural networks with differential privacy. In Neur IPS, pages 38305 38318, 2022. Dingfan Chen, Tribhuvanesh Orekondy, and Mario Fritz. GS-WGAN: A gradient-sanitized approach for learning differentially private generators. In Neur IPS, pages 12673 12684, 2020. Lynn Chua, Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi, Amer Sinha, and Chiyuan Zhang. How Private is DP-SGD? In ICML, 2024. Soham De, Leonard Berrada, Jamie Hayes, Samuel L. Smith, and Borja Balle. Unlocking highaccuracy differentially private image classification through scale. Co RR, abs/2204.13650, 2022. Jeffrey Dean and Sanjay Ghemawat. Mapreduce: Simplified data processing on large clusters. In OSDI, pages 137 150, 2004. Tim Dockhorn, Tianshi Cao, Arash Vahdat, and Karsten Kreis. Differentially private diffusion models. TMLR, 2023. Jinshuo Dong, Aaron Roth, and Weijie J. Su. Gaussian differential privacy. Co RR, abs/1905.02383, 2019. Vadym Doroshenko, Badih Ghazi, Pritish Kamath, Ravi Kumar, and Pasin Manurangsi. Connect the dots: Tighter discrete approximations of privacy loss distributions. Po PETS, 2022(4):552 570, 2022. Cynthia Dwork and Aaron Roth. The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci., 9(3-4):211 407, 2014. Vitaly Feldman, Ilya Mironov, Kunal Talwar, and Abhradeep Thakurta. Privacy amplification by iteration. In FOCS, pages 521 532, 2018. Vitaly Feldman, Audra Mc Millan, and Kunal Talwar. Hiding among the clones: A simple and nearly optimal analysis of privacy amplification by shuffling. In FOCS, pages 954 964, 2021. Vitaly Feldman, Audra Mc Millan, and Kunal Talwar. Stronger privacy amplification by shuffling for Rényi and approximate differential privacy. In SODA, pages 4966 4981, 2023. Badih Ghazi, Pritish Kamath, Ravi Kumar, and Pasin Manurangsi. Faster privacy accounting via evolving discretization. In ICML, pages 7470 7483, 2022. Google Cloud Dataflow. URL https://cloud.google.com/dataflow. Google Colab. URL https://colab.research.google.com/. Google s DP Library. DP Accounting Library. https://github.com/google/ differential-privacy/tree/main/python/dp_accounting, 2020. Sivakanth Gopi, Yin Tat Lee, and Lukas Wutschitz. Numerical composition of differential privacy. In Neur IPS, pages 11631 11642, 2021. Jiyan He, Xuechen Li, Da Yu, Huishuai Zhang, Janardhan Kulkarni, Yin Tat Lee, Arturs Backurs, Nenghai Yu, and Jiang Bian. Exploring the limits of differentially private deep learning with group-wise clipping. ar Xiv preprint ar Xiv:2212.01539, 2022. Timour Igamberdiev, Doan Nam Long Vu, Felix Künnecke, Zhuo Yu, Jannik Holmer, and Ivan Habernal. DP-NMT: Scalable differentially-private machine translation. In EACL (Demonstrations), pages 94 105, 2024. Olivier Chapelle Jean-Baptiste Tien, joycenv. Display advertising challenge, 2014. URL https: //kaggle.com/competitions/criteo-display-ad-challenge. Peter Kairouz, Brendan Mc Mahan, Shuang Song, Om Thakkar, Abhradeep Thakurta, and Zheng Xu. Practical and private (deep) learning without sampling or shuffling. In ICML, pages 5213 5225, 2021. Antti Koskela, Joonas Jälkö, and Antti Honkela. Computing tight differential privacy guarantees using FFT. In AISTATS, pages 2560 2569, 2020. Christian Janos Lebeda, Matthew Regehr, and Gautam Kamath. Avoiding pitfalls for privacy accounting of subsampled mechanisms under composition. Co RR, abs/2405.20769, 2024. Sebastian Meiser and Esfandiar Mohammadi. Tight on budget? Tight bounds for r-fold approximate differential privacy. In CCS, pages 247 264, 2018. Microsoft. A fast algorithm to optimally compose privacy guarantees of differentially private (DP) mechanisms to arbitrary accuracy. https://github.com/microsoft/prv_accountant, 2021. Ilya Mironov. Rényi differential privacy. In CSF, pages 263 275, 2017. Natalia Ponomareva, Hussein Hazimeh, Alex Kurakin, Zheng Xu, Carson Denison, H. Brendan Mc Mahan, Sergei Vassilvitskii, Steve Chien, and Abhradeep Guha Thakurta. How to dp-fy ML: A practical guide to machine learning with differential privacy. JAIR, 77:1113 1201, 2023. Lukas Prediger and Antti Koskela. Code for computing tight guarantees for differential privacy. https://github.com/DPBayes/PLD-Accountant, 2020. David M. Sommer, Sebastian Meiser, and Esfandiar Mohammadi. Privacy loss classes: The central limit theorem in differential privacy. Po PETS, 2019(2):245 269, 2019. Xinyu Tang, Ashwinee Panda, Milad Nasr, Saeed Mahloujifar, and Prateek Mittal. Private fine-tuning of large language models with zeroth-order optimization. Co RR, abs/2401.04343, 2024. Tensorflow Privacy. URL https://www.tensorflow.org/responsible_ai/privacy/api_ docs/python/tf_privacy. Florian Tramer and Dan Boneh. Differentially private learning needs better features (or much more data). Co RR, abs/2011.11660, 2020. Ashkan Yousefpour, Igor Shilov, Alexandre Sablayrolles, Davide Testuggine, Karthik Prasad, Mani Malek, John Nguyen, Sayan Ghosh, Akash Bharadwaj, Jessica Zhao, Graham Cormode, and Ilya Mironov. Opacus: User-friendly differential privacy library in Py Torch. Co RR, abs/2109.12298, 2021. Yuqing Zhu, Jinshuo Dong, and Yu-Xiang Wang. Optimal accounting of differential privacy via characteristic function. In AISTATS, pages 4782 4817, 2022. A Massively Parallel Implementation of Truncated Poisson Subsampling We use massively parallel computation to generate batches with truncated Poisson subsampling in a scalable manner. Given the input parameters b, B, T, and n, we first compute the maximum batch size B such that Ψ(n, b, B) T (1 + eε) 10 5 δ. For each example in the input dataset, we generate a list of batches that the example would be in when sampled using Poisson subsampling. While a naive implementation would sample T Bernoulli random variables with parameter b/n, this can be made efficient by sampling the indices of the batches containing the examples directly, since the difference between two consecutive such indices is distributed as a geometric random variable with parameter b/n. We then group the examples by the batches, and subsample each batch uniformly, without replacement, to obtain a batch of size at most B. For batches with size smaller than B, we pad the batch with examples such that every batch has size B. In order to differentiate the padding examples from the non-padding examples, we add a weight to all the examples, where the non-padding examples have weight 1 and the padding examples have weight 0. During the training, we use a weighted loss function using these weights, such that the padding examples do not have any effect on the training loss. We include a code snippet for implementing truncated Poisson subsampling using massively parallel computation. This is written using Apache beam [Apache Beam] in Python, which can be implemented on distributed platforms such as Apache Flink, Apache Spark, Google Cloud Dataflow. import apache_beam as beam import numpy as np import tensorflow as tf class Poisson Subsample(beam.PTransform): """Generate batches of examples using poisson subsampling. Attributes: max_batch_size: Maximum batch size. num_batches: Number of batches. subsampling_probability: Probability of sampling each example in each batch. sample_size: Number of samples to sample at a time. """ def __init__( self, max_batch_size: int, num_batches: int, subsampling_probability: float, sample_size: int, ): self._max_batch_size = max_batch_size self._num_batches = num_batches self._subsampling_probability = subsampling_probability self._sample_size = sample_size self._rng = np.random.default_rng() def get_batch_indices(self): """Returns the indices of the batches that an example is in. Assuming that an example is sampled in each batch using poisson subsampling, return the list of indices of the batches that the example is in. """ largest_batch_index = 0 batch_indices = np.array([]) if self._subsampling_probability == 0.0: return batch_indices while largest_batch_index < self._num_batches: # Sample batches using geometric distribution geometric_samples = self._rng.geometric( p=self._subsampling_probability, size=self._sample_size ) batch_indices = np.concatenate( (batch_indices, largest_batch_index + np.cumsum(geometric_samples)) ) largest_batch_index = batch_indices[-1] return batch_indices[batch_indices <= self._num_batches] def _add_padding(self, batch): """Returns batch padded to max_batch_size with padding examples. Pads input batch to size max_batch_size by adding padding examples. The padding examples are specified by adding a weight to all the examples, where padding examples have weight 0 and non-padding examples have weight 1. batch: A tuple of (batch_id, list of examples) """ batch_id, examples = batch examples = list(examples) if len(examples) < self._max_batch_size: padding_example = tf.train.Example() padding_example.Copy From(examples[0]) padding_example.features.feature['weight'].float_list.value[:] = [0.0] examples.extend( [padding_example] * (self._max_batch_size - len(examples)) ) return (batch_id, examples) def expand(self, pcoll): def generate_batch_ids(example): # Convert to pairs consisting of (batch id, example) for batch_id in self.get_batch_indices(): yield (int(batch_id), example) def _add_weights(example): # Add weight with value 1 to indicate non-padding examples weighted_example = tf.train.Example() weighted_example.Copy From(example) weighted_example.features.feature['weight'].float_list.value[:] = [1.0] return weighted_example # Group elements into batches keyed by the batch id grouped_pcoll = ( pcoll | 'Add weights' >> beam.Map(_add_weights) | 'Key by batch id' >> beam.Flat Map(generate_batch_ids) | 'Sample up to max_batch_size elements per batch' >> beam.combiners.Sample.Fixed Size Per Key(self._max_batch_size) | 'Add padding' >> beam.Map(self._add_padding) ) return grouped_pcoll B Training details We use a neural network with five layers and 78M parameters as the model. The first layer consists of feature transforms for each of the categorical and integer features. Categorical features are mapped into dense feature vectors using an embedding layer, where the embedding dimensions are fixed at 48. We apply a log transform for the remaining integer features, and concatenate all the features together. The next three layers are fully connected layers with 598 hidden units each and a Re LU activation function. The last layer consists of a fully connected layer which gives a scalar logit prediction. We use the Adam or Adagrad optimizer with a base learning rate in {0.0001, 0.0005, 0.001, 0.005, 0.01, 0.05, 0.1, 0.5, 1}, which is scaled with a cosine decay, and we tune the norm bound C {1, 5, 10, 50}. For the experiments with varying batch sizes, we use batch sizes that are powers of 2 between 1 024 and 262 144, with corresponding maximum batch sizes B in {1 328, 2 469, 4 681, 9 007, 17 520, 34 355, 67 754, 134 172, 266 475}. For the experiments with varying ε, we vary ε as powers of 2 between 1 and 256, with batch size 65 536 and corresponding maximum batch sizes B in {67 642, 67 667, 67 725, 67 841, 68 059, 68 449, 69 106, 70 156, 71 760}. With these choices of the maximum batch sizes, the σ values for truncated Poisson subsampling are only slightly larger than without truncation, as we observe from the nearly overlapping curves in Figure 3 and Figure 4. The training is done using NVIDIA Tesla P100 GPUs, where each epoch of training takes 1-2 hours on a single GPU. C Privacy Amplification by Shuffling We evaluate the upper bounds on σS(ε, δ) via privacy amplification by shuffling results of Feldman et al. [2021], as applied in the context of our experiments in Figure 3. In particular, their Proposition 5.3 states that if the unamplified (Gaussian) mechanism satisfies (ε0, δ0)-DP, then ABLQS with T steps (in a single epoch setting) will satisfy (ε, η + O(eεδ0n)-DP for any η [0, 1] and ε = O (1 e ε0) eε0 log(1/η) They also obtain a tighter numerical bound on ε with an implementation provided in a Git Hub repository.7 We evaluate their bounds in an optimistic manner. Namely, for a given value of δ, we compute an optimistic estimate on ε compared to the bound above by setting δ0 = δ/n and setting ε0 = εD(δ0), and set η = δ (note that this is optimistic because the above proposition requires setting δ = η + O(eεδ0n), which is larger than the δ we are claiming). We use the numerical analysis method provided in the library by Feldman et al. [2021] to compute σS (via a binary search on top of their method to compute an upper bound on εS), and plot it in Figure 5, along with the lower bound on σS as obtained by Chua et al. [2024], as well as σD. We find that the bounds by Feldman et al. [2021] are vacuous for batch sizes 2 048 and above, in that they are even larger than the bounds without any amplification. Figure 5: Comparison of an optimistic estimate of the upper bound on σS from Feldman et al. [2021] against the lower bound on σS in Theorem 3.5 and σD. D σ with varying epochs We include a comparison of the σ values for varying numbers of epochs, to show how the same trends hold beyond the 1 and 5 epoch regimes. 7https://github.com/apple/ml-shuffling-amplification Figure 6: σB values with varying numbers of epochs, fixing ε = 5, δ = 2.7 10 8, and batch size 65 536. Neur IPS Paper Checklist Question: Do the main claims made in the abstract and introduction accurately reflect the paper s contributions and scope? Answer: [Yes] Justification: The main claims in the abstract are summarized under Our Contributions (Section 1.1) and described in detail in the rest of the paper. Guidelines: The answer NA means that the abstract and introduction do not include the claims made in the paper. The abstract and/or introduction should clearly state the claims made, including the contributions made in the paper and important assumptions and limitations. A No or NA answer to this question will not be perceived well by the reviewers. The claims made should match theoretical and experimental results, and reflect how much the results can be expected to generalize to other settings. It is fine to include aspirational goals as motivation as long as it is clear that these goals are not attained by the paper. 2. Limitations Question: Does the paper discuss the limitations of the work performed by the authors? Answer: [Yes] Justification: We discuss limitations and future directions of this paper in Section 5. Guidelines: The answer NA means that the paper has no limitation while the answer No means that the paper has limitations, but those are not discussed in the paper. The authors are encouraged to create a separate "Limitations" section in their paper. The paper should point out any strong assumptions and how robust the results are to violations of these assumptions (e.g., independence assumptions, noiseless settings, model well-specification, asymptotic approximations only holding locally). The authors should reflect on how these assumptions might be violated in practice and what the implications would be. The authors should reflect on the scope of the claims made, e.g., if the approach was only tested on a few datasets or with a few runs. In general, empirical results often depend on implicit assumptions, which should be articulated. The authors should reflect on the factors that influence the performance of the approach. For example, a facial recognition algorithm may perform poorly when image resolution is low or images are taken in low lighting. Or a speech-to-text system might not be used reliably to provide closed captions for online lectures because it fails to handle technical jargon. The authors should discuss the computational efficiency of the proposed algorithms and how they scale with dataset size. If applicable, the authors should discuss possible limitations of their approach to address problems of privacy and fairness. While the authors might fear that complete honesty about limitations might be used by reviewers as grounds for rejection, a worse outcome might be that reviewers discover limitations that aren t acknowledged in the paper. The authors should use their best judgment and recognize that individual actions in favor of transparency play an important role in developing norms that preserve the integrity of the community. Reviewers will be specifically instructed to not penalize honesty concerning limitations. 3. Theory Assumptions and Proofs Question: For each theoretical result, does the paper provide the full set of assumptions and a complete (and correct) proof? Answer: [Yes] Justification: Proofs of all statements are included either in the main body, or in the supplementary material. Guidelines: The answer NA means that the paper does not include theoretical results. All the theorems, formulas, and proofs in the paper should be numbered and cross-referenced. All assumptions should be clearly stated or referenced in the statement of any theorems. The proofs can either appear in the main paper or the supplemental material, but if they appear in the supplemental material, the authors are encouraged to provide a short proof sketch to provide intuition. Inversely, any informal proof provided in the core of the paper should be complemented by formal proofs provided in appendix or supplemental material. Theorems and Lemmas that the proof relies upon should be properly referenced. 4. Experimental Result Reproducibility Question: Does the paper fully disclose all the information needed to reproduce the main experimental results of the paper to the extent that it affects the main claims and/or conclusions of the paper (regardless of whether the code and data are provided or not)? Answer: [Yes] Justification: All experimental details are provided. Guidelines: The answer NA means that the paper does not include experiments. If the paper includes experiments, a No answer to this question will not be perceived well by the reviewers: Making the paper reproducible is important, regardless of whether the code and data are provided or not. If the contribution is a dataset and/or model, the authors should describe the steps taken to make their results reproducible or verifiable. Depending on the contribution, reproducibility can be accomplished in various ways. For example, if the contribution is a novel architecture, describing the architecture fully might suffice, or if the contribution is a specific model and empirical evaluation, it may be necessary to either make it possible for others to replicate the model with the same dataset, or provide access to the model. In general. releasing code and data is often one good way to accomplish this, but reproducibility can also be provided via detailed instructions for how to replicate the results, access to a hosted model (e.g., in the case of a large language model), releasing of a model checkpoint, or other means that are appropriate to the research performed. While Neur IPS does not require releasing code, the conference does require all submissions to provide some reasonable avenue for reproducibility, which may depend on the nature of the contribution. For example (a) If the contribution is primarily a new algorithm, the paper should make it clear how to reproduce that algorithm. (b) If the contribution is primarily a new model architecture, the paper should describe the architecture clearly and fully. (c) If the contribution is a new model (e.g., a large language model), then there should either be a way to access this model for reproducing the results or a way to reproduce the model (e.g., with an open-source dataset or instructions for how to construct the dataset). (d) We recognize that reproducibility may be tricky in some cases, in which case authors are welcome to describe the particular way they provide for reproducibility. In the case of closed-source models, it may be that access to the model is limited in some way (e.g., to registered users), but it should be possible for other researchers to have some path to reproducing or verifying the results. 5. Open access to data and code Question: Does the paper provide open access to the data and code, with sufficient instructions to faithfully reproduce the main experimental results, as described in supplemental material? Answer: [Yes] Justification: The source code for privacy accounting is provided in a Google Colab and beam pipelines for implementing Poisson subsampling at scale are provided in Appendix A. Guidelines: The answer NA means that paper does not include experiments requiring code. Please see the Neur IPS code and data submission guidelines (https://nips.cc/public/ guides/Code Submission Policy) for more details. While we encourage the release of code and data, we understand that this might not be possible, so No is an acceptable answer. Papers cannot be rejected simply for not including code, unless this is central to the contribution (e.g., for a new open-source benchmark). The instructions should contain the exact command and environment needed to run to reproduce the results. See the Neur IPS code and data submission guidelines (https: //nips.cc/public/guides/Code Submission Policy) for more details. The authors should provide instructions on data access and preparation, including how to access the raw data, preprocessed data, intermediate data, and generated data, etc. The authors should provide scripts to reproduce all experimental results for the new proposed method and baselines. If only a subset of experiments are reproducible, they should state which ones are omitted from the script and why. At submission time, to preserve anonymity, the authors should release anonymized versions (if applicable). Providing as much information as possible in supplemental material (appended to the paper) is recommended, but including URLs to data and code is permitted. 6. Experimental Setting/Details Question: Does the paper specify all the training and test details (e.g., data splits, hyperparameters, how they were chosen, type of optimizer, etc.) necessary to understand the results? Answer: [Yes] Justification: Experimental details are provided in Section 4 and Appendix B. Guidelines: The answer NA means that the paper does not include experiments. The experimental setting should be presented in the core of the paper to a level of detail that is necessary to appreciate the results and make sense of them. The full details can be provided either with the code, in appendix, or as supplemental material. 7. Experiment Statistical Significance Question: Does the paper report error bars suitably and correctly defined or other appropriate information about the statistical significance of the experiments? Answer: [Yes] Justification: The training experiments have been repeated independently a few times and error bars are provided. However, due to significant cost of the experiments, we limit ourselves to only a small number of independent runs. These details are described in Section 4. Guidelines: The answer NA means that the paper does not include experiments. The authors should answer "Yes" if the results are accompanied by error bars, confidence intervals, or statistical significance tests, at least for the experiments that support the main claims of the paper. The factors of variability that the error bars are capturing should be clearly stated (for example, train/test split, initialization, random drawing of some parameter, or overall run with given experimental conditions). The method for calculating the error bars should be explained (closed form formula, call to a library function, bootstrap, etc.) The assumptions made should be given (e.g., Normally distributed errors). It should be clear whether the error bar is the standard deviation or the standard error of the mean. It is OK to report 1-sigma error bars, but one should state it. The authors should preferably report a 2-sigma error bar than state that they have a 96% CI, if the hypothesis of Normality of errors is not verified. For asymmetric distributions, the authors should be careful not to show in tables or figures symmetric error bars that would yield results that are out of range (e.g. negative error rates). If error bars are reported in tables or plots, The authors should explain in the text how they were calculated and reference the corresponding figures or tables in the text. 8. Experiments Compute Resources Question: For each experiment, does the paper provide sufficient information on the computer resources (type of compute workers, memory, time of execution) needed to reproduce the experiments? Answer: [Yes] Justification: The details on the compute resources are in Appendix B. Guidelines: The answer NA means that the paper does not include experiments. The paper should indicate the type of compute workers CPU or GPU, internal cluster, or cloud provider, including relevant memory and storage. The paper should provide the amount of compute required for each of the individual experimental runs as well as estimate the total compute. The paper should disclose whether the full research project required more compute than the experiments reported in the paper (e.g., preliminary or failed experiments that didn t make it into the paper). 9. Code Of Ethics Question: Does the research conducted in the paper conform, in every respect, with the Neur IPS Code of Ethics https://neurips.cc/public/Ethics Guidelines? Answer: [Yes] Justification: The paper conforms to the Neur IPS Code of Ethics as it only uses experiments on publicly available datasets, and does not use any crowdsourcing or human subjects. Guidelines: The answer NA means that the authors have not reviewed the Neur IPS Code of Ethics. If the authors answer No, they should explain the special circumstances that require a deviation from the Code of Ethics. The authors should make sure to preserve anonymity (e.g., if there is a special consideration due to laws or regulations in their jurisdiction). 10. Broader Impacts Question: Does the paper discuss both potential positive societal impacts and negative societal impacts of the work performed? Answer: [No] Justification: The research work is about differentially private training of ML models. We do not see anticipate any specific positive or negative societal impacts of this research, beyond the impacts of differential privacy itself. So we do not feel the need to discuss this in the paper. Guidelines: The answer NA means that there is no societal impact of the work performed. If the authors answer NA or No, they should explain why their work has no societal impact or why the paper does not address societal impact. Examples of negative societal impacts include potential malicious or unintended uses (e.g., disinformation, generating fake profiles, surveillance), fairness considerations (e.g., deployment of technologies that could make decisions that unfairly impact specific groups), privacy considerations, and security considerations. The conference expects that many papers will be foundational research and not tied to particular applications, let alone deployments. However, if there is a direct path to any negative applications, the authors should point it out. For example, it is legitimate to point out that an improvement in the quality of generative models could be used to generate deepfakes for disinformation. On the other hand, it is not needed to point out that a generic algorithm for optimizing neural networks could enable people to train models that generate Deepfakes faster. The authors should consider possible harms that could arise when the technology is being used as intended and functioning correctly, harms that could arise when the technology is being used as intended but gives incorrect results, and harms following from (intentional or unintentional) misuse of the technology. If there are negative societal impacts, the authors could also discuss possible mitigation strategies (e.g., gated release of models, providing defenses in addition to attacks, mechanisms for monitoring misuse, mechanisms to monitor how a system learns from feedback over time, improving the efficiency and accessibility of ML). 11. Safeguards Question: Does the paper describe safeguards that have been put in place for responsible release of data or models that have a high risk for misuse (e.g., pretrained language models, image generators, or scraped datasets)? Answer: [NA] Justification: This paper poses no such risks. Guidelines: The answer NA means that the paper poses no such risks. Released models that have a high risk for misuse or dual-use should be released with necessary safeguards to allow for controlled use of the model, for example by requiring that users adhere to usage guidelines or restrictions to access the model or implementing safety filters. Datasets that have been scraped from the Internet could pose safety risks. The authors should describe how they avoided releasing unsafe images. We recognize that providing effective safeguards is challenging, and many papers do not require this, but we encourage authors to take this into account and make a best faith effort. 12. Licenses for existing assets Question: Are the creators or original owners of assets (e.g., code, data, models), used in the paper, properly credited and are the license and terms of use explicitly mentioned and properly respected? Answer: [NA] Justification: This paper does not use existing assets. Guidelines: The answer NA means that the paper does not use existing assets. The authors should cite the original paper that produced the code package or dataset. The authors should state which version of the asset is used and, if possible, include a URL. The name of the license (e.g., CC-BY 4.0) should be included for each asset. For scraped data from a particular source (e.g., website), the copyright and terms of service of that source should be provided. If assets are released, the license, copyright information, and terms of use in the package should be provided. For popular datasets, paperswithcode.com/datasets has curated licenses for some datasets. Their licensing guide can help determine the license of a dataset. For existing datasets that are re-packaged, both the original license and the license of the derived asset (if it has changed) should be provided. If this information is not available online, the authors are encouraged to reach out to the asset s creators. 13. New Assets Question: Are new assets introduced in the paper well documented and is the documentation provided alongside the assets? Answer: [NA] Justification: This paper does not release any new assets. Guidelines: The answer NA means that the paper does not release new assets. Researchers should communicate the details of the dataset/code/model as part of their submissions via structured templates. This includes details about training, license, limitations, etc. The paper should discuss whether and how consent was obtained from people whose asset is used. At submission time, remember to anonymize your assets (if applicable). You can either create an anonymized URL or include an anonymized zip file. 14. Crowdsourcing and Research with Human Subjects Question: For crowdsourcing experiments and research with human subjects, does the paper include the full text of instructions given to participants and screenshots, if applicable, as well as details about compensation (if any)? Answer: [NA] Justification: This paper does not rely on any crowdsourcing with human subjects. Guidelines: The answer NA means that the paper does not involve crowdsourcing nor research with human subjects. Including this information in the supplemental material is fine, but if the main contribution of the paper involves human subjects, then as much detail as possible should be included in the main paper. According to the Neur IPS Code of Ethics, workers involved in data collection, curation, or other labor should be paid at least the minimum wage in the country of the data collector. 15. Institutional Review Board (IRB) Approvals or Equivalent for Research with Human Subjects Question: Does the paper describe potential risks incurred by study participants, whether such risks were disclosed to the subjects, and whether Institutional Review Board (IRB) approvals (or an equivalent approval/review based on the requirements of your country or institution) were obtained? Answer: [NA] Justification: This paper does not rely on any crowdsourcing with human subjects. Guidelines: The answer NA means that the paper does not involve crowdsourcing nor research with human subjects. Depending on the country in which research is conducted, IRB approval (or equivalent) may be required for any human subjects research. If you obtained IRB approval, you should clearly state this in the paper. We recognize that the procedures for this may vary significantly between institutions and locations, and we expect authors to adhere to the Neur IPS Code of Ethics and the guidelines for their institution. For initial submissions, do not include any information that would break anonymity (if applicable), such as the institution conducting the review.