
transformed the low-dimensional space with synthetic
points to high-dimensional space by topological au-
toencoders method. Our research highlights the ef-
ficacy of persistent homology-inspired synthesis in
producing differential private synthetic data with sig-
nificant topological structures. As the field of Topo-
logical Data Analysis (TDA) progresses, exploring al-
ternative metrics for computing the persistence dia-
gram, such as the persistence landscape, becomes cru-
cial. Adopting an alternative privacy framework like
zero-concentrated Differential Privacy has also shown
to yield lower errors in the privacy mechanism.
ACKNOWLEDGEMENTS
This work was supported in parts by funds from the
Natural Sciences and Engineering Research Coun-
cil of Canada (NSERC) Discovery and the Canada
First Research Excellence Fund (CFREF) Bridging
Divides programs.
REFERENCES
Alipourjeddi, N. and Miri, A. (2022). Publishing private
high-dimensional datasets: A topological approach.
In the 2022 International Wireless Communications
and Mobile Computing (IWCMC), pages 1142–1147.
IEEE.
Alipourjeddi, N. and Miri, A. (2023). Evaluating gener-
ative adversarial networks: A topological approach.
In the 2023 International Conference on Computing,
Networking and Communications (ICNC), pages 202–
206. IEEE.
Anai, H., Chazal, F., Glisse, M., Ike, Y., Inakoshi, H., Tinar-
rage, R., and Umeda, Y. (2020). Dtm-based filtrations.
In Topological Data Analysis: The Abel Symposium
2018, pages 33–66. Springer.
Asuncion, A. and Newman, D. (2007). UCI machine learn-
ing repository.
Avella-Medina, M. (2021). Privacy-preserving parametric
inference: a case for robust statistics. Journal of the
American Statistical Association, 116(534):969–983.
Binjubeir, M., Ahmed, A. A., Ismail, M. A. B., Sadiq, A. S.,
and Khan, M. K. (2019). Comprehensive survey on
big data privacy protection. IEEE Access, 8:20067–
20079.
Cao, W., Yan, Z., He, Z., and He, Z. (2020). A comprehen-
sive survey on geometric deep learning. IEEE Access,
8:35929–35949.
Chazal, F., De Silva, V., Glisse, M., and Oudot, S. (2016).
The structure and stability of persistence modules.
Springer.
Chazal, F., Fasy, B., Lecci, F., Michel, B., Rinaldo, A., Ri-
naldo, A., and Wasserman, L. (2017). Robust topo-
logical inference: Distance to a measure and kernel
distance. The Journal of Machine Learning Research,
18(1):5845–5884.
Chen, R., Xiao, Q., Zhang, Y., and Xu, J. (2015). Dif-
ferentially private high-dimensional data publication
via sampling-based inference. In the proceedings of
the 21th ACM SIGKDD international conference on
knowledge discovery and data mining, pages 129–
138. ACM.
Dwork, C., McSherry, F., Nissim, K., and Smith, A. (2016).
Calibrating noise to sensitivity in private data analysis.
Journal of Privacy and Confidentiality, 7(3):17–51.
Dwork, C., Roth, A., et al. (2014). The algorithmic founda-
tions of differential privacy. Foundations and Trends®
in Theoretical Computer Science, 9(3–4):211–407.
Goodfellow, I., Bengio, Y., and Courville, A. (2016). Deep
learning. MIT press.
Jiang, H., Yu, H., Cheng, X., Pei, J., Pless, R., and Yu,
J. (2023). DP2-Pub: Differentially private high-
dimensional data publication with invariant post ran-
domization. IEEE Transactions on Knowledge and
Data Engineering.
Kang, T., Kim, S., Sohn, J., and Awan, J. (2023). Differen-
tially private topological data analysis. arXiv preprint
arXiv:2305.03609.
Mahanan, W., Chaovalitwongse, W. A., and Natwichai, J.
(2021). Data privacy preservation algorithm with k-
anonymity. World Wide Web, 24:1551–1561.
McSherry, F. and Talwar, K. (2007). Mechanism design
via differential privacy. In the proceeding of 48th An-
nual IEEE Symposium on Foundations of Computer
Science (FOCS’07), pages 94–103. IEEE.
Moor, M., Horn, M., Rieck, B., and Borgwardt, K. (2020).
Topological autoencoders. In the proceeding of In-
ternational conference on machine learning, pages
7045–7054. PMLR.
Owada, T. (2022). Convergence of persistence diagram in
the sparse regime. The Annals of Applied Probability,
32(6):4706–4736.
Zhang, J., Cormode, G., Procopiuc, C. M., Srivastava, D.,
and Xiao, X. (2017). PrivBayes: Private data re-
lease via bayesian networks. ACM Transactions on
Database Systems (TODS), 42(4):1–41.
ICISSP 2024 - 10th International Conference on Information Systems Security and Privacy
852