yes, these are all interesting directions for differential privacy. my point was that since these are often trained first on original data, they are in some forms of data augmentation. it's more about the terminology and definition rather than the technical details of each, though.

Comments