2018-08-03 03:04:41 +00:00
# Calendar (Tentative)
2018-07-21 20:34:26 +00:00
Date | Topic | Presenter
:----:|-------|:---------:
2018-08-03 19:06:42 +00:00
| < center > < h4 > **Differential Privacy** </ h4 > </ center > |
2018-09-04 00:52:13 +00:00
9/5 | Course welcome, introducing differential privacy < br > **Paper:** Keshav. [*How to Read a Paper* ](https://web.stanford.edu/class/ee384m/Handouts/HowtoReadPaper.pdf ). | JH
9/10 | Basic private mechanisms | JH
9/12 | What does differential privacy mean? | JH
2018-08-03 19:06:42 +00:00
9/17 | Composition and closure properties < br > < center > < h5 > **Due: Project topics and groups** </ h5 > </ center > | JH
2018-08-03 18:58:52 +00:00
9/19 | Exponential mechanism < br > **Paper:** McSherry and Talwar. [*Mechanism Design via Differential Privacy* ](http://kunaltalwar.org/papers/expmech.pdf ). | JH
2018-09-04 00:52:13 +00:00
9/24 | Privacy for data streams < br > **Paper:** Chan, Shi, and Song. [*Private and Continual Release of Statistics* ](https://eprint.iacr.org/2010/076.pdf ). |
9/26 | Report-noisy-max and the Sparse Vector Technique | JH
10/1 | Answering lots of queries: Private multiplicative weights < br > **Paper:** Hardt, Ligett, and McSherry. [*A Simple and Practical Algorithm for Differentially Private Data Release* ](https://papers.nips.cc/paper/4548-a-simple-and-practical-algorithm-for-differentially-private-data-release.pdf ). |
10/3 | Local differential privacy (theory) | JH
10/8 | Local differential privacy (practice) < br > **Paper:** Erlingsson, Pihur, and Korolova. [*RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response* ](https://arxiv.org/pdf/1407.6981.pdf ). |
2018-09-04 03:37:18 +00:00
10/10 | More differential privacy < br > **Paper:** |
2018-09-04 03:39:54 +00:00
10/15 | < center > **NO CLASS: INSTRUCTOR AWAY** < br > < h5 > **Due: Milestone 1** </ h5 > </ center > |
2018-09-04 03:36:10 +00:00
| < center > < h4 > **Cryptographic Techniques** </ h4 > </ center > |
2018-09-04 00:52:13 +00:00
10/17 | Crypto: overview and basics | JH
10/22 | Zero-knowledge proofs and oblivious transfer < br > **Paper:** |
10/24 | Secure multiparty computation < br > **Paper:** |
10/29 | Homomorphic encryption < br > **Paper:** |
10/31 | Verifiable computing < br > **Paper:** |
2018-08-03 19:06:42 +00:00
| < center > < h4 > **Language-Based Security** </ h4 > </ center > |
2018-07-21 20:34:26 +00:00
11/5 | LangSec: overview and basics | JH
11/7 | Secure Information Flow < br > **Paper:** |
11/12 | Secure Information Flow < br > **Paper:** |
2018-08-03 19:06:42 +00:00
11/14 | Languages for privacy < br > **Paper:** < br > < center > < h5 > **Due: Milestone 2** </ h5 > </ center > |
2018-07-21 20:34:26 +00:00
11/19 | Languages for privacy < br > **Paper:** |
11/21 | Symbolic cryptography < br > **Paper:** |
2018-08-03 19:06:42 +00:00
| < center > < h4 > **Adversarial Machine Learning** </ h4 > </ center > |
2018-07-21 20:34:26 +00:00
11/26 | AML: overview and basics | JH
11/28 | Adversarial examples < br > **Paper:** |
12/3 | Adversarial examples < br > **Paper:** |
12/5 | Training-time attacks < br > **Paper:** |
12/10 | Training-time attacks < br > **Paper:** |
12/12 | Model-theft attacks < br > **Paper:** |