2018-08-03 03:04:41 +00:00
# Calendar (Tentative)
2018-07-21 20:34:26 +00:00
2018-09-10 02:12:58 +00:00
For differential privacy, we will use the textbook *Algorithmic Foundations of
2018-09-10 02:16:42 +00:00
Data Privacy* (AFDP) by Cynthia Dwork and Aaron Roth, available
2018-09-10 02:12:58 +00:00
[here ](https://www.cis.upenn.edu/~aaroth/Papers/privacybook.pdf ).
2018-07-21 20:34:26 +00:00
Date | Topic | Presenter
:----:|-------|:---------:
2018-08-03 19:06:42 +00:00
| < center > < h4 > **Differential Privacy** </ h4 > </ center > |
2018-09-05 17:59:28 +00:00
9/5 | [Course welcome, introducing differential privacy ](../resources/slides/lecture01.html ) < br > **Paper:** Keshav. [*How to Read a Paper* ](https://web.stanford.edu/class/ee384m/Handouts/HowtoReadPaper.pdf ). | JH
2018-09-10 02:12:58 +00:00
9/10 | Basic private mechanisms < br > **Reading:** AFDP 3.2, 3.3 | JH
2018-09-10 04:24:53 +00:00
9/12 | What does differential privacy actually mean? < br > **Reading:** McSherry. [*Lunchtime for Differential Privacy* ](https://github.com/frankmcsherry/blog/blob/master/posts/2016-08-16.md ) (see also these [two ](https://github.com/frankmcsherry/blog/blob/master/posts/2016-06-14.md ) [posts ](https://github.com/frankmcsherry/blog/blob/master/posts/2016-08-29.md )) | JH
2018-09-10 04:29:24 +00:00
9/17 | Composition and closure properties < br > **Reading:** AFDP 3.5 < br > < center > < h5 > **Due: Project topics and groups** </ h5 > </ center > | JH
2018-08-03 18:58:52 +00:00
9/19 | Exponential mechanism < br > **Paper:** McSherry and Talwar. [*Mechanism Design via Differential Privacy* ](http://kunaltalwar.org/papers/expmech.pdf ). | JH
2018-09-05 02:52:52 +00:00
**9/21 (FRI)** | Identity-Based Encryption from the Diffie-Hellman Assumption < br > < center > **SPECIAL TIME AND PLACE: 4 PM, CS 1240** </ center > | Sanjam Garg
2018-09-04 00:52:13 +00:00
9/24 | Privacy for data streams < br > **Paper:** Chan, Shi, and Song. [*Private and Continual Release of Statistics* ](https://eprint.iacr.org/2010/076.pdf ). |
2018-09-10 04:36:27 +00:00
9/26 | Report-noisy-max and the Sparse Vector Technique < br > **Reading:** AFDP 3.3, 3.5 | JH
2018-09-04 00:52:13 +00:00
10/1 | Answering lots of queries: Private multiplicative weights < br > **Paper:** Hardt, Ligett, and McSherry. [*A Simple and Practical Algorithm for Differentially Private Data Release* ](https://papers.nips.cc/paper/4548-a-simple-and-practical-algorithm-for-differentially-private-data-release.pdf ). |
2018-09-10 04:31:31 +00:00
10/3 | Local and joint differential privacy < br > **Reading:** AFDP 12.1 | JH
2018-09-10 04:27:27 +00:00
10/8 | Local differential privacy < br > **Paper:** Erlingsson, Pihur, and Korolova. [*RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response* ](https://arxiv.org/pdf/1407.6981.pdf ). |
2018-09-04 03:37:18 +00:00
10/10 | More differential privacy < br > **Paper:** |
2018-09-05 02:51:31 +00:00
10/15 | < center > **NO CLASS: INSTRUCTOR AWAY** </ center > |
10/17 | < center > **NO CLASS: INSTRUCTOR AWAY** < br > < center > < h5 > **Due: Milestone 1** </ h5 > </ center > |
2018-09-04 03:36:10 +00:00
| < center > < h4 > **Cryptographic Techniques** </ h4 > </ center > |
2018-09-05 02:49:01 +00:00
10/22 | Crypto: overview and basics | JH
2018-09-04 00:52:13 +00:00
10/24 | Secure multiparty computation < br > **Paper:** |
10/29 | Homomorphic encryption < br > **Paper:** |
10/31 | Verifiable computing < br > **Paper:** |
2018-09-05 02:49:01 +00:00
11/5 | More applied crypto < br > **Paper:** |
2018-08-03 19:06:42 +00:00
| < center > < h4 > **Language-Based Security** </ h4 > </ center > |
2018-09-05 02:49:01 +00:00
11/7 | LangSec: overview and basics | JH
2018-07-21 20:34:26 +00:00
11/12 | Secure Information Flow < br > **Paper:** |
2018-08-03 19:06:42 +00:00
11/14 | Languages for privacy < br > **Paper:** < br > < center > < h5 > **Due: Milestone 2** </ h5 > </ center > |
2018-09-05 02:49:01 +00:00
11/19 | Symbolic cryptography < br > **Paper:** |
11/21 | More LangSec < br > **Paper:** |
2018-08-03 19:06:42 +00:00
| < center > < h4 > **Adversarial Machine Learning** </ h4 > </ center > |
2018-09-05 02:49:01 +00:00
11/26 | AML: overview and basics < br > < center > **GUEST LECTURE** </ center > | Somesh Jha
11/28 | AML: overview and basics < br > < center > **GUEST LECTURE** </ center > | Somesh Jha
2018-07-21 20:34:26 +00:00
12/3 | Adversarial examples < br > **Paper:** |
12/5 | Training-time attacks < br > **Paper:** |
2018-09-05 02:49:01 +00:00
12/10 | Model-theft attacks < br > **Paper:** |
12/12 | More AML < br > **Paper:** |