2018-01-29 18:39:49 +00:00
|
|
|
CS 839: Advanced Topics in Security and Privacy
|
|
|
|
Fall semester instruction begins: Sep 5, 2018 (W)
|
|
|
|
Thanksgiving recess: Nov 22-25, 2018
|
|
|
|
Last class day: Dec 12, 2018 (W)
|
|
|
|
Exams: Dec 14 (F)-Dec 20 (R), 2018
|
2018-06-03 22:53:10 +00:00
|
|
|
Length: 14.5 weeks, 29 classes plus exams
|
|
|
|
Lectures: MW 4:00-5:15 in CS 1325
|
2018-06-04 00:18:56 +00:00
|
|
|
|
|
|
|
# Lecture 01 (9/5): Course intro and Privacy overview
|
|
|
|
|
|
|
|
# Lecture 02 (9/10): DP Definition and Basic Mechanisms
|
|
|
|
|
|
|
|
# Lecture 03 (9/12): DP Implications
|
|
|
|
|
|
|
|
# Lecture 04 (9/17): DP Composition and closure properties
|
|
|
|
|
|
|
|
# Lecture 05 (9/19): DP Exponential mechanism
|
|
|
|
|
|
|
|
# Lecture 06 (9/24): DP Streaming counters
|
|
|
|
|
|
|
|
# Lecture 07 (9/26): DP Advanced mechanisms: RNM
|
|
|
|
|
|
|
|
# Lecture 08 (10/1): DP Advanced mechanisms: SVT
|
|
|
|
|
|
|
|
# Lecture 09 (10/3): DP Advanced mechanisms: PMW
|
|
|
|
|
|
|
|
# Lecture 10 (10/8): DP Local Model (Theory)
|
|
|
|
|
|
|
|
# Lecture 11 (10/10): DP Local Model (Practice)
|
|
|
|
|
|
|
|
# Lecture 12 (10/15): Crypto Overview and basics
|
|
|
|
|
|
|
|
# Lecture 13 (10/17): Crypto Zero-knowledge proofs
|
|
|
|
|
|
|
|
# Lecture 14 (10/22): Crypto OT and SMC
|
|
|
|
|
|
|
|
# Lecture 15 (10/24): Crypto OT and SMC
|
|
|
|
|
|
|
|
# Lecture 16 (10/29): Crypto FHE and verifiable computing
|
|
|
|
|
|
|
|
# Lecture 17 (10/31): Crypto FHE and verifiable computing
|
|
|
|
|
|
|
|
# Lecture 18 (11/5): LangSec Overview and basics
|
|
|
|
|
|
|
|
# Lecture 19 (11/7): LangSec Secure Information Flow
|
|
|
|
|
|
|
|
# Lecture 20 (11/12): LangSec Secure Information Flow
|
|
|
|
|
|
|
|
# Lecture 21 (11/14): LangSec Differential Privacy
|
|
|
|
|
|
|
|
# Lecture 22 (11/19): LangSec Differential Privacy
|
|
|
|
|
|
|
|
# Lecture 23 (11/21): LangSec Symbolic Crypto
|
|
|
|
|
|
|
|
# Lecture 24 (11/26): AML Overview and basics
|
|
|
|
|
|
|
|
# Lecture 25 (11/28): AML Adversarial Examples
|
|
|
|
|
|
|
|
# Lecture 26 (12/3): AML Adversarial Examples
|
|
|
|
|
|
|
|
# Lecture 27 (12/5): AML Training-time attacks
|
|
|
|
|
|
|
|
# Lecture 28 (12/10): AML Training-time attacks
|
|
|
|
|
|
|
|
# Lecture 29 (12/12): AML Model-theft attacks
|
|
|
|
|