2018-08-03 22:04:42 +00:00
|
|
|
|
Lectures will be loosely organized around **four modules**: differential
|
2018-08-27 23:53:40 +00:00
|
|
|
|
privacy, applied cryptography, language-based security, and adversarial machine
|
2018-08-03 22:04:42 +00:00
|
|
|
|
learning. I will give most of the lectures for the first module (differential
|
|
|
|
|
privacy). For the other modules, I will give an introductory lecture surveying
|
|
|
|
|
the topic and background material. Then, each student will lead one lecture,
|
2018-08-03 21:57:26 +00:00
|
|
|
|
presenting a paper and guiding the discussion.
|
2018-07-21 20:34:26 +00:00
|
|
|
|
|
2018-08-03 22:04:42 +00:00
|
|
|
|
This is a graduate seminar, so not all lectures are set in stone and there is
|
|
|
|
|
considerable flexibility in the topics. If you are interested in something not
|
|
|
|
|
covered in the syllabus, please let me know!
|
2018-07-21 20:34:26 +00:00
|
|
|
|
|
|
|
|
|
## Readings and Homework
|
|
|
|
|
|
2018-08-03 22:04:42 +00:00
|
|
|
|
**Paper discussions** are a core component of this course. You are expected to
|
|
|
|
|
read papers before lecture, attend lectures, and participate in discussions.
|
|
|
|
|
Before every paper presentation, students are expected to read the paper closely
|
|
|
|
|
and understand its significance, including (a) the main problem addressed by the
|
|
|
|
|
paper, (b) the primary contributions of the paper, and (c) how the authors solve
|
|
|
|
|
the problem in some technical detail.
|
|
|
|
|
|
|
|
|
|
The topics we will be reading and thinking about are from the recent research
|
|
|
|
|
literature---polished enough to be peer-reviewed and published, but not always
|
|
|
|
|
completely refined. Most research papers focus on a very narrow topic and are
|
|
|
|
|
written for a very specific technical audience. It also doesn't help that
|
|
|
|
|
computer science researchers are generally not the clearest writers (though
|
|
|
|
|
there are certainly exceptions). These
|
2018-08-03 04:03:07 +00:00
|
|
|
|
[notes](https://web.stanford.edu/class/ee384m/Handouts/HowtoReadPaper.pdf) by
|
|
|
|
|
Srinivasan Keshav may help you get more out of reading papers.
|
|
|
|
|
|
|
|
|
|
To help you prepare for the class discussions, I will also send out a few
|
2018-08-27 23:34:43 +00:00
|
|
|
|
questions at least 24 hours before every paper presentation. **Before** each
|
2018-08-03 04:03:07 +00:00
|
|
|
|
lecture, you should send me brief answers---a short email is fine, no more than
|
|
|
|
|
a few sentences per question. These questions are for your benefit---they are
|
|
|
|
|
not meant to be very difficult or time-consuming and they will not be graded in
|
|
|
|
|
detail.
|
2018-07-21 20:34:26 +00:00
|
|
|
|
|
|
|
|
|
## Course Project
|
|
|
|
|
|
2018-08-03 22:04:42 +00:00
|
|
|
|
The other main component is the **course project**. You will work individually
|
|
|
|
|
or in pairs on a topic of your choice, producing a conference-style write-up and
|
|
|
|
|
presenting the project at the end of the semester. Successful projects may have
|
|
|
|
|
the potential to turn into an eventual research paper or survey. Details can be
|
|
|
|
|
found [here](projects/details.md).
|
2018-07-27 04:12:22 +00:00
|
|
|
|
|
|
|
|
|
## Grading and Evaluation
|
|
|
|
|
|
|
|
|
|
Grades will be assigned as follows:
|
|
|
|
|
|
|
|
|
|
- **Discussions: 15%** (Pre-lecture questions and class participation)
|
|
|
|
|
- **Paper presentation: 25%**
|
|
|
|
|
- **Final project: 60%** (First and second milestones, and final writeup)
|
|
|
|
|
|
2018-08-27 23:53:40 +00:00
|
|
|
|
## Learning Outcomes
|
|
|
|
|
|
|
|
|
|
By the end of this course, you should be able to...
|
|
|
|
|
|
|
|
|
|
- Summarize the basic concepts in each of the four course modules: differential
|
|
|
|
|
privacy, applied cryptography, language-based security, and adversarial
|
|
|
|
|
machine learning.
|
|
|
|
|
- Use standard techniques from differential privacy to design privacy-preserving
|
|
|
|
|
data analyses.
|
|
|
|
|
- Grasp the high-level concepts from research literature on the main course
|
|
|
|
|
topics.
|
|
|
|
|
- Present and lead a discussion on recent research results.
|
|
|
|
|
- Carry out an in-depth exploration of one topic in the form of a self-directed
|
|
|
|
|
research project.
|
|
|
|
|
|
|
|
|
|
## Credit Information
|
|
|
|
|
|
|
|
|
|
This is a **3-credit** graduate seminar. We will meet for two 75-minute class
|
|
|
|
|
periods each week over the fall semester, and you should expect to work on
|
|
|
|
|
course learning activities for about 3 hours out of classroom for every class
|
|
|
|
|
period.
|
|
|
|
|
|
2018-07-27 04:12:22 +00:00
|
|
|
|
## Academic Integrity
|
|
|
|
|
|
2018-08-03 03:45:17 +00:00
|
|
|
|
The final project may be done individually or in groups of two students.
|
|
|
|
|
Collaborative projects with people outside the class may be allowed, but please
|
2018-08-03 22:04:42 +00:00
|
|
|
|
check with me first.
|
2018-08-27 23:34:27 +00:00
|
|
|
|
|
2018-08-27 23:44:56 +00:00
|
|
|
|
## Access and Accommodation
|
2018-08-27 23:34:27 +00:00
|
|
|
|
|
|
|
|
|
The University of Wisconsin-Madison supports the right of all enrolled students
|
|
|
|
|
to a full and equal educational opportunity. The Americans with Disabilities Act
|
|
|
|
|
(ADA), Wisconsin State Statute (36.12), and UW-Madison policy (Faculty Document
|
|
|
|
|
1071) require that students with disabilities be reasonably accommodated in
|
|
|
|
|
instruction and campus life. Reasonable accommodations for students with
|
|
|
|
|
disabilities is a shared faculty and student responsibility. Students are
|
|
|
|
|
expected to inform me of their need for instructional accommodations by the end
|
|
|
|
|
of the third week of the semester, or as soon as possible after a disability has
|
|
|
|
|
been incurred or recognized. I will work either directly with you or in
|
|
|
|
|
coordination with the McBurney Center to identify and provide reasonable
|
|
|
|
|
instructional accommodations. Disability information, including instructional
|
|
|
|
|
accommodations as part of a student’s educational record, is confidential and
|
|
|
|
|
protected under FERPA.
|