cs763/website/docs/schedule/lectures.md

44 lines
5.7 KiB
Markdown
Raw Normal View History

2018-08-03 03:04:41 +00:00
# Calendar (Tentative)
2018-07-21 20:34:26 +00:00
2018-09-10 02:12:58 +00:00
For differential privacy, we will use the textbook *Algorithmic Foundations of
2018-09-10 02:16:42 +00:00
Data Privacy* (AFDP) by Cynthia Dwork and Aaron Roth, available
2018-09-10 02:12:58 +00:00
[here](https://www.cis.upenn.edu/~aaroth/Papers/privacybook.pdf).
2018-07-21 20:34:26 +00:00
Date | Topic | Presenter
:----:|-------|:---------:
2018-08-03 19:06:42 +00:00
| <center> <h4> **Differential Privacy** </h4> </center> |
2018-11-21 06:46:50 +00:00
9/5 | [Course welcome, introducing differential privacy](../resources/slides/lecture-welcome.html) <br> **Paper:** Keshav. [*How to Read a Paper*](https://web.stanford.edu/class/ee384m/Handouts/HowtoReadPaper.pdf). | Justin
2018-10-01 19:21:10 +00:00
9/10 | Basic private mechanisms <br> **Reading:** AFDP 3.2, 3.3 | Justin
9/12 | Composition and closure properties <br> **Reading:** AFDP 3.5 | Justin
9/17 | What does differential privacy actually mean? <br> **Reading:** McSherry. [*Lunchtime for Differential Privacy*](https://github.com/frankmcsherry/blog/blob/master/posts/2016-08-16.md) (see also these [two](https://github.com/frankmcsherry/blog/blob/master/posts/2016-06-14.md) [posts](https://github.com/frankmcsherry/blog/blob/master/posts/2016-08-29.md)) | Justin
9/19 | Exponential mechanism <br> **Paper:** McSherry and Talwar. [*Mechanism Design via Differential Privacy*](http://kunaltalwar.org/papers/expmech.pdf). <br> <center> <h5> **Due: Project topics and groups** </h5> </center> | Justin
2018-09-05 02:52:52 +00:00
**9/21 (FRI)** | Identity-Based Encryption from the Diffie-Hellman Assumption <br> <center> **SPECIAL TIME AND PLACE: 4 PM, CS 1240** </center> | Sanjam Garg
2018-10-01 19:21:10 +00:00
9/24 | Advanced mechanisms <br> Report-noisy-max, Sparse Vector Technique, and Private Multiplicative Weights <br> **Reading:** AFDP 3.3, 3.5, 4.2 | Justin
2018-09-20 19:47:24 +00:00
9/26 | Privacy for data streams <br> **Paper:** Chan, Shi, and Song. [*Private and Continual Release of Statistics*](https://eprint.iacr.org/2010/076.pdf). | Yinglun
2018-10-01 19:21:10 +00:00
10/1 | Local differential privacy <br> **Paper:** Erlingsson, Pihur, and Korolova. [*RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response*](https://arxiv.org/pdf/1407.6981.pdf). | Justin
2018-09-20 19:47:24 +00:00
| <center> <h4> **Adversarial Machine Learning** </h4> </center> |
2018-10-04 00:26:14 +00:00
10/3 | [AML: overview and basics](../resources/slides/somesh-aml.pdf) <br> <center> **GUEST LECTURE** </center> | Somesh Jha
2018-09-20 19:47:24 +00:00
10/8 | History of Adversarial ML <br> **Paper:** Biggio and Roli. [*Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning*](https://arxiv.org/pdf/1712.03141). | Meghana
10/10 | Adversarial examples <br> **Paper:** Szegedy, Zaremba, Sutskever, et al. [*Intriguing Properties of Neural Networks*](https://arxiv.org/pdf/1312.6199.pdf). | Shimaa
2018-09-05 02:51:31 +00:00
10/15 | <center> **NO CLASS: INSTRUCTOR AWAY** </center> |
10/17 | <center> **NO CLASS: INSTRUCTOR AWAY** <br> <center> <h5> **Due: Milestone 1** </h5> </center> |
2018-09-20 19:47:24 +00:00
10/22 | Adversarial examples <br> **Paper:** Goodfellow, Schlens, and Szegedy. [*Explaining and Harnessing Adversarial Examples*](https://arxiv.org/abs/1412.6572). | Kyrie
10/24 | Real-world attacks <br> **Paper:** Eykholt, Evtimov, Fernandes, et al. [*Robust Physical-World Attacks on Deep Learning Models*](https://arxiv.org/pdf/1707.08945.pdf). | Hiba
10/29 | Detection methods <br> **Paper:** Carlini and Wagner. [*Towards Evaluating the Robustness of Neural Networks*](https://arxiv.org/pdf/1608.04644.pdf). | Yiqin
10/31 | Detection methods <br> **Paper:** Carlini and Wagner. [*Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods*](https://arxiv.org/pdf/1705.07263.pdf). | Junxiong
11/5 | Defensive measures <br> **Paper:** Steinhardt, Koh, and Liang. [*Certified Defenses for Data Poisoning Attacks*](https://arxiv.org/pdf/1706.03691.pdf). | Yaman
2018-11-04 21:28:16 +00:00
11/7 | Defensive measures <br> **Paper:** Madry, Makelov, Schmidt, Schmidt, Tsipras, and Valdu. [*Towards Deep Learning Models Resistant to Adversarial Attacks*](https://arxiv.org/pdf/1706.06083.pdf). | Maddie
2018-09-04 03:36:10 +00:00
| <center> <h4> **Cryptographic Techniques** </h4> </center> |
2018-10-01 19:21:10 +00:00
11/12 | Applied crypto: overview and basics | Justin
2018-10-24 22:39:10 +00:00
11/14 | Verifiable differential privacy <br> **Paper:** Narayan, Feldman, Papadimitriou, and Haeberlen. [*Verifiable Differential Privacy*](https://www.cis.upenn.edu/~ahae/papers/verdp-eurosys2015.pdf). <br> <center> <h5> **Due: Milestone 2** </h5> </center> | Fayi
2018-11-12 03:39:44 +00:00
11/19 | Homomorphic encryption <br> **Paper:** Halevi and Shoup. [*Algorithms in HElib*](https://www.shoup.net/papers/helib.pdf). | Yue
2018-08-03 19:06:42 +00:00
| <center> <h4> **Language-Based Security** </h4> </center> |
2018-11-21 08:37:56 +00:00
11/21 | [Language-based security: overview and basics](../resources/slides/lecture-langsec.html) | Justin
2018-10-05 02:35:58 +00:00
11/26 | Languages for privacy <br> **Paper:** Reed and Pierce. [*Distance Makes the Types Grow Stronger: A Calculus for Differential Privacy*](https://www.cis.upenn.edu/~bcpierce/papers/dp.pdf). | Sam
2018-11-26 20:16:16 +00:00
11/28 | Cryptε: Crypto-Assisted Differential Privacy <br> <center> **GUEST LECTURE** </center> | Amrita Roy Chowdhury
2018-09-20 19:47:24 +00:00
12/3 | Languages for authenticated datastructures <br> **Paper:** Miller, Hicks, Katz, and Shi. [*Authenticated Data Structures, Generically*](https://www.cs.umd.edu/~mwh/papers/gpads.pdf). | Zichuan
12/5 | Languages for oblivous computing <br> **Paper:** Zahur and Evans. [*Obliv-C: A Language for Extensible Data-Oblivious Computation*](https://eprint.iacr.org/2015/1153.pdf). | Zhiyi
12/10 | Languages for information flow <br> **Paper:** Griffin, Levy, Stefan, et al. [*Hails: Protecting Data Privacy in Untrusted Web Applications*](https://www.usenix.org/system/files/conference/osdi12/osdi12-final-35.pdf). | Arjun
12/12 | Languages for preventing timing channels <br> **Paper:** Zhang, Askarov, and Myers. [*Language-Based Control and Mitigation of Timing Channels*](https://www.cs.cornell.edu/andru/papers/pltiming-pldi12.pdf). | Yan
2018-11-21 01:08:40 +00:00
**12/14 (FRI)** | Project presentations <br> <center> **SPECIAL TIME AND PLACE: 10 AM, CS 2310** </center> <center> <h5> **Due: Final project reports** </h5> </center> |