Polishing.

This commit is contained in:
Justin Hsu 2018-08-03 18:04:42 -04:00
parent e2dac22ae0
commit 0b0b06745a
2 changed files with 30 additions and 29 deletions

View File

@ -1,34 +1,34 @@
Lectures will be loosely organized around four modules: differential privacy, Lectures will be loosely organized around **four modules**: differential
cryptography, language-based security, and adversarial machine learning. I will privacy, cryptography, language-based security, and adversarial machine
give most of the lectures for the first module, on differential privacy. For learning. I will give most of the lectures for the first module (differential
each of the remaining modules, I will give the first lecture introducing the privacy). For the other modules, I will give an introductory lecture surveying
topic and background material. Then, each student will lead one lecture, the topic and background material. Then, each student will lead one lecture,
presenting a paper and guiding the discussion. presenting a paper and guiding the discussion.
The topics we will be reading and thinking about are from the recent research This is a graduate seminar, so not all lectures are set in stone and there is
literature---polished enough to be peer-reviewed and published, but not always considerable flexibility in the topics. If you are interested in something not
completely refined. Given that this is a graduate course, not all lectures are covered in the syllabus, please let me know!
set in stone and there is considerable flexibility in the topics. If you are
interested in something not covered in the syllabus, please let me know.
## Readings and Homework ## Readings and Homework
Paper discussions are a core component of this course. You are expected to read **Paper discussions** are a core component of this course. You are expected to
papers before lecture, attend lectures, and participate in discussions. Before read papers before lecture, attend lectures, and participate in discussions.
every lecture presenting a paper, students are expected to read the paper Before every paper presentation, students are expected to read the paper closely
closely and understand its significance, including (a) the problem addressed by and understand its significance, including (a) the main problem addressed by the
the paper, (b) the main contributions of the paper, and (c) how the authors paper, (b) the primary contributions of the paper, and (c) how the authors solve
solve the problem in some technical detail. the problem in some technical detail.
Most research papers focus on a very narrow topic and are written for a very The topics we will be reading and thinking about are from the recent research
specific technical audience. It also doesn't help that computer science literature---polished enough to be peer-reviewed and published, but not always
researchers are generally not the clearest writers (though there are certainly completely refined. Most research papers focus on a very narrow topic and are
exceptions!). These written for a very specific technical audience. It also doesn't help that
computer science researchers are generally not the clearest writers (though
there are certainly exceptions). These
[notes](https://web.stanford.edu/class/ee384m/Handouts/HowtoReadPaper.pdf) by [notes](https://web.stanford.edu/class/ee384m/Handouts/HowtoReadPaper.pdf) by
Srinivasan Keshav may help you get more out of reading papers. Srinivasan Keshav may help you get more out of reading papers.
To help you prepare for the class discussions, I will also send out a few To help you prepare for the class discussions, I will also send out a few
questions at least 24 hours before every paper presentation. **Before** the questions at least 24 hours before every paper presentation. **Before** eah
lecture, you should send me brief answers---a short email is fine, no more than lecture, you should send me brief answers---a short email is fine, no more than
a few sentences per question. These questions are for your benefit---they are a few sentences per question. These questions are for your benefit---they are
not meant to be very difficult or time-consuming and they will not be graded in not meant to be very difficult or time-consuming and they will not be graded in
@ -36,11 +36,11 @@ detail.
## Course Project ## Course Project
The other main component is the course project. You will work individually or in The other main component is the **course project**. You will work individually
pairs on a topic of their choice, producing a conference-style write-up and or in pairs on a topic of your choice, producing a conference-style write-up and
presenting their project at the end of the semester. This project should have presenting the project at the end of the semester. Successful projects may have
the potential to turn into a research paper or survey. Details can be found the potential to turn into an eventual research paper or survey. Details can be
[here](projects/details.md). found [here](projects/details.md).
## Grading and Evaluation ## Grading and Evaluation
@ -54,4 +54,4 @@ Grades will be assigned as follows:
The final project may be done individually or in groups of two students. The final project may be done individually or in groups of two students.
Collaborative projects with people outside the class may be allowed, but please Collaborative projects with people outside the class may be allowed, but please
check with me beforehand. check with me first.

View File

@ -9,8 +9,9 @@ make decisions in critical sectors (e.g., health care, automation, and
finance). However, in deploying these algorithms presence of malicious finance). However, in deploying these algorithms presence of malicious
adversaries is generally ignored. adversaries is generally ignored.
This advanced topics class will tackle techniques related to all these This advanced topics class will tackle techniques related to all these themes.
themes. We will cover the following broad topics. We will cover topics drawn from the following broad areas, depending on student
interests:
### Differential Privacy ### Differential Privacy
- Basic properties and examples - Basic properties and examples