Polishing.
This commit is contained in:
parent
e2dac22ae0
commit
0b0b06745a
|
@ -1,34 +1,34 @@
|
||||||
Lectures will be loosely organized around four modules: differential privacy,
|
Lectures will be loosely organized around **four modules**: differential
|
||||||
cryptography, language-based security, and adversarial machine learning. I will
|
privacy, cryptography, language-based security, and adversarial machine
|
||||||
give most of the lectures for the first module, on differential privacy. For
|
learning. I will give most of the lectures for the first module (differential
|
||||||
each of the remaining modules, I will give the first lecture introducing the
|
privacy). For the other modules, I will give an introductory lecture surveying
|
||||||
topic and background material. Then, each student will lead one lecture,
|
the topic and background material. Then, each student will lead one lecture,
|
||||||
presenting a paper and guiding the discussion.
|
presenting a paper and guiding the discussion.
|
||||||
|
|
||||||
The topics we will be reading and thinking about are from the recent research
|
This is a graduate seminar, so not all lectures are set in stone and there is
|
||||||
literature---polished enough to be peer-reviewed and published, but not always
|
considerable flexibility in the topics. If you are interested in something not
|
||||||
completely refined. Given that this is a graduate course, not all lectures are
|
covered in the syllabus, please let me know!
|
||||||
set in stone and there is considerable flexibility in the topics. If you are
|
|
||||||
interested in something not covered in the syllabus, please let me know.
|
|
||||||
|
|
||||||
## Readings and Homework
|
## Readings and Homework
|
||||||
|
|
||||||
Paper discussions are a core component of this course. You are expected to read
|
**Paper discussions** are a core component of this course. You are expected to
|
||||||
papers before lecture, attend lectures, and participate in discussions. Before
|
read papers before lecture, attend lectures, and participate in discussions.
|
||||||
every lecture presenting a paper, students are expected to read the paper
|
Before every paper presentation, students are expected to read the paper closely
|
||||||
closely and understand its significance, including (a) the problem addressed by
|
and understand its significance, including (a) the main problem addressed by the
|
||||||
the paper, (b) the main contributions of the paper, and (c) how the authors
|
paper, (b) the primary contributions of the paper, and (c) how the authors solve
|
||||||
solve the problem in some technical detail.
|
the problem in some technical detail.
|
||||||
|
|
||||||
Most research papers focus on a very narrow topic and are written for a very
|
The topics we will be reading and thinking about are from the recent research
|
||||||
specific technical audience. It also doesn't help that computer science
|
literature---polished enough to be peer-reviewed and published, but not always
|
||||||
researchers are generally not the clearest writers (though there are certainly
|
completely refined. Most research papers focus on a very narrow topic and are
|
||||||
exceptions!). These
|
written for a very specific technical audience. It also doesn't help that
|
||||||
|
computer science researchers are generally not the clearest writers (though
|
||||||
|
there are certainly exceptions). These
|
||||||
[notes](https://web.stanford.edu/class/ee384m/Handouts/HowtoReadPaper.pdf) by
|
[notes](https://web.stanford.edu/class/ee384m/Handouts/HowtoReadPaper.pdf) by
|
||||||
Srinivasan Keshav may help you get more out of reading papers.
|
Srinivasan Keshav may help you get more out of reading papers.
|
||||||
|
|
||||||
To help you prepare for the class discussions, I will also send out a few
|
To help you prepare for the class discussions, I will also send out a few
|
||||||
questions at least 24 hours before every paper presentation. **Before** the
|
questions at least 24 hours before every paper presentation. **Before** eah
|
||||||
lecture, you should send me brief answers---a short email is fine, no more than
|
lecture, you should send me brief answers---a short email is fine, no more than
|
||||||
a few sentences per question. These questions are for your benefit---they are
|
a few sentences per question. These questions are for your benefit---they are
|
||||||
not meant to be very difficult or time-consuming and they will not be graded in
|
not meant to be very difficult or time-consuming and they will not be graded in
|
||||||
|
@ -36,11 +36,11 @@ detail.
|
||||||
|
|
||||||
## Course Project
|
## Course Project
|
||||||
|
|
||||||
The other main component is the course project. You will work individually or in
|
The other main component is the **course project**. You will work individually
|
||||||
pairs on a topic of their choice, producing a conference-style write-up and
|
or in pairs on a topic of your choice, producing a conference-style write-up and
|
||||||
presenting their project at the end of the semester. This project should have
|
presenting the project at the end of the semester. Successful projects may have
|
||||||
the potential to turn into a research paper or survey. Details can be found
|
the potential to turn into an eventual research paper or survey. Details can be
|
||||||
[here](projects/details.md).
|
found [here](projects/details.md).
|
||||||
|
|
||||||
## Grading and Evaluation
|
## Grading and Evaluation
|
||||||
|
|
||||||
|
@ -54,4 +54,4 @@ Grades will be assigned as follows:
|
||||||
|
|
||||||
The final project may be done individually or in groups of two students.
|
The final project may be done individually or in groups of two students.
|
||||||
Collaborative projects with people outside the class may be allowed, but please
|
Collaborative projects with people outside the class may be allowed, but please
|
||||||
check with me beforehand.
|
check with me first.
|
||||||
|
|
|
@ -9,8 +9,9 @@ make decisions in critical sectors (e.g., health care, automation, and
|
||||||
finance). However, in deploying these algorithms presence of malicious
|
finance). However, in deploying these algorithms presence of malicious
|
||||||
adversaries is generally ignored.
|
adversaries is generally ignored.
|
||||||
|
|
||||||
This advanced topics class will tackle techniques related to all these
|
This advanced topics class will tackle techniques related to all these themes.
|
||||||
themes. We will cover the following broad topics.
|
We will cover topics drawn from the following broad areas, depending on student
|
||||||
|
interests:
|
||||||
|
|
||||||
### Differential Privacy
|
### Differential Privacy
|
||||||
- Basic properties and examples
|
- Basic properties and examples
|
||||||
|
|
Reference in New Issue