Streamline site.
This commit is contained in:
parent
25d2509e0a
commit
43da1551a0
|
@ -1,5 +1,3 @@
|
||||||
# Communications
|
|
||||||
|
|
||||||
## Mailing list
|
## Mailing list
|
||||||
|
|
||||||
## Course staff
|
## Course staff
|
||||||
|
|
|
@ -1,5 +1,3 @@
|
||||||
# Course Format
|
|
||||||
|
|
||||||
Lectures will be loosely organized around four modules: differential privacy,
|
Lectures will be loosely organized around four modules: differential privacy,
|
||||||
cryptography, language-based security, and adversarial machine learning. The
|
cryptography, language-based security, and adversarial machine learning. The
|
||||||
instructor will give most of the lectures for the first module, on differential
|
instructor will give most of the lectures for the first module, on differential
|
||||||
|
@ -16,11 +14,12 @@ to contact the instructor.
|
||||||
|
|
||||||
## Readings and Homework
|
## Readings and Homework
|
||||||
|
|
||||||
The bulk of this course consists of reading research papers. Before every
|
Paper discussions are a core component of this course. Students are expected to
|
||||||
lecture presenting a paper, students are expected to read the paper closely and
|
read papers before lecture, attend lectures, and participate in discussions.
|
||||||
understand its significance, including (a) the problem addressed by the paper,
|
Before every lecture presenting a paper, students are expected to read the paper
|
||||||
(b) the main contributions of the paper, and (c) how the authors solve the
|
closely and understand its significance, including (a) the problem addressed by
|
||||||
problem in some technical detail.
|
the paper, (b) the main contributions of the paper, and (c) how the authors
|
||||||
|
solve the problem in some technical detail.
|
||||||
|
|
||||||
The instructor will also send out 2-3 questions before every paper presentation.
|
The instructor will also send out 2-3 questions before every paper presentation.
|
||||||
Students will submit brief answers---no more than 1-2 paragraphs per
|
Students will submit brief answers---no more than 1-2 paragraphs per
|
||||||
|
@ -34,3 +33,17 @@ Students will work individually or in pairs on a topic of their choice,
|
||||||
producing a conference-style write-up and presenting their project at the end of
|
producing a conference-style write-up and presenting their project at the end of
|
||||||
the semester. This project should have the potential to turn into a research
|
the semester. This project should have the potential to turn into a research
|
||||||
paper or survey. Details can be found [here](projects/details.md).
|
paper or survey. Details can be found [here](projects/details.md).
|
||||||
|
|
||||||
|
## Grading and Evaluation
|
||||||
|
|
||||||
|
Grades will be assigned as follows:
|
||||||
|
|
||||||
|
- **Discussions: 15%** (Pre-lecture questions and class participation)
|
||||||
|
- **Paper presentation: 25%**
|
||||||
|
- **Final project: 60%** (First and second milestones, and final writeup)
|
||||||
|
|
||||||
|
## Academic Integrity
|
||||||
|
|
||||||
|
Pre-lecture questions should be done individually. The final project may be done
|
||||||
|
individually or in groups of two students. Collaboration projects with people
|
||||||
|
outside the class may be allowed, but must be approved by the instructor.
|
||||||
|
|
|
@ -1,18 +0,0 @@
|
||||||
# Course Policies
|
|
||||||
|
|
||||||
Paper discussions are a core component of this course. Students are expected to
|
|
||||||
read papers before lecture, attend lectures, and participate in discussions.
|
|
||||||
|
|
||||||
## Grading and Evaluation
|
|
||||||
|
|
||||||
Grades will be assigned as follows:
|
|
||||||
|
|
||||||
- **Discussions: 15%** (Pre-lecture questions and class participation)
|
|
||||||
- **Paper presentation: 25%**
|
|
||||||
- **Final project: 60%** (First and second milestones, and final writeup)
|
|
||||||
|
|
||||||
## Academic Integrity
|
|
||||||
|
|
||||||
Pre-lecture questions should be done individually. The final project may be done
|
|
||||||
individually or in groups of two students. Collaboration projects with people
|
|
||||||
outside the class may be allowed, but must be approved by the instructor.
|
|
|
@ -1,5 +1,3 @@
|
||||||
# Course Project
|
|
||||||
|
|
||||||
This course covers a wide range of topics in security and privacy. The goal of
|
This course covers a wide range of topics in security and privacy. The goal of
|
||||||
the course project is to dive more deeply into a particular topic individually
|
the course project is to dive more deeply into a particular topic individually
|
||||||
or in groups of two. This project could take different forms:
|
or in groups of two. This project could take different forms:
|
||||||
|
|
|
@ -1,4 +1,3 @@
|
||||||
# Previous Courses
|
|
||||||
- CSE 291: [Language-Based Security](https://cseweb.ucsd.edu/~dstefan/cse291-winter18/) (Deian Stefan, UCSD)
|
- CSE 291: [Language-Based Security](https://cseweb.ucsd.edu/~dstefan/cse291-winter18/) (Deian Stefan, UCSD)
|
||||||
- CSE 711: [Topics in Differential Privacy](https://www.acsu.buffalo.edu/~gaboardi/teaching/CSE711-spring16.html) (Marco Gaboardi, University at Buffalo)
|
- CSE 711: [Topics in Differential Privacy](https://www.acsu.buffalo.edu/~gaboardi/teaching/CSE711-spring16.html) (Marco Gaboardi, University at Buffalo)
|
||||||
- CS 800: [The Algorithmic Foundations of Data Privacy](https://www.cis.upenn.edu/~aaroth/courses/privacyF11.html) (Aaron Roth, UPenn)
|
- CS 800: [The Algorithmic Foundations of Data Privacy](https://www.cis.upenn.edu/~aaroth/courses/privacyF11.html) (Aaron Roth, UPenn)
|
||||||
|
|
|
@ -1,5 +1,3 @@
|
||||||
# Software
|
|
||||||
|
|
||||||
## Differential Privacy
|
## Differential Privacy
|
||||||
- [DFuzz](https://github.com/ejgallego/dfuzz)
|
- [DFuzz](https://github.com/ejgallego/dfuzz)
|
||||||
- [HOARe2](https://github.com/ejgallego/HOARe2)
|
- [HOARe2](https://github.com/ejgallego/HOARe2)
|
||||||
|
|
|
@ -1,5 +1,3 @@
|
||||||
# Deadlines
|
|
||||||
|
|
||||||
Before class on the dates indicated.
|
Before class on the dates indicated.
|
||||||
|
|
||||||
## Course Deadlines
|
## Course Deadlines
|
||||||
|
|
|
@ -1,5 +1,3 @@
|
||||||
# Syllabus
|
|
||||||
|
|
||||||
Security and Privacy are rapidly emerging as critical research areas.
|
Security and Privacy are rapidly emerging as critical research areas.
|
||||||
Vulnerabilities in software are found and exploited almost everyday
|
Vulnerabilities in software are found and exploited almost everyday
|
||||||
and with increasingly serious consequences (e.g., the Equifax massive data
|
and with increasingly serious consequences (e.g., the Equifax massive data
|
||||||
|
|
|
@ -19,14 +19,13 @@ pages:
|
||||||
- Syllabus: 'syllabus.md'
|
- Syllabus: 'syllabus.md'
|
||||||
- Course Format: 'format.md'
|
- Course Format: 'format.md'
|
||||||
- Communication: 'comms.md'
|
- Communication: 'comms.md'
|
||||||
- Policies: 'policies.md'
|
|
||||||
- Schedule:
|
- Schedule:
|
||||||
- Lectures: 'schedule/lectures.md'
|
- Lectures: 'schedule/lectures.md'
|
||||||
- Deadlines: 'schedule/deadlines.md'
|
- Deadlines: 'schedule/deadlines.md'
|
||||||
- Resources:
|
- Resources:
|
||||||
- Papers: 'resources/readings.md'
|
- Papers: 'resources/readings.md'
|
||||||
- Software: 'resources/software.md'
|
- Software: 'resources/software.md'
|
||||||
- Other Courses: 'resources/related.md'
|
- Related Courses: 'resources/related.md'
|
||||||
- Project:
|
- Project:
|
||||||
- Details: 'projects/details.md'
|
- Details: 'projects/details.md'
|
||||||
- Gallery: 'projects/final.md'
|
- Gallery: 'projects/final.md'
|
||||||
|
|
Reference in New Issue