Shuffle lecture schedule.

This commit is contained in:
Justin Hsu 2018-10-04 21:35:58 -05:00
parent 332b0cd577
commit 5252d66570
1 changed files with 5 additions and 5 deletions

View File

@ -30,12 +30,12 @@ Data Privacy* (AFDP) by Cynthia Dwork and Aaron Roth, available
11/7 | Defensive measures <br> **Paper:** Madry, Makelov, Schmidt, Schmidt, Tsipras, and Valdu. [*Towards Deep Learning Models Resistant to Adversarial Attacks*](https://arxiv.org/pdf/1706.06083.pdf). | Maddy 11/7 | Defensive measures <br> **Paper:** Madry, Makelov, Schmidt, Schmidt, Tsipras, and Valdu. [*Towards Deep Learning Models Resistant to Adversarial Attacks*](https://arxiv.org/pdf/1706.06083.pdf). | Maddy
| <center> <h4> **Cryptographic Techniques** </h4> </center> | | <center> <h4> **Cryptographic Techniques** </h4> </center> |
11/12 | Applied crypto: overview and basics | Justin 11/12 | Applied crypto: overview and basics | Justin
11/14 | Verifiable computing <br> **Paper:** Braun, Feldman, Ren, et al. [*Verifying Computations with State*](https://eprint.iacr.org/2013/356.pdf). <br> <center> <h5> **Due: Milestone 2** </h5> </center> | Kan 11/19 | Verifiable differential privacy <br> **Paper:** Narayan, Feldman, Papadimitriou, and Haeberlen. [*Verifiable Differential Privacy*](https://www.cis.upenn.edu/~ahae/papers/verdp-eurosys2015.pdf). <br> <center> <h5> **Due: Milestone 2** </h5> </center> | Fayi
11/19 | Verifiable differential privacy <br> **Paper:** Narayan, Feldman, Papadimitriou, and Haeberlen. [*Verifiable Differential Privacy*](https://www.cis.upenn.edu/~ahae/papers/verdp-eurosys2015.pdf). | Fayi 11/19 | Homomorphic encryption <br> **Paper:** Ducas and Micciancio. [*FHEW: Bootstrapping Homomorphic Encryption in Less than a Second*](https://eprint.iacr.org/2014/816.pdf). | Yue
11/21 | Homomorphic encryption <br> **Paper:** Ducas and Micciancio. [*FHEW: Bootstrapping Homomorphic Encryption in Less than a Second*](https://eprint.iacr.org/2014/816.pdf). | Yue
| <center> <h4> **Language-Based Security** </h4> </center> | | <center> <h4> **Language-Based Security** </h4> </center> |
11/26 | Language-based security: overview and basics | Justin 11/21 | Language-based security: overview and basics | Justin
11/28 | Languages for privacy <br> **Paper:** Reed and Pierce. [*Distance Makes the Types Grow Stronger: A Calculus for Differential Privacy*](https://www.cis.upenn.edu/~bcpierce/papers/dp.pdf). | Sam 11/26 | Languages for privacy <br> **Paper:** Reed and Pierce. [*Distance Makes the Types Grow Stronger: A Calculus for Differential Privacy*](https://www.cis.upenn.edu/~bcpierce/papers/dp.pdf). | Sam
11/28 | <center> **TBA** </center> |
12/3 | Languages for authenticated datastructures <br> **Paper:** Miller, Hicks, Katz, and Shi. [*Authenticated Data Structures, Generically*](https://www.cs.umd.edu/~mwh/papers/gpads.pdf). | Zichuan 12/3 | Languages for authenticated datastructures <br> **Paper:** Miller, Hicks, Katz, and Shi. [*Authenticated Data Structures, Generically*](https://www.cs.umd.edu/~mwh/papers/gpads.pdf). | Zichuan
12/5 | Languages for oblivous computing <br> **Paper:** Zahur and Evans. [*Obliv-C: A Language for Extensible Data-Oblivious Computation*](https://eprint.iacr.org/2015/1153.pdf). | Zhiyi 12/5 | Languages for oblivous computing <br> **Paper:** Zahur and Evans. [*Obliv-C: A Language for Extensible Data-Oblivious Computation*](https://eprint.iacr.org/2015/1153.pdf). | Zhiyi
12/10 | Languages for information flow <br> **Paper:** Griffin, Levy, Stefan, et al. [*Hails: Protecting Data Privacy in Untrusted Web Applications*](https://www.usenix.org/system/files/conference/osdi12/osdi12-final-35.pdf). | Arjun 12/10 | Languages for information flow <br> **Paper:** Griffin, Levy, Stefan, et al. [*Hails: Protecting Data Privacy in Untrusted Web Applications*](https://www.usenix.org/system/files/conference/osdi12/osdi12-final-35.pdf). | Arjun