diff --git a/website/docs/schedule/lectures.md b/website/docs/schedule/lectures.md
index 8dd559f..42d0743 100644
--- a/website/docs/schedule/lectures.md
+++ b/website/docs/schedule/lectures.md
@@ -7,15 +7,15 @@ Data Privacy* (AFDP) by Cynthia Dwork and Aaron Roth, available
Date | Topic | Presenter
:----:|-------|:---------:
|
**Differential Privacy**
|
-9/5 | [Course welcome, introducing differential privacy](../resources/slides/lecture01.html)
**Paper:** Keshav. [*How to Read a Paper*](https://web.stanford.edu/class/ee384m/Handouts/HowtoReadPaper.pdf). | JH
-9/10 | Basic private mechanisms
**Reading:** AFDP 3.2, 3.3 | JH
-9/12 | Composition and closure properties
**Reading:** AFDP 3.5 | JH
-9/17 | What does differential privacy actually mean?
**Reading:** McSherry. [*Lunchtime for Differential Privacy*](https://github.com/frankmcsherry/blog/blob/master/posts/2016-08-16.md) (see also these [two](https://github.com/frankmcsherry/blog/blob/master/posts/2016-06-14.md) [posts](https://github.com/frankmcsherry/blog/blob/master/posts/2016-08-29.md)) | JH
-9/19 | Exponential mechanism
**Paper:** McSherry and Talwar. [*Mechanism Design via Differential Privacy*](http://kunaltalwar.org/papers/expmech.pdf).
**Due: Project topics and groups**
| JH
+9/5 | [Course welcome, introducing differential privacy](../resources/slides/lecture01.html)
**Paper:** Keshav. [*How to Read a Paper*](https://web.stanford.edu/class/ee384m/Handouts/HowtoReadPaper.pdf). | Justin
+9/10 | Basic private mechanisms
**Reading:** AFDP 3.2, 3.3 | Justin
+9/12 | Composition and closure properties
**Reading:** AFDP 3.5 | Justin
+9/17 | What does differential privacy actually mean?
**Reading:** McSherry. [*Lunchtime for Differential Privacy*](https://github.com/frankmcsherry/blog/blob/master/posts/2016-08-16.md) (see also these [two](https://github.com/frankmcsherry/blog/blob/master/posts/2016-06-14.md) [posts](https://github.com/frankmcsherry/blog/blob/master/posts/2016-08-29.md)) | Justin
+9/19 | Exponential mechanism
**Paper:** McSherry and Talwar. [*Mechanism Design via Differential Privacy*](http://kunaltalwar.org/papers/expmech.pdf).
**Due: Project topics and groups**
| Justin
**9/21 (FRI)** | Identity-Based Encryption from the Diffie-Hellman Assumption
**SPECIAL TIME AND PLACE: 4 PM, CS 1240** | Sanjam Garg
-9/24 | Advanced mechanisms
Report-noisy-max, Sparse Vector Technique, and Private Multiplicative Weights
**Reading:** AFDP 3.3, 3.5, 4.2 | JH
+9/24 | Advanced mechanisms
Report-noisy-max, Sparse Vector Technique, and Private Multiplicative Weights
**Reading:** AFDP 3.3, 3.5, 4.2 | Justin
9/26 | Privacy for data streams
**Paper:** Chan, Shi, and Song. [*Private and Continual Release of Statistics*](https://eprint.iacr.org/2010/076.pdf). | Yinglun
-10/1 | Local differential privacy
**Paper:** Erlingsson, Pihur, and Korolova. [*RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response*](https://arxiv.org/pdf/1407.6981.pdf). | JH
+10/1 | Local differential privacy
**Paper:** Erlingsson, Pihur, and Korolova. [*RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response*](https://arxiv.org/pdf/1407.6981.pdf). | Justin
| **Adversarial Machine Learning**
|
10/3 | AML: overview and basics
**GUEST LECTURE** | Somesh Jha
10/8 | History of Adversarial ML
**Paper:** Biggio and Roli. [*Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning*](https://arxiv.org/pdf/1712.03141). | Meghana
@@ -29,12 +29,12 @@ Data Privacy* (AFDP) by Cynthia Dwork and Aaron Roth, available
11/5 | Defensive measures
**Paper:** Steinhardt, Koh, and Liang. [*Certified Defenses for Data Poisoning Attacks*](https://arxiv.org/pdf/1706.03691.pdf). | Yaman
11/7 | Defensive measures
**Paper:** Madry, Makelov, Schmidt, Schmidt, Tsipras, and Valdu. [*Towards Deep Learning Models Resistant to Adversarial Attacks*](https://arxiv.org/pdf/1706.06083.pdf). | Maddy
| **Cryptographic Techniques**
|
-11/12 | Applied crypto: overview and basics | JH
+11/12 | Applied crypto: overview and basics | Justin
11/14 | Verifiable computing
**Paper:** Braun, Feldman, Ren, et al. [*Verifying Computations with State*](https://eprint.iacr.org/2013/356.pdf).
**Due: Milestone 2**
| Kan
11/19 | Verifiable differential privacy
**Paper:** Narayan, Feldman, Papadimitriou, and Haeberlen. [*Verifiable Differential Privacy*](https://www.cis.upenn.edu/~ahae/papers/verdp-eurosys2015.pdf). | Fayi
11/21 | Homomorphic encryption
**Paper:** Ducas and Micciancio. [*FHEW: Bootstrapping Homomorphic Encryption in Less than a Second*](https://eprint.iacr.org/2014/816.pdf). | Yue
| **Language-Based Security**
|
-11/26 | Language-based security: overview and basics | JH
+11/26 | Language-based security: overview and basics | Justin
11/28 | Languages for privacy
**Paper:** Reed and Pierce. [*Distance Makes the Types Grow Stronger: A Calculus for Differential Privacy*](https://www.cis.upenn.edu/~bcpierce/papers/dp.pdf). | Sam
12/3 | Languages for authenticated datastructures
**Paper:** Miller, Hicks, Katz, and Shi. [*Authenticated Data Structures, Generically*](https://www.cs.umd.edu/~mwh/papers/gpads.pdf). | Zichuan
12/5 | Languages for oblivous computing
**Paper:** Zahur and Evans. [*Obliv-C: A Language for Extensible Data-Oblivious Computation*](https://eprint.iacr.org/2015/1153.pdf). | Zhiyi