Prune.
This commit is contained in:
parent
7f43ce056b
commit
8666e4baf8
66
schedule.md
66
schedule.md
|
@ -1,66 +0,0 @@
|
|||
CS 839: Advanced Topics in Security and Privacy
|
||||
Fall semester instruction begins: Sep 5, 2018 (W)
|
||||
Thanksgiving recess: Nov 22-25, 2018
|
||||
Last class day: Dec 12, 2018 (W)
|
||||
Exams: Dec 14 (F)-Dec 20 (R), 2018
|
||||
Length: 14.5 weeks, 29 classes plus exams
|
||||
Lectures: MW 4:00-5:15 in CS 1325
|
||||
|
||||
# Lecture 01 (9/5): Course intro and Privacy overview
|
||||
|
||||
# Lecture 02 (9/10): DP Definition and Basic Mechanisms
|
||||
|
||||
# Lecture 03 (9/12): DP Implications
|
||||
|
||||
# Lecture 04 (9/17): DP Composition and closure properties
|
||||
|
||||
# Lecture 05 (9/19): DP Exponential mechanism
|
||||
|
||||
# Lecture 06 (9/24): DP Streaming counters
|
||||
|
||||
# Lecture 07 (9/26): DP Advanced mechanisms: RNM
|
||||
|
||||
# Lecture 08 (10/1): DP Advanced mechanisms: SVT
|
||||
|
||||
# Lecture 09 (10/3): DP Advanced mechanisms: PMW
|
||||
|
||||
# Lecture 10 (10/8): DP Local Model (Theory)
|
||||
|
||||
# Lecture 11 (10/10): DP Local Model (Practice)
|
||||
|
||||
# Lecture 12 (10/15): Crypto Overview and basics
|
||||
|
||||
# Lecture 13 (10/17): Crypto Zero-knowledge proofs
|
||||
|
||||
# Lecture 14 (10/22): Crypto OT and SMC
|
||||
|
||||
# Lecture 15 (10/24): Crypto OT and SMC
|
||||
|
||||
# Lecture 16 (10/29): Crypto FHE and verifiable computing
|
||||
|
||||
# Lecture 17 (10/31): Crypto FHE and verifiable computing
|
||||
|
||||
# Lecture 18 (11/5): LangSec Overview and basics
|
||||
|
||||
# Lecture 19 (11/7): LangSec Secure Information Flow
|
||||
|
||||
# Lecture 20 (11/12): LangSec Secure Information Flow
|
||||
|
||||
# Lecture 21 (11/14): LangSec Differential Privacy
|
||||
|
||||
# Lecture 22 (11/19): LangSec Differential Privacy
|
||||
|
||||
# Lecture 23 (11/21): LangSec Symbolic Crypto
|
||||
|
||||
# Lecture 24 (11/26): AML Overview and basics
|
||||
|
||||
# Lecture 25 (11/28): AML Adversarial Examples
|
||||
|
||||
# Lecture 26 (12/3): AML Adversarial Examples
|
||||
|
||||
# Lecture 27 (12/5): AML Training-time attacks
|
||||
|
||||
# Lecture 28 (12/10): AML Training-time attacks
|
||||
|
||||
# Lecture 29 (12/12): AML Model-theft attacks
|
||||
|
42
syllabus.md
42
syllabus.md
|
@ -1,42 +0,0 @@
|
|||
Security and Privacy are rapidly emerging as critical research areas.
|
||||
Vulnerabilities in software are found and exploited almost everyday
|
||||
and with increasingly serious consequences (e.g., the Equifax massive data
|
||||
breach). Moreover, our private data is increasingly at risk and thus
|
||||
techniques that enhance privacy of sensitive data (known as
|
||||
privacy-enhancing technologies (PETS)) are becoming increasingly
|
||||
important. Also, machine-learning (ML) is increasingly being utilized to
|
||||
make decisions in critical sectors (e.g., health care, automation, and
|
||||
finance). However, in deploying these algorithms presence of malicious
|
||||
adversaries is generally ignored.
|
||||
|
||||
This advanced topics class will tackle techniques related to all these
|
||||
themes. We will investigate techniques to make software more secure.
|
||||
Techniques for ensuring privacy of sensitive data will also be
|
||||
covered. Adversarial ML (what happens to ML algorithms in the
|
||||
presence of adversaries?) will be also be discussed. List of some
|
||||
topics that we will cover (obviously not complete) are given below.
|
||||
|
||||
Differential Privacy
|
||||
- Basic properties and examples
|
||||
- Advanced mechanisms
|
||||
- Local Differential Privacy
|
||||
|
||||
Cryptographic Techniques
|
||||
- Zero-knowledge proofs
|
||||
- Secure multi-party computation
|
||||
- Verifiable computation
|
||||
|
||||
Language-based Security
|
||||
- Secure information flow
|
||||
- Differential privacy
|
||||
- Symbolic cryptography
|
||||
|
||||
Adversarial Machine Learning
|
||||
- Training-time attacks
|
||||
- Test-time attacks
|
||||
- Model-theft attacks
|
||||
|
||||
Grading will be based on three components:
|
||||
- Reading research papers and writing reviews
|
||||
- Homeworks
|
||||
- Class project
|
Reference in New Issue