Polishing.

This commit is contained in:
Justin Hsu 2018-08-28 23:06:35 -05:00
parent f42642764a
commit 87348f5c3b
2 changed files with 24 additions and 28 deletions

View File

@ -1,12 +1,12 @@
Lectures will be loosely organized around **four modules**: differential Lectures will be loosely organized around four **modules**: differential
privacy, applied cryptography, language-based security, and adversarial machine privacy, applied cryptography, language-based security, and adversarial machine
learning. I will give most of the lectures for the first module (differential learning. I will give most of the lectures for the first module (differential
privacy). For the other modules, I will give an introductory lecture surveying privacy). For the other modules, I will give an overview lecture surveying the
the topic and background material. Then, each student will lead one lecture, topic and background material. Then, each student will lead one lecture,
presenting a paper and guiding the discussion. presenting a paper and guiding the discussion.
This is a graduate seminar, so not all lectures are set in stone and there is This is a graduate seminar, so not all lectures are set in stone and there is
considerable flexibility in the topics. If you are interested in something not considerable flexibility in the material. If you are interested in something not
covered in the syllabus, please let me know! covered in the syllabus, please let me know!
## Readings and Homework ## Readings and Homework
@ -19,20 +19,20 @@ paper, (b) the primary contributions of the paper, and (c) how the authors solve
the problem in some technical detail. the problem in some technical detail.
The topics we will be reading and thinking about are from the recent research The topics we will be reading and thinking about are from the recent research
literature---polished enough to be peer-reviewed and published, but not always literature---peer-reviewed and published, but not always completely refined.
completely refined. Most research papers focus on a very narrow topic and are Most research papers focus on a very narrow topic and are written for a very
written for a very specific technical audience. It also doesn't help that specific technical audience. It also doesn't help that computer science
computer science researchers are generally not the clearest writers (though researchers are generally not the clearest writers, though there are certainly
there are certainly exceptions). These exceptions. These
[notes](https://web.stanford.edu/class/ee384m/Handouts/HowtoReadPaper.pdf) by [notes](https://web.stanford.edu/class/ee384m/Handouts/HowtoReadPaper.pdf) by
Srinivasan Keshav may help you get more out of reading papers. Srinivasan Keshav may help you get more out of reading papers.
To help you prepare for the class discussions, I will also send out a few To help you prepare for the class discussions, I will also send out a few
questions at least 24 hours before every paper presentation. **Before** each questions at least 24 hours before every paper presentation. **Before** each
lecture, you should send me brief answers---a short email is fine, no more than lecture, you should send me brief answers---a short email is fine, no more than
a few sentences per question. These questions are for your benefit---they are a few sentences per question. These questions will help you check that you have
not meant to be very difficult or time-consuming and they will not be graded in understood the papers---they are not meant to be very difficult or
detail. time-consuming and they will not be graded in detail.
## Course Project ## Course Project
@ -54,9 +54,8 @@ Grades will be assigned as follows:
By the end of this course, you should be able to... By the end of this course, you should be able to...
- Summarize the basic concepts in each of the four course modules: differential - Summarize the basic concepts in differential privacy, applied cryptography,
privacy, applied cryptography, language-based security, and adversarial language-based security, and adversarial machine learning.
machine learning.
- Use standard techniques from differential privacy to design privacy-preserving - Use standard techniques from differential privacy to design privacy-preserving
data analyses. data analyses.
- Grasp the high-level concepts from research literature on the main course - Grasp the high-level concepts from research literature on the main course

View File

@ -1,17 +1,14 @@
Security and Privacy are rapidly emerging as critical research areas. *Security and privacy* are rapidly emerging as critical research areas in
Vulnerabilities in software are found and exploited almost everyday computer science and beyond. Vulnerabilities in software are found and exploited
and with increasingly serious consequences (e.g., the Equifax massive data almost everyday, with grave consequences. Personal data today is aggregated at
breach). Moreover, our private data is increasingly at risk and thus large scales, increasing the risk of privacy violations or breaches. Finally,
techniques that enhance privacy of sensitive data (known as *machine-learning* (ML) algorithms are seeing real-world applications in
privacy-enhancing technologies (PETS)) are becoming increasingly critical sectors (e.g., health care, automation, and finance), but their
important. Also, machine-learning (ML) is increasingly being utilized to behavior in the presence of malicious adversaries is poorly understood.
make decisions in critical sectors (e.g., health care, automation, and
finance). However, in deploying these algorithms presence of malicious
adversaries is generally ignored.
This advanced topics class will tackle techniques related to all these themes. This advanced topics class will cover recent techniques from the frontiers of
We will cover topics drawn from the following broad areas, depending on student security and privacy research. Topics will be drawn from the following broad
interests: areas, depending on student interest:
### Differential Privacy ### Differential Privacy
- Basic properties and examples - Basic properties and examples