Polishing.
This commit is contained in:
parent
f42642764a
commit
87348f5c3b
|
@ -1,12 +1,12 @@
|
||||||
Lectures will be loosely organized around **four modules**: differential
|
Lectures will be loosely organized around four **modules**: differential
|
||||||
privacy, applied cryptography, language-based security, and adversarial machine
|
privacy, applied cryptography, language-based security, and adversarial machine
|
||||||
learning. I will give most of the lectures for the first module (differential
|
learning. I will give most of the lectures for the first module (differential
|
||||||
privacy). For the other modules, I will give an introductory lecture surveying
|
privacy). For the other modules, I will give an overview lecture surveying the
|
||||||
the topic and background material. Then, each student will lead one lecture,
|
topic and background material. Then, each student will lead one lecture,
|
||||||
presenting a paper and guiding the discussion.
|
presenting a paper and guiding the discussion.
|
||||||
|
|
||||||
This is a graduate seminar, so not all lectures are set in stone and there is
|
This is a graduate seminar, so not all lectures are set in stone and there is
|
||||||
considerable flexibility in the topics. If you are interested in something not
|
considerable flexibility in the material. If you are interested in something not
|
||||||
covered in the syllabus, please let me know!
|
covered in the syllabus, please let me know!
|
||||||
|
|
||||||
## Readings and Homework
|
## Readings and Homework
|
||||||
|
@ -19,20 +19,20 @@ paper, (b) the primary contributions of the paper, and (c) how the authors solve
|
||||||
the problem in some technical detail.
|
the problem in some technical detail.
|
||||||
|
|
||||||
The topics we will be reading and thinking about are from the recent research
|
The topics we will be reading and thinking about are from the recent research
|
||||||
literature---polished enough to be peer-reviewed and published, but not always
|
literature---peer-reviewed and published, but not always completely refined.
|
||||||
completely refined. Most research papers focus on a very narrow topic and are
|
Most research papers focus on a very narrow topic and are written for a very
|
||||||
written for a very specific technical audience. It also doesn't help that
|
specific technical audience. It also doesn't help that computer science
|
||||||
computer science researchers are generally not the clearest writers (though
|
researchers are generally not the clearest writers, though there are certainly
|
||||||
there are certainly exceptions). These
|
exceptions. These
|
||||||
[notes](https://web.stanford.edu/class/ee384m/Handouts/HowtoReadPaper.pdf) by
|
[notes](https://web.stanford.edu/class/ee384m/Handouts/HowtoReadPaper.pdf) by
|
||||||
Srinivasan Keshav may help you get more out of reading papers.
|
Srinivasan Keshav may help you get more out of reading papers.
|
||||||
|
|
||||||
To help you prepare for the class discussions, I will also send out a few
|
To help you prepare for the class discussions, I will also send out a few
|
||||||
questions at least 24 hours before every paper presentation. **Before** each
|
questions at least 24 hours before every paper presentation. **Before** each
|
||||||
lecture, you should send me brief answers---a short email is fine, no more than
|
lecture, you should send me brief answers---a short email is fine, no more than
|
||||||
a few sentences per question. These questions are for your benefit---they are
|
a few sentences per question. These questions will help you check that you have
|
||||||
not meant to be very difficult or time-consuming and they will not be graded in
|
understood the papers---they are not meant to be very difficult or
|
||||||
detail.
|
time-consuming and they will not be graded in detail.
|
||||||
|
|
||||||
## Course Project
|
## Course Project
|
||||||
|
|
||||||
|
@ -54,9 +54,8 @@ Grades will be assigned as follows:
|
||||||
|
|
||||||
By the end of this course, you should be able to...
|
By the end of this course, you should be able to...
|
||||||
|
|
||||||
- Summarize the basic concepts in each of the four course modules: differential
|
- Summarize the basic concepts in differential privacy, applied cryptography,
|
||||||
privacy, applied cryptography, language-based security, and adversarial
|
language-based security, and adversarial machine learning.
|
||||||
machine learning.
|
|
||||||
- Use standard techniques from differential privacy to design privacy-preserving
|
- Use standard techniques from differential privacy to design privacy-preserving
|
||||||
data analyses.
|
data analyses.
|
||||||
- Grasp the high-level concepts from research literature on the main course
|
- Grasp the high-level concepts from research literature on the main course
|
||||||
|
|
|
@ -1,17 +1,14 @@
|
||||||
Security and Privacy are rapidly emerging as critical research areas.
|
*Security and privacy* are rapidly emerging as critical research areas in
|
||||||
Vulnerabilities in software are found and exploited almost everyday
|
computer science and beyond. Vulnerabilities in software are found and exploited
|
||||||
and with increasingly serious consequences (e.g., the Equifax massive data
|
almost everyday, with grave consequences. Personal data today is aggregated at
|
||||||
breach). Moreover, our private data is increasingly at risk and thus
|
large scales, increasing the risk of privacy violations or breaches. Finally,
|
||||||
techniques that enhance privacy of sensitive data (known as
|
*machine-learning* (ML) algorithms are seeing real-world applications in
|
||||||
privacy-enhancing technologies (PETS)) are becoming increasingly
|
critical sectors (e.g., health care, automation, and finance), but their
|
||||||
important. Also, machine-learning (ML) is increasingly being utilized to
|
behavior in the presence of malicious adversaries is poorly understood.
|
||||||
make decisions in critical sectors (e.g., health care, automation, and
|
|
||||||
finance). However, in deploying these algorithms presence of malicious
|
|
||||||
adversaries is generally ignored.
|
|
||||||
|
|
||||||
This advanced topics class will tackle techniques related to all these themes.
|
This advanced topics class will cover recent techniques from the frontiers of
|
||||||
We will cover topics drawn from the following broad areas, depending on student
|
security and privacy research. Topics will be drawn from the following broad
|
||||||
interests:
|
areas, depending on student interest:
|
||||||
|
|
||||||
### Differential Privacy
|
### Differential Privacy
|
||||||
- Basic properties and examples
|
- Basic properties and examples
|
||||||
|
|
Reference in New Issue