diff --git a/website/docs/schedule/lectures.md b/website/docs/schedule/lectures.md
index 7eec278..ca2075f 100644
--- a/website/docs/schedule/lectures.md
+++ b/website/docs/schedule/lectures.md
@@ -3,32 +3,32 @@
Date | Topic | Presenter
:----:|-------|:---------:
9/5 | Course welcome
**Paper:** Keshav. [*How to Read a Paper*](https://web.stanford.edu/class/ee384m/Handouts/HowtoReadPaper.pdf). | JH
- |
**Differential Privacy** |
+ | **Differential Privacy**
|
9/10 | Definition and Basic Mechanisms | JH
9/12 | What does Differential Privacy mean? | JH
-9/17 | Composition and closure properties
**Due: Project topics and groups** | JH
+9/17 | Composition and closure properties
**Due: Project topics and groups**
| JH
9/19 | Exponential mechanism
**Paper:** McSherry and Talwar. [*Mechanism Design via Differential Privacy*](http://kunaltalwar.org/papers/expmech.pdf). | JH
9/24 | Streaming privacy: counters
**Paper:** Chan, Shi, and Song. [*Private and Continual Release of Statistics*](https://eprint.iacr.org/2010/076.pdf). |
9/26 | Advanced mechanisms: Report-noisy-max | JH
10/1 | Advanced mechanisms: Sparse Vector | JH
10/3 | Advanced mechanisms: Private multiplicative weights
**Paper:** Hardt, Ligett, and McSherry. [*A Simple and Practical Algorithm for Differentially Private Data Release*](https://papers.nips.cc/paper/4548-a-simple-and-practical-algorithm-for-differentially-private-data-release.pdf). |
10/8 | Local differential privacy (theory) | JH
-10/10 | Local differential privacy (practice)
**Paper:** Erlingsson, Pihur, and Korolova. [*RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response*](https://arxiv.org/pdf/1407.6981.pdf).
**Due: Milestone 1** |
- | **Cryptographic Techniques** |
+10/10 | Local differential privacy (practice)
**Paper:** Erlingsson, Pihur, and Korolova. [*RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response*](https://arxiv.org/pdf/1407.6981.pdf).
**Due: Milestone 1**
|
+ | **Cryptographic Techniques**
|
10/15 | Crypto: overview and basics | JH
10/17 | Zero-knowledge proofs
**Paper:** |
10/22 | Oblivious transfer and SMC
**Paper:** |
10/24 | Oblivious transfer and SMC
**Paper:** |
10/29 | Fully homomorphic encryption and verifiable computing
**Paper:** |
10/31 | Fully homomorphic encryption and verifiable computing
**Paper:** |
- | **Language-Based Security** |
+ | **Language-Based Security**
|
11/5 | LangSec: overview and basics | JH
11/7 | Secure Information Flow
**Paper:** |
11/12 | Secure Information Flow
**Paper:** |
-11/14 | Languages for privacy
**Paper:**
**Due: Milestone 2** |
+11/14 | Languages for privacy
**Paper:**
**Due: Milestone 2**
|
11/19 | Languages for privacy
**Paper:** |
11/21 | Symbolic cryptography
**Paper:** |
- | **Adversarial Machine Learning** |
+ | **Adversarial Machine Learning**
|
11/26 | AML: overview and basics | JH
11/28 | Adversarial examples
**Paper:** |
12/3 | Adversarial examples
**Paper:** |