From b255bfa101caf46b121555c6a86634fbf5012630 Mon Sep 17 00:00:00 2001 From: Justin Hsu Date: Tue, 30 Jul 2019 18:18:30 -0500 Subject: [PATCH] Start updating course webpage. --- website/docs/assignments/project.md | 27 +++++------ website/docs/index.md | 28 ++++++----- website/docs/org.md | 16 +++--- website/docs/schedule/deadlines.md | 8 +-- website/docs/schedule/lectures.md | 75 ++++++++++++++--------------- website/mkdocs.yml | 10 ++-- 6 files changed, 83 insertions(+), 81 deletions(-) diff --git a/website/docs/assignments/project.md b/website/docs/assignments/project.md index ad7f0e4..8a45079 100644 --- a/website/docs/assignments/project.md +++ b/website/docs/assignments/project.md @@ -1,21 +1,20 @@ # Project Details The goal of the course project is to dive more deeply into a particular topic. -The project can be completed either **individually** or in **groups of two**. A -good project could potentially lead to a publishable result. This project could -take different forms: +The project can be completed in **groups of two or three**. A good project could +lead to some kind of publication. This project could take different forms: -- **Conceptual**: Extend a technique or explore a new application. -- **Experience report**: Experiment with an existing implementation, trying out - different examples and describing the overall experience. Or make a new - implementation. -- **Literature survey**: Select a couple (3-5) of related papers in a recent - research area. Summarize the significance, then compare and contrast. +- **Conceptual**: Develop a new technique, extend an existing method, or explore + a new application +- **Experience report**: Experiment with an implementation, trying out different + examples and describing the overall experience. Or implement something new. +- **Literature survey**: Select a couple (3-5) of closely related papers in a + recent research area. Summarize the significance, then compare and contrast. - **Other**: Feel free to propose other kinds of projects. If at any point you have trouble finding a project, run into difficulties, or -just want some advice, **please come talk to me** and I will try to help you get -unstuck. +just don't know what to do, **please come talk to me as soon as possible** and I +will help you get unstuck. ## Deliverables @@ -38,8 +37,7 @@ should be clear what remains to be done. Besides the milestones, the main deliverable of the project will be a written final report, around **15-20 pages** in length. Reports should be written in a -research paper style, covering the following broad areas in some reasonable -order: +research paper style, covering the following areas in some reasonable order: - **Introduce** the problem and the motivation. - **Review** background and preliminary material. @@ -47,8 +45,7 @@ order: - **Evaluate** the results. - **Survey** related work. -At the end of the course, each group will give a brief project presentation in -class. +At the end of the course, each group will give a brief project presentation. ## Deadlines diff --git a/website/docs/index.md b/website/docs/index.md index 49aaf08..15f0caf 100644 --- a/website/docs/index.md +++ b/website/docs/index.md @@ -1,32 +1,36 @@ -# Welcome to CS 839! +# Welcome to CS 763! -This is a graduate-level course covering advanced topics in security and -privacy. We will focus on four areas at the current research frontier: (1) -differential privacy, (2) applied cryptography, (3) language-based security, and -(4) adversarial machine learning. Students will read, present, and discuss +This is a graduate-level course covering advanced topics in security and privacy +in data science. We will focus on four areas at the current research frontier: +(1) differential privacy, (2) applied cryptography, (3) language-based security, +and (4) adversarial machine learning. Students will read, present, and discuss papers from the research literature (i.e., conference and journal papers), and complete a final project. ## Logistics -- **Course**: CS 839, Fall 2018 -- **Location**: CS 1325 -- **Time**: Mondays and Wednesdays, 4:00-5:15 +- **Course**: CS 763, Fall 2019 +- **Location**: CS 1263 +- **Time**: Monday, Wednesday, Friday, 2:00-3:15 + +For the first ten weeks, lectures will be held on Monday, Wednesday, and Friday. +In the remaining five weeks, you will work on your course projects. Though there +are no lectures scheduled in this period, I am available to meet as needed. ## Mailing List Please use the mailing list if you want to contact the whole course: -- [compsci839-1-f18@lists.wisc.edu](compsci839-1-f18@lists.wisc.edu) +- All registered students should be on this list. If you are not registered but -would like to follow along, please let me know and I will try to add you. +would like to follow along, please let me know and I will add you. Otherwise, you can contact me directly. To ensure that your email goes to the -right place, please start the subject with **CS839**. +right place, please start the subject with **CS763**. ## Course Staff - **Instructor**: [Justin Hsu](https://justinh.su) -- **Email**: justhsu@cs.wisc.edu +- **Email**: - **Location**: CS 6379 - **Office hours**: By appointment diff --git a/website/docs/org.md b/website/docs/org.md index 0e47079..d3f5c79 100644 --- a/website/docs/org.md +++ b/website/docs/org.md @@ -1,9 +1,7 @@ -Lectures will be loosely organized around four **modules**: differential -privacy, applied cryptography, language-based security, and adversarial machine -learning. I will give most of the lectures for the first module (differential -privacy). For the other modules, I will give an overview lecture surveying the -topic and background material. Then, each student will lead one lecture, -presenting a paper and guiding the discussion. +Lectures will be loosely organized around three core modules: differential +privacy, adversarial machine learning, and applied cryptography. We will also +cover two advanced modules: algorithmic fairness, and PL and verification +techniques. This is a graduate seminar, so not all lectures are set in stone and there is considerable flexibility in the material. If you are interested in something not @@ -34,6 +32,12 @@ a few sentences per question. These questions will help you check that you have understood the papers---they are not meant to be very difficult or time-consuming and they will not be graded in detail. +## Course Materials + +For differential privacy, we will use the textbook *Algorithmic Foundations of +Data Privacy* (AFDP) by Cynthia Dwork and Aaron Roth, available +[here](https://www.cis.upenn.edu/~aaroth/Papers/privacybook.pdf). + ## Course Project The other main component is the **course project**. You will work individually diff --git a/website/docs/schedule/deadlines.md b/website/docs/schedule/deadlines.md index 9efc766..a48a95f 100644 --- a/website/docs/schedule/deadlines.md +++ b/website/docs/schedule/deadlines.md @@ -1,4 +1,4 @@ -The first key date is **September 19**. Before this date, you should: +The first key date is **September 16**. By this date, you should: - **Check in** with me briefly. - **Sign up** to present a paper. @@ -6,6 +6,6 @@ The first key date is **September 19**. Before this date, you should: you should have an initial direction. ## Project Deadlines -- Milestone 1: **October 17** -- Milestone 2: **November 14** -- Final writeup and presentation: **December 14** +- Milestone 1: **October 7** +- Milestone 2: **November 8** +- Final writeup and presentation: **December 11** (TBD) diff --git a/website/docs/schedule/lectures.md b/website/docs/schedule/lectures.md index 80a581f..c71fbac 100644 --- a/website/docs/schedule/lectures.md +++ b/website/docs/schedule/lectures.md @@ -1,43 +1,40 @@ -# Calendar (Tentative) +# Calendar -For differential privacy, we will use the textbook *Algorithmic Foundations of -Data Privacy* (AFDP) by Cynthia Dwork and Aaron Roth, available -[here](https://www.cis.upenn.edu/~aaroth/Papers/privacybook.pdf). - - Date | Topic | Presenter + Date | Topic | Notes :----:|-------|:---------: |

**Differential Privacy**

| -9/5 | [Course welcome, introducing differential privacy](../resources/slides/lecture-welcome.html)
**Paper:** Keshav. [*How to Read a Paper*](https://web.stanford.edu/class/ee384m/Handouts/HowtoReadPaper.pdf). | Justin -9/10 | Basic private mechanisms
**Reading:** AFDP 3.2, 3.3 | Justin -9/12 | Composition and closure properties
**Reading:** AFDP 3.5 | Justin -9/17 | What does differential privacy actually mean?
**Reading:** McSherry. [*Lunchtime for Differential Privacy*](https://github.com/frankmcsherry/blog/blob/master/posts/2016-08-16.md) (see also these [two](https://github.com/frankmcsherry/blog/blob/master/posts/2016-06-14.md) [posts](https://github.com/frankmcsherry/blog/blob/master/posts/2016-08-29.md)) | Justin -9/19 | Exponential mechanism
**Paper:** McSherry and Talwar. [*Mechanism Design via Differential Privacy*](http://kunaltalwar.org/papers/expmech.pdf).
**Due: Project topics and groups**
| Justin -**9/21 (FRI)** | Identity-Based Encryption from the Diffie-Hellman Assumption
**SPECIAL TIME AND PLACE: 4 PM, CS 1240**
| Sanjam Garg -9/24 | Advanced mechanisms
Report-noisy-max, Sparse Vector Technique, and Private Multiplicative Weights
**Reading:** AFDP 3.3, 3.5, 4.2 | Justin -9/26 | Privacy for data streams
**Paper:** Chan, Shi, and Song. [*Private and Continual Release of Statistics*](https://eprint.iacr.org/2010/076.pdf). | Yinglun -10/1 | Local differential privacy
**Paper:** Erlingsson, Pihur, and Korolova. [*RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response*](https://arxiv.org/pdf/1407.6981.pdf). | Justin +9/4 | [Course welcome](../resources/slides/lecture-welcome.html)
**Paper:** Keshav. [*How to Read a Paper*](https://web.stanford.edu/class/ee384m/Handouts/HowtoReadPaper.pdf). | +9/6 | | +9/9 | | +9/11 | | +9/13 | | |

**Adversarial Machine Learning**

| -10/3 | [AML: overview and basics](../resources/slides/somesh-aml.pdf)
**GUEST LECTURE**
| Somesh Jha -10/8 | History of Adversarial ML
**Paper:** Biggio and Roli. [*Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning*](https://arxiv.org/pdf/1712.03141). | Meghana -10/10 | Adversarial examples
**Paper:** Szegedy, Zaremba, Sutskever, et al. [*Intriguing Properties of Neural Networks*](https://arxiv.org/pdf/1312.6199.pdf). | Shimaa -10/15 |
**NO CLASS: INSTRUCTOR AWAY**
| -10/17 |
**NO CLASS: INSTRUCTOR AWAY**
**Due: Milestone 1**
| -10/22 | Adversarial examples
**Paper:** Goodfellow, Schlens, and Szegedy. [*Explaining and Harnessing Adversarial Examples*](https://arxiv.org/abs/1412.6572). | Kyrie -10/24 | Real-world attacks
**Paper:** Eykholt, Evtimov, Fernandes, et al. [*Robust Physical-World Attacks on Deep Learning Models*](https://arxiv.org/pdf/1707.08945.pdf). | Hiba -10/29 | Detection methods
**Paper:** Carlini and Wagner. [*Towards Evaluating the Robustness of Neural Networks*](https://arxiv.org/pdf/1608.04644.pdf). | Yiqin -10/31 | Detection methods
**Paper:** Carlini and Wagner. [*Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods*](https://arxiv.org/pdf/1705.07263.pdf). | Junxiong -11/5 | Defensive measures
**Paper:** Steinhardt, Koh, and Liang. [*Certified Defenses for Data Poisoning Attacks*](https://arxiv.org/pdf/1706.03691.pdf). | Yaman -11/7 | Defensive measures
**Paper:** Madry, Makelov, Schmidt, Schmidt, Tsipras, and Valdu. [*Towards Deep Learning Models Resistant to Adversarial Attacks*](https://arxiv.org/pdf/1706.06083.pdf). | Maddie - |

**Cryptographic Techniques**

| -11/12 | Applied crypto: overview and basics | Justin -11/14 | Verifiable differential privacy
**Paper:** Narayan, Feldman, Papadimitriou, and Haeberlen. [*Verifiable Differential Privacy*](https://www.cis.upenn.edu/~ahae/papers/verdp-eurosys2015.pdf).
**Due: Milestone 2**
| Fayi -11/19 | Homomorphic encryption
**Paper:** Halevi and Shoup. [*Algorithms in HElib*](https://www.shoup.net/papers/helib.pdf). | Yue - |

**Language-Based Security**

| -11/21 | [Language-based security: overview and basics](../resources/slides/lecture-langsec.html) | Justin -11/26 | Languages for privacy
**Paper:** Reed and Pierce. [*Distance Makes the Types Grow Stronger: A Calculus for Differential Privacy*](https://www.cis.upenn.edu/~bcpierce/papers/dp.pdf). | Sam -11/28 | Cryptε: Crypto-Assisted Differential Privacy
**GUEST LECTURE**
| Amrita Roy Chowdhury -12/3 | Languages for authenticated datastructures
**Paper:** Miller, Hicks, Katz, and Shi. [*Authenticated Data Structures, Generically*](https://www.cs.umd.edu/~mwh/papers/gpads.pdf). | Zichuan -12/5 | Languages for oblivous computing
**Paper:** Zahur and Evans. [*Obliv-C: A Language for Extensible Data-Oblivious Computation*](https://eprint.iacr.org/2015/1153.pdf). | Zhiyi -12/10 | Languages for information flow
**Paper:** Griffin, Levy, Stefan, et al. [*Hails: Protecting Data Privacy in Untrusted Web Applications*](https://www.usenix.org/system/files/conference/osdi12/osdi12-final-35.pdf). | Arjun -12/12 | Timing channels
**Paper:** Wang, Ferraiuolo, Zhang, Myers, and Suh. [*SecDCP: Secure Dynamic Cache Partitioning for Efficient Timing Channel Protection*](http://www.csl.cornell.edu/~yao/docs/DAC2016.pdf). | Yan -**12/14 (FRI)** | Project presentations
**SPECIAL TIME AND PLACE: 10 AM, CS 2310**
**Due: Final project reports**
| +9/16 | | +9/18 | | +9/20 | | +9/23 | | +9/25 | | +9/27 | | + |

**Applied Cryptography**

| +9/30 | | +10/2 | | +10/4 | | +10/7 | | +10/9 | | +10/11 | | + |

**Advanced Topic: Algorithmic Fairness**

| +10/14 | | +10/16 | | +10/18 | | +10/21 | | +10/23 | | +10/25 | | + |

**Advanced Topic: PL and Verification**

| +10/28 | | +10/30 | | +11/1 | | +11/4 | | +11/6 | | +11/8 | | + |

**No Lectures: Work on Projects**

| +12/11 (TBD) | Project Presentations | diff --git a/website/mkdocs.yml b/website/mkdocs.yml index a7dc56c..b0f8057 100644 --- a/website/mkdocs.yml +++ b/website/mkdocs.yml @@ -1,7 +1,7 @@ -site_name: 'CS 839: Topics in Security and Privacy Technologies (Fall 2018)' +site_name: 'CS 763: Security and Privacy in Data Science (Fall 2019)' site_url: '' -repo_url: 'https://git.justinh.su/justhsu/cs839' -site_description: 'Course webpage for CS 839: Topics in Security and Privacy Technologies (Fall 2018)' +repo_url: 'https://git.justinh.su/justhsu/cs763' +site_description: 'Course webpage for CS 763: Security and Privacy in Data Science (Fall 2019)' site_author: 'Justin Hsu' theme: @@ -12,8 +12,8 @@ theme: logo: 'assets/images/favicon.ico' favicon: 'assets/images/favicon.ico' palette: - primary: blue grey - accent: blue grey + primary: red + accent: red nav: - Home: