Shuffle schedule.
This commit is contained in:
parent
21dd6cf9f2
commit
b32869952e
|
@ -8,30 +8,31 @@
|
||||||
9/12 | What does differential privacy actually mean? | JH
|
9/12 | What does differential privacy actually mean? | JH
|
||||||
9/17 | Composition and closure properties <br> <center> <h5> **Due: Project topics and groups** </h5> </center> | JH
|
9/17 | Composition and closure properties <br> <center> <h5> **Due: Project topics and groups** </h5> </center> | JH
|
||||||
9/19 | Exponential mechanism <br> **Paper:** McSherry and Talwar. [*Mechanism Design via Differential Privacy*](http://kunaltalwar.org/papers/expmech.pdf). | JH
|
9/19 | Exponential mechanism <br> **Paper:** McSherry and Talwar. [*Mechanism Design via Differential Privacy*](http://kunaltalwar.org/papers/expmech.pdf). | JH
|
||||||
|
**9/21 (FRI)** | Identity-Based Encryption from the Diffie-Hellman Assumption <br> <center> **SPECIAL TIME AND PLACE: CS 1240** </center> | Sanjam Garg
|
||||||
9/24 | Privacy for data streams <br> **Paper:** Chan, Shi, and Song. [*Private and Continual Release of Statistics*](https://eprint.iacr.org/2010/076.pdf). |
|
9/24 | Privacy for data streams <br> **Paper:** Chan, Shi, and Song. [*Private and Continual Release of Statistics*](https://eprint.iacr.org/2010/076.pdf). |
|
||||||
9/26 | Report-noisy-max and the Sparse Vector Technique | JH
|
9/26 | Report-noisy-max and the Sparse Vector Technique | JH
|
||||||
10/1 | Answering lots of queries: Private multiplicative weights <br> **Paper:** Hardt, Ligett, and McSherry. [*A Simple and Practical Algorithm for Differentially Private Data Release*](https://papers.nips.cc/paper/4548-a-simple-and-practical-algorithm-for-differentially-private-data-release.pdf). |
|
10/1 | Answering lots of queries: Private multiplicative weights <br> **Paper:** Hardt, Ligett, and McSherry. [*A Simple and Practical Algorithm for Differentially Private Data Release*](https://papers.nips.cc/paper/4548-a-simple-and-practical-algorithm-for-differentially-private-data-release.pdf). |
|
||||||
10/3 | Local differential privacy (theory) | JH
|
10/3 | Local differential privacy (theory) | JH
|
||||||
10/8 | Local differential privacy (practice) <br> **Paper:** Erlingsson, Pihur, and Korolova. [*RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response*](https://arxiv.org/pdf/1407.6981.pdf). |
|
10/8 | Local differential privacy (practice) <br> **Paper:** Erlingsson, Pihur, and Korolova. [*RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response*](https://arxiv.org/pdf/1407.6981.pdf). |
|
||||||
10/10 | More differential privacy <br> **Paper:** |
|
10/10 | More differential privacy <br> **Paper:** |
|
||||||
10/15 | <center> **NO CLASS: INSTRUCTOR AWAY** <br> <h5> **Due: Milestone 1** </h5> </center> |
|
10/15 | <center> **NO CLASS: INSTRUCTOR AWAY** <br> <center> <h5> **Due: Milestone 1** </h5> </center> |
|
||||||
|
10/17 | <center> **NO CLASS: INSTRUCTOR AWAY** </center> |
|
||||||
| <center> <h4> **Cryptographic Techniques** </h4> </center> |
|
| <center> <h4> **Cryptographic Techniques** </h4> </center> |
|
||||||
10/17 | Crypto: overview and basics | JH
|
10/22 | Crypto: overview and basics | JH
|
||||||
10/22 | Zero-knowledge proofs and oblivious transfer <br> **Paper:** |
|
|
||||||
10/24 | Secure multiparty computation <br> **Paper:** |
|
10/24 | Secure multiparty computation <br> **Paper:** |
|
||||||
10/29 | Homomorphic encryption <br> **Paper:** |
|
10/29 | Homomorphic encryption <br> **Paper:** |
|
||||||
10/31 | Verifiable computing <br> **Paper:** |
|
10/31 | Verifiable computing <br> **Paper:** |
|
||||||
|
11/5 | More applied crypto <br> **Paper:** |
|
||||||
| <center> <h4> **Language-Based Security** </h4> </center> |
|
| <center> <h4> **Language-Based Security** </h4> </center> |
|
||||||
11/5 | LangSec: overview and basics | JH
|
11/7 | LangSec: overview and basics | JH
|
||||||
11/7 | Secure Information Flow <br> **Paper:** |
|
|
||||||
11/12 | Secure Information Flow <br> **Paper:** |
|
11/12 | Secure Information Flow <br> **Paper:** |
|
||||||
11/14 | Languages for privacy <br> **Paper:** <br> <center> <h5> **Due: Milestone 2** </h5> </center> |
|
11/14 | Languages for privacy <br> **Paper:** <br> <center> <h5> **Due: Milestone 2** </h5> </center> |
|
||||||
11/19 | Languages for privacy <br> **Paper:** |
|
11/19 | Symbolic cryptography <br> **Paper:** |
|
||||||
11/21 | Symbolic cryptography <br> **Paper:** |
|
11/21 | More LangSec <br> **Paper:** |
|
||||||
| <center> <h4> **Adversarial Machine Learning** </h4> </center> |
|
| <center> <h4> **Adversarial Machine Learning** </h4> </center> |
|
||||||
11/26 | AML: overview and basics | JH
|
11/26 | AML: overview and basics <br> <center> **GUEST LECTURE** </center> | Somesh Jha
|
||||||
11/28 | Adversarial examples <br> **Paper:** |
|
11/28 | AML: overview and basics <br> <center> **GUEST LECTURE** </center> | Somesh Jha
|
||||||
12/3 | Adversarial examples <br> **Paper:** |
|
12/3 | Adversarial examples <br> **Paper:** |
|
||||||
12/5 | Training-time attacks <br> **Paper:** |
|
12/5 | Training-time attacks <br> **Paper:** |
|
||||||
12/10 | Training-time attacks <br> **Paper:** |
|
12/10 | Model-theft attacks <br> **Paper:** |
|
||||||
12/12 | Model-theft attacks <br> **Paper:** |
|
12/12 | More AML <br> **Paper:** |
|
||||||
|
|
Reference in New Issue