diff --git a/website/docs/resources/readings.md b/website/docs/resources/readings.md index d5edc7a..e267efd 100644 --- a/website/docs/resources/readings.md +++ b/website/docs/resources/readings.md @@ -254,7 +254,7 @@ - Cynthia Dwork and Aaron Roth. [*Algorithmic Foundations of Data Privacy*](https://www.cis.upenn.edu/~aaroth/Papers/privacybook.pdf). - Gilles Barthe, Marco Gaboardi, Justin Hsu, and Benjamin C. Pierce. - [*Programming Language Techniques for Differential Privacy*](https://dl.acm.org/citation.cfm?id=2893591&dl=ACM&coll=DL). + [*Programming Language Techniques for Differential Privacy*](https://siglog.hosting.acm.org/wp-content/uploads/2016/01/siglog_news_7.pdf). - Michael Walfish and Andrew J. Blumberg. [*Verifying Computations without Reexecuting Them*](http://delivery.acm.org/10.1145/2650000/2641562/p74-walfish.pdf?ip=24.59.48.254&id=2641562&acc=OA&key=4D4702B0C3E38B35%2E4D4702B0C3E38B35%2E4D4702B0C3E38B35%2E757E42EE4C319386&__acm__=1533144327_267b96b7bd723efc52072f0f79f6720d). - VĂ©ronique Cortier, Steve Kremer, and Bogdan Warinschi. diff --git a/website/docs/schedule/lectures.md b/website/docs/schedule/lectures.md index 717ed5d..6e3e99b 100644 --- a/website/docs/schedule/lectures.md +++ b/website/docs/schedule/lectures.md @@ -33,7 +33,7 @@ 10/28 | Overview and basic notions | JH | --- | 10/30 | Probabilistic programming languages
**Reading:** [*Probabilistic Programming*](https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/fose-icse2014.pdf) | Miru/Pierre | Nat/Geetika | 11/1 | Automata learning and interpretability
**Reading:** [*Model Learning*](https://m-cacm.acm.org/magazines/2017/2/212445-model-learning/fulltext)
**Reading:** [*Interpreting Finite Automata for Sequential Data*](https://arxiv.org/pdf/1611.07100) | Jack/Jack | Abhirav/Rajan | -11/4 | Programming languages for differential privacy
**Reading:** [*Programming Language Techniques for Differential Privacy*](https://dl.acm.org/citation.cfm?id=2893591&dl=ACM&coll=DL) | JH | --- | +11/4 | Programming languages for differential privacy
**Reading:** [*Programming Language Techniques for Differential Privacy*](https://siglog.hosting.acm.org/wp-content/uploads/2016/01/siglog_news_7.pdf) | JH | --- | 11/6 | Verifying neural networks
**Reading:** [*AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation*](https://files.sri.inf.ethz.ch/website/papers/sp2018.pdf)
**Reading:** [*DL2: Training and Querying Neural Networks with Logic*](http://proceedings.mlr.press/v97/fischer19a/fischer19a.pdf) | JH | --- | 11/8 | Verifying probabilistic programs
**Reading:** [*Advances and Challenges of Probabilistic Model Checking*](https://www.prismmodelchecker.org/papers/allerton10.pdf)
**Reading:** [*A Program Logic for Union Bounds*](https://arxiv.org/pdf/1602.05681) | JH | Miru | MS2 Due |

**No Lectures: Work on Projects**

| | |