Update syllabus.
This commit is contained in:
parent
e2b6c9c299
commit
dadfa9b826
15
syllabus.md
15
syllabus.md
|
@ -16,13 +16,9 @@ covered. Adversarial ML (what happens to ML algorithms in the
|
||||||
presence of adversaries?) will be also be discussed. List of some
|
presence of adversaries?) will be also be discussed. List of some
|
||||||
topics that we will cover (obviously not complete) are given below.
|
topics that we will cover (obviously not complete) are given below.
|
||||||
|
|
||||||
Software Security
|
|
||||||
- Secure information flow
|
|
||||||
- Finding vulnerabilities
|
|
||||||
- Defensive measures and mitigations
|
|
||||||
|
|
||||||
Differential Privacy
|
Differential Privacy
|
||||||
- Basic mechanisms
|
- Basic properties and examples
|
||||||
|
- Advanced mechanisms
|
||||||
- Local Differential Privacy
|
- Local Differential Privacy
|
||||||
|
|
||||||
Cryptographic Techniques
|
Cryptographic Techniques
|
||||||
|
@ -30,10 +26,15 @@ Cryptographic Techniques
|
||||||
- Secure multi-party computation
|
- Secure multi-party computation
|
||||||
- Verifiable computation
|
- Verifiable computation
|
||||||
|
|
||||||
|
Language-based Security
|
||||||
|
- Secure information flow
|
||||||
|
- Differential privacy
|
||||||
|
- Symbolic cryptography
|
||||||
|
|
||||||
Adversarial Machine Learning
|
Adversarial Machine Learning
|
||||||
- Training-time attacks
|
- Training-time attacks
|
||||||
- Test-time attacks
|
- Test-time attacks
|
||||||
- Model theft attacks
|
- Model-theft attacks
|
||||||
|
|
||||||
Grading will be based on three components:
|
Grading will be based on three components:
|
||||||
- Reading research papers and writing reviews
|
- Reading research papers and writing reviews
|
||||||
|
|
Reference in New Issue