Update syllabus.
This commit is contained in:
parent
e2b6c9c299
commit
dadfa9b826
33
syllabus.md
33
syllabus.md
|
@ -16,26 +16,27 @@ covered. Adversarial ML (what happens to ML algorithms in the
|
||||||
presence of adversaries?) will be also be discussed. List of some
|
presence of adversaries?) will be also be discussed. List of some
|
||||||
topics that we will cover (obviously not complete) are given below.
|
topics that we will cover (obviously not complete) are given below.
|
||||||
|
|
||||||
Software Security
|
|
||||||
- Secure information flow
|
|
||||||
- Finding vulnerabilities
|
|
||||||
- Defensive measures and mitigations
|
|
||||||
|
|
||||||
Differential Privacy
|
Differential Privacy
|
||||||
- Basic mechanisms
|
- Basic properties and examples
|
||||||
- Local Differential Privacy
|
- Advanced mechanisms
|
||||||
|
- Local Differential Privacy
|
||||||
|
|
||||||
Cryptographic Techniques
|
Cryptographic Techniques
|
||||||
- Zero-knowledge proofs
|
- Zero-knowledge proofs
|
||||||
- Secure multi-party computation
|
- Secure multi-party computation
|
||||||
- Verifiable computation
|
- Verifiable computation
|
||||||
|
|
||||||
|
Language-based Security
|
||||||
|
- Secure information flow
|
||||||
|
- Differential privacy
|
||||||
|
- Symbolic cryptography
|
||||||
|
|
||||||
Adversarial Machine Learning
|
Adversarial Machine Learning
|
||||||
- Training-time attacks
|
- Training-time attacks
|
||||||
- Test-time attacks
|
- Test-time attacks
|
||||||
- Model theft attacks
|
- Model-theft attacks
|
||||||
|
|
||||||
Grading will be based on three components:
|
Grading will be based on three components:
|
||||||
- Reading research papers and writing reviews
|
- Reading research papers and writing reviews
|
||||||
- Homeworks
|
- Homeworks
|
||||||
- Class project
|
- Class project
|
||||||
|
|
Reference in New Issue