Update syllabus.
This commit is contained in:
parent
e2b6c9c299
commit
dadfa9b826
15
syllabus.md
15
syllabus.md
|
@ -16,13 +16,9 @@ covered. Adversarial ML (what happens to ML algorithms in the
|
|||
presence of adversaries?) will be also be discussed. List of some
|
||||
topics that we will cover (obviously not complete) are given below.
|
||||
|
||||
Software Security
|
||||
- Secure information flow
|
||||
- Finding vulnerabilities
|
||||
- Defensive measures and mitigations
|
||||
|
||||
Differential Privacy
|
||||
- Basic mechanisms
|
||||
- Basic properties and examples
|
||||
- Advanced mechanisms
|
||||
- Local Differential Privacy
|
||||
|
||||
Cryptographic Techniques
|
||||
|
@ -30,10 +26,15 @@ Cryptographic Techniques
|
|||
- Secure multi-party computation
|
||||
- Verifiable computation
|
||||
|
||||
Language-based Security
|
||||
- Secure information flow
|
||||
- Differential privacy
|
||||
- Symbolic cryptography
|
||||
|
||||
Adversarial Machine Learning
|
||||
- Training-time attacks
|
||||
- Test-time attacks
|
||||
- Model theft attacks
|
||||
- Model-theft attacks
|
||||
|
||||
Grading will be based on three components:
|
||||
- Reading research papers and writing reviews
|
||||
|
|
Reference in New Issue