Draft schedule for 839.
This commit is contained in:
parent
28091ba43e
commit
e2b6c9c299
59
schedule.md
59
schedule.md
|
@ -5,3 +5,62 @@ Last class day: Dec 12, 2018 (W)
|
|||
Exams: Dec 14 (F)-Dec 20 (R), 2018
|
||||
Length: 14.5 weeks, 29 classes plus exams
|
||||
Lectures: MW 4:00-5:15 in CS 1325
|
||||
|
||||
# Lecture 01 (9/5): Course intro and Privacy overview
|
||||
|
||||
# Lecture 02 (9/10): DP Definition and Basic Mechanisms
|
||||
|
||||
# Lecture 03 (9/12): DP Implications
|
||||
|
||||
# Lecture 04 (9/17): DP Composition and closure properties
|
||||
|
||||
# Lecture 05 (9/19): DP Exponential mechanism
|
||||
|
||||
# Lecture 06 (9/24): DP Streaming counters
|
||||
|
||||
# Lecture 07 (9/26): DP Advanced mechanisms: RNM
|
||||
|
||||
# Lecture 08 (10/1): DP Advanced mechanisms: SVT
|
||||
|
||||
# Lecture 09 (10/3): DP Advanced mechanisms: PMW
|
||||
|
||||
# Lecture 10 (10/8): DP Local Model (Theory)
|
||||
|
||||
# Lecture 11 (10/10): DP Local Model (Practice)
|
||||
|
||||
# Lecture 12 (10/15): Crypto Overview and basics
|
||||
|
||||
# Lecture 13 (10/17): Crypto Zero-knowledge proofs
|
||||
|
||||
# Lecture 14 (10/22): Crypto OT and SMC
|
||||
|
||||
# Lecture 15 (10/24): Crypto OT and SMC
|
||||
|
||||
# Lecture 16 (10/29): Crypto FHE and verifiable computing
|
||||
|
||||
# Lecture 17 (10/31): Crypto FHE and verifiable computing
|
||||
|
||||
# Lecture 18 (11/5): LangSec Overview and basics
|
||||
|
||||
# Lecture 19 (11/7): LangSec Secure Information Flow
|
||||
|
||||
# Lecture 20 (11/12): LangSec Secure Information Flow
|
||||
|
||||
# Lecture 21 (11/14): LangSec Differential Privacy
|
||||
|
||||
# Lecture 22 (11/19): LangSec Differential Privacy
|
||||
|
||||
# Lecture 23 (11/21): LangSec Symbolic Crypto
|
||||
|
||||
# Lecture 24 (11/26): AML Overview and basics
|
||||
|
||||
# Lecture 25 (11/28): AML Adversarial Examples
|
||||
|
||||
# Lecture 26 (12/3): AML Adversarial Examples
|
||||
|
||||
# Lecture 27 (12/5): AML Training-time attacks
|
||||
|
||||
# Lecture 28 (12/10): AML Training-time attacks
|
||||
|
||||
# Lecture 29 (12/12): AML Model-theft attacks
|
||||
|
||||
|
|
Reference in New Issue