diff --git a/website/docs/org.md b/website/docs/org.md
index e5086a4..7a4bcc8 100644
--- a/website/docs/org.md
+++ b/website/docs/org.md
@@ -25,49 +25,47 @@ These three components are detailed below.
### Paper presentations
-**Paper discussions** are one of the main components of this course. Before
-every presentation, you are expected to read the paper closely and understand
-its significance, including (a) the main problem addressed by the paper, (b) the
-primary contributions of the paper, and (c) how the authors solve the problem in
-some technical detail. Of course, you are also expected to attend discussions
-and actively participate in the discussion.
+**Paper discussions** are one of the main components of this course. In groups
+of two (or very rarely three), you will present 2-3 papers on a related topic
+and lead the discussion; we will have presentations most Wednesdays and Fridays.
+Your presentation should last about **60 minutes** long, leaving the remainder
+of the time for a wrap-up discussion. Please sign up for a slot and a paper by
+**Monday, September 9**; while we will try to accommodate everyone's interests,
+we may need to adjust the selections for better balance and coverage.
-The topics we will be reading about are from the recent research
-literature---peer-reviewed and published, but not completely refined. Most
+Before every presentation, all students are expected to read the papers closely
+and understand their significance, including (a) the main problems, (b) the
+primary contributions, and (c) how the technical solution. Of course, you are
+also expected to attend discussions and actively participate in the discussion.
+
+We will be reading about topics from the recent research literature. Most
research papers focus on a very narrow topic and are written for a very specific
technical audience. It also doesn't help that researchers are generally not the
clearest writers, though there are certainly exceptions. These
[notes](https://web.stanford.edu/class/ee384m/Handouts/HowtoReadPaper.pdf) by
Srinivasan Keshav may help you get more out of reading papers.
-To help you prepare for the class discussions, I will also send out a few
-questions at least 24 hours before every paper presentation. **Before** each
-lecture, you should send me brief answers---a short email is fine, no more than
-a few sentences per question. These questions will help you check that you have
-understood the papers---they are not meant to be very difficult or
-time-consuming and they will not be graded in detail.
-
### Homeworks
There will be three small homework assignments, one for each of the core
-modules. You will play with software implementations of the methods we cover in
-class. These assignments are not weighted heavily, though they will be lightly
-graded; the goal is to give you a chance to write some code.
+modules, where you will play with software implementations of the methods we
+cover in class. These assignments will be lightly graded; the goal is to give
+you a chance to write some code and run some experiments.
### Course Project
-The main component is the **course project**. You will work individually or in
-pairs on a topic of your choice, producing a conference-style write-up and
-presenting the project at the end of the semester. Successful projects may have
-the potential to turn into an eventual research paper or survey. Details can be
-found [here](assignments/project.md).
+The main course component is the **course project**. You will work individually
+or in pairs on a topic of your choice, producing a conference-style write-up and
+presenting the project at the end of the semester. The best projects may
+eventually lead to a research paper or survey. Details can be found
+[here](assignments/project.md).
## Learning Outcomes
By the end of this course, you should be able to...
- Summarize the basic concepts in differential privacy, applied cryptography,
- language-based security, and adversarial machine learning.
+ and adversarial machine learning.
- Use techniques from differential privacy to design privacy-preserving data
analyses.
- Grasp the high-level concepts from research literature on the main course
diff --git a/website/docs/resources/readings.md b/website/docs/resources/readings.md
index 9f60daa..7824d93 100644
--- a/website/docs/resources/readings.md
+++ b/website/docs/resources/readings.md
@@ -24,6 +24,13 @@
ASIACRYPT 2015.
- Matthew Joseph, Aaron Roth, Jonathan Ullman, and Bo Waggoner.
[*Local Differential Privacy for Evolving Data*](https://arxiv.org/abs/1802.07128).
+ NIPS 2018.
+- Albert Cheu, Adam Smith, Jonathan Ullman, David Zeber, and Maxim Zhilyaev.
+ [*Distributed Differential Privacy via Shuffling*](https://arxiv.org/pdf/1808.01394).
+ EUROCRYPT 2019.
+- Jingcheng Liu and Kunal Talwar.
+ [*Private Selection from Private Candidates*](https://arxiv.org/pdf/1811.07971).
+ STOC 2019.
### Adversarial Machine Learning
- Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus.
@@ -47,6 +54,12 @@
- Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu.
[*Towards Deep Learning Models Resistant to Adversarial Attacks*](https://arxiv.org/pdf/1706.06083.pdf).
ICLR 2018.
+- Vitaly Feldman.
+ [*Does Learning Require Memorization? A Short Tale about a Long Tail*](https://arxiv.org/pdf/1906.05271).
+ arXiv 2019.
+- Nicholas Carlini, Chang Liu, Ăšlfar Erlingsson, Jernej Kos, and Dawn Song.
+ [*The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks*](https://arxiv.org/pdf/1802.08232).
+ USENIX Security 2019.
### Applied Cryptography
- Benjamin Braun, Ariel J. Feldman, Zuocheng Ren, Srinath Setty, Andrew J. Blumberg, and Michael Walfish.
@@ -73,6 +86,15 @@
- Arjun Narayan, Ariel Feldman, Antonis Papadimitriou, and Andreas Haeberlen.
[*Verifiable Differential Privacy*](https://www.cis.upenn.edu/~ahae/papers/verdp-eurosys2015.pdf).
EUROSYS 2015.
+- Henry Corrigan-Gibbs and Dan Boneh.
+ [*Prio: Private, Robust, and Scalable Computation of Aggregate Statistics*](https://people.csail.mit.edu/henrycg/files/academic/papers/nsdi17prio.pdf).
+ NSDI 2017.
+- Valerie Chen, Valerio Pastro, Mariana Raykova.
+ [*Secure Computation for Machine Learning With SPDZ*](https://arxiv.org/pdf/1901.00329).
+ NIPS 2018.
+- Wenting Zheng, Raluca Ada Popa, Joseph E. Gonzalez, Ion Stoica.
+ [*Helen: Maliciously Secure Coopetitive Learning for Linear Models*](https://arxiv.org/pdf/1907.07212).
+ S&P 2019.
### Algorithmic Fairness
- Cynthia Dwork, Moritz Hardt, Toniann Pitassi, Omer Reingold, and Rich Zemel.
diff --git a/website/docs/schedule/lectures.md b/website/docs/schedule/lectures.md
index 54bd0bd..2cc4f55 100644
--- a/website/docs/schedule/lectures.md
+++ b/website/docs/schedule/lectures.md
@@ -7,34 +7,34 @@
9/6 | Basic private mechanisms
**Reading:** AFDP 3.2-4 |
9/9 | Composition and closure properties
**Reading:** AFDP 3.5 | Signups
9/11 | What does differential privacy actually mean?
**Reading:** McSherry. [Lunchtime for Differential Privacy](https://github.com/frankmcsherry/blog/blob/master/posts/2016-08-16.md) |
-9/13 | Paper presentations | HW1 Due
+9/13 | Paper presentations: Differential privacy | HW1 Due
|