# Calendar (Tentative)
For differential privacy, we will use the textbook *Algorithmic Foundations of
Data Privacy* (AFDP) by Cynthia Dwork and Aaron Roth, available
[here](https://www.cis.upenn.edu/~aaroth/Papers/privacybook.pdf).
Date | Topic | Presenter
:----:|-------|:---------:
|
**Differential Privacy**
|
9/5 | [Course welcome, introducing differential privacy](../resources/slides/lecture01.html)
**Paper:** Keshav. [*How to Read a Paper*](https://web.stanford.edu/class/ee384m/Handouts/HowtoReadPaper.pdf). | JH
9/10 | Basic private mechanisms
**Reading:** AFDP 3.2, 3.3 | JH
9/12 | Composition and closure properties
**Reading:** AFDP 3.5 | JH
9/17 | What does differential privacy actually mean?
**Reading:** McSherry. [*Lunchtime for Differential Privacy*](https://github.com/frankmcsherry/blog/blob/master/posts/2016-08-16.md) (see also these [two](https://github.com/frankmcsherry/blog/blob/master/posts/2016-06-14.md) [posts](https://github.com/frankmcsherry/blog/blob/master/posts/2016-08-29.md)) | JH
9/19 | Exponential mechanism
**Paper:** McSherry and Talwar. [*Mechanism Design via Differential Privacy*](http://kunaltalwar.org/papers/expmech.pdf).
**Due: Project topics and groups**
| JH
**9/21 (FRI)** | Identity-Based Encryption from the Diffie-Hellman Assumption
**SPECIAL TIME AND PLACE: 4 PM, CS 1240** | Sanjam Garg
9/24 | Privacy for data streams
**Paper:** Chan, Shi, and Song. [*Private and Continual Release of Statistics*](https://eprint.iacr.org/2010/076.pdf). |
9/26 | Report-noisy-max and the Sparse Vector Technique
**Reading:** AFDP 3.3, 3.5 | JH
10/1 | Answering lots of queries: Private multiplicative weights
**Paper:** Hardt, Ligett, and McSherry. [*A Simple and Practical Algorithm for Differentially Private Data Release*](https://papers.nips.cc/paper/4548-a-simple-and-practical-algorithm-for-differentially-private-data-release.pdf). |
10/3 | Local and joint differential privacy
**Reading:** AFDP 12.1 | JH
10/8 | Local differential privacy
**Paper:** Erlingsson, Pihur, and Korolova. [*RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response*](https://arxiv.org/pdf/1407.6981.pdf). |
10/10 | More differential privacy
**Paper:** |
10/15 | **NO CLASS: INSTRUCTOR AWAY** |
10/17 | **NO CLASS: INSTRUCTOR AWAY**
**Due: Milestone 1**
|
| **Cryptographic Techniques**
|
10/22 | Crypto: overview and basics | JH
10/24 | Secure multiparty computation
**Paper:** |
10/29 | Homomorphic encryption
**Paper:** |
10/31 | Verifiable computing
**Paper:** |
11/5 | More applied crypto
**Paper:** |
| **Language-Based Security**
|
11/7 | LangSec: overview and basics | JH
11/12 | Secure Information Flow
**Paper:** |
11/14 | Languages for privacy
**Paper:**
**Due: Milestone 2**
|
11/19 | Symbolic cryptography
**Paper:** |
11/21 | More LangSec
**Paper:** |
| **Adversarial Machine Learning**
|
11/26 | AML: overview and basics
**GUEST LECTURE** | Somesh Jha
11/28 | AML: overview and basics
**GUEST LECTURE** | Somesh Jha
12/3 | Adversarial examples
**Paper:** |
12/5 | Training-time attacks
**Paper:** |
12/10 | Model-theft attacks
**Paper:** |
12/12 | More AML
**Paper:** |