1.8 KiB
1.8 KiB
Lecture Schedule (Tentative)
Date | Topic | Presenter |
---|---|---|
9/5 | Course welcome | JH |
Differential Privacy | ||
9/10 | Definition and Basic Mechanisms | JH |
9/12 | What does Differential Privacy mean? | JH |
9/17 | Composition and closure properties | JH |
9/19 | Exponential mechanism Paper: |
JH |
9/24 | Streaming privacy: counters Paper: |
JH |
9/26 | Advanced mechanisms: Report-noisy-max | JH |
10/1 | Advanced mechanisms: Sparse Vector | JH |
10/3 | Advanced mechanisms: Private multiplicative weights Paper: |
JH |
10/8 | Local differential privacy (theory) | JH |
10/10 | Local differential privacy (practice) Paper: |
JH |
Cryptographic Techniques | ||
10/15 | Crypto: overview and basics | JH |
10/17 | Zero-knowledge proofs Paper: |
|
10/22 | Oblivious transfer and SMC Paper: |
|
10/24 | Oblivious transfer and SMC Paper: |
|
10/29 | Fully homomorphic encryption and verifiable computing Paper: |
|
10/31 | Fully homomorphic encryption and verifiable computing Paper: |
|
Language-Based Security | ||
11/5 | LangSec: overview and basics | JH |
11/7 | Secure Information Flow Paper: |
|
11/12 | Secure Information Flow Paper: |
|
11/14 | Languages for privacy Paper: |
|
11/19 | Languages for privacy Paper: |
|
11/21 | Symbolic cryptography Paper: |
|
Adversarial Machine Learning | ||
11/26 | AML: overview and basics | JH |
11/28 | Adversarial examples Paper: |
|
12/3 | Adversarial examples Paper: |
|
12/5 | Training-time attacks Paper: |
|
12/10 | Training-time attacks Paper: |
|
12/12 | Model-theft attacks Paper: |