38 lines
1.8 KiB
Markdown
38 lines
1.8 KiB
Markdown
# Lecture Schedule (Tentative)
|
|
|
|
Date | Topic | Presenter
|
|
:----:|-------|:---------:
|
|
9/5 | Course welcome | JH
|
|
| <center> **Differential Privacy** </center> |
|
|
9/10 | Definition and Basic Mechanisms | JH
|
|
9/12 | What does Differential Privacy mean? | JH
|
|
9/17 | Composition and closure properties | JH
|
|
9/19 | Exponential mechanism <br> **Paper:** | JH
|
|
9/24 | Streaming privacy: counters <br> **Paper:** | JH
|
|
9/26 | Advanced mechanisms: Report-noisy-max | JH
|
|
10/1 | Advanced mechanisms: Sparse Vector | JH
|
|
10/3 | Advanced mechanisms: Private multiplicative weights <br> **Paper:** | JH
|
|
10/8 | Local differential privacy (theory) | JH
|
|
10/10 | Local differential privacy (practice) <br> **Paper:** | JH
|
|
| <center> **Cryptographic Techniques** </center> |
|
|
10/15 | Crypto: overview and basics | JH
|
|
10/17 | Zero-knowledge proofs <br> **Paper:** |
|
|
10/22 | Oblivious transfer and SMC <br> **Paper:** |
|
|
10/24 | Oblivious transfer and SMC <br> **Paper:** |
|
|
10/29 | Fully homomorphic encryption and verifiable computing <br> **Paper:** |
|
|
10/31 | Fully homomorphic encryption and verifiable computing <br> **Paper:** |
|
|
| <center> **Language-Based Security** </center> |
|
|
11/5 | LangSec: overview and basics | JH
|
|
11/7 | Secure Information Flow <br> **Paper:** |
|
|
11/12 | Secure Information Flow <br> **Paper:** |
|
|
11/14 | Languages for privacy <br> **Paper:** |
|
|
11/19 | Languages for privacy <br> **Paper:** |
|
|
11/21 | Symbolic cryptography <br> **Paper:** |
|
|
| <center> **Adversarial Machine Learning** </center> |
|
|
11/26 | AML: overview and basics | JH
|
|
11/28 | Adversarial examples <br> **Paper:** |
|
|
12/3 | Adversarial examples <br> **Paper:** |
|
|
12/5 | Training-time attacks <br> **Paper:** |
|
|
12/10 | Training-time attacks <br> **Paper:** |
|
|
12/12 | Model-theft attacks <br> **Paper:** |
|