cs763/website/docs/schedule/lectures.md

3.5 KiB

Calendar (Tentative)

For differential privacy, we will use the textbook Algorithmic Foundations of Data Privacy (AFDP) by Cynthia Dwork and Aaron Roth, available here.

Date Topic Presenter

Differential Privacy

9/5 Course welcome, introducing differential privacy
Paper: Keshav. How to Read a Paper.
JH
9/10 Basic private mechanisms
Reading: AFDP 3.2, 3.3
JH
9/12 What does differential privacy actually mean?
Reading: McSherry. Lunchtime for Differential Privacy (see also these two posts)
JH
9/17 Composition and closure properties
Reading: AFDP 3.5
Due: Project topics and groups
JH
9/19 Exponential mechanism
Paper: McSherry and Talwar. Mechanism Design via Differential Privacy.
JH
9/21 (FRI) Identity-Based Encryption from the Diffie-Hellman Assumption
SPECIAL TIME AND PLACE: 4 PM, CS 1240
Sanjam Garg
9/24 Privacy for data streams
Paper: Chan, Shi, and Song. Private and Continual Release of Statistics.
9/26 Report-noisy-max and the Sparse Vector Technique Reading: AFDP 3.3, 3.5 JH
10/1 Answering lots of queries: Private multiplicative weights
Paper: Hardt, Ligett, and McSherry. A Simple and Practical Algorithm for Differentially Private Data Release.
10/3 Local differential privacy
Reading: AFDP 12.1
JH
10/8 Local differential privacy
Paper: Erlingsson, Pihur, and Korolova. RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response.
10/10 More differential privacy
Paper:
10/15 NO CLASS: INSTRUCTOR AWAY
10/17 NO CLASS: INSTRUCTOR AWAY
Due: Milestone 1

Cryptographic Techniques

10/22 Crypto: overview and basics JH
10/24 Secure multiparty computation
Paper:
10/29 Homomorphic encryption
Paper:
10/31 Verifiable computing
Paper:
11/5 More applied crypto
Paper:

Language-Based Security

11/7 LangSec: overview and basics JH
11/12 Secure Information Flow
Paper:
11/14 Languages for privacy
Paper:
Due: Milestone 2
11/19 Symbolic cryptography
Paper:
11/21 More LangSec
Paper:

Adversarial Machine Learning

11/26 AML: overview and basics
GUEST LECTURE
Somesh Jha
11/28 AML: overview and basics
GUEST LECTURE
Somesh Jha
12/3 Adversarial examples
Paper:
12/5 Training-time attacks
Paper:
12/10 Model-theft attacks
Paper:
12/12 More AML
Paper: