3.5 KiB
3.5 KiB
Calendar (Tentative)
For differential privacy, we will use the textbook Algorithmic Foundations of Data Privacy (AFDP) by Cynthia Dwork and Aaron Roth, available here.
Date | Topic | Presenter |
---|---|---|
Differential Privacy |
||
9/5 | Course welcome, introducing differential privacy Paper: Keshav. How to Read a Paper. |
JH |
9/10 | Basic private mechanisms Reading: AFDP 3.2, 3.3 |
JH |
9/12 | What does differential privacy actually mean? Reading: McSherry. Lunchtime for Differential Privacy (see also these two posts) |
JH |
9/17 | Composition and closure properties Reading: AFDP 3.5 Due: Project topics and groups |
JH |
9/19 | Exponential mechanism Paper: McSherry and Talwar. Mechanism Design via Differential Privacy. |
JH |
9/21 (FRI) | Identity-Based Encryption from the Diffie-Hellman Assumption SPECIAL TIME AND PLACE: 4 PM, CS 1240 |
Sanjam Garg |
9/24 | Privacy for data streams Paper: Chan, Shi, and Song. Private and Continual Release of Statistics. |
|
9/26 | Report-noisy-max and the Sparse Vector Technique Reading: AFDP 3.3, 3.5 | JH |
10/1 | Answering lots of queries: Private multiplicative weights Paper: Hardt, Ligett, and McSherry. A Simple and Practical Algorithm for Differentially Private Data Release. |
|
10/3 | Local and joint differential privacy Reading: AFDP 12.1 |
JH |
10/8 | Local differential privacy Paper: Erlingsson, Pihur, and Korolova. RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response. |
|
10/10 | More differential privacy Paper: |
|
10/15 | NO CLASS: INSTRUCTOR AWAY | |
10/17 | NO CLASS: INSTRUCTOR AWAY Due: Milestone 1 |
|
Cryptographic Techniques |
||
10/22 | Crypto: overview and basics | JH |
10/24 | Secure multiparty computation Paper: |
|
10/29 | Homomorphic encryption Paper: |
|
10/31 | Verifiable computing Paper: |
|
11/5 | More applied crypto Paper: |
|
Language-Based Security |
||
11/7 | LangSec: overview and basics | JH |
11/12 | Secure Information Flow Paper: |
|
11/14 | Languages for privacy Paper: Due: Milestone 2 |
|
11/19 | Symbolic cryptography Paper: |
|
11/21 | More LangSec Paper: |
|
Adversarial Machine Learning |
||
11/26 | AML: overview and basics GUEST LECTURE |
Somesh Jha |
11/28 | AML: overview and basics GUEST LECTURE |
Somesh Jha |
12/3 | Adversarial examples Paper: |
|
12/5 | Training-time attacks Paper: |
|
12/10 | Model-theft attacks Paper: |
|
12/12 | More AML Paper: |