Lecture Number | Topic | Release Date | Video Link | Lecture Notes | Written Notes | References and Readings |
---|---|---|---|---|---|---|
1 | Some Attempts at Data Privacy | 9/8/2022 | Part 1 Part 2 |
Required:
|
||
2 | Reconstruction Attacks | 9/13/2022 | Part 1 Part 2 Part 3 |
Highly Recommended:
|
||
3 | Continue Reconstruction Attacks, start Intro to Differential Privacy | 9/15/2022 | Part 1 Part 2 |
Recommended:
|
||
4 | Continue Intro to Differential Privacy | 9/20/2022 | ||||
5 | Start Intro to Differential Privacy, Part 2 | 9/22/2022 | Part 1 Part 2 |
Recommended:
|
||
6 | Finish Intro to Differential Privacy Part 2, Start Approximate Differential Privacy | 9/27/2022 | Part 1 Part 2 |
Recommended:
|
||
7 | Continue Approximate Differential Privacy | 9/29/2022 | ||||
8 | Finish Approximate Differential Privacy, Start Exponential Mechanism | 10/4/2022 | Part 1 Part 2 |
Recommended:
|
||
9 | Finish Exponential Mechanism | 10/4/2022 |
Meeting Number | Date | Paper 1 | Paper 1 Presenter | Paper 2 | Paper 2 Presenter | Additional Readings |
---|---|---|---|---|---|---|
10 | 10/18/22 | Smooth Sensitivity and Sampling in Private Data Analysis, by Nissim, Raskhodnikova, and Smith. | A | A Simple and Practical Algorithm for Differentially Private Data Release, by Hardt, Ligett, and McSherry. | R | |
11 | 10/20/22 | On Significance of the Least Significant Bits For Differential Privacy, by Mironov. | V | Preserving Statistical Validity in Adaptive Data Analysis, by Dwork, Feldman, Hardt, Pitassi, Reingold, and Roth. | A | |
12 | 10/27/22 | The matrix mechanism: optimizing linear counting queries under differential privacy, by Li, Miklau, Hay, McGregor, and Rastogi. | SK | Communication-Efficient Learning of Deep Networks from Decentralized Data, by McMahan, Moore, Ramage, Hampson, and Agüera y Arcas. | C | |
13 | 11/01/22 | Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds, by Bun and Steinke. | SK | Deep Learning with Differential Privacy, by Abadi, Chu, Goodfellow, McMahan, Mironov, Talwar, and Zhang. | R | |
14 | 11/03/22 | Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data, by Papernot, Abadi, Erlingsson, Goodfellow, and Talwar. | S | Exposed! A Survey of Attacks on Private Data, by Dwork, Smith, Steinke, and Ullman. | V | |
15 | 11/08/22 | Prochlo: Strong Privacy for Analytics in the Crowd, by Bittau, Erlingsson, Maniatis, Mironov, Raghunathan, Lie, Rudominer, Kode, Tinnes, and Seefeld. | V | Private PAC learning implies finite Littlestone dimension, by Alon, Livni, Malliaris, and Moran. | S | Local Differential Privacy |
16 | 11/10/22 | Distributed Differential Privacy via Shuffling, by Cheu, Smith, Ullman, Zeber, and Zhilyaev. | C | Gaussian Differential Privacy, by Dong, Roth, and Su. | SK | |
17 | 11/15/22 | LinkedIn's Audience Engagements API: A Privacy Preserving Data Analytics System at Scale, by Rogers, Subramaniam, Peng, Durfee, Lee, Kancha, Sahay, and Ahammad. | SS | An Equivalence Between Private Classification and Online Prediction, by Bun, Livni, and Moran. | SK | |
18 | 11/17/22 | CoinPress: Practical Private Mean and Covariance Estimation, by Biswas, Dong, Kamath, and Ullman. | A | Auditing Differentially Private Machine Learning: How Private is Private SGD?, by Jagielski, Ullman, and Oprea. | S | |
19 | 11/22/22 | Differentially Private Learning Needs Better Features (or Much More Data), by Tramèr and Boneh. | SS | Practical and Private (Deep) Learning without Sampling or Shuffling, by Kairouz, McMahan, Song, Thakkar, Thakurta, and Xu. | C | Federated Learning with Formal Differential Privacy Guarantees |
20 | 11/24/22 | Large Language Models Can Be Strong Differentially Private Learners, by Li, Tramèr, Liang, and Hashimoto. Differentially Private Fine-tuning of Language Models, by Yu, Naik, Backurs, Gopi, Inan, Kamath, Kulkarni, Lee, Manoel, Wutschitz, Yekhanin, and Zhang. |
C | Membership Inference Attacks From First Principles, by Carlini, Chien, Nasr, Song, Terzis, and Tramèr. | S | |
21 | 11/29/22 | What Does it Mean for a Language Model to Preserve Privacy?, by Brown, Lee, Mireshghallah, Shokri, and Tramèr. | R | Attacks on Deidentification's Defenses, by Cohen. | SS | |
22 | 12/01/22 | The 2020 Census Disclosure Avoidance System TopDown Algorithm, by Abowd, Ashmead, Cumings-Menon, Garfinkel, Heineck, Heiss, Johns, Kifer, Leclerc, Machanavajjhala, Moran, Sexton, Spence, and Zhuravlev. | V | Considerations for Differentially Private Learning with Large-Scale Public Pretraining (Forthcoming) | SS |