| Lecture Number |
Topic |
Release Date |
Video Link |
Lecture Notes |
Written Notes |
References and Readings |
| 1 |
Some Attempts at Data Privacy |
1/5/2026 |
Part 1
Part 2
|
PDF |
PDF |
Required:
Recommended:
- Pandurangan, On Taxis and Rainbows, 2014.
- Narayanan and Shmatikov, Robust De-anonymization of Large Sparse Datasets, 2008.
- Carlini, Liu, Erlingsson, Kos, and Song, The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks, 2019.
- Wallace, Tramèr, Jagielski, and Herbert-Voss, Does GPT-2 Know Your Phone Number?, 2020.
- Carlini et al., Extracting Training Data from Large Language Models, 2021.
Optional:
- Whong, FOILing NYC's Taxi Trip Data, 2014.
- Homer et al., Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays, 2008.
- Samarati and Sweeney, Generalizing Data to Provide Anonymity when Disclosing Information, 1998.
- Ganta, Kasiviswanathan, and Smith, Composition Attacks and Auxiliary Information in Data Privacy, 2008.
|
| 2 |
Reconstruction Attacks |
1/7/2026 |
Part 1
Part 2
Part 3
|
PDF |
PDF |
Highly Recommended:
- Section 8.1 of Dwork and Roth, The Algorithmic Foundations of Differential Privacy, 2014.
- Garfinkel, Abowd, Martindale, Understanding Database Reconstruction Attacks on Public Data, 2019.
- Dinur and Nissim, Revealing Information while Preserving Privacy, 2003.
- Cohen and Nissim, Linear Program Reconstruction in Practice, 2020.
Recommended:
Optional:
|
| 3 |
Class cancelled |
1/12/2026 |
|
|
|
|
| 4 |
Continue Reconstruction Attacks, Intro to Differential Privacy |
1/14/2026 |
Part 1
Part 2
|
PDF |
PDF |
Recommended:
Optional:
|
| 5 |
Start Intro to Differential Privacy, Part 2 |
1/19/2026 |
Part 1
Part 2
|
PDF |
PDF |
Recommended:
Optional:
|
| 6 |
Finish Intro to Differential Privacy Part 2, Start Approximate Differential Privacy |
1/21/2026 |
Part 1
Part 2
|
PDF |
PDF |
Recommended:
Optional:
|