| 08/11 |
Introduction and course overview [Slide] |
|
|
| Topic: Database Privacy |
| 08/13 |
Data De-anonymization [Slide] |
|
|
| 08/18 |
k-anonymity [Slide] |
|
|
| 08/20 |
l-diversity, t-closeness [Slide] |
|
|
| 08/25 |
Introduction to differential privacy [Slide] |
|
Tutorial on Differential Privacy |
| 08/27 |
Differential privacy (Continued) [Slide] |
|
|
| 09/01 |
No Class |
Allow students to move to online instruction |
|
| 09/03 |
Private Information Retrieval (PIR) [Slide] |
|
|
| Topic: Online Privacy |
| 09/08 |
Online tracking: stateful [Slide] |
|
|
| 09/10 |
Online tracking: stateless [Slide] |
|
|
| 09/15 |
Privacy tools for web browsing [Slide] |
|
|
| 09/17 |
Anonymous communication [Slide] |
|
|
| 09/22 |
Tor network [Slide] |
|
|
| 09/24 |
Social networks and privacy [Slide] |
|
|
| 09/29 |
Exam Review |
Online discussion |
|
| 10/01 |
Midterm Exam |
Moodle submission (1-2 hrs) |
Topics covered upto 09/22 (inclusive) |
| Topic: Machine learning and Privacy |
| 10/06 |
Privacy implications of machine learning models [Slide] |
|
|
| 10/08 |
Privacy perserving machine learning [Slide] |
|
|
| 10/13 |
Fairness and auditing of automated systems [Slide] |
|
|
| Topic: Legal Aspects of Privacy |
| 10/15 |
Privacy acts and frameworks [Slide] |
|
|
| 10/20 |
Privacy notices [Slide] |
|
|
| 10/22 |
Privacy policy compliance [Slide] |
|
|
| Topic: Perception of Privacy |
| 10/27 |
Westin's privacy index [Slide] |
|
|
| 10/29 |
Factors influencing privacy attitude [Slide] |
|
|
| 11/03 |
Modeling users' privacy preferences [Slide] |
|
|
| Topic: Inference Attacks |
| 11/05 |
Bitcoin and privacy [Slide] |
|
Video lecture
bitcoin-what-is-it
bitcoin
|
| 11/10 |
Network-level Inference attacks [Slide] |
|
|
| 11/12 |
Acoustic and Motion sensor based Inference attacks [Slide] |
|
|
| 11/17 |
Course and Exam Review [Slide] |
Online Discussion |
|
| 11/19 |
Final Exam |
Moodle submission (Starts at 9am and ends on 11am) |
Full syllabus |