Schedule and slides (Fall
2022 class):
1. Introduction
2. A quick review on data analytics
algorithms
3. Perturbation methods
- Additive perturbation
- Multiplicative perturbation
- Random response and other perturbations
4. Data anonymization
- k-anonymization,
- attacks and enhanced
methods
5. Differential privacy 1,
2, local
differential privacy
6. Cryptographic methods:
- Threat modeling for confidential
computing
- Basic encryption methods, Secret sharing,
Garbled circuits
- Partial homomorphic encryption,
Somewhat HE/Fully HE: Ring-LWE
- Sample crypto protocols
7. Private information retrieval
8. Oblivious RAM: oram1, oram2
9. Trusted execution environments:
- SGX, Graphene-SGX,
- AMD-SEV,
- side-channel attacks
10.
Privacy and
security issues with deep learning
- Deep learning with
differential privacy
- Confidential deep learning: attacks on models, confidential training,
confidential inference