@ -30,7 +30,7 @@ Data Privacy* (AFDP) by Cynthia Dwork and Aaron Roth, available
11/7 | Defensive measures < br > **Paper:** Madry, Makelov, Schmidt, Schmidt, Tsipras, and Valdu. [*Towards Deep Learning Models Resistant to Adversarial Attacks* ](https://arxiv.org/pdf/1706.06083.pdf ). | Maddy
| < center > < h4 > **Cryptographic Techniques** </ h4 > </ center > |
11/12 | Applied crypto: overview and basics | Justin
11/19 | Verifiable differential privacy < br > **Paper:** Narayan, Feldman, Papadimitriou, and Haeberlen. [*Verifiable Differential Privacy* ](https://www.cis.upenn.edu/~ahae/papers/verdp-eurosys2015.pdf ). < br > < center > < h5 > **Due: Milestone 2** </ h5 > </ center > | Fayi
11/14 | Verifiable differential privacy < br > **Paper:** Narayan, Feldman, Papadimitriou, and Haeberlen. [*Verifiable Differential Privacy* ](https://www.cis.upenn.edu/~ahae/papers/verdp-eurosys2015.pdf ). < br > < center > < h5 > **Due: Milestone 2** </ h5 > </ center > | Fayi
11/19 | Homomorphic encryption < br > **Paper:** Ducas and Micciancio. [*FHEW: Bootstrapping Homomorphic Encryption in Less than a Second* ](https://eprint.iacr.org/2014/816.pdf ). | Yue
| < center > < h4 > **Language-Based Security** </ h4 > </ center > |
11/21 | Language-based security: overview and basics | Justin