• kth.se
  • Student web
  • Intranet
  • kth.se
  • Student web
  • Intranet
Login
DD2496/FDD3344HT211
Reading: Differential Privacy (before group presentation 12/10/21, 10-12h)
Skip to content
Dashboard
  • Login
  • Dashboard
  • Calendar
  • Inbox
  • History
  • Help
Close
  • Min översikt
  • DD2496/FDD3344HT211
  • Assignments
  • Reading: Differential Privacy (before group presentation 12/10/21, 10-12h)
  • Home
  • Syllabus
  • Modules
  • Assignments
  • Course Evaluation

Reading: Differential Privacy (before group presentation 12/10/21, 10-12h)

  • Due 12 Oct 2021 by 9:59
  • Points None
  • Available after 1 Sep 2021 at 8:00

Differential Privacy

Required Reading:

1. Foundational paper: Dwork, Cynthia. "Differential privacy." International Colloquium on Automata, Languages, and Programming. Springer, Berlin, Heidelberg, 2006. pdf Links to an external site.

2. Short but insightful critique: Domingo-Ferrer, Josep, David Sánchez, and Alberto Blanco-Justicia. "The limits of differential privacy (and its misuse in data release and machine learning)." Communications of the ACM 64.7 (2021): 33-35. pdf Links to an external site.

 

Optional:

1. More easily accessible introduction to DP (perhaps read this before the Dworkin paper) in a series of blog posts: Near, Joseph, and David Darias. “Differential Privacy Blog Series.” Www.Nist.Gov, Nist, 2020. link to first blog post Links to an external site.  Note from the group: If you have a hard time grasping the concept of differential privacy we recommend that you read the first two blog posts in the series "Differential Privacy Blog series" in the optional reading.

2. Some attacks on some systems using DP: Haeberlen, Andreas, Benjamin C. Pierce, and Arjun Narayan. "Differential Privacy Under Fire." USENIX Security Symposium. Vol. 33. 2011. pdf Links to an external site.

3. More detailed than the Domingo-Ferrer et al. critique plus focus on health care: Fida K. Dankar and Khaled El Emam. 2013. Practicing Differential Privacy in Health Care: A Review. Trans. Data Privacy 6, 1 (April 2013), 35–67. Links to an external site.pdf Links to an external site.

 

1634025599 10/12/2021 09:59am
Please include a description
Additional comments:
Rating max score to > Pts
Please include a rating title

Rubric

Find rubric
Please include a title
Find a rubric
Title
You've already rated students with this rubric. Any major changes could affect their assessment results.
 
 
 
 
 
 
 
     
Can't change a rubric once you've started using it.  
Title
Criteria Ratings Pts
This criterion is linked to a learning outcome Description of criterion
threshold: 5 pts
Edit criterion description Delete criterion row
5 to >0 Pts Full marks blank
0 to >0 Pts No marks blank_2
This area will be used by the assessor to leave comments related to this criterion.
pts
  / 5 pts
--
Additional comments
This criterion is linked to a learning outcome Description of criterion
threshold: 5 pts
Edit criterion description Delete criterion row
5 to >0 Pts Full marks blank
0 to >0 Pts No marks blank_2
This area will be used by the assessor to leave comments related to this criterion.
pts
  / 5 pts
--
Additional comments
Total points: 5 out of 5
Previous
Next
Reading: IoT Privacy, Anonymous Routing (before group presentations 6/10/21) Reading: Provable Privacy (before group presentation 14/10/21, 10-12h)