ECE 885 F20

Course Description

In recent years, Machine Learning (ML) has made significant advancements across various domains, accomplishing impressive performance levels that were previously thought to be unattainable. ML has demonstrated its capabilities in applications such as healthcare, retail marketing, earthquake detection, machine translation, text-to-speech conversion, object recognition, and even self-driving cars. However, the widespread implementation of machine learning models in real-world scenarios has opened up new avenues for cyber-security threats. It is crucial to consider the security and privacy implications associated with these developments. This course aims to explore state-of-the-art technologies that ensure privacy-preserving AI. Participants will gain insights into cutting-edge methodologies designed to protect sensitive information in AI systems. Additionally, the course will delve into utilizing ML techniques to enhance system security, as well as understanding how ML can be used both for launching attacks and developing effective countermeasures. By examining the intersection of machine learning, security, and privacy, participants will develop a comprehensive understanding of the challenges and opportunities present in this rapidly evolving field.

Learning Outcomes

  1. Learn the cutting-edge technologies for machine learning.

  2. Explain some of the applications of different machine learning models and relation to cybersecurity.

  3. Explain attacks on machine learning models and countermeasures.

  4. Explain how to appropriately build and train different machine learning model.

  5. Explain how machine learning models can be used to launch attacks (Adversarial Learning) and counter security threats.

  6. Apply machine learning models to practice scenarios.

  7. Utilize programming skills to read, comprehend, and construct research concepts.

Textbooks

  • Lecture Notes

Schedule

Date Topic - Slides Reading Homework
Week 1 Introduction to Machine Learning and Toolkit Ch1 On Blackboard
Week 2 Introduction to Supervised Learning Ch2 On Blackboard
Week 3 Model Generalization Ch3 On Blackboard
Week 4 Regularization and Feature Selection Ch4 On Blackboard
Week 5 Logistic Regression Ch5 On Blackboard
Week 6 Introduction to Neural Networks 1 Ch6 On Blackboard
Week 7 Introduction to Neural Networks 2 Ch7 On Blackboard
Week 8 Convolution Neural Networks Ch8 On Blackboard
Week 9 Adversarial Machine Learning Ch9 On Blackboard
Week 10 Basic Cryptography Ch10 On Blackboard
Week 11 Federated Learning Ch11 On Blackboard
Week 12 Students Presentations paper1 paper2 On Blackboard
Week 13 Students Presentations paper3 paper4 paper5 On Blackboard

Disclaimer: This page may contain personal archived (pre-print versions) articles published by several publishers. Copyright and all rights therein are retained by authors or by other copyright holders. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works, must be obtained from the copyright holder.