• Title: Special Topics on Mobile Security
  • Provided by: Dept. of Computer Engineering, Myongji University
  • Lead by: Minho Shin (mhshin@mju.ac.kr, Rm5736)
  • Period: Spring semester, 2020
  • Location: 5734 at 5th Engineering Building
  • Time: Mondays, 1pm to 4pm
  • Type: Graduate Seminar
  • Goal of the class
    • This class aims to familiarize students with current research topics in Mobile Security & Privacy area
      • This year, we focus on Privacy with AI
    • This class also aims to train students with their communication skills including oral presentation, discussion, writing, and collaboration
  • Resources for researchers from Publishing Campus of Elsevier


# Name Dept Advisor Mobile Phone Email Address
1 ZHANG ZHONG CE Minho Shin 010-2676-8912 zhangzhong219017@hotmail.com
2 Jafar
3 Girum


Date Name Topic Slides Minutes
4/6 Minho Ice-breaking
How to read / review a paper PPT
4/13 Zhong Perfectly Privacy-Preserving AI,
A Survey on Collaborative Deep Learning
and Privacy-Preserving
Privacy-Preserving AI
4/20 Jafar Privacy-Preserving Deep Learning Privacy-Preserving DL
4/27 Girum Privacy-Preserving Scoring of Tree Ensembles:
A Novel Framework for AI in Healthcare
5/4 Zhong FlowIntent: Detecting Privacy Leakage from
User Intention to Network Traffic Mapping
5/11 Jafar A Hybrid Deep Learning Architecture for
Privacy-Preserving Mobile Analytics
5/18 Girum AutoPer: Automatic Recommender for
Runtime-Permission in Android Applications
5/25 Zhong Deep Models Under the GAN Information Leakage from
Collaborative Deep Learning

Class Information

  • Rules for the class
    • We have 15 presentations in total by three students
    • Each present 5 presentations throughout the semester
    • One presentation per day
    • The presenter announces the paper to present at least one week ahead
    • The presenter prepares a powerpoint slides for 30-60min talk
    • The other students submit a review article (1-2 pages) before class
    • The presentation should contain:
      • (Motivation) What are the motivations for this particular problem? What is the backgrounds for understanding the problem? Why is this important?
      • (Problem) What is, on earth, the exact problem the authors aim to address, and why on earth, is the problem important?
      • (Related work) What has been done by other researchers to address the same or similar problem on the table? Why the existing work is not enough to call done?
      • (Method) What is their main methodology to address the problem? How did they actually solve the problem in detail?
      • (Evaluation) What are the evidences for their success found in the paper? What is missing in their evaluation?
      • (Contribution) What is the contribution of the paper and what is not their contributions? Are there any limitations in their result? How would you evaluate the value of the paper?
      • (Future work) What is the remaining problems that were only partially addressed or never covered by the paper? What will be a possible approach to the problem?
    • A review article contains
      • The same content as described for the presenter
      • But in a succinctly written words form
      • Not exceeding two pages
      • Submit in Word/PDF by email
    • Evaluation
      • As a Presenter (10 points each)
        • Slide Quality
        • Talk Quality
        • Knowledge Level
      • As a reviewer (5 points each)
        • Clarity of the review
        • Understanding level

Reading List

List: privacy-preserving_ai-2020.4.1.pdf


Privacy-preserving for AI applications:

Privacy-preserving approach using machine learning:


class/gradmsec2020s/gradmsec2020s.txt · Last modified: 2020/05/07 22:12 by zhangzhong · [Old revisions]
Recent changes RSS feed Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki