NSF Award #1723250: Course Materials
Project Title: SaTC: EDU: Captivology-Stimuli-based Learning (CAPITAL) of Big Data Security (BigSec): Towards a Science/Engineering, Career-Oriented Training

Course Name: ECE 693 Big Data Security:

Course content: In this course, we have covered the big data appliction, attacks and countermeasures in big data systems, and privacy preservation solutions. Labs/projects are assigned in class.

Course Syllabus: click here

Class Labs: (for solutions, the instructors may ontact the author: Dr. Fei Hu , fei@eng.ua.edu )

Lab 1 - Identify user behavior pattern via mobile phone data: This lab trains students how to use the big data of mobile phone to authenticate the user or identify the behavior patterns.

Lab 1 Requirements (Note: Please decompress it in a directory called C:/1 )

Lab 1 Help File (This tool acts like a "virtual TA". It explains the whole lab well).

Lecture Video (in the first 10 minutes)

Lab 2 - Use Machine Learning for User Behavior Identification: This lab further uses advanced machine learning algorithms (Non-negative matrix factorization, Support Vector Machine, Neural Networks) to analyze the big data and thus authenticate the user

Lab 2 Requirements

Lecture video

Lab 3 - Implement "User behavior signature detection via the belief propagation algorithm"

Lab reading material: PDF PPT

Lab requirements and a sample report

Lab 4 -Implement "User behavior signature detection via Hidden Markov Model (HMM)"

Lab 4 Requirements (decompress it)

Lab 4 Help File (This tool acts like a "virtual TA". It explains the whole lab well).

Lab 5 - User privacy protection (lecture slides included)

Lab 5 Requirements (decompress it)

There are 3 labs developed by the co-PI - Dr. Da Yan at UAB, please click this link.

 

Lecture Videos and Slides: (note: For flipped-classroom based teaching, please ask students read slides/videos before coming to class).

Lecture 1. Introduction to Big Data

Slides

Video (posted in YouTube) - Part 1

Video - Part 2

Video - Part 3

Lecture 2. Overview of Big Data Security

Slides

Video - Part 1

Video - Part 2

Video - Part 3

Video - Part 4

Video - Part 5

Lecture 3. Basics of Cryptography: Applied Cryptography (Symmetric): Concepts

Slides

Video - Part 1

Video - Part 2

Lecture 4. Basics of Cryptography: Applied Cryptography (Symmetric): Finite fields

Slides

Video - Part 1 (skip the first 10 minutes)

Video - Part 2

Lecture 5. Basics of Cryptography: Applied Cryptography (Symmetric): AES

Slides

Video

Lecture 6. Basics of Cryptography: Applied Cryptography (Asymmetric): Part 1

Slides

Video- Part 1

Video-Part 2

Lecture 7. Basics of Cryptography: Applied Cryptography (Asymmetric): Part 2

Slides

Video-Part 1

Video - Part 2

Video - Part 3

Lecture 8. Basics of Cryptography: Applied Cryptography (Asymmetric): Part 3

Slides

Video - Part 1

Video - Part 2

Video - Part 3

Lecture 9. Use big data analysis to achieve cloud security

Slides

Reading materials

Video - Part 1

Video - Part 2

Video - Part 3

Video - Part 4

Video - Part 5

Video - Part 6

Video - Part 7

Lecture 10. Big data machine learning for outlier detection

Slides

Reading materials

Video-Part 1

Video-Part 2

Video-Part 3

Video-Part 4

Video-Part 5

Video-Part 6

Lecture 11. The Science of Security & Privacy in Machine Learning

Slides

Reading materials

Video-Part 1

Video-Part 2

Video-Part 3

Video-Part 4

Video-Part 5

Video-Part 6

Video-Part 7

Lecture 12. When Machine Learning Meets Security

Slides

Video-Part 1

Video-Part 2

Video-Part 3

Video-Part 4

Lecture 13. Deep Learning Attacks

Slides

Reading materials

Video-Part 1

Video-Part 2

Video-Part 3

Video-Part 4

Video-Part 5

Lecture 14. Distillation as a defense to the deep learning attacks

Slides

Reading materials

Video-Part 1

Video Part 2

Video Part 3

Lecture 15. Overview of Big Data Privacy

Slides

Reading materials

Video-Part 1

Video-Part 2

Video-Part 3

Video-Part 4

Lecture 16. Big data privacy: PSI scheme

Slides

Reading materials

Video: Part 1

Video: Part 2

Video: Part 3

Video: Part 4

Video: Part 5

Lecture 17. Insider Attacks in Big Data Systems

Slides

Reading materials

Video: Part 1

Video-Part 2

Video-Part 3

Lecture 18. Driving anomaly detection

Slides

Reading materials

Video-Part 1

Video-Part 2

Video-Part 3