NSF Award
#1723250: Course Materials
Project Title: SaTC:
EDU: Captivology-Stimuli-based Learning (CAPITAL) of Big Data Security (BigSec):
Towards a Science/Engineering, Career-Oriented Training
Course Name: ECE 693 Big Data Security:
Course content: In this course, we have covered the big data appliction, attacks and countermeasures in big data systems, and privacy preservation solutions. Labs/projects are assigned in class.
Course Syllabus: click here
Class Labs: (for solutions, the instructors may ontact the author: Dr. Fei Hu , fei@eng.ua.edu )
Lab 1 - Identify user behavior pattern via mobile phone data: This lab trains students how to use the big data of mobile phone to authenticate the user or identify the behavior patterns.
Lab 1 Requirements (Note: Please decompress it in a directory called C:/1 )
Lab 1 Help File (This tool acts like a "virtual TA". It explains the whole lab well).
Lecture Video (in the first 10 minutes)
Lab 2 - Use Machine Learning for User Behavior Identification: This lab further uses advanced machine learning algorithms (Non-negative matrix factorization, Support Vector Machine, Neural Networks) to analyze the big data and thus authenticate the user
Lab 3 - Implement "User behavior signature detection via the belief propagation algorithm"
Lab requirements and a sample report
Lab 4 -Implement "User behavior signature detection via Hidden Markov Model (HMM)"
Lab 4 Requirements (decompress it)
Lab 4 Help File (This tool acts like a "virtual TA". It explains the whole lab well).
Lab 5 - User privacy protection (lecture slides included)
Lab 5 Requirements (decompress it)
There are 3 labs developed by the co-PI - Dr. Da Yan at UAB, please click this link.
Lecture Videos and Slides: (note: For flipped-classroom based teaching, please ask students read slides/videos before coming to class).
Lecture 1. Introduction to Big Data
Video (posted in YouTube) - Part 1
Lecture 2. Overview of Big Data Security
Lecture 3. Basics of Cryptography: Applied Cryptography(Symmetric): Concepts
Lecture 4. Basics of Cryptography: Applied Cryptography(Symmetric): Finite fields
Video - Part 1 (skip the first 10 minutes)
Lecture 5. Basics of Cryptography: Applied Cryptography(Symmetric): AES
Lecture 6. Basics of Cryptography: Applied Cryptography(Asymmetric): Part 1
Lecture 7. Basics of Cryptography: Applied Cryptography(Asymmetric): Part 2
Lecture 8. Basics of Cryptography: Applied Cryptography(Asymmetric): Part 3
Lecture 9. Use big data analysis to achieve cloud security
Lecture 10. Big data machine learning for outlier detection
Lecture 11. The Science of Security & Privacy in Machine Learning
Lecture 12. When Machine Learning Meets Security
Lecture 13. Deep Learning Attacks
Lecture 14. Distillation as a defense to the deep learning attacks
Lecture 15. Overview of Big Data Privacy
Lecture 16. Big data privacy: PSI scheme
Lecture 17. Insider Attacks in Big Data Systems
Lecture 18. Driving anomaly detection