Day 67 of 133
Privacy & security: PII, DP, federated, attacks + DSA 2-D DP
K-anonymity, ε in DP, model-extraction defenses.
DSA · NeetCode 2-D DP
- Best Time TO Buy And Sell Stock With CooldownDSA · 2-D DP
Interview questions to prep
- State the 2-D DP: indices, recurrence, base case. What's the order of fill?
- Can you reduce 2-D to 1-D by reusing rows or columns? Walk through the dependency direction.
- Top-down with memoization vs bottom-up — which is easier to reason about, and which is faster in practice?
- Coin Change IIDSA · 2-D DP
Interview questions to prep
- State the 2-D DP: indices, recurrence, base case. What's the order of fill?
- Can you reduce 2-D to 1-D by reusing rows or columns? Walk through the dependency direction.
- Top-down with memoization vs bottom-up — which is easier to reason about, and which is faster in practice?
MLOps · Privacy & security
Interview questions to prep
- How would you remove PII from training data without destroying signal?
- Compare hashing vs tokenization vs full redaction for PII fields — when does each fit?
Interview questions to prep
- Explain differential privacy in one minute — what does ε mean?
- How does DP-SGD differ from regular SGD, and what does it cost in accuracy?
Interview questions to prep
- When is federated learning the right choice over centralized training?
- What are the systems-side challenges in federated learning beyond the algorithm?
Interview questions to prep
- What is a model-extraction attack, and how do you mitigate it?
- How would you defend a public ML API from membership-inference attacks?
References & further reading