|
|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:01
; R ]$ [* z$ p% q& ^秋季 USENIX Security 顶会,不完全统计:
0 `$ ?; h0 f1 R! z& t4 {& P浙大+4/ n7 ]! Q7 n4 X( k0 H! X2 Q' i
清华+2
4 V2 C: W! u5 x) [! T$ \. C, j东南是3篇?9 v) \- D! e+ y; @- @/ I
9 X- a6 H+ ]& Z4 R8 o+ b. wA Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers
+ L! r& W( ]# w1 ]. w' y N* AChongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell
9 s" H ]3 V' v* x3 C4 z: d& t4 k$ X) O3 }. e R, j6 j
Relation Mining Under Local Differential Privacy
& } d' r5 R/ _# bKai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell0 X* A% V) }' a- c
! G$ }% N9 P: L) Z5 @: n* c
FEASE: Fast and Expressive Asymmetric Searchable Encryption
/ N. M; I- X; z; JLong Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|