|
|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:01
' V: H9 d5 b+ L: \! S" p0 x秋季 USENIX Security 顶会,不完全统计:
0 t& a1 |- q: W& v浙大+4& F1 ~. R6 |3 F5 e) a+ {6 {/ G
清华+2 + V w; ] u3 w& S+ z
东南是3篇?
7 y/ N K5 @% ~7 I5 ^
5 d8 N& }4 [( c( K( s7 d8 b$ ]A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers$ R6 W, ?' Q" W6 P
Chongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell
' y1 g. l; ~4 ?3 T: U5 T% a8 C; U4 K3 E, b8 _7 j
Relation Mining Under Local Differential Privacy
* V. s4 Q0 ^) D. Z% NKai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell
$ {5 d6 \* C1 I* `" l/ X+ m
% d) l! M# A9 u! |! z2 T2 wFEASE: Fast and Expressive Asymmetric Searchable Encryption1 H; t- ]4 G6 b' T
Long Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|