|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:01* M* o$ k, m4 j" w
秋季 USENIX Security 顶会,不完全统计:; q# G6 {, g+ G1 C9 Q- N" F" F
浙大+44 C1 ]' A. |! i. v% y! h
清华+2 % `' ]3 U; D) P2 ?: O- M- T
东南是3篇?
1 n+ I. d% C) N+ W5 I) E0 F! y, T
! m- z6 e$ E- {4 k5 T) h6 gA Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers7 m% ~) y2 I- A4 e
Chongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell2 A% r, l1 x! ]# p8 z* c9 P9 I
: ?) @1 U6 J" t: \" f, w: s" I
Relation Mining Under Local Differential Privacy
4 f8 _9 k0 T" [0 Y- v0 kKai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell
( h0 X4 |, a7 w9 v
1 a' |. d( Z7 S' Z% x: tFEASE: Fast and Expressive Asymmetric Searchable Encryption
2 o: z6 M0 _" b; P/ ?Long Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|