|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:01 V& | i6 @% J; e4 w1 v# r" h
秋季 USENIX Security 顶会,不完全统计:; h7 W0 T' c1 m) }# z
浙大+42 F0 M0 N+ [4 u, [8 u+ Q" u
清华+2 6 P5 G3 Q* Q- r3 O+ ]8 v+ \1 `3 q
东南是3篇?
" O. K8 b8 ^, C9 @
1 [' W2 r$ c8 z" c# A0 H, LA Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers
* Q# p7 W6 \' \/ Z5 {/ L, u, tChongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell
& s% ~$ |, x8 g) y% T4 J r+ U7 i7 M' |8 ]) G. O+ {
Relation Mining Under Local Differential Privacy3 z2 X q7 {5 g9 V
Kai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell
+ ?) h0 Q j# K& M! |# _7 o4 @6 C+ U2 f. i9 D
FEASE: Fast and Expressive Asymmetric Searchable Encryption
6 e0 g) e" E; P4 ~/ G# JLong Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|