|
|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:01
- D9 G( ], Y2 `4 f2 D秋季 USENIX Security 顶会,不完全统计:
* Q/ V; h" e8 E% h/ j浙大+4, C7 C$ M: Y2 Y8 J
清华+2
3 p0 I0 F- i6 t5 h8 t东南是3篇?
: |# Q: r0 D& z. {# Y' O
7 u8 N- H# E. y7 E# zA Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers
" j4 X. f; O- E) r* S& L7 x4 F: iChongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell! \# c7 V* R5 x/ @/ T I/ s, r
) t, u6 ]% D( K* XRelation Mining Under Local Differential Privacy3 G! J- m. z3 m2 Z
Kai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell7 P: f1 V4 p, x7 G4 M
; B J6 I- Q! D6 K7 z8 ?( S
FEASE: Fast and Expressive Asymmetric Searchable Encryption
& Q0 ]( v$ |& l/ u' q0 D2 JLong Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|