|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:01
) I( e4 W$ l" r1 x9 |) W' a2 q秋季 USENIX Security 顶会,不完全统计:
- u* p4 L3 c/ {% ^. Q; U浙大+4
/ a$ U- t5 f. w% {0 L清华+2
" m6 t. q9 j0 I+ c1 H东南是3篇?
1 ~* ^, |) R k: B$ }/ N, i1 S. P$ g+ c& w5 Y
A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers, X; A6 ]( B" I# C! q
Chongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell% U/ M! c& x' l, } s
3 m, G6 {/ p/ U# v3 {Relation Mining Under Local Differential Privacy
$ @, J. Z. G7 {3 M; \Kai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell
& D. a# f R' g( r7 F+ u7 l4 [! B8 n! h: |/ Q9 m
FEASE: Fast and Expressive Asymmetric Searchable Encryption# F; |, T9 B+ Q
Long Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|