网大论坛

 找回密码
 立即注册
查看: 16034|回复: 71

2024年信息安全领域顶会统计(Eurocrypt/FSE)

[复制链接]

分区版主

Rank: 8Rank: 8

3225

积分

0

贡献

1600

奖励
发表于 2024-2-3 09:59:37 | 显示全部楼层 |阅读模式
本帖最后由 SmithArno 于 2024-3-8 16:28 编辑 / E8 H" D1 g* \& l

2 k( l  L: O' v2 n6 c按照第一作者单位统计(信息安全四大顶会+密码三大顶会)2 Y$ D3 |5 V  a: @
NDSS 2024概览/ P0 {! H( a/ L- m
清华大学13篇,浙江大学9篇,华中科技大学3篇,南方科技大学2篇。
; a" O! e/ D; {# E1 k( c0 ]' ~7 Q/ n东南大学、中国海洋大学、北京航空航天大学、山东大学、北京大学、中山大学、武汉大学、中科大、NUDT、上海科技大学等等1篇。6 W& `( P4 i% G- J& O0 f' ]2 T9 T

7 v+ N8 [8 w5 E! ^9 U& o* a8 UCCS 2024
- ~# }/ x& a3 |# Q$ I* g- J* S5 u
+ [& Y0 ~6 H; s* FIEEE S&P 2024概览* q, S0 E6 D7 z# [1 l1 m! b
清华大学10篇,浙江大学6篇,华中科技大学、复旦大学、东南大学2篇。其他重庆大学、山东大学、南开大学、西电、成电等等1篇。- f  D  g0 f) r3 \- X& V1 f4 E
1 i' G; o/ B0 s! C
Security 2024
/ q3 M' X4 n" ?* d* W7 C' q% ^2 `
: Q: |4 K1 x; ~4 U6 f
Eurocrypt 2024
4 M, e  q; c, Q. ?华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。5 B$ W# N/ l3 I5 T
5 {- D# `( D( _2 v

5 T# G2 O' Y4 X/ s3 F) H) c9 |- P6 n9 Y9 {& g" D; s5 i3 h+ \; G- i" O9 l; T
获奖情况:
5 h1 }/ S% Z8 b0 N% P+ Q【1】浙江大学获得NDSS 2024杰出论文奖。
7 U' z) S' ]$ _' v& R5 a- v3 S- S  w, r, Q1 I4 f
% X; E; C. U) f# @

6 W9 x& t/ ?* L& `
& T3 w4 q( E% U/ e9 D, `& N" q/ z5 U. H; x

" H; ]# U* |, k0 D, {% |  Z

分区版主

Rank: 8Rank: 8

3225

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-3-4 09:47:58 | 显示全部楼层
Eurocrypt 2024,共接收105篇论文,国内共8篇,华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。
1 w( _6 g3 ^% h4 y4 ~. X/ i9 I( {/ @0 J: V" W  x
【1】山东大学
- }# R( t0 F) s$ {& h, VMassive Superpoly Recovery with a Meet-in-the-middle Framework -- Improved Cube Attacks on Trivium and Kreyvium
, N: p) O/ }. v$ z; O# U, GJiahui He, Kai Hu, Meiqin Wang, Hao Lei
  M* b$ o9 o# M% h9 X4 xShandong University, Nanyang Technological University2 B" Y7 ]% h! m

( s3 D( f' }- M/ m$ c. I【2】清华大学
2 G# G  k7 A0 b8 J; ~7 T" }Accelerating BGV Bootstrapping for Large $p$ Using Null Polynomials Over $\mathbb{Z}_{p^e}$0 W. ~% `! a  D6 h. J
Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang
* o* V- g3 M; h& g' e  A9 W0 S) ETsinghua University) ?/ G% o9 C6 Z% R
4 Y2 B  j9 D" D0 C0 w# s
【3】华东师大
# w! E: D$ Z* |2 [Registered Functional Encryptions from Pairings3 W2 p: G/ y3 n0 N; g1 Q1 C
Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian
) T1 Z  U2 @( B, b% E( c* r( \) c7 gEast China Normal University, Shanghai University, Shanghai University of Electric Power
9 t0 W7 x7 L3 J4 F  A9 \0 L
, D$ b+ Z1 i' C. ~) E【4】南科大
) W6 n5 S1 Y9 Q9 {& x& @# ?! S9 d  `Integrating Causality in Messaging Channels
" v8 n5 x" h$ E: o. a+ e0 [, L  `1 rShan Chen, Marc Fischlin
" D% r) p* y, i) BSouthern University of Science and Technology, TU Darmstadt
% g! o+ T/ Q# `& n1 B, Q
) Z" c" M) ^% M【5】暨南大学
# T. U3 u2 V! nProbabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond$ Z0 W. U/ _3 o, e
Ling Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng
, [* U. w2 \( N' JCollege of Cyber Security, Jinan University, Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering" Q6 c/ D& R: A
9 a7 h& x9 G( q# J" T
【6】上海交大% _7 R+ ^& R8 i4 ]9 o- J
The Hardness of LPN over Any Integer Ring and Field for PCG Applications
+ V5 f1 F! |2 N7 C* K  G& D5 cHanlin Liu, Xiao Wang, Kang Yang, Yu Yu- C, z- T% r7 V4 t9 c, m& m
Shanghai Jiao Tong University, Shanghai Qi Zhi Institute, Northwestern University, State Key Laboratory of Cryptology& f5 k/ c1 d  [4 g6 }# ]# b

" c, l% d1 l, |! j. M3 j【7】上海交大% Z4 `  u0 ?% V4 M
Universal Composable Password Authenticated Key Exchange for the Post-Quantum World
0 v0 R$ ~, g" p) s# R. C6 O, s3 lYou Lyu, Shengli Liu, Shuai Han* L" I( n1 }; Z1 P
Shanghai Jiao Tong University' O! i5 i* j+ `
3 r& ~& P/ [2 w/ T- |- r
【8】华东师大
3 t) E! N1 a4 b3 ?, ?, fNew Records in Collision Attacks on SHA-2
" H( F5 H  u5 x5 P- t! f# b) oYingxin Li, Fukang Liu, Gaoli Wang
3 m, C: a1 E) R) \# [East China Normal University, Tokyo Institute of Technology
" X" L7 C! V# w* v3 l, L1 U+ n% [# w! A/ @. c6 |

分区版主

Rank: 8Rank: 8

3225

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 09:59:41 | 显示全部楼层
本帖最后由 SmithArno 于 2024-2-3 10:06 编辑
/ Q+ {2 u! S) ^6 y3 }0 E! O! J% _) m4 ~, U4 w3 \8 Y
NDSS 2024会议主页:https://www.ndss-symposium.org/ndss2024/accepted-papers/2 F9 \  S( }8 W- ~9 i: d
: r! \0 M7 F' {
【1】山东大学
' M" Z7 f  s0 k& [Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols. x. G6 T. ~  D: l2 j7 b- D+ m
Shichen Wu (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Puwen Wei (1. School of Cyber Science and Technology, Shandong University 2. Quancheng Laboratory 3. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Ren Zhang (Cryptape Co. Ltd. and Nervos); Bowen Jiang (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education)2 o$ V& u1 u/ _: ]# i) ?& B
1 u, _& g' e7 B. ~) @
【2】东南大学
, i& {( R' R0 R6 R& hLDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems2 i" B7 t: f) s  p
Huaiyu Yan, Zhen Ling, Haobo Li (Southeast University); Lan Luo (Anhui University of Technology); Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang (Southeast University); Junzhou Luo (Southeast University, Nanjing, P.R. China); Xinwen Fu (University of Massachusetts Lowell)
- s6 K1 }( d; {! K% m. k+ Y: N; A$ {
【3】浙江大学/ G9 s( q3 q. V
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards6 t& D+ ?, R) m- t6 E, E# H4 [
Qinhong Jiang, Yanze Ren (Zhejiang University); Yan Long (University of Michigan); Chen Yan (Zhejiang University); Yumai Sun (University of Michigan); Xiaoyu Ji (Zhejiang University); Kevin Fu (Northeastern University); Wenyuan Xu (Zhejiang University)1 h7 S3 }2 L- J2 V& Q& V7 ?
. X  A( G9 s2 z/ U: G; i* ?
【4】浙江大学- K% w+ O  Z' x  J
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
5 g2 ]* q& p% y# SXinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)) d6 ^/ s  X2 x4 u1 L

" H1 g  W- W, i【5】北京航空航天大学7 C  g/ Z/ C/ Q/ N" n( w4 {
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation( N7 `1 ?0 [, _. B  s
Song Bian, Zian Zhao, Zhou Zhang, Ran Mao (Beihang University); Kohei Suenaga (Kyoto University); Yier Jin (University of Science and Technology of China); Zhenyu Guan, Jianwei Liu (Beihang University)0 X* X8 ^5 i# z" P6 H: f

1 M- w: X9 {& F8 d【6】清华大学  h' }1 h3 m: a8 C
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic% ?7 C6 l, K# Y$ O8 M0 c
Yuqi Qing (Tsinghua University); Qilei Yin (Zhongguancun Laboratory); Xinhao Deng, Yihao Chen, Zhuotao Liu (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Jia Zhang, Qi Li (Tsinghua University)7 N6 E. G- F  J) [: e

$ R+ E; C- V3 t' l【7】浙江大学
. {% w* r- ~9 |. @% bSymphony: Path Validation at Scale
- u" K7 N) d& B! J1 {0 XAnxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren (Zhejiang University)
. z! v; M7 S4 V% m  J9 h/ K3 Q
  p" K6 \' W1 V) ~( t$ C【8】清华大学
7 {3 P9 |& g& UBreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet
7 h2 |0 i; ?3 o0 bChuhan Wang, Yasuhiro Kuranaga, Yihang Wang (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Linkai Zheng, Xiang Li (Tsinghua University); Jianjun Chen (Tsinghua University; Zhongguancun Laboratory); Haixin Duan (Tsinghua University; Quan Cheng Lab; Zhongguancun Laboratory); Yanzhong Lin, Qingfeng Pan (Coremail Technology Co. Ltd)/ @" Q1 k: I, Q
9 u8 o7 p1 {& a0 ?! c
【9】浙江大学( P0 D6 Y$ D, N* B* p
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency. `, F8 f( ~! g: z+ Y2 G
Jiacheng Xu, Xuhong Zhang, Shouling Ji (Zhejiang University); Yuan Tian (UCLA); Binbin Zhao (Georgia Institute of Technology); Qinying Wang, Peng Cheng, Jiming Chen (Zhejiang University)
- A, h0 A$ I8 A8 `8 O% X
) J2 F0 B2 c& J【10】清华大学3 n! n4 x: |! X( I
ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection, Z8 F& Y2 q0 n; i: r
Kunpeng Zhang (Shenzhen International Graduate School, Tsinghua University); Xiaogang Zhu (Swinburne University of Technology); Xi Xiao (Shenzhen International Graduate School, Tsinghua University); Minhui Xue (CSIRO’s Data61); Chao Zhang (Tsinghua University); Sheng Wen (Swinburne University of Technology)
) e0 @5 q  w) ]5 B9 E0 g3 i
, J" Y& w( n! _& V6 i  z【11】中国海洋大学
6 |8 {4 ]4 ]; y! A/ X3 N( ~Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack
. M( {6 ]8 D% r: G& ~Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu (Ocean University of China)/ @1 @+ ~  Q) L* B% E

( ~# ?+ ?" E# u4 S0 m; u【12】浙江大学
. m; D/ {3 l0 O% v( s$ Y: PORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning
! ^9 t$ t$ X. Q/ \5 f/ @& t! mLinkang Du (Zhejiang University); Min Chen (CISPA Helmholtz Center for Information Security); Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen (Zhejiang University); Zhikun Zhang (Stanford University): @, c/ t9 Y2 c. b5 Z
+ k. w, |1 E" R" Q" `, a: W
【13】北京大学3 q9 ^. L& L2 M
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation7 q# n, w% u2 O+ p! r" T8 L$ c. S
Shaofei Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Feng Dong (Huazhong University of Science and Technology); Xusheng Xiao (Arizona State University); Haoyu Wang (Huazhong University of Science and Technology); Fei Shao (Case Western Reserve University); Jiedong Chen (Sangfor Technologies Inc.); Yao Guo, Xiangqun Chen (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Ding Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University)
4 R4 i+ E; N  \. w8 u8 }: Q& U
9 P, S6 p* X! }' q【14】浙江大学% |5 T3 E# \, U6 ~; `1 @
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors
( e8 G- {/ P; `7 TChengkun Wei, Wenlong Meng (Zhejiang University); Zhikun Zhang (Stanford University); Min Chen (CISPA Helmholtz Center for Information Security); Minghu Zhao (Zhejiang University); Wenjing Fang, Lei Wang (Ant Group); Zihui Zhang, Wenzhi Chen (Zhejiang University)' i1 d3 p5 D$ J) {: ^9 n7 w
% r. U+ N+ K5 M  s' j0 \) a
【15】湖南大学1 V0 l- ]  _& [  D+ L
Eavesdropping on Black-box Mobile Devices via Audio Amplifier’s EMR" D6 M- _$ r2 d1 f# O
Huiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Kenli Li (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Zheng Qin (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Mingxing Duan (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Yong Xie (Nanjing University of Posts and Telecommunications, Nanjing, China); Daibo Liu (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Ming Li (The University of Texas at Arlington, USA)' ^1 a0 ^3 W: e
/ x  w; H! G" _% J
【16】上海交大
1 ?; B; {  ~2 B: YCrafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models5 K- w( x8 y& s# W" F( z) M6 B
Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang (Shanghai Jiao Tong University); Chenghu Zhou (Chinese Academy of Sciences); Bo Li (Hong Kong University of Science and Technology)
! h% U9 t: z3 n5 R- G' p9 F
( |! o/ _2 C$ _, s# \8 Z6 ?【17】清华大学
/ ~, ^) I* c# r. o" MExploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks
  o& ^. o0 u+ g& U, s9 X  v2 fYuxiang Yang, Xuewei Feng, Qi Li (Tsinghua University); Kun Sun (George Mason University); Ziqiang Wang (Southeast University); Ke Xu (Tsinghua University)
, B9 h3 Z" b1 x$ x7 S7 i- i* [& j9 _2 \& Z! T6 A* ~, H
【18】清华大学
' ]- Q5 J' Q7 z# k# |CP-IoT: A Cross-Platform Monitoring System for Smart Home
& ^# n5 W, u; d# t2 r; uHai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang (Tsinghua University); Linna Fan (National University of Defense Technology); Chenxin Duan (Tsinghua University); A2 d( p' k) j" \: t7 ~6 y  ]

; l2 A3 D  Y) F# ]7 d【19】清华大学
* v& n" L9 e( x9 w" Y; Y6 E5 {LoRDMA: A New Low-Rate DoS Attack in RDMA Networks8 v+ e7 ^. |  L. E: Y/ _' M  f: t
Shicheng Wang (Tsinghua University); Menghao Zhang (Beihang University & Infrawaves); Yuying Du (Information Engineering University); Ziteng Chen (Southeast University); Zhiliang Wang, Mingwei Xu (Tsinghua University & Zhongguancun Laboratory); Renjie Xie (Tsinghua University); Jiahai Yang (Tsinghua University & Zhongguancun Laboratory)
3 Q/ W6 S( m0 s
( k# U7 B! t5 ^. {- p【20】清华大学
1 C7 H2 m3 b2 U& c0 [! V  UReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing
6 ?! W! p- c6 dLinkai Zheng, Xiang Li, Chuhan Wang, Run Guo (Tsinghua University); Haixin Duan (Tsinghua University; Quancheng Laboratory); Jianjun Chen, Chao Zhang (Tsinghua University; Zhongguancun Laboratory); Kaiwen Shen (Tsinghua University)
; {3 A! y4 ~- N" J) m) R
0 r  ~) G4 z+ R【21】清华大学
0 l  Q+ w  u$ t, V5 U: ^) mAutomatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization1 d0 f2 R3 x6 @! V, U2 F
Quan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang (Tsinghua University)
9 E' k& z3 U( O/ @: [( N, ^' U% ~; r6 z. ?$ n
【22】清华大学
7 b2 @: ]2 W% R$ L2 }DynPRE: Protocol Reverse Engineering via Dynamic Inference# M+ i) B! U  g5 ^$ M
Zhengxiong Luo (Tsinghua University); Kai Liang (Central South University); Yanyang Zhao, Feifan Wu, Junze Yu (Tsinghua University); Heyuan Shi (Central South University); Yu Jiang (Tsinghua University)
/ n3 k( R# U$ {2 {  t0 x5 y
% u' S, }4 h1 G4 z3 [【23】浙江大学
& C5 N; E9 Q1 u# C! n% zImproving the Robustness of Transformer-based Large Language Models with Dynamic Attention' w: P1 x  O* {0 y, N* q! \
Lujia Shen, Yuwen Pu, Shouling Ji (Zhejiang University); Changjiang Li (Penn State); Xuhong Zhang (Zhejiang University); Chunpeng Ge (Shandong University); Ting Wang (Penn State)
2 ]; [4 {! G# s) v: M" i$ R2 X- q8 i7 @, K
【24】中山大学+ l6 q9 W3 ?1 i! J! B
Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem* g3 k3 b% G+ ^  |3 X! n
Jiangrong Wu, Yuhong Nan (Sun Yat-sen University); Luyi Xing (Indiana University Bloomington); Jiatao Cheng (Sun Yat-sen University); Zimin Lin (Alibaba Group); Zibin Zheng (Sun Yat-sen University); Min Yang (Fudan University)" J' H  _' E: j9 j3 l0 G
. V% k% W' u: g- V3 P
【25】浙江大学
6 b3 q6 s) H, @; {( LCamPro: Camera-based Anti-Facial Recognition
, P5 N0 f' N$ v: r) RWenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)" c9 S" G% k) Y! e/ u; M; |4 B

$ D, Y* |& B8 L" [【26】中国科学技术大学
% l( |. _! A9 @: p! vDetecting Voice Cloning Attacks via Timbre Watermarking
2 U1 ?7 w% O* p! k! iChang Liu (University of Science and Technology of China); Jie Zhang, Tianwei Zhang (Nanyang Technological University); Xi Yang, Weiming Zhang, NengHai Yu (University of Science and Technology of China)
/ D( i3 W1 n, n, Z+ N
& J7 p6 f, V: B& r" n: J【27】清华大学
' A, {* ]9 x0 P7 rUnderstanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed( h) m' r% A: D+ s
Lancheng Qin (Tsinghua University, BNRist); Li Chen (Zhongguancun Laboratory); Dan Li (Tsinghua University, Zhongguancun Laboratory); Honglin Ye, Yutian Wang (Tsinghua University)- p4 O, R1 C2 ?9 a

+ X# B2 D& H4 R7 W3 f  z8 Y【28】清华大学0 p# ?8 F  F1 G# U; w, v
dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository' s& R5 T" _) N
Yingying Su, Dan Li (Tsinghua University); Li Chen (Zhongguancun Laboratory); Qi Li (Tsinghua university); Sitong Ling (Tsinghua University)
1 x; F/ A7 o* F+ p' _  `5 I" k' |; X5 a9 ?/ k
【29】清华大学
+ Y% D6 b8 j7 T& \8 y& APencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption8 }/ B5 ?9 [+ \/ L
Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu (Tsinghua University)( Z! E8 r$ x* j4 U( ?0 Y
9 Q1 t. S+ H  q
【30】NUDT
( L* b# C9 w3 mDeepGo: Predictive Directed Greybox Fuzzing
6 M+ Z1 S4 H; J0 [: Z5 ^Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang (National University of Defense Technology)" e3 o( j2 [3 B5 m" s" {

6 u/ q% {6 \, h- J2 p  X+ `6 p7 X【31】上海交大
1 O6 ~! z- z) t, [+ oActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token! x) Y6 r7 L0 i  q" V9 j9 o3 d2 |
Ge Ren, Gaolei Li, Shenghong Li, Libo Chen (Shanghai Jiao Tong University); Kui Ren (Zhejiang University)- d4 E$ b. m2 X, V1 O

2 W0 U. V; j# O1 Y) E/ f【32】华中科技大学
0 ?% k( n2 i( D& R; t) n; iPrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
0 U. Q$ \. k& u5 f1 xMan Zhou, Shuao Su (Huazhong University of Science and Technology); Qian Wang (Wuhan University); Qi Li (Tsinghua University); Yuting Zhou, Xiaojing Ma (Huazhong University of Science and Technology); Zhengxiong Li (University of Colorado Denver)
' m% |1 Q. _' }! q, h) U4 A! @, D. c1 p
【33】南方科技大学& S/ t8 W' |% D8 M; |4 @7 B  T2 f5 ]
Separation is Good: A Faster Order-Fairness Byzantine Consensus
( Y' q! Q' k) a1 YKe Mu (Southern University of Science and Technology, China); Bo Yin (Changsha University of Science and Technology, China); Alia Asheralieva (Loughborough University, UK); Xuetao Wei (Southern University of Science and Technology, China & Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation, SUSTech, China)6 ~$ {# t3 `& e0 s" L. ?
+ t/ F# u$ H# x; i7 B# d& _
【34】南方科技大学
% C% t, l; S9 l. \0 xCAGE: Complementing Arm CCA with GPU Extensions2 A6 G7 k! j6 ?* o9 K  c$ ~
Chenxu Wang (Southern University of Science and Technology (SUSTech) and The Hong Kong Polytechnic University); Fengwei Zhang, Yunjie Deng (Southern University of Science and Technology (SUSTech)); Kevin Leach (Vanderbilt University); Jiannong Cao (The Hong Kong Polytechnic University); Zhenyu Ning (Hunan University); Shoumeng Yan, Zhengyu He (Ant Group)
9 S! y2 h. i+ T+ t% ]* |/ Y' b
【35】华中科技大学2 H5 z" ^2 J+ x% b9 T) C) v
DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses
  K% J; ~3 b9 Y9 }; F" g! wChaoxiang He, Xiaojing Ma (Huazhong University of Science and Technology); Bin Benjamin Zhu (Microsoft Research Asia); Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin (Huazhong University of Science and Technology); Dongmei Zhang (Microsoft Research)
, d" _. A& c# t; H3 k8 k) b1 S# p7 p6 Y
【36】华中科技大学
7 D& j+ \) d+ Z7 C/ m/ ]0 LAbusing the Ethereum Smart Contract Verification Services for Fun and Profit! J5 ]# ]" P! ?- w/ c
Pengxiang Ma (Huazhong University of Science and Technology); Ningyu He (Peking University); Yuhua Huang, Haoyu Wang (Huazhong University of Science and Technology); Xiapu Luo (The Hong Kong Polytechnic University)
+ k  d/ v; r9 r
# _5 R( S/ y6 d" b. l' b( ^【37】浙江大学) c/ y& E9 `( C
UniID: Spoofing Face Authentication System by Universal Identity
: ^+ L( P5 |# h" J! vZhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji (Zhejiang University); Wenyuan Xu (Zhejing University)
/ p$ G, a, [* p) e( @8 c2 g* X* k+ {$ n3 T
【38】武汉大学) ?# g- T/ f8 Z/ R
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices
& l2 f3 P  X& o( L  u( AYue Xiao (Wuhan University); Yi He (Tsinghua University); Xiaoli Zhang (Zhejiang University of Technology); Qian Wang (Wuhan University); Renjie Xie (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Qi Li (Tsinghua University)
8 h# S1 K( a/ m# b
7 e+ K( S- H0 w" P6 G( b. f【39】上海科技大学
4 M4 z4 \2 E! H" O4 M  WSLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems5 c4 l' C- L9 l1 ~
Guangke Chen (ShanghaiTech University); Yedi Zhang (National University of Singapore); Fu Song (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences)
! w' [3 ~) B8 z8 k# ^0 y. P) d- R4 j& I: z0 B- L
【40】清华大学
  K" Q! `( J% JYou Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks
  d: ^$ U- Z% [! {& f6 PQiushi Li (Tsinghua University); Yan Zhang (China Agricultural University); Ju Ren, Qi Li, Yaoxue Zhang (Tsinghua University)
" |7 {9 U" b5 v7 p$ A* `+ J

老战友

Rank: 5Rank: 5

1322

积分

0

贡献

500

奖励
发表于 2024-2-3 10:15:02 | 显示全部楼层
Wenyuan Xu (Zhejiang University)" T: r! Y5 |# y/ E2 h* ~+ @$ C
徐文元好几篇) n* G  ?3 c, }* I

中级站友

Rank: 3Rank: 3

374

积分

0

贡献

0

奖励
发表于 2024-2-3 11:53:22 来自手机 | 显示全部楼层
有2023年的数据吗

分区版主

Rank: 8Rank: 8

3225

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 12:26:14 | 显示全部楼层
0000 发表于 2024-2-3 11:53
: N: E4 G* |5 F' i2 u有2023年的数据吗
+ ?$ x/ e4 J' Z: c3 h
https://bbs.netbig.top/thread-26427-1-1.html

普通会员

Rank: 2

114

积分

0

贡献

0

奖励
发表于 2024-2-3 12:49:02 来自手机 | 显示全部楼层
徐文渊老师太强了…

分区版主

Rank: 8Rank: 8

3225

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 12:50:55 | 显示全部楼层
yxy 发表于 2024-2-3 12:49# R3 q* U+ H, B: h1 v8 Y) H3 k( |
徐文渊老师太强了…

8 v* \6 c* O* @; \+ h1 F" G国内现在这几个顶会发文量虽然多了,但头部高校断层明显,基本都是浙大清华屠榜。( p- L$ q$ ~8 J) x7 x  T2 e; h
其他高校偶尔有个一篇两篇的。( p- r! ~, x) q1 g* ?/ R/ w* o: X

7 ^" T7 V3 @7 X' h; Q" j: l8 B% d徐文渊老师不仅输出稳定,而且还有best paper

分区版主

Rank: 8Rank: 8

3225

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 14:55:15 | 显示全部楼层
本帖最后由 SmithArno 于 2024-3-8 16:25 编辑 3 @; t8 i/ {: @0 c$ j1 S! i6 W
1 Q3 p2 S+ U, h1 h6 @. i" [
IEEE S&P 2024
* v* j; Q1 R: ?3 q8 m4 a7 w" E  P9 {  z
【1】华中科技大学
* |. M; o, G) Q% tWhy Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabilitypp. 10-104 o) D) b! S1 U  u# e! v  p" N
by Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin
. @2 g$ G5 S& O; I! L# e& s: C& F& l
【2】华中科技大学4 I6 e+ @) P& ?6 z0 m5 }8 S
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementationspp. 13-13& c5 Y3 A% |7 C3 A, `9 K
by Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing( c1 [5 F; l& K- |) r, H

8 [% O: @' u# P+ @5 |3 Y【3】复旦大学2 s$ H. @0 ]+ t* D
Withdrawing is believing? Detecting Inconsistencies Between Withdrawal Choices and Third-party Data Collections in Mobile Appspp. 14-145 @, P" X7 j% T. Y  h1 a7 ^
by Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang
, K9 l1 g: F& G4 `. A4 w% V0 z4 \. L. i& B* K
【4】浙江大学
, o0 c2 X  l8 d( E& bPIRANA: Faster Multi-query PIR via Constant-weight Codespp. 39-39
. l$ Y4 {2 K/ x) R7 {by Jian Liu, Jingyu Li, Di Wu, Kui Ren
7 j; s2 o+ b4 o0 _% z: X2 t5 y$ ^5 X# L* A2 U& Y  L; k
【5】东南大学. e0 c& p. c' b
Predecessor-aware Directed Greybox Fuzzingpp. 40-40) N" h8 ]9 T. {- O& A6 M
by Yujian Zhang, Yaokun Liu, Jinyu Xu, Yanhao Wang
% X( E- l, f* f' G
  I, r5 n" W% N【6】中南大学
5 G+ ]# d4 ^  l7 F1 \* DGuessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Informationpp. 42-42
5 p0 t. B1 X" B! I: U( K- jby Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, Zhuo Lu
1 H1 q2 v+ N; W! D% R8 }" V2 A% n" v
+ S+ q3 L! u3 z& T& u【7】清华大学% G: b8 u2 j; p2 _$ C' T
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packetspp. 46-469 |2 O, x9 _9 N5 _/ f# s7 v
by Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li! N& N& [( \, p( u1 B

( \( z. [- V% L8 ~$ g0 C# n: ]【8】清华大学
* |! @+ `9 ~+ a  t: ^" _SATURN: Host-Gadget Synergistic USB Driver Fuzzingpp. 51-51# k6 u4 T2 l& u, P% P2 Z
by Yiru Xu, Hao Sun, Jianzhong Liu, Yuheng Shen, Yu Jiang# D/ D, @8 U  Z! V4 @
4 x6 y/ [1 G; F) T3 Y" ?9 u
【9】北京大学9 I# O% h9 I* A$ L. L. f
No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device MLpp. 52-52( t6 h. z4 r5 B- _% O4 I% {
by Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Ding Li, Yao Guo, Xiangqun Chen6 A- w4 m5 B4 R) S4 G9 q/ }5 }

% d3 n1 `! p; Z1 d' _5 ~9 E6 |. V/ W【10】浙江大学. r  G3 W- ^7 Q1 w: h
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attackspp. 53-53  N* s4 U8 w$ H" V0 A$ s
by Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren
& M0 D8 ^+ l2 m- y1 G8 W/ r- `8 V( t' R- w1 P* S
【11】浙江大学) C4 X# i! `7 n
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Featurespp. 56-56# j! m' ^. a. z5 m% V" @4 l# z
by Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren
) O0 \) K: p4 b7 y3 |8 C& D3 x4 I# d$ q; H4 ?1 q9 C  e( e3 N
【12】南开大学7 V( P7 [, V& f6 n1 }/ H
Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Lengthpp. 67-67( k) S& T# ?: ^. h6 l
by Jianning Zhang, Ming Su, Xiaoguang Liu, Gang Wang
2 s- H  {9 F" c4 E: J% ?/ n- |' z  H8 b) |- g+ n$ f2 a# ]
【13】浙江大学
; d- ]% u+ z# T1 wBounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wildpp. 68-68
8 a* n: ]6 @- mby Jie Wan, Jianhao Fu, Lijin Wang, Ziqi Yang, A( t& [9 `) t4 W" t" @
4 i3 \5 A- r0 x3 z  Z
【14】浙江大学
  L& R! A' B  {, U6 G% s4 [SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devicespp. 70-70
1 s5 Y: b" k7 qby Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah) }- o* p: i2 {( K( d  ~
, Z- P" i1 e$ W/ ?- A, O  S
【15】清华大学
6 _7 `2 w4 K" x7 N; H" I* mTest-Time Poisoning Attacks Against Test-Time Adaptation Modelspp. 72-72! o* V1 ^8 d9 i: s5 D9 h
by Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang
- O3 i- k9 a- W- m
; S+ u3 c+ [# i6 O2 L- U# Y【16】上海交大
& {9 ]) u. G  V, mSrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformationspp. 97-97# [" x5 j2 f2 M
by Borui Yang, Wei Li, Liyao Xiang, Bo Li
8 s3 L4 b! U4 _" n# J4 C( y0 O+ g
【17】重庆大学
9 @- F; X8 W* x+ uFrom Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuningpp. 101-1014 @1 r. l. i! [0 a7 Z
by Qiao Zhang, Tao Xiang, Chunsheng Xin, Hongyi Wu
1 F8 U1 Q( H. F/ J2 {- M6 y0 R1 _( `( [: s/ s3 R
【18】东南大学
' [1 O3 N: N9 ^! ^0 A4 o) mTransferable Multimodal Attack on Vision-Language Pre-training Modelspp. 102-1021 m! G: L+ `4 w" n9 |6 H" T
by Haodi Wang, Kai Dong, Zhilei Zhu, Haotong Qin, Aishan Liu, Xiaolin Fang, Jiakai Wang, Xianglong Liu. ^, z" Q7 _+ T0 @5 x# O' K5 `5 F

& V/ q' \9 T+ E: @3 l' _【19】清华大学
2 S1 k3 r, U* U' [BULKOR: Enabling Bulk Loading for Path ORAMpp. 103-103
/ x, }* N. \& k2 X; @by Xiang Li, Yunqian Luo, Mingyu Gao  K$ ~( g* e2 k' W4 h" @
( ]2 J4 n  K0 u  E& O: A8 I+ `
【20】清华大学2 C" d6 o) S& F/ q0 e# y4 y9 S
Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delaypp. 109-109
- t! K. ]; R; E* wby Yuanliang Chen
* E+ T: p+ U% `; ~
$ k4 D) Q7 [9 d* U7 V" s6 W9 u9 W【21】浙江大学
3 Y- E, v. h2 W* s: i0 d. tUnderstanding and Benchmarking the Commonality of Adversarial Examplespp. 111-111
0 a  v, L' d. I4 Gby Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu  y9 V* g7 ]& L) ]

0 p+ e! k9 O# R! Q. X2 c# O4 d1 [【22】电子科技大学1 V3 T& L8 _5 E  @
NURGLE: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulationpp. 125-125+ U. q# o. L1 q7 B: M
by Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu2 |0 u& U+ I4 X4 {( F

# C& z+ ?2 h# X# R$ k; o. ?【23】清华大学
  T  |$ Q, W8 M3 ?LABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devicespp. 127-127
5 Y9 g  l% \3 i  h  Iby Hangtian Liu, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Xiangzhi Wang, Guangming Gao
1 G2 w8 J, G1 d' y: E- n. g) O7 O* ?9 K  G' }
【24】清华大学; o8 z  s0 D5 n% V5 n& ^# x& ^# R! P; _
Break the Wall from bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewallspp. 129-1294 i1 \" `( y2 u# f$ b$ |
by Qi Wang, Jianjun Chen, Zheyu Jiang, Run Guo, Ximeng Liu, Chao Zhang, Haixin Duan+ o- x) `7 L0 o; s/ z9 g4 O, ~
( o& z7 f# g. M% {
【25】清华大学; u+ k/ x  @/ c( Z% f# B
GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocolspp. 131-131
9 Q+ C/ e/ o* P1 W7 h0 I, Gby Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song
2 z+ ^6 s, Y" q/ m0 H! d4 y6 V4 @: f9 Z8 T) g2 ^
【26】清华大学, ?: b8 t2 n* Y# |
More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Servicespp. 138-138
5 y6 k: F( A7 o) ~7 x/ Oby Yacong Gu, Lingyun Ying, Huajun Chai, Yingyuan Pu, Haixin Duan, Xing Gao
/ U# x& z! [4 B) |# I9 j. ?! J* {1 l) L
【27】西电+ s) u: P2 B7 L* s3 t* B  i; Z
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledgepp. 148-148  v+ u8 e# Y9 N' L% Z# l
by Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino4 Y/ [% s8 d4 C; H

$ N7 l3 |3 x9 l8 F& l【28】清华大学2 M: t+ }2 x% x
The Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellationspp. 149-1493 }/ R9 \' M5 T2 c: s' e1 e* {. ^
by Wei Li, Yuanjie Li, Hewu Li, Yimei Chen, Yufeng Wang, Jingyi Lan, Jianping Wu, Qian Wu, Jun Liu, Zeqi Lai
' W4 \0 f$ W# k; M5 a' N  Q: A8 D7 S5 o4 O9 }5 S
【29】复旦大学* N. _" i$ h: ^8 |
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Constructionpp. 150-150! O  ~/ i0 |0 c/ F. N
by Bofei Chen
. t- F0 |3 Q% h: ^4 A( F* o
4 @- E- `; Y# `, L8 w! n【30】山东大学
# R8 h- r3 k8 x9 c8 WAVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detectionpp. 155-155
% Z, j; N6 y9 s, C* x2 R" d$ Nby Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao  W$ l7 Z. {1 i4 p5 B, x
  E) u; ?. ?7 n% H* U7 w
【31】北京大学
: T+ F* J# O' P. S8 E- }Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelitypp. 160-160
) y5 I) d/ J1 g. q/ Bby Xinming Wei, Jiaxi Zhang, Guojie Luo
! R1 G, z0 V/ z6 y8 F
* B% h' e2 ~( B1 e: P% P1 ^$ P1 \

高级战友

Rank: 4

503

积分

0

贡献

0

奖励
发表于 2024-2-3 16:05:18 来自手机 | 显示全部楼层
清浙遥遥领先

新手上路

Rank: 1

13

积分

0

贡献

0

奖励
发表于 2024-2-3 16:22:26 | 显示全部楼层
浙大威武

中级站友

Rank: 3Rank: 3

151

积分

0

贡献

0

奖励
发表于 2024-2-4 23:36:20 来自手机 | 显示全部楼层
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records in Collision Attacks on SHA-2. Accepted by EUROCRYPT 2024, Zurich, Switzerland, May 26-30, 2024.   

分区版主

Rank: 8Rank: 8

3225

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-4 23:43:26 来自手机 | 显示全部楼层
不知而已 发表于 2024-2-4 23:366 n& O# O8 d- O; x0 y
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...
+ Q/ o  |  N, `# t7 V' {3 m* |
哈这位是我学姐,王院士的学生。
) q& H$ _. S, I23年她在欧密会就有文章,在SHA-2方面做得很好。

老战友

Rank: 5Rank: 5

1856

积分

1

贡献

800

奖励
发表于 2024-2-19 16:46:34 | 显示全部楼层
usenix security 2024 accepted papers( e  U( C* d5 Y
https://www.usenix.org/conferenc ... mer-accepted-papers

老战友

Rank: 5Rank: 5

1856

积分

1

贡献

800

奖励
发表于 2024-2-19 16:57:35 | 显示全部楼层
本帖最后由 大师大楼 于 2024-2-19 16:59 编辑
5 G' [6 D4 W; Z7 t1 H9 Q$ y( p/ P3 o! L* d+ z
usenix security 2024/ A4 D: S$ C0 s( m- H* u
浙大 东南2
. @' O7 K$ L+ D) c! _, t* D武大北邮等 1" y3 Z5 }  ~" W; T7 q0 q: O  I
包括清华上交在内,大部分都是空白?

分区版主

Rank: 8Rank: 8

3225

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-19 16:58:58 | 显示全部楼层
大师大楼 发表于 2024-2-19 16:57
# V! x% m) [+ n: d! Pusenix security 2024" ~) x6 S4 f- t* P* I$ k/ G' v
浙大 2
' ~% O2 {2 M' ?( P武大北邮等 1

+ m  @% `: I; R: E3 C还有一轮应该没出来

老战友

Rank: 5Rank: 5

1856

积分

1

贡献

800

奖励
发表于 2024-2-19 17:08:00 | 显示全部楼层
SmithArno 发表于 2024-2-19 16:58
; y* N/ z' v, s8 ~) ]还有一轮应该没出来
4 i0 v# z$ n. |& @4 Y# }7 \
嗯,耐心等待

老战友

Rank: 5Rank: 5

1072

积分

0

贡献

0

奖励
发表于 2024-2-19 19:29:03 来自手机 | 显示全部楼层
清华浙大太牛了!

初出江湖

Rank: 2

97

积分

0

贡献

0

奖励
发表于 2024-2-19 23:24:43 | 显示全部楼层
南京大学三项0蛋啊。1篇都没有啊

未关注公众号会员1

92

积分

0

贡献

0

奖励
发表于 2024-2-20 10:41:54 | 显示全部楼层
三大密码顶会算信息安全的成果吗

分区版主

Rank: 8Rank: 8

3225

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-20 10:48:29 来自手机 | 显示全部楼层
ecnuking 发表于 2024-2-20 10:41
9 K2 j$ L5 W+ L4 @三大密码顶会算信息安全的成果吗

; w: D; ^, t1 o6 D密码方向主要统计三大顶会和密码学顶级期刊JoC。
0 ~% i7 e# O/ _5 p& S, Z( ?% v; ]目前有零星的信息,IACR还没出Accepted papers。

白银长老

Rank: 8Rank: 8

3167

积分

1

贡献

2000

奖励
发表于 2024-2-21 12:23:18 | 显示全部楼层
浙大徐文渊:连续三年担任网安四大顶会的大会联合主席# p7 W' f* @; ]  R' z. W8 |1 r
USENIX Security 2024
; i$ t* ?: @+ [% D, @7 n' r% @% h+ {NDSS 2023
4 _* r( I; l1 F8 i. BNDSS 2022

白银长老

Rank: 8Rank: 8

3167

积分

1

贡献

2000

奖励
发表于 2024-2-21 12:24:27 | 显示全部楼层
近日,浙江大学共有12位教师担任国际信息安全顶级会议ACM CCS 2024的程序委员会委员,入选总人数排名全球高校第一。其中巴钟杰、申文博、冯博、刘金飞、罗梦、周亚金、娄坚、姚培森、秦湛(按姓氏笔画排序)9位教师来自浙江大学区块链与数据安全全国重点实验室。

黄金长老

Rank: 9Rank: 9Rank: 9

4526

积分

0

贡献

0

奖励
发表于 2024-2-21 14:20:26 | 显示全部楼层
乡下 发表于 2024-2-19 23:29
  m! K. l. E" C3 D郑州信大,网安国家队核心队员之一,0蛋?

5 M- L8 N" q$ {- |" f7 N' W能发吗??

中级站友

Rank: 3Rank: 3

189

积分

0

贡献

100

奖励
发表于 2024-2-23 11:18:14 | 显示全部楼层
没有军信,都是假榜4 d5 }8 j: k6 S6 K
看看邬院士的程控交换机,才有后来的巨大中华6 R9 I1 [/ t4 m7 X' B, x
信息安全,缺了军信,可信度太低

老战友

Rank: 5Rank: 5

1856

积分

1

贡献

800

奖励
发表于 2024-2-23 11:49:38 | 显示全部楼层
本帖最后由 大师大楼 于 2024-2-23 11:51 编辑 1 N9 Z& P3 R: ?. [" {

  P$ N1 J& G$ U$ `: T) i1 F. N如果军方还是继续画地为牢,固步自封,不借助世界一流高校和院所的力量,那么俄罗斯就是前车之鉴。

老战友

Rank: 5Rank: 5

1856

积分

1

贡献

800

奖励
发表于 2024-2-23 11:51:14 | 显示全部楼层
academic818 发表于 2024-2-21 12:23
. r6 \0 _8 F: W浙大徐文渊:连续三年担任网安四大顶会的大会联合主席
0 g7 e- V9 U* L: ^# q2 BUSENIX Security 20244 m8 I! H+ Q  u( N( x! f3 ]" ^
NDSS 2023
- B- ?% v' S' _; o
水平是特别高啦,但在中国现行体制下,还有待被发掘

老战友

Rank: 5Rank: 5

1249

积分

1

贡献

800

奖励
发表于 2024-2-23 12:09:24 | 显示全部楼层
大师大楼 发表于 2024-2-23 11:51
3 \& m4 D6 @& `$ h  v4 U7 F7 n水平是特别高啦,但在中国现行体制下,还有待被发掘

) C3 _. S! d1 Z: f, y她好像比较低调的,待在电气学院内,好像还拒绝提拔副院长

初出江湖

Rank: 2

91

积分

0

贡献

0

奖励
发表于 2024-2-23 12:09:52 | 显示全部楼层
academic818 发表于 2024-2-21 12:23
3 n+ s' y5 l+ X2 k$ _' P浙大徐文渊:连续三年担任网安四大顶会的大会联合主席' K! Q7 v: |& \4 f
USENIX Security 2024: ?( Y4 \( I$ c. ~: e# ~
NDSS 2023

7 x) p- Z1 B% b! r- l" p" |这么多卖点,宣传太差,差不多的年龄,颜宁都院士了

中级站友

Rank: 3Rank: 3

406

积分

0

贡献

0

奖励
发表于 2024-2-23 12:26:05 来自手机 | 显示全部楼层
也不是每个人都适合做领导哈哈哈

中级站友

Rank: 3Rank: 3

151

积分

0

贡献

0

奖励
发表于 2024-2-25 19:07:24 来自手机 | 显示全部楼层
不知而已 发表于 2024-2-4 23:360 I" H* G9 j( I$ B+ P* Z3 M
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...

  @% p2 C1 a( p6 b华师大软院通讯今年还accepted一篇欧密 《Registered Functional Encryptions from Pairings》
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

论坛的微信公众号(二维码如下),关注获取更多科教信息

Archiver|手机版|网大论坛 ( (鄂ICP备2021013060号-2) )

GMT+8, 2024-11-21 22:12 , Processed in 0.051540 second(s), 22 queries , Gzip On.

鄂公网安备 42018502005923号

Powered by Discuz! X3.4

Copyright © 2001-2022, Tencent Cloud.