网大论坛

 找回密码
 立即注册
查看: 24515|回复: 71

2024年信息安全领域顶会统计(Eurocrypt/FSE)

[复制链接]

分区版主

Rank: 8Rank: 8

3403

积分

0

贡献

1600

奖励
发表于 2024-2-3 09:59:37 | 显示全部楼层 |阅读模式
本帖最后由 SmithArno 于 2024-3-8 16:28 编辑 $ |  p1 P- b( O) \3 l" ~. G; H
; [0 d  H2 B0 g0 ?4 l
按照第一作者单位统计(信息安全四大顶会+密码三大顶会)
9 Y8 q' A; r: \; VNDSS 2024概览
( x( O6 o: m' q* C" ~  `清华大学13篇,浙江大学9篇,华中科技大学3篇,南方科技大学2篇。
. c( Z- v, n/ W$ W) z东南大学、中国海洋大学、北京航空航天大学、山东大学、北京大学、中山大学、武汉大学、中科大、NUDT、上海科技大学等等1篇。' A8 m9 V5 e# D* @; }8 k
( _6 m/ \/ @! q; G+ w0 j
CCS 2024! `; P9 s/ l1 z% s

5 o) S, w6 T' bIEEE S&P 2024概览' ?0 t4 r/ |" `$ O% f( o
清华大学10篇,浙江大学6篇,华中科技大学、复旦大学、东南大学2篇。其他重庆大学、山东大学、南开大学、西电、成电等等1篇。
7 A+ _( ~4 z! G4 }- T9 R) E! d5 T, B5 Z0 G
Security 2024
# j/ U6 j( F% B6 D6 f8 s7 h& p1 E/ E

6 b/ V# z7 V4 y, J- [Eurocrypt 2024. M7 p- s4 Y; f& Z( O" q; _5 `
华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。
: ~& \( F! ]$ a. W$ v7 s; h
& M! n* W3 k& i0 P8 _- c, q
8 H2 C8 h+ W' S7 U- H: P2 S
6 A" v7 |- V  y. {获奖情况:
% s. H0 T9 k  d; Y: N" B1 ~/ A& s【1】浙江大学获得NDSS 2024杰出论文奖。& O: H' B3 f# l( }

/ R, z+ d3 w3 t$ w2 i9 u4 X! S) C+ F7 Q
, O# b3 t+ m  o/ C' ]! G
) L1 A3 N4 V0 j+ I
/ J! z! k* y) w- ?) k; l- b8 W2 @
( Q- n; b0 M: M: U) }3 j- d

分区版主

Rank: 8Rank: 8

3403

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-3-4 09:47:58 | 显示全部楼层
Eurocrypt 2024,共接收105篇论文,国内共8篇,华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。
: g% D! [# R4 A* u' ~- I% S
! `8 b  W8 @- l/ |% q. p【1】山东大学
8 T0 {6 |# N: ?( v9 u! `. DMassive Superpoly Recovery with a Meet-in-the-middle Framework -- Improved Cube Attacks on Trivium and Kreyvium
$ I! r3 [  h1 F2 y* f) o7 iJiahui He, Kai Hu, Meiqin Wang, Hao Lei5 Q# U3 D/ Q& i. w9 O# L, y
Shandong University, Nanyang Technological University
' y3 N2 m9 R. q4 h* B! A8 R) W; Q3 e( J/ Z4 i3 a
【2】清华大学( U0 S. `! D# z
Accelerating BGV Bootstrapping for Large $p$ Using Null Polynomials Over $\mathbb{Z}_{p^e}$
( P$ s) l5 ~2 O& k4 c' D- kShihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang$ \% U; q# c6 }& U
Tsinghua University
. R4 D) @. j5 D9 t
) y* h  a( F8 z【3】华东师大: L, x& g: Y- h, t4 g; S$ O; @" Y3 H
Registered Functional Encryptions from Pairings
  H' g0 `9 X. l1 JZiqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian
: W2 o9 }  _  X6 v  M. F4 M' PEast China Normal University, Shanghai University, Shanghai University of Electric Power  V: h# R, [/ \# U
% E( Y* V( X! ^) {( I$ W1 |% I
【4】南科大
+ A! V  S, \- ~+ bIntegrating Causality in Messaging Channels
6 q5 \1 a) q: P& c# B4 N$ yShan Chen, Marc Fischlin
, [8 p  X$ l2 d; @8 nSouthern University of Science and Technology, TU Darmstadt
% |% E) n' J5 Q' R
/ o$ C  s+ N7 ~, m+ v) p& x* E. ^【5】暨南大学: X# ^( c3 u0 z8 X
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond
% i- X# }7 A; bLing Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng
7 Q5 L* A9 E0 V- A7 k! f1 GCollege of Cyber Security, Jinan University, Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering' t' }3 h- C2 k) o

+ M7 @0 c* ~# M- `5 C( `. l' p【6】上海交大
  g* p6 ~; F- u+ b! }+ D8 UThe Hardness of LPN over Any Integer Ring and Field for PCG Applications
  y: L) P* |8 P+ X8 L* WHanlin Liu, Xiao Wang, Kang Yang, Yu Yu) [' D% Z/ V$ S/ u$ d+ Z
Shanghai Jiao Tong University, Shanghai Qi Zhi Institute, Northwestern University, State Key Laboratory of Cryptology- s* u3 n; _/ J7 ]2 L
4 g, f& h2 C  |. ~, L
【7】上海交大
* W4 |1 ?: t1 r# L" I6 F: M; D' qUniversal Composable Password Authenticated Key Exchange for the Post-Quantum World8 Q! X. e: S* v1 w5 {+ w( G+ m
You Lyu, Shengli Liu, Shuai Han/ c, m) @* @- y! Q) W, E% c
Shanghai Jiao Tong University
& z9 I% D3 i( i/ h/ K' _$ G& T0 ~% ?/ M) T
【8】华东师大
( r# @6 ^/ |* h  A, }New Records in Collision Attacks on SHA-2! R" _+ k1 Y* Y; C8 p9 Q7 G
Yingxin Li, Fukang Liu, Gaoli Wang
" D$ e3 S2 A9 j4 nEast China Normal University, Tokyo Institute of Technology
, |! X5 Y) ?/ L: y3 {/ |6 L2 Z* f; G2 `9 x

分区版主

Rank: 8Rank: 8

3403

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 09:59:41 | 显示全部楼层
本帖最后由 SmithArno 于 2024-2-3 10:06 编辑
* Z0 Q$ C' h# q/ ^: L) c, D! W+ p2 W8 `. P+ }
NDSS 2024会议主页:https://www.ndss-symposium.org/ndss2024/accepted-papers/
0 J! k( U) q$ }5 M1 S, C3 A' `
3 }5 ~- D9 d2 l) I8 T- `/ i【1】山东大学
0 r9 [. V$ p/ K% C) ]/ ASecurity-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols, g- i3 o0 W: {( }+ ^' ~
Shichen Wu (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Puwen Wei (1. School of Cyber Science and Technology, Shandong University 2. Quancheng Laboratory 3. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Ren Zhang (Cryptape Co. Ltd. and Nervos); Bowen Jiang (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education)
5 `3 K6 F/ i/ _0 G( ?3 }3 p
; I7 b* e( a* D2 y9 G【2】东南大学
8 A6 y/ ?5 G% l1 X5 ?LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems+ v5 H0 l7 U% r; Z6 h& c4 h6 C5 u, _. u
Huaiyu Yan, Zhen Ling, Haobo Li (Southeast University); Lan Luo (Anhui University of Technology); Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang (Southeast University); Junzhou Luo (Southeast University, Nanjing, P.R. China); Xinwen Fu (University of Massachusetts Lowell)4 o, K  \# i4 f- ?

$ v% [3 j8 v+ T; Q7 R/ s【3】浙江大学* w, C1 k5 j6 W5 h! \' X: W
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards+ E# v' D2 Q( J- p5 _+ r
Qinhong Jiang, Yanze Ren (Zhejiang University); Yan Long (University of Michigan); Chen Yan (Zhejiang University); Yumai Sun (University of Michigan); Xiaoyu Ji (Zhejiang University); Kevin Fu (Northeastern University); Wenyuan Xu (Zhejiang University)
' s7 [7 P! B: f9 U. x* ~
0 g; Y: K8 g- C3 k【4】浙江大学
$ m$ t/ X# W2 aInaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time4 w* O8 z& {* K5 r( x& Q
Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)3 q7 s5 f* I+ T  k8 o* J. M; M
* y9 _' @1 P) I' _; f+ `# R2 }
【5】北京航空航天大学
. U0 ]; f# q1 q# BHEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation1 O  g6 J8 O9 f* b3 l$ ?* ^- l
Song Bian, Zian Zhao, Zhou Zhang, Ran Mao (Beihang University); Kohei Suenaga (Kyoto University); Yier Jin (University of Science and Technology of China); Zhenyu Guan, Jianwei Liu (Beihang University)
6 V+ Y' u2 r4 N/ V% P
* L' [# t4 ?# ~0 ^【6】清华大学, ^. U" g  X9 l" s" ?; C& I
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic
7 b) n) d# {7 r" ~2 f3 H* d% rYuqi Qing (Tsinghua University); Qilei Yin (Zhongguancun Laboratory); Xinhao Deng, Yihao Chen, Zhuotao Liu (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Jia Zhang, Qi Li (Tsinghua University)
* O# R$ R5 Q5 ]+ T
% ^! ~% t4 B8 c8 d3 N: S. {+ o【7】浙江大学
% I, e7 R7 x( M/ Q0 {6 d8 }: cSymphony: Path Validation at Scale# _* s: G2 Q: K. Y/ l& T8 m
Anxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren (Zhejiang University)' y) s, ?1 P6 J4 O7 i; S8 g2 ?

; A) ?: h) p3 E+ r* V' }( u0 q【8】清华大学
. C) O0 {( ]7 p, R: J* [BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet# R- X1 }, s1 O  l$ ~
Chuhan Wang, Yasuhiro Kuranaga, Yihang Wang (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Linkai Zheng, Xiang Li (Tsinghua University); Jianjun Chen (Tsinghua University; Zhongguancun Laboratory); Haixin Duan (Tsinghua University; Quan Cheng Lab; Zhongguancun Laboratory); Yanzhong Lin, Qingfeng Pan (Coremail Technology Co. Ltd)8 g) U: q* x7 T6 ?* o
' B% O: F, @3 u4 G2 M
【9】浙江大学( R0 E* s* _, a0 w
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency4 t9 O3 h0 s& L: i6 {
Jiacheng Xu, Xuhong Zhang, Shouling Ji (Zhejiang University); Yuan Tian (UCLA); Binbin Zhao (Georgia Institute of Technology); Qinying Wang, Peng Cheng, Jiming Chen (Zhejiang University)5 [$ |2 s+ F1 |, `' L
1 s! R/ Q# p  |6 C
【10】清华大学
& E$ l+ B5 @& f8 ]' fShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection
4 s- S0 V9 X: y5 [  A# b; a2 gKunpeng Zhang (Shenzhen International Graduate School, Tsinghua University); Xiaogang Zhu (Swinburne University of Technology); Xi Xiao (Shenzhen International Graduate School, Tsinghua University); Minhui Xue (CSIRO’s Data61); Chao Zhang (Tsinghua University); Sheng Wen (Swinburne University of Technology); E# p  l, m1 g# |# j9 Y& S
. j$ {, \" K  S6 _
【11】中国海洋大学, V- k4 `& |2 j9 F' n: t
Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack
* V0 F8 |  a$ ?6 tHui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu (Ocean University of China)
0 m# P/ P; _: }% E  C( i1 n0 A  \; m4 H+ [' T; T9 \
【12】浙江大学
5 d& Z9 V$ L! S  ~# d5 }( u$ Y& N2 }ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning
6 d/ T! V2 j5 U3 V# }9 j; VLinkang Du (Zhejiang University); Min Chen (CISPA Helmholtz Center for Information Security); Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen (Zhejiang University); Zhikun Zhang (Stanford University)
3 [) c& Q$ w3 U. p# _
* n8 |3 @# K- G- r: F【13】北京大学: C: @" @6 Z8 {
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
  N0 T. P5 @, h) \Shaofei Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Feng Dong (Huazhong University of Science and Technology); Xusheng Xiao (Arizona State University); Haoyu Wang (Huazhong University of Science and Technology); Fei Shao (Case Western Reserve University); Jiedong Chen (Sangfor Technologies Inc.); Yao Guo, Xiangqun Chen (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Ding Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University)
+ V5 C' t& p6 u/ G; v# c* f8 C0 W' C
【14】浙江大学
  c. Z. n7 V* v1 b1 iLMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors
7 p' M# o( r: N% G1 H" P8 f$ AChengkun Wei, Wenlong Meng (Zhejiang University); Zhikun Zhang (Stanford University); Min Chen (CISPA Helmholtz Center for Information Security); Minghu Zhao (Zhejiang University); Wenjing Fang, Lei Wang (Ant Group); Zihui Zhang, Wenzhi Chen (Zhejiang University): P) n; V( f) _, v
8 ?" P+ g8 y/ b3 U
【15】湖南大学4 `- {& V* n# I7 P7 K# ?0 K# S/ K) Y
Eavesdropping on Black-box Mobile Devices via Audio Amplifier’s EMR
) L) J* b$ d) z6 GHuiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Kenli Li (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Zheng Qin (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Mingxing Duan (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Yong Xie (Nanjing University of Posts and Telecommunications, Nanjing, China); Daibo Liu (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Ming Li (The University of Texas at Arlington, USA)
$ W8 v9 R, n4 `) W+ f) q
- m/ b' V7 P. V) q- `5 R" P# [【16】上海交大' q5 ?1 w: ^7 Q0 h5 ^) L
Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models
3 O1 d: M+ k+ {  \$ BShiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang (Shanghai Jiao Tong University); Chenghu Zhou (Chinese Academy of Sciences); Bo Li (Hong Kong University of Science and Technology)+ s; ^2 k/ h2 ^5 Z# B
0 D4 z$ _! m& d' w! ~
【17】清华大学' X9 O0 ~) ^! J  M! {+ s& T/ h
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks
, C- S  {: o# Z/ q5 B4 n. d7 G7 U3 |- }Yuxiang Yang, Xuewei Feng, Qi Li (Tsinghua University); Kun Sun (George Mason University); Ziqiang Wang (Southeast University); Ke Xu (Tsinghua University)' x/ k" H" n' R; y7 C

: A& u7 e4 S7 k9 C【18】清华大学
5 ~% q$ i& a- I7 YCP-IoT: A Cross-Platform Monitoring System for Smart Home- J" X6 u* @( D
Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang (Tsinghua University); Linna Fan (National University of Defense Technology); Chenxin Duan (Tsinghua University)0 K: W( z9 F, \0 }9 a" l* h

; X- j# z0 E7 S/ m7 t6 Y( V【19】清华大学
5 m; p5 g* R7 X" z+ K7 O1 f. ULoRDMA: A New Low-Rate DoS Attack in RDMA Networks) G1 _' Y% y: C9 c% }& ?
Shicheng Wang (Tsinghua University); Menghao Zhang (Beihang University & Infrawaves); Yuying Du (Information Engineering University); Ziteng Chen (Southeast University); Zhiliang Wang, Mingwei Xu (Tsinghua University & Zhongguancun Laboratory); Renjie Xie (Tsinghua University); Jiahai Yang (Tsinghua University & Zhongguancun Laboratory)* e' P1 D- [) V8 k1 S: E1 v8 A
9 C3 z, M3 @2 W3 ?
【20】清华大学
: I2 B; ^) ~7 x8 w, o& v) TReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing8 f& k8 t5 ^; q7 G5 i0 U
Linkai Zheng, Xiang Li, Chuhan Wang, Run Guo (Tsinghua University); Haixin Duan (Tsinghua University; Quancheng Laboratory); Jianjun Chen, Chao Zhang (Tsinghua University; Zhongguancun Laboratory); Kaiwen Shen (Tsinghua University)
( U# {  I( M* v0 _7 _7 o! O5 h/ [, s; S$ `5 g) a& L0 w: j
【21】清华大学/ p! z# T2 h7 {8 j
Automatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization- M/ D  L7 J  g9 T
Quan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang (Tsinghua University)9 n: z1 L5 a6 X7 J* N8 Z

* ]/ m- S4 W- M0 \$ i+ L) {2 [【22】清华大学
; U7 |5 Z8 J5 N. q5 m4 Y3 a2 [DynPRE: Protocol Reverse Engineering via Dynamic Inference
) A% n. P+ e1 Q7 f4 VZhengxiong Luo (Tsinghua University); Kai Liang (Central South University); Yanyang Zhao, Feifan Wu, Junze Yu (Tsinghua University); Heyuan Shi (Central South University); Yu Jiang (Tsinghua University)- ^1 k7 u2 H- e- {5 T) T2 |# U
2 E8 G: e. h# Y# v0 q
【23】浙江大学+ g- v. t1 I  X) X" ~+ p
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention1 O% e3 k# F" b) ]6 D  h3 u& [0 R# I
Lujia Shen, Yuwen Pu, Shouling Ji (Zhejiang University); Changjiang Li (Penn State); Xuhong Zhang (Zhejiang University); Chunpeng Ge (Shandong University); Ting Wang (Penn State)* Y1 V4 i$ f# a
  `; K% r% C$ U
【24】中山大学
- T4 v1 ]7 |3 T/ z0 e6 GLeaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem
6 g1 t, X1 g* V/ |* KJiangrong Wu, Yuhong Nan (Sun Yat-sen University); Luyi Xing (Indiana University Bloomington); Jiatao Cheng (Sun Yat-sen University); Zimin Lin (Alibaba Group); Zibin Zheng (Sun Yat-sen University); Min Yang (Fudan University)+ {; p) s9 h! c% \/ \

- W! P+ v  W0 D# k8 ^. s2 l! F! U1 @【25】浙江大学
8 d: w# Z" r5 p: t9 m% QCamPro: Camera-based Anti-Facial Recognition
1 u  q2 @9 S6 [3 e3 T' K: ^Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)
) ]1 H2 @- x! j) X1 ^+ X
1 b  x7 E3 W7 \; J【26】中国科学技术大学( E; v, x2 @! m6 e- \8 b" J
Detecting Voice Cloning Attacks via Timbre Watermarking
$ Q: ^% o+ x& x# S9 y5 CChang Liu (University of Science and Technology of China); Jie Zhang, Tianwei Zhang (Nanyang Technological University); Xi Yang, Weiming Zhang, NengHai Yu (University of Science and Technology of China)
, e7 h* x# b( Y" O6 o' i! p8 S; p+ ~
【27】清华大学
6 u* c% Y" [0 w8 }Understanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed4 ]; l2 a0 p/ d5 K' B1 b) m
Lancheng Qin (Tsinghua University, BNRist); Li Chen (Zhongguancun Laboratory); Dan Li (Tsinghua University, Zhongguancun Laboratory); Honglin Ye, Yutian Wang (Tsinghua University)
# f- _8 k. N7 S- h7 g2 A# R3 K& F: J+ Q9 i2 f9 m1 \1 Y
【28】清华大学1 f: Z) f/ t# b! a- K9 v) M8 J
dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository# u. F+ @0 k# q& E$ ]
Yingying Su, Dan Li (Tsinghua University); Li Chen (Zhongguancun Laboratory); Qi Li (Tsinghua university); Sitong Ling (Tsinghua University)0 V2 d- c6 H: Q+ ?; M. c# g6 l% S

6 L$ c+ u# ]" _- n$ {! n4 j) ]% M8 ~【29】清华大学: K6 U( l$ z; @7 h4 Z
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption4 o$ G7 F  c1 ^3 X6 @
Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu (Tsinghua University)
; }! C5 @: }- Z% j# ^2 M' H# n. K4 Z8 ]
【30】NUDT5 L5 j) ?. b7 e& ^# v( U+ k
DeepGo: Predictive Directed Greybox Fuzzing
( W, u' _# B0 c7 Y8 f& ]  O6 R6 BPeihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang (National University of Defense Technology)
+ t6 H  `7 B" ~
+ E% {' Z7 w( B" a2 H0 c# I3 ?【31】上海交大
' `3 X* y0 t' f# _$ ]9 QActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token, s+ y* p9 a; w
Ge Ren, Gaolei Li, Shenghong Li, Libo Chen (Shanghai Jiao Tong University); Kui Ren (Zhejiang University)- w3 i" v1 ?# Z

: Z& r1 N9 e# m$ y7 t【32】华中科技大学) I+ o: S/ B# F, y
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
0 W9 g0 N$ l3 x$ v* a- s. ?Man Zhou, Shuao Su (Huazhong University of Science and Technology); Qian Wang (Wuhan University); Qi Li (Tsinghua University); Yuting Zhou, Xiaojing Ma (Huazhong University of Science and Technology); Zhengxiong Li (University of Colorado Denver)4 S1 e3 ~; a! `' A3 S6 L

. i" }& M. P' G3 i% M: b. l【33】南方科技大学/ q3 c5 m5 c# y4 y7 Z
Separation is Good: A Faster Order-Fairness Byzantine Consensus& Q# g3 I9 C) U+ Z* B& r& ?
Ke Mu (Southern University of Science and Technology, China); Bo Yin (Changsha University of Science and Technology, China); Alia Asheralieva (Loughborough University, UK); Xuetao Wei (Southern University of Science and Technology, China & Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation, SUSTech, China)7 d# {: C- u. a) A" K& R- v
/ ]  \" W4 n5 o  B4 p
【34】南方科技大学
% q* h" j+ o% w. w1 q$ i$ S4 Z1 S/ OCAGE: Complementing Arm CCA with GPU Extensions' B' h5 ]7 l5 j4 n1 t
Chenxu Wang (Southern University of Science and Technology (SUSTech) and The Hong Kong Polytechnic University); Fengwei Zhang, Yunjie Deng (Southern University of Science and Technology (SUSTech)); Kevin Leach (Vanderbilt University); Jiannong Cao (The Hong Kong Polytechnic University); Zhenyu Ning (Hunan University); Shoumeng Yan, Zhengyu He (Ant Group)
! c3 @  k) p+ k) R1 ^) H' O/ q
# I& @. a4 w) ?3 \【35】华中科技大学
8 J$ `- }2 Z6 |0 d+ |& T" i$ fDorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses& q0 O7 X. q5 W* A. j
Chaoxiang He, Xiaojing Ma (Huazhong University of Science and Technology); Bin Benjamin Zhu (Microsoft Research Asia); Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin (Huazhong University of Science and Technology); Dongmei Zhang (Microsoft Research)
, X. b8 {. A( g5 }+ F2 U7 _) D0 ~
6 _" N. y# K4 u0 N【36】华中科技大学5 v% k* i# g& ~  I+ M
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit
6 m0 h# {5 r) |' hPengxiang Ma (Huazhong University of Science and Technology); Ningyu He (Peking University); Yuhua Huang, Haoyu Wang (Huazhong University of Science and Technology); Xiapu Luo (The Hong Kong Polytechnic University)( u  D" j% P  z) m

' V& M0 _5 Y% n; p6 g【37】浙江大学
0 k9 P8 w6 C/ w& m3 Z# t) ?! _0 DUniID: Spoofing Face Authentication System by Universal Identity- {; |; l2 U; o5 }; |
Zhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji (Zhejiang University); Wenyuan Xu (Zhejing University)
" q9 K' p3 B: X: z7 n) C
9 @7 L9 r( Q2 Z- M【38】武汉大学; W4 j# c3 r4 {# q
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices
4 ~) c0 S$ `2 |$ WYue Xiao (Wuhan University); Yi He (Tsinghua University); Xiaoli Zhang (Zhejiang University of Technology); Qian Wang (Wuhan University); Renjie Xie (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Qi Li (Tsinghua University)
0 ?; v* g6 L2 M* o: b
* q6 k- L2 ~' P【39】上海科技大学
( _7 z/ a+ T- lSLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems- [4 f8 k  u8 f. y
Guangke Chen (ShanghaiTech University); Yedi Zhang (National University of Singapore); Fu Song (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences)" W+ G% O$ N7 X4 A' o$ h$ J/ {

$ R. d% J* {1 P/ S$ V【40】清华大学
) O- ?) H2 j5 v! C4 |You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks
. ~' @: S, b0 ~* s5 ~4 {Qiushi Li (Tsinghua University); Yan Zhang (China Agricultural University); Ju Ren, Qi Li, Yaoxue Zhang (Tsinghua University)* _& u7 z7 e: O4 E7 g7 q

老战友

Rank: 5Rank: 5

1403

积分

0

贡献

500

奖励
发表于 2024-2-3 10:15:02 | 显示全部楼层
Wenyuan Xu (Zhejiang University)
$ s, v7 v  U3 d+ d$ s徐文元好几篇
6 l9 L+ y, i& O) e& k3 y) Y

中级站友

Rank: 3Rank: 3

400

积分

0

贡献

0

奖励
发表于 2024-2-3 11:53:22 来自手机 | 显示全部楼层
有2023年的数据吗

分区版主

Rank: 8Rank: 8

3403

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 12:26:14 | 显示全部楼层
0000 发表于 2024-2-3 11:533 a+ [) Z5 s+ T
有2023年的数据吗
) [6 B0 c6 M% L9 v0 s: ]: k# s$ W
https://bbs.netbig.top/thread-26427-1-1.html

普通会员

Rank: 2

123

积分

0

贡献

0

奖励
发表于 2024-2-3 12:49:02 来自手机 | 显示全部楼层
徐文渊老师太强了…

分区版主

Rank: 8Rank: 8

3403

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 12:50:55 | 显示全部楼层
yxy 发表于 2024-2-3 12:49+ ^; p, A# D  m1 P' J; ?( F2 ]
徐文渊老师太强了…
+ e) J6 _$ u; N% F* f
国内现在这几个顶会发文量虽然多了,但头部高校断层明显,基本都是浙大清华屠榜。; u' e$ d  C1 \) v6 J
其他高校偶尔有个一篇两篇的。
7 \; U7 V6 a' ?: I2 K, N7 T* M3 }" T
徐文渊老师不仅输出稳定,而且还有best paper

分区版主

Rank: 8Rank: 8

3403

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 14:55:15 | 显示全部楼层
本帖最后由 SmithArno 于 2024-3-8 16:25 编辑   Y3 \+ n. ?! u0 w2 i

! q9 J# e9 t) x' H# xIEEE S&P 2024
! n$ n( ~. V+ |5 L1 X( \
) v7 k! o3 m# h; J8 c( J6 K【1】华中科技大学
' E) \' K  t! ^8 WWhy Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabilitypp. 10-104 f: j% Q+ A0 j) x7 g1 j# z
by Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin
' g4 ?+ D/ f) x0 M1 y$ q5 x" Q7 w/ ]% m7 V5 y$ R) m3 `  p
【2】华中科技大学% c( Z! K  R$ ]( w# w2 a+ w1 n+ x
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementationspp. 13-139 v. w/ ~. g- U, V3 B
by Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing
0 H5 i( k' ~2 B/ o+ E) @
* I! ^4 s$ ~) ^" A# o, c【3】复旦大学
; i' H- F% F5 QWithdrawing is believing? Detecting Inconsistencies Between Withdrawal Choices and Third-party Data Collections in Mobile Appspp. 14-14: w, r$ t. p  u  M$ A/ Z
by Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang/ c# Z$ P- L# P2 G! Z

; n8 V8 {: ]+ a$ f- _6 A; {【4】浙江大学( Q$ d/ l. X% ?4 d5 F& c
PIRANA: Faster Multi-query PIR via Constant-weight Codespp. 39-398 G8 i  {2 t8 K8 |  Y1 k9 H( ^) R
by Jian Liu, Jingyu Li, Di Wu, Kui Ren- W  Z: M5 U, [; S, w
$ L4 R4 ~  _- j) N" n. C
【5】东南大学& a0 c+ {% {" g7 v, t3 O
Predecessor-aware Directed Greybox Fuzzingpp. 40-40% y5 e# ]/ z  ?) y, ]
by Yujian Zhang, Yaokun Liu, Jinyu Xu, Yanhao Wang0 `2 c0 B4 ^6 \" E7 H2 o6 B
' {" N# x. x) l) U5 ]9 x* X3 t
【6】中南大学
6 A+ a" u7 f6 v" }5 p$ WGuessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Informationpp. 42-42
- m" U8 O/ ?7 E% g! oby Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, Zhuo Lu
: i6 `  D' ^  r. i8 e
, c0 g7 G* g& K【7】清华大学9 V5 }6 q9 L( |* ^7 P- k% E" U
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packetspp. 46-46
% F! X" I, c% p; G& ]( l" nby Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li0 [) m6 y% q* F4 b9 n, Q; i+ Y

* j- o! x0 B$ q" e( _5 Q/ F7 Q【8】清华大学6 h% e2 f# @; u7 k" a
SATURN: Host-Gadget Synergistic USB Driver Fuzzingpp. 51-51
0 U# Q  O# H9 }- A8 fby Yiru Xu, Hao Sun, Jianzhong Liu, Yuheng Shen, Yu Jiang
, N6 U( \4 F5 [! V& U8 N* q; Z" ~, F$ t0 K* F* u
【9】北京大学
- a! E2 F( e% m; w' A8 eNo Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device MLpp. 52-52. W6 E" a; |9 C* X5 k) j7 [# _
by Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Ding Li, Yao Guo, Xiangqun Chen. z. N/ ^0 u& e
7 X1 ^8 w4 |" l
【10】浙江大学
3 }5 K$ T- {, j3 b( NText-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attackspp. 53-53* v0 W& a" U; ^+ A9 _) B
by Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren
+ L1 W& I5 ~' Y# U: l/ \+ Q; J# K' J" a2 b% {' G: G
【11】浙江大学1 C& s6 [# h0 o. p* k/ c
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Featurespp. 56-56
/ W+ _" G, D) K: F# J& \0 `by Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren
! ~) y0 G) P5 {, ?* ]7 I
7 C# ]: B: Y8 t1 C! l$ }【12】南开大学( n7 o7 ]& p+ l/ u( g- V3 f) E
Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Lengthpp. 67-67% I. l  I2 Y$ A* @, W
by Jianning Zhang, Ming Su, Xiaoguang Liu, Gang Wang9 `, q+ i; D7 S! k9 K
6 g2 p" W, `. w- k: ^8 M
【13】浙江大学% ]  y1 t3 ?( Q1 o& H( {# B
BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wildpp. 68-68  g! J# M2 j. r
by Jie Wan, Jianhao Fu, Lijin Wang, Ziqi Yang& `; R# x+ W, J

' s0 N( W0 S4 U. U( i【14】浙江大学! x+ Y7 q3 b% L0 X4 t& k
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devicespp. 70-70) {9 {" g7 \2 `' l' j% |
by Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah* k, E' b/ V! p9 W5 i) c

  [# V  c6 r" o5 K) U! l【15】清华大学
' T8 g4 r: r4 wTest-Time Poisoning Attacks Against Test-Time Adaptation Modelspp. 72-720 C0 z. I0 N! ]5 g0 T- b/ i% Z7 U
by Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang" ?3 V2 K9 j. m2 a7 f; j7 u
& o+ D4 c4 _8 W5 b
【16】上海交大
+ T$ U& w  Q9 f, Q+ PSrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformationspp. 97-97  e) K+ O' `: c0 V# Y
by Borui Yang, Wei Li, Liyao Xiang, Bo Li
$ ^) W/ ~/ J  c- a+ q' h! P3 A: P$ e- R4 H3 t  f2 V
【17】重庆大学
3 k. L  C! [$ _( q& B: `" B) |$ z* t8 NFrom Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuningpp. 101-101! o+ o: r" z( p5 |/ x, \
by Qiao Zhang, Tao Xiang, Chunsheng Xin, Hongyi Wu+ l, c; A' f) p; n* `4 w
" u& a. l  W& g! n$ d& A7 ?" w- N
【18】东南大学; ?2 F5 \" Z) K" v  P% W
Transferable Multimodal Attack on Vision-Language Pre-training Modelspp. 102-102
9 r# L, X- w8 V8 q. u! {: Bby Haodi Wang, Kai Dong, Zhilei Zhu, Haotong Qin, Aishan Liu, Xiaolin Fang, Jiakai Wang, Xianglong Liu
( O# Y/ |) D) f3 u1 a# a9 ?  p/ g4 W; b
【19】清华大学
7 X7 r& f5 E% A- T. A6 y. i; U, tBULKOR: Enabling Bulk Loading for Path ORAMpp. 103-103. j7 e/ H; G5 e' k# F
by Xiang Li, Yunqian Luo, Mingyu Gao
" H( k: V+ q( _/ x) Q6 `3 r( N3 I3 o# d' V2 |+ C; U
【20】清华大学8 H2 z* z: V9 }  s0 t% o7 P
Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delaypp. 109-109: J6 e6 w+ y: d3 @, Y- T9 ]
by Yuanliang Chen. z4 X3 p6 n0 R, l- u5 }
. s6 B) i9 K! |& j) }9 u) X$ M
【21】浙江大学
3 f# p+ D" ~" a9 FUnderstanding and Benchmarking the Commonality of Adversarial Examplespp. 111-111
2 z# ], [1 f0 i9 w8 _by Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu0 r+ A: ~9 |  z6 r
& k- J9 q) {  N
【22】电子科技大学
  E+ I- M  d2 g/ ENURGLE: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulationpp. 125-125
3 h8 F! q% k! j/ j4 \( Z. K0 Tby Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu
8 u9 A- T: Y1 I' \! @- k. _2 u! t! P6 p$ w: o2 ^. j
【23】清华大学9 g  E! `0 T' B2 V
LABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devicespp. 127-127* C( |+ {9 y% w) U; [
by Hangtian Liu, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Xiangzhi Wang, Guangming Gao3 y- G" C: K' n' b( f0 ~; x
$ ^1 V4 C* R; W' L! V2 |8 _1 L
【24】清华大学8 v/ y) R- O, ^
Break the Wall from bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewallspp. 129-129
) A3 z( B1 t( F5 u5 E/ {by Qi Wang, Jianjun Chen, Zheyu Jiang, Run Guo, Ximeng Liu, Chao Zhang, Haixin Duan
% {- X# P6 R/ M! O) H% h7 n) o; Z
【25】清华大学
' V& v# Q2 ?+ o& DGAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocolspp. 131-131
9 j8 I5 B6 K% pby Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song
0 P8 B4 A- \. Z
# |" L& r- Y( |. a6 ]0 i【26】清华大学
1 Z% P; r, P9 w) c' ]) [More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Servicespp. 138-138! q8 K; W; M+ q& Z, U# j
by Yacong Gu, Lingyun Ying, Huajun Chai, Yingyuan Pu, Haixin Duan, Xing Gao
: M3 }3 N& v! D) }
5 I( P6 N' a: u. r; Q2 P0 D" E) w, O【27】西电6 o0 A9 c4 O+ P/ b6 Q
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledgepp. 148-148; A6 I8 g, D2 Z, ?
by Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino
6 N6 d' M+ K0 a1 {$ U7 d: P, g# _* c  s' K% A
【28】清华大学
7 z9 D9 y  u" a- ~$ PThe Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellationspp. 149-1495 ~; x( o& t8 B
by Wei Li, Yuanjie Li, Hewu Li, Yimei Chen, Yufeng Wang, Jingyi Lan, Jianping Wu, Qian Wu, Jun Liu, Zeqi Lai- \7 w1 j2 h- |
$ w3 E' D+ a! o: d5 U) K. Z: F
【29】复旦大学5 L4 c; I; H+ G9 _: Q
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Constructionpp. 150-150
# a# s0 Q0 b' l! }! {by Bofei Chen6 J: \' [4 S9 `$ H, y: L) Y; C% @1 Q/ L3 v

5 l3 r& f6 F/ C3 B【30】山东大学
* Z8 w. @) {. q! IAVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detectionpp. 155-1556 |* o0 c3 j6 h- Y7 b' g0 f' |
by Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao4 S% S5 y6 B0 W' i0 v
$ h: S% ^) L$ }2 E8 E, K. v
【31】北京大学& p7 |. Q' ^: w: \
Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelitypp. 160-160; d. X1 c$ [! g4 [* J+ R
by Xinming Wei, Jiaxi Zhang, Guojie Luo  c, b6 Z; y0 ]: e

, ~% }) z: `) |; i

高级战友

Rank: 4

543

积分

0

贡献

0

奖励
发表于 2024-2-3 16:05:18 来自手机 | 显示全部楼层
清浙遥遥领先

新手上路

Rank: 1

11

积分

0

贡献

0

奖励
发表于 2024-2-3 16:22:26 | 显示全部楼层
浙大威武

中级站友

Rank: 3Rank: 3

175

积分

0

贡献

0

奖励
发表于 2024-2-4 23:36:20 来自手机 | 显示全部楼层
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records in Collision Attacks on SHA-2. Accepted by EUROCRYPT 2024, Zurich, Switzerland, May 26-30, 2024.   

分区版主

Rank: 8Rank: 8

3403

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-4 23:43:26 来自手机 | 显示全部楼层
不知而已 发表于 2024-2-4 23:36. u9 h9 Z% n7 X! _/ e/ ~# |
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...

" [3 t% `! ?, G) S哈这位是我学姐,王院士的学生。
7 i3 G. i2 O5 v7 s( h23年她在欧密会就有文章,在SHA-2方面做得很好。

老战友

Rank: 5Rank: 5

1862

积分

1

贡献

800

奖励
发表于 2024-2-19 16:46:34 | 显示全部楼层
usenix security 2024 accepted papers
" H, t1 k; D2 l/ K' s6 K+ |) I* ?, Mhttps://www.usenix.org/conferenc ... mer-accepted-papers

老战友

Rank: 5Rank: 5

1862

积分

1

贡献

800

奖励
发表于 2024-2-19 16:57:35 | 显示全部楼层
本帖最后由 大师大楼 于 2024-2-19 16:59 编辑
7 G+ p0 t: i* o7 D  T4 r7 H- A9 ~# ^7 a9 D% p% k
usenix security 20246 Y: B7 E$ l: D: l6 j
浙大 东南2* E7 k' w1 P) Z' e* N% P( Q" x5 j
武大北邮等 1% R( }+ T& T  M$ M) [
包括清华上交在内,大部分都是空白?

分区版主

Rank: 8Rank: 8

3403

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-19 16:58:58 | 显示全部楼层
大师大楼 发表于 2024-2-19 16:577 w# K  L  `* k9 R) j
usenix security 2024
, a0 n  |% T0 |浙大 27 M4 a  F9 _: _, D) y/ Y
武大北邮等 1
5 ~" D& r2 {; J2 v. p, L  s
还有一轮应该没出来

老战友

Rank: 5Rank: 5

1862

积分

1

贡献

800

奖励
发表于 2024-2-19 17:08:00 | 显示全部楼层
SmithArno 发表于 2024-2-19 16:58
' X0 ?7 F9 n6 d还有一轮应该没出来
' M! h0 `9 h8 u# A# y0 P1 l
嗯,耐心等待

老战友

Rank: 5Rank: 5

1143

积分

0

贡献

0

奖励
发表于 2024-2-19 19:29:03 来自手机 | 显示全部楼层
清华浙大太牛了!

初出江湖

Rank: 2

99

积分

0

贡献

0

奖励
发表于 2024-2-19 23:24:43 | 显示全部楼层
南京大学三项0蛋啊。1篇都没有啊

未关注公众号会员1

98

积分

0

贡献

0

奖励
发表于 2024-2-20 10:41:54 | 显示全部楼层
三大密码顶会算信息安全的成果吗

分区版主

Rank: 8Rank: 8

3403

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-20 10:48:29 来自手机 | 显示全部楼层
ecnuking 发表于 2024-2-20 10:41
6 I6 e* d5 R% t( G1 u  U三大密码顶会算信息安全的成果吗

2 d( ?' t) F: Y- I- {$ V  P+ N密码方向主要统计三大顶会和密码学顶级期刊JoC。# X5 E* O% Q- L% g# W
目前有零星的信息,IACR还没出Accepted papers。

白银长老

Rank: 8Rank: 8

3314

积分

1

贡献

2000

奖励
发表于 2024-2-21 12:23:18 | 显示全部楼层
浙大徐文渊:连续三年担任网安四大顶会的大会联合主席
5 `7 Y6 r6 g# Y% d% {USENIX Security 2024$ X1 j- i3 j  f7 R
NDSS 2023
9 w6 A0 u8 P4 W, M8 _NDSS 2022

白银长老

Rank: 8Rank: 8

3314

积分

1

贡献

2000

奖励
发表于 2024-2-21 12:24:27 | 显示全部楼层
近日,浙江大学共有12位教师担任国际信息安全顶级会议ACM CCS 2024的程序委员会委员,入选总人数排名全球高校第一。其中巴钟杰、申文博、冯博、刘金飞、罗梦、周亚金、娄坚、姚培森、秦湛(按姓氏笔画排序)9位教师来自浙江大学区块链与数据安全全国重点实验室。

白金长老

Rank: 10Rank: 10Rank: 10

5213

积分

0

贡献

0

奖励
发表于 2024-2-21 14:20:26 | 显示全部楼层
乡下 发表于 2024-2-19 23:29
- N7 }, X9 s6 N; R郑州信大,网安国家队核心队员之一,0蛋?
/ y4 E( v5 u' ]4 C. d
能发吗??

中级站友

Rank: 3Rank: 3

189

积分

0

贡献

100

奖励
发表于 2024-2-23 11:18:14 | 显示全部楼层
没有军信,都是假榜, C5 }! v7 W* A! E3 C  ?
看看邬院士的程控交换机,才有后来的巨大中华; z5 @5 [8 J6 T
信息安全,缺了军信,可信度太低

老战友

Rank: 5Rank: 5

1862

积分

1

贡献

800

奖励
发表于 2024-2-23 11:49:38 | 显示全部楼层
本帖最后由 大师大楼 于 2024-2-23 11:51 编辑
# i4 T2 `7 W# A% C, c0 N" V
8 N' K0 j+ F: S0 x" z) s如果军方还是继续画地为牢,固步自封,不借助世界一流高校和院所的力量,那么俄罗斯就是前车之鉴。

老战友

Rank: 5Rank: 5

1862

积分

1

贡献

800

奖励
发表于 2024-2-23 11:51:14 | 显示全部楼层
academic818 发表于 2024-2-21 12:23
9 r% }1 ~6 v/ J( L5 E& U浙大徐文渊:连续三年担任网安四大顶会的大会联合主席+ k. t, u" a+ h. J
USENIX Security 2024
8 I" n" Y# E% E- ~' wNDSS 2023
$ W; b2 y! _( {+ m5 d! O# i* }3 z
水平是特别高啦,但在中国现行体制下,还有待被发掘

老战友

Rank: 5Rank: 5

1278

积分

1

贡献

800

奖励
发表于 2024-2-23 12:09:24 | 显示全部楼层
大师大楼 发表于 2024-2-23 11:51
0 m. e3 i4 |( g) u9 x$ ?水平是特别高啦,但在中国现行体制下,还有待被发掘

3 i% q$ V2 F( R. h" j她好像比较低调的,待在电气学院内,好像还拒绝提拔副院长

禁止发言

119

积分

0

贡献

0

奖励
发表于 2024-2-23 12:09:52 | 显示全部楼层
academic818 发表于 2024-2-21 12:23- P& V1 u* Z: S. {
浙大徐文渊:连续三年担任网安四大顶会的大会联合主席% ~3 U) F- P) `. {8 k
USENIX Security 2024
5 O% |. U7 b! X) p- fNDSS 2023

% i- @+ }- V7 W9 {6 u这么多卖点,宣传太差,差不多的年龄,颜宁都院士了

高级战友

Rank: 4

461

积分

0

贡献

0

奖励
发表于 2024-2-23 12:26:05 来自手机 | 显示全部楼层
也不是每个人都适合做领导哈哈哈

中级站友

Rank: 3Rank: 3

175

积分

0

贡献

0

奖励
发表于 2024-2-25 19:07:24 来自手机 | 显示全部楼层
不知而已 发表于 2024-2-4 23:363 R: J6 c4 G4 f" }- U8 `: i6 r
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...
' b6 \: d- w0 X! n( d( H% M
华师大软院通讯今年还accepted一篇欧密 《Registered Functional Encryptions from Pairings》
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

论坛的微信公众号(二维码如下),关注获取更多科教信息

Archiver|手机版|网大论坛 ( (鄂ICP备2021013060号-2) )

GMT+8, 2025-4-21 08:41 , Processed in 0.088951 second(s), 22 queries , Gzip On.

鄂公网安备 42018502005923号

Powered by Discuz! X3.4

Copyright © 2001-2022, Tencent Cloud.