网大论坛

 找回密码
 立即注册
查看: 31222|回复: 71

2024年信息安全领域顶会统计(Eurocrypt/FSE)

[复制链接]

分区版主

Rank: 8Rank: 8

3457

积分

0

贡献

1600

奖励
发表于 2024-2-3 09:59:37 | 显示全部楼层 |阅读模式
本帖最后由 SmithArno 于 2024-3-8 16:28 编辑 $ Q* b& ?; Q3 E

1 w$ t4 g0 T) S; @& ?" e. x按照第一作者单位统计(信息安全四大顶会+密码三大顶会)2 p3 S! x5 K/ V8 R2 W7 n
NDSS 2024概览0 m6 X4 ^( P' y: x: L9 @$ c
清华大学13篇,浙江大学9篇,华中科技大学3篇,南方科技大学2篇。% b  R& z1 W3 i6 o
东南大学、中国海洋大学、北京航空航天大学、山东大学、北京大学、中山大学、武汉大学、中科大、NUDT、上海科技大学等等1篇。5 i: S& Y* k! e6 J

; I+ [6 [  c: ~6 ?CCS 2024
7 _2 c& O$ E9 R4 o7 s  I# K9 t" U1 X6 `6 ]/ }4 h% f
IEEE S&P 2024概览
3 w) g9 k' c: r* r. v4 |清华大学10篇,浙江大学6篇,华中科技大学、复旦大学、东南大学2篇。其他重庆大学、山东大学、南开大学、西电、成电等等1篇。
. M- R5 g; z/ ~- [
# ?! M; `/ u5 C3 }Security 2024" a2 O/ x% s. Y" X/ w9 ^# p

6 @/ b( T' p/ u0 FEurocrypt 2024
9 O/ s9 j( ^1 c$ j华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。
4 Y2 k" T( X5 K' c7 T$ G& S; H! l, X+ ^3 d2 V$ W  ]* A! k. }

6 x3 z) p/ p! D% `
1 T4 n; ^# d% z# |0 D8 J获奖情况:5 c4 R. V9 H% c! s4 g
【1】浙江大学获得NDSS 2024杰出论文奖。
5 C, ?. ?8 n6 k/ T% m& G; I6 m9 W$ K* p: [/ d5 j, g, t
' L$ t) h' Z. ]* f

( l% _) h% R. ^1 u- P# Y
7 F, a$ d6 B* k" ]9 `9 V3 W7 x* i' s

. f6 I8 n& T/ E7 A

分区版主

Rank: 8Rank: 8

3457

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-3-4 09:47:58 | 显示全部楼层
Eurocrypt 2024,共接收105篇论文,国内共8篇,华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。, t, `! S' n5 t) M% w' O. U
+ S$ ?% G" U$ b, m, l
【1】山东大学
0 A  S/ b8 m0 o- Z- nMassive Superpoly Recovery with a Meet-in-the-middle Framework -- Improved Cube Attacks on Trivium and Kreyvium
4 p7 l8 {  ]/ n4 V: v7 kJiahui He, Kai Hu, Meiqin Wang, Hao Lei
# }; E- g9 }; C% i. ~Shandong University, Nanyang Technological University+ F% J& W0 t, K; {9 G; @3 W0 K. L

4 G# r' K$ `' \4 G" x) j【2】清华大学# g1 o$ y$ b& P2 C$ x( Q
Accelerating BGV Bootstrapping for Large $p$ Using Null Polynomials Over $\mathbb{Z}_{p^e}$
/ a6 g5 s, W0 M4 K4 GShihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang3 i! j* g- T6 `% z) G
Tsinghua University
: b6 C+ Z6 L# t$ d" i% o
2 O  H6 \: D0 N" R2 D  L* C【3】华东师大' J2 Y4 `; a; H% G( f& ^5 C( I
Registered Functional Encryptions from Pairings
3 I) _7 K7 s0 mZiqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian& ^/ ~. T7 h& j' Y  J5 P
East China Normal University, Shanghai University, Shanghai University of Electric Power0 ]& j1 J8 e5 Q" y* @# A+ u
# X  w, n+ g3 F0 a
【4】南科大
5 n4 y+ v5 k/ n: B3 X' J0 @* aIntegrating Causality in Messaging Channels4 Q1 X2 Y8 C! K. R
Shan Chen, Marc Fischlin
; X: i3 d5 N) u: B- g+ e* _" L- t, ~$ ESouthern University of Science and Technology, TU Darmstadt
* C9 k9 c3 A/ T9 p: e0 F& @
+ A1 L, W* w$ y$ ]9 V! a( Y/ o【5】暨南大学% j# [5 A" J- s. H
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond
; ~  j! I) C) \- `' k) ^% ULing Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng- T" m# N8 F( ^/ z
College of Cyber Security, Jinan University, Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering" J* t' `! T: p) }

% B: |5 @, L1 Y; c: {1 u7 g+ y【6】上海交大9 y' A2 k, o3 S: S9 R
The Hardness of LPN over Any Integer Ring and Field for PCG Applications
7 B$ K  ]  W* Q6 E5 K; h6 V8 KHanlin Liu, Xiao Wang, Kang Yang, Yu Yu
5 K/ o' a2 N$ F! ~; v5 z5 FShanghai Jiao Tong University, Shanghai Qi Zhi Institute, Northwestern University, State Key Laboratory of Cryptology) H1 d! c3 l! Y

) L4 e- T0 P3 `& D0 Y( O【7】上海交大- Y" [" C1 z( B4 I
Universal Composable Password Authenticated Key Exchange for the Post-Quantum World; Y2 R5 b! R8 I+ @
You Lyu, Shengli Liu, Shuai Han
. x' |4 j4 y2 s0 H6 |5 d! wShanghai Jiao Tong University/ I4 Y  Z: ]! N1 S  u* d. T. K
* W$ N) @8 i# ?
【8】华东师大
1 d6 W0 O- u2 \; q& eNew Records in Collision Attacks on SHA-29 Y0 ~# o! {: N! J2 ?
Yingxin Li, Fukang Liu, Gaoli Wang
9 m  F1 \* C0 P6 _8 ?1 GEast China Normal University, Tokyo Institute of Technology
& ~$ |8 Q4 t' u3 ]- w2 e  {1 }- G7 x! `6 n" w

分区版主

Rank: 8Rank: 8

3457

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 09:59:41 | 显示全部楼层
本帖最后由 SmithArno 于 2024-2-3 10:06 编辑
, T7 @. _% e3 Z! R( l
; I# l$ @9 V- d7 i2 [NDSS 2024会议主页:https://www.ndss-symposium.org/ndss2024/accepted-papers/
0 @0 Y- b' K- J, @8 n% N( s/ ~8 y& c  {8 N/ [( f( y$ G2 b
【1】山东大学
6 E# g' U4 N  ~* oSecurity-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols3 R$ a% Q5 N# T1 m. b7 x: k
Shichen Wu (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Puwen Wei (1. School of Cyber Science and Technology, Shandong University 2. Quancheng Laboratory 3. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Ren Zhang (Cryptape Co. Ltd. and Nervos); Bowen Jiang (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education)! \, _& m! t; l3 @" i
1 ?$ u/ d' K7 ^+ {4 |
【2】东南大学  j# _+ T* c, [9 {5 o: v: v; U
LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems9 v$ H6 i# f6 W2 Y
Huaiyu Yan, Zhen Ling, Haobo Li (Southeast University); Lan Luo (Anhui University of Technology); Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang (Southeast University); Junzhou Luo (Southeast University, Nanjing, P.R. China); Xinwen Fu (University of Massachusetts Lowell)
( s& k- \2 I9 U- g( H/ y) V5 t7 |. S
【3】浙江大学
; o6 ]' X7 r& @5 Z- JGhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards2 i8 v* e. W5 a& k
Qinhong Jiang, Yanze Ren (Zhejiang University); Yan Long (University of Michigan); Chen Yan (Zhejiang University); Yumai Sun (University of Michigan); Xiaoyu Ji (Zhejiang University); Kevin Fu (Northeastern University); Wenyuan Xu (Zhejiang University)8 A" P0 l2 I: x8 m( B  K. d2 o

/ G" Y' o3 L' E2 F/ a7 G; W【4】浙江大学3 e) x* K) D( K# [6 W/ o
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
5 W7 ]$ G! p. l9 Q: eXinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)# m. Z' W" ~  v) m5 j3 T6 a

+ ~. C5 h0 q# L/ U% L【5】北京航空航天大学( _6 O$ ]' }7 W/ w
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation
/ a% R- M2 |+ {Song Bian, Zian Zhao, Zhou Zhang, Ran Mao (Beihang University); Kohei Suenaga (Kyoto University); Yier Jin (University of Science and Technology of China); Zhenyu Guan, Jianwei Liu (Beihang University)  T) P) _, m- [- l9 ~6 U
. _* B# q/ J* P) r, e2 M+ w9 d
【6】清华大学" V3 h  j0 q% l- j, ?
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic
% K0 d" G9 I+ P, Z* r/ s- |Yuqi Qing (Tsinghua University); Qilei Yin (Zhongguancun Laboratory); Xinhao Deng, Yihao Chen, Zhuotao Liu (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Jia Zhang, Qi Li (Tsinghua University); N% V* E5 |5 P4 z0 \4 e3 U" p/ d
" _, B3 q& Q/ m9 N' G
【7】浙江大学0 i0 J" O& B  `# S
Symphony: Path Validation at Scale
6 ^& @, Y4 Z: o: `7 G$ m" ?Anxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren (Zhejiang University)
& Q9 V# r8 c" x7 K& N7 J: G' u  y' B6 Y+ J& Q+ {
【8】清华大学) p! f- G& p2 R* e3 c; j; h
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet
' i- ]( ]" W8 @3 tChuhan Wang, Yasuhiro Kuranaga, Yihang Wang (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Linkai Zheng, Xiang Li (Tsinghua University); Jianjun Chen (Tsinghua University; Zhongguancun Laboratory); Haixin Duan (Tsinghua University; Quan Cheng Lab; Zhongguancun Laboratory); Yanzhong Lin, Qingfeng Pan (Coremail Technology Co. Ltd)$ f8 L( i4 [1 e$ U

  E5 S2 \% f0 ]【9】浙江大学0 R: F0 Y( V* G( ^! e4 p# ?0 |5 G
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency
+ j& i: r) N% Q8 ~/ `1 pJiacheng Xu, Xuhong Zhang, Shouling Ji (Zhejiang University); Yuan Tian (UCLA); Binbin Zhao (Georgia Institute of Technology); Qinying Wang, Peng Cheng, Jiming Chen (Zhejiang University)
; I2 R7 u8 M$ F( v+ _- l/ C# E; z0 m6 k* Z$ W2 |$ T, y' {; h
【10】清华大学
& N( E. {/ Z" ?& E8 o4 K0 rShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection
/ r' f6 c: Q5 S2 o3 _& hKunpeng Zhang (Shenzhen International Graduate School, Tsinghua University); Xiaogang Zhu (Swinburne University of Technology); Xi Xiao (Shenzhen International Graduate School, Tsinghua University); Minhui Xue (CSIRO’s Data61); Chao Zhang (Tsinghua University); Sheng Wen (Swinburne University of Technology)
6 y6 T7 I$ D9 T" K# N
. {+ T7 S/ y5 X, L+ K3 Q【11】中国海洋大学
) [  O: R8 M0 Y' Q' ~Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack
$ g5 Z$ V; O- H' O  q# _Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu (Ocean University of China)
/ ?3 {  A5 ?( i( }$ R" L7 J, G7 L5 @; p  i9 m2 Q9 |! e7 F1 G
【12】浙江大学
. Q* K, Q+ Q+ s3 ^ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning
; Y- ]1 N& L& D) V( x# Y9 t8 T4 KLinkang Du (Zhejiang University); Min Chen (CISPA Helmholtz Center for Information Security); Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen (Zhejiang University); Zhikun Zhang (Stanford University)
! W3 x, \$ \0 [4 R" ?- k  x, S+ r1 M3 J1 d5 i) Q! v% \0 E
【13】北京大学
; [) \, Y5 Y, H, ?: l; b$ ANODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation: z5 }  O( b( ^& [6 Q
Shaofei Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Feng Dong (Huazhong University of Science and Technology); Xusheng Xiao (Arizona State University); Haoyu Wang (Huazhong University of Science and Technology); Fei Shao (Case Western Reserve University); Jiedong Chen (Sangfor Technologies Inc.); Yao Guo, Xiangqun Chen (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Ding Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University)
" `7 q- e; a1 \" k9 b5 l3 ]8 N8 ]' P
【14】浙江大学
* R( W5 Q; D; H5 S* _: rLMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors2 e6 B% P. _, f) I8 N
Chengkun Wei, Wenlong Meng (Zhejiang University); Zhikun Zhang (Stanford University); Min Chen (CISPA Helmholtz Center for Information Security); Minghu Zhao (Zhejiang University); Wenjing Fang, Lei Wang (Ant Group); Zihui Zhang, Wenzhi Chen (Zhejiang University)& u; D! D2 x9 w! v7 c4 Z2 t
/ v& [7 g/ _" h: L: P8 f/ m+ d
【15】湖南大学# j! ]5 u6 }, B' i% g  R6 [3 o, ^' U
Eavesdropping on Black-box Mobile Devices via Audio Amplifier’s EMR
9 v3 g3 F  U, Y4 g" W- KHuiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Kenli Li (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Zheng Qin (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Mingxing Duan (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Yong Xie (Nanjing University of Posts and Telecommunications, Nanjing, China); Daibo Liu (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Ming Li (The University of Texas at Arlington, USA)6 z* p3 g# P+ N) `
7 O- e7 ?+ u4 A4 n: d+ v
【16】上海交大
, w$ u  E1 ^/ ?8 SCrafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models
4 F( i* x9 A) P" i5 uShiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang (Shanghai Jiao Tong University); Chenghu Zhou (Chinese Academy of Sciences); Bo Li (Hong Kong University of Science and Technology), w, Q# r. e! K3 D( I

# b7 ^2 ^$ j+ V4 F【17】清华大学
, ?+ W6 d) i: f  T/ Q; KExploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks& R4 f8 H# m( E- [
Yuxiang Yang, Xuewei Feng, Qi Li (Tsinghua University); Kun Sun (George Mason University); Ziqiang Wang (Southeast University); Ke Xu (Tsinghua University)
" y* T& H) K' f, l
5 F, _% M1 E; Z6 i* i【18】清华大学, @) t7 V& n9 I/ d2 q0 G2 D
CP-IoT: A Cross-Platform Monitoring System for Smart Home: R* m( d6 G, ~
Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang (Tsinghua University); Linna Fan (National University of Defense Technology); Chenxin Duan (Tsinghua University)5 H0 v. W$ [# E- p  h& O# y

& d/ {; p5 V( c2 z. I【19】清华大学
* K8 n9 ^6 M3 pLoRDMA: A New Low-Rate DoS Attack in RDMA Networks
; @8 K4 Y6 n6 b! zShicheng Wang (Tsinghua University); Menghao Zhang (Beihang University & Infrawaves); Yuying Du (Information Engineering University); Ziteng Chen (Southeast University); Zhiliang Wang, Mingwei Xu (Tsinghua University & Zhongguancun Laboratory); Renjie Xie (Tsinghua University); Jiahai Yang (Tsinghua University & Zhongguancun Laboratory)
- e' @/ D; }$ d; |, ]8 T3 Z5 z; f5 k( }( P* w2 |( j
【20】清华大学1 T+ U3 X' u+ h. d# j5 ~) h2 i* l
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing8 S6 F/ D% w$ Z- e# s7 q, I* j2 P
Linkai Zheng, Xiang Li, Chuhan Wang, Run Guo (Tsinghua University); Haixin Duan (Tsinghua University; Quancheng Laboratory); Jianjun Chen, Chao Zhang (Tsinghua University; Zhongguancun Laboratory); Kaiwen Shen (Tsinghua University)* f5 y9 J* L: `2 {# \
0 t: h- W+ C. h) ~7 d
【21】清华大学  i) H$ S) S( S7 d6 ~9 b
Automatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization  ?# t7 |7 q9 N' C2 i6 D
Quan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang (Tsinghua University)" ?; }; L0 m# L, y

2 E# e; w& s# F7 ?! o- N【22】清华大学' A# c2 h" P: L. _( T0 C
DynPRE: Protocol Reverse Engineering via Dynamic Inference
5 B: }6 a! y/ G. R. |Zhengxiong Luo (Tsinghua University); Kai Liang (Central South University); Yanyang Zhao, Feifan Wu, Junze Yu (Tsinghua University); Heyuan Shi (Central South University); Yu Jiang (Tsinghua University). |* P, b* P8 ^3 B5 m$ W
* t- b4 u( D+ H+ V! ~  e
【23】浙江大学
8 B6 \9 j1 H+ w! LImproving the Robustness of Transformer-based Large Language Models with Dynamic Attention7 Z7 o/ m. M% p# N  G
Lujia Shen, Yuwen Pu, Shouling Ji (Zhejiang University); Changjiang Li (Penn State); Xuhong Zhang (Zhejiang University); Chunpeng Ge (Shandong University); Ting Wang (Penn State)* F  W) i3 @7 W" V8 @8 Y

; Y; e' r" v; [7 @8 o【24】中山大学
: p& ?/ X9 w2 _  M8 GLeaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem! T/ t" X' P; m! t0 G1 O5 _( t$ ~, l
Jiangrong Wu, Yuhong Nan (Sun Yat-sen University); Luyi Xing (Indiana University Bloomington); Jiatao Cheng (Sun Yat-sen University); Zimin Lin (Alibaba Group); Zibin Zheng (Sun Yat-sen University); Min Yang (Fudan University)2 x; L4 ]" O9 v" F' ^
% ~3 \, A4 |6 L) a1 X" B
【25】浙江大学1 f* t! y8 j+ A' T6 Y. M- K, Y6 u
CamPro: Camera-based Anti-Facial Recognition" L5 h8 A6 _; ?4 n
Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)) t, P9 W3 U6 i; M
2 u9 E/ `% _# n' @5 X( O
【26】中国科学技术大学: @0 F4 _" g. ?8 Y' P0 B* ^0 O6 E
Detecting Voice Cloning Attacks via Timbre Watermarking
8 N- C8 w; S/ `  }2 i- RChang Liu (University of Science and Technology of China); Jie Zhang, Tianwei Zhang (Nanyang Technological University); Xi Yang, Weiming Zhang, NengHai Yu (University of Science and Technology of China)/ b" X6 y7 T9 X0 `
# \& Y# h, s" O5 n/ k* W
【27】清华大学
, ^* k% j3 c/ [: |0 _* W4 z$ RUnderstanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed
( B" m  L2 R; h& @. o4 WLancheng Qin (Tsinghua University, BNRist); Li Chen (Zhongguancun Laboratory); Dan Li (Tsinghua University, Zhongguancun Laboratory); Honglin Ye, Yutian Wang (Tsinghua University)
# E0 O: R' {( T9 U, x. i8 Y% S
, I, `  S( F" _6 W! a【28】清华大学
0 T+ L3 e  O0 f+ x1 udRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository
0 Z% x% O: m% ~" h3 I- G; n% F, b2 z( gYingying Su, Dan Li (Tsinghua University); Li Chen (Zhongguancun Laboratory); Qi Li (Tsinghua university); Sitong Ling (Tsinghua University)) Y7 N' q+ L5 s. S8 n# U
2 _5 X: d6 L9 r8 l% Y& b# f8 G5 N
【29】清华大学; O; I7 g8 G7 ?; T' `3 V1 F
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption
9 ~( O% _" y7 MXuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu (Tsinghua University)
5 a& q3 G3 ]2 u1 A8 G& |) `9 `' ]7 i8 X6 L( ]
【30】NUDT/ U) K5 O3 V% I2 {
DeepGo: Predictive Directed Greybox Fuzzing; x0 y  m6 W, \9 T/ }
Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang (National University of Defense Technology)
+ f( G  M+ `9 c5 ?2 v% N0 l; g. t
% r7 ~3 N. ^) n8 u0 B2 h" B4 M) v【31】上海交大& t6 T- n1 ?! f
ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token- b2 w! a. l) h0 }5 l
Ge Ren, Gaolei Li, Shenghong Li, Libo Chen (Shanghai Jiao Tong University); Kui Ren (Zhejiang University)! _7 `& G/ m+ s

' ?5 f" p6 o' o( w【32】华中科技大学
$ U' Q: e+ m8 O2 @PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
5 b8 o& _! f, ^9 uMan Zhou, Shuao Su (Huazhong University of Science and Technology); Qian Wang (Wuhan University); Qi Li (Tsinghua University); Yuting Zhou, Xiaojing Ma (Huazhong University of Science and Technology); Zhengxiong Li (University of Colorado Denver)0 C- |" ]/ G, Q8 p
. G1 w) A$ G/ j
【33】南方科技大学
5 g. n* s" n) j" XSeparation is Good: A Faster Order-Fairness Byzantine Consensus3 Q4 j$ m) y3 E
Ke Mu (Southern University of Science and Technology, China); Bo Yin (Changsha University of Science and Technology, China); Alia Asheralieva (Loughborough University, UK); Xuetao Wei (Southern University of Science and Technology, China & Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation, SUSTech, China)
, {# ~( T  Q! u+ K" R
0 x2 h* O  l- K  {% k/ j& j【34】南方科技大学, C3 U9 ~8 ?6 }
CAGE: Complementing Arm CCA with GPU Extensions
. x2 Q$ J8 T3 _( W4 `Chenxu Wang (Southern University of Science and Technology (SUSTech) and The Hong Kong Polytechnic University); Fengwei Zhang, Yunjie Deng (Southern University of Science and Technology (SUSTech)); Kevin Leach (Vanderbilt University); Jiannong Cao (The Hong Kong Polytechnic University); Zhenyu Ning (Hunan University); Shoumeng Yan, Zhengyu He (Ant Group)' t; W& J+ _, f; E& u' |0 `

. O1 o9 _( C" J: s9 x! L* T5 Y2 r' Z【35】华中科技大学8 S( r; c* L5 n* ], n) ^! j1 P
DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses! L! z4 V- x( N3 X
Chaoxiang He, Xiaojing Ma (Huazhong University of Science and Technology); Bin Benjamin Zhu (Microsoft Research Asia); Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin (Huazhong University of Science and Technology); Dongmei Zhang (Microsoft Research)
( d3 v" N8 e" V- |+ L  F" h( v; d% a
+ G5 y; P  y+ V3 c+ b4 t2 J( A【36】华中科技大学
$ c' v' o' o! n* g1 B+ J5 XAbusing the Ethereum Smart Contract Verification Services for Fun and Profit9 {" k# Q5 H( o4 u9 u% \  `- Y
Pengxiang Ma (Huazhong University of Science and Technology); Ningyu He (Peking University); Yuhua Huang, Haoyu Wang (Huazhong University of Science and Technology); Xiapu Luo (The Hong Kong Polytechnic University)
) _- q6 _+ K* f3 i
) |+ j3 X. M3 w; z7 K/ x【37】浙江大学
3 a5 k& F5 z7 x5 JUniID: Spoofing Face Authentication System by Universal Identity
8 _+ f/ w" y; HZhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji (Zhejiang University); Wenyuan Xu (Zhejing University)4 H8 ?9 ^3 J" @6 Q$ V6 z9 {
6 R+ L5 b6 y7 h
【38】武汉大学
# P, g8 u+ y1 f/ p4 U0 P/ `8 J6 YFrom Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices
. f- W& l# ~5 e% ]Yue Xiao (Wuhan University); Yi He (Tsinghua University); Xiaoli Zhang (Zhejiang University of Technology); Qian Wang (Wuhan University); Renjie Xie (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Qi Li (Tsinghua University)
) n1 r6 x7 b- o  T9 U' c
/ Z, X7 T% \& l% g3 z+ h+ a【39】上海科技大学" n) D0 w) O' [" E  }& y+ i
SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems
3 w9 O) d: e1 z' \3 l7 EGuangke Chen (ShanghaiTech University); Yedi Zhang (National University of Singapore); Fu Song (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences)
& M% ~- l: b+ h! J) Q2 t' }$ S6 w
! J' A* L9 A0 l6 t【40】清华大学7 R  }- d5 ?  f8 k  Q$ [' F
You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks0 A* T5 j& [' B: c3 Y9 L
Qiushi Li (Tsinghua University); Yan Zhang (China Agricultural University); Ju Ren, Qi Li, Yaoxue Zhang (Tsinghua University)
, v+ j3 }) Q. }# ]# B

老战友

Rank: 5Rank: 5

1479

积分

0

贡献

500

奖励
发表于 2024-2-3 10:15:02 | 显示全部楼层
Wenyuan Xu (Zhejiang University)
' V& K2 l7 G# r9 W7 A徐文元好几篇* M, w: B' m1 T1 s! Y& z, P3 {0 J

高级战友

Rank: 4

449

积分

0

贡献

0

奖励
发表于 2024-2-3 11:53:22 来自手机 | 显示全部楼层
有2023年的数据吗

分区版主

Rank: 8Rank: 8

3457

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 12:26:14 | 显示全部楼层
0000 发表于 2024-2-3 11:53
0 i/ i4 w3 Y; t8 h' c/ W有2023年的数据吗
( V7 k2 s. J  \9 q$ s7 D' ?
https://bbs.netbig.top/thread-26427-1-1.html

普通会员

Rank: 2

128

积分

0

贡献

0

奖励
发表于 2024-2-3 12:49:02 来自手机 | 显示全部楼层
徐文渊老师太强了…

分区版主

Rank: 8Rank: 8

3457

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 12:50:55 | 显示全部楼层
yxy 发表于 2024-2-3 12:49
6 t% F/ A( c- x( q' B! f! g徐文渊老师太强了…
$ w1 T1 K# ?4 O2 R5 N
国内现在这几个顶会发文量虽然多了,但头部高校断层明显,基本都是浙大清华屠榜。
. P7 M. [( P/ O5 P其他高校偶尔有个一篇两篇的。
7 q5 E( x/ i0 W) p: W- E6 g& x2 `7 S7 a8 `7 o
徐文渊老师不仅输出稳定,而且还有best paper

分区版主

Rank: 8Rank: 8

3457

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 14:55:15 | 显示全部楼层
本帖最后由 SmithArno 于 2024-3-8 16:25 编辑
/ A$ b& X( m. x7 _' x- V' Z1 v" C4 B. |8 D% }
IEEE S&P 2024
0 N6 H4 D3 q3 }& o$ Z% X- @( H
) p. ^' \! Y- a6 x  R9 b【1】华中科技大学
' p; t5 W4 c& V9 [) sWhy Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabilitypp. 10-10/ ?2 _) D7 f! \+ s' U
by Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin5 F; r% Q2 i' y, a" Z

  R. B3 `/ ^" ?, X【2】华中科技大学/ h3 A& A5 n4 Y; g, A# M% G& q
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementationspp. 13-13" {0 V- u8 C6 H8 a
by Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing
( ^) f7 \- V6 P% S( b' S+ I; v6 L5 [8 a
【3】复旦大学
7 r1 u  ]. ~3 S& ~2 cWithdrawing is believing? Detecting Inconsistencies Between Withdrawal Choices and Third-party Data Collections in Mobile Appspp. 14-14
* _% h, \! ]4 C" X. cby Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang: a+ c8 ?3 h6 @

0 u- B1 e1 M% r【4】浙江大学3 L2 i3 X. d: i) g' E$ H+ Q; C
PIRANA: Faster Multi-query PIR via Constant-weight Codespp. 39-39; [! z3 ]- p8 F
by Jian Liu, Jingyu Li, Di Wu, Kui Ren
$ k' u' b6 N4 o/ q9 V$ _) ?2 w0 K5 s2 d. d' j  Q! G4 v: d
【5】东南大学2 b- [% s9 |* f# Y
Predecessor-aware Directed Greybox Fuzzingpp. 40-40
- ~4 }+ p& X1 n1 Qby Yujian Zhang, Yaokun Liu, Jinyu Xu, Yanhao Wang
6 E, F6 m( b5 Z
1 O9 }0 x; Q% v6 K! T3 ?7 b【6】中南大学
/ w0 c8 ]% }  Z+ L6 V+ h! qGuessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Informationpp. 42-42
9 M; L7 N$ V8 b( q! \9 Z( kby Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, Zhuo Lu, U9 s( o- x6 S. W; e0 v9 Z! L
- y  r9 L- Q3 Y" b* H0 E
【7】清华大学  @* A5 Z& t# ?8 L
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packetspp. 46-460 I* E) O6 r2 I- C+ a
by Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li
5 f' U1 n% x& N) n$ f! Q- V# T+ |( E6 l" a
【8】清华大学1 j" T; O7 u" W3 g
SATURN: Host-Gadget Synergistic USB Driver Fuzzingpp. 51-516 X- g$ J4 M5 z# @
by Yiru Xu, Hao Sun, Jianzhong Liu, Yuheng Shen, Yu Jiang
* @% O$ _1 i4 Y3 D% W5 m, E, D$ \9 R" l% h; b- T. Q( P
【9】北京大学! P' G5 y9 w9 Q0 d" k' P, x1 a
No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device MLpp. 52-52$ d2 i& t' b6 E/ `! J% G7 W' m
by Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Ding Li, Yao Guo, Xiangqun Chen
+ w& ]. v1 e- O# t, W$ c7 Z
$ P: j; [/ R# q+ ?# K9 `【10】浙江大学
9 D( r) h9 B- Y  g: }Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attackspp. 53-53
1 R& D0 X5 E2 a! ~by Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren9 Z) O% @7 ^1 r2 j
; A# t/ s8 o* S% O& k$ R! S
【11】浙江大学
8 F5 i. h5 z& e; g: b+ G2 k$ mALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Featurespp. 56-56
! Y. u1 y4 g1 R) s! K% uby Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren8 H+ u& _0 V) N1 r- H$ X

5 B& |0 m) t3 w【12】南开大学  W; P- U5 l% I  x6 W$ n$ ^# N
Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Lengthpp. 67-67
2 ]9 L5 ?6 `( _+ R3 g, zby Jianning Zhang, Ming Su, Xiaoguang Liu, Gang Wang
1 z$ g/ G: ~' t, j& N' g8 L3 k1 t# r. @+ [
【13】浙江大学) q" I$ P& ^3 r4 P! X0 K; C
BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wildpp. 68-68
# h/ _6 R: Y/ b; r) H0 _by Jie Wan, Jianhao Fu, Lijin Wang, Ziqi Yang* n1 b8 ~# t5 j" z% T: }/ @
+ ]2 _7 k' {9 P8 Z6 c$ K) T8 ^+ I& j
【14】浙江大学4 X- T" h; A) U9 |5 m
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devicespp. 70-705 q% m# s0 I5 `* l! L6 u! \5 A
by Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah
/ B' v9 S2 e4 X& q7 _0 _' \) b9 l* K& B- u
【15】清华大学
4 q6 \1 _/ n) I. m& r$ vTest-Time Poisoning Attacks Against Test-Time Adaptation Modelspp. 72-724 |1 j+ e5 m; ]8 f
by Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang
* w$ y) V4 w4 P0 o3 h' A, T1 N% y. e, A3 T# _( e, p  r) W
【16】上海交大
. `- P; Z" f4 b- L& V5 rSrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformationspp. 97-97- B- z. R! t$ c2 R1 N4 u; ~; `
by Borui Yang, Wei Li, Liyao Xiang, Bo Li5 O- \( w. d! y3 j9 Z7 R/ K
' z: [' L* a9 \( e; ^$ Y$ J
【17】重庆大学, b5 w! Z. e$ @) s7 l/ \( P3 }. E* ^
From Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuningpp. 101-101
: T* Y% k# ^0 F$ O3 h% Q% @" iby Qiao Zhang, Tao Xiang, Chunsheng Xin, Hongyi Wu
7 L; \! R: l' y  y
& E) o; V) G  P7 W【18】东南大学
- N" j- ?3 W. sTransferable Multimodal Attack on Vision-Language Pre-training Modelspp. 102-102
5 A6 x3 j- h0 `( x2 C, Uby Haodi Wang, Kai Dong, Zhilei Zhu, Haotong Qin, Aishan Liu, Xiaolin Fang, Jiakai Wang, Xianglong Liu
3 v4 [1 h" V. Y6 b1 N3 z* E) Y, ^# W7 j. [) Q
【19】清华大学! R$ H: l7 P2 i/ x8 E2 J/ x
BULKOR: Enabling Bulk Loading for Path ORAMpp. 103-103! u: f% }4 P2 k* h) o3 ~
by Xiang Li, Yunqian Luo, Mingyu Gao
( R% q8 N6 j. D' s; t& L0 h
8 x! k0 [4 Y( z: ?【20】清华大学( U9 I  e" G& G; }0 R' Q4 \
Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delaypp. 109-109
1 F& m$ p# {# y+ |8 i" {3 i5 dby Yuanliang Chen  r* r+ I: w/ j4 p/ ~
. z8 K: [8 W# Q1 |
【21】浙江大学6 T! m' E. `1 q1 K3 L+ p
Understanding and Benchmarking the Commonality of Adversarial Examplespp. 111-111: D7 [" q( L) }7 x
by Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu
0 h: i, Z; g* ^3 {5 d" ~' C2 v. @; n, O: g& `
【22】电子科技大学
7 ^$ E0 ?4 `: ]  ]. XNURGLE: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulationpp. 125-125" g! H6 U: O8 b" a" b
by Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu
: a, |) p4 ], v' ~! P% N9 T8 m8 r/ M" O9 x7 i
【23】清华大学1 w: e. Y% g: Q+ g6 y$ O
LABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devicespp. 127-127
, ?& g) e$ O) f9 aby Hangtian Liu, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Xiangzhi Wang, Guangming Gao
( J+ l6 H$ d1 U
; t' O% q, o" {7 `9 v4 i2 p8 i3 t【24】清华大学( H5 r! z: E* N" w# b/ t0 r
Break the Wall from bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewallspp. 129-129
( O0 ~( W. Z( e) Cby Qi Wang, Jianjun Chen, Zheyu Jiang, Run Guo, Ximeng Liu, Chao Zhang, Haixin Duan7 X( G) l+ `- z- u' U8 t

: e: o. F2 t2 D" X! f. F【25】清华大学
( f$ L/ S- B! l7 z. k" XGAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocolspp. 131-1313 r1 c! ?) Z: M1 V# ?9 o
by Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song
! u! g7 h( p, V6 \$ Y0 n6 L. W1 }1 S* w" I4 z* v
【26】清华大学. ^0 j4 t$ X1 l" h" m  c( k
More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Servicespp. 138-138
( ]  K4 @7 I( `5 Mby Yacong Gu, Lingyun Ying, Huajun Chai, Yingyuan Pu, Haixin Duan, Xing Gao! s4 [2 Z$ Z( T( y, R; F1 l% l2 m

1 D+ o  @/ o* `  c& W【27】西电8 X8 V: K) l% S/ I$ y- g
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledgepp. 148-1489 n8 c- |) E3 e9 y
by Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino
0 M' i" q" j6 [
: s6 w! n2 u6 t' K( L% a【28】清华大学& Q4 L) A1 R3 F" o
The Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellationspp. 149-149, ^, ?4 E( @2 \. v
by Wei Li, Yuanjie Li, Hewu Li, Yimei Chen, Yufeng Wang, Jingyi Lan, Jianping Wu, Qian Wu, Jun Liu, Zeqi Lai5 I' j* {/ x% _; N2 i
. }4 x/ |/ t: Z9 r  g
【29】复旦大学; R$ ^' A2 u5 g: h* c
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Constructionpp. 150-1501 y6 ?% a( v/ p' t2 v
by Bofei Chen
1 c) M. e3 Y- V6 `; T/ [6 ^3 t4 q4 A
【30】山东大学0 @, D% r4 \3 m/ g; ]- P
AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detectionpp. 155-155
! D6 j3 Q: e8 Dby Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao8 e" I$ w5 E0 D
" w7 c3 T- E- j7 ~" ^
【31】北京大学
9 p0 b% a1 f9 vRethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelitypp. 160-160
4 o; V5 ^+ }4 ?1 \7 @by Xinming Wei, Jiaxi Zhang, Guojie Luo2 h/ E" s/ T* ~: e  ^9 b6 o

$ v6 }: d9 N, P, d: p# ]- r

高级战友

Rank: 4

558

积分

0

贡献

0

奖励
发表于 2024-2-3 16:05:18 来自手机 | 显示全部楼层
清浙遥遥领先

新手上路

Rank: 1

11

积分

0

贡献

0

奖励
发表于 2024-2-3 16:22:26 | 显示全部楼层
浙大威武

中级站友

Rank: 3Rank: 3

175

积分

0

贡献

0

奖励
发表于 2024-2-4 23:36:20 来自手机 | 显示全部楼层
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records in Collision Attacks on SHA-2. Accepted by EUROCRYPT 2024, Zurich, Switzerland, May 26-30, 2024.   

分区版主

Rank: 8Rank: 8

3457

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-4 23:43:26 来自手机 | 显示全部楼层
不知而已 发表于 2024-2-4 23:36
1 R" o* F6 w5 ]' R0 J6 _华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...

* `+ U. w% }+ [& A9 p- s哈这位是我学姐,王院士的学生。; }5 g3 I% \# P. u" }% e
23年她在欧密会就有文章,在SHA-2方面做得很好。

老战友

Rank: 5Rank: 5

1891

积分

1

贡献

800

奖励
发表于 2024-2-19 16:46:34 | 显示全部楼层
usenix security 2024 accepted papers% F7 O! ~1 ]6 G, j
https://www.usenix.org/conferenc ... mer-accepted-papers

老战友

Rank: 5Rank: 5

1891

积分

1

贡献

800

奖励
发表于 2024-2-19 16:57:35 | 显示全部楼层
本帖最后由 大师大楼 于 2024-2-19 16:59 编辑 3 ^! K' q1 F! U: i- X# u

+ l, B! T$ P8 J* v( B3 Iusenix security 2024/ b' V$ [+ s& \* h7 a9 a0 r
浙大 东南2
/ y1 u2 y- @" j$ o武大北邮等 1
! C/ j2 s, w0 N% o包括清华上交在内,大部分都是空白?

分区版主

Rank: 8Rank: 8

3457

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-19 16:58:58 | 显示全部楼层
大师大楼 发表于 2024-2-19 16:576 k7 b0 @9 g2 j5 a8 f3 r
usenix security 2024+ Q& x( w3 g+ @! m, f6 r
浙大 2' ]5 t: d; j- v8 l
武大北邮等 1
0 i2 e2 q- o/ k5 ?. V2 v
还有一轮应该没出来

老战友

Rank: 5Rank: 5

1891

积分

1

贡献

800

奖励
发表于 2024-2-19 17:08:00 | 显示全部楼层
SmithArno 发表于 2024-2-19 16:585 a+ O8 \' \5 O5 u; i  \
还有一轮应该没出来

$ h# P0 H3 G9 {9 t% r$ j  O嗯,耐心等待

老战友

Rank: 5Rank: 5

1248

积分

0

贡献

0

奖励
发表于 2024-2-19 19:29:03 来自手机 | 显示全部楼层
清华浙大太牛了!

初出江湖

Rank: 2

102

积分

0

贡献

0

奖励
发表于 2024-2-19 23:24:43 | 显示全部楼层
南京大学三项0蛋啊。1篇都没有啊

未关注公众号会员1

104

积分

0

贡献

0

奖励
发表于 2024-2-20 10:41:54 | 显示全部楼层
三大密码顶会算信息安全的成果吗

分区版主

Rank: 8Rank: 8

3457

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-20 10:48:29 来自手机 | 显示全部楼层
ecnuking 发表于 2024-2-20 10:41$ ]& N% Y! m' h. h8 M% B
三大密码顶会算信息安全的成果吗
" B$ e. }: _" f9 C- n
密码方向主要统计三大顶会和密码学顶级期刊JoC。' L1 p8 ?8 ]8 L+ u* p
目前有零星的信息,IACR还没出Accepted papers。

白银长老

Rank: 8Rank: 8

3338

积分

1

贡献

2000

奖励
发表于 2024-2-21 12:23:18 | 显示全部楼层
浙大徐文渊:连续三年担任网安四大顶会的大会联合主席
4 _2 m/ N! T: y3 LUSENIX Security 2024
2 ^  x4 L. f' a% n# DNDSS 2023- @, G' ], p6 h- y! p
NDSS 2022

白银长老

Rank: 8Rank: 8

3338

积分

1

贡献

2000

奖励
发表于 2024-2-21 12:24:27 | 显示全部楼层
近日,浙江大学共有12位教师担任国际信息安全顶级会议ACM CCS 2024的程序委员会委员,入选总人数排名全球高校第一。其中巴钟杰、申文博、冯博、刘金飞、罗梦、周亚金、娄坚、姚培森、秦湛(按姓氏笔画排序)9位教师来自浙江大学区块链与数据安全全国重点实验室。

白金长老

Rank: 10Rank: 10Rank: 10

5719

积分

0

贡献

0

奖励
发表于 2024-2-21 14:20:26 | 显示全部楼层
乡下 发表于 2024-2-19 23:29' ?( F( W: [2 s1 x. _- `
郑州信大,网安国家队核心队员之一,0蛋?
( r3 V( f6 ]1 A3 h
能发吗??

中级站友

Rank: 3Rank: 3

192

积分

0

贡献

100

奖励
发表于 2024-2-23 11:18:14 | 显示全部楼层
没有军信,都是假榜; q% b0 Q0 I& R9 Z5 [/ `/ j' @
看看邬院士的程控交换机,才有后来的巨大中华
& }+ y- c% v6 g, |信息安全,缺了军信,可信度太低

老战友

Rank: 5Rank: 5

1891

积分

1

贡献

800

奖励
发表于 2024-2-23 11:49:38 | 显示全部楼层
本帖最后由 大师大楼 于 2024-2-23 11:51 编辑
) g/ `: H4 S. K0 P3 _3 c6 d( `% H
如果军方还是继续画地为牢,固步自封,不借助世界一流高校和院所的力量,那么俄罗斯就是前车之鉴。

老战友

Rank: 5Rank: 5

1891

积分

1

贡献

800

奖励
发表于 2024-2-23 11:51:14 | 显示全部楼层
academic818 发表于 2024-2-21 12:235 j: U* ^/ R6 u: l8 |- {+ r2 l' X# H2 z
浙大徐文渊:连续三年担任网安四大顶会的大会联合主席- u( K3 P# w4 i8 c% O
USENIX Security 20243 m  k3 f" t4 ]9 a
NDSS 2023
% i; O, a0 i$ K/ j) z
水平是特别高啦,但在中国现行体制下,还有待被发掘

老战友

Rank: 5Rank: 5

1301

积分

1

贡献

800

奖励
发表于 2024-2-23 12:09:24 | 显示全部楼层
大师大楼 发表于 2024-2-23 11:51
& `+ }- P) u! n) c; v水平是特别高啦,但在中国现行体制下,还有待被发掘

2 Q$ A9 ~3 r$ d1 n! n& i她好像比较低调的,待在电气学院内,好像还拒绝提拔副院长

禁止发言

118

积分

0

贡献

0

奖励
发表于 2024-2-23 12:09:52 | 显示全部楼层
academic818 发表于 2024-2-21 12:232 _3 R# ^* e4 A; Q6 V& Y/ L
浙大徐文渊:连续三年担任网安四大顶会的大会联合主席
  |, R3 C( {* r4 d" k8 `USENIX Security 2024
" P# P3 O1 V* t2 J# RNDSS 2023

; Q) p; n& l1 \& U: J( Q这么多卖点,宣传太差,差不多的年龄,颜宁都院士了

高级战友

Rank: 4

479

积分

0

贡献

0

奖励
发表于 2024-2-23 12:26:05 来自手机 | 显示全部楼层
也不是每个人都适合做领导哈哈哈

中级站友

Rank: 3Rank: 3

175

积分

0

贡献

0

奖励
发表于 2024-2-25 19:07:24 来自手机 | 显示全部楼层
不知而已 发表于 2024-2-4 23:367 @5 u) X& p6 W( v$ G/ Q: P
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...
" J: r4 K- c% Z) q6 \. t7 ]
华师大软院通讯今年还accepted一篇欧密 《Registered Functional Encryptions from Pairings》
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

论坛的微信公众号(二维码如下),关注获取更多科教信息

Archiver|手机版|网大论坛 ( (鄂ICP备2021013060号-2) )

GMT+8, 2025-8-6 05:08 , Processed in 0.099931 second(s), 23 queries , Gzip On.

鄂公网安备 42018502005923号

Powered by Discuz! X3.4

Copyright © 2001-2022, Tencent Cloud.