|
|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:01
$ o/ J- d# m3 M" n# n* @秋季 USENIX Security 顶会,不完全统计:
5 B) y. s1 l {* U% d. k浙大+4
% q* [6 {/ ^3 ]$ Z1 p3 Y- E清华+2
, @* E2 [3 s9 w4 d东南是3篇?
! d% } ]8 g1 V1 l; s1 \; v! `( k9 T- ]
A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers
- k. Z" D: D9 E( K% oChongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell2 r% e6 P# B2 M5 d3 s
1 Q' m- |8 ^+ {8 l. {- T0 _8 D
Relation Mining Under Local Differential Privacy
+ {( y- f. u' K% ~/ b$ H0 JKai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell: B- Z) H: R1 D& r: X
! j0 R: M+ |% N+ V ]0 hFEASE: Fast and Expressive Asymmetric Searchable Encryption
( Y" h6 {9 f6 E* ]4 c2 T8 d+ LLong Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|