|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:01
8 m) j8 y @; s6 u秋季 USENIX Security 顶会,不完全统计:
; i) L! r$ e* D浙大+4; M4 P: u* [4 l7 a5 x, e9 ?
清华+2 $ o! j5 l z5 @8 @" g
东南是3篇?
& x8 M! ]) H- W& ^/ o. E6 n/ ]+ S
A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers
4 Z, @4 r) h K, OChongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell
" I3 |, Y5 Z4 _) v4 {& l8 Y7 e) Z* m
Relation Mining Under Local Differential Privacy
/ e @0 g$ Q. l$ G: v& r( f& S+ E; iKai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell5 C+ L& F- l* H/ F& v( I* t2 x
# u+ i% z u9 a5 D7 T: m3 J" Q
FEASE: Fast and Expressive Asymmetric Searchable Encryption
( q% i6 ]/ ]# Y! d) H# ZLong Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|