|
|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:01$ `) Y2 B8 p/ L2 O+ v
秋季 USENIX Security 顶会,不完全统计:: ~& _* `5 @5 V8 V$ E8 R
浙大+4' c, h) F' p K9 D/ F: s' O
清华+2
, X2 e7 q% B) q* J @东南是3篇?
, D# f) c$ }8 _7 T3 ?+ H
' N4 T7 C2 ~& D* z& {! g% `2 P/ [A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers
' x# Z H+ h/ J0 q( uChongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell
L% w$ X. `0 R. U% T* z) M3 N* s& T U
Relation Mining Under Local Differential Privacy2 g5 X+ E- A! X+ K b* S( ^6 y0 ^# T/ f
Kai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell7 v5 x$ ^5 m5 m) r0 ^& Q$ z0 z
2 ?# |" _1 }: _' I: u3 \FEASE: Fast and Expressive Asymmetric Searchable Encryption0 ]+ p4 T6 O6 J0 q" w
Long Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|