|
|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:01
' M) S$ t( A' H1 o) o秋季 USENIX Security 顶会,不完全统计:
5 J5 O, K+ }! Y6 ^浙大+44 ]2 k5 ]* k3 H+ B+ B% B# n
清华+2
8 U' B, ]. Y# H东南是3篇?* D$ O, M5 ?# a/ P6 g
P5 [+ W% G7 x# K* }; lA Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers( m2 z7 U* X7 J0 H# F
Chongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell' U7 u1 l) ]/ }* h# E
' A1 i" m, K1 B! FRelation Mining Under Local Differential Privacy
3 L( d4 c, c: H* ]Kai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell
" {8 Q& |7 A* ~+ _7 e; |0 p+ @8 b2 E; }( T" o: I' J
FEASE: Fast and Expressive Asymmetric Searchable Encryption
3 s6 R' k- i) ^# b2 Q2 }! Y! MLong Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|