|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:01; i3 V9 J4 e* W5 n$ ?4 q/ ^2 ?
秋季 USENIX Security 顶会,不完全统计:& D$ G. y5 D' |$ d+ ?6 B
浙大+45 X! O7 ]: r3 r$ J) N
清华+2 2 q: p( O% K: h; m" ~
东南是3篇?
: n+ w$ `# [5 I( R
- N# F$ B% a: k5 ], B) ~A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers2 n& p4 v+ T% W2 L3 b2 e5 U
Chongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell6 L4 G& ^) t) X& A4 U( a! M
. i. \# j, _, D- S0 Q8 K3 s8 ]Relation Mining Under Local Differential Privacy
- t3 Z8 v6 W8 s8 H d" {% q3 aKai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell/ E$ b3 @) D9 Q+ _# s! Y
* `' U) o) ^6 w) m* ~7 cFEASE: Fast and Expressive Asymmetric Searchable Encryption
& V2 I0 n1 N; N7 u* uLong Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|