|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:01
+ Y8 J/ E2 k4 d/ S) `秋季 USENIX Security 顶会,不完全统计:" d7 d, E% ^ [, a* H
浙大+4
8 p% }7 T$ N: L: e9 m- y- n6 _清华+2 ! C6 d- S8 r& {
东南是3篇?% \, v: I; x; j; ]# z) U8 J7 |
) `0 T& W0 @& T- J7 t& GA Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers# q- \3 x4 @, j+ h9 T
Chongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell
+ S; j2 {, u2 [2 o, U* F8 W \$ ^7 @0 t% t( x
Relation Mining Under Local Differential Privacy. K" O7 Y% E1 h/ |" C, t0 \
Kai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell; P8 c3 `1 {, z) {9 f
5 X" ?3 V: R- P( s' I; C/ jFEASE: Fast and Expressive Asymmetric Searchable Encryption
/ t6 _5 M& b3 N" D, R3 FLong Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|