网大论坛

 找回密码
 立即注册
查看: 29518|回复: 71

2024年信息安全领域顶会统计(Eurocrypt/FSE)

[复制链接]

分区版主

Rank: 8Rank: 8

3419

积分

0

贡献

1600

奖励
发表于 2024-2-3 09:59:37 | 显示全部楼层 |阅读模式
本帖最后由 SmithArno 于 2024-3-8 16:28 编辑
8 b+ l2 K* `  x# [% X2 i! i# y6 u3 G' k9 u' e/ y8 o7 K- L
按照第一作者单位统计(信息安全四大顶会+密码三大顶会)% i0 z" a6 K& K
NDSS 2024概览6 q/ O* Z  R4 r: t3 G- y
清华大学13篇,浙江大学9篇,华中科技大学3篇,南方科技大学2篇。7 K. z2 u$ S( Q
东南大学、中国海洋大学、北京航空航天大学、山东大学、北京大学、中山大学、武汉大学、中科大、NUDT、上海科技大学等等1篇。
5 ]" E9 q8 G, _3 e) u' r" o$ I& b9 q0 H, ^6 r  ?4 N- j. _6 Y0 P) P
CCS 2024
: m# {& I+ E9 x. I* x' I1 K+ h
, n6 p% R- E: L& v4 g; `: m* OIEEE S&P 2024概览
" A2 q7 |0 z' l" v清华大学10篇,浙江大学6篇,华中科技大学、复旦大学、东南大学2篇。其他重庆大学、山东大学、南开大学、西电、成电等等1篇。3 H; I7 s. ^! H( V9 ^1 `* _! E

: @& W) j  j% c. Z5 T- ?9 `' \6 DSecurity 2024: z0 X; A7 }9 U

. c: H" ]* v9 K1 q5 qEurocrypt 2024
% L3 p3 J  e* c! |华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。6 E3 k( h5 N% X6 X! b% u  p
! ?. i/ Q8 E. g$ h9 ~9 }3 a- h
( d6 g* w; I' C9 ]* V

6 H- D" M' N5 n4 i: G/ E获奖情况:
2 }0 H& K; z' [, o: n【1】浙江大学获得NDSS 2024杰出论文奖。" F3 V) z8 x# T7 {. M% H- `7 W
) Q7 h  \) j, I9 S2 E4 ^, S
; o1 I% X  _9 v8 b; z
* _( A6 B$ C  m; V

$ M4 O! u1 b" u- c- g( i( ]- X) F9 w. Y3 D0 Q0 ?
6 n0 u' q9 u4 G! u% n) s" H* @

分区版主

Rank: 8Rank: 8

3419

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-3-4 09:47:58 | 显示全部楼层
Eurocrypt 2024,共接收105篇论文,国内共8篇,华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。
, a- e; [2 O2 Z3 [1 A1 ~- n, v  p4 ~4 Y7 o/ H, z( \
【1】山东大学5 y+ J! f: k: K7 c# V$ @& t! J) I
Massive Superpoly Recovery with a Meet-in-the-middle Framework -- Improved Cube Attacks on Trivium and Kreyvium
3 A+ p6 Z: r& S+ {4 L  J$ YJiahui He, Kai Hu, Meiqin Wang, Hao Lei, p" @+ y  }0 n% N0 m: @1 c
Shandong University, Nanyang Technological University
: X+ g, P1 a6 M0 x  U0 u" E" N' }: v% e- V- [% t
【2】清华大学: I+ c/ K/ E9 F- `/ z9 a$ I2 _
Accelerating BGV Bootstrapping for Large $p$ Using Null Polynomials Over $\mathbb{Z}_{p^e}$( v: O! A$ P( E- p: c
Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang7 Q1 x: I" E5 C) e$ J1 j  t3 b
Tsinghua University9 x0 D+ d  @+ D- a  y
- i8 S8 ?5 R! S6 [
【3】华东师大( T- V6 X4 v+ j; O% n: h' N
Registered Functional Encryptions from Pairings
! q4 I% ^8 ~( X9 {0 H- |7 EZiqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian2 H* k: Q/ z! p8 l0 |2 N0 {( c
East China Normal University, Shanghai University, Shanghai University of Electric Power& z" J' Z0 f1 Z  x# U% _1 x) H
! `8 _( \' ]8 s6 d: C0 v
【4】南科大
; q5 L! ]- I" ~0 J7 `2 fIntegrating Causality in Messaging Channels, E$ k$ @6 _$ `# @
Shan Chen, Marc Fischlin* G' V! S2 D+ E9 E' U8 D1 G0 \5 d& D
Southern University of Science and Technology, TU Darmstadt
" ^; E- D+ z7 J+ M) [! p! c( ]4 f. [" S" K  o3 o' l3 W, O
【5】暨南大学
7 c/ A1 N: E, p2 ?2 p9 W  HProbabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond' W' T! p  M0 p' |1 E
Ling Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng6 X" X7 y( w9 E! v# z) R/ d; f  x! D. h
College of Cyber Security, Jinan University, Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering4 S* W9 R" _2 ~

3 b9 l/ b" |, X! O: ]" ~【6】上海交大
' X  d% z/ L$ }The Hardness of LPN over Any Integer Ring and Field for PCG Applications; @0 f3 G) I, l' l
Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu
2 i7 N- Q3 m4 Y: PShanghai Jiao Tong University, Shanghai Qi Zhi Institute, Northwestern University, State Key Laboratory of Cryptology3 v; G, @5 j, L9 ?; s) F+ W4 X

' K( u8 \5 O3 H% t! A: o: X【7】上海交大3 @1 j5 e* ]$ s' m3 H
Universal Composable Password Authenticated Key Exchange for the Post-Quantum World
3 P/ n3 O- ~2 I7 `$ gYou Lyu, Shengli Liu, Shuai Han
1 d# m9 `4 ^) T7 [; l; S& TShanghai Jiao Tong University" }% W" Q# q* \/ z& X: `
0 J+ x2 Y3 \2 _4 o
【8】华东师大
6 {/ S7 ^4 F5 X' p( n, v; w) ~New Records in Collision Attacks on SHA-2
& h& U) y/ u6 V7 N6 ZYingxin Li, Fukang Liu, Gaoli Wang
. D# l+ ~# N3 D+ s3 e+ Y9 H4 qEast China Normal University, Tokyo Institute of Technology
% j3 s1 s1 E' L! u! p6 `6 {8 h% v) H! J

分区版主

Rank: 8Rank: 8

3419

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 09:59:41 | 显示全部楼层
本帖最后由 SmithArno 于 2024-2-3 10:06 编辑 ' R3 z; a. v% \

0 z5 w3 v* j" j6 i) F3 B' wNDSS 2024会议主页:https://www.ndss-symposium.org/ndss2024/accepted-papers/
, ^1 E! T$ k! j/ y$ b# u! f
. b2 \. i8 Z) i, S" g0 l【1】山东大学& w5 I# G9 t5 `8 ^0 C0 c, F
Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols+ d: M0 R% R# a! Z
Shichen Wu (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Puwen Wei (1. School of Cyber Science and Technology, Shandong University 2. Quancheng Laboratory 3. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Ren Zhang (Cryptape Co. Ltd. and Nervos); Bowen Jiang (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education)1 r( N- n+ |1 @1 J& k+ R

2 w" m& L3 v# v3 {0 z【2】东南大学* K( l6 L" I- L
LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems' y) b. p/ M% f1 N; ]
Huaiyu Yan, Zhen Ling, Haobo Li (Southeast University); Lan Luo (Anhui University of Technology); Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang (Southeast University); Junzhou Luo (Southeast University, Nanjing, P.R. China); Xinwen Fu (University of Massachusetts Lowell)! T1 P7 w- t8 ]  ~; D, B
& P4 Y8 l7 d8 ?7 W2 _  Z4 i
【3】浙江大学
. I/ A0 W$ X4 G  u9 F5 \GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards
- [( {5 T0 L$ E2 |* r8 Z/ `4 ~6 hQinhong Jiang, Yanze Ren (Zhejiang University); Yan Long (University of Michigan); Chen Yan (Zhejiang University); Yumai Sun (University of Michigan); Xiaoyu Ji (Zhejiang University); Kevin Fu (Northeastern University); Wenyuan Xu (Zhejiang University)0 D% `! x- a+ n+ B1 h
1 M& U+ P# b  _& t6 p4 c2 \
【4】浙江大学: m. a* d$ `; s
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time# G# i; w1 j; l. S
Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)
9 s0 b1 V" c; Z
1 k& m" F# U3 ~# s; b! f" k- G/ v! Z【5】北京航空航天大学
2 h8 |6 S3 }" I# E. |0 G+ vHEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation8 q) T$ c, i7 c1 }& S
Song Bian, Zian Zhao, Zhou Zhang, Ran Mao (Beihang University); Kohei Suenaga (Kyoto University); Yier Jin (University of Science and Technology of China); Zhenyu Guan, Jianwei Liu (Beihang University)9 Y5 s. o& O  z  R* ^
9 |8 m5 r0 e9 {( o" `, F  H
【6】清华大学4 ^  D. y0 q8 n0 N6 d
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic
3 g$ Z, p, T( H, S, ?/ t& xYuqi Qing (Tsinghua University); Qilei Yin (Zhongguancun Laboratory); Xinhao Deng, Yihao Chen, Zhuotao Liu (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Jia Zhang, Qi Li (Tsinghua University)
3 C/ i. |+ V$ A8 E' k- f3 _0 Z+ d* b$ z  c
【7】浙江大学6 U2 ]1 O$ }6 q- ~  g; b) z! u* z. `
Symphony: Path Validation at Scale3 F6 L8 G/ F& m) ?5 x& u! _
Anxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren (Zhejiang University)
6 p5 Y. `, {) D* M/ b" S
  X& P# F  ]+ O$ d8 n【8】清华大学; I' o. }" l8 `; ]- \. n8 ?
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet
& y# p. c+ @1 e+ c2 c$ F6 VChuhan Wang, Yasuhiro Kuranaga, Yihang Wang (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Linkai Zheng, Xiang Li (Tsinghua University); Jianjun Chen (Tsinghua University; Zhongguancun Laboratory); Haixin Duan (Tsinghua University; Quan Cheng Lab; Zhongguancun Laboratory); Yanzhong Lin, Qingfeng Pan (Coremail Technology Co. Ltd)
/ M8 e6 U0 a+ R( B8 y) f! O) e$ z6 r% W6 z+ S" q& f
【9】浙江大学
# |- ^+ y0 Z' x/ A- ]MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency1 x. p1 m8 o4 D* U- W
Jiacheng Xu, Xuhong Zhang, Shouling Ji (Zhejiang University); Yuan Tian (UCLA); Binbin Zhao (Georgia Institute of Technology); Qinying Wang, Peng Cheng, Jiming Chen (Zhejiang University)  ]6 I# j' Q, r; b& Y- ~# O6 S. `

& x+ G( m- I7 k- z; J. S6 \【10】清华大学1 E. [: Z5 b% {9 K  V- u7 e
ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection
4 M( c1 W" j, t7 y" d( }# DKunpeng Zhang (Shenzhen International Graduate School, Tsinghua University); Xiaogang Zhu (Swinburne University of Technology); Xi Xiao (Shenzhen International Graduate School, Tsinghua University); Minhui Xue (CSIRO’s Data61); Chao Zhang (Tsinghua University); Sheng Wen (Swinburne University of Technology)
; b, I$ ^' U, S+ M4 W+ A) f4 m0 Q/ s5 |( ~2 Z5 F% |+ U2 v
【11】中国海洋大学
7 W- ^8 j# t1 `Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack
( `3 Q5 O' e; g* ~- j- p% ?Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu (Ocean University of China)
2 M! ]4 S% {; {6 L6 b0 `2 w/ j9 O4 c% J, h% S# k: k
【12】浙江大学
5 o; p4 ]2 v4 m0 fORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning. E7 }: C( L, Y; S% `# I
Linkang Du (Zhejiang University); Min Chen (CISPA Helmholtz Center for Information Security); Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen (Zhejiang University); Zhikun Zhang (Stanford University)4 z- Y3 z' ?5 t* j+ R
0 \; L8 B+ Y/ s5 Q0 ?
【13】北京大学9 Y5 c! m% [3 H5 C
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
4 ^8 Y2 A0 L0 i1 ^' fShaofei Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Feng Dong (Huazhong University of Science and Technology); Xusheng Xiao (Arizona State University); Haoyu Wang (Huazhong University of Science and Technology); Fei Shao (Case Western Reserve University); Jiedong Chen (Sangfor Technologies Inc.); Yao Guo, Xiangqun Chen (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Ding Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University)
5 F" r( l+ A  M; @- A, W# s
, Y  R/ c8 t! X8 e【14】浙江大学: `, r% _% w5 x  S4 X2 B6 G
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors
. @% Y0 I, `1 H! f6 ~; Q. d3 {; jChengkun Wei, Wenlong Meng (Zhejiang University); Zhikun Zhang (Stanford University); Min Chen (CISPA Helmholtz Center for Information Security); Minghu Zhao (Zhejiang University); Wenjing Fang, Lei Wang (Ant Group); Zihui Zhang, Wenzhi Chen (Zhejiang University)# z0 {  z- e$ W  M# O. m/ t
7 \  M$ [, M( z- R' K6 n- L8 H
【15】湖南大学
- X) F$ @2 D- o) Y8 SEavesdropping on Black-box Mobile Devices via Audio Amplifier’s EMR, Z: X$ S, e, H6 Q9 W0 _9 H8 ^) T
Huiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Kenli Li (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Zheng Qin (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Mingxing Duan (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Yong Xie (Nanjing University of Posts and Telecommunications, Nanjing, China); Daibo Liu (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Ming Li (The University of Texas at Arlington, USA)' O  t8 b8 ~1 x6 h

/ E  V7 t( q' P7 D4 E1 R( t" t【16】上海交大
- S) E- X5 E6 iCrafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models
) [& q/ g0 K4 s, ?  L  QShiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang (Shanghai Jiao Tong University); Chenghu Zhou (Chinese Academy of Sciences); Bo Li (Hong Kong University of Science and Technology)* o) |/ m! C0 y. k7 h' c7 O3 r: p

/ j% X8 @1 k2 L【17】清华大学
- D+ y( W; x. c% V  YExploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks  b, C% w. ?2 M; Q: q8 f
Yuxiang Yang, Xuewei Feng, Qi Li (Tsinghua University); Kun Sun (George Mason University); Ziqiang Wang (Southeast University); Ke Xu (Tsinghua University)
& V3 M& }9 W9 u. f, R" Z8 ?; f  |; n; U3 u4 |
【18】清华大学4 w+ {$ Q1 H& N4 m5 G! x
CP-IoT: A Cross-Platform Monitoring System for Smart Home+ T* ?) T: f6 r
Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang (Tsinghua University); Linna Fan (National University of Defense Technology); Chenxin Duan (Tsinghua University)2 h! S' y6 F, F8 g: l

1 N( [2 F4 ?) g4 y4 c【19】清华大学, J7 R9 e: ~$ V- H
LoRDMA: A New Low-Rate DoS Attack in RDMA Networks
8 R# r9 ]1 z8 h; D) h) ~9 i" BShicheng Wang (Tsinghua University); Menghao Zhang (Beihang University & Infrawaves); Yuying Du (Information Engineering University); Ziteng Chen (Southeast University); Zhiliang Wang, Mingwei Xu (Tsinghua University & Zhongguancun Laboratory); Renjie Xie (Tsinghua University); Jiahai Yang (Tsinghua University & Zhongguancun Laboratory)+ k) J# U/ b# A8 o

% R9 a0 w; T2 s【20】清华大学* b0 h: r2 M: F
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing
, C  u5 O! O6 l9 U- M: b( u# tLinkai Zheng, Xiang Li, Chuhan Wang, Run Guo (Tsinghua University); Haixin Duan (Tsinghua University; Quancheng Laboratory); Jianjun Chen, Chao Zhang (Tsinghua University; Zhongguancun Laboratory); Kaiwen Shen (Tsinghua University)  F; M4 S% g; S$ p. `6 ^3 b$ t( j

: _  t' `. m4 V; b& Q( r, r【21】清华大学! Q% ?' z( X- ^* N3 a3 k. }
Automatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization$ S! f5 }3 V: i# {- i
Quan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang (Tsinghua University)
1 Y5 m+ c8 F9 q5 k
3 J' x7 k2 L7 o  `- c  Q$ k【22】清华大学8 \$ ]# k1 n  b, A. M5 M3 t
DynPRE: Protocol Reverse Engineering via Dynamic Inference: [* m8 u6 m% |2 L  a5 v
Zhengxiong Luo (Tsinghua University); Kai Liang (Central South University); Yanyang Zhao, Feifan Wu, Junze Yu (Tsinghua University); Heyuan Shi (Central South University); Yu Jiang (Tsinghua University)  x" n  `8 P- c* J* u1 z
2 S# D. f+ _! H2 h) I8 L6 [9 V- B' p
【23】浙江大学% d4 d3 K& I; w
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention
$ r% F- u+ W2 V' ?" lLujia Shen, Yuwen Pu, Shouling Ji (Zhejiang University); Changjiang Li (Penn State); Xuhong Zhang (Zhejiang University); Chunpeng Ge (Shandong University); Ting Wang (Penn State)
2 Q3 s* a" v* {, g$ n# f" ]" U, e4 g* q" z/ a
【24】中山大学
/ m. L& B" ]2 M: i( g8 ~Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem2 {5 S6 t) m# r
Jiangrong Wu, Yuhong Nan (Sun Yat-sen University); Luyi Xing (Indiana University Bloomington); Jiatao Cheng (Sun Yat-sen University); Zimin Lin (Alibaba Group); Zibin Zheng (Sun Yat-sen University); Min Yang (Fudan University)9 U! i% h, ?9 b5 }
2 Q' x4 O# ~, L9 ~4 q* \; ?2 \2 z$ v
【25】浙江大学# d. ^0 s; ?4 _- Y  a: F% [
CamPro: Camera-based Anti-Facial Recognition% W: {1 b* N3 H3 u, y6 r% L
Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)! N( y/ c  O% q' O9 j* c

: W9 y) q7 N5 A& b& `【26】中国科学技术大学
" ~  y$ S3 G2 n- ^  yDetecting Voice Cloning Attacks via Timbre Watermarking
; j5 p2 X& @& Q+ L& ]8 k. R/ W" `Chang Liu (University of Science and Technology of China); Jie Zhang, Tianwei Zhang (Nanyang Technological University); Xi Yang, Weiming Zhang, NengHai Yu (University of Science and Technology of China)
/ V6 {' X- |( s( m1 k, n2 y8 @- z4 ?9 X  }7 Y$ i
【27】清华大学8 L$ F7 w. T- D* Z- O1 [$ J
Understanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed2 d1 G' c# C4 _2 O" ~
Lancheng Qin (Tsinghua University, BNRist); Li Chen (Zhongguancun Laboratory); Dan Li (Tsinghua University, Zhongguancun Laboratory); Honglin Ye, Yutian Wang (Tsinghua University)
: _: T/ Q: [  N2 X; k; I' M
1 j, \* p3 A$ q0 d【28】清华大学
- H/ {/ {( k( I9 bdRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository/ ]! a. I, ?9 V* w* K0 ?
Yingying Su, Dan Li (Tsinghua University); Li Chen (Zhongguancun Laboratory); Qi Li (Tsinghua university); Sitong Ling (Tsinghua University)
2 z( ^& B# O, L* T
% I* e: I+ |- c8 n5 A' Y9 W【29】清华大学
7 F7 \7 q* [0 e8 F* D. UPencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption" f1 e& K5 m: O$ e. s
Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu (Tsinghua University)
9 k# c9 }% _9 p9 `  b; z* Q. U3 `
- r& I4 d/ F6 u【30】NUDT
7 ?% w( C( r! p: ~& iDeepGo: Predictive Directed Greybox Fuzzing
; j+ T' p" i9 r2 ~* ^% p( D1 ^Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang (National University of Defense Technology)
) b9 c; C2 C, t* t2 C3 w! S, T; E5 B
【31】上海交大& z! x0 w) A5 Q. p6 Q
ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token# M* x1 h8 M. V+ z1 N
Ge Ren, Gaolei Li, Shenghong Li, Libo Chen (Shanghai Jiao Tong University); Kui Ren (Zhejiang University)
, O1 `' J$ n& f" V
. ]/ I4 U4 N, o& |0 l' ?【32】华中科技大学1 V! H+ O+ }, ?$ H9 J
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound# p( W& b' L3 `
Man Zhou, Shuao Su (Huazhong University of Science and Technology); Qian Wang (Wuhan University); Qi Li (Tsinghua University); Yuting Zhou, Xiaojing Ma (Huazhong University of Science and Technology); Zhengxiong Li (University of Colorado Denver)4 M$ U  D* ^6 s+ H* B& \" r9 H

4 ?+ }- y& o+ c- x【33】南方科技大学) P/ d9 N. D) I9 m0 }  z
Separation is Good: A Faster Order-Fairness Byzantine Consensus8 p6 U6 v2 \6 p6 m
Ke Mu (Southern University of Science and Technology, China); Bo Yin (Changsha University of Science and Technology, China); Alia Asheralieva (Loughborough University, UK); Xuetao Wei (Southern University of Science and Technology, China & Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation, SUSTech, China)
8 l( o0 ~9 x# w' e  V& ]0 ^! u$ o, _' Q9 N9 }; a# L# ^( w* n
【34】南方科技大学
' ?! x7 W/ B1 q6 xCAGE: Complementing Arm CCA with GPU Extensions
, D# d2 x4 t2 v5 c+ ZChenxu Wang (Southern University of Science and Technology (SUSTech) and The Hong Kong Polytechnic University); Fengwei Zhang, Yunjie Deng (Southern University of Science and Technology (SUSTech)); Kevin Leach (Vanderbilt University); Jiannong Cao (The Hong Kong Polytechnic University); Zhenyu Ning (Hunan University); Shoumeng Yan, Zhengyu He (Ant Group)
9 G; T$ X3 b) t& {% C! u: u  [9 c0 V* y6 j6 s$ }- ]
【35】华中科技大学; p0 F5 ]' j% ^: \3 a' i) z% x
DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses
5 j8 \- N$ a# u. X; C+ XChaoxiang He, Xiaojing Ma (Huazhong University of Science and Technology); Bin Benjamin Zhu (Microsoft Research Asia); Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin (Huazhong University of Science and Technology); Dongmei Zhang (Microsoft Research)
7 u+ O, l5 G: |
/ I5 j/ B* P) p9 ~- `! w* x# T. o& V. O【36】华中科技大学. n$ ^3 p$ Y: ~; Q3 A
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit
! o5 @- W  f* G4 c( S8 ^# _Pengxiang Ma (Huazhong University of Science and Technology); Ningyu He (Peking University); Yuhua Huang, Haoyu Wang (Huazhong University of Science and Technology); Xiapu Luo (The Hong Kong Polytechnic University)
' b, s9 x( z. H2 t! m/ T4 I0 b$ L  P( [# B3 b# O
【37】浙江大学
  K# R& H2 ?# o- jUniID: Spoofing Face Authentication System by Universal Identity
7 r  q5 g) V# g- k( ?9 B- _Zhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji (Zhejiang University); Wenyuan Xu (Zhejing University)
; r/ D" Q  Z  G! Q$ k% f2 Y7 v) y
【38】武汉大学
: y  x* b) S" c& Z3 ]! `From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices
6 o' J' S6 ]  D5 v: W4 k. T$ @; cYue Xiao (Wuhan University); Yi He (Tsinghua University); Xiaoli Zhang (Zhejiang University of Technology); Qian Wang (Wuhan University); Renjie Xie (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Qi Li (Tsinghua University)
/ o: S& r4 }6 M! G5 Q% V
! A2 v! l1 s5 c9 p  c* S【39】上海科技大学
1 x4 e2 w# L+ p# FSLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems
: t/ d3 k8 f6 iGuangke Chen (ShanghaiTech University); Yedi Zhang (National University of Singapore); Fu Song (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences)
) M/ [$ o. O9 K+ B' g5 k7 q0 `1 {3 `  R) O5 P, |' G3 g
【40】清华大学
1 [2 I6 w8 }  e1 dYou Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks& A! \! u' B7 r; D7 U8 H: n* f
Qiushi Li (Tsinghua University); Yan Zhang (China Agricultural University); Ju Ren, Qi Li, Yaoxue Zhang (Tsinghua University)2 I* e+ Q+ _& o+ H1 u, T1 K2 [

老战友

Rank: 5Rank: 5

1447

积分

0

贡献

500

奖励
发表于 2024-2-3 10:15:02 | 显示全部楼层
Wenyuan Xu (Zhejiang University)
& C8 m+ t$ `! Z+ e0 ?+ H徐文元好几篇
0 j4 m. K1 Q- {! @/ Z2 x- t

高级战友

Rank: 4

429

积分

0

贡献

0

奖励
发表于 2024-2-3 11:53:22 来自手机 | 显示全部楼层
有2023年的数据吗

分区版主

Rank: 8Rank: 8

3419

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 12:26:14 | 显示全部楼层
0000 发表于 2024-2-3 11:53- h- B1 C0 h2 `% \% l4 t5 U
有2023年的数据吗
. E$ u' I/ H4 X( W2 ^, N0 H1 z
https://bbs.netbig.top/thread-26427-1-1.html

普通会员

Rank: 2

125

积分

0

贡献

0

奖励
发表于 2024-2-3 12:49:02 来自手机 | 显示全部楼层
徐文渊老师太强了…

分区版主

Rank: 8Rank: 8

3419

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 12:50:55 | 显示全部楼层
yxy 发表于 2024-2-3 12:49
# Z9 d# _4 c# }" x  h! {& ?徐文渊老师太强了…
& n8 ^. z( c8 W6 C9 Z2 d" N. q
国内现在这几个顶会发文量虽然多了,但头部高校断层明显,基本都是浙大清华屠榜。+ I4 w: M( a) ^5 ?! @
其他高校偶尔有个一篇两篇的。
: l, b4 r7 t: u# C% G" \0 Q' t
% V" j5 M$ j6 ~+ x) Y徐文渊老师不仅输出稳定,而且还有best paper

分区版主

Rank: 8Rank: 8

3419

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 14:55:15 | 显示全部楼层
本帖最后由 SmithArno 于 2024-3-8 16:25 编辑 , I# |0 \2 T; ?' O* S
  f3 |4 ^" G! s1 i# U5 P( b
IEEE S&P 2024
# v8 N" k9 W4 Y4 I/ T( V( G/ a( A1 Z* A9 h, ]2 @
【1】华中科技大学3 O; S9 i# z4 @9 J; ]/ B
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabilitypp. 10-10" v) h; x! S5 @" h% z6 n6 S! N9 v- c
by Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin
% T, Y! j: R5 @7 w4 v! T; Z9 D) z( z, H; V2 I, o7 r
【2】华中科技大学
# J4 M9 K" [' tMQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementationspp. 13-13$ M; ^& e6 v+ H, n1 q
by Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing
* G4 F6 ?( ?4 [. N0 _
. N; y7 P& L7 I, r3 U7 r【3】复旦大学
$ m% n( T! q+ a+ w4 B9 i1 HWithdrawing is believing? Detecting Inconsistencies Between Withdrawal Choices and Third-party Data Collections in Mobile Appspp. 14-14; |- `/ G) V9 |- y' Z* v
by Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang
: F5 T6 j# E/ A; E6 u8 j
; v5 p5 Q/ G0 {- y【4】浙江大学, ~- Y0 M- e3 E) }
PIRANA: Faster Multi-query PIR via Constant-weight Codespp. 39-39. f. L2 M$ ]+ H& h
by Jian Liu, Jingyu Li, Di Wu, Kui Ren
) @$ [/ J0 S. j, O- o% c
3 \! Y8 t8 `" F0 [5 l【5】东南大学! r9 y/ |) u) w: W" \$ \
Predecessor-aware Directed Greybox Fuzzingpp. 40-40- U& d6 u* Q4 [  `; \9 ?0 m* X0 u
by Yujian Zhang, Yaokun Liu, Jinyu Xu, Yanhao Wang
$ q# R  c) g  O5 @1 @# x; J
/ M7 i% h7 O/ M6 t) y& {) z3 U【6】中南大学6 @( Z7 }6 _4 t7 A& ]0 U
Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Informationpp. 42-42
/ q$ n' O  j) o2 }$ r+ ?* `by Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, Zhuo Lu8 ^+ ^* e& U9 q" r% z0 d9 g# O
3 E0 }& D! \- s- R, Y4 i+ Y6 F5 @# ?
【7】清华大学! H5 C# K" n9 k( J5 q2 @6 K
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packetspp. 46-46& r: E8 f1 j) k3 R5 Y
by Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li
; I1 n( V( d0 z' l- o2 h, }9 Y2 X& ~
【8】清华大学3 I. D# d3 f/ V) q
SATURN: Host-Gadget Synergistic USB Driver Fuzzingpp. 51-517 f7 E! J2 ~& a+ [
by Yiru Xu, Hao Sun, Jianzhong Liu, Yuheng Shen, Yu Jiang4 O. k# ]( H) t! D6 ?+ F$ B. j4 r

. Z1 y$ w, G9 J  @/ R+ d4 P【9】北京大学
( G, f9 ~' F; ~, PNo Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device MLpp. 52-52
: Q5 F5 ~8 d7 Zby Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Ding Li, Yao Guo, Xiangqun Chen( w' Z. D; B# q5 J4 K
# {$ U  H' _% o
【10】浙江大学! _) V$ P$ m: k  s+ P
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attackspp. 53-53
, S1 |% e' s% q: D1 ?by Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren5 j* i: X4 j, L7 U5 F. w

4 ?* J6 E5 I+ O' U/ ]$ e- @+ g# u. O【11】浙江大学7 S' S2 L( A5 ]9 F' M" i1 t
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Featurespp. 56-56/ h0 [# [9 ^7 q  x2 m/ H
by Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren( j% {  @+ Y7 O) A

! o( I' p) b. K2 _【12】南开大学& ~0 ]+ i& z7 D+ L5 n
Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Lengthpp. 67-67" ]" k2 O7 w" \3 b( M: H  F
by Jianning Zhang, Ming Su, Xiaoguang Liu, Gang Wang8 L9 d0 ^8 L* z8 w: ?) M

7 ^7 }, @8 T. V) W0 Y) c2 l【13】浙江大学5 B  b, |" m2 y; c) s
BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wildpp. 68-68& l, v8 @. r  c- D* J
by Jie Wan, Jianhao Fu, Lijin Wang, Ziqi Yang7 B( _( H/ k3 s* j

/ X. f$ M5 b  c- t2 b0 e6 @' R【14】浙江大学
9 \% L9 i. B6 q) L7 tSyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devicespp. 70-70
, [- U2 J3 l- H  x9 R1 @3 E5 qby Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah$ y7 R0 i& P. n9 Z: H9 h3 t

4 O/ w1 }0 y5 {【15】清华大学
8 G+ a2 U7 X( N8 ^9 A2 r% c8 n( _, k! TTest-Time Poisoning Attacks Against Test-Time Adaptation Modelspp. 72-72
* g  J# A! x: vby Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang9 z+ ?, M% i7 l1 |  M1 i6 C

  `* R9 Q$ ?0 [. F/ _【16】上海交大
" z- V- w) `. f7 ]SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformationspp. 97-97) m  W3 I7 r( G) D/ q$ N, Z' {3 v0 ~
by Borui Yang, Wei Li, Liyao Xiang, Bo Li) A9 [( f9 ]- {8 v

0 T8 t) x/ O! Z' r9 ]【17】重庆大学4 w. V& V& U5 e5 g2 u
From Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuningpp. 101-101
1 B- J8 m5 n( E" |' Lby Qiao Zhang, Tao Xiang, Chunsheng Xin, Hongyi Wu
! M3 i) C& x# h( p2 C! I' h+ N+ g$ M
【18】东南大学% s/ c- d" T4 e: q/ Y0 M
Transferable Multimodal Attack on Vision-Language Pre-training Modelspp. 102-102
1 f/ P4 D5 Q* @by Haodi Wang, Kai Dong, Zhilei Zhu, Haotong Qin, Aishan Liu, Xiaolin Fang, Jiakai Wang, Xianglong Liu4 C8 G3 r9 w5 N
8 ~- b8 M& q* Y
【19】清华大学2 O, k! r! d+ u% t  J
BULKOR: Enabling Bulk Loading for Path ORAMpp. 103-103
4 |' u6 w  N. J3 \* `  lby Xiang Li, Yunqian Luo, Mingyu Gao
4 D9 a+ r6 Z4 F& L  I  Z
7 v$ ~8 M: [0 x: c) w1 H【20】清华大学" Q8 m0 s$ h& F& W
Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delaypp. 109-109+ d' @. `/ x+ x  ^
by Yuanliang Chen' z8 F) w4 ~& O+ e: E5 J

% `- N: A/ @( v【21】浙江大学
/ X7 w4 G( f* J0 D1 @& mUnderstanding and Benchmarking the Commonality of Adversarial Examplespp. 111-111/ n/ x6 i- h3 g- w
by Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu
: W3 ^# V" {3 E. R1 Y  @" ^
5 y; |# G; K( A$ d9 S【22】电子科技大学/ y, q' ]0 n( f" c
NURGLE: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulationpp. 125-125
/ Z) m# t8 ^. _! j; R4 x- Jby Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu
5 v& w! }! U* v3 C& L" k2 X3 s& K3 }8 w3 @" [7 \0 ^
【23】清华大学
1 v" a( N  O6 r: r- K: G; ~LABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devicespp. 127-127' C) L+ p2 ^$ F. y0 {
by Hangtian Liu, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Xiangzhi Wang, Guangming Gao
3 \% \4 F  A# U2 _0 \4 h/ T" J" w4 e' l
【24】清华大学! X" u" u  E4 b# C7 M; {6 r5 P
Break the Wall from bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewallspp. 129-129
! W( I1 ^* l( I2 F( \! T" K  _by Qi Wang, Jianjun Chen, Zheyu Jiang, Run Guo, Ximeng Liu, Chao Zhang, Haixin Duan
4 z8 I) b0 ~+ r5 [* `/ B
/ j' Y2 ^1 E- J& J【25】清华大学
& F5 Z$ O. T' Z9 r0 P9 i4 K# aGAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocolspp. 131-131
' J* m2 z. f! yby Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song
7 |6 ]2 o( i/ U$ c& V2 R) ^0 Q/ j
: P8 {0 p" A2 p' A1 M% _" o【26】清华大学
9 E& |/ _7 A- V  HMore Haste, Less Speed: Cache Related Security Threats in Continuous Integration Servicespp. 138-1386 K' A* Y1 |' l( m# ]) Y9 w
by Yacong Gu, Lingyun Ying, Huajun Chai, Yingyuan Pu, Haixin Duan, Xing Gao
0 b7 u; |5 O9 p' Q% I( a% ~& I* A1 u
8 [& ?6 C% `' |& Z【27】西电5 ^6 W+ R9 d& c% `2 t1 N! t
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledgepp. 148-148
! S+ C% Y8 x+ w' V$ F6 @( ~by Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino
+ K, z' m* m: ~* S. n# m0 v/ I; U+ B  F5 F, t" s* `& M
【28】清华大学* N! [# T* S. R+ U( U1 c) j5 [
The Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellationspp. 149-149
5 {# G2 j& K; t$ y1 S9 r3 U' U4 F9 Mby Wei Li, Yuanjie Li, Hewu Li, Yimei Chen, Yufeng Wang, Jingyi Lan, Jianping Wu, Qian Wu, Jun Liu, Zeqi Lai$ @: D4 H; l: u, [# |+ s
% I1 _- d+ M0 x# I8 O" k
【29】复旦大学+ E5 S$ d7 S- Y# g( e
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Constructionpp. 150-150# }, ?  E: H8 z2 q; S0 t
by Bofei Chen& O5 _  R3 e4 h7 g. _# m5 j

  q; b, b% m2 C# U+ R【30】山东大学2 D/ o/ v0 L1 p( u6 H3 @  H% l
AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detectionpp. 155-155. v# V7 e. Y. M
by Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao& m1 R* l& _' o9 U$ w. @
! r6 Z, {( j1 N! T8 y5 e
【31】北京大学
0 P# V6 Q# b+ J  O+ zRethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelitypp. 160-160
+ }+ M5 X% G4 i% K$ ?by Xinming Wei, Jiaxi Zhang, Guojie Luo5 K: r* r0 P* R  ~, u8 h; P
1 M9 V7 n$ {' g6 @& l0 Q" _7 r

高级战友

Rank: 4

549

积分

0

贡献

0

奖励
发表于 2024-2-3 16:05:18 来自手机 | 显示全部楼层
清浙遥遥领先

新手上路

Rank: 1

11

积分

0

贡献

0

奖励
发表于 2024-2-3 16:22:26 | 显示全部楼层
浙大威武

中级站友

Rank: 3Rank: 3

175

积分

0

贡献

0

奖励
发表于 2024-2-4 23:36:20 来自手机 | 显示全部楼层
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records in Collision Attacks on SHA-2. Accepted by EUROCRYPT 2024, Zurich, Switzerland, May 26-30, 2024.   

分区版主

Rank: 8Rank: 8

3419

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-4 23:43:26 来自手机 | 显示全部楼层
不知而已 发表于 2024-2-4 23:368 N' o  Q% C+ w9 {
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...
3 S: Z4 C$ c5 R/ |" f' G2 _
哈这位是我学姐,王院士的学生。5 x& a: H9 t' \- _1 x2 s* h
23年她在欧密会就有文章,在SHA-2方面做得很好。

老战友

Rank: 5Rank: 5

1872

积分

1

贡献

800

奖励
发表于 2024-2-19 16:46:34 | 显示全部楼层
usenix security 2024 accepted papers
/ e' U1 z! Z2 B0 ^6 ~- [6 Z$ Shttps://www.usenix.org/conferenc ... mer-accepted-papers

老战友

Rank: 5Rank: 5

1872

积分

1

贡献

800

奖励
发表于 2024-2-19 16:57:35 | 显示全部楼层
本帖最后由 大师大楼 于 2024-2-19 16:59 编辑
* i1 R- _9 s( |( J9 A5 C2 s* _7 h7 s3 z; j/ o; ~3 j6 P3 c" V
usenix security 2024
/ [7 U& e. R/ l# i5 c4 y浙大 东南2
/ ~; I8 l4 U' F; q/ j武大北邮等 1
7 _3 N( d6 d) C; ]/ F8 u" y包括清华上交在内,大部分都是空白?

分区版主

Rank: 8Rank: 8

3419

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-19 16:58:58 | 显示全部楼层
大师大楼 发表于 2024-2-19 16:57
$ s- q7 ?( p; V5 R( O+ B4 G, `, ?* musenix security 2024
1 |! ^9 _7 V+ Z; R' {! x2 p浙大 2
" z3 K$ N, b3 z) @+ f武大北邮等 1
4 e4 \9 B1 `' C6 g# h4 ^8 T* f
还有一轮应该没出来

老战友

Rank: 5Rank: 5

1872

积分

1

贡献

800

奖励
发表于 2024-2-19 17:08:00 | 显示全部楼层
SmithArno 发表于 2024-2-19 16:58
) ]  w  \3 `; `2 D( ^; r- }1 H还有一轮应该没出来
  p* k7 B- L; Z: _
嗯,耐心等待

老战友

Rank: 5Rank: 5

1176

积分

0

贡献

0

奖励
发表于 2024-2-19 19:29:03 来自手机 | 显示全部楼层
清华浙大太牛了!

初出江湖

Rank: 2

102

积分

0

贡献

0

奖励
发表于 2024-2-19 23:24:43 | 显示全部楼层
南京大学三项0蛋啊。1篇都没有啊

未关注公众号会员1

100

积分

0

贡献

0

奖励
发表于 2024-2-20 10:41:54 | 显示全部楼层
三大密码顶会算信息安全的成果吗

分区版主

Rank: 8Rank: 8

3419

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-20 10:48:29 来自手机 | 显示全部楼层
ecnuking 发表于 2024-2-20 10:41
: {5 ?) K- k8 i( ]三大密码顶会算信息安全的成果吗
0 |8 i+ H$ s- j1 p
密码方向主要统计三大顶会和密码学顶级期刊JoC。
6 [4 {% G, a0 f6 I2 R目前有零星的信息,IACR还没出Accepted papers。

白银长老

Rank: 8Rank: 8

3322

积分

1

贡献

2000

奖励
发表于 2024-2-21 12:23:18 | 显示全部楼层
浙大徐文渊:连续三年担任网安四大顶会的大会联合主席2 Q+ b( I& J) o
USENIX Security 2024, E6 p  G0 n* O, L
NDSS 2023
( x2 i! E  X0 b; U4 E3 n$ u  ]NDSS 2022

白银长老

Rank: 8Rank: 8

3322

积分

1

贡献

2000

奖励
发表于 2024-2-21 12:24:27 | 显示全部楼层
近日,浙江大学共有12位教师担任国际信息安全顶级会议ACM CCS 2024的程序委员会委员,入选总人数排名全球高校第一。其中巴钟杰、申文博、冯博、刘金飞、罗梦、周亚金、娄坚、姚培森、秦湛(按姓氏笔画排序)9位教师来自浙江大学区块链与数据安全全国重点实验室。

白金长老

Rank: 10Rank: 10Rank: 10

5512

积分

0

贡献

0

奖励
发表于 2024-2-21 14:20:26 | 显示全部楼层
乡下 发表于 2024-2-19 23:29; B- S, ]9 o& i
郑州信大,网安国家队核心队员之一,0蛋?
5 r7 g' Z  m% H  o; r3 o! a8 e
能发吗??

中级站友

Rank: 3Rank: 3

192

积分

0

贡献

100

奖励
发表于 2024-2-23 11:18:14 | 显示全部楼层
没有军信,都是假榜5 N8 k$ G+ j7 D+ i0 @7 z# k
看看邬院士的程控交换机,才有后来的巨大中华
" O" e. a9 C  |7 t" @信息安全,缺了军信,可信度太低

老战友

Rank: 5Rank: 5

1872

积分

1

贡献

800

奖励
发表于 2024-2-23 11:49:38 | 显示全部楼层
本帖最后由 大师大楼 于 2024-2-23 11:51 编辑 8 f! l0 L! X4 ^: R$ R8 k9 z

$ \- L1 v* o' F; O4 ?如果军方还是继续画地为牢,固步自封,不借助世界一流高校和院所的力量,那么俄罗斯就是前车之鉴。

老战友

Rank: 5Rank: 5

1872

积分

1

贡献

800

奖励
发表于 2024-2-23 11:51:14 | 显示全部楼层
academic818 发表于 2024-2-21 12:23
, p6 Z& Z* h, Q5 _4 j+ [) G浙大徐文渊:连续三年担任网安四大顶会的大会联合主席
+ b: j/ D+ T* Q; m1 O6 pUSENIX Security 2024
$ l4 G* U1 ~9 l$ x; ?+ y  Z' SNDSS 2023
3 T+ h  X/ v  N0 G
水平是特别高啦,但在中国现行体制下,还有待被发掘

老战友

Rank: 5Rank: 5

1288

积分

1

贡献

800

奖励
发表于 2024-2-23 12:09:24 | 显示全部楼层
大师大楼 发表于 2024-2-23 11:51
/ G0 j* K, v* j- k, B- C0 W9 `水平是特别高啦,但在中国现行体制下,还有待被发掘

/ z# |; g) s& M她好像比较低调的,待在电气学院内,好像还拒绝提拔副院长

禁止发言

119

积分

0

贡献

0

奖励
发表于 2024-2-23 12:09:52 | 显示全部楼层
academic818 发表于 2024-2-21 12:23
& ?: J( s2 S: |! L浙大徐文渊:连续三年担任网安四大顶会的大会联合主席! V" l  a  ]: h: B
USENIX Security 2024' i1 L: W$ X7 f1 i( h
NDSS 2023
- g- @2 P( G  d' `; K
这么多卖点,宣传太差,差不多的年龄,颜宁都院士了

高级战友

Rank: 4

469

积分

0

贡献

0

奖励
发表于 2024-2-23 12:26:05 来自手机 | 显示全部楼层
也不是每个人都适合做领导哈哈哈

中级站友

Rank: 3Rank: 3

175

积分

0

贡献

0

奖励
发表于 2024-2-25 19:07:24 来自手机 | 显示全部楼层
不知而已 发表于 2024-2-4 23:36/ r) q( ?  T, E8 N7 g5 I
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...
6 O2 d# a7 V0 K/ z  C
华师大软院通讯今年还accepted一篇欧密 《Registered Functional Encryptions from Pairings》
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

论坛的微信公众号(二维码如下),关注获取更多科教信息

Archiver|手机版|网大论坛 ( (鄂ICP备2021013060号-2) )

GMT+8, 2025-6-20 13:39 , Processed in 0.325770 second(s), 22 queries , Gzip On.

鄂公网安备 42018502005923号

Powered by Discuz! X3.4

Copyright © 2001-2022, Tencent Cloud.