网大论坛

 找回密码
 立即注册
查看: 26420|回复: 71

2024年信息安全领域顶会统计(Eurocrypt/FSE)

[复制链接]

分区版主

Rank: 8Rank: 8

3406

积分

0

贡献

1600

奖励
发表于 2024-2-3 09:59:37 | 显示全部楼层 |阅读模式
本帖最后由 SmithArno 于 2024-3-8 16:28 编辑 3 o8 I. H- {7 p% }
7 G6 ~$ b, L! O) V; E
按照第一作者单位统计(信息安全四大顶会+密码三大顶会)
) L# g* v! I: Y( d0 WNDSS 2024概览
& J. d4 |4 `! B清华大学13篇,浙江大学9篇,华中科技大学3篇,南方科技大学2篇。
5 l* q! e+ S2 z: m1 C东南大学、中国海洋大学、北京航空航天大学、山东大学、北京大学、中山大学、武汉大学、中科大、NUDT、上海科技大学等等1篇。2 T7 o+ ?& q1 s# p- I# s. y. D4 V

! d0 t' p8 \' }1 ^1 C1 dCCS 2024
& K* u: @: U5 f* }: F" T
! a" I: |5 c/ [0 F# aIEEE S&P 2024概览
1 @9 s3 a: L5 W! y6 M- Q3 r9 O清华大学10篇,浙江大学6篇,华中科技大学、复旦大学、东南大学2篇。其他重庆大学、山东大学、南开大学、西电、成电等等1篇。
! r* |/ c" r+ O( x2 I4 v+ V) {$ U$ t8 ]3 C: P2 [
Security 2024( u# Q1 w- ?! s. s
2 D+ L4 i' q" g3 W) ?1 X" k) n3 X7 v
Eurocrypt 2024& g2 N! k  P9 i- O3 P/ R* {+ R
华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。
4 j3 G% J+ R: ~1 J: u/ z
; r8 D8 D" G3 \9 }. P+ e( j, R4 n
4 k; I4 g0 }& f9 G! w! U$ [* U) Z+ C* e$ U
; m2 A& p+ ]" ]( }获奖情况:& N! x" t. R. d2 T4 {
【1】浙江大学获得NDSS 2024杰出论文奖。+ M, ~/ k* T  u( G! M

0 f# z0 ]' _+ U( a8 J: J* S% Q- T8 z" ~0 o/ M8 c

* r1 E( c+ Q8 R/ g) F7 f1 m. n- F
' _7 h. Q4 ?1 r  {5 N! d
; j* }+ \- f0 B7 O* ]9 _) |4 u0 M1 d0 d: V& \) x, t# O% X

分区版主

Rank: 8Rank: 8

3406

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-3-4 09:47:58 | 显示全部楼层
Eurocrypt 2024,共接收105篇论文,国内共8篇,华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。- G7 f' v: X0 n

8 u, ?0 n4 d  e* \6 q【1】山东大学% P7 U9 h% @( t6 U
Massive Superpoly Recovery with a Meet-in-the-middle Framework -- Improved Cube Attacks on Trivium and Kreyvium
7 M4 W" O1 I; K% d# v: _' R4 ^Jiahui He, Kai Hu, Meiqin Wang, Hao Lei& p& W4 }9 p, S& t# l
Shandong University, Nanyang Technological University
, [# A& u. p6 f
5 H( K" Q8 y8 t【2】清华大学1 E. }4 @) D3 N: ?9 i
Accelerating BGV Bootstrapping for Large $p$ Using Null Polynomials Over $\mathbb{Z}_{p^e}$( s* w* H8 G1 e7 ~  b3 z7 o
Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang! X  Y' d4 A1 _1 O+ n
Tsinghua University7 z3 Z1 ?: J7 R$ [; k
% N! c: \) b' V# G! J
【3】华东师大6 a; x: L9 |9 i$ \
Registered Functional Encryptions from Pairings- f, L. ^' d8 l, J4 V
Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian
, l2 x, R9 [/ fEast China Normal University, Shanghai University, Shanghai University of Electric Power; |. G0 S( y# D: `, K' R
/ B4 ~& Y1 y6 @* u( j
【4】南科大
; s7 d' r7 i, G' t* f4 @0 IIntegrating Causality in Messaging Channels
2 b% d1 n7 J4 z5 tShan Chen, Marc Fischlin3 |9 W/ d# a% B4 ]% B+ n+ l* E
Southern University of Science and Technology, TU Darmstadt
5 I7 B3 o0 e* s% m9 i' F. G2 m8 z  \/ A/ Y- J& v# Z( k7 ?
【5】暨南大学, [: U/ j: _2 B
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond
  U& d+ c8 K; w: a3 ULing Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng$ \5 g, U- }% A/ p' ^
College of Cyber Security, Jinan University, Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering
. h) I5 ?1 C  K3 g& H' G! z6 M( E0 N$ V5 x. z
【6】上海交大7 b- C+ g; N7 D
The Hardness of LPN over Any Integer Ring and Field for PCG Applications
/ U4 \9 g( u* n, l% iHanlin Liu, Xiao Wang, Kang Yang, Yu Yu
& ]# a+ @5 |+ ]! C/ qShanghai Jiao Tong University, Shanghai Qi Zhi Institute, Northwestern University, State Key Laboratory of Cryptology
' x$ ~4 Q( _' Q% b: k1 n" u6 ^! p; [3 M. [% M0 U( |! `+ ]
【7】上海交大
$ N! T( m; T7 R; r% D5 Z4 k/ pUniversal Composable Password Authenticated Key Exchange for the Post-Quantum World7 d" P  z, P# U+ D5 J9 F( h
You Lyu, Shengli Liu, Shuai Han; A) o) j- G& Z8 C
Shanghai Jiao Tong University4 p, A; _# o* }7 O& k% f
, y1 s' N; f4 S( w, B+ d
【8】华东师大
' @7 B0 E* P& X2 PNew Records in Collision Attacks on SHA-2
0 E  J/ m' e: BYingxin Li, Fukang Liu, Gaoli Wang. R2 {. o2 N+ U5 u3 o8 w
East China Normal University, Tokyo Institute of Technology$ ^/ c! P9 E, e: i

. l1 |9 r  J, q6 g. y. o

分区版主

Rank: 8Rank: 8

3406

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 09:59:41 | 显示全部楼层
本帖最后由 SmithArno 于 2024-2-3 10:06 编辑 6 }3 B+ {2 ~/ c. S- E' Y$ b9 @# d

# {- {$ x1 e; M  V% C" v9 _6 sNDSS 2024会议主页:https://www.ndss-symposium.org/ndss2024/accepted-papers/
" N3 N: S7 m2 _: r- f( |' b: F7 D# r4 R5 N* }0 Q4 L
【1】山东大学
/ g  j1 ^' i9 h) r# F1 iSecurity-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols" J: @# _5 M, _+ G( g8 s( H
Shichen Wu (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Puwen Wei (1. School of Cyber Science and Technology, Shandong University 2. Quancheng Laboratory 3. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Ren Zhang (Cryptape Co. Ltd. and Nervos); Bowen Jiang (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education)
, v& p& c3 D- |5 `9 n
! y; x0 s5 d" y' u: j7 R' _【2】东南大学& L+ g) t( w1 V# e6 D
LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems/ K- C0 x6 A$ s7 k/ K$ Q* l0 U
Huaiyu Yan, Zhen Ling, Haobo Li (Southeast University); Lan Luo (Anhui University of Technology); Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang (Southeast University); Junzhou Luo (Southeast University, Nanjing, P.R. China); Xinwen Fu (University of Massachusetts Lowell)
' t9 B1 b1 L6 k3 S) e( w' T9 c) m9 x# `+ |
【3】浙江大学
6 W3 d* a2 j1 ^! d0 ^2 k8 ]GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards7 q9 R/ ]8 I% ~& }% g0 w! d& V2 d# C
Qinhong Jiang, Yanze Ren (Zhejiang University); Yan Long (University of Michigan); Chen Yan (Zhejiang University); Yumai Sun (University of Michigan); Xiaoyu Ji (Zhejiang University); Kevin Fu (Northeastern University); Wenyuan Xu (Zhejiang University)8 F, J) ^- i+ ?& q0 T& c

$ E; T: ^* o$ T9 w( i5 g& q【4】浙江大学
2 \3 r9 W/ y* E: @& b; M' mInaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
0 ]+ J. V1 s1 L1 cXinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)" K; Z3 w% s$ V

2 e: q' g6 M- Y" [0 q【5】北京航空航天大学
3 o3 }, t6 E/ EHEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation
3 g8 f* m" A1 ?5 b2 U$ |Song Bian, Zian Zhao, Zhou Zhang, Ran Mao (Beihang University); Kohei Suenaga (Kyoto University); Yier Jin (University of Science and Technology of China); Zhenyu Guan, Jianwei Liu (Beihang University)+ I9 f; X  j" J
1 G1 ^6 t+ {2 y2 [9 \
【6】清华大学
  ~$ Z$ q5 Y; |$ b/ f1 G% c5 sLow-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic
( p; L" @1 @" q% yYuqi Qing (Tsinghua University); Qilei Yin (Zhongguancun Laboratory); Xinhao Deng, Yihao Chen, Zhuotao Liu (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Jia Zhang, Qi Li (Tsinghua University)
; A' C3 S7 W; u/ W3 [  L
5 R7 I1 Y5 Z: R5 e7 g【7】浙江大学
  M# K& }( W: Z, |+ SSymphony: Path Validation at Scale
# ^+ D% O9 X1 }" t2 kAnxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren (Zhejiang University)- S- l9 M# \9 A+ L

4 j$ _3 m  Z7 P% H8 S+ P( |6 `: u【8】清华大学  O, p  X  ]! b, S
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet
0 W  G, t4 [) N" z& }+ ]3 fChuhan Wang, Yasuhiro Kuranaga, Yihang Wang (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Linkai Zheng, Xiang Li (Tsinghua University); Jianjun Chen (Tsinghua University; Zhongguancun Laboratory); Haixin Duan (Tsinghua University; Quan Cheng Lab; Zhongguancun Laboratory); Yanzhong Lin, Qingfeng Pan (Coremail Technology Co. Ltd)3 d- ^- c0 K5 d, m
3 ]$ h5 A  Z. s& A+ c( `+ w
【9】浙江大学4 W; \8 z# F$ V9 f, h$ [; \4 S" U  K
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency# ?- r, b' K! g4 G( ^( t5 n
Jiacheng Xu, Xuhong Zhang, Shouling Ji (Zhejiang University); Yuan Tian (UCLA); Binbin Zhao (Georgia Institute of Technology); Qinying Wang, Peng Cheng, Jiming Chen (Zhejiang University)- m# u7 o5 V& a' R- Y# R% d

# B7 ^( ^: {- b+ T+ Y7 }: J【10】清华大学
# L1 f! A6 I: P7 wShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection0 o' W' \8 e" A8 p) \& G% M
Kunpeng Zhang (Shenzhen International Graduate School, Tsinghua University); Xiaogang Zhu (Swinburne University of Technology); Xi Xiao (Shenzhen International Graduate School, Tsinghua University); Minhui Xue (CSIRO’s Data61); Chao Zhang (Tsinghua University); Sheng Wen (Swinburne University of Technology)
6 K$ h3 r- `# d2 [" a7 N5 W) E! g! H9 F
【11】中国海洋大学' e5 k* x9 r$ G' A* ~3 s7 g
Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack
! F% c4 O4 S$ C0 J. @Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu (Ocean University of China)6 l7 g9 d( U7 z; {# p# |
; K6 `/ a+ A2 b* j# g3 d- y3 ]
【12】浙江大学
0 J% ~% b5 G$ b. V, I. ?: vORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning  i/ q6 A  ^& K( Q/ l) L' `0 l; ~, ?/ h
Linkang Du (Zhejiang University); Min Chen (CISPA Helmholtz Center for Information Security); Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen (Zhejiang University); Zhikun Zhang (Stanford University), c- g- \$ q, b6 K% d, b

3 H5 [, x: }% p0 d6 t【13】北京大学
/ A$ z/ @; H) c4 b0 x/ uNODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
9 ~) C5 {; n/ {! @Shaofei Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Feng Dong (Huazhong University of Science and Technology); Xusheng Xiao (Arizona State University); Haoyu Wang (Huazhong University of Science and Technology); Fei Shao (Case Western Reserve University); Jiedong Chen (Sangfor Technologies Inc.); Yao Guo, Xiangqun Chen (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Ding Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University). p' s; u! P! n# a, j) H) M( N4 V
* m- G. l# q, L( T5 T7 W$ N2 [% C
【14】浙江大学& U. L, p3 [5 ?. R6 ~  p
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors
3 |+ C. T- b0 l. j% p& e! [% r8 rChengkun Wei, Wenlong Meng (Zhejiang University); Zhikun Zhang (Stanford University); Min Chen (CISPA Helmholtz Center for Information Security); Minghu Zhao (Zhejiang University); Wenjing Fang, Lei Wang (Ant Group); Zihui Zhang, Wenzhi Chen (Zhejiang University)
' d: `$ |$ z8 C' [8 d; ~4 A" r: n
【15】湖南大学
7 A) Q6 ^6 h# A6 ]& g1 V5 L1 QEavesdropping on Black-box Mobile Devices via Audio Amplifier’s EMR
+ L& S& y# G+ f9 G4 tHuiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Kenli Li (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Zheng Qin (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Mingxing Duan (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Yong Xie (Nanjing University of Posts and Telecommunications, Nanjing, China); Daibo Liu (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Ming Li (The University of Texas at Arlington, USA)! B0 X, a0 N! ?, u4 }5 x

/ }4 D$ Q( E. v* z+ s【16】上海交大
6 e" r8 h: H2 }6 pCrafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models
" n' ^* f9 g; `3 M1 Q2 d2 ^Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang (Shanghai Jiao Tong University); Chenghu Zhou (Chinese Academy of Sciences); Bo Li (Hong Kong University of Science and Technology)) F5 G& x+ L% ?$ K' a, J  m

& x+ ~# |/ {# Z- w5 J. ^, [. F& v【17】清华大学
) q! {4 A* ]% V7 LExploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks' C% ~3 l) j. N0 }
Yuxiang Yang, Xuewei Feng, Qi Li (Tsinghua University); Kun Sun (George Mason University); Ziqiang Wang (Southeast University); Ke Xu (Tsinghua University)7 G: C$ j+ ~9 w& s: c) v
, A3 }  Y# z$ M) ?6 }0 R
【18】清华大学
  @! X6 B7 N7 F8 n- B$ O' BCP-IoT: A Cross-Platform Monitoring System for Smart Home/ c% L  Y' q# b8 A0 X7 v
Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang (Tsinghua University); Linna Fan (National University of Defense Technology); Chenxin Duan (Tsinghua University)
% \2 `9 x4 h2 e; `1 X' m) x$ B( T/ _2 J& U7 Q& U% \
【19】清华大学2 R  u0 }9 y+ _9 a) ?
LoRDMA: A New Low-Rate DoS Attack in RDMA Networks
* [( ~( v+ H3 _5 UShicheng Wang (Tsinghua University); Menghao Zhang (Beihang University & Infrawaves); Yuying Du (Information Engineering University); Ziteng Chen (Southeast University); Zhiliang Wang, Mingwei Xu (Tsinghua University & Zhongguancun Laboratory); Renjie Xie (Tsinghua University); Jiahai Yang (Tsinghua University & Zhongguancun Laboratory)
+ K& ]. d0 w% C& Z8 }1 p, P: A! x0 Y& i
【20】清华大学& @3 Q( X- v! d2 F" d* T, X% o
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing
- z$ Z& v: V; A7 E/ ILinkai Zheng, Xiang Li, Chuhan Wang, Run Guo (Tsinghua University); Haixin Duan (Tsinghua University; Quancheng Laboratory); Jianjun Chen, Chao Zhang (Tsinghua University; Zhongguancun Laboratory); Kaiwen Shen (Tsinghua University)* h0 C' E; R1 ]% {4 b) `
1 m: z/ g: j2 }# P9 o
【21】清华大学! u8 q# ]0 g( x* Q, i9 V
Automatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization
, o- M) y7 m4 a+ I5 ~; b; LQuan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang (Tsinghua University)
9 v7 i! w3 Y! O  u5 q
; y% u7 F  I1 ~/ N( B# i* q; A【22】清华大学& N- Z* G+ [  N% g( e
DynPRE: Protocol Reverse Engineering via Dynamic Inference8 Q3 {! M* B5 h" P. O9 u
Zhengxiong Luo (Tsinghua University); Kai Liang (Central South University); Yanyang Zhao, Feifan Wu, Junze Yu (Tsinghua University); Heyuan Shi (Central South University); Yu Jiang (Tsinghua University), z4 }. \2 `. d! r3 K
7 J7 F4 L7 L+ j: c- r# j  e
【23】浙江大学. D6 Y, c8 R5 o5 `
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention( g9 f7 A& ?5 R; h0 L+ x+ a% }
Lujia Shen, Yuwen Pu, Shouling Ji (Zhejiang University); Changjiang Li (Penn State); Xuhong Zhang (Zhejiang University); Chunpeng Ge (Shandong University); Ting Wang (Penn State)
, w9 T- j5 N" j) A/ I  b6 d8 G/ r" ]$ O( C4 D% N
【24】中山大学, W. P/ O, k8 @5 O0 t
Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem; v" [3 ~* g& C# U4 Y: Z
Jiangrong Wu, Yuhong Nan (Sun Yat-sen University); Luyi Xing (Indiana University Bloomington); Jiatao Cheng (Sun Yat-sen University); Zimin Lin (Alibaba Group); Zibin Zheng (Sun Yat-sen University); Min Yang (Fudan University)
2 @1 E) g$ q# X) g, i3 w$ H1 U1 [  j' X- Q4 \9 @: }
【25】浙江大学2 O5 ^1 M( n$ U  }3 t/ j; K
CamPro: Camera-based Anti-Facial Recognition/ T4 A' r. l; H1 h' `
Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)
8 S0 u+ G) i1 k" J
& O9 y" ^* \" Z; E/ [【26】中国科学技术大学
  P% \4 w+ J/ Q$ tDetecting Voice Cloning Attacks via Timbre Watermarking% d2 E  z$ E0 c9 c, v3 D
Chang Liu (University of Science and Technology of China); Jie Zhang, Tianwei Zhang (Nanyang Technological University); Xi Yang, Weiming Zhang, NengHai Yu (University of Science and Technology of China)3 y9 O: J) {) O3 W
) W' O, L" m: ^  M
【27】清华大学
) A8 j6 M; D. X6 }7 U, B) [. dUnderstanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed
% k5 C7 k8 i" \+ u/ i  s5 DLancheng Qin (Tsinghua University, BNRist); Li Chen (Zhongguancun Laboratory); Dan Li (Tsinghua University, Zhongguancun Laboratory); Honglin Ye, Yutian Wang (Tsinghua University); v# E! `: s7 W9 x. \
; I7 p$ U7 ^/ b* ?* g
【28】清华大学! Z( T5 B% b9 p$ S9 K- o
dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository! n' j! i9 u5 G/ h( a9 {
Yingying Su, Dan Li (Tsinghua University); Li Chen (Zhongguancun Laboratory); Qi Li (Tsinghua university); Sitong Ling (Tsinghua University)7 w' ]5 }/ f, ?. h& f

: D4 y, V4 x$ e7 }9 L; n, E. w: E【29】清华大学
" y* l/ v& K, Z+ dPencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption; b/ Z# a2 x- z/ w5 A( I
Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu (Tsinghua University)3 X5 G  \% n1 }" g5 O: u
2 j% W* [( Z" Y
【30】NUDT
$ l' {  ]3 X  x1 UDeepGo: Predictive Directed Greybox Fuzzing# T+ Z4 a( L( v: |2 J
Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang (National University of Defense Technology)- B! D( G  s! P/ S+ b
% [  s3 E) @" P- `' R
【31】上海交大' Z" u1 v6 r) d7 R
ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token
3 l1 O5 C, @: f, LGe Ren, Gaolei Li, Shenghong Li, Libo Chen (Shanghai Jiao Tong University); Kui Ren (Zhejiang University)
6 Z: O5 B( t6 I/ d- X$ o0 ^% O
+ S8 S# D5 F% y6 p  s% B【32】华中科技大学
* Z6 M  A: e4 E1 W' j3 RPrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound! U$ f: V# O" A/ B" R- N- I; B
Man Zhou, Shuao Su (Huazhong University of Science and Technology); Qian Wang (Wuhan University); Qi Li (Tsinghua University); Yuting Zhou, Xiaojing Ma (Huazhong University of Science and Technology); Zhengxiong Li (University of Colorado Denver)" L+ W4 r/ C( G: v

. l8 Z5 m2 v. F5 g9 L( K. x【33】南方科技大学- c! A; }- X3 l3 g. p
Separation is Good: A Faster Order-Fairness Byzantine Consensus
& h- N, _9 h/ l* O; Z: tKe Mu (Southern University of Science and Technology, China); Bo Yin (Changsha University of Science and Technology, China); Alia Asheralieva (Loughborough University, UK); Xuetao Wei (Southern University of Science and Technology, China & Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation, SUSTech, China)
; k5 }5 Y. ]# v  o' X' x) ~# H: J$ I5 y- y
【34】南方科技大学
0 c& l+ y, Y( X+ m, ], q9 hCAGE: Complementing Arm CCA with GPU Extensions
& X- f& K9 b3 |% k6 CChenxu Wang (Southern University of Science and Technology (SUSTech) and The Hong Kong Polytechnic University); Fengwei Zhang, Yunjie Deng (Southern University of Science and Technology (SUSTech)); Kevin Leach (Vanderbilt University); Jiannong Cao (The Hong Kong Polytechnic University); Zhenyu Ning (Hunan University); Shoumeng Yan, Zhengyu He (Ant Group): u6 o, ?2 N, ~

3 f$ a7 ^! ^% c3 _! ?【35】华中科技大学
! }  O# T$ {1 k; L8 m) SDorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses9 t; V1 A4 c2 a5 C
Chaoxiang He, Xiaojing Ma (Huazhong University of Science and Technology); Bin Benjamin Zhu (Microsoft Research Asia); Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin (Huazhong University of Science and Technology); Dongmei Zhang (Microsoft Research)
! {' G+ R, d% r( g$ B; r2 I9 t; j  r3 d# W7 Q6 G
【36】华中科技大学
% a8 x& i- C( @- p7 lAbusing the Ethereum Smart Contract Verification Services for Fun and Profit
/ R2 P0 n/ F% uPengxiang Ma (Huazhong University of Science and Technology); Ningyu He (Peking University); Yuhua Huang, Haoyu Wang (Huazhong University of Science and Technology); Xiapu Luo (The Hong Kong Polytechnic University)% ?- l/ h+ E! N4 ?2 ~6 s
, Y% L9 }& K4 C2 u$ c" s
【37】浙江大学
$ z! |+ C5 D5 X6 U! H$ k  Q4 \UniID: Spoofing Face Authentication System by Universal Identity
+ K' D& ~/ s. ]Zhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji (Zhejiang University); Wenyuan Xu (Zhejing University)1 q) G. q( n# ~4 Z2 ^
; @0 Y) {6 A8 s( |/ W
【38】武汉大学8 u$ t* z0 B/ O
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices, r+ z. t) p5 b$ E
Yue Xiao (Wuhan University); Yi He (Tsinghua University); Xiaoli Zhang (Zhejiang University of Technology); Qian Wang (Wuhan University); Renjie Xie (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Qi Li (Tsinghua University)
2 @: a( U9 k, g  O
+ \' F; j0 Y$ P* T【39】上海科技大学- K7 H5 V3 W" ^3 w
SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems- ^9 @8 s" h+ d. T
Guangke Chen (ShanghaiTech University); Yedi Zhang (National University of Singapore); Fu Song (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences)1 x6 V. G0 y& _5 o0 _  u8 m
" ?# ?( w" Q/ ~" @4 o5 ^
【40】清华大学" m9 D3 N) u- u) h- g
You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks
+ x5 \+ I3 I) p4 V! y2 eQiushi Li (Tsinghua University); Yan Zhang (China Agricultural University); Ju Ren, Qi Li, Yaoxue Zhang (Tsinghua University)
" e& [+ h5 f. L, [; M& s& F' ?

老战友

Rank: 5Rank: 5

1420

积分

0

贡献

500

奖励
发表于 2024-2-3 10:15:02 | 显示全部楼层
Wenyuan Xu (Zhejiang University)
( U+ v. R& C0 h5 p/ O  G, b徐文元好几篇
( S3 Y2 e! h5 ~$ N$ x" N

中级站友

Rank: 3Rank: 3

407

积分

0

贡献

0

奖励
发表于 2024-2-3 11:53:22 来自手机 | 显示全部楼层
有2023年的数据吗

分区版主

Rank: 8Rank: 8

3406

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 12:26:14 | 显示全部楼层
0000 发表于 2024-2-3 11:531 Q" N! A; s1 ^( t: M* g! A0 w
有2023年的数据吗
/ c3 N( I/ ?1 o9 ~+ c: j
https://bbs.netbig.top/thread-26427-1-1.html

普通会员

Rank: 2

124

积分

0

贡献

0

奖励
发表于 2024-2-3 12:49:02 来自手机 | 显示全部楼层
徐文渊老师太强了…

分区版主

Rank: 8Rank: 8

3406

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 12:50:55 | 显示全部楼层
yxy 发表于 2024-2-3 12:49
2 C( Z/ w/ v* t* B; I徐文渊老师太强了…
2 r2 C/ d2 G+ @. ^8 ]
国内现在这几个顶会发文量虽然多了,但头部高校断层明显,基本都是浙大清华屠榜。
' p* e/ z, p% b6 ~' J# H其他高校偶尔有个一篇两篇的。* i6 H$ B0 V' C
! u" |4 H: l( l" ?  x
徐文渊老师不仅输出稳定,而且还有best paper

分区版主

Rank: 8Rank: 8

3406

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 14:55:15 | 显示全部楼层
本帖最后由 SmithArno 于 2024-3-8 16:25 编辑
" z1 c( t# l' [8 \  i' U* y
8 ]# [" e+ b$ h, NIEEE S&P 20244 i& H3 K% b3 M1 q: k7 g( o: c

( ]  B! n: \- D/ n2 ~- K2 p% j, t【1】华中科技大学
$ H' O7 B* ?, M, E  I/ ^: k& ^9 `9 Z/ oWhy Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabilitypp. 10-10
7 X3 Y: w/ B# ^0 q  e/ f8 Yby Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin( {! ~: [* P0 a( B

/ F0 G0 A( m" W. U$ ^【2】华中科技大学
0 G7 |, Y( k: R" [" nMQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementationspp. 13-13
' |/ n4 a' }% p& z1 vby Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing7 m( l! ^& \# w* H/ r9 w( b
3 P7 n8 X' @6 _2 _8 H' Y
【3】复旦大学% k) Y* n3 B, d7 N! `" [) i( m
Withdrawing is believing? Detecting Inconsistencies Between Withdrawal Choices and Third-party Data Collections in Mobile Appspp. 14-149 Y7 H9 H  F) A& i9 y
by Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang) {1 }1 W- [6 c- F
& ~5 G9 w& O# v, g+ G
【4】浙江大学( x0 T0 V9 }* I$ @1 h* Y( i, |+ F: n$ z
PIRANA: Faster Multi-query PIR via Constant-weight Codespp. 39-39
& ?, q3 W% t1 k) `6 \3 F* eby Jian Liu, Jingyu Li, Di Wu, Kui Ren
* Z$ O9 k9 @) Y1 J" Y
% U+ U' t6 W8 |/ a; r【5】东南大学
  n( o0 [5 M" b* gPredecessor-aware Directed Greybox Fuzzingpp. 40-40
& K- ]; g+ z0 i! e$ N+ Iby Yujian Zhang, Yaokun Liu, Jinyu Xu, Yanhao Wang! a  f" C" M* N0 {) O6 R9 B; ^

$ B; ]$ I$ L3 y【6】中南大学
, A4 u1 ]" [5 I. g  q. r; h3 XGuessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Informationpp. 42-424 g$ _% y7 L4 j* |! h4 L: i( _
by Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, Zhuo Lu4 U! [+ ~" b  C, m: V1 R/ J/ `  v

; e: X. U' ?, ~7 a& {【7】清华大学! }# G! N9 D) ~  p) ?( `) P" K. C) ]  }1 K
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packetspp. 46-46
) t; @: e2 r+ g! tby Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li# x) G' b2 b) L

# N1 m1 R' C& W7 D【8】清华大学- m# a5 F, T2 `0 |% n0 _8 ]6 L. S
SATURN: Host-Gadget Synergistic USB Driver Fuzzingpp. 51-51. f. j% x" L! e% F. [* J7 m$ ]1 @
by Yiru Xu, Hao Sun, Jianzhong Liu, Yuheng Shen, Yu Jiang
) {1 s" l/ \) z" Y
+ G1 Z8 P5 h! t' ?! ~5 j' k) c' i【9】北京大学
+ n+ x" d- j) n! |/ B9 F0 wNo Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device MLpp. 52-52/ o; c9 `5 w4 A$ U+ k# U# h
by Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Ding Li, Yao Guo, Xiangqun Chen! u/ g) h9 V- T& D7 y1 J
& e$ H  L9 Q. b' P+ V& |9 \4 A/ g
【10】浙江大学  D; ?" V; F1 h, S8 @: q6 b! E
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attackspp. 53-53
1 ]6 q; e6 C) w7 [( h/ V6 dby Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren$ B8 g+ \7 I, F. C
0 r1 E# u  ]. b0 s/ R7 {9 W
【11】浙江大学' X; P' t+ b/ a3 Q! |
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Featurespp. 56-561 Q' n( U1 E6 ^
by Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren/ V4 p8 M! N% B4 J
) K* j0 R+ M- F
【12】南开大学
8 J0 I3 O6 s; D! @/ [; ?3 }Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Lengthpp. 67-67; r( k5 Q1 C5 K" Q7 i
by Jianning Zhang, Ming Su, Xiaoguang Liu, Gang Wang
! B) ~  f; h: M
" ^  ]: y* l) i$ ?: _0 p6 _【13】浙江大学( h% {6 D! I$ ?" e+ O4 |
BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wildpp. 68-68
0 ?2 m# n8 c  aby Jie Wan, Jianhao Fu, Lijin Wang, Ziqi Yang2 R! w5 A- i. X. Z) Y

, G4 A* R# L" Z' D; E9 H【14】浙江大学3 v/ I, `# |/ r) D
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devicespp. 70-70
- V% r3 m4 i, O* R! qby Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah, w) Q  @, Q' m

- ~7 h9 M4 H. m3 U0 H1 ~【15】清华大学# y" J3 Q/ |: a+ v0 l7 J
Test-Time Poisoning Attacks Against Test-Time Adaptation Modelspp. 72-72
/ b0 Y) @- O3 Q3 ^" ^* p$ q- J2 Yby Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang
6 x+ J& L* X. K, l$ r1 n) ?
* l  c1 ]) u# c' T; @【16】上海交大; N! }, R* D( s! w0 j  g' M% f
SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformationspp. 97-97
' i5 N4 Y4 p1 y+ Vby Borui Yang, Wei Li, Liyao Xiang, Bo Li: q9 q. d/ L, Y+ B

3 x! m% w& ~5 n( W4 o% @% I【17】重庆大学
* h4 d, V& ]7 k3 @- T2 VFrom Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuningpp. 101-1011 k$ j6 @. C; }/ Q' o
by Qiao Zhang, Tao Xiang, Chunsheng Xin, Hongyi Wu
$ S" h! J4 W. _% D; q
3 M. m3 |1 k0 C9 E1 G3 b【18】东南大学" `4 ]! r0 s! S( Q6 \2 W
Transferable Multimodal Attack on Vision-Language Pre-training Modelspp. 102-102+ d# U% w3 r) t7 z- U
by Haodi Wang, Kai Dong, Zhilei Zhu, Haotong Qin, Aishan Liu, Xiaolin Fang, Jiakai Wang, Xianglong Liu
0 H: i5 [: h) {$ F1 @3 v( C% L
  ^5 l. D. m- b. |【19】清华大学
- F' N6 U! k. N; C4 Y& h# `BULKOR: Enabling Bulk Loading for Path ORAMpp. 103-1036 T$ D* ]0 t, n3 s* C) j: W' j, r
by Xiang Li, Yunqian Luo, Mingyu Gao' p- ?9 \- e; T$ B0 S) f0 c  z) v1 ^

+ Y+ n: G; A1 Z; O" [【20】清华大学$ [8 K; o' f+ l
Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delaypp. 109-109
" L5 _- M) K: v" j; ~: |$ B& ?by Yuanliang Chen
% H8 G7 b/ B% |. [: `6 [% U# K* y- k$ S! Q; Z
【21】浙江大学8 [) T" Y; w/ ~% T+ r; ?8 X  n9 g
Understanding and Benchmarking the Commonality of Adversarial Examplespp. 111-1113 \1 h1 X( F' U9 [& G% X, g# I
by Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu
9 R$ Z5 f+ y4 Q7 x2 C! M: m6 g* n% K! c% B" w2 n
【22】电子科技大学5 [1 p' u4 H6 Z! A
NURGLE: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulationpp. 125-125
4 }2 K. N, x, T$ C4 N5 m, @8 v1 lby Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu
) D3 a' S+ I. \- \7 m- S
: x0 ~+ f2 |8 e0 z. `  b【23】清华大学
: e7 G: b* f4 H6 i  a) _LABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devicespp. 127-127) f3 B% q, S; L- o3 ]4 |
by Hangtian Liu, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Xiangzhi Wang, Guangming Gao# I) F2 k/ u  Y0 t% V. Y

$ M% E) X( k4 r8 W* T1 Z【24】清华大学$ s) P  q( N/ O8 H# @' T* S: |
Break the Wall from bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewallspp. 129-129
6 Z# Y. q6 ]4 i2 zby Qi Wang, Jianjun Chen, Zheyu Jiang, Run Guo, Ximeng Liu, Chao Zhang, Haixin Duan& y3 f) q. Y. ~% z7 y: S; [$ M' b
  O; ~2 W; r2 F! |$ C) K" E
【25】清华大学
4 x- H2 W* T1 O1 f+ @GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocolspp. 131-131, q& s$ ]8 t1 t* b" A8 ?6 j% b; H
by Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song, R0 v: N. {0 V( d

6 p0 N: U! L0 N7 T& t3 A6 c【26】清华大学% `# i! h! X5 c5 X
More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Servicespp. 138-138& g5 k; n9 K: F6 h$ ^
by Yacong Gu, Lingyun Ying, Huajun Chai, Yingyuan Pu, Haixin Duan, Xing Gao
9 _% }3 E7 l" Z9 ]% o9 ~' _+ n0 j: f
【27】西电
' m: i+ M' u8 fFlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledgepp. 148-148( T, v3 R1 e) d4 N: x1 T
by Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino6 ]1 j9 ~, j% K# S0 A2 ~) ~+ M

2 l  q; [2 E& k% h- D) \* {8 H【28】清华大学) n" e9 U7 o* |0 ]: w& Y
The Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellationspp. 149-149
" v2 A. d4 ^& i; Xby Wei Li, Yuanjie Li, Hewu Li, Yimei Chen, Yufeng Wang, Jingyi Lan, Jianping Wu, Qian Wu, Jun Liu, Zeqi Lai4 q0 s& q% z2 f' a, k

; }3 T7 k% b9 {9 f; d2 O# |0 x【29】复旦大学
3 ^- y+ g1 }) t; [Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Constructionpp. 150-150
+ t/ B  L/ f1 m6 V* S$ |by Bofei Chen* l- }0 F8 y  D9 c7 D* @- H

& B) {' ?- w: x* j& a+ x【30】山东大学
8 C! T7 @3 F: t, @7 l% `% |, CAVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detectionpp. 155-155
4 {4 J# l  [7 B2 l% N/ fby Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao! K2 v& m1 C5 T, S

! B' u. g; K4 w- i% o$ Y" F【31】北京大学
! t7 C3 |. x% G4 W& ], {# k! ]Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelitypp. 160-160
0 p* }1 ^/ N2 ^/ w5 Q3 r. v  f: O; dby Xinming Wei, Jiaxi Zhang, Guojie Luo- c( Y& k1 W- z+ b% O' M% o6 j8 u
; k# M& O$ Y/ p( k$ @+ o0 z

高级战友

Rank: 4

546

积分

0

贡献

0

奖励
发表于 2024-2-3 16:05:18 来自手机 | 显示全部楼层
清浙遥遥领先

新手上路

Rank: 1

11

积分

0

贡献

0

奖励
发表于 2024-2-3 16:22:26 | 显示全部楼层
浙大威武

中级站友

Rank: 3Rank: 3

175

积分

0

贡献

0

奖励
发表于 2024-2-4 23:36:20 来自手机 | 显示全部楼层
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records in Collision Attacks on SHA-2. Accepted by EUROCRYPT 2024, Zurich, Switzerland, May 26-30, 2024.   

分区版主

Rank: 8Rank: 8

3406

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-4 23:43:26 来自手机 | 显示全部楼层
不知而已 发表于 2024-2-4 23:361 s$ w. J( n5 J8 P
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...

# W/ ], W3 O, ]; F哈这位是我学姐,王院士的学生。4 @/ q3 d4 i0 P. L; f) w9 g9 V
23年她在欧密会就有文章,在SHA-2方面做得很好。

老战友

Rank: 5Rank: 5

1863

积分

1

贡献

800

奖励
发表于 2024-2-19 16:46:34 | 显示全部楼层
usenix security 2024 accepted papers
% o- W# p$ E$ M: b: n6 qhttps://www.usenix.org/conferenc ... mer-accepted-papers

老战友

Rank: 5Rank: 5

1863

积分

1

贡献

800

奖励
发表于 2024-2-19 16:57:35 | 显示全部楼层
本帖最后由 大师大楼 于 2024-2-19 16:59 编辑 . s' S2 p0 \, V, y0 {. `
# Y' z$ M  v7 y7 M; O
usenix security 2024
) G' \/ ^6 \8 p7 x  V浙大 东南2
# ~9 D3 P$ k9 C# H& X武大北邮等 1
/ M7 q  C9 j6 q! }包括清华上交在内,大部分都是空白?

分区版主

Rank: 8Rank: 8

3406

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-19 16:58:58 | 显示全部楼层
大师大楼 发表于 2024-2-19 16:57! u8 S3 N7 f2 @- z( }/ T1 T6 O
usenix security 2024: Y7 ~8 {) ]& o$ ^& q8 j
浙大 2. J3 H" a0 X# F& }5 [/ d
武大北邮等 1
7 @, y! e$ \( [1 R+ J: W$ z
还有一轮应该没出来

老战友

Rank: 5Rank: 5

1863

积分

1

贡献

800

奖励
发表于 2024-2-19 17:08:00 | 显示全部楼层
SmithArno 发表于 2024-2-19 16:58
, F9 X# X: [1 \5 ]/ N4 D, ?还有一轮应该没出来
; Y* Z0 i& |; u5 ]  C9 j& P9 x
嗯,耐心等待

老战友

Rank: 5Rank: 5

1146

积分

0

贡献

0

奖励
发表于 2024-2-19 19:29:03 来自手机 | 显示全部楼层
清华浙大太牛了!

初出江湖

Rank: 2

100

积分

0

贡献

0

奖励
发表于 2024-2-19 23:24:43 | 显示全部楼层
南京大学三项0蛋啊。1篇都没有啊

未关注公众号会员1

98

积分

0

贡献

0

奖励
发表于 2024-2-20 10:41:54 | 显示全部楼层
三大密码顶会算信息安全的成果吗

分区版主

Rank: 8Rank: 8

3406

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-20 10:48:29 来自手机 | 显示全部楼层
ecnuking 发表于 2024-2-20 10:41
/ v$ f9 A) h7 d0 V三大密码顶会算信息安全的成果吗

9 h* N+ I+ y4 |; r( `* d密码方向主要统计三大顶会和密码学顶级期刊JoC。' C% w8 D6 k: w& G: ~8 R
目前有零星的信息,IACR还没出Accepted papers。

白银长老

Rank: 8Rank: 8

3322

积分

1

贡献

2000

奖励
发表于 2024-2-21 12:23:18 | 显示全部楼层
浙大徐文渊:连续三年担任网安四大顶会的大会联合主席
; S9 H1 r5 v! t; dUSENIX Security 2024
  W! W- N+ Q9 ?2 U3 V5 eNDSS 2023) T( t4 H: O; t7 D8 k0 G! r
NDSS 2022

白银长老

Rank: 8Rank: 8

3322

积分

1

贡献

2000

奖励
发表于 2024-2-21 12:24:27 | 显示全部楼层
近日,浙江大学共有12位教师担任国际信息安全顶级会议ACM CCS 2024的程序委员会委员,入选总人数排名全球高校第一。其中巴钟杰、申文博、冯博、刘金飞、罗梦、周亚金、娄坚、姚培森、秦湛(按姓氏笔画排序)9位教师来自浙江大学区块链与数据安全全国重点实验室。

白金长老

Rank: 10Rank: 10Rank: 10

5270

积分

0

贡献

0

奖励
发表于 2024-2-21 14:20:26 | 显示全部楼层
乡下 发表于 2024-2-19 23:29
7 }+ ~" b. Z1 C0 Y8 P郑州信大,网安国家队核心队员之一,0蛋?

$ T# S  W$ B* b$ g  c0 \能发吗??

中级站友

Rank: 3Rank: 3

189

积分

0

贡献

100

奖励
发表于 2024-2-23 11:18:14 | 显示全部楼层
没有军信,都是假榜/ N% X% l% g2 d2 v7 P% v* U
看看邬院士的程控交换机,才有后来的巨大中华
6 M: C: M5 {6 d% N信息安全,缺了军信,可信度太低

老战友

Rank: 5Rank: 5

1863

积分

1

贡献

800

奖励
发表于 2024-2-23 11:49:38 | 显示全部楼层
本帖最后由 大师大楼 于 2024-2-23 11:51 编辑 7 c3 D* a, l2 D. t

: a+ w# X& J9 y% f. Q如果军方还是继续画地为牢,固步自封,不借助世界一流高校和院所的力量,那么俄罗斯就是前车之鉴。

老战友

Rank: 5Rank: 5

1863

积分

1

贡献

800

奖励
发表于 2024-2-23 11:51:14 | 显示全部楼层
academic818 发表于 2024-2-21 12:23
4 j/ r4 x7 k+ K9 d6 V浙大徐文渊:连续三年担任网安四大顶会的大会联合主席
" @4 K5 D7 J0 A0 R4 a3 mUSENIX Security 2024
/ f3 |: Y& W  |; DNDSS 2023

. B* h& r9 C. p水平是特别高啦,但在中国现行体制下,还有待被发掘

老战友

Rank: 5Rank: 5

1280

积分

1

贡献

800

奖励
发表于 2024-2-23 12:09:24 | 显示全部楼层
大师大楼 发表于 2024-2-23 11:517 n5 L) W  R' x, o: O  X' ?
水平是特别高啦,但在中国现行体制下,还有待被发掘
' o) D3 C  u" O; \1 e. l
她好像比较低调的,待在电气学院内,好像还拒绝提拔副院长

禁止发言

119

积分

0

贡献

0

奖励
发表于 2024-2-23 12:09:52 | 显示全部楼层
academic818 发表于 2024-2-21 12:23
. t, ^( Z, O+ j/ A* _0 ~5 ~/ b浙大徐文渊:连续三年担任网安四大顶会的大会联合主席
7 O0 F, e! S3 X: B" tUSENIX Security 2024: f2 ]9 Z9 ~* f  r6 [7 j1 U/ B4 g
NDSS 2023
( i% A9 }5 j, F
这么多卖点,宣传太差,差不多的年龄,颜宁都院士了

高级战友

Rank: 4

463

积分

0

贡献

0

奖励
发表于 2024-2-23 12:26:05 来自手机 | 显示全部楼层
也不是每个人都适合做领导哈哈哈

中级站友

Rank: 3Rank: 3

175

积分

0

贡献

0

奖励
发表于 2024-2-25 19:07:24 来自手机 | 显示全部楼层
不知而已 发表于 2024-2-4 23:36
! T3 v2 H/ i- F6 T华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...

+ p! Q4 ^; K3 c0 n* Z3 P, ?6 t华师大软院通讯今年还accepted一篇欧密 《Registered Functional Encryptions from Pairings》
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

论坛的微信公众号(二维码如下),关注获取更多科教信息

Archiver|手机版|网大论坛 ( (鄂ICP备2021013060号-2) )

GMT+8, 2025-5-4 16:59 , Processed in 0.072716 second(s), 23 queries , Gzip On.

鄂公网安备 42018502005923号

Powered by Discuz! X3.4

Copyright © 2001-2022, Tencent Cloud.