|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:01
, D5 C: B7 L- \( h9 |4 D. u秋季 USENIX Security 顶会,不完全统计:% t0 P9 @6 K5 T3 e* q2 V4 X: P
浙大+4+ D0 U$ {( `; F v5 y4 P$ Q
清华+2 ' q5 w0 {4 b- `8 Z6 y% _4 l9 C
东南是3篇?( `/ ?! h8 s1 ~- U$ I8 |& z
5 m6 U. R2 e+ aA Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers; S. O3 x1 ?7 x: d6 |$ G
Chongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell
" V5 d4 n7 K/ t& V. C }7 m* ]* ^7 U/ }
Relation Mining Under Local Differential Privacy! K l( u2 g6 z9 f2 d, o
Kai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell" _' n5 O- F/ I
1 h' S* J. X' w9 A8 ? T* ~
FEASE: Fast and Expressive Asymmetric Searchable Encryption
3 Z9 ~; X% h r* f6 V- M6 }Long Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|