|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:016 q' W! _9 B) T, j+ P4 ]- e
秋季 USENIX Security 顶会,不完全统计:2 E$ l/ S) o! J8 d
浙大+4
1 F* ~1 Q4 h/ _+ `& F0 k清华+2
: E& Z* G" F4 v$ Y& b6 q东南是3篇?# d+ P) p0 R/ T
1 h6 y+ c, f) c: V1 l* ?) W* [A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers
' n* n8 t1 ~. w7 u2 ?Chongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell8 i, W/ O6 ]; J3 O! x8 k$ L
. j% {+ C2 {2 D$ J& M) b5 MRelation Mining Under Local Differential Privacy
! L0 i7 S5 e; `- N. m9 ~Kai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell% `0 L! I+ `; b
. T2 o( y: g- ~3 u$ Y: f
FEASE: Fast and Expressive Asymmetric Searchable Encryption" C, G3 v6 D( M- _8 d; d% n" k) B9 |
Long Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|