|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:01
3 Y j9 T2 r! \ G7 }3 c; ]' y秋季 USENIX Security 顶会,不完全统计:
" B/ V- h$ j$ z$ ]1 X/ d. z8 k9 {! r浙大+4
/ ^8 N4 x8 y& J1 o G/ e4 q清华+2
Y% ^7 m, i! ?2 c$ T9 B东南是3篇?, c* b' e. H0 Q' T. V0 o
2 p! ?$ N( n; D
A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers
, i# N6 @6 \. G0 o( RChongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell/ l. e" \3 ]% ]2 W) x
0 L+ x# e) a# y9 t: }/ x; `Relation Mining Under Local Differential Privacy5 {, t) m# [" v
Kai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell& J, n* T; p: L6 [! B7 L$ R' W, z
E/ n1 [* r. W2 B4 r" }FEASE: Fast and Expressive Asymmetric Searchable Encryption& v8 u4 U/ O6 v" s D1 e
Long Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|