|
|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:01! k% {7 i8 O# y5 ?
秋季 USENIX Security 顶会,不完全统计:* U r' j9 w5 q$ S' b/ R
浙大+46 ~: ]9 g8 {; l9 o! t" W4 g
清华+2
4 @* F# R9 C/ ]+ c& l东南是3篇?! u' n0 p6 D( m6 {' m. W# x1 ^
. ?) W8 D6 x- {6 d) ^A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers
* t5 m: C: ?6 Q; o7 k' EChongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell. @( ?# ?; K: b" ?$ Z/ B
/ |; b/ l8 ?6 o# a) |0 m1 L: C) I( n
Relation Mining Under Local Differential Privacy
, M9 t; l! e* }( S2 Y3 Q; xKai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell2 v( u! g) Y% u0 G% e- x
1 }$ n7 J- m. W" v* C) ~. i
FEASE: Fast and Expressive Asymmetric Searchable Encryption
" b6 `" v) Y0 p0 N$ ZLong Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|