|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:011 Y- k0 @5 Y! l6 d% z
秋季 USENIX Security 顶会,不完全统计:! |; D) j/ E' ?/ J q- I" D4 Z* I/ g3 y
浙大+4
* D" X+ Q, ?3 I/ D5 f" \) }. I3 c清华+2 " r8 L: ?! n. q1 ^
东南是3篇?
4 }1 ~9 H/ R; a9 p8 @7 n1 V
8 n7 c; p6 P# z5 J& gA Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers1 w( y" Z3 _6 {- z: c2 Z
Chongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell) p* @+ S. l; s, I
! o2 o+ w. j6 w
Relation Mining Under Local Differential Privacy! \; `4 I. A, O5 f3 q: D i) l; [( {
Kai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell: V$ K, Q. n: J0 a% J; b
% b+ p. {6 |& D$ [FEASE: Fast and Expressive Asymmetric Searchable Encryption
1 T8 l+ t% q; dLong Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|