网大论坛

 找回密码
 立即注册
查看: 30479|回复: 71

2024年信息安全领域顶会统计(Eurocrypt/FSE)

[复制链接]

分区版主

Rank: 8Rank: 8

3429

积分

0

贡献

1600

奖励
发表于 2024-2-3 09:59:37 | 显示全部楼层 |阅读模式
本帖最后由 SmithArno 于 2024-3-8 16:28 编辑
" {$ X8 _! ^4 p# t5 ?! g% o4 n3 X8 d9 @' m1 l" A0 r
按照第一作者单位统计(信息安全四大顶会+密码三大顶会)' ^5 }! \6 G# u& Y% \
NDSS 2024概览& t* k+ f/ g3 W# O5 t, j/ s
清华大学13篇,浙江大学9篇,华中科技大学3篇,南方科技大学2篇。
# Z, L, Z, J7 \0 t( W8 l1 I/ A东南大学、中国海洋大学、北京航空航天大学、山东大学、北京大学、中山大学、武汉大学、中科大、NUDT、上海科技大学等等1篇。
8 u: F7 g. A( V) V1 Z4 W- u% ^  _4 x
CCS 2024! L% p2 q0 v! d& A
8 E! e" j. I* ~  A0 _% W
IEEE S&P 2024概览9 i3 h& X$ ~/ P
清华大学10篇,浙江大学6篇,华中科技大学、复旦大学、东南大学2篇。其他重庆大学、山东大学、南开大学、西电、成电等等1篇。7 s0 ?  w" j; O5 l2 E" V

, T# D' {; X/ _3 Q: a8 x2 KSecurity 20241 L! O' }6 N$ t, Q; I  Y7 I
$ w- c$ d& W, B+ Y6 H
Eurocrypt 20244 s; d' M  _2 V- E
华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。8 X5 P7 `; A6 e

* F' L$ C: U3 N8 \0 f4 w8 V# i+ z) r  b# V

3 x5 Z  S# A. `3 E+ k8 x/ U) R获奖情况:( b9 n4 M% c8 p- E$ F* W; b
【1】浙江大学获得NDSS 2024杰出论文奖。7 P3 \# T$ \+ a  `/ V5 O  B0 ~. v* f
2 L" [" Q" m7 k
% B3 ^& @9 }% r4 |, b  t' a

. b& j3 _) A2 M0 _. Y
2 B& v" B! O, ^2 s9 I  U3 i7 ?
8 f: g/ Z' i' Q* h( ^* G+ s0 F# `1 S/ Z0 X8 ?( m  j& V0 O2 y

分区版主

Rank: 8Rank: 8

3429

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-3-4 09:47:58 | 显示全部楼层
Eurocrypt 2024,共接收105篇论文,国内共8篇,华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。
5 f" z( |! Z4 q- M! W0 R) P% w0 C- x0 [7 N% q7 ]7 F
【1】山东大学0 l+ l$ r4 p+ N
Massive Superpoly Recovery with a Meet-in-the-middle Framework -- Improved Cube Attacks on Trivium and Kreyvium
! V& W% n$ C: ?4 JJiahui He, Kai Hu, Meiqin Wang, Hao Lei
$ @' `) s8 y) b" i. @. ^Shandong University, Nanyang Technological University
( R* r2 y; S4 F0 F9 l1 q1 _: D9 D( l/ {7 T
【2】清华大学
7 C" O( N/ L6 w3 xAccelerating BGV Bootstrapping for Large $p$ Using Null Polynomials Over $\mathbb{Z}_{p^e}$$ i% @. K* u' K/ Z
Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang
) E4 I# G( Q) p* VTsinghua University( J' H0 I% r8 J
& d" a, W7 r" K: b; K* ^
【3】华东师大
7 R; ^( x) f1 e! E& V* ~Registered Functional Encryptions from Pairings
9 G4 s- I0 b4 W2 n. ~! B( aZiqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian3 ~+ F) r$ e9 u' D: E+ A
East China Normal University, Shanghai University, Shanghai University of Electric Power6 {$ _- l% m+ Q

* F6 |8 i6 d4 C6 W【4】南科大
( s1 D6 g5 l0 Q* N7 u3 u+ `" ~  jIntegrating Causality in Messaging Channels7 e, C! v7 I1 x* b1 V4 n
Shan Chen, Marc Fischlin8 w$ i) ^7 }) M) r
Southern University of Science and Technology, TU Darmstadt& r- ^, B: k! i; h3 l
& Y# [8 _3 d; |# z6 j& Z
【5】暨南大学0 f% z( B1 b" G; A1 J
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond
( W9 @2 t$ Y& l0 D% d2 yLing Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng
+ j$ u" f0 d, |- UCollege of Cyber Security, Jinan University, Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering
+ i4 R8 Q1 m- ?& Y6 {
+ m2 S( F# I6 \【6】上海交大
9 D6 H7 x5 k% `8 m, f; [The Hardness of LPN over Any Integer Ring and Field for PCG Applications
  j- C5 l7 b0 l  M1 j4 F3 iHanlin Liu, Xiao Wang, Kang Yang, Yu Yu) p; c1 C9 K* g! s
Shanghai Jiao Tong University, Shanghai Qi Zhi Institute, Northwestern University, State Key Laboratory of Cryptology
5 R- b- R' B% ?" S! n* U# S
0 a0 n8 |: [" f, t% c/ D' O【7】上海交大
9 L' X- C' S( X9 x7 \; NUniversal Composable Password Authenticated Key Exchange for the Post-Quantum World
- [/ ~& Y3 |1 |$ eYou Lyu, Shengli Liu, Shuai Han: L$ e" o5 x" Y8 e
Shanghai Jiao Tong University" D3 g  X. [$ j9 D! A
# s0 q" J. ^- K9 a& T4 Y) }' s$ ~4 p
【8】华东师大% A7 Q/ j% J# `: J
New Records in Collision Attacks on SHA-2
) w6 Q/ A2 R: \' t- e8 ^6 B" J7 @. D" yYingxin Li, Fukang Liu, Gaoli Wang
" J- i# x; v: C5 k8 K4 \East China Normal University, Tokyo Institute of Technology, N4 T2 f9 r3 t

* ~$ ?0 B3 O; R

分区版主

Rank: 8Rank: 8

3429

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 09:59:41 | 显示全部楼层
本帖最后由 SmithArno 于 2024-2-3 10:06 编辑 $ [" Y1 |# N, E7 _' q) w3 X

) n, h# }1 Q- R' a7 v- mNDSS 2024会议主页:https://www.ndss-symposium.org/ndss2024/accepted-papers/
$ R$ I7 Y( z. F  K9 ]8 o' r' x3 q$ f: o! U* n( a) l
【1】山东大学
9 X! b! c. d# Z9 y& @1 z1 tSecurity-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols
; ~2 q6 ]( C$ V. Y# G7 w5 PShichen Wu (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Puwen Wei (1. School of Cyber Science and Technology, Shandong University 2. Quancheng Laboratory 3. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Ren Zhang (Cryptape Co. Ltd. and Nervos); Bowen Jiang (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education)
, r7 w8 E* m& e! G! M( F# Y6 W/ G# g2 K; Z4 h8 v, I
【2】东南大学
; \5 _, O. q" D, S0 m- _$ SLDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems) \! V# W* [+ |# U9 J
Huaiyu Yan, Zhen Ling, Haobo Li (Southeast University); Lan Luo (Anhui University of Technology); Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang (Southeast University); Junzhou Luo (Southeast University, Nanjing, P.R. China); Xinwen Fu (University of Massachusetts Lowell)
" T$ U4 C' U7 M+ L& u* C9 f5 ?+ [' z$ ^7 D; b
【3】浙江大学# V7 m$ Y3 D# W8 C* z
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards
& k  M( H7 P2 AQinhong Jiang, Yanze Ren (Zhejiang University); Yan Long (University of Michigan); Chen Yan (Zhejiang University); Yumai Sun (University of Michigan); Xiaoyu Ji (Zhejiang University); Kevin Fu (Northeastern University); Wenyuan Xu (Zhejiang University)
0 G! I3 l2 N) O; C, T; r# O: v. ?; ~$ ]$ I
【4】浙江大学
+ h- U! H* M2 g. n. ?* t& lInaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time8 X6 e2 [. c8 L3 O' ?  Q
Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)
0 f- y$ I/ Z* @9 ~5 Y! B' D, l; t
【5】北京航空航天大学
/ F, j& l) @' r: CHEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation" E' n% A2 D/ ?
Song Bian, Zian Zhao, Zhou Zhang, Ran Mao (Beihang University); Kohei Suenaga (Kyoto University); Yier Jin (University of Science and Technology of China); Zhenyu Guan, Jianwei Liu (Beihang University)
9 M8 a3 Y3 s. [* J
+ D9 d! L6 `( G7 y& X, s* a【6】清华大学
4 _$ m" u% I7 P* H+ K8 q3 gLow-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic
  U, Y$ I  h5 R! HYuqi Qing (Tsinghua University); Qilei Yin (Zhongguancun Laboratory); Xinhao Deng, Yihao Chen, Zhuotao Liu (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Jia Zhang, Qi Li (Tsinghua University); D  `- C9 V6 V/ E
8 @. a  k# L  C% ~
【7】浙江大学
: ]% A  A& G+ n, U! p% m; a5 rSymphony: Path Validation at Scale, |" W+ ?  S/ k8 J4 A* w: F( q- S4 v0 F6 S
Anxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren (Zhejiang University)6 K2 A3 O$ U: y! f' |( V. m1 U
; ^/ R9 V: p7 D9 U/ M7 b& T
【8】清华大学2 x7 D" D* \; K
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet" W. P3 E- o* {( r) Z( j3 a/ w
Chuhan Wang, Yasuhiro Kuranaga, Yihang Wang (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Linkai Zheng, Xiang Li (Tsinghua University); Jianjun Chen (Tsinghua University; Zhongguancun Laboratory); Haixin Duan (Tsinghua University; Quan Cheng Lab; Zhongguancun Laboratory); Yanzhong Lin, Qingfeng Pan (Coremail Technology Co. Ltd)
  J: M/ P* }/ Y$ T
; }2 B3 t( q* o【9】浙江大学1 _/ v; h4 |. j0 N; Z5 Z
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency+ [7 d. [7 f, I  R  ?4 \0 u
Jiacheng Xu, Xuhong Zhang, Shouling Ji (Zhejiang University); Yuan Tian (UCLA); Binbin Zhao (Georgia Institute of Technology); Qinying Wang, Peng Cheng, Jiming Chen (Zhejiang University)
5 k! I! E, m" B7 a0 O2 ], C
9 f$ c2 K/ g9 X: g【10】清华大学
/ p4 _% X8 g- I( c8 t2 mShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection9 q# Y. K0 _6 F6 z
Kunpeng Zhang (Shenzhen International Graduate School, Tsinghua University); Xiaogang Zhu (Swinburne University of Technology); Xi Xiao (Shenzhen International Graduate School, Tsinghua University); Minhui Xue (CSIRO’s Data61); Chao Zhang (Tsinghua University); Sheng Wen (Swinburne University of Technology)+ U, p% n1 a% y5 v, K
# W' Q: L. w6 c$ M
【11】中国海洋大学
, X, x3 P0 x. A' B3 HEnhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack: M' K: C, p' {/ Z8 u2 K) s
Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu (Ocean University of China)
8 e9 H9 i1 S' }
4 f4 X3 g. y; p2 ~* w【12】浙江大学+ u" x0 ?7 q) R1 p4 t- d
ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning
6 W; D! z' k! T0 i- b% QLinkang Du (Zhejiang University); Min Chen (CISPA Helmholtz Center for Information Security); Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen (Zhejiang University); Zhikun Zhang (Stanford University)1 U2 M6 ?; B5 @1 M  X6 a) K6 N

8 e/ s2 C6 g. ?! n& w5 U  i【13】北京大学% A# y1 G! u! a/ N2 {5 l. X9 w- C
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
6 Y, p8 }2 _2 i- v2 mShaofei Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Feng Dong (Huazhong University of Science and Technology); Xusheng Xiao (Arizona State University); Haoyu Wang (Huazhong University of Science and Technology); Fei Shao (Case Western Reserve University); Jiedong Chen (Sangfor Technologies Inc.); Yao Guo, Xiangqun Chen (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Ding Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University)
# \  V5 `) R& v$ M, u' b
3 c* e7 C- A' y; e' i【14】浙江大学
6 p3 Y" g5 I4 b% ~( X6 ^LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors, O1 A* ]; x" t  o0 q) _
Chengkun Wei, Wenlong Meng (Zhejiang University); Zhikun Zhang (Stanford University); Min Chen (CISPA Helmholtz Center for Information Security); Minghu Zhao (Zhejiang University); Wenjing Fang, Lei Wang (Ant Group); Zihui Zhang, Wenzhi Chen (Zhejiang University)% C7 I7 j# ]4 N$ q$ t

& {& [6 H4 s. S2 k6 `【15】湖南大学
! A9 J" K8 v; M0 QEavesdropping on Black-box Mobile Devices via Audio Amplifier’s EMR' M* Z& R9 I" x
Huiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Kenli Li (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Zheng Qin (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Mingxing Duan (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Yong Xie (Nanjing University of Posts and Telecommunications, Nanjing, China); Daibo Liu (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Ming Li (The University of Texas at Arlington, USA)* z# j" x" d8 ?; `  L; @9 K

" ^" ]6 I# {; E# O【16】上海交大" u) Y# Q& q% A: S( J
Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models$ X1 |5 ]/ G8 s0 g. f8 \9 T
Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang (Shanghai Jiao Tong University); Chenghu Zhou (Chinese Academy of Sciences); Bo Li (Hong Kong University of Science and Technology)
* C1 H5 u% c2 U) E/ N2 o3 w2 _0 l: x) |4 O' Q7 K" J- s' t, }
【17】清华大学0 Y8 |; [5 `8 `- Y( t- h% X
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks4 R; q* _% q/ H3 b' @
Yuxiang Yang, Xuewei Feng, Qi Li (Tsinghua University); Kun Sun (George Mason University); Ziqiang Wang (Southeast University); Ke Xu (Tsinghua University)
3 Y6 U0 i7 Q, k
- I( R4 b9 L# O* C2 P3 w# i6 k【18】清华大学
0 {9 H( G- u) Q9 U: g; VCP-IoT: A Cross-Platform Monitoring System for Smart Home* q" F. }, }1 c& Z2 S. C
Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang (Tsinghua University); Linna Fan (National University of Defense Technology); Chenxin Duan (Tsinghua University)" O- X  ^# N- s; l* N
- R' A0 B2 a! j& [% j' S
【19】清华大学
& x! {" U. Z; g, w1 F, f3 P7 lLoRDMA: A New Low-Rate DoS Attack in RDMA Networks1 F. P9 G2 x+ c/ H
Shicheng Wang (Tsinghua University); Menghao Zhang (Beihang University & Infrawaves); Yuying Du (Information Engineering University); Ziteng Chen (Southeast University); Zhiliang Wang, Mingwei Xu (Tsinghua University & Zhongguancun Laboratory); Renjie Xie (Tsinghua University); Jiahai Yang (Tsinghua University & Zhongguancun Laboratory)
7 O/ W( R( l8 O( W8 G( j& R/ {/ L: n
【20】清华大学2 X7 H8 u( V* w( P6 M
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing
  h% Q2 ^& X0 T$ r2 JLinkai Zheng, Xiang Li, Chuhan Wang, Run Guo (Tsinghua University); Haixin Duan (Tsinghua University; Quancheng Laboratory); Jianjun Chen, Chao Zhang (Tsinghua University; Zhongguancun Laboratory); Kaiwen Shen (Tsinghua University)
+ _* A9 E) k& g* L! C% U# c( L! L
  e- o. g. j5 x+ V9 E【21】清华大学
- W  \/ @& |3 t  |8 L1 u( }Automatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization' W1 A+ O5 N) O9 D' S
Quan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang (Tsinghua University)& r) C6 G9 a: w4 k0 g

5 x: `! ~5 }4 h0 E- O7 W8 L【22】清华大学$ {4 u! z# f( b; |. E9 }1 v$ w
DynPRE: Protocol Reverse Engineering via Dynamic Inference
. N% x4 t6 ~& q9 ^: C1 o# }. JZhengxiong Luo (Tsinghua University); Kai Liang (Central South University); Yanyang Zhao, Feifan Wu, Junze Yu (Tsinghua University); Heyuan Shi (Central South University); Yu Jiang (Tsinghua University)
- d$ _8 K; H) C8 p: H
9 a8 u3 H1 P! p7 A; h7 u) c5 v( v" v; x【23】浙江大学
2 I& Q7 ]! T! X( |9 Z$ sImproving the Robustness of Transformer-based Large Language Models with Dynamic Attention
" {3 R/ w. }0 T4 _! N- yLujia Shen, Yuwen Pu, Shouling Ji (Zhejiang University); Changjiang Li (Penn State); Xuhong Zhang (Zhejiang University); Chunpeng Ge (Shandong University); Ting Wang (Penn State)- _) {( C9 q8 Z3 h/ ]+ |. R% L) Y# n
/ P+ J6 A# N" M1 k5 k
【24】中山大学9 _" a  U% @( ]& i8 A
Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem/ j0 L$ \3 k0 u! G- }: Q# E) C
Jiangrong Wu, Yuhong Nan (Sun Yat-sen University); Luyi Xing (Indiana University Bloomington); Jiatao Cheng (Sun Yat-sen University); Zimin Lin (Alibaba Group); Zibin Zheng (Sun Yat-sen University); Min Yang (Fudan University)
+ p$ |% ]8 }# m. `7 y. g( S) y% Q0 U4 }3 |- W7 b: X1 \1 l
【25】浙江大学5 w% w1 R8 _+ ?. O3 A% t& d% s
CamPro: Camera-based Anti-Facial Recognition
- \# ]+ b5 ^# y, iWenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)+ k# ~  g# x5 J) [

* Q2 h$ W' ]+ _5 r8 V) ~1 y【26】中国科学技术大学
  y* K3 e' }* y' ]8 QDetecting Voice Cloning Attacks via Timbre Watermarking5 c$ M$ {9 i4 }1 D1 m2 l
Chang Liu (University of Science and Technology of China); Jie Zhang, Tianwei Zhang (Nanyang Technological University); Xi Yang, Weiming Zhang, NengHai Yu (University of Science and Technology of China)
; o7 L6 t' ~& b1 n9 P- g# N) L% m1 y7 F) P# B  a) k$ J* @  C4 u
【27】清华大学
; a0 R' C$ R$ H3 MUnderstanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed
; N; {6 F: {4 ^/ B6 `4 ]5 }) ]Lancheng Qin (Tsinghua University, BNRist); Li Chen (Zhongguancun Laboratory); Dan Li (Tsinghua University, Zhongguancun Laboratory); Honglin Ye, Yutian Wang (Tsinghua University)( O) o$ ^% d+ S4 V; s  U

# p) R) s. L: i1 p4 ~【28】清华大学# r& R4 z. p" S1 d# T9 i
dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository
* l: x3 ?: B) r  j' ]. {7 tYingying Su, Dan Li (Tsinghua University); Li Chen (Zhongguancun Laboratory); Qi Li (Tsinghua university); Sitong Ling (Tsinghua University)
3 {7 ]$ S( @( q0 N/ B7 B0 Y$ L; ?) ?" M) i- ~- |3 j3 M
【29】清华大学, |: k4 I" Y, ]0 T1 L3 _. P
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption
4 j6 w; G+ C. T, S7 ?0 rXuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu (Tsinghua University)
6 m: W+ t' z5 L9 n+ Y; V; q; ~  _( o/ o, g4 r
【30】NUDT# @; b! c$ w4 b: C% Q
DeepGo: Predictive Directed Greybox Fuzzing
5 r% R; A8 u  O% L4 H" yPeihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang (National University of Defense Technology)
5 o/ B9 G, ?& m
( @2 u# F3 @$ v8 ?& r% n7 d9 Y% `9 j- K2 Q【31】上海交大
$ m$ A" Z1 Z6 {3 }0 ]ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token9 i# L1 \* a" A' f: K6 \% t6 k  w7 [( L
Ge Ren, Gaolei Li, Shenghong Li, Libo Chen (Shanghai Jiao Tong University); Kui Ren (Zhejiang University)1 F' M% b& M; R# m- O4 X
$ c* d7 i, C9 M9 B" H
【32】华中科技大学
) T( O* M" {9 V1 ?' s2 ?PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
& A8 l9 S1 \9 Z4 g) Q0 pMan Zhou, Shuao Su (Huazhong University of Science and Technology); Qian Wang (Wuhan University); Qi Li (Tsinghua University); Yuting Zhou, Xiaojing Ma (Huazhong University of Science and Technology); Zhengxiong Li (University of Colorado Denver)
' G- v4 \0 U/ G, |& J2 P7 i) X+ T
* o: M5 \' l3 p+ t4 q5 i【33】南方科技大学1 z3 i% W; c: Y+ }  u4 p% ]
Separation is Good: A Faster Order-Fairness Byzantine Consensus% T: u" x1 Z2 m  K" l% p5 t0 v* J  _
Ke Mu (Southern University of Science and Technology, China); Bo Yin (Changsha University of Science and Technology, China); Alia Asheralieva (Loughborough University, UK); Xuetao Wei (Southern University of Science and Technology, China & Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation, SUSTech, China)
# \! U1 X( J7 X% s
: \0 [' `3 f6 F6 k* z6 a【34】南方科技大学- y: `$ C& E1 H8 D3 h
CAGE: Complementing Arm CCA with GPU Extensions$ T& t+ q, [% |6 C  B
Chenxu Wang (Southern University of Science and Technology (SUSTech) and The Hong Kong Polytechnic University); Fengwei Zhang, Yunjie Deng (Southern University of Science and Technology (SUSTech)); Kevin Leach (Vanderbilt University); Jiannong Cao (The Hong Kong Polytechnic University); Zhenyu Ning (Hunan University); Shoumeng Yan, Zhengyu He (Ant Group)9 j6 `- S- F& b6 m$ @4 `
8 Y# h. B- k& t* t  b/ O
【35】华中科技大学: V# M0 p+ i/ x5 S  M) k
DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses
6 h- p: K! Z$ L, h) ^" v5 V6 lChaoxiang He, Xiaojing Ma (Huazhong University of Science and Technology); Bin Benjamin Zhu (Microsoft Research Asia); Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin (Huazhong University of Science and Technology); Dongmei Zhang (Microsoft Research)
1 f6 C" \, w  p6 t0 ~# Q. k9 o0 r3 e% d
【36】华中科技大学
  g$ q  Y0 K( _  {Abusing the Ethereum Smart Contract Verification Services for Fun and Profit# ^+ u. Y+ A1 q5 z
Pengxiang Ma (Huazhong University of Science and Technology); Ningyu He (Peking University); Yuhua Huang, Haoyu Wang (Huazhong University of Science and Technology); Xiapu Luo (The Hong Kong Polytechnic University)$ z0 C9 a5 }% ]+ X+ k6 W' B6 p5 @

, z  R5 k' q$ |* R. v* v9 \【37】浙江大学( n) ]" ~3 e" J9 t/ C/ s& Q! t% X
UniID: Spoofing Face Authentication System by Universal Identity
. J4 z& ]/ Z% `Zhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji (Zhejiang University); Wenyuan Xu (Zhejing University)
! K  w5 {" a8 k. a
* r7 i% J& b, }9 B, ]【38】武汉大学
. C0 M/ h( d) V% l" rFrom Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices
! E& }- R1 f9 q9 n7 {" j5 q1 x* ?Yue Xiao (Wuhan University); Yi He (Tsinghua University); Xiaoli Zhang (Zhejiang University of Technology); Qian Wang (Wuhan University); Renjie Xie (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Qi Li (Tsinghua University)# Z* F) a: F0 `

' a: j. u, i2 p* R' ]【39】上海科技大学1 s" c0 [1 G  r  f" g
SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems9 S! s1 B& x: r% r6 P
Guangke Chen (ShanghaiTech University); Yedi Zhang (National University of Singapore); Fu Song (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences)& h0 L- G! h  j! V4 N% W/ V: O6 R

& g7 F' Q0 n  `1 n  g【40】清华大学
$ {0 n7 `' O9 m8 x' r/ jYou Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks
; D" z% K& e7 a5 d' L5 oQiushi Li (Tsinghua University); Yan Zhang (China Agricultural University); Ju Ren, Qi Li, Yaoxue Zhang (Tsinghua University)7 k; E5 T, J6 P5 b# \

老战友

Rank: 5Rank: 5

1464

积分

0

贡献

500

奖励
发表于 2024-2-3 10:15:02 | 显示全部楼层
Wenyuan Xu (Zhejiang University)1 C: D4 O1 @7 m$ k' V1 u
徐文元好几篇; r8 e6 m" d4 o& F% w& R

高级战友

Rank: 4

441

积分

0

贡献

0

奖励
发表于 2024-2-3 11:53:22 来自手机 | 显示全部楼层
有2023年的数据吗

分区版主

Rank: 8Rank: 8

3429

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 12:26:14 | 显示全部楼层
0000 发表于 2024-2-3 11:53
$ ^% P& P0 {4 o" u- I! h有2023年的数据吗

/ C/ i' y$ C- A3 rhttps://bbs.netbig.top/thread-26427-1-1.html

普通会员

Rank: 2

125

积分

0

贡献

0

奖励
发表于 2024-2-3 12:49:02 来自手机 | 显示全部楼层
徐文渊老师太强了…

分区版主

Rank: 8Rank: 8

3429

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 12:50:55 | 显示全部楼层
yxy 发表于 2024-2-3 12:49
3 ?. a$ j, d  ?* ]6 \徐文渊老师太强了…
; R9 P6 g' l2 N3 I' l
国内现在这几个顶会发文量虽然多了,但头部高校断层明显,基本都是浙大清华屠榜。$ ^6 w* u7 R2 o7 d( ?; V0 B$ {
其他高校偶尔有个一篇两篇的。6 L8 v) n: y- h. O! C

& u/ h& w* s3 l! p7 A, ], S徐文渊老师不仅输出稳定,而且还有best paper

分区版主

Rank: 8Rank: 8

3429

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 14:55:15 | 显示全部楼层
本帖最后由 SmithArno 于 2024-3-8 16:25 编辑 4 M+ D( i. v5 w6 S$ R, O  H  u

3 e0 f7 j3 t) b! e6 F; U6 WIEEE S&P 2024
4 @# \0 Z* f2 |- F% r
( @1 x8 N8 M5 B8 Z0 k1 w) j1 ?【1】华中科技大学% F2 J6 ^% I+ V2 h
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabilitypp. 10-10
: p1 _  ?) N2 Yby Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin- t1 k; V2 l) i* F" O8 S# d/ _

1 s6 O% {* x7 L7 d% M- g/ j【2】华中科技大学8 y- ~' T& ?. h+ [1 a
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementationspp. 13-13
/ g. I/ L: O: s* yby Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing! I. u" r6 ^2 v) F; D( i2 r
. w3 S6 r! D) |! {
【3】复旦大学& l. \! I9 C' r' l
Withdrawing is believing? Detecting Inconsistencies Between Withdrawal Choices and Third-party Data Collections in Mobile Appspp. 14-14
% T8 H/ X( O( L% ]9 |. {' Tby Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang  l8 G  S/ z! f  ^# |5 O% s+ l

( u' Q& `% z2 R$ ?2 C【4】浙江大学8 R  J: h  O! N. W1 O
PIRANA: Faster Multi-query PIR via Constant-weight Codespp. 39-39  H3 s0 t- H' i. n8 s% ~
by Jian Liu, Jingyu Li, Di Wu, Kui Ren
: D8 O# Z9 G, p  s9 U9 M1 _/ B, s8 P1 A* y4 T
【5】东南大学
+ o2 X* A( Z; s, Y2 W$ \Predecessor-aware Directed Greybox Fuzzingpp. 40-400 E. I% k* b$ y; f
by Yujian Zhang, Yaokun Liu, Jinyu Xu, Yanhao Wang
; @3 d2 I# _. ?9 s+ m# j
9 I4 ]$ |- h6 Y; L【6】中南大学& q. W4 s) h! \
Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Informationpp. 42-42* ^/ c: g; X: [5 e8 d
by Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, Zhuo Lu' M" C; Y$ V- c- K" Z4 [

# h! ?) K8 g( s8 H$ G# z【7】清华大学
. q' i' h5 V$ v" b' Y, ^4 u6 HTuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packetspp. 46-46
3 O4 }& [# H6 f2 uby Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li# ?, |" B% x/ L( x- ^
. G  y1 C2 ^. o1 I- B3 d
【8】清华大学
2 |- y) k) r+ N! BSATURN: Host-Gadget Synergistic USB Driver Fuzzingpp. 51-51
) U4 u8 L/ \' w# Z1 M3 T+ aby Yiru Xu, Hao Sun, Jianzhong Liu, Yuheng Shen, Yu Jiang
, s4 H/ b; D& f0 E  b; W% ]2 W5 O- E% s5 b- q$ T. u4 y
【9】北京大学
; l* I9 x9 o  D: R6 v9 xNo Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device MLpp. 52-52
0 }6 f. r5 D) J' u$ iby Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Ding Li, Yao Guo, Xiangqun Chen
  O/ v6 X& a5 E2 `) ~8 v/ G. G$ u2 V$ F/ i
【10】浙江大学/ i2 ]' Y# J* H
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attackspp. 53-53
+ }% `2 r! C+ {$ [by Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren
& z3 I  o, v) x" L5 l. E1 r; ^3 {: ~4 W6 f) F# ]( I" ~
【11】浙江大学
7 b4 i/ D/ y5 }; k$ a  O$ VALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Featurespp. 56-56
6 j: O. v4 v% A1 C. K0 J6 cby Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren% j4 N& T/ E' p6 s

/ m# d& x# O/ [0 n【12】南开大学7 Y0 C/ ~  Q1 p: N0 l9 w2 P& R( P
Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Lengthpp. 67-67
7 n2 P2 ~. N3 Y/ ?8 R2 Bby Jianning Zhang, Ming Su, Xiaoguang Liu, Gang Wang
, n3 [0 f6 }& E. J1 S* ^7 a* X- |# T( ^6 ~# \1 Z( W
【13】浙江大学3 U" c) {* |+ c* z) c6 `: D
BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wildpp. 68-68; T& q( ?( \4 ~" G# t
by Jie Wan, Jianhao Fu, Lijin Wang, Ziqi Yang" v0 o  c+ e) i; }

9 ~9 Y8 Q& K, m# Y【14】浙江大学, C! M$ i; i: I( m
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devicespp. 70-708 ~' I9 p8 E* k7 ]
by Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah  w4 B1 v1 S+ ]6 I2 J
/ I+ q3 k: J5 E9 S1 a# ]8 a
【15】清华大学
" D. Z3 O3 l, C) I" N- nTest-Time Poisoning Attacks Against Test-Time Adaptation Modelspp. 72-72
, T% \; s& H# mby Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang& y3 Y. e2 z7 u) j) a3 {

! [% I2 ^  Y& r( V- g【16】上海交大
0 b& u0 K, s/ W, _+ kSrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformationspp. 97-97
. @% W( r/ u9 A3 tby Borui Yang, Wei Li, Liyao Xiang, Bo Li' S- j5 h- r% h3 M$ @
  [7 l0 f# c( Q( M. q* R  I
【17】重庆大学
3 c1 U8 ^+ t  x6 @4 zFrom Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuningpp. 101-101
" d& W4 ?. y7 {. c6 u0 e1 |& R" e' Yby Qiao Zhang, Tao Xiang, Chunsheng Xin, Hongyi Wu  b2 `* L% o; G0 E$ B
2 {* |8 M5 E9 ^- K$ L: u; G
【18】东南大学: A8 r* A# o/ O' I, g% q
Transferable Multimodal Attack on Vision-Language Pre-training Modelspp. 102-102
9 I. n9 m( {. M; ]2 K7 t. jby Haodi Wang, Kai Dong, Zhilei Zhu, Haotong Qin, Aishan Liu, Xiaolin Fang, Jiakai Wang, Xianglong Liu
, u) [: w' I6 J; T$ S- X
9 _- J5 N3 |2 q' R, i【19】清华大学- ?. Y. f9 F4 L) L5 ?
BULKOR: Enabling Bulk Loading for Path ORAMpp. 103-103
8 e; y4 s. e' M( n( H3 a/ L' O- xby Xiang Li, Yunqian Luo, Mingyu Gao9 F/ V9 y: A5 u. x2 t
8 i3 G( Q9 q+ a7 a) U! L
【20】清华大学$ s  O+ ]8 [+ T9 C; Y3 q
Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delaypp. 109-109- t5 e) V$ M9 V. }# w
by Yuanliang Chen6 Q4 K8 G+ Z7 B3 u0 I( _: y# u& I3 m

! e. d% E2 l: _' |8 B6 ~- {, d【21】浙江大学
, l. t7 L; [0 VUnderstanding and Benchmarking the Commonality of Adversarial Examplespp. 111-1117 g* z  X# H4 L- f4 S' K
by Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu
' x$ l) f1 T& z# t4 d& f" \. ^' s2 [4 b5 P1 h- ~
【22】电子科技大学
7 U6 R: u% S- X! Z  {, W* Y# I( rNURGLE: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulationpp. 125-125, P" Y! \5 U: v2 y
by Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu8 w7 }1 \3 `; W' }6 v. u

7 Q7 m, k1 R; l! P! N# N1 T* [0 H【23】清华大学
% x/ U# U9 S! v: |" h, Z* CLABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devicespp. 127-127
9 z5 Q2 B- w! O3 ~' D# s4 X- Y( Dby Hangtian Liu, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Xiangzhi Wang, Guangming Gao0 n4 _4 z, `# S, S, r' s# Z
" Y4 T3 ^' e; d6 y
【24】清华大学5 B7 J2 E7 J- T
Break the Wall from bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewallspp. 129-129$ f6 J  P! C2 [; D
by Qi Wang, Jianjun Chen, Zheyu Jiang, Run Guo, Ximeng Liu, Chao Zhang, Haixin Duan% n, _2 w9 T% `" i5 l

5 e/ k: ^9 C8 ~3 l. z【25】清华大学7 |8 i1 S% S6 x& G. K% q6 h9 J
GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocolspp. 131-131
/ U8 t3 }  f& }) ^! W3 }1 xby Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song! \8 K0 f/ P! u

% l  d; g0 q; A9 l, G5 D/ M【26】清华大学9 y9 C- h, G5 p3 z: x! W' x+ [
More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Servicespp. 138-138, l# C* Z: Q) W# \7 {2 a
by Yacong Gu, Lingyun Ying, Huajun Chai, Yingyuan Pu, Haixin Duan, Xing Gao
; m5 \4 A$ p  j" q& e- V) n3 B  |& }0 i5 Y* A
【27】西电7 {5 I" n; f5 d- ?. d7 g2 l
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledgepp. 148-148. b+ u- N7 _5 E3 M& ?% i
by Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino+ q6 o7 C9 O7 ]. _) X" P9 u

: C$ B6 w9 G( X7 k【28】清华大学( E" E0 q: ~$ \, v
The Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellationspp. 149-1496 {8 ~. Q. G, S2 G+ q- q( W/ s, y5 H
by Wei Li, Yuanjie Li, Hewu Li, Yimei Chen, Yufeng Wang, Jingyi Lan, Jianping Wu, Qian Wu, Jun Liu, Zeqi Lai
( {4 y' Y$ Z' y6 F5 o
6 _& f: U4 V$ u' S3 {【29】复旦大学; c" g6 _" {& D, `! I) W, L
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Constructionpp. 150-150# E( |2 L0 h2 h7 g6 C
by Bofei Chen
, w5 A5 J* {$ d$ |3 w
" ~' H6 m- @) O3 Z【30】山东大学  y- X( |' ~0 _, V
AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detectionpp. 155-155* z3 I7 s* c: q! s5 c
by Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao" S: H: ?! {2 S' H: V

! s$ g8 p3 A6 T9 |: d, ]+ F【31】北京大学
+ u  D# g2 o7 f0 ?( GRethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelitypp. 160-1604 T9 K8 ?& X1 |& ?5 d) f
by Xinming Wei, Jiaxi Zhang, Guojie Luo
- ^& T: k7 k6 J- y/ ~1 I% N9 z2 x* e( g

高级战友

Rank: 4

555

积分

0

贡献

0

奖励
发表于 2024-2-3 16:05:18 来自手机 | 显示全部楼层
清浙遥遥领先

新手上路

Rank: 1

11

积分

0

贡献

0

奖励
发表于 2024-2-3 16:22:26 | 显示全部楼层
浙大威武

中级站友

Rank: 3Rank: 3

175

积分

0

贡献

0

奖励
发表于 2024-2-4 23:36:20 来自手机 | 显示全部楼层
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records in Collision Attacks on SHA-2. Accepted by EUROCRYPT 2024, Zurich, Switzerland, May 26-30, 2024.   

分区版主

Rank: 8Rank: 8

3429

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-4 23:43:26 来自手机 | 显示全部楼层
不知而已 发表于 2024-2-4 23:36
) P$ Q4 ?& u9 A  A华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...

( x$ M% W. c. l- v哈这位是我学姐,王院士的学生。% @- R+ e+ j  ]. i9 }
23年她在欧密会就有文章,在SHA-2方面做得很好。

老战友

Rank: 5Rank: 5

1874

积分

1

贡献

800

奖励
发表于 2024-2-19 16:46:34 | 显示全部楼层
usenix security 2024 accepted papers
, R& y* p* p+ g1 I' ?" `( Thttps://www.usenix.org/conferenc ... mer-accepted-papers

老战友

Rank: 5Rank: 5

1874

积分

1

贡献

800

奖励
发表于 2024-2-19 16:57:35 | 显示全部楼层
本帖最后由 大师大楼 于 2024-2-19 16:59 编辑 / `& J$ `: J( r/ D8 j

4 U) {8 D9 ~& @2 {0 A3 H! S; Kusenix security 20242 N# }% R( ~9 A8 l' V, C* w8 u( R; r
浙大 东南24 ?5 s3 `7 D0 u8 L9 t
武大北邮等 1
3 Q9 R% T& R6 J5 X, i包括清华上交在内,大部分都是空白?

分区版主

Rank: 8Rank: 8

3429

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-19 16:58:58 | 显示全部楼层
大师大楼 发表于 2024-2-19 16:57# `  e% R& U% Q4 x* S! u/ W
usenix security 2024
- t0 n* W( e; q* G' _* ?浙大 2
$ l9 O0 R) V: U9 i) n武大北邮等 1
; N3 [& a3 h0 d% O
还有一轮应该没出来

老战友

Rank: 5Rank: 5

1874

积分

1

贡献

800

奖励
发表于 2024-2-19 17:08:00 | 显示全部楼层
SmithArno 发表于 2024-2-19 16:588 p$ J/ S5 m' n5 J4 Q
还有一轮应该没出来

. Y) m& J0 E) X嗯,耐心等待

老战友

Rank: 5Rank: 5

1193

积分

0

贡献

0

奖励
发表于 2024-2-19 19:29:03 来自手机 | 显示全部楼层
清华浙大太牛了!

初出江湖

Rank: 2

102

积分

0

贡献

0

奖励
发表于 2024-2-19 23:24:43 | 显示全部楼层
南京大学三项0蛋啊。1篇都没有啊

未关注公众号会员1

104

积分

0

贡献

0

奖励
发表于 2024-2-20 10:41:54 | 显示全部楼层
三大密码顶会算信息安全的成果吗

分区版主

Rank: 8Rank: 8

3429

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-20 10:48:29 来自手机 | 显示全部楼层
ecnuking 发表于 2024-2-20 10:41
1 @, X+ B8 @  n' o2 T, J三大密码顶会算信息安全的成果吗

: G5 o3 T' Q8 h2 ^* _密码方向主要统计三大顶会和密码学顶级期刊JoC。
! L9 ~+ t$ G" L/ a9 }& r, C! j目前有零星的信息,IACR还没出Accepted papers。

白银长老

Rank: 8Rank: 8

3325

积分

1

贡献

2000

奖励
发表于 2024-2-21 12:23:18 | 显示全部楼层
浙大徐文渊:连续三年担任网安四大顶会的大会联合主席
9 V9 P+ S, X: n0 @/ _9 o3 F  EUSENIX Security 2024
+ k) f& ?( j6 ~/ }( n7 iNDSS 2023
' g8 c' Q& o& N1 B! lNDSS 2022

白银长老

Rank: 8Rank: 8

3325

积分

1

贡献

2000

奖励
发表于 2024-2-21 12:24:27 | 显示全部楼层
近日,浙江大学共有12位教师担任国际信息安全顶级会议ACM CCS 2024的程序委员会委员,入选总人数排名全球高校第一。其中巴钟杰、申文博、冯博、刘金飞、罗梦、周亚金、娄坚、姚培森、秦湛(按姓氏笔画排序)9位教师来自浙江大学区块链与数据安全全国重点实验室。

白金长老

Rank: 10Rank: 10Rank: 10

5587

积分

0

贡献

0

奖励
发表于 2024-2-21 14:20:26 | 显示全部楼层
乡下 发表于 2024-2-19 23:29, \' F" n) I0 O  L! Z
郑州信大,网安国家队核心队员之一,0蛋?
, G3 Z0 N3 ~7 ~1 p' C/ d
能发吗??

中级站友

Rank: 3Rank: 3

192

积分

0

贡献

100

奖励
发表于 2024-2-23 11:18:14 | 显示全部楼层
没有军信,都是假榜  l, }# ^4 H3 P/ F  {- K! d
看看邬院士的程控交换机,才有后来的巨大中华: G& C& R* {0 _& x+ ~: @; ~
信息安全,缺了军信,可信度太低

老战友

Rank: 5Rank: 5

1874

积分

1

贡献

800

奖励
发表于 2024-2-23 11:49:38 | 显示全部楼层
本帖最后由 大师大楼 于 2024-2-23 11:51 编辑 # i/ \, i* L7 L" f; J! ?; r$ {
# s- M7 D: b* S% b' ~/ F9 n
如果军方还是继续画地为牢,固步自封,不借助世界一流高校和院所的力量,那么俄罗斯就是前车之鉴。

老战友

Rank: 5Rank: 5

1874

积分

1

贡献

800

奖励
发表于 2024-2-23 11:51:14 | 显示全部楼层
academic818 发表于 2024-2-21 12:23
, y$ N( O( Q0 [4 X8 g浙大徐文渊:连续三年担任网安四大顶会的大会联合主席
6 P  j! _9 I( MUSENIX Security 2024
! k! P) }  r! J; ^# nNDSS 2023
, {- Y0 E# v) v/ b( X
水平是特别高啦,但在中国现行体制下,还有待被发掘

老战友

Rank: 5Rank: 5

1296

积分

1

贡献

800

奖励
发表于 2024-2-23 12:09:24 | 显示全部楼层
大师大楼 发表于 2024-2-23 11:518 @; r+ k9 ^" q2 x+ p7 L- K- A$ F
水平是特别高啦,但在中国现行体制下,还有待被发掘

' b1 ?  ~# W4 g& J& V% R" h她好像比较低调的,待在电气学院内,好像还拒绝提拔副院长

禁止发言

118

积分

0

贡献

0

奖励
发表于 2024-2-23 12:09:52 | 显示全部楼层
academic818 发表于 2024-2-21 12:23% U0 P% t, ?' h) ?% c
浙大徐文渊:连续三年担任网安四大顶会的大会联合主席' G- F+ W$ v, ]# x9 }$ H
USENIX Security 2024  E# V5 P% s+ @8 g5 A) G9 o) A7 [
NDSS 2023
2 r% b( ]4 z% ^) L
这么多卖点,宣传太差,差不多的年龄,颜宁都院士了

高级战友

Rank: 4

471

积分

0

贡献

0

奖励
发表于 2024-2-23 12:26:05 来自手机 | 显示全部楼层
也不是每个人都适合做领导哈哈哈

中级站友

Rank: 3Rank: 3

175

积分

0

贡献

0

奖励
发表于 2024-2-25 19:07:24 来自手机 | 显示全部楼层
不知而已 发表于 2024-2-4 23:36" i/ ~  `' {/ \
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...

  M4 F* C# A* S+ K3 m华师大软院通讯今年还accepted一篇欧密 《Registered Functional Encryptions from Pairings》
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

论坛的微信公众号(二维码如下),关注获取更多科教信息

Archiver|手机版|网大论坛 ( (鄂ICP备2021013060号-2) )

GMT+8, 2025-7-14 13:15 , Processed in 0.138990 second(s), 22 queries , Gzip On.

鄂公网安备 42018502005923号

Powered by Discuz! X3.4

Copyright © 2001-2022, Tencent Cloud.