网大论坛

 找回密码
 立即注册
查看: 28104|回复: 71

2024年信息安全领域顶会统计(Eurocrypt/FSE)

[复制链接]

分区版主

Rank: 8Rank: 8

3413

积分

0

贡献

1600

奖励
发表于 2024-2-3 09:59:37 | 显示全部楼层 |阅读模式
本帖最后由 SmithArno 于 2024-3-8 16:28 编辑 & X; T( ?4 Z' C$ e* x+ J9 s- D1 Q8 q/ e
2 n4 T8 J2 Y2 ^" A
按照第一作者单位统计(信息安全四大顶会+密码三大顶会)8 B2 M! A# J; u  ]/ `* ]
NDSS 2024概览
2 j  [3 g, i9 Z1 m! X, D. C清华大学13篇,浙江大学9篇,华中科技大学3篇,南方科技大学2篇。+ b- W- ]" @# D, Y& U" }
东南大学、中国海洋大学、北京航空航天大学、山东大学、北京大学、中山大学、武汉大学、中科大、NUDT、上海科技大学等等1篇。
- `# E! c, m0 J4 X5 s: A# @+ _. b; [# [- C% n+ }5 J" `+ c6 ^+ w
CCS 2024
) x& N' G' \7 B$ f# {' I9 h+ ^
1 B* |! A1 C* F$ a- _IEEE S&P 2024概览1 `0 @4 F- S% _; ~5 @+ N
清华大学10篇,浙江大学6篇,华中科技大学、复旦大学、东南大学2篇。其他重庆大学、山东大学、南开大学、西电、成电等等1篇。
; H3 s% \/ ]- V4 C) f; M  B4 ~5 r$ s. _6 x; r5 t- Y% s
Security 2024* g4 ^2 z4 C9 `, n* x
* X( D+ G5 c: E  A# H
Eurocrypt 20249 a# ~5 T( G9 A& s: {1 E; X2 e1 o
华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。
0 f, Z9 ~! p# E4 N5 C
9 A, E. d6 S- Q# Z4 s& R0 C: A8 B( |4 x) e* ], J# |

7 H; `) P' @  c) |- B% E3 A' ?7 V获奖情况:- F6 L' k# a+ R  p: ?
【1】浙江大学获得NDSS 2024杰出论文奖。
# T1 D- ~- u# C& d5 e
+ e" N3 T  ]8 j7 ~) A+ |- W& J  \  l  t  n, \; H1 t) W* d
7 O, \/ A+ ?! E

3 j( ]! B, C# y, b8 B3 h3 d
' ]3 N( ]# f% R9 D" j
: H3 z9 H5 K& E7 l+ e; _+ P* z

分区版主

Rank: 8Rank: 8

3413

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-3-4 09:47:58 | 显示全部楼层
Eurocrypt 2024,共接收105篇论文,国内共8篇,华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。
, P8 L: E) R- a" S1 x- }/ U. \% Y( J. Z8 t/ {* {
【1】山东大学! r5 D' X" K. k8 ?
Massive Superpoly Recovery with a Meet-in-the-middle Framework -- Improved Cube Attacks on Trivium and Kreyvium: n9 N" R$ u: i+ L. y0 s
Jiahui He, Kai Hu, Meiqin Wang, Hao Lei* o0 Z4 }( C' ?( K1 c
Shandong University, Nanyang Technological University5 v6 Y5 w) S5 y, K  t* \- d3 w

& d9 N/ m2 K' \, k9 D【2】清华大学
  m8 F9 G) n0 j) P. M3 PAccelerating BGV Bootstrapping for Large $p$ Using Null Polynomials Over $\mathbb{Z}_{p^e}$1 Z: C0 i7 y  E: Q$ H1 T! Z& ]) o$ ^
Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang8 [( t$ N' v1 ?' V
Tsinghua University5 }' ^8 c/ F* P( j4 V' J7 z$ O2 J) ]

- h, l. b5 l; ~- i2 z【3】华东师大
# p1 F' `" g# y% WRegistered Functional Encryptions from Pairings
, d" d/ s; D& `. K% s; t/ I4 v- qZiqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian
1 k( t1 u7 O7 q5 y2 o" WEast China Normal University, Shanghai University, Shanghai University of Electric Power0 S0 s% g' }: e

) I7 `0 c  ~$ O8 Z- v! S/ q& \' m. d【4】南科大
3 q/ Y2 Y/ k* iIntegrating Causality in Messaging Channels
0 T9 v( j7 X+ I, ?: dShan Chen, Marc Fischlin
  x3 ]3 r) }" s5 @" j: xSouthern University of Science and Technology, TU Darmstadt* w' X7 Z* x" M* m0 g$ G: F
) E0 G( B% T" N) r- g) a
【5】暨南大学
% J. v2 f/ S. q2 M! n9 W1 ~7 j; JProbabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond5 R! b$ {8 t6 @5 K, N
Ling Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng7 D9 r6 E0 Q' D
College of Cyber Security, Jinan University, Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering
" N* H0 z5 w! D7 ^! K6 Y* g
5 d# O, I1 }/ k$ }0 J) G【6】上海交大
0 D" D( e; r5 I8 V$ f7 p2 r$ fThe Hardness of LPN over Any Integer Ring and Field for PCG Applications
% v1 N- i0 B4 b7 A& lHanlin Liu, Xiao Wang, Kang Yang, Yu Yu% n. B! }" l" O8 r2 j2 |& s
Shanghai Jiao Tong University, Shanghai Qi Zhi Institute, Northwestern University, State Key Laboratory of Cryptology8 g( I3 d* d3 M0 Z

* K) A' m; }3 M3 a4 K【7】上海交大
' H' ?9 d& ~1 k/ aUniversal Composable Password Authenticated Key Exchange for the Post-Quantum World1 K$ _/ M2 q# H& V$ h5 b  \
You Lyu, Shengli Liu, Shuai Han
2 @# N  {* R3 h9 k7 VShanghai Jiao Tong University3 G! y; }- g1 s
6 a( |" U5 z6 s3 s+ u8 u
【8】华东师大  k3 _; J$ v* L5 E: q  Z! r% H  D! c
New Records in Collision Attacks on SHA-20 W# g+ I: `  I3 ^% j
Yingxin Li, Fukang Liu, Gaoli Wang
1 b& W7 L6 p# h, E0 r4 REast China Normal University, Tokyo Institute of Technology3 {0 N/ P( ]' r

, [. A# ~' ~! J9 O4 R7 q' C* n

分区版主

Rank: 8Rank: 8

3413

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 09:59:41 | 显示全部楼层
本帖最后由 SmithArno 于 2024-2-3 10:06 编辑 ' O- O0 V+ x: B. i) D6 v" l1 z
$ ]/ a0 k9 k4 _5 f% e5 P
NDSS 2024会议主页:https://www.ndss-symposium.org/ndss2024/accepted-papers/  c9 }9 l7 ]  y# S5 p, Z" V

% K/ b' c' k4 m' F. [8 w【1】山东大学+ @3 S7 C8 U  K
Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols
9 v$ }" e* r: S, X5 X/ sShichen Wu (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Puwen Wei (1. School of Cyber Science and Technology, Shandong University 2. Quancheng Laboratory 3. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Ren Zhang (Cryptape Co. Ltd. and Nervos); Bowen Jiang (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education)7 O2 q3 n: `7 u0 c4 X* x0 Y  ^8 O3 O

$ R7 U' @* o* |7 i' D+ l' l【2】东南大学! Y% b# r7 f  O. H- f
LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems5 U: T  I' c2 y1 ~8 m: e
Huaiyu Yan, Zhen Ling, Haobo Li (Southeast University); Lan Luo (Anhui University of Technology); Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang (Southeast University); Junzhou Luo (Southeast University, Nanjing, P.R. China); Xinwen Fu (University of Massachusetts Lowell)
) }, d  E  N3 n9 w8 e2 r. V8 w; H# ^
; i2 M" k1 W( G" w【3】浙江大学
3 {- f  {) z4 U! T5 D; k/ t( A. _GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards  g; j( u6 o' }- i6 x$ e
Qinhong Jiang, Yanze Ren (Zhejiang University); Yan Long (University of Michigan); Chen Yan (Zhejiang University); Yumai Sun (University of Michigan); Xiaoyu Ji (Zhejiang University); Kevin Fu (Northeastern University); Wenyuan Xu (Zhejiang University)
1 o* `4 u' V5 E$ ~
+ Z7 m4 b9 g6 i【4】浙江大学0 |+ e% j* w5 U" M
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time* ]: m: B! a( Z( g9 M, L" |& e+ Q; Q
Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)
- T  ^! j& g" l, q0 S
9 ]( f7 o# j3 [6 s" _【5】北京航空航天大学5 G4 T, `" I. M, y/ B7 n& p* q
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation
* l+ A! Z8 |; k2 S9 w* XSong Bian, Zian Zhao, Zhou Zhang, Ran Mao (Beihang University); Kohei Suenaga (Kyoto University); Yier Jin (University of Science and Technology of China); Zhenyu Guan, Jianwei Liu (Beihang University)
6 f2 [3 Y5 E6 R0 ?: k. Y. R+ u# G
' F! c/ E& M8 z% E【6】清华大学$ S+ x  }* H) w- Z; m
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic
& [- `) H3 g  L0 zYuqi Qing (Tsinghua University); Qilei Yin (Zhongguancun Laboratory); Xinhao Deng, Yihao Chen, Zhuotao Liu (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Jia Zhang, Qi Li (Tsinghua University)' t3 s/ h! y) x+ U6 X
% C. r4 M7 D4 _5 [9 U. X  T) p
【7】浙江大学( \3 f8 I( g8 o  p: ^1 u- u- t9 G
Symphony: Path Validation at Scale
7 |6 R, C, H( ^$ vAnxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren (Zhejiang University)1 Y& q& T5 Y6 v" P4 ]
) g- Y/ y- I* G
【8】清华大学
8 b0 e$ D7 @% Y$ g$ }) u; DBreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet
6 q# T* I6 i8 f) Y. f% MChuhan Wang, Yasuhiro Kuranaga, Yihang Wang (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Linkai Zheng, Xiang Li (Tsinghua University); Jianjun Chen (Tsinghua University; Zhongguancun Laboratory); Haixin Duan (Tsinghua University; Quan Cheng Lab; Zhongguancun Laboratory); Yanzhong Lin, Qingfeng Pan (Coremail Technology Co. Ltd)
* o$ s: o! d9 \. r) e" x! Q. B
4 O6 c1 \, b+ V- W  S/ S$ U4 B+ _【9】浙江大学
# u2 U' p3 _; _- L/ CMOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency. W* F9 }; w& m. V! V
Jiacheng Xu, Xuhong Zhang, Shouling Ji (Zhejiang University); Yuan Tian (UCLA); Binbin Zhao (Georgia Institute of Technology); Qinying Wang, Peng Cheng, Jiming Chen (Zhejiang University)- H5 M/ n* J9 b6 p3 o3 B

: Z! O# r2 e- r, c. I, G【10】清华大学4 d$ c  @+ r2 [; S% c) @6 c7 e
ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection
8 x- {# @4 Z2 B9 |Kunpeng Zhang (Shenzhen International Graduate School, Tsinghua University); Xiaogang Zhu (Swinburne University of Technology); Xi Xiao (Shenzhen International Graduate School, Tsinghua University); Minhui Xue (CSIRO’s Data61); Chao Zhang (Tsinghua University); Sheng Wen (Swinburne University of Technology)- O! p& D2 y$ M8 U
! _' Z0 v( W- b: z: X1 c
【11】中国海洋大学5 u* c5 ?  k  u! F. v
Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack4 D( N2 Q# r8 m$ ?; z9 X. |/ V% r
Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu (Ocean University of China)+ E5 C! [. O0 {$ ]9 V6 r8 P

( i7 R3 {9 f  T4 ^【12】浙江大学
% L1 |  Q9 {3 o- S6 E3 P3 s; DORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning* {6 f. J7 d/ a; x1 Q4 V* e: E
Linkang Du (Zhejiang University); Min Chen (CISPA Helmholtz Center for Information Security); Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen (Zhejiang University); Zhikun Zhang (Stanford University)
! y. Y5 d; o9 a! l1 J. a# Q* z' Q9 \5 R' c- S& q- M/ w% E$ w
【13】北京大学' @" q& |/ G. d9 |! y
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation! f* W; V) ~% j
Shaofei Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Feng Dong (Huazhong University of Science and Technology); Xusheng Xiao (Arizona State University); Haoyu Wang (Huazhong University of Science and Technology); Fei Shao (Case Western Reserve University); Jiedong Chen (Sangfor Technologies Inc.); Yao Guo, Xiangqun Chen (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Ding Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University)
1 t* ~" N- y4 m! q* O  j: c* N. D4 E0 i
【14】浙江大学; o2 G5 g( \7 E' w) w  k
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors$ w5 s% O& W/ f$ ^8 w0 `4 E- W
Chengkun Wei, Wenlong Meng (Zhejiang University); Zhikun Zhang (Stanford University); Min Chen (CISPA Helmholtz Center for Information Security); Minghu Zhao (Zhejiang University); Wenjing Fang, Lei Wang (Ant Group); Zihui Zhang, Wenzhi Chen (Zhejiang University)
2 V+ C' C4 k+ L3 Q3 B. M5 O$ P0 Y8 \: K
【15】湖南大学( l5 z. V0 O# V  Q0 K& ^9 R, @1 F$ j* f
Eavesdropping on Black-box Mobile Devices via Audio Amplifier’s EMR
: k0 a6 _0 F3 S* R- L" u4 x$ FHuiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Kenli Li (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Zheng Qin (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Mingxing Duan (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Yong Xie (Nanjing University of Posts and Telecommunications, Nanjing, China); Daibo Liu (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Ming Li (The University of Texas at Arlington, USA)- n* `/ Y3 T$ w7 c9 [
% K, y) X7 }# g) m2 f1 X
【16】上海交大
1 \" M; b8 n" FCrafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models8 `* |5 p% r2 s& ]
Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang (Shanghai Jiao Tong University); Chenghu Zhou (Chinese Academy of Sciences); Bo Li (Hong Kong University of Science and Technology)
, _7 m0 x4 |% k. L* E4 U8 w
3 b/ U2 ^: `3 f4 Z【17】清华大学
0 Z9 y! X; _% ]5 p8 V4 gExploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks- d! j( f4 m* u) z+ G# \
Yuxiang Yang, Xuewei Feng, Qi Li (Tsinghua University); Kun Sun (George Mason University); Ziqiang Wang (Southeast University); Ke Xu (Tsinghua University)# y4 o! l+ F! q/ |, d/ Y0 u
$ W4 m% t. n+ {% O# ^
【18】清华大学6 v' g0 ]1 i0 I% T  j
CP-IoT: A Cross-Platform Monitoring System for Smart Home
+ R. [9 J+ R- W/ `! C" UHai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang (Tsinghua University); Linna Fan (National University of Defense Technology); Chenxin Duan (Tsinghua University)4 U, d3 y$ u4 {% ]& b! m7 {- F4 C2 u3 y

" O4 V7 M/ v1 n0 {, |. g【19】清华大学4 g+ f/ b7 C  o+ ]4 x
LoRDMA: A New Low-Rate DoS Attack in RDMA Networks
& y9 f- [6 }* \Shicheng Wang (Tsinghua University); Menghao Zhang (Beihang University & Infrawaves); Yuying Du (Information Engineering University); Ziteng Chen (Southeast University); Zhiliang Wang, Mingwei Xu (Tsinghua University & Zhongguancun Laboratory); Renjie Xie (Tsinghua University); Jiahai Yang (Tsinghua University & Zhongguancun Laboratory)
0 C. B/ r3 z+ \7 D; G/ b- W8 i- f2 @$ v( V
【20】清华大学% U7 y1 ?8 g5 s# V! t9 u& C
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing" ~2 J6 O. `& v3 c/ d
Linkai Zheng, Xiang Li, Chuhan Wang, Run Guo (Tsinghua University); Haixin Duan (Tsinghua University; Quancheng Laboratory); Jianjun Chen, Chao Zhang (Tsinghua University; Zhongguancun Laboratory); Kaiwen Shen (Tsinghua University)
  f, H5 f$ W0 U" Y1 n
8 ~4 s  o  Q5 x【21】清华大学
8 n+ p1 [( x% F; D" E' `1 sAutomatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization/ i9 C1 O) F. R3 s
Quan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang (Tsinghua University)
: a# ~$ T0 j* b( s/ I9 d
; e% _# `0 J3 E! }9 ^* X; @2 @【22】清华大学
* n5 V: B8 {9 N9 CDynPRE: Protocol Reverse Engineering via Dynamic Inference* c5 S2 u) L1 \' K0 {6 R: W
Zhengxiong Luo (Tsinghua University); Kai Liang (Central South University); Yanyang Zhao, Feifan Wu, Junze Yu (Tsinghua University); Heyuan Shi (Central South University); Yu Jiang (Tsinghua University). n5 O0 u  o6 m1 _( N; a2 D

4 w( K* c7 b7 o* |0 t% h$ K【23】浙江大学
& p: r' z- u( s0 t6 ?/ @$ N2 f" GImproving the Robustness of Transformer-based Large Language Models with Dynamic Attention8 l. [9 G4 f, ?1 b0 Q% r& f3 r
Lujia Shen, Yuwen Pu, Shouling Ji (Zhejiang University); Changjiang Li (Penn State); Xuhong Zhang (Zhejiang University); Chunpeng Ge (Shandong University); Ting Wang (Penn State)% W1 m/ G- Z! v. w8 N1 l# }1 s9 i( I
) ]3 E9 y7 R4 F/ }/ L0 K( {, p
【24】中山大学
8 H4 O* ^+ U$ H: B& MLeaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem
+ d/ ]5 _6 r0 @" E" {4 `  ^9 G' BJiangrong Wu, Yuhong Nan (Sun Yat-sen University); Luyi Xing (Indiana University Bloomington); Jiatao Cheng (Sun Yat-sen University); Zimin Lin (Alibaba Group); Zibin Zheng (Sun Yat-sen University); Min Yang (Fudan University)0 X& \$ d# A% m9 R! r: V3 B, S
* {2 @! v1 n: l3 a* b/ n
【25】浙江大学
( N% r2 P* a2 C0 D8 bCamPro: Camera-based Anti-Facial Recognition# v1 @/ v3 f  q: M2 g$ [2 z" ?! q
Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)
" h2 u6 v8 t3 C4 Q
- n# }& I( s) S" G. g3 Q& X【26】中国科学技术大学
  ?  k5 ~0 A( s, dDetecting Voice Cloning Attacks via Timbre Watermarking
- ~# O$ T( _0 H% ?" yChang Liu (University of Science and Technology of China); Jie Zhang, Tianwei Zhang (Nanyang Technological University); Xi Yang, Weiming Zhang, NengHai Yu (University of Science and Technology of China)
0 G5 _: B8 _  C% T8 n6 d$ q& K6 o/ _! T( x
【27】清华大学+ A6 t% f. ]/ a6 V$ h- Y8 M
Understanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed' ^" F; k+ i8 T0 ^
Lancheng Qin (Tsinghua University, BNRist); Li Chen (Zhongguancun Laboratory); Dan Li (Tsinghua University, Zhongguancun Laboratory); Honglin Ye, Yutian Wang (Tsinghua University)% X# u& H8 i$ R, q' E. W

( \1 Q) }# l* u4 a2 e【28】清华大学
0 W7 u* G# S. m  [dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository9 C4 u, p1 l1 L1 e
Yingying Su, Dan Li (Tsinghua University); Li Chen (Zhongguancun Laboratory); Qi Li (Tsinghua university); Sitong Ling (Tsinghua University)0 _3 i) L) v2 T& X
+ }# F# y  F" f2 f. O( Y9 g* B- W
【29】清华大学0 M7 q  w6 b8 ^0 p6 T
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption
) ~5 N& J7 x  o8 pXuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu (Tsinghua University)) t2 k; B/ m7 c5 w& c$ g7 h

8 X( `& h6 f6 f5 z. Q. h9 K【30】NUDT
: @" @$ L  A& u& Z$ Q* E: VDeepGo: Predictive Directed Greybox Fuzzing
; E  w  V, u: V, g6 r$ IPeihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang (National University of Defense Technology)4 g7 F6 h7 k1 e

7 j6 m& D& N5 M! F【31】上海交大+ X7 [- S* k; s6 P0 H# ^4 c
ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token
" h' h' Q* F4 @/ f  d' cGe Ren, Gaolei Li, Shenghong Li, Libo Chen (Shanghai Jiao Tong University); Kui Ren (Zhejiang University)0 k9 A# ^( P  N$ N, h$ u1 F

+ ~4 v/ W# H8 O+ V【32】华中科技大学
  e& k4 d" k" _+ nPrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound  r% K. ^8 R. N1 s$ V
Man Zhou, Shuao Su (Huazhong University of Science and Technology); Qian Wang (Wuhan University); Qi Li (Tsinghua University); Yuting Zhou, Xiaojing Ma (Huazhong University of Science and Technology); Zhengxiong Li (University of Colorado Denver)2 G! U. t+ }0 k8 n

0 s6 X4 N2 S" s【33】南方科技大学# @7 {5 X. n" C# X: j% J
Separation is Good: A Faster Order-Fairness Byzantine Consensus
9 [8 q( Y5 r0 n4 k' `* ~Ke Mu (Southern University of Science and Technology, China); Bo Yin (Changsha University of Science and Technology, China); Alia Asheralieva (Loughborough University, UK); Xuetao Wei (Southern University of Science and Technology, China & Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation, SUSTech, China)
& h; T  K' y/ o) K/ H6 ~) z3 a( W/ e* W  L) O1 S* Z$ i0 X
【34】南方科技大学
! ], x7 a' V2 L' g: HCAGE: Complementing Arm CCA with GPU Extensions
4 U  Y! H: E+ R# J0 u. qChenxu Wang (Southern University of Science and Technology (SUSTech) and The Hong Kong Polytechnic University); Fengwei Zhang, Yunjie Deng (Southern University of Science and Technology (SUSTech)); Kevin Leach (Vanderbilt University); Jiannong Cao (The Hong Kong Polytechnic University); Zhenyu Ning (Hunan University); Shoumeng Yan, Zhengyu He (Ant Group)
; o+ d* j  L. F0 c6 \3 ]) z* `+ L' \' u
【35】华中科技大学/ B+ e( n- Z) A% `# Y8 Q) _( K
DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses
9 h/ h# f$ A- D# ~Chaoxiang He, Xiaojing Ma (Huazhong University of Science and Technology); Bin Benjamin Zhu (Microsoft Research Asia); Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin (Huazhong University of Science and Technology); Dongmei Zhang (Microsoft Research). e7 N$ ^7 ?* r7 a2 S$ x% w

2 b% u+ l! j7 m【36】华中科技大学: t7 k7 ?" C/ V. }; \7 O, b
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit
$ o' h- }* D- z9 }+ @/ K1 qPengxiang Ma (Huazhong University of Science and Technology); Ningyu He (Peking University); Yuhua Huang, Haoyu Wang (Huazhong University of Science and Technology); Xiapu Luo (The Hong Kong Polytechnic University)3 n0 r' E5 ]) C2 @! m

8 v& E7 `& |6 p4 Q7 N+ S: J5 `: @【37】浙江大学; l% A; x( Y+ ~( v( I
UniID: Spoofing Face Authentication System by Universal Identity3 d* Z: H7 P. K: R* Q: t% u0 B
Zhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji (Zhejiang University); Wenyuan Xu (Zhejing University)" B% ~" B6 I. Q: F! a. V2 J- F

3 L# A! k& e8 ], R& \3 C【38】武汉大学
+ y( D( o+ ^) r6 d8 ]: CFrom Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices9 `5 O  j9 D' J5 L2 j, j( C
Yue Xiao (Wuhan University); Yi He (Tsinghua University); Xiaoli Zhang (Zhejiang University of Technology); Qian Wang (Wuhan University); Renjie Xie (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Qi Li (Tsinghua University)8 l! ?+ z% F0 U( K* P, K
: k  b0 r3 j/ k
【39】上海科技大学
, X  |. p0 `: q( \4 c' t- n3 p3 m2 f: zSLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems
; k9 \) d6 ^  H) f) i& SGuangke Chen (ShanghaiTech University); Yedi Zhang (National University of Singapore); Fu Song (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences); t* @: h# k" I. e. |/ T5 X

0 f! S/ v- q* |0 P% g【40】清华大学
6 U# z9 v! h# GYou Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks* v* F# t$ H- e+ w3 _0 m
Qiushi Li (Tsinghua University); Yan Zhang (China Agricultural University); Ju Ren, Qi Li, Yaoxue Zhang (Tsinghua University)4 ~& F7 s2 I; r

老战友

Rank: 5Rank: 5

1429

积分

0

贡献

500

奖励
发表于 2024-2-3 10:15:02 | 显示全部楼层
Wenyuan Xu (Zhejiang University)
6 K. F: i& \5 x2 L! R! c徐文元好几篇5 H$ O2 Y8 `. c: P1 }

高级战友

Rank: 4

416

积分

0

贡献

0

奖励
发表于 2024-2-3 11:53:22 来自手机 | 显示全部楼层
有2023年的数据吗

分区版主

Rank: 8Rank: 8

3413

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 12:26:14 | 显示全部楼层
0000 发表于 2024-2-3 11:53$ B# U0 n/ J5 C" h+ h( m5 P2 o
有2023年的数据吗
3 O# {5 |$ {/ |1 q
https://bbs.netbig.top/thread-26427-1-1.html

普通会员

Rank: 2

124

积分

0

贡献

0

奖励
发表于 2024-2-3 12:49:02 来自手机 | 显示全部楼层
徐文渊老师太强了…

分区版主

Rank: 8Rank: 8

3413

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 12:50:55 | 显示全部楼层
yxy 发表于 2024-2-3 12:490 n( U8 c9 O; C/ I6 ~
徐文渊老师太强了…
. ?) [/ n. q% Y0 H! X
国内现在这几个顶会发文量虽然多了,但头部高校断层明显,基本都是浙大清华屠榜。3 x6 Z" I& M9 l, V: c$ J
其他高校偶尔有个一篇两篇的。
6 z/ P$ f" R; I' l
$ H' W3 v1 H# @- Y5 J/ x徐文渊老师不仅输出稳定,而且还有best paper

分区版主

Rank: 8Rank: 8

3413

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 14:55:15 | 显示全部楼层
本帖最后由 SmithArno 于 2024-3-8 16:25 编辑 9 l7 R; t6 M0 o; }5 r

  K% V! |. c6 K. i' C/ c7 H( ?IEEE S&P 2024  n( `7 z" a$ `

, v. O8 G  O! u, _. r; M( Q" }0 X【1】华中科技大学
6 U$ h6 w% k; _8 U9 JWhy Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabilitypp. 10-10
! C5 d0 \' P# D/ }8 W$ o- Kby Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin
! Z+ F: X& |% e8 Z8 o9 U% P8 r$ ~3 ~- |  F. o6 s  ]: ]
【2】华中科技大学
  v. }7 C% H% ZMQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementationspp. 13-130 J+ j" F) |( b) q
by Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing4 ]7 _& x! a: I  k
4 [$ L$ O0 q: i. u! I
【3】复旦大学1 L( _( Z) \' Q# Q
Withdrawing is believing? Detecting Inconsistencies Between Withdrawal Choices and Third-party Data Collections in Mobile Appspp. 14-14
2 c. I6 `0 S9 L+ X+ D1 R- C+ B, P, ~2 }by Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang
3 Q  |" O( C* ^
- s. T) H& {6 S. i- A【4】浙江大学
# m2 B7 c/ J. n, u8 G9 P5 iPIRANA: Faster Multi-query PIR via Constant-weight Codespp. 39-391 D- \* A$ f' M$ i5 J# a& h
by Jian Liu, Jingyu Li, Di Wu, Kui Ren" e8 Y/ F* k( L6 ?  o, x! M. L9 U* {

0 B5 W& F! g5 ]# Z【5】东南大学
7 A5 s# O. M" ~4 [9 qPredecessor-aware Directed Greybox Fuzzingpp. 40-40
( C# s6 ?$ K  q8 E5 ?! Nby Yujian Zhang, Yaokun Liu, Jinyu Xu, Yanhao Wang
/ S8 Q! K/ f; L: ?0 D; X- ~8 ?8 J8 \5 _* E: e  e
【6】中南大学( y+ _& E+ O8 a) d" o
Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Informationpp. 42-42" m( X* k4 f" g8 r0 N% I
by Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, Zhuo Lu3 a0 u( i3 c' Y1 ?0 L8 E

) A! B0 A7 ^) `: T* N8 N8 n5 d【7】清华大学
/ F4 @. [* A8 p. @8 ?  J% `  mTuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packetspp. 46-460 J0 Y( S7 V& n+ N8 g! e/ H
by Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li9 @2 ?3 ~2 q! R& Y
/ ?# Y+ w8 x0 N2 r8 e
【8】清华大学
& m7 V2 f, a; |SATURN: Host-Gadget Synergistic USB Driver Fuzzingpp. 51-51
8 u' d' Z7 ^! v9 p% x& `  {by Yiru Xu, Hao Sun, Jianzhong Liu, Yuheng Shen, Yu Jiang5 p3 j% }8 B5 p9 z% F
% P6 K1 O" @3 ~: v
【9】北京大学
" j8 B( I& m' R* C+ f; ENo Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device MLpp. 52-52
0 o" o: H5 b: Y9 oby Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Ding Li, Yao Guo, Xiangqun Chen. g% K, H' l. j& `1 g
/ V) M2 Y1 b& h% E# ?7 z; ?
【10】浙江大学% k& o! V$ W% c" m
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attackspp. 53-53
  ]5 q, F$ C- p% a. s4 O, Nby Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren
* v2 {8 x$ o9 c9 Y9 k6 [$ b) z4 V/ y  \
【11】浙江大学
& z; |" [* w" }6 d5 nALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Featurespp. 56-56
+ F' g, s& m8 V# Xby Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren
1 d7 G4 }/ O& \1 q* C1 g+ I6 i8 s6 K+ O) A; I* R
【12】南开大学, I: g# b% J. T) U' p" Y% v1 v5 {
Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Lengthpp. 67-67
( q" G" |7 s5 n2 j# cby Jianning Zhang, Ming Su, Xiaoguang Liu, Gang Wang% v3 `. Q, i9 M1 \1 L
& A" m5 Z/ @0 Z; J5 |4 V' i
【13】浙江大学& Q. d; v; s, A: U8 R
BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wildpp. 68-68
5 n1 r. x9 G9 d( u5 ]# Mby Jie Wan, Jianhao Fu, Lijin Wang, Ziqi Yang7 t* S' M, f2 k5 Y* Y2 u3 x0 E8 f

( c& ?6 f. t4 m: x( h; M: @3 U【14】浙江大学
# g2 c/ ~. o. G- e- T) ]  HSyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devicespp. 70-70
  ?' v5 p0 I6 R/ Z0 n. Q0 tby Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah
: `5 y% D6 o' k4 h4 P2 T1 U
: p) L- N6 W2 p$ b, O【15】清华大学
5 c" S& t, f8 n2 iTest-Time Poisoning Attacks Against Test-Time Adaptation Modelspp. 72-72
  ?. ^( T* x- a5 U( iby Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang
, A1 ?/ ]% A5 v; `- c+ g
( p! p/ o8 `4 f/ E- W9 ?【16】上海交大% c% i% I4 [3 k; ?4 S
SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformationspp. 97-970 k4 C8 ~/ D5 A
by Borui Yang, Wei Li, Liyao Xiang, Bo Li; K. ~' m8 F7 q* ^4 C
8 x$ Z0 D& T& l1 Z
【17】重庆大学/ V1 [( L& E! [
From Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuningpp. 101-101
! X9 z2 o6 o. E9 h8 h4 w: mby Qiao Zhang, Tao Xiang, Chunsheng Xin, Hongyi Wu- M7 f+ n. h: F1 a  g
8 I6 Q1 r2 x* W
【18】东南大学
3 `9 Y9 x3 L' vTransferable Multimodal Attack on Vision-Language Pre-training Modelspp. 102-1025 A( m5 K- ]0 k. j, H0 ^
by Haodi Wang, Kai Dong, Zhilei Zhu, Haotong Qin, Aishan Liu, Xiaolin Fang, Jiakai Wang, Xianglong Liu- y/ _" d& {3 [  ^" Y
) E6 r/ P" m* f! `
【19】清华大学
' _, z7 I( G& V+ _! K3 NBULKOR: Enabling Bulk Loading for Path ORAMpp. 103-103
& H! b" R, s5 y$ \% l/ B2 yby Xiang Li, Yunqian Luo, Mingyu Gao
0 ]0 n0 L" e4 W
8 ^: y6 N/ T) i7 r6 E4 A【20】清华大学
5 X; q2 V+ [' |Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delaypp. 109-1091 y& |7 h" g0 K! y+ X2 K
by Yuanliang Chen
0 K$ S# q! ], L, W$ X+ I8 m" d% q; Y! a1 t% t
【21】浙江大学
. D# H9 q; X+ C& o. N& N  |0 aUnderstanding and Benchmarking the Commonality of Adversarial Examplespp. 111-111( v% @, ~7 v5 Q# q6 w
by Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu
; K% U# p/ Z( v* g: c5 d# {# u7 n' I. K  C- L# Y. Y, C/ j
【22】电子科技大学* ]2 [; K7 V) M. [  {/ ~, t
NURGLE: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulationpp. 125-1255 t6 B+ {1 T# K8 R8 o& B
by Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu8 O9 {2 _3 p# l$ c  x  a

; e) z' Y9 [5 [5 U( X/ q& b【23】清华大学
0 ^8 Z9 V! l/ f; J8 mLABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devicespp. 127-127
- V. R& A5 z$ w5 m) xby Hangtian Liu, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Xiangzhi Wang, Guangming Gao: G# W: {$ _& P) O3 r7 H
9 W; i* s7 q; ?4 L# o2 ~# K- F
【24】清华大学
/ D" c$ ~7 B7 }Break the Wall from bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewallspp. 129-129# W5 q; |' w8 X$ @( ~+ V
by Qi Wang, Jianjun Chen, Zheyu Jiang, Run Guo, Ximeng Liu, Chao Zhang, Haixin Duan8 z2 e* h! U# y3 v
0 r9 q4 }' S0 D, `2 M  E0 {3 U
【25】清华大学1 i1 X  y) a, c4 Z, A% E3 z
GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocolspp. 131-131
  R/ M, J7 A# h" K/ P5 ~by Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song
( I$ A6 F6 F, {0 A2 J$ O& t0 O. H3 m
【26】清华大学& Z" n/ |! |( i
More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Servicespp. 138-138" K. n) w+ N- o5 ?+ |
by Yacong Gu, Lingyun Ying, Huajun Chai, Yingyuan Pu, Haixin Duan, Xing Gao
8 i: F$ L% J: j0 I9 c' k  X% g7 a& W1 F
【27】西电
4 X) h8 W/ ]. t* Y' m2 E, V+ GFlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledgepp. 148-148
  d' p* O" J% w7 ?by Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino/ B  I2 U% G+ M
* _, Y& L; P) z7 ^* v
【28】清华大学
2 w* y- i% X" X( e: QThe Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellationspp. 149-1499 J7 K) F0 p6 A  m4 O. k
by Wei Li, Yuanjie Li, Hewu Li, Yimei Chen, Yufeng Wang, Jingyi Lan, Jianping Wu, Qian Wu, Jun Liu, Zeqi Lai, B* Y2 J, ]; x5 O

1 e# U; X0 M# l9 p2 P8 `【29】复旦大学
6 U0 {8 }! ~# A- DEfficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Constructionpp. 150-150" U# G7 [4 z9 T! a" x* D
by Bofei Chen
# c1 A, n0 a. v# g3 H- m" S' T5 f# F: D* S* h# f0 Y
【30】山东大学" r( P1 S- Y0 M! [& h9 j+ k# |: t
AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detectionpp. 155-155
5 x2 Y# ]& K. [" yby Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao
0 S; k; `% G1 q* F( O: z$ F/ F" w  P, f
【31】北京大学0 m1 w+ F/ q/ ~. N3 t6 e2 Z
Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelitypp. 160-160* t  Q+ O) [, L+ P* f* [% y
by Xinming Wei, Jiaxi Zhang, Guojie Luo
3 D  {: X; ~+ ^2 B# _  t5 h7 Q7 \5 c% `; s5 J

高级战友

Rank: 4

547

积分

0

贡献

0

奖励
发表于 2024-2-3 16:05:18 来自手机 | 显示全部楼层
清浙遥遥领先

新手上路

Rank: 1

11

积分

0

贡献

0

奖励
发表于 2024-2-3 16:22:26 | 显示全部楼层
浙大威武

中级站友

Rank: 3Rank: 3

175

积分

0

贡献

0

奖励
发表于 2024-2-4 23:36:20 来自手机 | 显示全部楼层
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records in Collision Attacks on SHA-2. Accepted by EUROCRYPT 2024, Zurich, Switzerland, May 26-30, 2024.   

分区版主

Rank: 8Rank: 8

3413

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-4 23:43:26 来自手机 | 显示全部楼层
不知而已 发表于 2024-2-4 23:36
5 D* [% Q: U2 }# P1 g, x华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...
: R3 d" D( q5 d2 J
哈这位是我学姐,王院士的学生。
! S) U* z0 M! F# S, k% N- R* b23年她在欧密会就有文章,在SHA-2方面做得很好。

老战友

Rank: 5Rank: 5

1867

积分

1

贡献

800

奖励
发表于 2024-2-19 16:46:34 | 显示全部楼层
usenix security 2024 accepted papers: c. ?9 T! B1 }6 y% H: S% B
https://www.usenix.org/conferenc ... mer-accepted-papers

老战友

Rank: 5Rank: 5

1867

积分

1

贡献

800

奖励
发表于 2024-2-19 16:57:35 | 显示全部楼层
本帖最后由 大师大楼 于 2024-2-19 16:59 编辑
3 g% O: ^( K9 t: A" P, U
* w4 V' @+ u* S; R) ^, x9 k+ K1 `usenix security 2024
; s% b3 h- f9 A1 w% e8 B; z" g8 Z浙大 东南2
3 T* x1 c/ i8 _& U. f! p0 R9 Z武大北邮等 1
. _) x/ D7 Z% P包括清华上交在内,大部分都是空白?

分区版主

Rank: 8Rank: 8

3413

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-19 16:58:58 | 显示全部楼层
大师大楼 发表于 2024-2-19 16:57
/ R* X- \' s) M5 kusenix security 20245 P5 I6 G4 E, k. J& l
浙大 21 \0 S) d2 o5 w3 X+ \
武大北邮等 1
/ z+ T5 x- B7 Q$ d, l( q
还有一轮应该没出来

老战友

Rank: 5Rank: 5

1867

积分

1

贡献

800

奖励
发表于 2024-2-19 17:08:00 | 显示全部楼层
SmithArno 发表于 2024-2-19 16:58
( X+ ~% ^% R" x& K还有一轮应该没出来

+ V  a: P3 w" l6 l嗯,耐心等待

老战友

Rank: 5Rank: 5

1155

积分

0

贡献

0

奖励
发表于 2024-2-19 19:29:03 来自手机 | 显示全部楼层
清华浙大太牛了!

初出江湖

Rank: 2

101

积分

0

贡献

0

奖励
发表于 2024-2-19 23:24:43 | 显示全部楼层
南京大学三项0蛋啊。1篇都没有啊

未关注公众号会员1

98

积分

0

贡献

0

奖励
发表于 2024-2-20 10:41:54 | 显示全部楼层
三大密码顶会算信息安全的成果吗

分区版主

Rank: 8Rank: 8

3413

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-20 10:48:29 来自手机 | 显示全部楼层
ecnuking 发表于 2024-2-20 10:41( d# h/ `: {7 y0 E# d: O
三大密码顶会算信息安全的成果吗
/ `% n  o- V4 p7 m9 p: ~' o1 E
密码方向主要统计三大顶会和密码学顶级期刊JoC。9 ]3 C4 T4 T0 S+ ^  S
目前有零星的信息,IACR还没出Accepted papers。

白银长老

Rank: 8Rank: 8

3333

积分

1

贡献

2000

奖励
发表于 2024-2-21 12:23:18 | 显示全部楼层
浙大徐文渊:连续三年担任网安四大顶会的大会联合主席
" N% o9 g; I4 x6 ?) W7 F% XUSENIX Security 2024
6 O) H" V  g* U* xNDSS 2023
- o$ u1 H  n; R. ?NDSS 2022

白银长老

Rank: 8Rank: 8

3333

积分

1

贡献

2000

奖励
发表于 2024-2-21 12:24:27 | 显示全部楼层
近日,浙江大学共有12位教师担任国际信息安全顶级会议ACM CCS 2024的程序委员会委员,入选总人数排名全球高校第一。其中巴钟杰、申文博、冯博、刘金飞、罗梦、周亚金、娄坚、姚培森、秦湛(按姓氏笔画排序)9位教师来自浙江大学区块链与数据安全全国重点实验室。

白金长老

Rank: 10Rank: 10Rank: 10

5333

积分

0

贡献

0

奖励
发表于 2024-2-21 14:20:26 | 显示全部楼层
乡下 发表于 2024-2-19 23:29, |' w  H) G$ [4 J/ j( p: e
郑州信大,网安国家队核心队员之一,0蛋?
1 b2 P9 {0 }2 |0 w% H. A7 _
能发吗??

中级站友

Rank: 3Rank: 3

192

积分

0

贡献

100

奖励
发表于 2024-2-23 11:18:14 | 显示全部楼层
没有军信,都是假榜( L% u* e4 C$ F- z$ Q* ^
看看邬院士的程控交换机,才有后来的巨大中华) H0 R1 C0 |( u9 s' A# b) O' [. S
信息安全,缺了军信,可信度太低

老战友

Rank: 5Rank: 5

1867

积分

1

贡献

800

奖励
发表于 2024-2-23 11:49:38 | 显示全部楼层
本帖最后由 大师大楼 于 2024-2-23 11:51 编辑
$ G. I) X) X9 F. @+ v- c% b! x) h& }: w& C/ O7 s
如果军方还是继续画地为牢,固步自封,不借助世界一流高校和院所的力量,那么俄罗斯就是前车之鉴。

老战友

Rank: 5Rank: 5

1867

积分

1

贡献

800

奖励
发表于 2024-2-23 11:51:14 | 显示全部楼层
academic818 发表于 2024-2-21 12:23
* q# E9 v- B* U' H# j9 Z5 p& D) {浙大徐文渊:连续三年担任网安四大顶会的大会联合主席7 v% h5 s2 N7 M' l# t9 U
USENIX Security 2024
. N. Z3 v2 X% v2 d  [NDSS 2023
9 B9 ?) b  H4 R
水平是特别高啦,但在中国现行体制下,还有待被发掘

老战友

Rank: 5Rank: 5

1286

积分

1

贡献

800

奖励
发表于 2024-2-23 12:09:24 | 显示全部楼层
大师大楼 发表于 2024-2-23 11:51
2 `0 |6 `5 p3 }+ a7 q0 O& C* y水平是特别高啦,但在中国现行体制下,还有待被发掘
" `) j# K6 K8 G2 ~6 n9 @" `
她好像比较低调的,待在电气学院内,好像还拒绝提拔副院长

禁止发言

119

积分

0

贡献

0

奖励
发表于 2024-2-23 12:09:52 | 显示全部楼层
academic818 发表于 2024-2-21 12:231 M8 ?; h  {2 j4 r
浙大徐文渊:连续三年担任网安四大顶会的大会联合主席) x1 y: J) i: ~  `$ ]
USENIX Security 20248 _5 y: N$ E9 `: i! E! b% k
NDSS 2023

6 i3 s" N/ q7 q# H( c这么多卖点,宣传太差,差不多的年龄,颜宁都院士了

高级战友

Rank: 4

466

积分

0

贡献

0

奖励
发表于 2024-2-23 12:26:05 来自手机 | 显示全部楼层
也不是每个人都适合做领导哈哈哈

中级站友

Rank: 3Rank: 3

175

积分

0

贡献

0

奖励
发表于 2024-2-25 19:07:24 来自手机 | 显示全部楼层
不知而已 发表于 2024-2-4 23:36
# _* C9 ~, [0 J4 u华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...

, J; c. j/ }* m华师大软院通讯今年还accepted一篇欧密 《Registered Functional Encryptions from Pairings》
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

论坛的微信公众号(二维码如下),关注获取更多科教信息

Archiver|手机版|网大论坛 ( (鄂ICP备2021013060号-2) )

GMT+8, 2025-5-24 11:41 , Processed in 0.243572 second(s), 22 queries , Gzip On.

鄂公网安备 42018502005923号

Powered by Discuz! X3.4

Copyright © 2001-2022, Tencent Cloud.