网大论坛

 找回密码
 立即注册
查看: 32576|回复: 71

2024年信息安全领域顶会统计(Eurocrypt/FSE)

[复制链接]

分区版主

Rank: 8Rank: 8

3463

积分

0

贡献

1600

奖励
发表于 2024-2-3 09:59:37 | 显示全部楼层 |阅读模式
本帖最后由 SmithArno 于 2024-3-8 16:28 编辑 3 a5 _; }1 W5 N2 z

* f8 Y  r. t2 o8 S! B4 O! G按照第一作者单位统计(信息安全四大顶会+密码三大顶会)
- @6 D9 n9 v7 ~( n: B- S3 TNDSS 2024概览# E+ ]$ R2 R+ N* f1 w& W% w) @: S
清华大学13篇,浙江大学9篇,华中科技大学3篇,南方科技大学2篇。
! i2 Y! [, f/ Y6 q东南大学、中国海洋大学、北京航空航天大学、山东大学、北京大学、中山大学、武汉大学、中科大、NUDT、上海科技大学等等1篇。  |: v8 @  k1 S
9 o0 |8 y0 F% r* ]+ j
CCS 2024$ g# ?+ x+ p( C+ b/ Y0 T

% X) l' E8 N/ ^% L3 k; Y! GIEEE S&P 2024概览
6 V2 D. ?' r& s' I7 Q0 w清华大学10篇,浙江大学6篇,华中科技大学、复旦大学、东南大学2篇。其他重庆大学、山东大学、南开大学、西电、成电等等1篇。9 r, o3 k1 `9 R) A" C4 P

9 {, x4 N; Y: h1 b( ^8 u9 G. oSecurity 2024
9 d& Y( Z( ?( S# @( l# C  B$ ?

/ o) }" Z0 ]8 g9 c+ Q& gEurocrypt 20244 \! g0 r9 f; D: ^( N( [0 X
华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。
: g7 y- ]5 l% O* A/ \+ `: N- w; C
! r, i; e+ S+ L
3 L0 ]! y- h# m3 \/ x5 C/ S4 o# {
获奖情况:' {( C- \( X' ^, Y
【1】浙江大学获得NDSS 2024杰出论文奖。
' w6 t8 z2 ~2 ]
' q+ \9 P6 a# I" M' Y7 B  F
3 C/ u4 B( E" l
. u9 B. p8 `5 j5 J3 o# W) Z
- f% s/ k7 L& }+ Q* T9 \8 Q$ c4 ~& t5 H" G/ P
" T; a2 H2 _! e8 z

分区版主

Rank: 8Rank: 8

3463

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-3-4 09:47:58 | 显示全部楼层
Eurocrypt 2024,共接收105篇论文,国内共8篇,华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。
  ]) o; O. ?1 T1 }/ O
0 I( Z7 r1 H/ g【1】山东大学
2 V$ N: _$ c2 S7 [3 {Massive Superpoly Recovery with a Meet-in-the-middle Framework -- Improved Cube Attacks on Trivium and Kreyvium8 O: Q" K* Z/ h
Jiahui He, Kai Hu, Meiqin Wang, Hao Lei
& _, ?% Z, Y0 }Shandong University, Nanyang Technological University
3 R- @/ Z# j6 O* K/ v: _# ]. k2 Z* t" _1 @- w0 o0 X
【2】清华大学
! Y; X& y  T1 Q! h0 ~: h: b# fAccelerating BGV Bootstrapping for Large $p$ Using Null Polynomials Over $\mathbb{Z}_{p^e}$
3 m) f8 u. P5 K; dShihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang
; ~% n- n0 p5 M; v" C% z4 DTsinghua University
( M9 W2 _# \7 D) B* h
$ o+ E: N# L  V0 U0 O) {【3】华东师大. g& ]& D% R4 b% ?
Registered Functional Encryptions from Pairings& y6 Q6 P9 J! [; ?; c1 R
Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian
' g3 e: }) W9 M4 e+ L% y, }( n- VEast China Normal University, Shanghai University, Shanghai University of Electric Power
& Z, `1 g5 I. ?9 ^' F6 O1 B) ^& Y: L. c/ T. o( d
【4】南科大
- C$ r$ {+ d1 u& TIntegrating Causality in Messaging Channels
- }* l* a: H6 h, {8 g/ f- {2 ?Shan Chen, Marc Fischlin- K0 ^, N$ H4 O/ h
Southern University of Science and Technology, TU Darmstadt
4 U) f. X. T) Q, a* {
+ a! D0 ~0 a! X8 R6 E$ _【5】暨南大学8 y6 e: ^+ k( W- u
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond( g2 l: H& P' @4 f9 v9 @; T
Ling Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng
0 Y; Z4 `* ]7 S/ C% @" T+ @" [College of Cyber Security, Jinan University, Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering- y1 \* P- C2 c4 k, E
+ _# _! |1 p5 G- ^+ x- Y
【6】上海交大
9 I* M* i: P9 VThe Hardness of LPN over Any Integer Ring and Field for PCG Applications
" ~  c3 Q; V/ d: PHanlin Liu, Xiao Wang, Kang Yang, Yu Yu: E2 m+ F, V& \2 ~" |, ^5 I  [4 W2 g# h' P
Shanghai Jiao Tong University, Shanghai Qi Zhi Institute, Northwestern University, State Key Laboratory of Cryptology0 m- b. I6 A. n6 Z+ F- N
& }( G2 k2 v7 y4 N4 F
【7】上海交大8 N0 R. E5 Z- b& s4 D$ {, a; R# W$ M' n
Universal Composable Password Authenticated Key Exchange for the Post-Quantum World
5 [& ~2 m4 o# GYou Lyu, Shengli Liu, Shuai Han
. e/ e. e2 C6 j$ |( VShanghai Jiao Tong University; y$ }* k8 q4 D

! G% ?, U# o/ I$ F- f. J9 h【8】华东师大/ h. v: }7 Q$ W: o6 R- E: R
New Records in Collision Attacks on SHA-2
! G* p3 [1 w2 IYingxin Li, Fukang Liu, Gaoli Wang% s+ l; f3 X: B
East China Normal University, Tokyo Institute of Technology
* b* f4 J, t9 t, p
* E0 D$ v* O  N5 {& U

分区版主

Rank: 8Rank: 8

3463

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 09:59:41 | 显示全部楼层
本帖最后由 SmithArno 于 2024-2-3 10:06 编辑
2 g/ ]6 ^$ {+ E7 o0 ]( R) `" Z' `2 c- l! C- a4 W
NDSS 2024会议主页:https://www.ndss-symposium.org/ndss2024/accepted-papers/
2 h8 C5 j* l" m# K: v2 `+ `3 W% h# C5 M
【1】山东大学
* v! e, v5 y; @3 p, ~# ^0 O' sSecurity-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols) A" A+ u9 H$ [2 L% W) N9 l
Shichen Wu (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Puwen Wei (1. School of Cyber Science and Technology, Shandong University 2. Quancheng Laboratory 3. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Ren Zhang (Cryptape Co. Ltd. and Nervos); Bowen Jiang (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education)/ z# q% |% w+ \+ ~' R

+ g! _1 p. ?6 ^# y" @- ^/ O: H5 }4 ~, A【2】东南大学; l6 u5 E5 ~0 }& a/ r- \
LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems
. C& h0 S# }* b7 x& n- nHuaiyu Yan, Zhen Ling, Haobo Li (Southeast University); Lan Luo (Anhui University of Technology); Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang (Southeast University); Junzhou Luo (Southeast University, Nanjing, P.R. China); Xinwen Fu (University of Massachusetts Lowell)
" X, {/ M- U- t7 H+ X! b/ s- A) q6 a9 m) j3 k0 n
【3】浙江大学  T6 I0 I/ h/ ~- m2 a
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards
! C$ o7 p/ |1 f* L& JQinhong Jiang, Yanze Ren (Zhejiang University); Yan Long (University of Michigan); Chen Yan (Zhejiang University); Yumai Sun (University of Michigan); Xiaoyu Ji (Zhejiang University); Kevin Fu (Northeastern University); Wenyuan Xu (Zhejiang University)8 Y! w' C; \! x4 O- z" |5 k
) W( ?# b- V6 j' m1 N
【4】浙江大学
7 a! r3 ?/ n; Y1 E- yInaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
0 Z2 K0 s9 [+ l# pXinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)2 q; m% i, H1 f& T

# ~! e; w4 G# s【5】北京航空航天大学4 _9 |3 W. S7 F3 ~  @' j
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation% \6 a; t( P' o* k3 S
Song Bian, Zian Zhao, Zhou Zhang, Ran Mao (Beihang University); Kohei Suenaga (Kyoto University); Yier Jin (University of Science and Technology of China); Zhenyu Guan, Jianwei Liu (Beihang University)/ ^9 t& e& B. C8 d

& \2 l: U# o; p0 X. [【6】清华大学9 X9 H" c! L* k) R1 r+ X  F
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic% D% p: k/ g- f- ?1 e+ t
Yuqi Qing (Tsinghua University); Qilei Yin (Zhongguancun Laboratory); Xinhao Deng, Yihao Chen, Zhuotao Liu (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Jia Zhang, Qi Li (Tsinghua University)
8 W7 w" E9 p1 Y  m+ e
8 b' A% d5 T7 F& ^5 E2 @) Q【7】浙江大学
/ q: W/ }$ N9 P( ^2 fSymphony: Path Validation at Scale  M/ J! d* m! O6 U
Anxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren (Zhejiang University)
+ E( t/ L* N: _- V9 n, T
4 G9 Z" Y2 ~; Z8 P( z【8】清华大学2 ^# L1 }8 Q* f5 y# I
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet1 j' q; P% o) G& o/ ^5 N
Chuhan Wang, Yasuhiro Kuranaga, Yihang Wang (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Linkai Zheng, Xiang Li (Tsinghua University); Jianjun Chen (Tsinghua University; Zhongguancun Laboratory); Haixin Duan (Tsinghua University; Quan Cheng Lab; Zhongguancun Laboratory); Yanzhong Lin, Qingfeng Pan (Coremail Technology Co. Ltd)
7 y, p& N/ `# E9 ~
4 Y& i7 e$ [7 @【9】浙江大学' Z$ m$ l$ G0 I( v0 C' A
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency3 q4 c; `1 n1 a( {$ `- d* n% z0 ^
Jiacheng Xu, Xuhong Zhang, Shouling Ji (Zhejiang University); Yuan Tian (UCLA); Binbin Zhao (Georgia Institute of Technology); Qinying Wang, Peng Cheng, Jiming Chen (Zhejiang University)5 Y7 y0 \$ d( e& E& E

0 k* I) v( [7 K. f. t【10】清华大学! z& m9 N4 O- W+ Z
ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection( I2 ?1 X1 C% T$ N; A
Kunpeng Zhang (Shenzhen International Graduate School, Tsinghua University); Xiaogang Zhu (Swinburne University of Technology); Xi Xiao (Shenzhen International Graduate School, Tsinghua University); Minhui Xue (CSIRO’s Data61); Chao Zhang (Tsinghua University); Sheng Wen (Swinburne University of Technology)  O" S* T' M0 v: N/ G$ e$ ~% @

: {5 s6 ~5 w8 ?3 I+ |3 r【11】中国海洋大学" r( ]' s$ Z0 n( J/ W
Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack/ n+ U" C5 D# _' r3 u  l
Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu (Ocean University of China)
. c- s1 z0 t1 o3 x6 V# K# G
, H% Y' ?: w8 [【12】浙江大学
. X% S9 S- N5 [ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning
9 F% _" l; m& P7 L" {& H- _+ V, xLinkang Du (Zhejiang University); Min Chen (CISPA Helmholtz Center for Information Security); Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen (Zhejiang University); Zhikun Zhang (Stanford University)" S+ O. B; u# G1 M8 {
6 Q' u/ Z1 i1 J% a
【13】北京大学
" c7 c2 u  \" _' n8 XNODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
7 i. t: p# k6 D% P6 k, J: G0 EShaofei Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Feng Dong (Huazhong University of Science and Technology); Xusheng Xiao (Arizona State University); Haoyu Wang (Huazhong University of Science and Technology); Fei Shao (Case Western Reserve University); Jiedong Chen (Sangfor Technologies Inc.); Yao Guo, Xiangqun Chen (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Ding Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University)
4 X* y" q1 h3 A' x5 \: @
" t  T$ y  U. e% D7 s/ a【14】浙江大学* n( v9 j+ N2 p7 X
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors; s' N6 f6 w" p  t& D/ @
Chengkun Wei, Wenlong Meng (Zhejiang University); Zhikun Zhang (Stanford University); Min Chen (CISPA Helmholtz Center for Information Security); Minghu Zhao (Zhejiang University); Wenjing Fang, Lei Wang (Ant Group); Zihui Zhang, Wenzhi Chen (Zhejiang University)& w5 A9 G; I# N! R. {

3 t7 C5 T/ [" q$ M5 z【15】湖南大学
6 B* q+ z1 ~* @4 Q& o& QEavesdropping on Black-box Mobile Devices via Audio Amplifier’s EMR
5 V+ d3 ?8 {, C. M5 x! I6 T! A6 U% mHuiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Kenli Li (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Zheng Qin (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Mingxing Duan (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Yong Xie (Nanjing University of Posts and Telecommunications, Nanjing, China); Daibo Liu (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Ming Li (The University of Texas at Arlington, USA)
2 z, E" o9 t" {; {- a  }) L  Y6 M; ?0 d9 r" w) x
【16】上海交大; @* I! E7 a. }
Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models# d# Z1 k8 k! H  x* w4 W
Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang (Shanghai Jiao Tong University); Chenghu Zhou (Chinese Academy of Sciences); Bo Li (Hong Kong University of Science and Technology)
2 Z7 J" p8 N2 D  j  I4 W. v' _4 d' f. j
【17】清华大学
) ^; C  S. P/ M' qExploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks6 ?( n* o; Q3 L3 }
Yuxiang Yang, Xuewei Feng, Qi Li (Tsinghua University); Kun Sun (George Mason University); Ziqiang Wang (Southeast University); Ke Xu (Tsinghua University)% _# o- x% D  E

: O- t/ G1 L6 n6 X【18】清华大学& z8 c) k% I2 T( P  j6 b8 Z
CP-IoT: A Cross-Platform Monitoring System for Smart Home# |% F6 r8 W' r/ |4 F& [/ F
Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang (Tsinghua University); Linna Fan (National University of Defense Technology); Chenxin Duan (Tsinghua University)- b" |6 t+ }5 j4 w

& y2 }7 Y1 Z( h【19】清华大学
) x% b; N6 ?. `& f, M+ RLoRDMA: A New Low-Rate DoS Attack in RDMA Networks3 p3 x1 W) H& t/ \; @9 d$ {. |
Shicheng Wang (Tsinghua University); Menghao Zhang (Beihang University & Infrawaves); Yuying Du (Information Engineering University); Ziteng Chen (Southeast University); Zhiliang Wang, Mingwei Xu (Tsinghua University & Zhongguancun Laboratory); Renjie Xie (Tsinghua University); Jiahai Yang (Tsinghua University & Zhongguancun Laboratory)6 S4 Y; W+ U# B7 I/ Y

' e1 k; g7 A/ q- h5 f3 d【20】清华大学: x( |% p! ]% m! P4 F/ o  y
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing2 K5 j0 p1 ^2 m, N: c9 M3 U, u9 n
Linkai Zheng, Xiang Li, Chuhan Wang, Run Guo (Tsinghua University); Haixin Duan (Tsinghua University; Quancheng Laboratory); Jianjun Chen, Chao Zhang (Tsinghua University; Zhongguancun Laboratory); Kaiwen Shen (Tsinghua University)
7 P4 r$ m. R; z* e; _# [, h/ R  M5 f' ^4 N0 E7 [4 _6 F3 P; u+ u
【21】清华大学
: E7 K( o% d2 V9 x! VAutomatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization
! y" ~( \8 T# m7 |  f" |2 Y- BQuan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang (Tsinghua University)
4 g" ^0 q- h* u2 H6 e+ ?9 R# q9 X, J' J; W8 n& e4 ~; v- D
【22】清华大学
% Z; H# y! g& T7 w! a3 w$ S" I' cDynPRE: Protocol Reverse Engineering via Dynamic Inference
, d, o/ H+ E2 c& {: c. V9 c; yZhengxiong Luo (Tsinghua University); Kai Liang (Central South University); Yanyang Zhao, Feifan Wu, Junze Yu (Tsinghua University); Heyuan Shi (Central South University); Yu Jiang (Tsinghua University)
% d3 v+ s! T6 R  p7 V7 O6 W1 L8 D$ E) ?! V6 n- J# u& E
【23】浙江大学
+ M9 A' {8 u  s$ q# p/ V9 {: pImproving the Robustness of Transformer-based Large Language Models with Dynamic Attention  G4 p5 e5 v% x* J
Lujia Shen, Yuwen Pu, Shouling Ji (Zhejiang University); Changjiang Li (Penn State); Xuhong Zhang (Zhejiang University); Chunpeng Ge (Shandong University); Ting Wang (Penn State)  b' O0 A) p2 M1 a2 Z

( ]1 |. X3 ]" z6 D& J2 e5 L) \【24】中山大学) v8 ]# a& d- H* p5 ]
Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem5 ~( R+ I* u. t9 {& h* T8 v$ l& G
Jiangrong Wu, Yuhong Nan (Sun Yat-sen University); Luyi Xing (Indiana University Bloomington); Jiatao Cheng (Sun Yat-sen University); Zimin Lin (Alibaba Group); Zibin Zheng (Sun Yat-sen University); Min Yang (Fudan University)
/ t' w9 @+ X" D: v7 l1 n
- K7 g4 L3 i0 ?" |6 w# G【25】浙江大学
$ X6 u2 v' j" K7 XCamPro: Camera-based Anti-Facial Recognition* a4 ~1 R3 V* i9 Z3 i$ Y" U
Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University); C4 p" h9 Z1 K! f) [! ?) V9 M; n+ S* c
" c- Z7 b  t0 g4 h- u' h
【26】中国科学技术大学  K/ W9 c6 S* ^1 B+ N8 f
Detecting Voice Cloning Attacks via Timbre Watermarking# v$ e* B* V' L- l2 F
Chang Liu (University of Science and Technology of China); Jie Zhang, Tianwei Zhang (Nanyang Technological University); Xi Yang, Weiming Zhang, NengHai Yu (University of Science and Technology of China). p, r) e; ?0 v0 Q) y9 H! l

$ ?& H  x* H4 ?% r- v1 O【27】清华大学/ \. A: ~2 S  e9 _; z2 q
Understanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed( F+ W- _% z7 f0 b
Lancheng Qin (Tsinghua University, BNRist); Li Chen (Zhongguancun Laboratory); Dan Li (Tsinghua University, Zhongguancun Laboratory); Honglin Ye, Yutian Wang (Tsinghua University)
7 ?: t! y' a$ z" {2 p, e
" l1 R6 E8 q+ R9 n【28】清华大学
% s' K5 s( Q1 hdRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository: x- o; m( r/ S( s1 i  y+ i
Yingying Su, Dan Li (Tsinghua University); Li Chen (Zhongguancun Laboratory); Qi Li (Tsinghua university); Sitong Ling (Tsinghua University)9 _; c7 x3 R& X; f% p. h. B! X& T

# y. A5 D' U5 }4 M  A6 j【29】清华大学1 T2 ?7 @+ T1 F* ^. J  i+ C
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption) P4 c' x% \+ u' A2 E. j
Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu (Tsinghua University)8 f& Y% D1 e3 |

: S( E* P  o  H; Z; m【30】NUDT' _. a% D9 ]' @1 ^. y) h  ?
DeepGo: Predictive Directed Greybox Fuzzing
4 F9 \; \/ ?5 q$ p* SPeihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang (National University of Defense Technology)1 C4 h) d$ C/ Q3 @" R

5 @4 `' z3 G1 G6 Z/ ~【31】上海交大4 a3 y  X+ t2 B9 P$ U
ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token
5 m+ X  T# d: e. b# Q1 MGe Ren, Gaolei Li, Shenghong Li, Libo Chen (Shanghai Jiao Tong University); Kui Ren (Zhejiang University)
. I- n1 O7 Q+ ?3 P% {0 L
: I$ P2 W) o  W! D7 K【32】华中科技大学, v2 k# g4 h% Y  w
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
# F" l$ \% O3 EMan Zhou, Shuao Su (Huazhong University of Science and Technology); Qian Wang (Wuhan University); Qi Li (Tsinghua University); Yuting Zhou, Xiaojing Ma (Huazhong University of Science and Technology); Zhengxiong Li (University of Colorado Denver)3 m/ Y! n4 v; \
" o7 f" X6 ]% h! ^
【33】南方科技大学% ~2 b) z6 X8 T8 |
Separation is Good: A Faster Order-Fairness Byzantine Consensus
5 U9 Z7 n/ S' R( q6 K6 h; p$ VKe Mu (Southern University of Science and Technology, China); Bo Yin (Changsha University of Science and Technology, China); Alia Asheralieva (Loughborough University, UK); Xuetao Wei (Southern University of Science and Technology, China & Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation, SUSTech, China)
5 i% u/ q, c* v$ g6 v5 D
7 o  X# E  K+ l7 U& L9 A! B+ {! I【34】南方科技大学
- @- k0 q8 T; p4 g! XCAGE: Complementing Arm CCA with GPU Extensions1 l" R) T# E  z2 Y# [" [. i
Chenxu Wang (Southern University of Science and Technology (SUSTech) and The Hong Kong Polytechnic University); Fengwei Zhang, Yunjie Deng (Southern University of Science and Technology (SUSTech)); Kevin Leach (Vanderbilt University); Jiannong Cao (The Hong Kong Polytechnic University); Zhenyu Ning (Hunan University); Shoumeng Yan, Zhengyu He (Ant Group)- a; @. E  ~2 i1 G8 O& Z' X
- Q" F& W7 d8 o4 B# {
【35】华中科技大学
9 C- X& |3 [* C$ a+ R5 Q8 l+ _DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses
4 D& m& C& j* W( b/ iChaoxiang He, Xiaojing Ma (Huazhong University of Science and Technology); Bin Benjamin Zhu (Microsoft Research Asia); Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin (Huazhong University of Science and Technology); Dongmei Zhang (Microsoft Research)1 n" [( V1 h+ g' ~, j: x( A& l

4 L, U$ b/ M" ]3 R% b0 G) d) k【36】华中科技大学
/ |; U& j" G. T. PAbusing the Ethereum Smart Contract Verification Services for Fun and Profit# P& M4 P2 v5 c" k
Pengxiang Ma (Huazhong University of Science and Technology); Ningyu He (Peking University); Yuhua Huang, Haoyu Wang (Huazhong University of Science and Technology); Xiapu Luo (The Hong Kong Polytechnic University)
- k& B# o, x7 @' G/ N' L8 w5 j
/ _4 Y( P. o+ C  m( r: ?【37】浙江大学
8 |$ N1 p2 |0 g' A: d) y4 LUniID: Spoofing Face Authentication System by Universal Identity5 D6 O; Q2 |& l* C- g; W
Zhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji (Zhejiang University); Wenyuan Xu (Zhejing University)
  j- g1 @  {# H7 W7 U2 O
! [+ c  X2 A/ H+ _4 ]' m【38】武汉大学7 E$ ?2 f) G3 A% H) B
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices6 O" r3 Q5 A% L4 A
Yue Xiao (Wuhan University); Yi He (Tsinghua University); Xiaoli Zhang (Zhejiang University of Technology); Qian Wang (Wuhan University); Renjie Xie (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Qi Li (Tsinghua University)
" _! P1 L* n9 W8 Q! v& v* ~0 e! u
【39】上海科技大学
& E+ @( R& A) m8 @) ^* VSLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems4 u2 A/ P0 ^0 R  X9 e  u: ^/ T
Guangke Chen (ShanghaiTech University); Yedi Zhang (National University of Singapore); Fu Song (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences)
* N, z0 ]' E! D
' t# S+ l' `& r, L5 m& j9 E+ R【40】清华大学) K+ k0 n. m+ a& p) ]" M/ I
You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks9 a! Z5 q: q1 O1 S+ }
Qiushi Li (Tsinghua University); Yan Zhang (China Agricultural University); Ju Ren, Qi Li, Yaoxue Zhang (Tsinghua University)  \( r) y3 R% M' B

老战友

Rank: 5Rank: 5

1490

积分

0

贡献

500

奖励
发表于 2024-2-3 10:15:02 | 显示全部楼层
Wenyuan Xu (Zhejiang University)
: _  M- g5 |) b+ O- V徐文元好几篇; r% O/ G" X! i) U

高级战友

Rank: 4

454

积分

0

贡献

0

奖励
发表于 2024-2-3 11:53:22 来自手机 | 显示全部楼层
有2023年的数据吗

分区版主

Rank: 8Rank: 8

3463

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 12:26:14 | 显示全部楼层
0000 发表于 2024-2-3 11:53
  ]5 N$ R6 N5 m/ \" g有2023年的数据吗

  w7 g  H# n7 b/ [https://bbs.netbig.top/thread-26427-1-1.html

普通会员

Rank: 2

128

积分

0

贡献

0

奖励
发表于 2024-2-3 12:49:02 来自手机 | 显示全部楼层
徐文渊老师太强了…

分区版主

Rank: 8Rank: 8

3463

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 12:50:55 | 显示全部楼层
yxy 发表于 2024-2-3 12:49
7 e; m. z5 T3 Q6 V) o* N徐文渊老师太强了…
4 B6 C0 s1 \2 U
国内现在这几个顶会发文量虽然多了,但头部高校断层明显,基本都是浙大清华屠榜。
; b; \$ P( n" [( N0 P$ O' e其他高校偶尔有个一篇两篇的。
$ I4 V  g. f0 P8 A1 S# V  B# ~& c# U  q. e9 @* C
徐文渊老师不仅输出稳定,而且还有best paper

分区版主

Rank: 8Rank: 8

3463

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 14:55:15 | 显示全部楼层
本帖最后由 SmithArno 于 2024-3-8 16:25 编辑
/ _( _% {& I2 x
  {6 C- s- o) p! I8 [IEEE S&P 2024' P) a: C' _# ~2 T& A3 M
2 z( E8 z6 w  R8 Z
【1】华中科技大学* j7 t* e) ^& Z1 y: X) m
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabilitypp. 10-106 Y& {9 }) L# u5 `
by Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin
9 U8 U5 x: i+ j4 O% d% g4 _1 g- Y6 ^) T0 E7 ~; @$ \. r$ U! A- ?: x
【2】华中科技大学5 q! e- ]9 v9 T$ z
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementationspp. 13-13( H* m/ j6 w9 c, r% r3 i$ b) M! C
by Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing: L9 ~! r  q0 `3 c# q; s
2 s! F4 ^* |+ W# f7 @! G0 ]
【3】复旦大学
0 a6 L; m: E! c3 ^0 SWithdrawing is believing? Detecting Inconsistencies Between Withdrawal Choices and Third-party Data Collections in Mobile Appspp. 14-14
# a; |' H( Q% N- C: @# sby Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang6 U' I" N- [9 U( w5 }
, c5 m8 l3 O3 a
【4】浙江大学
1 ?! f# v* @. r, WPIRANA: Faster Multi-query PIR via Constant-weight Codespp. 39-39+ L1 ^2 B  W$ B6 c
by Jian Liu, Jingyu Li, Di Wu, Kui Ren1 M2 r/ y' a: U4 a/ [6 I
; K: E( Q* j, h: q) j4 U1 ]
【5】东南大学
8 N! }/ V! Y+ m4 H2 X5 [4 E( vPredecessor-aware Directed Greybox Fuzzingpp. 40-40" p0 Z1 {# A) P3 ]. q- t
by Yujian Zhang, Yaokun Liu, Jinyu Xu, Yanhao Wang0 a# [) w  R4 n; H

7 B& C4 `& `6 [$ S% `【6】中南大学
# o- x6 k; B) S5 F, |. H! sGuessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Informationpp. 42-42
5 [( W! q( P1 l4 }( ~4 Lby Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, Zhuo Lu  z' F) V* R2 E1 e* W
* q5 P; }. ?' ]! @. M0 V. Q0 \
【7】清华大学6 @7 F, I6 @* V/ \
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packetspp. 46-46: U$ B* y" S6 M! T/ r
by Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li
$ o4 d6 K" @+ J: \) L1 u
, O; d1 \7 S/ v2 w9 T4 x1 z【8】清华大学# p5 |; g/ b% T2 R+ H' Q
SATURN: Host-Gadget Synergistic USB Driver Fuzzingpp. 51-51
( u( C9 n" ^# ~5 b+ @. \$ uby Yiru Xu, Hao Sun, Jianzhong Liu, Yuheng Shen, Yu Jiang
, a9 b6 I/ X+ y# y$ a& s0 @8 N5 U" x; G4 Z, i2 q5 n. f0 Y: W
【9】北京大学
( i* C; x) W. w' }No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device MLpp. 52-52
- ^# M$ j7 H/ z1 ^' _, Qby Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Ding Li, Yao Guo, Xiangqun Chen# q! a. K. v; f6 Q0 n- ^

  x2 W) J3 h9 p) O1 l6 g  r【10】浙江大学% A2 l$ ?; s' x; Z2 H! ?
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attackspp. 53-53
3 L! E7 l' K  F8 |7 L1 ?8 Rby Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren3 `/ O5 P4 U" C/ Y! U& T

# ?8 W- M  N: H" N6 W% w* q【11】浙江大学5 n' G" G7 A0 Z0 m1 |6 P4 s" K5 L
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Featurespp. 56-563 X; a, m4 f( g+ Y& ]
by Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren
1 ~5 f3 n( N# ^: I
$ ]& }8 h1 J3 W【12】南开大学
! w+ O8 I& a. d& @" hSpringproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Lengthpp. 67-67
" n/ ]" l) y% X7 `  k  a( _9 _by Jianning Zhang, Ming Su, Xiaoguang Liu, Gang Wang% f8 V: @  P& N" ~9 a, M1 l. ^! U
7 G" L4 e* n2 [5 `
【13】浙江大学7 M1 U2 p5 L3 V7 N
BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wildpp. 68-68
7 H, B3 X; L' y6 i: M& uby Jie Wan, Jianhao Fu, Lijin Wang, Ziqi Yang8 v) W  [  o! K: I, A8 I5 l* g4 l) f
1 [3 [2 W' ^# Q1 T! l5 ^
【14】浙江大学& d, O9 {) `$ a3 Y
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devicespp. 70-707 o9 w  T- D- T: k5 H2 A
by Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah. P9 N( ?' l/ w2 o# i$ p3 a2 T
* ^. a/ R5 I6 m; O
【15】清华大学
% ^) }. d$ Q5 C6 G7 YTest-Time Poisoning Attacks Against Test-Time Adaptation Modelspp. 72-72
1 m( g# u9 ?( p' R, V% {by Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang
! d" Z& F' Z$ l2 @2 _) }
$ ^0 I* V: }2 ?& I【16】上海交大
5 E8 I# ?# E4 k) [& a/ _  XSrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformationspp. 97-97
; J% z  d2 t# U- ?by Borui Yang, Wei Li, Liyao Xiang, Bo Li) G, A2 T9 R: A2 z# L/ H. S  E) ^* i
% V; y& S0 U7 N3 d# p& {5 P* `
【17】重庆大学/ g1 t& e1 D  j5 q
From Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuningpp. 101-101
2 M" p5 x& b" }4 Z& Z( rby Qiao Zhang, Tao Xiang, Chunsheng Xin, Hongyi Wu
# b* N* ~' P% ]( t1 y% n0 \* C( i  x4 m. r( D# R) i
【18】东南大学
5 w6 z% i) `1 h% e/ Y& hTransferable Multimodal Attack on Vision-Language Pre-training Modelspp. 102-102
& D3 q( ]( e* T5 X$ fby Haodi Wang, Kai Dong, Zhilei Zhu, Haotong Qin, Aishan Liu, Xiaolin Fang, Jiakai Wang, Xianglong Liu
. s2 W: ~) ~% R
5 }8 r% ^* o' Y, z【19】清华大学
! u  J! O% B2 G8 R! H) [; f- jBULKOR: Enabling Bulk Loading for Path ORAMpp. 103-103( J. u+ ?& X! G$ J. F
by Xiang Li, Yunqian Luo, Mingyu Gao! B8 W2 C* c; T9 \
# j* S1 @1 F1 F) T# A# H0 e  {
【20】清华大学& B1 ^, ~4 f. |) v
Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delaypp. 109-109, T3 s3 u3 t: n0 Q
by Yuanliang Chen4 K. t! j  N' Z' {# r( I/ A# W

6 W9 @% {* y4 _! ]5 [【21】浙江大学) Y# i3 |  |( T2 R/ c8 ?: S' y& j
Understanding and Benchmarking the Commonality of Adversarial Examplespp. 111-111: s* f1 R8 a& m; W+ f' J3 L" B3 j/ f% a
by Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu& Q$ a4 p" K# v& N) a

! B+ f  U$ Y/ |- Y【22】电子科技大学
8 N( L2 a3 H" z* S5 F( nNURGLE: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulationpp. 125-1251 s9 r+ S  z- ~* l& G: J# w
by Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu; V! S- H4 N9 W  X5 ^

" A) i: z' s8 Z7 `8 g# u: u5 _【23】清华大学
# F  C  f! A/ ^1 s7 u# T. LLABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devicespp. 127-127
- `( s8 T6 @1 A; s( A& _1 Z8 pby Hangtian Liu, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Xiangzhi Wang, Guangming Gao
. d) e$ ^& n0 S4 q  F
% ^% X( q8 l3 T# W& U. \【24】清华大学" q# t+ r  z1 o
Break the Wall from bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewallspp. 129-129
" I, o7 S* i" nby Qi Wang, Jianjun Chen, Zheyu Jiang, Run Guo, Ximeng Liu, Chao Zhang, Haixin Duan
0 D8 K  @4 {/ D9 X# }  Z$ u/ P$ ^7 L4 h) c% }- `: A# x
【25】清华大学% o1 m( Q: ~* E; `3 ^2 a% ^
GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocolspp. 131-131
! {& D: _, p4 \- f) E' rby Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song/ ~. j- A% S9 i

& j6 A4 \% G4 m9 P& T7 I8 R$ M【26】清华大学% G9 B% y9 b3 B# G. K, z$ y* z
More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Servicespp. 138-138
: v3 O6 t) s" O' n( qby Yacong Gu, Lingyun Ying, Huajun Chai, Yingyuan Pu, Haixin Duan, Xing Gao& h. T* N; l5 P, f
! n7 B- u9 [* h) c- `* ?9 |$ [) }
【27】西电3 L1 ^# f; J; u+ P& c
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledgepp. 148-1481 T  c0 N7 U7 d; c7 h% n
by Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino$ u) b' @4 Q5 F% S8 B, y
4 g6 |% z( M" }. ~( i: m9 M% @6 E
【28】清华大学( P5 Z  `, m$ b/ X3 i
The Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellationspp. 149-149+ D/ i# C4 N$ [8 V0 a, f
by Wei Li, Yuanjie Li, Hewu Li, Yimei Chen, Yufeng Wang, Jingyi Lan, Jianping Wu, Qian Wu, Jun Liu, Zeqi Lai
; B: S3 A0 B& o6 `% O( G: D
  W7 W/ G2 R- e; ?' r- c【29】复旦大学/ J8 k4 j" c* C) f- X8 n
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Constructionpp. 150-150. J7 t- F' p, Q, L) Y& p
by Bofei Chen6 C. r0 m( a( F) N, n! L* r. e

# }. ?7 X- U, a; p6 ^【30】山东大学
& L* y# `; }7 I* t+ RAVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detectionpp. 155-155
' m* H1 u" p- u, O4 Uby Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao
- r1 F& X7 o1 `% T% ]
( U5 G, `1 b1 \2 O! h1 n【31】北京大学
6 C: D3 O. A5 [0 K% A, v0 ERethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelitypp. 160-1607 R( y, I9 b; k- N% t" ]7 z
by Xinming Wei, Jiaxi Zhang, Guojie Luo/ n1 r+ V% ^" P  b

, ~5 c- O- H( y: B

高级战友

Rank: 4

558

积分

0

贡献

0

奖励
发表于 2024-2-3 16:05:18 来自手机 | 显示全部楼层
清浙遥遥领先

新手上路

Rank: 1

11

积分

0

贡献

0

奖励
发表于 2024-2-3 16:22:26 | 显示全部楼层
浙大威武

中级站友

Rank: 3Rank: 3

175

积分

0

贡献

0

奖励
发表于 2024-2-4 23:36:20 来自手机 | 显示全部楼层
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records in Collision Attacks on SHA-2. Accepted by EUROCRYPT 2024, Zurich, Switzerland, May 26-30, 2024.   

分区版主

Rank: 8Rank: 8

3463

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-4 23:43:26 来自手机 | 显示全部楼层
不知而已 发表于 2024-2-4 23:36- G( |3 d  ^2 C. n4 i
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...

# x" z' G0 F4 d' A# k1 A哈这位是我学姐,王院士的学生。6 b: t3 k' U# J: b
23年她在欧密会就有文章,在SHA-2方面做得很好。

老战友

Rank: 5Rank: 5

1892

积分

1

贡献

800

奖励
发表于 2024-2-19 16:46:34 | 显示全部楼层
usenix security 2024 accepted papers) ?1 S( ~5 f8 V& ]
https://www.usenix.org/conferenc ... mer-accepted-papers

老战友

Rank: 5Rank: 5

1892

积分

1

贡献

800

奖励
发表于 2024-2-19 16:57:35 | 显示全部楼层
本帖最后由 大师大楼 于 2024-2-19 16:59 编辑
' L7 D4 A$ q0 X% k% v9 |3 b9 s/ D8 e6 H. ~- `7 @! T
usenix security 2024. B1 |& [  c, v  c5 l2 x  @) w
浙大 东南2
! l9 ]: m. @3 w  v2 E" y武大北邮等 17 s; e4 Y: ?+ \+ w! [& W% f
包括清华上交在内,大部分都是空白?

分区版主

Rank: 8Rank: 8

3463

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-19 16:58:58 | 显示全部楼层
大师大楼 发表于 2024-2-19 16:57  n( [. P$ y0 G) I/ B
usenix security 2024  t$ K# Q: B( y/ {2 Q8 y
浙大 2
& b$ q3 p/ t$ @/ n5 V! K武大北邮等 1
- D& a0 Y- ^3 N* E+ G3 L
还有一轮应该没出来

老战友

Rank: 5Rank: 5

1892

积分

1

贡献

800

奖励
发表于 2024-2-19 17:08:00 | 显示全部楼层
SmithArno 发表于 2024-2-19 16:58! H; K9 D3 t8 _9 B: ~8 o7 R; |- v
还有一轮应该没出来
1 a% ^" q8 q, }; T1 E0 e
嗯,耐心等待

老战友

Rank: 5Rank: 5

1261

积分

0

贡献

0

奖励
发表于 2024-2-19 19:29:03 来自手机 | 显示全部楼层
清华浙大太牛了!

初出江湖

Rank: 2

103

积分

0

贡献

0

奖励
发表于 2024-2-19 23:24:43 | 显示全部楼层
南京大学三项0蛋啊。1篇都没有啊

未关注公众号会员1

105

积分

0

贡献

0

奖励
发表于 2024-2-20 10:41:54 | 显示全部楼层
三大密码顶会算信息安全的成果吗

分区版主

Rank: 8Rank: 8

3463

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-20 10:48:29 来自手机 | 显示全部楼层
ecnuking 发表于 2024-2-20 10:41  b) j! z+ o% p
三大密码顶会算信息安全的成果吗
! C! G' l: ^4 _# [; Z
密码方向主要统计三大顶会和密码学顶级期刊JoC。  t! P9 k8 [) [" y8 |
目前有零星的信息,IACR还没出Accepted papers。

白银长老

Rank: 8Rank: 8

3346

积分

1

贡献

2000

奖励
发表于 2024-2-21 12:23:18 | 显示全部楼层
浙大徐文渊:连续三年担任网安四大顶会的大会联合主席* ?# q* _" w4 U
USENIX Security 2024
) Y2 z% |) `: @% B5 t- ^NDSS 20237 `6 k7 E6 l! [2 t3 j4 ~
NDSS 2022

白银长老

Rank: 8Rank: 8

3346

积分

1

贡献

2000

奖励
发表于 2024-2-21 12:24:27 | 显示全部楼层
近日,浙江大学共有12位教师担任国际信息安全顶级会议ACM CCS 2024的程序委员会委员,入选总人数排名全球高校第一。其中巴钟杰、申文博、冯博、刘金飞、罗梦、周亚金、娄坚、姚培森、秦湛(按姓氏笔画排序)9位教师来自浙江大学区块链与数据安全全国重点实验室。

白金长老

Rank: 10Rank: 10Rank: 10

5793

积分

0

贡献

0

奖励
发表于 2024-2-21 14:20:26 | 显示全部楼层
乡下 发表于 2024-2-19 23:29
& ]2 \" i# Q( h4 c1 m郑州信大,网安国家队核心队员之一,0蛋?

3 Y$ d2 n. V' V' }+ e0 o  a! o& A  t能发吗??

中级站友

Rank: 3Rank: 3

192

积分

0

贡献

100

奖励
发表于 2024-2-23 11:18:14 | 显示全部楼层
没有军信,都是假榜  J. `% G/ i& F; A# W9 r
看看邬院士的程控交换机,才有后来的巨大中华
4 U/ H; _; [$ V# g) X( X) o: R信息安全,缺了军信,可信度太低

老战友

Rank: 5Rank: 5

1892

积分

1

贡献

800

奖励
发表于 2024-2-23 11:49:38 | 显示全部楼层
本帖最后由 大师大楼 于 2024-2-23 11:51 编辑
- U4 `2 m' l+ p' n5 y
  g$ v; y9 Z6 u, ]" {/ c, G. i如果军方还是继续画地为牢,固步自封,不借助世界一流高校和院所的力量,那么俄罗斯就是前车之鉴。

老战友

Rank: 5Rank: 5

1892

积分

1

贡献

800

奖励
发表于 2024-2-23 11:51:14 | 显示全部楼层
academic818 发表于 2024-2-21 12:23+ z0 h& {  v& }& h- _/ I
浙大徐文渊:连续三年担任网安四大顶会的大会联合主席/ c) a" c/ `, J9 ?
USENIX Security 2024
8 G% F0 N7 E- [& _7 R1 h5 XNDSS 2023

- E' h7 D9 x6 ~9 p( v1 B7 E. g, [水平是特别高啦,但在中国现行体制下,还有待被发掘

老战友

Rank: 5Rank: 5

1310

积分

1

贡献

800

奖励
发表于 2024-2-23 12:09:24 | 显示全部楼层
大师大楼 发表于 2024-2-23 11:51
& u( {4 O- q& ?% @5 T" Y水平是特别高啦,但在中国现行体制下,还有待被发掘

8 I# `  D, a7 S" p5 N, I0 a* E她好像比较低调的,待在电气学院内,好像还拒绝提拔副院长

禁止发言

118

积分

0

贡献

0

奖励
发表于 2024-2-23 12:09:52 | 显示全部楼层
academic818 发表于 2024-2-21 12:23
, U6 R8 n1 o' f: m4 D浙大徐文渊:连续三年担任网安四大顶会的大会联合主席
5 ^& C6 K# Y9 O: ?7 bUSENIX Security 2024
" B5 @; h# N  sNDSS 2023
9 M. V0 g/ [  U1 g
这么多卖点,宣传太差,差不多的年龄,颜宁都院士了

高级战友

Rank: 4

481

积分

0

贡献

0

奖励
发表于 2024-2-23 12:26:05 来自手机 | 显示全部楼层
也不是每个人都适合做领导哈哈哈

中级站友

Rank: 3Rank: 3

175

积分

0

贡献

0

奖励
发表于 2024-2-25 19:07:24 来自手机 | 显示全部楼层
不知而已 发表于 2024-2-4 23:365 J. E  H# Y6 n7 n# f) q$ L( F4 e7 ~
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...

* k; B- ]7 X& z9 U3 H3 Y/ O华师大软院通讯今年还accepted一篇欧密 《Registered Functional Encryptions from Pairings》
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

论坛的微信公众号(二维码如下),关注获取更多科教信息

Archiver|手机版|网大论坛 ( (鄂ICP备2021013060号-2) )

GMT+8, 2025-8-28 22:38 , Processed in 0.215441 second(s), 22 queries , Gzip On.

鄂公网安备 42018502005923号

Powered by Discuz! X3.4

Copyright © 2001-2022, Tencent Cloud.