网大论坛

 找回密码
 立即注册
查看: 37127|回复: 71

2024年信息安全领域顶会统计(Eurocrypt/FSE)

[复制链接]

分区版主

Rank: 8Rank: 8

3550

积分

0

贡献

1600

奖励
发表于 2024-2-3 09:59:37 | 显示全部楼层 |阅读模式
本帖最后由 SmithArno 于 2024-3-8 16:28 编辑
9 Y3 X  N9 E1 W! T) d9 b7 j
: Q% t: E5 w% Z2 Z按照第一作者单位统计(信息安全四大顶会+密码三大顶会)3 {' p* u+ _2 R$ W: _1 s
NDSS 2024概览( j, S$ c0 C; e7 R/ z3 q
清华大学13篇,浙江大学9篇,华中科技大学3篇,南方科技大学2篇。3 L6 n% O7 t6 g0 O" G- U+ g4 C; M
东南大学、中国海洋大学、北京航空航天大学、山东大学、北京大学、中山大学、武汉大学、中科大、NUDT、上海科技大学等等1篇。8 G) U5 f# @3 W+ o
' E& n' e2 l. J3 m5 U( I
CCS 20240 q8 d3 y4 n* C: u; c& Q

8 |' E7 b! o5 L# R/ oIEEE S&P 2024概览
5 g8 S) a- u1 F4 S4 w) ?2 }清华大学10篇,浙江大学6篇,华中科技大学、复旦大学、东南大学2篇。其他重庆大学、山东大学、南开大学、西电、成电等等1篇。6 n3 q* K: X# I. I) a9 A
! z- }9 Y- P* l" K$ B6 Z4 [# Y
Security 2024
8 v* R7 X; r! V  A/ i5 j

) r1 _3 y+ C: ]5 \3 r+ qEurocrypt 2024
. b* `0 O4 q* `( s, f华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。
9 Q4 T1 H+ [" w5 s9 K& T- m4 h" K+ v7 x- w) y  ^

5 ^" |0 x' W& L5 c- ]  O8 x
! C4 ~; E6 l6 y获奖情况:
: I7 N- v/ e( ^! y6 X' Q% S【1】浙江大学获得NDSS 2024杰出论文奖。9 j/ X4 ?$ ~% j" N. [
% u' ?5 z8 E: i2 N! E' w
3 h( c9 c# B/ d/ ]
" |4 F/ N4 }/ J% K7 v0 L" H
! `( @' y8 k( q
: z1 s+ ^, u) m
& w( x' x# k# p6 G  X1 J+ Q

分区版主

Rank: 8Rank: 8

3550

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-3-4 09:47:58 | 显示全部楼层
Eurocrypt 2024,共接收105篇论文,国内共8篇,华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。  U' H4 u* ~3 u

  e. E6 U2 q5 i- j# |! Q9 ~3 j【1】山东大学
( H8 f5 }- R% N. xMassive Superpoly Recovery with a Meet-in-the-middle Framework -- Improved Cube Attacks on Trivium and Kreyvium
' H% d. Y2 E+ l1 w; j; {0 n8 A  n! \4 ~Jiahui He, Kai Hu, Meiqin Wang, Hao Lei
$ t0 {; |1 T1 S! j* c' f* pShandong University, Nanyang Technological University
% o$ ~& H% a* e( ]$ e5 _
! E1 L3 a. ~, a& M1 L# u# H/ Z【2】清华大学1 g) J, o0 R/ ~! P
Accelerating BGV Bootstrapping for Large $p$ Using Null Polynomials Over $\mathbb{Z}_{p^e}$
6 d$ c$ M) B% R! a9 |Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang
2 I: W8 o* K" o- ?3 UTsinghua University% s; B. s, j' l6 r: j; f, _

( w+ _- [; b2 ~$ x2 H- ~; ~: n【3】华东师大! A; x! |: k7 [- u
Registered Functional Encryptions from Pairings
7 r( L2 }4 ~9 j2 I1 kZiqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian7 k: G  {* h$ \6 W3 V
East China Normal University, Shanghai University, Shanghai University of Electric Power$ k% _- o6 g' T8 q
0 e6 W+ Y; z! H
【4】南科大
5 F& S7 m& F! G$ i- eIntegrating Causality in Messaging Channels
9 ^3 L7 j. N$ B) e7 fShan Chen, Marc Fischlin
# H7 f4 z% m1 f$ T+ e2 n/ E. JSouthern University of Science and Technology, TU Darmstadt
) V0 i& t% u- l+ a5 g5 |: M# u) z, A, S9 T! o; F1 f7 o& \
【5】暨南大学& G4 X& |0 `  d3 A1 N
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond6 q- q4 y  A0 F% T3 G
Ling Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng
' w* S5 i" A, ]9 |, vCollege of Cyber Security, Jinan University, Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering
! Y  m, v$ R: e0 ^6 @: a/ |5 r& u6 v# O5 q# x5 ?7 Q
【6】上海交大0 P$ d6 q  L8 ?
The Hardness of LPN over Any Integer Ring and Field for PCG Applications( ]9 ~4 P; [% E3 r3 i/ ^% M3 Z
Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu7 D8 c, h) A) D9 [/ R/ |( d
Shanghai Jiao Tong University, Shanghai Qi Zhi Institute, Northwestern University, State Key Laboratory of Cryptology0 L0 t( |+ r2 e; S4 s+ y1 D$ R6 ?4 V

! Z1 _3 t& i2 u- t% }9 c【7】上海交大
: J) Q% R5 u, A' G1 ~2 c# EUniversal Composable Password Authenticated Key Exchange for the Post-Quantum World
* o. |) q* x% c/ }: W- b* wYou Lyu, Shengli Liu, Shuai Han
. d2 t7 ~9 F% M6 \$ ?Shanghai Jiao Tong University
" y) M8 H, P- q& e( }
! a2 b% v: x# I- n5 g" h【8】华东师大) E9 C6 w  g- h/ T7 d
New Records in Collision Attacks on SHA-2  H* j! F5 H' F- b7 O+ ~
Yingxin Li, Fukang Liu, Gaoli Wang
9 _" \8 V; N/ V2 ^- IEast China Normal University, Tokyo Institute of Technology
9 v3 E; x& F3 [, V; j* O  k1 x. u4 y9 c; _$ G

分区版主

Rank: 8Rank: 8

3550

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 09:59:41 | 显示全部楼层
本帖最后由 SmithArno 于 2024-2-3 10:06 编辑 : i( u. X" Q/ ?
0 [* t) R$ B. J! x  ^/ t
NDSS 2024会议主页:https://www.ndss-symposium.org/ndss2024/accepted-papers/
" h; A; d+ u5 B3 e/ S( ^; L, Z# s% z  N
【1】山东大学, C5 E; p5 a5 U- @: `- Q/ A" g
Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols
4 g$ b; P8 L  m, bShichen Wu (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Puwen Wei (1. School of Cyber Science and Technology, Shandong University 2. Quancheng Laboratory 3. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Ren Zhang (Cryptape Co. Ltd. and Nervos); Bowen Jiang (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education)
/ w- f$ i% a0 t$ h+ u/ p
+ t4 G, @3 Y6 c. J- Y【2】东南大学1 }1 m% Z2 n8 [9 l! f3 g
LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems
8 W; E3 R+ z+ [; Z5 f  O, O5 yHuaiyu Yan, Zhen Ling, Haobo Li (Southeast University); Lan Luo (Anhui University of Technology); Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang (Southeast University); Junzhou Luo (Southeast University, Nanjing, P.R. China); Xinwen Fu (University of Massachusetts Lowell)4 ^- n; g& i) z

; g5 g0 C) |/ s% ^' W【3】浙江大学8 _  z! Z& b6 H+ m4 Y4 g( l9 p
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards
  @2 B; x% s$ R; }8 Y, |9 \$ n" RQinhong Jiang, Yanze Ren (Zhejiang University); Yan Long (University of Michigan); Chen Yan (Zhejiang University); Yumai Sun (University of Michigan); Xiaoyu Ji (Zhejiang University); Kevin Fu (Northeastern University); Wenyuan Xu (Zhejiang University)
* n# [) ~9 R$ z7 c6 x& \4 }/ A
8 x5 d  @' }" ~% t% X8 Y【4】浙江大学
: \9 C- y. c. q9 G, bInaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time! p. Q* i: q+ G6 G
Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)  ~2 d! V, t* \8 a7 M, \/ r- S1 b+ `3 p
; C& W+ D& ]4 }" H
【5】北京航空航天大学
# Q8 s& g6 u0 D9 CHEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation' I3 J2 @$ m1 e: i- h
Song Bian, Zian Zhao, Zhou Zhang, Ran Mao (Beihang University); Kohei Suenaga (Kyoto University); Yier Jin (University of Science and Technology of China); Zhenyu Guan, Jianwei Liu (Beihang University)
" H: J. s1 W7 X/ ~
  I) S% ]$ h2 x9 W+ O( p【6】清华大学
: I& T0 C0 Z8 F+ H2 g" N8 GLow-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic4 L6 Z. A* ]/ T$ `; i3 k
Yuqi Qing (Tsinghua University); Qilei Yin (Zhongguancun Laboratory); Xinhao Deng, Yihao Chen, Zhuotao Liu (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Jia Zhang, Qi Li (Tsinghua University)
5 o1 B5 r" E' Y  q5 n: Z+ w3 {1 H- f# D" \+ s
【7】浙江大学
# E8 k/ ~7 P1 @5 w  KSymphony: Path Validation at Scale
* M: ?) {9 e$ N  M8 e& Q1 I4 rAnxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren (Zhejiang University)
- F- {6 ]( o2 E' v3 R( A9 `6 e0 p6 ?- H, O; K
【8】清华大学
% Y+ P# |; c1 Z  f5 mBreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet
% Y& O5 ^4 c% x, ?; X- YChuhan Wang, Yasuhiro Kuranaga, Yihang Wang (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Linkai Zheng, Xiang Li (Tsinghua University); Jianjun Chen (Tsinghua University; Zhongguancun Laboratory); Haixin Duan (Tsinghua University; Quan Cheng Lab; Zhongguancun Laboratory); Yanzhong Lin, Qingfeng Pan (Coremail Technology Co. Ltd)
. ?. Z- l" {' t5 `" ]2 i+ ^3 \# ]1 A5 ]  E- E$ n6 |; u: W% p: V
【9】浙江大学' n6 E) V& z7 N
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency
! I2 K  n- k0 {( j* Z; L' K* `7 zJiacheng Xu, Xuhong Zhang, Shouling Ji (Zhejiang University); Yuan Tian (UCLA); Binbin Zhao (Georgia Institute of Technology); Qinying Wang, Peng Cheng, Jiming Chen (Zhejiang University)4 ]# T+ V1 T5 z

. O# {5 Y1 b- o- I【10】清华大学+ A5 L: }$ W4 d# l3 d
ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection
+ A0 d7 a8 M$ g. o, |& o# L8 FKunpeng Zhang (Shenzhen International Graduate School, Tsinghua University); Xiaogang Zhu (Swinburne University of Technology); Xi Xiao (Shenzhen International Graduate School, Tsinghua University); Minhui Xue (CSIRO’s Data61); Chao Zhang (Tsinghua University); Sheng Wen (Swinburne University of Technology)
, z2 B& x6 V/ j' \. m/ O( I! K: U, O7 K5 Z% f  A
【11】中国海洋大学  r3 i; ?& O+ F9 I/ q' e
Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack$ N, h* q2 s$ O: t, j* V
Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu (Ocean University of China)
2 H% R7 _. A+ S% g& n  T+ ], r9 u! Y% {" B
【12】浙江大学
3 p  q* @" ~3 n0 t. GORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning
; A' y& z5 t- m. e3 YLinkang Du (Zhejiang University); Min Chen (CISPA Helmholtz Center for Information Security); Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen (Zhejiang University); Zhikun Zhang (Stanford University); A' j* d: N; n5 k6 E
' F' w' @8 C8 d: D( A) t2 q1 D( ~
【13】北京大学* e) r" j3 Q/ Z4 F& S9 t7 h
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
7 C7 l: n8 j, N# c, K7 q- X" DShaofei Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Feng Dong (Huazhong University of Science and Technology); Xusheng Xiao (Arizona State University); Haoyu Wang (Huazhong University of Science and Technology); Fei Shao (Case Western Reserve University); Jiedong Chen (Sangfor Technologies Inc.); Yao Guo, Xiangqun Chen (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Ding Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University)
* z$ b* g% k1 ?4 z  s" N
1 a8 s  n; W- j" O【14】浙江大学% i8 X* c2 Z! s& y( J7 f5 g4 R  C
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors
& B. K: {9 z& x% sChengkun Wei, Wenlong Meng (Zhejiang University); Zhikun Zhang (Stanford University); Min Chen (CISPA Helmholtz Center for Information Security); Minghu Zhao (Zhejiang University); Wenjing Fang, Lei Wang (Ant Group); Zihui Zhang, Wenzhi Chen (Zhejiang University)8 ]  o, O- h5 |) I/ d
6 \' Z2 h( G% o8 f8 m
【15】湖南大学
- \, T' Q; A, N& T) [# ^2 v# uEavesdropping on Black-box Mobile Devices via Audio Amplifier’s EMR
6 @/ Z) {# I4 ?! V2 ^" C' `' |Huiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Kenli Li (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Zheng Qin (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Mingxing Duan (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Yong Xie (Nanjing University of Posts and Telecommunications, Nanjing, China); Daibo Liu (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Ming Li (The University of Texas at Arlington, USA)
- X! b) J* l5 {) f2 z" c9 D8 N8 l) O; _1 g" B% b  X3 Z# R  S
【16】上海交大; ]+ O; P6 h5 v. r
Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models( ^% N8 M) e+ p7 a9 z6 n
Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang (Shanghai Jiao Tong University); Chenghu Zhou (Chinese Academy of Sciences); Bo Li (Hong Kong University of Science and Technology)) w+ C$ n$ }& Y% D1 I0 ^

, }' P' X! C9 U, W1 r8 `【17】清华大学
' W# q( T' g; E* \+ E2 p3 h& nExploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks! m5 {1 j# E& y2 f$ D3 k8 N
Yuxiang Yang, Xuewei Feng, Qi Li (Tsinghua University); Kun Sun (George Mason University); Ziqiang Wang (Southeast University); Ke Xu (Tsinghua University)) c9 ^' {$ _1 \( \4 p% s
' X: a) T2 E% ~2 S* g* g& B
【18】清华大学' q, O+ ~) c: [' V- n
CP-IoT: A Cross-Platform Monitoring System for Smart Home8 \5 G+ B+ H* r8 R* d
Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang (Tsinghua University); Linna Fan (National University of Defense Technology); Chenxin Duan (Tsinghua University)' \# @+ c% q: {. P  T% H% m7 o4 f

+ _1 w3 d* G9 ?( H9 y+ b: d0 }: r【19】清华大学
: ?; E& F- x' ^$ G/ J; aLoRDMA: A New Low-Rate DoS Attack in RDMA Networks
  e% O3 B  P4 CShicheng Wang (Tsinghua University); Menghao Zhang (Beihang University & Infrawaves); Yuying Du (Information Engineering University); Ziteng Chen (Southeast University); Zhiliang Wang, Mingwei Xu (Tsinghua University & Zhongguancun Laboratory); Renjie Xie (Tsinghua University); Jiahai Yang (Tsinghua University & Zhongguancun Laboratory)
* n% |+ V# q2 q! R  M* _4 T% F6 Z
【20】清华大学
2 ?4 \3 ?/ i3 [! k9 e9 K, ]- QReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing
( `, \2 G: [5 p8 M1 L: K# ALinkai Zheng, Xiang Li, Chuhan Wang, Run Guo (Tsinghua University); Haixin Duan (Tsinghua University; Quancheng Laboratory); Jianjun Chen, Chao Zhang (Tsinghua University; Zhongguancun Laboratory); Kaiwen Shen (Tsinghua University)
/ f8 A1 w5 B0 L3 U& w" }& a( d! G$ }& k: h- h  y
【21】清华大学# l8 h' n5 G$ n' ?0 b9 t
Automatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization4 m/ B- g  ]6 B" J% j
Quan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang (Tsinghua University)' {- @9 @( z' P. j
- Z3 o3 m7 R! b: z# A
【22】清华大学/ r, E1 \+ M* ]
DynPRE: Protocol Reverse Engineering via Dynamic Inference
' M6 ^% t: u1 e6 ]Zhengxiong Luo (Tsinghua University); Kai Liang (Central South University); Yanyang Zhao, Feifan Wu, Junze Yu (Tsinghua University); Heyuan Shi (Central South University); Yu Jiang (Tsinghua University)
) C, I, ]- R7 S! \% Z) I- J6 T
, S- s, W2 ?+ Y7 K; o+ a; S【23】浙江大学+ D& A; S, T1 d; t+ c6 W/ ^
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention
+ b! s9 g2 m) D7 ~) v) m& |Lujia Shen, Yuwen Pu, Shouling Ji (Zhejiang University); Changjiang Li (Penn State); Xuhong Zhang (Zhejiang University); Chunpeng Ge (Shandong University); Ting Wang (Penn State)4 ]! k, y& U5 p2 n4 m

0 \  W1 w  k3 k: G) y: K【24】中山大学7 X- j2 I6 |, {/ H: i4 q  ?
Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem" A6 E" Z0 {/ a
Jiangrong Wu, Yuhong Nan (Sun Yat-sen University); Luyi Xing (Indiana University Bloomington); Jiatao Cheng (Sun Yat-sen University); Zimin Lin (Alibaba Group); Zibin Zheng (Sun Yat-sen University); Min Yang (Fudan University)9 F2 I! ~! I8 M% P2 w$ n" H
6 B3 e) l8 W/ `+ g
【25】浙江大学
4 J7 X+ d9 V9 B4 t3 c6 w( B5 mCamPro: Camera-based Anti-Facial Recognition
0 m* A9 [( g$ L) N9 rWenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)
6 U$ [! f9 H; P2 p6 a9 W* g! n9 k( l& x) z3 i  h7 p# G
【26】中国科学技术大学7 v3 p( L7 r  f  f; J' T/ F
Detecting Voice Cloning Attacks via Timbre Watermarking  ]/ l# J7 ?% |
Chang Liu (University of Science and Technology of China); Jie Zhang, Tianwei Zhang (Nanyang Technological University); Xi Yang, Weiming Zhang, NengHai Yu (University of Science and Technology of China)8 O) V/ D/ x  C

* p7 o1 ?0 s& i【27】清华大学. [% e% |4 S4 Z. N* A
Understanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed& o" o5 ^: x  B4 y4 u0 m( q4 R2 ]
Lancheng Qin (Tsinghua University, BNRist); Li Chen (Zhongguancun Laboratory); Dan Li (Tsinghua University, Zhongguancun Laboratory); Honglin Ye, Yutian Wang (Tsinghua University). v$ G7 V$ D, e+ t( c6 R9 W* D
2 A2 P6 w! u6 f! {6 P; g
【28】清华大学  U9 x# x; H7 b# k! m
dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository9 v; N0 g( x  I& ]% X6 g1 B" ]
Yingying Su, Dan Li (Tsinghua University); Li Chen (Zhongguancun Laboratory); Qi Li (Tsinghua university); Sitong Ling (Tsinghua University)- u" N" f2 c1 ?, s( ~

$ I! ?% h( n, \【29】清华大学
( c9 O8 l! u" w, z$ {  I9 h1 Q  ^Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption
% O& f  G# b3 D4 J! KXuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu (Tsinghua University)6 Y/ N/ l1 N; Z9 |) e: {# s

+ i. J' X! s$ n( u【30】NUDT9 q3 G) j9 T. o& q/ U+ K  m/ ^* o
DeepGo: Predictive Directed Greybox Fuzzing( E( B4 F& y- ]- x
Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang (National University of Defense Technology)
1 u! Q2 b8 R8 k1 l6 d" W, [' E9 {2 _" y' D' f$ ^$ @( _6 V/ E; F
【31】上海交大5 d2 r4 J5 I" G5 N* i
ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token
+ V" j$ d! Z6 e3 s+ WGe Ren, Gaolei Li, Shenghong Li, Libo Chen (Shanghai Jiao Tong University); Kui Ren (Zhejiang University)* ?( _- B# V* ^) }- g6 {/ S9 H) N5 M, l

, a+ D) q! K9 F& @/ `【32】华中科技大学
- q. Z% ]4 c* k7 X% oPrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound6 _8 c" r& H2 u
Man Zhou, Shuao Su (Huazhong University of Science and Technology); Qian Wang (Wuhan University); Qi Li (Tsinghua University); Yuting Zhou, Xiaojing Ma (Huazhong University of Science and Technology); Zhengxiong Li (University of Colorado Denver)
$ Y' r3 ?5 t5 J
+ ^, b# [$ ~/ a【33】南方科技大学
3 a4 P" u0 b) R) C2 H4 ySeparation is Good: A Faster Order-Fairness Byzantine Consensus- k, ]8 Y% [! ^% C
Ke Mu (Southern University of Science and Technology, China); Bo Yin (Changsha University of Science and Technology, China); Alia Asheralieva (Loughborough University, UK); Xuetao Wei (Southern University of Science and Technology, China & Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation, SUSTech, China)- [3 O% U$ e- S+ S

8 U; h* Y+ a) Y7 s, X【34】南方科技大学
$ y  {! N0 Q1 {# N4 j+ a0 ~6 iCAGE: Complementing Arm CCA with GPU Extensions, ~% ~  L$ @& j/ {4 b; K: c
Chenxu Wang (Southern University of Science and Technology (SUSTech) and The Hong Kong Polytechnic University); Fengwei Zhang, Yunjie Deng (Southern University of Science and Technology (SUSTech)); Kevin Leach (Vanderbilt University); Jiannong Cao (The Hong Kong Polytechnic University); Zhenyu Ning (Hunan University); Shoumeng Yan, Zhengyu He (Ant Group)2 O- \2 y. A& I! T6 J  W( h  [
# ?9 F' E% c- o. m
【35】华中科技大学
4 Y! w* h! S0 O4 VDorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses
9 C1 Z) Y; C8 K1 HChaoxiang He, Xiaojing Ma (Huazhong University of Science and Technology); Bin Benjamin Zhu (Microsoft Research Asia); Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin (Huazhong University of Science and Technology); Dongmei Zhang (Microsoft Research)
. P( K4 U6 D( Z
$ @9 V) e# c) @6 z# }! G% ~【36】华中科技大学# k: g) y1 L  W' c
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit4 \, J- M+ q5 D
Pengxiang Ma (Huazhong University of Science and Technology); Ningyu He (Peking University); Yuhua Huang, Haoyu Wang (Huazhong University of Science and Technology); Xiapu Luo (The Hong Kong Polytechnic University)
; ?" B; [1 L4 W) l; Z4 @- E6 l8 c- {# S, x6 d# T0 B  @, c
【37】浙江大学
# f& [2 ?% v  @1 x1 _; NUniID: Spoofing Face Authentication System by Universal Identity9 W! [& p' v* Z7 x+ n
Zhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji (Zhejiang University); Wenyuan Xu (Zhejing University)
: R/ d  a/ e8 l& J, a0 e
- o+ n) j* w. D6 c/ c& ^【38】武汉大学
: }; X6 C5 c. @2 Z2 s) |From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices
/ g" c" ]+ V$ O# `% j1 oYue Xiao (Wuhan University); Yi He (Tsinghua University); Xiaoli Zhang (Zhejiang University of Technology); Qian Wang (Wuhan University); Renjie Xie (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Qi Li (Tsinghua University)% O7 f- I* x' Q5 w2 \
5 _! K, r8 H. ^
【39】上海科技大学9 q* m+ n% R# c  `* ^8 E
SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems
) J# r% f8 z, S4 W& `Guangke Chen (ShanghaiTech University); Yedi Zhang (National University of Singapore); Fu Song (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences)4 R9 E8 h! n3 F" |% s" B' s
% S4 ?8 i; a" J2 G
【40】清华大学5 j" `2 P4 b) v9 g1 H
You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks
# o, x' s7 A9 k" wQiushi Li (Tsinghua University); Yan Zhang (China Agricultural University); Ju Ren, Qi Li, Yaoxue Zhang (Tsinghua University)
( ~( n5 V$ z" Y1 j  U

老战友

Rank: 5Rank: 5

1491

积分

0

贡献

500

奖励
发表于 2024-2-3 10:15:02 | 显示全部楼层
Wenyuan Xu (Zhejiang University)  p" H8 j% Z3 w9 d+ C
徐文元好几篇
  Q  x  L4 I' }, M  M) N

高级战友

Rank: 4

490

积分

0

贡献

0

奖励
发表于 2024-2-3 11:53:22 来自手机 | 显示全部楼层
有2023年的数据吗

分区版主

Rank: 8Rank: 8

3550

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 12:26:14 | 显示全部楼层
0000 发表于 2024-2-3 11:53
/ I. a, Q5 [3 \( P有2023年的数据吗
. L. N) n, Y( F: q9 Y) }
https://bbs.netbig.top/thread-26427-1-1.html

普通会员

Rank: 2

129

积分

0

贡献

0

奖励
发表于 2024-2-3 12:49:02 来自手机 | 显示全部楼层
徐文渊老师太强了…

分区版主

Rank: 8Rank: 8

3550

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 12:50:55 | 显示全部楼层
yxy 发表于 2024-2-3 12:49% `) ]5 T. x# m" P) c
徐文渊老师太强了…

% G6 J7 [. ]  E5 ?2 D" K国内现在这几个顶会发文量虽然多了,但头部高校断层明显,基本都是浙大清华屠榜。
8 V. m( k/ R/ J其他高校偶尔有个一篇两篇的。& y2 C. T3 m# ?. E7 E+ z

1 J" G/ a8 T) r' u! L- ?1 i* }徐文渊老师不仅输出稳定,而且还有best paper

分区版主

Rank: 8Rank: 8

3550

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 14:55:15 | 显示全部楼层
本帖最后由 SmithArno 于 2024-3-8 16:25 编辑
: v" `1 b! |7 ~, w- E
% m5 j( s3 u5 K( g% A4 Q: e0 OIEEE S&P 2024/ }0 l# p& l6 ?4 u' S+ a) b9 ?4 d

6 N* {+ c1 v/ @) [! v* T" o: n8 O3 G【1】华中科技大学
' Y( {& H3 P7 `4 R! @Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabilitypp. 10-10% [6 F: a9 |% g. [# A5 }' {# z
by Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin
+ R4 l1 w; i/ V: _- L% @
2 z5 J: U$ p) z【2】华中科技大学1 P0 ^' ]( k1 W" g: p3 W
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementationspp. 13-130 O) ^9 m6 m+ F  T
by Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing
# u9 b5 P( H7 q  A2 _/ I' d' b5 ?+ z+ D! M" v) E
【3】复旦大学
8 \" j1 t% {+ V0 x: G0 }Withdrawing is believing? Detecting Inconsistencies Between Withdrawal Choices and Third-party Data Collections in Mobile Appspp. 14-14
; B0 t: u! V7 hby Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang
( p8 w% n, U" C$ z6 K2 I8 z) D: k5 b3 i  X
【4】浙江大学: a4 E: B/ i0 f8 d2 z
PIRANA: Faster Multi-query PIR via Constant-weight Codespp. 39-39# d+ g0 ?/ x  L8 h4 Z
by Jian Liu, Jingyu Li, Di Wu, Kui Ren
. f* p$ t8 f# g& O3 j  ]. T6 g8 r0 n8 _
【5】东南大学+ ~- y( _2 u% L, w
Predecessor-aware Directed Greybox Fuzzingpp. 40-40& s# T( Z& T: n; v, }  A
by Yujian Zhang, Yaokun Liu, Jinyu Xu, Yanhao Wang" A. _1 V0 O3 p' w- Y3 }, t) j

: `6 |8 L' n9 B" H【6】中南大学
0 j: F3 f7 a: R) hGuessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Informationpp. 42-423 e$ [* ^% @6 y! W
by Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, Zhuo Lu
# y/ f% D1 f6 O0 o6 c- `- V9 g5 T/ y* |  Y7 R6 U4 R7 \% b; F5 J
【7】清华大学
2 p: C' ?' K5 o6 B; f8 n6 f  a- BTuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packetspp. 46-46& h- H' _5 D3 V2 B' Q. B/ M- S. E$ e
by Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li( P, V  [  Y! o% q' p
/ q8 @2 C2 b+ W) W  Y, q; P
【8】清华大学
+ `: z& h1 O$ K$ @6 qSATURN: Host-Gadget Synergistic USB Driver Fuzzingpp. 51-51
& t1 H& L3 w: jby Yiru Xu, Hao Sun, Jianzhong Liu, Yuheng Shen, Yu Jiang
, S$ q  y; y( Y* p! x1 J. n5 N# `5 d' m6 m8 I  n
【9】北京大学
; z4 z# N0 ^4 r+ ]6 B2 oNo Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device MLpp. 52-52
4 \) V: C- W$ N/ eby Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Ding Li, Yao Guo, Xiangqun Chen& ?+ ^3 U' ]" Q. ?7 C
4 D, O6 e; E. n0 M& b/ ~
【10】浙江大学
7 j, W0 Y8 Y) v$ f8 YText-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attackspp. 53-536 A' [1 U6 K" r# _+ e
by Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren
6 G+ D/ w8 K( c$ e2 q3 j6 y/ [0 a- _0 f
【11】浙江大学5 O7 b* E( U9 ]. n
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Featurespp. 56-569 Q0 s5 @+ S. s+ ^- i
by Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren" J( ~. P" F5 H4 K) E+ C; p2 S

6 i/ A2 p# `5 B& m7 }# F- G【12】南开大学
4 \+ E& x7 {" g. GSpringproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Lengthpp. 67-67$ }7 r1 p  Y. d8 Z' ?
by Jianning Zhang, Ming Su, Xiaoguang Liu, Gang Wang
5 J3 @: z9 t: N" u  V3 ?/ H: I7 Y8 z& j  q: D1 |. r3 H
【13】浙江大学! K  V7 k' }1 _
BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wildpp. 68-68) c0 d# ?2 j7 D% |$ @6 Y' D/ V& ?
by Jie Wan, Jianhao Fu, Lijin Wang, Ziqi Yang' W/ W9 f7 Q4 n( M) |" i0 f
% T+ I6 B) M* _1 `7 [' B
【14】浙江大学
# \. Z/ X8 Y, B! ~9 ~SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devicespp. 70-70: |* w6 z* u3 H' V- L
by Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah
6 }1 L- V* ]+ u" T
+ W2 {5 x  E* ]. ~/ e【15】清华大学4 C" `- m" `9 U; @
Test-Time Poisoning Attacks Against Test-Time Adaptation Modelspp. 72-722 _' C6 O; r/ Z0 j8 u
by Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang3 J* j* ~( F0 h" ?0 z9 u

' ~# u, m5 j9 g【16】上海交大: P) ~$ N# i  y4 V  V' ?
SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformationspp. 97-97
3 o0 ~9 s( V( H( m2 E8 q1 R5 q% {& vby Borui Yang, Wei Li, Liyao Xiang, Bo Li
# g" h: g* C: M8 w
4 B& g0 o  a& X! c【17】重庆大学# _- x% E" t( j8 _1 B
From Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuningpp. 101-101
$ C! n" |: v6 ^3 ?2 [( Xby Qiao Zhang, Tao Xiang, Chunsheng Xin, Hongyi Wu
7 f0 d$ |2 n7 J5 j( G5 u
( T2 J  n( f7 |. t: a【18】东南大学
: E9 o  _+ h) a1 m7 k* y; DTransferable Multimodal Attack on Vision-Language Pre-training Modelspp. 102-102
  V! f' q6 k# h) y1 ]6 Aby Haodi Wang, Kai Dong, Zhilei Zhu, Haotong Qin, Aishan Liu, Xiaolin Fang, Jiakai Wang, Xianglong Liu, R) B# R. S# N! r

; T( w5 K, ^% Y. t【19】清华大学
: M! j$ {$ v8 ~. C2 XBULKOR: Enabling Bulk Loading for Path ORAMpp. 103-103
9 I% n; Y( ^' tby Xiang Li, Yunqian Luo, Mingyu Gao
* A7 U& X2 k$ F7 ^9 C3 r' G6 \" H
【20】清华大学
( c: H) G7 m: e8 ^  H/ YChronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delaypp. 109-109! R0 i! ~5 u' N" z
by Yuanliang Chen
' u" X, ^3 a/ _0 N; X, F4 O8 f" c2 `& E6 H2 c/ Q
【21】浙江大学6 J  l9 E; a% l) T& ]7 S
Understanding and Benchmarking the Commonality of Adversarial Examplespp. 111-111, h' p: c) a; U5 c' S
by Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu2 K* K; {& q: `: _

  g" A- z0 a& U4 J; z; |【22】电子科技大学
" J+ S2 K) O0 w2 NNURGLE: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulationpp. 125-125  e3 [% y6 {9 {5 o
by Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu
( S/ h. F* k. N6 W( X! V) v0 w5 Z3 X/ C$ o! T
【23】清华大学
0 |- d+ p' |) ]8 m+ _& ~. h, ~LABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devicespp. 127-127
4 W! d% i. d8 I0 B% Fby Hangtian Liu, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Xiangzhi Wang, Guangming Gao7 {3 a, ~& L) d
3 D4 |) R' i& g0 i% C# ~2 K
【24】清华大学' h" {0 _( t  j$ f( q( R
Break the Wall from bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewallspp. 129-129; Y( \1 C' @0 P0 l* w9 K: S
by Qi Wang, Jianjun Chen, Zheyu Jiang, Run Guo, Ximeng Liu, Chao Zhang, Haixin Duan3 S& m% x, Y8 g' a- X: R2 Z
0 J# v, x( \8 L9 \4 C4 N- {
【25】清华大学
4 \4 C. y8 L" p& _GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocolspp. 131-131$ a! l. f+ C' w) ~' ?
by Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song
0 n# K! f5 @- L7 q0 M9 K: u5 L( R% _. V& Z7 A( T5 ~( [
【26】清华大学
8 l8 B6 _% b. k8 a2 h& |" e/ jMore Haste, Less Speed: Cache Related Security Threats in Continuous Integration Servicespp. 138-138: r" D0 k* I" \: d
by Yacong Gu, Lingyun Ying, Huajun Chai, Yingyuan Pu, Haixin Duan, Xing Gao, D% P! I( e- H# Q" j' E* z' ]2 X
& d: j9 x( B2 ^& V
【27】西电
7 ?; p) q0 R/ l+ xFlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledgepp. 148-148/ o' v- |  X# d7 [+ f
by Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino% s" X3 j4 U/ k: B& k
9 n( ?- q9 j/ D2 |' y
【28】清华大学
. l6 s) \0 f  G$ VThe Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellationspp. 149-1491 d/ P- @8 v/ ~6 D" q
by Wei Li, Yuanjie Li, Hewu Li, Yimei Chen, Yufeng Wang, Jingyi Lan, Jianping Wu, Qian Wu, Jun Liu, Zeqi Lai
: y8 N' R3 ?* c  c8 Y6 t1 X. `) F0 p9 m8 K. O1 [
【29】复旦大学* U( k4 I  X5 s7 x8 H1 r( g$ M7 c
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Constructionpp. 150-1508 M8 z* B2 b6 q+ p9 f+ V
by Bofei Chen
5 D2 F+ f' _8 \, r; i( L8 i5 T% p- x. {% F4 v; T
【30】山东大学, A# r- G, q# y) _# F5 \! V) _
AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detectionpp. 155-155
* S# s! @6 w' Y3 s& Z3 Gby Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao
; {& k2 t  H) t/ Y, w- Z1 C
+ M2 A! e7 v2 b# Y. a/ g【31】北京大学# }, e9 i2 G9 M3 J- ^; P  D
Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelitypp. 160-160
3 D# X" q* ^7 E; c9 m( R( Y7 ]by Xinming Wei, Jiaxi Zhang, Guojie Luo
; ?/ h- w, J* }# ?1 e# J3 ?8 Y# H$ v. B; {* o

高级战友

Rank: 4

562

积分

0

贡献

0

奖励
发表于 2024-2-3 16:05:18 来自手机 | 显示全部楼层
清浙遥遥领先

新手上路

Rank: 1

11

积分

0

贡献

0

奖励
发表于 2024-2-3 16:22:26 | 显示全部楼层
浙大威武

中级站友

Rank: 3Rank: 3

232

积分

0

贡献

0

奖励
发表于 2024-2-4 23:36:20 来自手机 | 显示全部楼层
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records in Collision Attacks on SHA-2. Accepted by EUROCRYPT 2024, Zurich, Switzerland, May 26-30, 2024.   

分区版主

Rank: 8Rank: 8

3550

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-4 23:43:26 来自手机 | 显示全部楼层
不知而已 发表于 2024-2-4 23:36
4 [2 n( U) _# l5 b% N7 ?& H4 d& Z华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...

4 I  N" w9 c3 z7 O哈这位是我学姐,王院士的学生。& D& i7 R5 s% ]) v3 ?
23年她在欧密会就有文章,在SHA-2方面做得很好。

青铜长老

Rank: 7Rank: 7Rank: 7

1920

积分

1

贡献

800

奖励
发表于 2024-2-19 16:46:34 | 显示全部楼层
usenix security 2024 accepted papers7 ^8 B) \& }# p, i6 s# Z1 Q; ]
https://www.usenix.org/conferenc ... mer-accepted-papers

青铜长老

Rank: 7Rank: 7Rank: 7

1920

积分

1

贡献

800

奖励
发表于 2024-2-19 16:57:35 | 显示全部楼层
本帖最后由 大师大楼 于 2024-2-19 16:59 编辑 / l4 P6 i, J! D, n

; x$ t( h: v, W: s/ ~usenix security 2024% ^. N5 v5 T+ W" j( }* F
浙大 东南2
' N, R! n  R% G9 f9 ^武大北邮等 1, g) J' k% V6 |
包括清华上交在内,大部分都是空白?

分区版主

Rank: 8Rank: 8

3550

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-19 16:58:58 | 显示全部楼层
大师大楼 发表于 2024-2-19 16:577 B7 O0 z" Y0 ?
usenix security 2024
/ C# a1 G7 d# z1 _浙大 2
' u, D0 W$ ]1 j8 B( _武大北邮等 1
% V  H8 ~: a* n/ u' j
还有一轮应该没出来

青铜长老

Rank: 7Rank: 7Rank: 7

1920

积分

1

贡献

800

奖励
发表于 2024-2-19 17:08:00 | 显示全部楼层
SmithArno 发表于 2024-2-19 16:58, [/ o" M4 o' @& _8 |9 n9 }
还有一轮应该没出来

2 R3 A/ O/ s% A3 \! l6 a% }, j" C嗯,耐心等待

老战友

Rank: 5Rank: 5

1291

积分

0

贡献

0

奖励
发表于 2024-2-19 19:29:03 来自手机 | 显示全部楼层
清华浙大太牛了!

初出江湖

Rank: 2

110

积分

0

贡献

0

奖励
发表于 2024-2-19 23:24:43 | 显示全部楼层
南京大学三项0蛋啊。1篇都没有啊

未关注公众号会员1

118

积分

0

贡献

0

奖励
发表于 2024-2-20 10:41:54 | 显示全部楼层
三大密码顶会算信息安全的成果吗

分区版主

Rank: 8Rank: 8

3550

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-20 10:48:29 来自手机 | 显示全部楼层
ecnuking 发表于 2024-2-20 10:410 P6 w+ c+ p1 F: z+ I
三大密码顶会算信息安全的成果吗

3 o* i1 m, d3 ~+ \* p9 ~9 G密码方向主要统计三大顶会和密码学顶级期刊JoC。9 L$ c+ F8 i8 L9 x
目前有零星的信息,IACR还没出Accepted papers。

白银长老

Rank: 8Rank: 8

3377

积分

1

贡献

2000

奖励
发表于 2024-2-21 12:23:18 | 显示全部楼层
浙大徐文渊:连续三年担任网安四大顶会的大会联合主席
9 M/ P0 t2 {5 l3 u$ TUSENIX Security 2024
3 I  M6 X0 Q3 ^( O, nNDSS 2023* I+ e. M/ z& `; M! W* W
NDSS 2022

白银长老

Rank: 8Rank: 8

3377

积分

1

贡献

2000

奖励
发表于 2024-2-21 12:24:27 | 显示全部楼层
近日,浙江大学共有12位教师担任国际信息安全顶级会议ACM CCS 2024的程序委员会委员,入选总人数排名全球高校第一。其中巴钟杰、申文博、冯博、刘金飞、罗梦、周亚金、娄坚、姚培森、秦湛(按姓氏笔画排序)9位教师来自浙江大学区块链与数据安全全国重点实验室。

钻石长老

Rank: 11Rank: 11Rank: 11Rank: 11

6025

积分

0

贡献

0

奖励
发表于 2024-2-21 14:20:26 | 显示全部楼层
乡下 发表于 2024-2-19 23:298 n6 I" M- x9 I
郑州信大,网安国家队核心队员之一,0蛋?
& o) M/ o# a! S, u8 B
能发吗??

中级站友

Rank: 3Rank: 3

194

积分

0

贡献

100

奖励
发表于 2024-2-23 11:18:14 | 显示全部楼层
没有军信,都是假榜
- X& _. N2 @6 i& _3 F. K看看邬院士的程控交换机,才有后来的巨大中华
  i' G; f5 F* w3 |6 Y信息安全,缺了军信,可信度太低

青铜长老

Rank: 7Rank: 7Rank: 7

1920

积分

1

贡献

800

奖励
发表于 2024-2-23 11:49:38 | 显示全部楼层
本帖最后由 大师大楼 于 2024-2-23 11:51 编辑
" T* ~0 s* H+ ]/ @& z/ l7 k
: y+ v1 p: u( D0 ~2 }7 W& x+ k" t如果军方还是继续画地为牢,固步自封,不借助世界一流高校和院所的力量,那么俄罗斯就是前车之鉴。

青铜长老

Rank: 7Rank: 7Rank: 7

1920

积分

1

贡献

800

奖励
发表于 2024-2-23 11:51:14 | 显示全部楼层
academic818 发表于 2024-2-21 12:237 N5 Y% A. {9 x; D0 T
浙大徐文渊:连续三年担任网安四大顶会的大会联合主席
0 d& B6 m* y+ v3 `. {* m7 ZUSENIX Security 2024% z  n8 Z8 k* K
NDSS 2023
( y2 Y) y+ B; y8 d
水平是特别高啦,但在中国现行体制下,还有待被发掘

老战友

Rank: 5Rank: 5

1328

积分

1

贡献

800

奖励
发表于 2024-2-23 12:09:24 | 显示全部楼层
大师大楼 发表于 2024-2-23 11:51& v" d4 g9 i3 k! E  D
水平是特别高啦,但在中国现行体制下,还有待被发掘
$ r" t8 K) B8 M5 R: d
她好像比较低调的,待在电气学院内,好像还拒绝提拔副院长

禁止发言

118

积分

0

贡献

0

奖励
发表于 2024-2-23 12:09:52 | 显示全部楼层
academic818 发表于 2024-2-21 12:23( [8 U- Y/ U4 M4 y0 C4 d
浙大徐文渊:连续三年担任网安四大顶会的大会联合主席
0 O3 d2 ]: C) w- O8 n; i. vUSENIX Security 2024
$ ?7 \$ W& ]8 }4 eNDSS 2023
& n% z" _% k7 Y; A3 z* F& J! m0 n: F
这么多卖点,宣传太差,差不多的年龄,颜宁都院士了

高级战友

Rank: 4

490

积分

0

贡献

0

奖励
发表于 2024-2-23 12:26:05 来自手机 | 显示全部楼层
也不是每个人都适合做领导哈哈哈

中级站友

Rank: 3Rank: 3

232

积分

0

贡献

0

奖励
发表于 2024-2-25 19:07:24 来自手机 | 显示全部楼层
不知而已 发表于 2024-2-4 23:361 @7 d7 v2 ?1 L4 ~6 u# Q) N2 a
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...

. K$ e6 n( W, D华师大软院通讯今年还accepted一篇欧密 《Registered Functional Encryptions from Pairings》
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

论坛的微信公众号(二维码如下),关注获取更多科教信息

Archiver|手机版|网大论坛 ( (鄂ICP备2021013060号-2) )

GMT+8, 2026-1-30 17:58 , Processed in 0.136019 second(s), 24 queries , Gzip On.

鄂公网安备 42018502005923号

Powered by Discuz! X3.4

Copyright © 2001-2022, Tencent Cloud.