网大论坛

 找回密码
 立即注册
查看: 16129|回复: 71

2024年信息安全领域顶会统计(Eurocrypt/FSE)

[复制链接]

分区版主

Rank: 8Rank: 8

3226

积分

0

贡献

1600

奖励
发表于 2024-2-3 09:59:37 | 显示全部楼层 |阅读模式
本帖最后由 SmithArno 于 2024-3-8 16:28 编辑 8 `0 n5 Z. X3 N9 o
3 M' j) q' }/ }' x$ N( _2 S
按照第一作者单位统计(信息安全四大顶会+密码三大顶会)+ A# J( R, w, T8 s
NDSS 2024概览
$ w% i( Q( R6 m, G( i. ]8 w清华大学13篇,浙江大学9篇,华中科技大学3篇,南方科技大学2篇。+ \! t. d4 d. `9 P7 u
东南大学、中国海洋大学、北京航空航天大学、山东大学、北京大学、中山大学、武汉大学、中科大、NUDT、上海科技大学等等1篇。
$ V- Y$ D: q* g/ ~7 t, [! {: d8 ^6 Z7 d8 \4 W% o. O* O: y3 @2 l4 z
CCS 2024$ T$ N) p3 v% L/ a, b# H+ z! K9 b
* f, U1 j' g0 D$ U7 X
IEEE S&P 2024概览% g3 m/ V$ k$ \: W( v- W% Y; r
清华大学10篇,浙江大学6篇,华中科技大学、复旦大学、东南大学2篇。其他重庆大学、山东大学、南开大学、西电、成电等等1篇。
0 K# Q& `9 O/ @( F# J/ U; R. I( P& L4 ^; C; W/ l
Security 20249 G6 {3 w9 R1 C9 E8 m' n5 \

- f/ x' D4 W) c) @" h1 bEurocrypt 2024
; n8 K* V% I7 Q5 P0 r: {% h) B8 N华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。1 c  q9 `# `" h. Q# I3 c7 O' X9 {1 x

# n/ J2 p# ]0 m1 q2 [4 y: e( _/ `& W5 J. H8 P) U

' m; H* y: ^( A: J0 C获奖情况:( N! x6 f3 w* N1 n' ~# z% B
【1】浙江大学获得NDSS 2024杰出论文奖。1 v# s, w8 G+ }5 \* s6 `
- i9 P6 o# C" L& a; A8 a1 B
( X* J9 l2 _+ d& h% }

$ X3 P. n5 }) ?  h6 Y+ o3 B/ j! `' L
2 t& E9 ^0 B( @% t4 j
4 A8 j, `# q: Z8 g
  u( d3 q. w0 i1 j, x

分区版主

Rank: 8Rank: 8

3226

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-3-4 09:47:58 | 显示全部楼层
Eurocrypt 2024,共接收105篇论文,国内共8篇,华东师大、上海交大各2篇,山东大学、清华大学、暨南大学、南科大各1篇。+ K1 E* L0 m, L' z

' h+ Y; S( Q& n( W+ ?/ W【1】山东大学
& s% N# F  b# b  u( |Massive Superpoly Recovery with a Meet-in-the-middle Framework -- Improved Cube Attacks on Trivium and Kreyvium# c: h- H: h! y& j1 O
Jiahui He, Kai Hu, Meiqin Wang, Hao Lei
& W8 f! ?8 i- ]2 s+ L/ e4 E9 E+ @$ F. @Shandong University, Nanyang Technological University6 ?3 F! W1 }+ q" L! z& f

& w' i. l( q7 S3 I: r【2】清华大学* E2 F2 a. y; Z& |  \( J  [
Accelerating BGV Bootstrapping for Large $p$ Using Null Polynomials Over $\mathbb{Z}_{p^e}$& k& {- _5 j& i2 ?0 O
Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang5 k" C. v2 O, P! K2 `' F* Z
Tsinghua University8 R+ D# A+ N2 E
  I( s6 f# r2 J3 y
【3】华东师大
  Y- M* \" }, x4 uRegistered Functional Encryptions from Pairings8 |) n5 E/ x, Z; |1 L0 }
Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian
7 D: E. A! z7 tEast China Normal University, Shanghai University, Shanghai University of Electric Power! J  X; s4 c$ z4 {9 A  K

& [$ K& `! G0 @% P6 R& b【4】南科大
" [  N- Z% O6 I# ~% QIntegrating Causality in Messaging Channels
' b9 ?) e1 I  j, SShan Chen, Marc Fischlin
* ^8 }5 @$ N6 N7 K, vSouthern University of Science and Technology, TU Darmstadt1 i! j, h3 M) K5 N9 Y; O

0 Q! K* a  [3 o* j8 e: \【5】暨南大学0 N2 z1 Y- ^9 H/ c
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond
- T% u$ y1 Z) s* ^* s: P3 A) fLing Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng3 l' i1 S; H5 O0 j+ \
College of Cyber Security, Jinan University, Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering+ f! D! {  B/ a8 s# R
. }3 V( C/ R9 v' Y6 @* ^" u
【6】上海交大
7 R& J- e  ^- [3 uThe Hardness of LPN over Any Integer Ring and Field for PCG Applications* f3 t: E3 H1 f3 b6 p5 F- b
Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu
: c  J/ L  ?$ o1 V! LShanghai Jiao Tong University, Shanghai Qi Zhi Institute, Northwestern University, State Key Laboratory of Cryptology
' x1 i1 q5 K0 e+ _: `
$ r- W7 G% I3 z, H! W【7】上海交大
& P4 t' w4 ?( Q6 }% M2 k5 AUniversal Composable Password Authenticated Key Exchange for the Post-Quantum World8 n" T  \! C, X
You Lyu, Shengli Liu, Shuai Han
- F" x2 y: h$ N0 F  {Shanghai Jiao Tong University" t4 Z. q! z/ w* H1 m/ }

( h( n% @; V9 D% T0 V+ ~/ M【8】华东师大' K& V1 i5 {- W$ D6 A
New Records in Collision Attacks on SHA-2" h" ^9 b$ x3 H. E' d
Yingxin Li, Fukang Liu, Gaoli Wang2 E# c! G1 |, @' a5 `
East China Normal University, Tokyo Institute of Technology& d7 Y6 m- B7 @3 S: _2 T! m
6 a5 v; N8 x7 O9 B  ~. ?8 I

分区版主

Rank: 8Rank: 8

3226

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 09:59:41 | 显示全部楼层
本帖最后由 SmithArno 于 2024-2-3 10:06 编辑 & V: p3 O6 N) p$ s

; n' d3 |6 P) l& s$ j2 yNDSS 2024会议主页:https://www.ndss-symposium.org/ndss2024/accepted-papers/  w+ J- W) X! {# h8 R; Q& ?, L$ X

) |, G9 |5 P8 g! I【1】山东大学; {5 z% b/ V  Z
Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols' k' f+ m5 b! n* X  o
Shichen Wu (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Puwen Wei (1. School of Cyber Science and Technology, Shandong University 2. Quancheng Laboratory 3. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Ren Zhang (Cryptape Co. Ltd. and Nervos); Bowen Jiang (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education)
: c/ ?1 j& K5 i' B  G/ P$ |7 @$ @
, e1 h% V7 j( j4 v5 I# w0 @7 U' B0 G【2】东南大学
1 X# Y# f. I) {& k7 J" [& G! @; cLDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems
! X$ p) u" l7 v; A/ XHuaiyu Yan, Zhen Ling, Haobo Li (Southeast University); Lan Luo (Anhui University of Technology); Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang (Southeast University); Junzhou Luo (Southeast University, Nanjing, P.R. China); Xinwen Fu (University of Massachusetts Lowell)
( f3 j7 O. K  N! r2 [. v/ v+ w: b* y6 ?2 z# P: {3 r) C! c. ?
【3】浙江大学7 X& e. |. i+ k# H2 _
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards; [6 ]* `4 [* h
Qinhong Jiang, Yanze Ren (Zhejiang University); Yan Long (University of Michigan); Chen Yan (Zhejiang University); Yumai Sun (University of Michigan); Xiaoyu Ji (Zhejiang University); Kevin Fu (Northeastern University); Wenyuan Xu (Zhejiang University)
  w; N; g; e8 ~' q/ {& i8 W! n. M% j1 f( f
【4】浙江大学
* T* h+ k  u' Y' ^4 H; Y2 N2 Q# pInaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time  C% D5 S! G6 k2 B- M2 q. T
Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)3 ^  \$ v/ ]: s6 d
! ^& [$ v( L0 s3 I: K% m6 v
【5】北京航空航天大学
9 `  i" f3 n& EHEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation+ o; y" M8 H0 e8 e0 t
Song Bian, Zian Zhao, Zhou Zhang, Ran Mao (Beihang University); Kohei Suenaga (Kyoto University); Yier Jin (University of Science and Technology of China); Zhenyu Guan, Jianwei Liu (Beihang University)8 k( [- R% Z6 _0 I& D

0 ]1 n; N+ O2 ~0 h$ G0 g, l【6】清华大学. R5 v. Y1 T. o9 W/ |
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic1 r1 G2 g- n. K. h  n7 e: v+ ^  V# C0 H
Yuqi Qing (Tsinghua University); Qilei Yin (Zhongguancun Laboratory); Xinhao Deng, Yihao Chen, Zhuotao Liu (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Jia Zhang, Qi Li (Tsinghua University)
8 ?9 p  u1 ]# y' z3 K- \3 V: w" k! w" `
【7】浙江大学
! \( N. ?" T2 B( D3 r; r3 NSymphony: Path Validation at Scale9 `8 ?8 W+ S3 C5 P1 t' h: H6 i4 y
Anxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren (Zhejiang University)
7 V' _3 e* c; Z+ A) p; g% I" e, y
. A+ f: u) w" q! z3 {! e【8】清华大学6 Y4 V  N" L# P; O' w! P/ H3 ?
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet
. u, M/ Q5 T( p3 _  jChuhan Wang, Yasuhiro Kuranaga, Yihang Wang (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Linkai Zheng, Xiang Li (Tsinghua University); Jianjun Chen (Tsinghua University; Zhongguancun Laboratory); Haixin Duan (Tsinghua University; Quan Cheng Lab; Zhongguancun Laboratory); Yanzhong Lin, Qingfeng Pan (Coremail Technology Co. Ltd)4 D' d6 u8 _2 S
. ^3 n; o5 ~8 K- c
【9】浙江大学
. |. ~1 F6 J9 xMOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency
/ F- l5 o) `% d7 e' JJiacheng Xu, Xuhong Zhang, Shouling Ji (Zhejiang University); Yuan Tian (UCLA); Binbin Zhao (Georgia Institute of Technology); Qinying Wang, Peng Cheng, Jiming Chen (Zhejiang University)5 F; e  x4 f3 c& X

6 Z& }0 I/ m( C4 l( W; A【10】清华大学
2 I8 a% L7 X8 h3 l; OShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection5 X0 {+ r: P, Z% k( z2 Y
Kunpeng Zhang (Shenzhen International Graduate School, Tsinghua University); Xiaogang Zhu (Swinburne University of Technology); Xi Xiao (Shenzhen International Graduate School, Tsinghua University); Minhui Xue (CSIRO’s Data61); Chao Zhang (Tsinghua University); Sheng Wen (Swinburne University of Technology)2 Z( t/ }# m0 V# Q' k5 T
) r2 ~+ N) ]0 v' I, i7 j
【11】中国海洋大学
! q# W* z$ K! d" z- M. ~3 CEnhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack+ v  ]5 j+ n8 {7 @0 d
Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu (Ocean University of China)" n2 _4 l, L+ G' Y7 @
2 i  S2 B/ Z% Y7 `
【12】浙江大学
# \9 z; e$ S3 ^3 w. D! V- bORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning
) ~0 [5 O! J5 S3 p+ z% YLinkang Du (Zhejiang University); Min Chen (CISPA Helmholtz Center for Information Security); Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen (Zhejiang University); Zhikun Zhang (Stanford University)
6 d' Y5 @& Z$ R# g* Y6 `# h: `5 j
8 C, h$ K9 [- O* k6 U6 i, Q【13】北京大学
- M: k6 w9 W4 Y4 A+ e! _: UNODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
+ s; e* F( i1 x, _0 w2 T; ^4 }Shaofei Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Feng Dong (Huazhong University of Science and Technology); Xusheng Xiao (Arizona State University); Haoyu Wang (Huazhong University of Science and Technology); Fei Shao (Case Western Reserve University); Jiedong Chen (Sangfor Technologies Inc.); Yao Guo, Xiangqun Chen (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Ding Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University)0 p5 u1 X$ `7 ^

- \# W) D" u( j【14】浙江大学
1 A( h7 K1 y, m5 R7 S2 a/ g( kLMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors$ l" W7 _- X, s7 ^9 y% J  N
Chengkun Wei, Wenlong Meng (Zhejiang University); Zhikun Zhang (Stanford University); Min Chen (CISPA Helmholtz Center for Information Security); Minghu Zhao (Zhejiang University); Wenjing Fang, Lei Wang (Ant Group); Zihui Zhang, Wenzhi Chen (Zhejiang University)  M3 n2 \' Q% O. {6 E1 h- k
& I( i. Y4 k4 ]4 H1 D" A: o4 w1 {
【15】湖南大学
7 [0 }5 z2 H9 w% I, TEavesdropping on Black-box Mobile Devices via Audio Amplifier’s EMR+ M* O  d! U! z1 l$ r
Huiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Kenli Li (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Zheng Qin (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Mingxing Duan (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Yong Xie (Nanjing University of Posts and Telecommunications, Nanjing, China); Daibo Liu (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Ming Li (The University of Texas at Arlington, USA)& K4 X( w* t$ E! i8 }8 t3 n

! a  Z1 P) a$ |$ A【16】上海交大7 C5 {2 T) K0 ?) N+ v" ^7 o* b2 J
Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models9 Q; \  N) _; @: j1 Q
Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang (Shanghai Jiao Tong University); Chenghu Zhou (Chinese Academy of Sciences); Bo Li (Hong Kong University of Science and Technology)5 `  ?- q3 t: N# v2 c
) M+ n+ D" Z& R5 N
【17】清华大学
, f/ y. {$ e  K$ J/ Q) C0 sExploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks% b$ ]* A4 W0 ^$ l# Q1 x4 P/ I. K
Yuxiang Yang, Xuewei Feng, Qi Li (Tsinghua University); Kun Sun (George Mason University); Ziqiang Wang (Southeast University); Ke Xu (Tsinghua University)9 x8 e( L/ y# G0 Y. ?
5 c$ s! p' d7 S- |
【18】清华大学
2 t* u1 S8 W( vCP-IoT: A Cross-Platform Monitoring System for Smart Home& h! t* J. Z" Y
Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang (Tsinghua University); Linna Fan (National University of Defense Technology); Chenxin Duan (Tsinghua University)
4 E1 U5 A3 }0 s2 n
& J# N+ d: y/ A, f【19】清华大学' i. P' P! I7 u9 U: ], b
LoRDMA: A New Low-Rate DoS Attack in RDMA Networks. ?# ?' V9 U  d4 M2 X5 Q# z
Shicheng Wang (Tsinghua University); Menghao Zhang (Beihang University & Infrawaves); Yuying Du (Information Engineering University); Ziteng Chen (Southeast University); Zhiliang Wang, Mingwei Xu (Tsinghua University & Zhongguancun Laboratory); Renjie Xie (Tsinghua University); Jiahai Yang (Tsinghua University & Zhongguancun Laboratory)
2 ?4 l2 w7 o2 W$ m; {% B# f: R
【20】清华大学9 _0 o' T& ~) h) @5 @
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing9 o. k6 |0 Y  K9 |
Linkai Zheng, Xiang Li, Chuhan Wang, Run Guo (Tsinghua University); Haixin Duan (Tsinghua University; Quancheng Laboratory); Jianjun Chen, Chao Zhang (Tsinghua University; Zhongguancun Laboratory); Kaiwen Shen (Tsinghua University)
* o; d/ B$ ~0 {! r5 ^- s
  T7 K. o$ ^/ ^2 e" D5 Q【21】清华大学  w; W, o. a! w3 N4 c' \4 T; J
Automatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization1 e+ ]& U: y" z, q% Q7 H
Quan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang (Tsinghua University)
, h7 g" |7 x; {7 p+ e
5 q# r' o& {" K4 W. e; y. h  ~【22】清华大学! R0 k* w4 o: |5 z6 V
DynPRE: Protocol Reverse Engineering via Dynamic Inference
* G8 K$ X/ h( L6 }; Z5 P+ wZhengxiong Luo (Tsinghua University); Kai Liang (Central South University); Yanyang Zhao, Feifan Wu, Junze Yu (Tsinghua University); Heyuan Shi (Central South University); Yu Jiang (Tsinghua University)
% u8 H5 T% P7 ^- t$ ]
6 E2 j* D8 g6 S- i9 x* ~【23】浙江大学
' J+ K! |+ p! J9 y+ A6 Z$ W# m- |8 ZImproving the Robustness of Transformer-based Large Language Models with Dynamic Attention
) Q0 D1 U3 Y( \( u7 I; Z% {Lujia Shen, Yuwen Pu, Shouling Ji (Zhejiang University); Changjiang Li (Penn State); Xuhong Zhang (Zhejiang University); Chunpeng Ge (Shandong University); Ting Wang (Penn State)
7 R$ @  P& h* W( \% \( a7 ~, \9 F
3 c4 e4 o" B( S" v【24】中山大学, R# }* p# o( A
Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem" U7 H! \- @9 G' E' f% [, V
Jiangrong Wu, Yuhong Nan (Sun Yat-sen University); Luyi Xing (Indiana University Bloomington); Jiatao Cheng (Sun Yat-sen University); Zimin Lin (Alibaba Group); Zibin Zheng (Sun Yat-sen University); Min Yang (Fudan University)4 g# E( ?6 G9 {

$ E" M4 Z! |- Q7 l3 l【25】浙江大学8 {, a$ H3 E) }$ V6 K+ `
CamPro: Camera-based Anti-Facial Recognition$ k) [( A, T' P7 J2 p4 z
Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)& Q) b) }+ [0 }3 Y4 W8 h# _

9 ]& L6 ~* s# [6 g2 g- A: r  M, c【26】中国科学技术大学0 [6 j( s5 j. |# F: V
Detecting Voice Cloning Attacks via Timbre Watermarking
- K7 h6 F0 v( ]: MChang Liu (University of Science and Technology of China); Jie Zhang, Tianwei Zhang (Nanyang Technological University); Xi Yang, Weiming Zhang, NengHai Yu (University of Science and Technology of China)# {# V$ ~' a+ ~+ y; F6 K

" F2 j& Q% t$ j4 p% @) P( m【27】清华大学& I1 ?8 O1 b" i1 O
Understanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed
/ L4 p6 w4 F' r/ wLancheng Qin (Tsinghua University, BNRist); Li Chen (Zhongguancun Laboratory); Dan Li (Tsinghua University, Zhongguancun Laboratory); Honglin Ye, Yutian Wang (Tsinghua University)
/ q3 X, E$ Y, d8 w3 ?3 x
1 c& X$ M8 Q* E2 @) l. @【28】清华大学8 d! y( z% u! t# S6 C+ H
dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository( z5 H' K+ V* \, r' E+ i) N
Yingying Su, Dan Li (Tsinghua University); Li Chen (Zhongguancun Laboratory); Qi Li (Tsinghua university); Sitong Ling (Tsinghua University)6 K/ E& H- C7 S
: i8 m) ^: V+ t7 v5 p& H1 S
【29】清华大学% k5 A/ N5 t" f
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption
% T8 v3 w* [2 WXuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu (Tsinghua University)
, }/ F  P8 @% j, Z+ B; `) i+ Q6 p* H( D3 [# q6 D
【30】NUDT# N1 m0 ^6 M) s7 ~2 l
DeepGo: Predictive Directed Greybox Fuzzing/ I: D# b' L& r, ?* V. b
Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang (National University of Defense Technology)& P3 j3 O* I# y7 x5 a1 P
0 H) o; C7 D; y  R3 l+ u0 q
【31】上海交大' k# @  X! P  [, t" M
ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token3 z/ @. m2 U! h& d/ E! _
Ge Ren, Gaolei Li, Shenghong Li, Libo Chen (Shanghai Jiao Tong University); Kui Ren (Zhejiang University)" I9 R7 G6 ~# c: T1 `

# I3 |3 i3 u+ f( t" n9 D【32】华中科技大学
" p$ b4 Z) W+ K9 v1 M* CPrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
/ |, u( {0 e) [4 H: u3 QMan Zhou, Shuao Su (Huazhong University of Science and Technology); Qian Wang (Wuhan University); Qi Li (Tsinghua University); Yuting Zhou, Xiaojing Ma (Huazhong University of Science and Technology); Zhengxiong Li (University of Colorado Denver)
' n$ u6 H7 \1 ^) l: D3 k
( f; m* _! F; U7 h- A【33】南方科技大学" [2 w% w4 V6 Z2 D9 _! V! [4 I
Separation is Good: A Faster Order-Fairness Byzantine Consensus
5 B% l5 y) u8 E6 S6 _Ke Mu (Southern University of Science and Technology, China); Bo Yin (Changsha University of Science and Technology, China); Alia Asheralieva (Loughborough University, UK); Xuetao Wei (Southern University of Science and Technology, China & Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation, SUSTech, China)
% z' U4 o0 e: j
: h' |2 d* q2 H0 i5 F5 v【34】南方科技大学& c" q/ Y# G3 W. O4 G
CAGE: Complementing Arm CCA with GPU Extensions
, ?5 e, z7 T& ]6 nChenxu Wang (Southern University of Science and Technology (SUSTech) and The Hong Kong Polytechnic University); Fengwei Zhang, Yunjie Deng (Southern University of Science and Technology (SUSTech)); Kevin Leach (Vanderbilt University); Jiannong Cao (The Hong Kong Polytechnic University); Zhenyu Ning (Hunan University); Shoumeng Yan, Zhengyu He (Ant Group)7 G3 r5 e# X% }+ r4 E

$ C- u; ?) T, J【35】华中科技大学% h+ B$ W% i& v9 h; L+ p
DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses4 K, N  j5 G9 a5 w: J
Chaoxiang He, Xiaojing Ma (Huazhong University of Science and Technology); Bin Benjamin Zhu (Microsoft Research Asia); Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin (Huazhong University of Science and Technology); Dongmei Zhang (Microsoft Research)
. {; a6 M7 p( Q: @) r& q7 ^" a+ A$ t* t/ |, i
【36】华中科技大学3 b5 Y0 c& }# v/ I( P
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit' ^! b+ y% ~" p' X9 g2 M# Y6 F
Pengxiang Ma (Huazhong University of Science and Technology); Ningyu He (Peking University); Yuhua Huang, Haoyu Wang (Huazhong University of Science and Technology); Xiapu Luo (The Hong Kong Polytechnic University)
# Z- b# j1 O' U, |% M* r& Q
" w  @7 O, A9 s$ J9 K( z/ g. H" B【37】浙江大学
, Y! f5 ?  c& D& ?1 eUniID: Spoofing Face Authentication System by Universal Identity
% G2 \6 V% e' o5 C/ ~0 D8 QZhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji (Zhejiang University); Wenyuan Xu (Zhejing University)
9 t: M: r. p, `( V, g: q* ^* S* Y: @: v7 }, r
【38】武汉大学) m" f9 l$ L& {/ \& W
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices
- t, Q- ^# V! Q$ l8 {Yue Xiao (Wuhan University); Yi He (Tsinghua University); Xiaoli Zhang (Zhejiang University of Technology); Qian Wang (Wuhan University); Renjie Xie (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Qi Li (Tsinghua University)4 i: r0 g9 ?( h/ _7 ^8 u# H

8 ~* J: @7 f2 n0 N$ m1 f【39】上海科技大学
, S- b1 H+ `% }, q3 N, DSLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems0 }1 o. p0 x5 X& O% P+ J0 V
Guangke Chen (ShanghaiTech University); Yedi Zhang (National University of Singapore); Fu Song (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences)* {* R- Z$ g) T5 @2 g

! z& d( w2 G6 L【40】清华大学
" ?. {& Y6 Z/ j) V7 R" |- TYou Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks: l9 v0 R. U5 }1 U' z# K
Qiushi Li (Tsinghua University); Yan Zhang (China Agricultural University); Ju Ren, Qi Li, Yaoxue Zhang (Tsinghua University)
# M2 V4 T3 Y# q: d" v3 R/ v3 j

老战友

Rank: 5Rank: 5

1323

积分

0

贡献

500

奖励
发表于 2024-2-3 10:15:02 | 显示全部楼层
Wenyuan Xu (Zhejiang University)) |2 {5 V; z( U0 X
徐文元好几篇" }( _; q$ B! a2 Y. z

中级站友

Rank: 3Rank: 3

374

积分

0

贡献

0

奖励
发表于 2024-2-3 11:53:22 来自手机 | 显示全部楼层
有2023年的数据吗

分区版主

Rank: 8Rank: 8

3226

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 12:26:14 | 显示全部楼层
0000 发表于 2024-2-3 11:53; f* g& |+ \1 r  x3 t
有2023年的数据吗
. \! e  e2 h, U
https://bbs.netbig.top/thread-26427-1-1.html

普通会员

Rank: 2

114

积分

0

贡献

0

奖励
发表于 2024-2-3 12:49:02 来自手机 | 显示全部楼层
徐文渊老师太强了…

分区版主

Rank: 8Rank: 8

3226

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 12:50:55 | 显示全部楼层
yxy 发表于 2024-2-3 12:49
# C4 H# c3 M$ `9 k& v徐文渊老师太强了…
, s! q( ]+ U& |3 b7 G7 P
国内现在这几个顶会发文量虽然多了,但头部高校断层明显,基本都是浙大清华屠榜。
+ c) g/ u: G& X6 c8 \! e+ a: W其他高校偶尔有个一篇两篇的。' n& \3 K) _! W) i5 ?8 x- Q4 i

8 Q$ d( v# d& h( W* A徐文渊老师不仅输出稳定,而且还有best paper

分区版主

Rank: 8Rank: 8

3226

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-3 14:55:15 | 显示全部楼层
本帖最后由 SmithArno 于 2024-3-8 16:25 编辑 4 ^( k0 t' g- @0 u( q

. m9 {0 w; V5 i% Z# Z( {IEEE S&P 2024. `- `4 j# E" a4 n

" ~0 F5 V$ S) O1 M# V1 w3 ~; U/ {【1】华中科技大学/ M/ Z! w6 q4 [# M4 |+ a! A; l/ h
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabilitypp. 10-102 }5 ~' ~5 J0 T! P( p$ w
by Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin- U7 Q3 ]- p' q+ x4 ?% z* R
0 V4 D- X5 ~9 q
【2】华中科技大学- `, f& o9 E  v# `0 t5 @( Z* d
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementationspp. 13-136 i3 F3 }& p. Q
by Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing
, I: M6 y. c4 r' `" Z3 ]0 U& v' F% L, J$ I4 L5 V
【3】复旦大学
, A4 T1 E5 D8 A- [Withdrawing is believing? Detecting Inconsistencies Between Withdrawal Choices and Third-party Data Collections in Mobile Appspp. 14-14
" {+ ]: d) ~+ ?0 Z3 ], p- j4 sby Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang* ~8 y$ j- J2 V. ^% L4 ]  b4 F
, n: O8 ^& x  S2 H; q
【4】浙江大学
. C( J" j( [- K$ f$ ?! R  [& }, MPIRANA: Faster Multi-query PIR via Constant-weight Codespp. 39-39
, y  ^- \; o% Q2 n' C4 }) Aby Jian Liu, Jingyu Li, Di Wu, Kui Ren
) M& G* }) |  d! Z2 L: n* z+ a# g/ o, }& H0 M7 x$ _  R8 L7 w" b0 f
【5】东南大学/ p0 j6 V+ `2 C; I4 D
Predecessor-aware Directed Greybox Fuzzingpp. 40-40
4 M& W5 r+ ]- {0 `- rby Yujian Zhang, Yaokun Liu, Jinyu Xu, Yanhao Wang' k+ G5 H6 W0 `! _0 O! l+ y4 d

8 B- F: P  Y$ T* F5 O% \" _【6】中南大学
0 N1 z9 `" s7 ?5 V$ y$ s7 BGuessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Informationpp. 42-42* ^7 d2 q1 V; M, c: z) l9 F3 \, Y
by Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, Zhuo Lu. v4 B2 c7 |* V* D4 H
: @# ^% d( ^% v. Q9 s& ^" l+ j
【7】清华大学
1 n. V9 u7 v  yTuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packetspp. 46-46
7 y2 y# D3 T$ ?1 Gby Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li
( l4 b! @+ a( r' h/ D" q: \2 w. D4 _9 g& }) t  p
【8】清华大学! B2 r& ^5 s; ^! K6 [
SATURN: Host-Gadget Synergistic USB Driver Fuzzingpp. 51-51
( o8 q" ~: V2 h1 |by Yiru Xu, Hao Sun, Jianzhong Liu, Yuheng Shen, Yu Jiang
8 P* m4 }$ q5 W" h9 Z: c3 ?0 A/ Z$ q% `: z2 U( i! v& Q  Z
【9】北京大学
8 }$ g. g1 d. J/ p; D7 [No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device MLpp. 52-521 K% m9 z7 \' t0 P2 t; \
by Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Ding Li, Yao Guo, Xiangqun Chen
. w1 |  K3 x6 U, b: N) N3 J
6 D6 R3 {3 n9 W/ w- R0 C. y【10】浙江大学
2 c7 Z$ M2 e5 y* B' A1 wText-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attackspp. 53-53
# A: |0 P; {3 Z$ w6 Oby Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren
6 c2 |) t# \% w" ?8 T& {7 M5 k
& \- W- q2 E+ R% J6 w+ q3 K- j+ r2 O【11】浙江大学' l7 }! W, `: g0 q6 k' z3 e
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Featurespp. 56-56
8 y! A' \8 m4 Oby Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren
" s% @% J% O  F" v. u% _' i8 X9 y
【12】南开大学
1 _+ m$ {3 v& U. d" U- H- s4 JSpringproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Lengthpp. 67-67
) i4 U. E! U0 H7 Iby Jianning Zhang, Ming Su, Xiaoguang Liu, Gang Wang
3 d$ D# E' x5 T3 n
5 t6 B! E) j& E8 G% _2 [【13】浙江大学" g" j! x: I( `5 i. F1 p, ~
BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wildpp. 68-68
, b8 p) Z6 H* w7 }( w! d3 R& oby Jie Wan, Jianhao Fu, Lijin Wang, Ziqi Yang* V- O$ y- j: g) X) q0 `$ c% H

( j* i9 [, a7 W0 i- P【14】浙江大学# x0 ^- g+ k" I% m  J
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devicespp. 70-70
( q7 Z3 Y7 I% |9 N9 wby Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah' C) ?. w5 ]2 c
* f0 x, H# T/ c" H5 F. k" H7 u
【15】清华大学
' Q. U6 r6 t7 z0 x( |* P; ETest-Time Poisoning Attacks Against Test-Time Adaptation Modelspp. 72-72/ j# P0 s/ o# Q7 Z) r
by Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang9 d( w, Q! ~& }2 E/ y9 f

/ K; d  e7 K" N  q# m【16】上海交大
! E/ l* e+ `0 D% ]. X4 hSrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformationspp. 97-97
" d2 j9 F( c- p, w6 Z- t% x: \1 {by Borui Yang, Wei Li, Liyao Xiang, Bo Li
. D% D1 q/ l8 `2 g) }* }
+ v# p+ f, v" L【17】重庆大学
; H$ x$ e1 `: g& H- Y3 T+ ?From Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuningpp. 101-1013 u5 a* N; L2 R4 G- U0 U! p
by Qiao Zhang, Tao Xiang, Chunsheng Xin, Hongyi Wu
6 G+ x  ^) K3 l( T
& V$ I) g: J5 d$ C【18】东南大学
) [; }# M# C! k! y' rTransferable Multimodal Attack on Vision-Language Pre-training Modelspp. 102-102" A. T6 x( l) _! _+ {8 E' }
by Haodi Wang, Kai Dong, Zhilei Zhu, Haotong Qin, Aishan Liu, Xiaolin Fang, Jiakai Wang, Xianglong Liu
1 y/ }& h9 o% c8 D; ~! }: P8 o- g; y3 U) s; H& e: c
【19】清华大学7 {9 ?+ Q4 z8 V( E4 _  C9 D" e# B
BULKOR: Enabling Bulk Loading for Path ORAMpp. 103-103
# L" k' A: F+ P6 h' @, i1 c# V5 A5 hby Xiang Li, Yunqian Luo, Mingyu Gao
: W. `) B: P/ H3 \3 a+ H$ I
: G3 J9 |0 Y9 D+ G/ P" ^0 P# `【20】清华大学- _2 L) |: S8 V- e1 A. a6 z
Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delaypp. 109-109
' {  h9 {. j9 D: U1 X; Rby Yuanliang Chen6 Q6 f+ D2 X2 a

7 Y) x0 I/ o' J( h( F' u! B【21】浙江大学. v  ~# ]& U9 p; `% Q
Understanding and Benchmarking the Commonality of Adversarial Examplespp. 111-111* V7 f+ k3 F5 @% G
by Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu
! Z6 ]& n  J' Z7 \; c
/ A) ]1 C1 i7 Z5 s【22】电子科技大学) [8 s( I. B7 w7 R8 c  @
NURGLE: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulationpp. 125-1253 P. c5 c* u2 a- x& R
by Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu0 @3 X0 R6 K& H3 P$ Q  V

" R+ b" w* e1 Y* X0 P【23】清华大学' e& r2 H2 b& K7 A+ \, c
LABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devicespp. 127-127
; n6 J: B6 @$ Q; ^. fby Hangtian Liu, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Xiangzhi Wang, Guangming Gao; Z% L' a" F) t# l

+ h( x+ M+ N0 Z1 F& A# ^【24】清华大学7 {( N7 f. K8 \4 X
Break the Wall from bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewallspp. 129-129
/ T" Z! \: M4 }4 A! }# zby Qi Wang, Jianjun Chen, Zheyu Jiang, Run Guo, Ximeng Liu, Chao Zhang, Haixin Duan3 T, [0 j0 U% q" [) q: G+ z

" r( [5 i) T( H( C【25】清华大学! l; h! w7 N) P( f3 m
GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocolspp. 131-131
0 F' k8 p3 B( U# ^# [) [by Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song
4 c4 l6 J; ^7 ~  d) k: a& L
$ i$ @* C8 z' W' b/ t【26】清华大学. I1 w9 S0 [- b- L5 v
More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Servicespp. 138-138- [" _9 {& o6 R, _0 S" K+ A
by Yacong Gu, Lingyun Ying, Huajun Chai, Yingyuan Pu, Haixin Duan, Xing Gao+ w2 h. d9 n& A
) J, o, M% Z% {. W" q2 _& D6 x
【27】西电2 G" D% L. v, H! u
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledgepp. 148-148
" i8 P8 z" f, C  \' y! s# {by Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino
! ?5 b" f1 l7 U& E6 |. v1 |, p. D2 Z3 |; ]7 d( j" `- n
【28】清华大学. C9 u8 m8 k9 f* g
The Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellationspp. 149-149
9 {8 b+ ^( C' q, sby Wei Li, Yuanjie Li, Hewu Li, Yimei Chen, Yufeng Wang, Jingyi Lan, Jianping Wu, Qian Wu, Jun Liu, Zeqi Lai+ z8 d5 Y5 ~& L7 x: \8 b5 [

. o. Q- E& z+ W2 |% r【29】复旦大学% N% R( O4 F. [; {
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Constructionpp. 150-150
& _9 d/ j1 E( A) A$ jby Bofei Chen
5 u: R  C( F! E- ]! N# k! a5 e- J$ a( ]$ [  ^
【30】山东大学
$ D1 u4 B" R+ [( ]7 Y% i9 S% jAVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detectionpp. 155-155
3 ^$ S. E) q# y# l9 [$ Zby Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao" L+ b9 @, T% Q+ Y( w
4 W+ f2 ^, [5 f- T
【31】北京大学. `0 T0 w( p. v6 z' |6 P- k
Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelitypp. 160-160
0 E: U. V: a3 R" G: @) P; r% Dby Xinming Wei, Jiaxi Zhang, Guojie Luo  R6 B3 M9 p& a$ }# q' h

9 i% D; g" s- n3 P. }

高级战友

Rank: 4

504

积分

0

贡献

0

奖励
发表于 2024-2-3 16:05:18 来自手机 | 显示全部楼层
清浙遥遥领先

新手上路

Rank: 1

13

积分

0

贡献

0

奖励
发表于 2024-2-3 16:22:26 | 显示全部楼层
浙大威武

中级站友

Rank: 3Rank: 3

151

积分

0

贡献

0

奖励
发表于 2024-2-4 23:36:20 来自手机 | 显示全部楼层
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records in Collision Attacks on SHA-2. Accepted by EUROCRYPT 2024, Zurich, Switzerland, May 26-30, 2024.   

分区版主

Rank: 8Rank: 8

3226

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-4 23:43:26 来自手机 | 显示全部楼层
不知而已 发表于 2024-2-4 23:36# w  u: V4 U9 g! |, N+ e
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...

0 k6 x( F% o& ?2 f1 b哈这位是我学姐,王院士的学生。
! q% R& ~* S! P% r. n" \23年她在欧密会就有文章,在SHA-2方面做得很好。

老战友

Rank: 5Rank: 5

1857

积分

1

贡献

800

奖励
发表于 2024-2-19 16:46:34 | 显示全部楼层
usenix security 2024 accepted papers
) H5 z6 {2 q2 D3 nhttps://www.usenix.org/conferenc ... mer-accepted-papers

老战友

Rank: 5Rank: 5

1857

积分

1

贡献

800

奖励
发表于 2024-2-19 16:57:35 | 显示全部楼层
本帖最后由 大师大楼 于 2024-2-19 16:59 编辑 ( d( F6 z2 {) P7 Y6 x; c

7 {1 I# Z. g  @8 j- k& Kusenix security 20246 M: d; h& S2 [4 q2 D% i
浙大 东南2
1 l+ t. X0 R: O4 u0 F武大北邮等 18 A9 a6 v0 ?6 s) A
包括清华上交在内,大部分都是空白?

分区版主

Rank: 8Rank: 8

3226

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-19 16:58:58 | 显示全部楼层
大师大楼 发表于 2024-2-19 16:57! S6 C; F( F" b: [; `5 C
usenix security 2024) a! P) e2 ], D# ?3 H  ]$ d
浙大 2
9 S: M  [# [! q$ W7 C7 {: H武大北邮等 1
) ?6 _+ J3 V' f/ V
还有一轮应该没出来

老战友

Rank: 5Rank: 5

1857

积分

1

贡献

800

奖励
发表于 2024-2-19 17:08:00 | 显示全部楼层
SmithArno 发表于 2024-2-19 16:58
# y7 M9 {4 }1 w0 ^+ K3 W还有一轮应该没出来
4 v  A( ^' N: J6 v
嗯,耐心等待

老战友

Rank: 5Rank: 5

1073

积分

0

贡献

0

奖励
发表于 2024-2-19 19:29:03 来自手机 | 显示全部楼层
清华浙大太牛了!

初出江湖

Rank: 2

97

积分

0

贡献

0

奖励
发表于 2024-2-19 23:24:43 | 显示全部楼层
南京大学三项0蛋啊。1篇都没有啊

未关注公众号会员1

92

积分

0

贡献

0

奖励
发表于 2024-2-20 10:41:54 | 显示全部楼层
三大密码顶会算信息安全的成果吗

分区版主

Rank: 8Rank: 8

3226

积分

0

贡献

1600

奖励
 楼主| 发表于 2024-2-20 10:48:29 来自手机 | 显示全部楼层
ecnuking 发表于 2024-2-20 10:41' l: _/ j$ K' v) _3 a4 s
三大密码顶会算信息安全的成果吗

! J2 `: U: H/ s5 C5 h8 D& h5 l密码方向主要统计三大顶会和密码学顶级期刊JoC。; T9 s: M9 j9 b
目前有零星的信息,IACR还没出Accepted papers。

白银长老

Rank: 8Rank: 8

3170

积分

1

贡献

2000

奖励
发表于 2024-2-21 12:23:18 | 显示全部楼层
浙大徐文渊:连续三年担任网安四大顶会的大会联合主席1 u- T) h9 l7 _. M" G5 ~1 e5 L
USENIX Security 2024" G1 `& d! q% s6 P0 G
NDSS 2023
! J0 t0 I5 H+ k" R# R6 }NDSS 2022

白银长老

Rank: 8Rank: 8

3170

积分

1

贡献

2000

奖励
发表于 2024-2-21 12:24:27 | 显示全部楼层
近日,浙江大学共有12位教师担任国际信息安全顶级会议ACM CCS 2024的程序委员会委员,入选总人数排名全球高校第一。其中巴钟杰、申文博、冯博、刘金飞、罗梦、周亚金、娄坚、姚培森、秦湛(按姓氏笔画排序)9位教师来自浙江大学区块链与数据安全全国重点实验室。

黄金长老

Rank: 9Rank: 9Rank: 9

4533

积分

0

贡献

0

奖励
发表于 2024-2-21 14:20:26 | 显示全部楼层
乡下 发表于 2024-2-19 23:29# t; `: @7 k4 E6 I' w; Y
郑州信大,网安国家队核心队员之一,0蛋?

) T0 z# l1 ^5 ^1 S% I6 h: Y能发吗??

中级站友

Rank: 3Rank: 3

189

积分

0

贡献

100

奖励
发表于 2024-2-23 11:18:14 | 显示全部楼层
没有军信,都是假榜$ V3 G6 Y  @  i2 N4 X5 q8 Z
看看邬院士的程控交换机,才有后来的巨大中华; U$ E3 m& |9 {: e
信息安全,缺了军信,可信度太低

老战友

Rank: 5Rank: 5

1857

积分

1

贡献

800

奖励
发表于 2024-2-23 11:49:38 | 显示全部楼层
本帖最后由 大师大楼 于 2024-2-23 11:51 编辑 " T; [8 F+ ]6 F& G/ Y& f" _
; }3 r; Q, S' S( S3 {; j  Y: A
如果军方还是继续画地为牢,固步自封,不借助世界一流高校和院所的力量,那么俄罗斯就是前车之鉴。

老战友

Rank: 5Rank: 5

1857

积分

1

贡献

800

奖励
发表于 2024-2-23 11:51:14 | 显示全部楼层
academic818 发表于 2024-2-21 12:23
/ S$ Z3 J& v5 G& @  v浙大徐文渊:连续三年担任网安四大顶会的大会联合主席! Q0 g* F& K1 q( C
USENIX Security 2024
; R$ h6 L- g5 v$ ?; s. ^NDSS 2023

. o* s/ ?2 u8 i1 i+ n' N水平是特别高啦,但在中国现行体制下,还有待被发掘

老战友

Rank: 5Rank: 5

1249

积分

1

贡献

800

奖励
发表于 2024-2-23 12:09:24 | 显示全部楼层
大师大楼 发表于 2024-2-23 11:51( P8 z" _! I$ v/ v9 ~$ D/ J: L5 _! [( c
水平是特别高啦,但在中国现行体制下,还有待被发掘

+ ]8 _! F; C7 ?! B她好像比较低调的,待在电气学院内,好像还拒绝提拔副院长

初出江湖

Rank: 2

91

积分

0

贡献

0

奖励
发表于 2024-2-23 12:09:52 | 显示全部楼层
academic818 发表于 2024-2-21 12:23* e" w3 Z  s% i! n; l
浙大徐文渊:连续三年担任网安四大顶会的大会联合主席0 r9 w' Y& ]6 D4 R8 Q+ M
USENIX Security 2024* F/ F% c7 _9 b0 @7 M1 V, }& c2 D
NDSS 2023
) F9 j2 y: {1 S
这么多卖点,宣传太差,差不多的年龄,颜宁都院士了

中级站友

Rank: 3Rank: 3

406

积分

0

贡献

0

奖励
发表于 2024-2-23 12:26:05 来自手机 | 显示全部楼层
也不是每个人都适合做领导哈哈哈

中级站友

Rank: 3Rank: 3

151

积分

0

贡献

0

奖励
发表于 2024-2-25 19:07:24 来自手机 | 显示全部楼层
不知而已 发表于 2024-2-4 23:36* `% @9 T9 p/ ^3 W
华师大王高丽老师更新主页,接收了一篇2024欧密会 ​ ​Yingxin Li, Fukang Liu, Gaoli Wang*. New Records ...

) h/ p8 Z$ i4 \. @5 _1 }华师大软院通讯今年还accepted一篇欧密 《Registered Functional Encryptions from Pairings》
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

论坛的微信公众号(二维码如下),关注获取更多科教信息

Archiver|手机版|网大论坛 ( (鄂ICP备2021013060号-2) )

GMT+8, 2024-11-25 06:11 , Processed in 0.049378 second(s), 22 queries , Gzip On.

鄂公网安备 42018502005923号

Powered by Discuz! X3.4

Copyright © 2001-2022, Tencent Cloud.