|
|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:01 T$ a, k9 }4 R. Q8 h# b/ x
秋季 USENIX Security 顶会,不完全统计:
: H, Z' u- @5 R- m) a# z浙大+42 D1 U0 G8 g0 g4 r3 t* l
清华+2 & R" y/ ~1 J0 ?0 I0 ?/ ` U
东南是3篇?6 z! l" V# ?2 [, h. {1 f
8 A( J5 {4 L& d7 G2 G1 G( O/ y9 FA Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers
8 p$ G( L8 `% b7 {# R* mChongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell
; z1 ]5 N) j( \, v. O
6 h$ ?, X+ d. j8 `Relation Mining Under Local Differential Privacy5 ^: g1 H9 E$ L8 w
Kai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell- J( r: ^4 L0 W; ]0 B: C& K. T
7 e8 \6 V$ m" m A, xFEASE: Fast and Expressive Asymmetric Searchable Encryption# O- w5 n) [9 q/ [+ p
Long Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|