|
|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:01
9 s) \1 ?2 _+ L7 F" n: [秋季 USENIX Security 顶会,不完全统计:2 J4 n, L, U- }/ a& K8 \
浙大+45 O) \$ e1 x9 p. t
清华+2 ! A1 _" t6 j6 p( z# ^3 [
东南是3篇?4 u9 k+ O; R' v7 d* k. _. }
8 p! A" o: i7 I) \$ @A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers1 A- B/ B) V2 l1 h
Chongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell
/ y3 e- c( V& ~& A! I8 |# M J5 @) [. y2 ^; I
Relation Mining Under Local Differential Privacy+ p! ^% N+ H9 d6 e; w! T
Kai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell
3 q3 y( d( X* K1 f4 {4 o" d6 ?0 g0 I8 L
FEASE: Fast and Expressive Asymmetric Searchable Encryption
4 A" L g: ?# c WLong Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|