|
|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:01
. w$ ?* T6 Y5 F! a! h秋季 USENIX Security 顶会,不完全统计:+ f- v. n1 h* O3 R
浙大+40 g) w0 v2 X5 Y& ^; j* y, O' H
清华+2 3 x! S- q2 [/ r& k% ]
东南是3篇?
a7 A( m+ F" X6 Z2 f A
8 m, g7 p7 L/ L" [A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers
) t; u* y! {: {1 C; \" @) VChongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell8 A* T, t- ^" Q O8 g
) Q7 n: t4 d) zRelation Mining Under Local Differential Privacy% A' g# M# ?+ P7 h: X: W
Kai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell
* R; j% l6 x5 r7 D. ]3 c/ f2 N# `2 u+ K
FEASE: Fast and Expressive Asymmetric Searchable Encryption% ^6 v$ S3 K: b, {2 }9 [
Long Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|