|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:01% K" m' U E8 F8 z$ J3 V
秋季 USENIX Security 顶会,不完全统计:3 P/ u& Z' S8 Y
浙大+4& {, C8 c7 b, p! d( _
清华+2
9 N1 @6 d$ b; n2 r) R. n- H8 T东南是3篇?
% S" a6 U+ A8 {* S/ A9 B0 B' p* u: n3 h* E( O4 e K
A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers
- ^4 X+ x' ~0 VChongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell2 d% Z5 s: v0 L; `' X- S
. r5 u& J; O [1 \3 h# s
Relation Mining Under Local Differential Privacy; ~0 l0 m& ?8 G9 P
Kai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell5 [$ H- S8 o/ w& u: Q; A& e: F2 P9 D
# d/ M+ [1 [, h# |% t8 `3 k
FEASE: Fast and Expressive Asymmetric Searchable Encryption
2 b' N0 n- b% v$ A5 s. L% Y5 cLong Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|