|
|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:01 n) r3 w( t* t2 B' E
秋季 USENIX Security 顶会,不完全统计:
6 d8 k p: Y$ b0 Y. J1 W浙大+4" \: k# d$ W3 |
清华+2 ' u- k# B9 J+ i% F3 L8 J9 X
东南是3篇?0 n) O) ~2 \: ?' |; f$ Q& o2 y
& h; B: x* W1 t: t' `A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers
( s0 J" O; t/ m2 uChongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell
1 g$ ~, e0 P/ U& B) R, q8 B# H2 c& K6 }/ e6 q
Relation Mining Under Local Differential Privacy
4 D: w2 a* [; i) x J8 t/ q" Y9 vKai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell
: v6 ]( u1 t3 B+ l( b' v( B; F1 t6 ^0 l; `; y# ~
FEASE: Fast and Expressive Asymmetric Searchable Encryption3 h4 ] k! T- M* P7 L
Long Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|