|
|
发表于 2024-7-17 16:08:44
|
显示全部楼层
大师大楼 发表于 2024-7-17 16:01
0 M5 o, t7 T5 J5 S. P4 [秋季 USENIX Security 顶会,不完全统计:
. t7 i4 @7 C- F: b6 q& s J浙大+45 s' c1 ?7 q& W& ~; V
清华+2 ( }+ u }6 h9 F4 Z: O2 d
东南是3篇?
) B) L" h6 Z% d6 D9 ?% K5 A/ A4 _3 W2 w1 ]
A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers0 g' @, ]' `+ X3 V$ i
Chongqing Lei and Zhen Ling, Southeast University; Yue Zhang, Drexel University; Yan Yang and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell8 H4 L: l: S: {3 M3 \5 ^. h) v
6 R! ]6 `. Q5 i) J; BRelation Mining Under Local Differential Privacy
! V9 ?5 a& I5 ]" X+ CKai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, and Junzhou Luo, Southeast University; Xinwen Fu, University of Massachusetts Lowell' O7 f* d& {/ w
- l/ d9 t5 h! i/ }0 P
FEASE: Fast and Expressive Asymmetric Searchable Encryption
/ x+ z& o, d9 b% F, w9 zLong Meng, Liqun Chen, and Yangguang Tian, University of Surrey; Mark Manulis, Universität der Bundeswehr München; Suhui Liu, Southeast University |
|