AsiaCCS 作为目前亚洲地区顶级的安全会议,吸引了全球学者的关注和参与,2024年共收到 588 篇论文(2021:362; 2020:308; 2019:258;2018:310),录用了 129 篇论文(2021:70; 2020:67; 2019:58; 2018:62),录用率为 21.94% (2021:19.34%; 2020:21.75%; 2019:22.48%; 2018:20%)。国内高校入围众多,南京邮电大学、南开大学、华为欧洲研究中心、香港大学、上海复旦微电子集团、中科院信工所、翼支付、北京邮电大学、南方科技大学等。小编将一些跟自己相关的论文标记出来供大家查阅,所有录用论文标题如下,所有论文全文均可以通过底部的(原文链接)直接下载:
Arthur Drichel, Marc Meyer, Ulrike Meyer (RWTH Aachen University)
Lars Prehn (Max Planck Institute for Informatics); Pawel Foremski (IITiS PAN / DomainTools); Oliver Gasser (IPinfo / Max Planck Institute for Informatics)
Florent Moriconi (EURECOM, Amadeus); Olivier Levillain (Samovar, Télécom SudParis, Institut Polytechnique de Paris); Aurélien Francillon, Raphael Troncy (EURECOM)
Udesh Kumarasinghe (University of Colombo); Ahmed Lekssays, Husrev Taha Sencar, Sabri Boughorbel (Qatar Computing Research Institute); Charitha Elvitigala (C2SI); Preslav Nakov (MBZUAI)
Junjian Ye (Nanjing University of Posts and Telecommunications); Xavier de Carné de Carnavalet (The Hong Kong Polytechnic University); Lianying Zhao (Carleton University); Mengyuan Zhang (Vrije Universiteit Amsterdam); Lifa Wu, Wei Zhang (Nanjing University of Posts and Telecommunications)
Sebastian Zillien (Worms University of Applied Sciences); Tobias Schmidbauer (Nuremberg Institute of Technology); Mario Kubek (Georgia State University); Joerg Keller (FernUniversität in Hagen); Steffen Wendzel (Worms University of Applied Sciences/FernUniversität in Hagen)
Xiangmin Shen (Northwestern University); Zhenyuan Li (Zhejiang University); Graham Burleigh, Lingzhi Wang, Yan Chen (Northwestern University)
Ali Davanian, Michail Faloutsos (University of California Riverside); Martina Lindorfer (TU Wien)
Lukas Giner, Roland Czerny, Christoph Gruber, Fabian Rauscher, Andreas Kogler (Graz University of Technology); Daniel De Almeida Braga (University of Rennes, CNRS, IRISA); Daniel Gruss (Graz University of Technology)
Torsten Krauß, Jasper Stang, Alexandra Dmitrienko (University of Würzburg)
Ethan Ferguson, Adam Wilson, Hoda Naghibijouybari (Binghamton University)
William Kosasih (University of Adelaide); Yusi Feng (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences); Chitchanok Chuengsatiansup (The University of Melbourne); Yuval Yarom (Ruhr University Bochum); Ziyuan Zhu (Institute of Information Engineering, Chinese Academy of Sciences)
Kartik Ramkrishnan (University Of Minnesota); Stephen McCamant, Antonia Zhai (University of Minnesota); Pen Chung Yew (University of Minnesota at Twin Cities)
Tiziano Marinaro (CISPA Helmholtz Center for Information Security and Saarland University); Pablo Buiras, Andreas Lindner, Roberto Guanciale, Hamed Nemati (KTH Royal Institute of Technology)
Markus Bauer, Lorenz Hetterich, Michael Schwarz, Christian Rossow (CISPA Helmholtz Center for Information Security)
Omid Bazangani, Alexandre Iooss, Ileana Buhan, Lejla Batina (Radboud University)
Xiaowei Ge, Guanxiong Ha (College of Cyber Science, Nankai University); Chunfu Jia (Nankai University); Zhen Su (College of Cyber Science, Nankai University)
Nan Cheng (University of St. Gallen); Melek Önen (EURECOM); Aikaterini Mitrokotsa (University of St. Gallen); Oubaïda Chouchane, Massimiliano Todisco (EURECOM); Alberto Ibarrondo (Copper.co)
Yufan Jiang, Fei Mei, Tianxiang Dai, Yong Li (Huawei European Research Center)
Mingshu Cong (The University of Hong Kong); Tsz Hon Yuen (Monash University); Siu-Ming Yiu (The University of Hong Kong)
Malte Breuer, Ulrike Meyer (RWTH Aachen University); Susanne Wetzel (Stevens Institute of Technology)
Minghua Zhao (Shanghai Fudan Microelectronics Group Company Limited)
Yunqi Li, Kyle Soska (University of Illinois at Urbana-Champaign); Zhen Huang (Shanghai Jiao Tong University); Sylvain Bellemare (The Initiative for CryptoCurrencies and Contracts); Mikerah Quintyne-Collins (HashCloack Inc.); Lun Wang (Google); Xiaoyuan Liu, Dawn Song (University of California, Berkeley); Andrew Miller (University of Illinois at Urbana-Champaign)
Senlin Liu, Tong Gao, Yijian Liu, Xianhui Lu (Institute of Information Engineering, CAS, University of Chinese Academy of Sciences)
Anne Josiane Kouam (TU Berlin); Aline Carneiro Viana (INRIA); Alain Tchana (Grenoble INP)
Antonio Ruggia (University of Genova); Dario Nisi, Savino Dambra (EURECOM); Alessio Merlo (CASD – School for Advanced Defense Studies); Davide Balzarotti, Simone Aonzo (EURECOM)
Shanghao Shi (Virginia Tech); Yang Xiao (University of Kentucky); Changlai Du, Yi Shi (Virginia Tech); Chonggang Wang, Robert Gazda (InterDigital); Y. Thomas Hou, Eric Burger, Luiz DaSilva, Wenjing Lou (Virginia Tech)
Wei Wang (Saint Louis University); Xin Liu (The Ohio State University); Zicheng Chi (Cleveland State University); Stuart Ray (Saint Louis University); Ting Zhu (The Ohio State University)
Florian Frank, Martin Schmid, Felix Klement (University of Passau); Purushothaman Palani (Virginia Tech); Andreas Weber, Elif Bilge Kavun (University of Passau); Wenjie Xiong (Virginia Tech); Tolga Arul, Stefan Katzenbeisser (University of Passau)
Zhi Zhang (The University of Western Australia); Decheng Chen, Jiahao Qi (School of Microelectronics, South China University of Technology, China); Yueqiang Cheng (NIO); Shijie Jiang, Yiyang Lin (School of Microelectronics, South China University of Technology, China); Yansong Gao, Surya Nepal (CSIRO’s Data61); Yi Zou (School of Microelectronics, South China University of Technology, China); Jiliang Zhang (College of Integrated Circuits, Hunan University, China); Yang Xiang (School of Software and Electrical Engineering, Swinburne University of Technology, Australia)
Jubayer Mahmod, Matthew Hicks (Virginia Tech)
Andrew Adiletta, M. Caner Tol, Yarkın Doröz, Berk Sunar (Worcester Polytechnic Institute)
Moritz Peters (Horst Görtz Institute for IT-Security, Ruhr University Bochum); Nicolas Gaudin (UMR 6285, Lab-STICC, Univ. Bretagne-Sud, Lorient, France); Jan Philipp Thoma (Horst Görtz Institute for IT-Security, Ruhr University Bochum); Vianney Lapôtre (UMR 6285, Lab-STICC, Univ. Bretagne-Sud, Lorient, France); Pascal Cotret (UMR 6285, Lab-STICC, ENSTA Bretagne, Brest, France); Guy Gogniat (UMR 6285, Lab-STICC, Univ. Bretagne-Sud, Lorient, France); Tim Güneysu (Ruhr University Bochum, Bochum, DFKI GmbH, Bremen)
Md Hafizul Islam Chowdhuryy (University of Central Florida); Zhenkai Zhang (Clemson University); Fan Yao (University of Central Florida)
Bo Yu, Huajie Shen, Qian Xu, Wei He, Wankui Mao, Qing Zhang (Bestpay Co., Ltd.); Fan Zhang (Zhejiang University)
Poulami Das (CISPA Helmholtz Center for Information Security); Andreas Erwig (Technical University of Darmstadt); Michael Meyer (University of Regensburg); Patrick Struck (University of Konstanz)
Samuel Pagliarini (Carnegie Mellon University/Tallinn University of Technology); Aikata Aikata (Institute of Applied Information Processing and Communications, Graz University of Technology); Malik Imran (Tallinn University of Technology); Sujoy Sinha Roy (Institute of Applied Information Processing and Communications, Graz University of Technology)
Mingyao Shao (Institute of Information Engineering, CAS & School of Cyber Security, UCAS); Yuejun Liu (School of Cyber Science and Engineering, NJUST ); Yongbin Zhou (School of Cyber Science and Engineering, NJUST & Institute of Information Enginee, CAS & School of Cyber Security, UCAS)
Andre Esser, Javier Verbel, Floyd Zweydinger, Emanuele Bellini (Technology Innovation Institute)
Lena Heimberger, Tobias Hennerbichler (Graz University of Technology); Fredrik Meisingseth (Graz University of Technology and Know-Center); Sebastian Ramacher (AIT Austrian Institute of Technology); Christian Rechberger (Graz University of Technology)
Nethanel Gelernter (IONIX ); Haya Schulmann (Goethe-Universität Frankfurt); Michael Waid- ner (Fraunhofer SIT and TU Darmstadt)
Jenny Blessing (University of Cambridge); Michael Specter (Georgia Institute of Technology); Daniel J. Weitzner (MIT )
Anastasios Lepipas, Anastasia Borovykh, Soteris Demetriou (Imperial College London)
Rana Pourmohamad, Steven Wirsz, Adam Oest, Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Adam Doupé, Rida A. Bazzi (Arizona State University)
Wenbo Ding (University at Buffalo); Song Liao, Long Cheng (Clemson University); Xianghang Mi (University of Science and Technology of China); Ziming Zhao, Hongxin Hu (University at Buffalo)
Hyojin Kim, Minji Jo, Jiwoo Hong, Hosung Kang (Ewha Womans University); Nate Mathews (Rochester Institute of Technology); Se Eun Oh (Ewha Womans University)
Mehreen Jabbeen, Vireshwar Kumar (Indian Institute of Technology, Delhi); Rijurekha Sen (IIT Delhi)
Romain Cayre (EURECOM); Vincent Nicomette, Guillaume Auriol, Mohamed Kaâniche (LAAS-CNRS); Aurélien Francillon (EURECOM)
Binghan Wang, Hui Li, Jingjing Guan (Beijing University of Posts and Telecommunications, Beijing, China)
Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang (University of Luxembourg)
Luke Harrison, Samiran Bag, Feng Hao (University of Warwick)
Zilin Shen, Imtiaz Karim, Elisa Bertino (Purdue University)
Eric Olsson, Benjamin Eriksson (Chalmers University of Technology); Pablo Picazo-Sanchez (Chalmers University of Technology, Halmstad University); Lukas Andersson, Andrei Sabelfeld (Chalmers University of Technology)
Sheryl Hsu, Manda Tran (Stanford University); Aurore Fass (Stanford University, CISPA Helmholtz Center for Information Security)
Xuhang Gu, Qingyang Wang (Louisiana State University); Qiben Yan (Michigan State University); Jianshu Liu (Louisiana State University); Calton Pu (Georgia Tech)
Merve Sahin, Noemi Daniele (SAP Security Research)
Chao Wang (The Ohio State University); Yue Zhang (Drexel University); Zhiqiang Lin (The Ohio State University)
Jannis Rautenstrauch, Ben Stock (CISPA Helmholtz Center for Information Security)
Woonghee Lee, Junbeom Hur (Korea University); Doowon Kim (University of Tennessee, Knoxville)
Nozima Murodova, Hyungjoon Koo (Sungkyunkwan University)
Piet De Vaere (ETH Zürich); Felix Stöger, Adrian Perrig (ETH Zürich); Gene Tsudik (UCI )
Muneeba Asif (Florida International University); Ahmad Mohammad (Middle Tennessee State University); Mohammad Ashiqur Rahman, Kemal Akkaya (Florida International University)
Maryna Veksler, Kemal Akkaya, Selcuk Uluagac (Florida International University)
Pritam Dash (University of British Columbia); Guanpeng Li (University of Iowa); Mehdi Karimibiuki, Karthik Pattabiraman (University of British Columbia)
Yiting Qu, Zhikun Zhang (CISPA Helmholtz Center for Information Security); Yun Shen (Netapp); Michael Backes, Yang Zhang (CISPA Helmholtz Center for Information Security)
Zhiang Li (National University of Singapore); Daisuke Mashima, Wen Shei Ong, Ertem Esiner (Illinois ARCS); Zbigniew Kalbarczyk (University of Illinois at Urbana-Champaign); Ee-Chien Chang (School of Computing, NUS)
Eric Wagner (Fraunhofer FKIE & RWTH Aachen University); David Heye (RWTH Aachen University & Fraunhofer FKIE); Martin Serror (Fraunhofer FKIE); Ike Kunze, Klaus Wehrle (RWTH Aachen University); Martin Henze (RWTH Aachen University & Fraunhofer FKIE)
Khaled Sarieddine, Mohammad Ali Sayed (Concordia University); Sadegh Torabi (George Mason University); Ribal Attallah, Danial Jafarigiv (Hydro-Quebec Research Institute); Chadi Assi (Concordia University); Mourad Debbabi (Security Research Centre, Concordia University, Quebec, Canada)
Amir Sabbagh Molahosseini (Queen’s University Belfast); Hans Vandierendonck (Queen’s University of Belfast)
Xinpeng Yang, Liang Cai, Yinghao Wang, Keting Yin, Lu Sun (Zhejiang University); Jingwei Hu (Nanyang Technological University)
Afonso Arriaga (SnT, University of Luxembourg); Peter Y.A. Ryan (SnT, Univeristy of Luxembourg); Marjan Skrobot (SnT, University of Luxembourg)
Yifei Cai (Old Dominion University); Qiao Zhang (Chongqing University); Rui Ning, Chunsheng Xin (Old Dominion University); Hongyi Wu (University of Arizona)
Han Xia, Mingsheng Wang (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS; School of Cyber Security, University of Chinese Academy of Sciences)
Kwan Yin Chan (The University of Hong Kong); Liqun Chen, Yangguang Tian (University of Surrey); Tsz Hon Yuen (Monash University)
Amit Singh Bhati (COSIC, KU Leuven); Antonín Dufka (Masaryk University); Elena Andreeva (Technical University of Vienna); Arnab Roy (University of Innsbruck); Bart Preneel (COSIC, KU Leuven)
Chaojie Lv (University of Science and Technology of China); Xiaokui Xiao (NUS); Lan Zhang (University of Science and Technology of China); Ting Yu (Qatar Computing Research Institute)
Jonas Möller, Felix Weißberg, Lukas Pirch, Thorsten Eisenhofer, Konrad Rieck (Technische Universität Berlin)
Trevor Dunlap, Elizabeth Lin, William Enck, Bradley Reaves (North Carolina State University)
Alwin Maier, Felix Weißberg, Konrad Rieck (TU Berlin)
Marius Momeu, Fabian Kilger, Christopher Roemheld, Simon Schnückel (Technical University of Munich); Sergej Proskurin (BedRock Systems); Michalis Polychronakis (Stony Brook University); Vasileios P. Kemerlis (Brown University)
Andreas Hager-Clukas (University of Applied Sciences Munich); Konrad Hohentanner (Fraunhofer AISEC)
Xu He, Shu Wang (George Mason University); Pengbin Feng (Xidian University); Xinda Wang (The University of Texas at Dallas); Shiyu Sun (George Mason University); Qi Li (Tsinghua University); Kun Sun (George Mason University)
Lukas Maar, Pascal Nasahl, Stefan Mangard (Graz University of Technology, Graz)
Jiacheng Liang (Stony Brook University); Ren Pang (Penn State University); Changjiang Li, Ting Wang (Stony Brook University)
Abhinav Kumar (Saint Louis University); Miguel A. Guirao Aguilera (New Mexico State University); Reza Tourani (Saint Louis University); Satyajayant Misra (New Mexico State University)
Thirasara Ariyarathna (University of New South Wales); Meisam Mohammady (Iowa State University of Science and Technology, Iowa, The USA); Hye-Young Paik, Salil S. Kanhere (University of New South Wales)
Oshan Jayawardena, Dilmi Caldera, Sandani Jayawardena, Avishka Sandeepa (University of Moratuwa); Vincent Bindschaedler (University of Florida); Subodha Charles (University of Moratuwa)
Kane Walter (UNSW, Sydney, Australia); Meisam Mohammady (Iowa State University of Science and Technology, Iowa, The USA); Surya Nepal (Data61, CSIRO); Salil S. Kanhere (UNSW, Sydney, Australia)
Zahra Mousavi (CREST – The Centre for Research on Engineering Software Technologies, University of Adelaide, Cyber Security Cooperative Research Centre, CSIRO/Data61, Australia); Chadni Islam (Queensland University of Technology); Kristen Moore, Alsharif Abuadbba (CSIRO’s Data61, Australia); M. Ali Babar (CREST – The Centre for Research on Engineering Software Technologies, University of Adelaide)
Bocheng Chen (Michigan State University); Nikolay Ivanov (Rowan University); Guangjing Wang, Qiben Yan (Michigan State University)
Linkang Du, Quan Yuan (Zhejiang University); Min Chen (CISPA Helmholtz Center for Information Security); Mingyang Sun, Peng Cheng, Jiming Chen, Zhikun Zhang (Zhejiang University)
Giacomo Giuliari (ETH Zürich & Mysten Labs); Alberto Sonnino (Mysten Labs & University College London (UCL)); Marc Frei (ETH Zürich); Fabio Streun (Anapaya Systems); Lefteris Kokoris-Kogias (Mysten Labs & IST Austria); Adrian Perrig (ETH Zürich & Mysten Labs)
Jamal H. Mosakheil, Kan Yang (The University of Memphis)
Kanchan Bisht, Neel Yogendra Kansagra, Reisha Ali, Mohammed Sayeed Shaik, Maria Francis, Kotaro Kataoka (IIT Hyderabad)
Sanidhay Arora, Yingjiu Li (University of Oregon); Yebo Feng (Nanyang Technological University); Jiahua Xu (UCL)
Jongho Kim, Junhee Lee, Hyunok Oh (Hanyang University); Jihye Kim (Kookmin University)
Xiang Zhou, Xi Xiao (Shenzhen International Graduate School, Tsinghua University, China); Qing Li (Peng Cheng Laboratory); Bin Zhang (Pengcheng Laboratory); Guangwu Hu (School of Computer Science, Shenzhen Institute of Information Technology,Shenzhen, China); Xiapu Luo (The Hong Kong Polytechnic University); Tianwei Zhang (Nanyang Technological University)
Chenke Wang, Zhonghui Ge, Yu Long (Shanghai Jiao Tong University); Xian Xu (East China University of Science and Technology); Shi-Feng Sun, Dawu Gu (Shanghai Jiao Tong University)
Emrah Sariboz (New Mexico State University); Reza Tourani (Saint Louis University); Roopa Vishwanathan, Satyajayant Misra (New Mexico State University)
Simon Luo (The University of New South Wales); Adrian Herrera (Australian National Univeristy); Paul Quirk, Michael Chase (DSTG); Damith C. Ranasinghe (University of Adelaide); Salil S Kanhere (The University of New South Wales)
Gwangmu Lee, Duo Xu (EPFL); Solmaz Salimi (Sharif University of Technology); Byoungyoung Lee (Seoul National University); Mathias Payer (EPFL)
Shashank Sharma, Sai Ritvik Tanksalkar, Sourag Cherupattamoolayil, Aravind Machiry (Purdue University)
TaeWook Kim, Seokhyun Hong, Yeongpil Cho (Hanyang University)
Sebastian Neef, Lorenz Kleissner, Jean-Pierre Seifert (Technische Universität Berlin)
Felix Weissberg, Jonas Möller (Technische Universität Berlin); Tom Ganz, Erik Imgrund (SAP Security Research); Lukas Pirch (Technische Universität Berlin); Lukas Seidel (Binarly); Moritz Schloegel (CISPA Helmholtz Center for Information Security); Thorsten Eisenhofer, Konrad Rieck (Technische Universität Berlin)
Zhanbo Wang (Research Institute of Trustworthy Autonomous Systems, Southern University of Science and Technology, China, and Peng Cheng Laboratory, China); Jiaxin Zhan (Research Institute of Trustworthy Autonomous Systems, Southern University of Science and Technology, China, and Department of Computer Science and Engineering, Southern University of Science and Technology, China); Xuhua Ding (Singapore Management University); Fengwei Zhang (Department of Computer Science and Engineering, Southern University of Science and Technology, China, and Research Institute of Trustworthy Autonomous Systems, Southern University of Science and Technology, China); Ning Hu (Peng Cheng Laboratory, China)
Jonas Röckl, Nils Bernsdorf (FAU Erlangen-Nürnberg); Tilo Müller (Hof University of Applied Sciences)
MD Armanuzzaman (University at Buffalo); Ahmad-Reza Sadeghi (Technische Universität Darmstadt); Ziming Zhao (University at Buffalo)
Mengyuan Li, Yuheng Yang (Massachusetts Institute of Technology); Guoxing Chen (Shanghai Jiao Tong University); Mengjia Yan (Massachusetts Institute of Technology); Yinqian Zhang (Southern University of Science and Technology)
Simon Ott, Benjamin Orthen, Alexander Weidinger, Julian Horsch (Fraunhofer AISEC); Vijayanand Nayani, Jan-Erik Ekberg (Huawei Technologies)
Yurak Choe (Sungkyunkwan University); Hyungseok Yu, Taeho Kim, Shinjae Lee (Samsung Electronics); Hojoon Lee, Hyoungshick Kim (Sungkyunkwan University)
William Holland (CSIRO’s data61); Olga Ohrimenko (The University of Melbourne); Anthony Wirth (the University of Melbourne)
Fuyi Wang (Deakin University); Zekai Chen (Fuzhou University); Lei Pan (Deakin University); Leo Yu Zhang (Griffith University); Jianying Zhou (Singapore University of Technology and Design)
Leonie Reichert, Gowri R Chandran (Technical University of Darmstadt); Phillipp Schoppmann (Google); Thomas Schneider, Björn Scheuermann (Technical University of Darmstadt)
Arnab Bag (Indian Institute of Technology Kharagpur); Sikhar Patranabis (IBM Research India); Debdeep Mukhopadhyay (Department of Computer Science and Engineering, IIT Kharagpur)
Samuel Jaques (University of Waterloo); Hart Montgomery (The Linux Foundation); Michael Lodder
Xiangfu Song (National University of Singapore); Yu Zheng (Chinese University of Hong Kong); Jianli Bai (University of Auckland); Changyu Dong (Guangzhou University); Zheli Liu (Nankai University); Ee-Chien Chang (National University of Singapore)
Ryo Iijima (National Institute of Advanced Industrial Science and Technology, Waseda University); Tatsuya Takehisa (National Institute of Information and Communications Technology); Tetsushi Ohki (Shizuoka University, RIKEN AIP); Tatsuya Mori (Waseda University, NICT, RIKEN AIP)
Ritik Roongta, Rachel Greenstadt (New York University)
Berend Kloeg (Northwave Cyber Security); Aaron Yi Ding (TU Delft); Sjoerd Pellegrom (Northwave Cyber Security); Yury Zhauniarovich (TU Delft)
Mohammad Majid Akhtar, Rahat Masood (University of New South Wales); Muhammad Ikram (Macquarie University); Salil S Kanhere (UNSW, Sydney, Australia)
Wei-Zhu Yeoh, Lucjan Hanzlik, Oliver Valta (CISPA Helmholtz Center for Information Security)
Douglas Stebila, Spencer Wilson (University of Waterloo)
Quentin Kniep, Roger Wattenhofer (ETH Zürich)
Guy Zyskind (MIT ); Avishay Yanai (unaffiliated); Alex Pentland (MIT)
Mohammed Ababneh, Kartick Kolachala, Roopa Vishwanathan (New Mexico State University)
Gaurav Panwar, Roopa Vishwanathan, George Torres, Satyajayant Misra (New Mexico State University)
Kartick Kolachala, Mohammed Ababneh, Roopa Vishwanathan (New Mexico State University)
Pascal Lafourcade, Dhekra Mahmoud, Gael Marcadet (Université Clermont-Auvergne, CNRS, Clermont-Auvergne-INP, LIMOS); Charles Olivier-Anclin (be ys Pay and Université Clermont-Auvergne, CNRS, Clermont-Auvergne-INP, LIMOS and LIFO, Université d’Orléans, INSA Centre Val de Loire)
https://asiaccs2024.sutd.edu.sg/
历年会议
安全学术圈招募队友-ing 有兴趣加入学术圈的请联系secdr#qq.com