Search Results - binary code models
-
1
Authors:
Contributors:
Source: urn:tid:203741420
Subject Terms: Verificação de Modelos, Vulnerabilidades de Overflow na Pilha, Código Binário, Execução Concólica, Análise Estática, Teses de mestrado - 2024
File Description: application/pdf
Availability: http://hdl.handle.net/10400.5/95544
-
2
Authors: et al.
Source: Journal of Supercomputing. Oct2025, Vol. 81 Issue 15, p1-33. 33p.
-
3
-
4
Authors: et al.
Source: Entropy; Apr2025, Vol. 27 Issue 4, p392, 23p
Subject Terms: GRAPH neural networks, NATURAL language processing, LANGUAGE models, BINARY codes, DEEP learning
-
5
-
6
Authors: et al.
-
7
Authors: et al.
Source: Empirical Software Engineering; Feb2026, Vol. 31 Issue 1, p1-38, 38p
-
8
Authors: et al.
-
9
Authors:
Source: Remote Sensing. Sep2024, Vol. 16 Issue 18, p3418. 27p.
Subject Terms: *DIGITAL elevation models, *CLIMATOLOGY, *BINARY codes, *ABSOLUTE sea level change, *SEDIMENT transport
Company/Entity: GEOLOGICAL Survey (U.S.)
-
10
Authors: et al.
Source: Applied Sciences (2076-3417); Sep2025, Vol. 15 Issue 17, p9458, 23p
Subject Terms: BINARY codes, GRAPH neural networks, MALWARE, HYPOTHESIS
-
11
Alternate Title: 二进制代码表征技术研究进展综述. (Chinese)
Authors: et al.
Source: Frontiers of Information Technology & Electronic Engineering; May2025, Vol. 26 Issue 5, p671-694, 24p
-
12
Authors: et al.
Source: PeerJ Computer Science; Jan2025, p1-22, 22p
Subject Terms: BINARY codes, INTEGRAL functions, TRANSFORMER models, LINEAR network coding, DEEP learning
-
13
Authors: et al.
Source: Information & Software Technology. Feb2026, Vol. 190, pN.PAG-N.PAG. 1p.
Subject Terms: *COMPUTER security, BINARY codes, DEEP learning, LANGUAGE models, PENETRATION testing (Computer security)
-
14
-
15
Authors: et al.
Source: Sensors (14248220). Sep2023, Vol. 23 Issue 18, p7789. 22p.
Subject Terms: *BINARY codes, *LANGUAGE models, *COMPUTER security, *INTERNET, *APPLICATION software
-
16
Authors: et al.
Source: IEEE Access, Vol 12, Pp 161247-161269 (2024)
Subject Terms: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, binary code models, Adversarial attacks, binary similarity, TK1-9971, Machine Learning (cs.LG), greedy, Electrical engineering. Electronics. Nuclear engineering, binary analysis, black-box attacks, Cryptography and Security (cs.CR), Adversarial Attacks, Binary Analysis, Binary Code Models, Binary Similarity, Black-box Attacks, Greedy, White-box Attacks
File Description: application/pdf
-
17
Authors: et al.
Source: 2024 International Conference on IoT, Communication and Automation Technology (ICICAT). :1671-1676
-
18
Authors: Al-Kaswan, Ali (author)
Index Terms: Machine Learning, Cyber Security, Reverse engineering, Natural Language Processing, Transformers, Deep Learning, master thesis
-
19
Authors: et al.
Source: Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence. :7715-7723
-
20
Authors:
Source: IEEE Access, Vol 11, Pp 102796-102805 (2023)
Nájsť tento článok vo Web of Science
Full Text Finder