Search Results - "binary code"

Refine Results
  1. 1

    Scalable Supervised Asymmetric Hashing With Semantic and Latent Factor Embedding by Zhang, Zheng, Lai, Zhihui, Huang, Zi, Wong, Wai Keung, Xie, Guo-Sen, Liu, Li, Shao, Ling

    ISSN: 1057-7149, 1941-0042, 1941-0042
    Published: United States IEEE 01.10.2019
    Published in IEEE transactions on image processing (01.10.2019)
    “…Compact hash code learning has been widely applied to fast similarity search owing to its significantly reduced storage and highly efficient query speed…”
    Get full text
    Journal Article
  2. 2

    EdgeSim: Firmware vulnerability detection with control transfer-enhanced binary code similarity detection by Liu, Li, Wang, Shen, Jiang, Xunzhi

    ISSN: 0950-5849
    Published: Elsevier B.V 01.04.2026
    Published in Information and software technology (01.04.2026)
    “…The widespread adoption of Internet of Things (IoT) devices has amplified the impact of vulnerabilities in embedded firmware. Binary code similarity detection…”
    Get full text
    Journal Article
  3. 3

    Learning Discriminant Direction Binary Palmprint Descriptor by Lunke Fei, Zhang, Bob, Yong Xu, Zhenhua Guo, Jie Wen, Wei Jia

    ISSN: 1057-7149, 1941-0042, 1941-0042
    Published: United States IEEE 01.08.2019
    Published in IEEE transactions on image processing (01.08.2019)
    “…Palmprint directions have been proved to be one of the most effective features for palmprint recognition. However, most existing direction-based palmprint…”
    Get full text
    Journal Article
  4. 4

    Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search with Emulation by Xue, Yinxing, Xu, Zhengzi, Chandramohan, Mahinthan, Liu, Yang

    ISSN: 0098-5589, 1939-3520
    Published: New York IEEE 01.11.2019
    Published in IEEE transactions on software engineering (01.11.2019)
    “…Different from source code clone detection, clone detection (similar code search) in binary executables faces big challenges due to the gigantic differences in…”
    Get full text
    Journal Article
  5. 5

    Hadamard Matrix Guided Online Hashing by Lin, Mingbao, Ji, Rongrong, Liu, Hong, Sun, Xiaoshuai, Chen, Shen, Tian, Qi

    ISSN: 0920-5691, 1573-1405
    Published: New York Springer US 01.09.2020
    Published in International journal of computer vision (01.09.2020)
    “…Online image hashing has attracted increasing research attention recently, which receives large-scale data in a streaming manner to update the hash functions…”
    Get full text
    Journal Article
  6. 6

    Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection by Luo, Lannan, Ming, Jiang, Wu, Dinghao, Liu, Peng, Zhu, Sencun

    ISSN: 0098-5589, 1939-3520
    Published: New York IEEE 01.12.2017
    Published in IEEE transactions on software engineering (01.12.2017)
    “…Existing code similarity comparison methods, whether source or binary code based, are mostly not resilient to obfuscations. Identifying similar or identical…”
    Get full text
    Journal Article
  7. 7

    Learning Compact Multifeature Codes for Palmprint Recognition From a Single Training Image per Palm by Fei, Lunke, Zhang, Bob, Zhang, Lin, Jia, Wei, Wen, Jie, Wu, Jigang

    ISSN: 1520-9210, 1941-0077
    Published: Piscataway IEEE 2021
    Published in IEEE transactions on multimedia (2021)
    “…In this article, we propose a multifeature learning method to jointly learn compact multifeature codes (LCMFCs) for palmprint recognition with a single…”
    Get full text
    Journal Article
  8. 8

    BinDeep: A deep learning approach to binary code similarity detection by Tian, Donghai, Jia, Xiaoqi, Ma, Rui, Liu, Shuke, Liu, Wenjing, Hu, Changzhen

    ISSN: 0957-4174, 1873-6793
    Published: New York Elsevier Ltd 15.04.2021
    Published in Expert systems with applications (15.04.2021)
    “…•We propose a novel deep learning based solution for binary code similarity detection.•We use the instruction embedding model to vectorize the extracted…”
    Get full text
    Journal Article
  9. 9

    Variety of mutual-visibility problems in hypercubes by Korže, Danilo, Vesel, Aleksander

    ISSN: 0096-3003
    Published: Elsevier Inc 15.04.2025
    Published in Applied mathematics and computation (15.04.2025)
    “…Let G be a graph and M⊆V(G). Vertices x,y∈M are M-visible if there exists a shortest x,y-path of G that does not pass through any vertex of M∖{x,y}. We say…”
    Get full text
    Journal Article
  10. 10

    Proposal for 4-to-2 optical encoder based on photonic crystals by Mehdizadeh, Farhad, Soroosh, Mohammad, Alipour-Banaei, Hamed

    ISSN: 1751-8768, 1751-8776
    Published: The Institution of Engineering and Technology 01.02.2017
    Published in IET optoelectronics (01.02.2017)
    “…In this study, an all optical 4-to-2 encoder have been proposed which has four input and three output ports. The proposed structure can generate a 2-bit binary…”
    Get full text
    Journal Article
  11. 11

    Learning binary code for fast nearest subspace search by Zhou, Lei, Bai, Xiao, Liu, Xianglong, Zhou, Jun, Hancock, Edwin R.

    ISSN: 0031-3203, 1873-5142
    Published: Elsevier Ltd 01.02.2020
    Published in Pattern recognition (01.02.2020)
    “…•We design a new objective function which not only considers the hamming distances between similar pairs, but also constrains the hamming distances between…”
    Get full text
    Journal Article
  12. 12

    Adaptive Hashing With Sparse Matrix Factorization by Liu, Huawen, Li, Xuelong, Zhang, Shichao, Tian, Qi

    ISSN: 2162-237X, 2162-2388, 2162-2388
    Published: United States IEEE 01.10.2020
    “…Hashing offers a desirable and effective solution for efficiently retrieving the nearest neighbors from large-scale data because of its low storage and…”
    Get full text
    Journal Article
  13. 13

    Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization by Ding, Steven H. H., Fung, Benjamin C. M., Charland, Philippe

    ISSN: 2375-1207
    Published: IEEE 01.05.2019
    “…Reverse engineering is a manually intensive but necessary technique for understanding the inner workings of new malware, finding vulnerabilities in existing…”
    Get full text
    Conference Proceeding
  14. 14

    Strtune: Data Dependence-Based Code Slicing for Binary Similarity Detection With Fine-Tuned Representation by He, Kaiyan, Hu, Yikun, Li, Xuehui, Song, Yunhao, Zhao, Yubo, Gu, Dawu

    ISSN: 1556-6013, 1556-6021
    Published: IEEE 2024
    “…Binary Code Similarity Detection (BCSD) is significant for software security as it can address binary tasks such as malicious code snippets identification and…”
    Get full text
    Journal Article
  15. 15

    Binary Code Representation with Well-balanced Instruction Normalization by Koo, Hyungjoon, Park, Soyeon, Choi, Daejin, Kim, Taesoo

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 01.01.2023
    Published in IEEE access (01.01.2023)
    “…The recovery of contextual meanings on a machine code is required by a wide range of binary analysis applications, such as bug discovery, malware analysis, and…”
    Get full text
    Journal Article
  16. 16

    Successive Cancellation Integer Forcing via Practical Binary Codes by Ahn, Seok-Ki, Chae, Sung Ho, Kim, Kwang Taik, Kim, Young-Han

    ISSN: 1536-1276, 1558-2248
    Published: New York IEEE 01.09.2023
    “…A new multiple-input multiple-output (MIMO) receiver scheme for practical binary codes is proposed that provides consistent gains over conventional linear…”
    Get full text
    Journal Article
  17. 17

    Cyber Vulnerability Intelligence for Internet of Things Binary by Liu, Shigang, Dibaei, Mahdi, Tai, Yonghang, Chen, Chao, Zhang, Jun, Xiang, Yang

    ISSN: 1551-3203, 1941-0050
    Published: Piscataway IEEE 01.03.2020
    “…Internet of Things (IoT) integrates a variety of software (e.g., autonomous vehicles and military systems) in order to enable the advanced and intelligent…”
    Get full text
    Journal Article
  18. 18

    Verified Propagation Redundancy and Compositional UNSAT Checking in CakeML by Tan, Yong Kiam, Heule, Marijn J. H., Myreen, Magnus O.

    ISSN: 1433-2779, 1433-2787, 1433-2787
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.04.2023
    “…Modern SAT solvers can emit independently-checkable proof certificates to validate their results. The state-of-the-art proof system that allows for compact…”
    Get full text
    Journal Article
  19. 19

    Self-Dual Binary [8m,\,\,4m] -Codes Constructed by Left Ideals of the Dihedral Group Algebra \mathbb2[D] by Cao, Yuan, Cao, Yonglin, Fu, Fang-Wei, Gao, Jian

    ISSN: 0018-9448
    Published: IEEE 01.06.2020
    Published in IEEE transactions on information theory (01.06.2020)
    “…Let <inline-formula> <tex-math notation="LaTeX">m </tex-math></inline-formula> be an arbitrary positive integer and <inline-formula> <tex-math…”
    Get full text
    Journal Article
  20. 20

    Copy-and-patch compilation: a fast compilation algorithm for high-level languages and bytecode by Xu, Haoran, Kjolstad, Fredrik

    ISSN: 2475-1421, 2475-1421
    Published: 01.10.2021
    “…Fast compilation is important when compilation occurs at runtime, such as query compilers in modern database systems and WebAssembly virtual machines in modern…”
    Get full text
    Journal Article