Search Results - binary code models
-
1
An empirical study on the effectiveness of large language models for binary code understanding
ISSN: 1382-3256, 1573-7616Published: New York Springer US 01.02.2026Published in Empirical software engineering : an international journal (01.02.2026)“…Binary code analysis plays a pivotal role in the field of software security and is widely used in tasks such as software maintenance, malware detection, software vulnerability discovery, patch analysis, etc…”
Get full text
Journal Article -
2
Mitigating Disparate Elevation Differences between Adjacent Topobathymetric Data Models Using Binary Code
ISSN: 2072-4292, 2072-4292Published: Basel MDPI AG 01.09.2024Published in Remote sensing (Basel, Switzerland) (01.09.2024)“…Integrating coastal topographic and bathymetric data for creating regional seamless topobathymetric digital elevation models of the land/water interface presents a complex challenge due to the spatial…”
Get full text
Journal Article -
3
CrossSimEmb: transformer-based embedding model for cross-compilation binary code similarity detection: CrossSimEmb: transformer-based embedding model for cross
ISSN: 1573-0484Published: New York Springer US 03.10.2025Published in The Journal of supercomputing (03.10.2025)“…Transformer-based pre-trained models have achieved breakthrough progress in binary code similarity detection tasks by modeling disassembled code as textual sequences, enabling researchers…”
Get full text
Journal Article -
4
Codeformer: A GNN-Nested Transformer Model for Binary Code Similarity Detection
ISSN: 2079-9292, 2079-9292Published: Basel MDPI AG 01.04.2023Published in Electronics (Basel) (01.04.2023)“…Binary code similarity detection is used to calculate the code similarity of a pair of binary functions or files, through a certain calculation method and judgment method…”
Get full text
Journal Article -
5
Adversarial Attacks Against Binary Similarity Systems
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2024Published in IEEE access (2024)“… In this context, a hot topic is the binary similarity problem, which involves determining whether two assembly functions originate from the same source code…”
Get full text
Journal Article -
6
CrossSimEmb: transformer-based embedding model for cross-compilation binary code similarity detection
ISSN: 1573-0484, 0920-8542, 1573-0484Published: New York Springer Nature B.V 03.10.2025Published in The Journal of supercomputing (03.10.2025)“…Transformer-based pre-trained models have achieved breakthrough progress in binary code similarity detection tasks by modeling disassembled code as textual sequences, enabling researchers…”
Get full text
Journal Article -
7
Revisiting the common envelope evolution in binary stars: A new semianalytic model for N -body and population synthesis codes
ISSN: 2470-0010, 2470-0029Published: 15.08.2022Published in Physical review. D (15.08.2022)Get full text
Journal Article -
8
A Modified Maximal Divergence Sequential Auto-Encoder and Time Delay Neural Network Models for Vulnerable Binary Codes Detection
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2020Published in IEEE access (2020)“…Since the risks associated with software vulnerabilities are rapidly increasing, the detection of vulnerabilities in binary code has become an important area of concern for the software community…”
Get full text
Journal Article -
9
Reversible Data Hiding in Encrypted Images Based on Binary Symmetric Channel Model and Polar Code
ISSN: 1545-5971, 1941-0018Published: Washington IEEE 01.11.2023Published in IEEE transactions on dependable and secure computing (01.11.2023)“…, a novel method is proposed that uses the ideas of noisy channel model and channel code. By designing the data hiding mechanism appropriately, the embedding…”
Get full text
Journal Article -
10
Analysis model of binary code security flaws based on structure characteristics
ISSN: 2096-109XPublished: POSTS&TELECOM PRESS Co., LTD 01.09.2017Published in 网络与信息安全学报 (01.09.2017)“… was proposed.First,analysis models based on key information of code structures extracted from path subsets of characteristic element sets that are generated by source code element sets of code security flaws…”
Get full text
Journal Article -
11
Research on Function Model of Binary Code
ISBN: 9783037854754, 3037854758ISSN: 1660-9336, 1662-7482, 1662-7482Published: Zurich Trans Tech Publications Ltd 01.09.2012Published in Applied Mechanics and Materials (01.09.2012)“…The paper presents a reverse analysis and crack-found methodology with the functional model as the centre for OS trusted mechanism, pays attention to the functional model establishing of binary code…”
Get full text
Journal Article -
12
An improved deep hashing model for image retrieval with binary code similarities
ISSN: 2196-1115, 2196-1115Published: Cham Springer International Publishing 01.12.2024Published in Journal of big data (01.12.2024)“… advantages, such as extremely high efficiency and low storage cost, after projecting high-dimensional data to compact binary codes…”
Get full text
Journal Article -
13
UniASM: Binary code similarity detection without fine-tuning
ISSN: 0925-2312Published: Elsevier B.V 14.05.2025Published in Neurocomputing (Amsterdam) (14.05.2025)“… Recent studies have shown that the learning-based binary code embedding models perform better than the traditional feature-based approaches…”
Get full text
Journal Article -
14
Unsupervised Adaptive Feature Selection with Binary Hashing
ISSN: 1057-7149, 1941-0042, 1941-0042Published: United States IEEE 01.01.2023Published in IEEE transactions on image processing (01.01.2023)“… In this paper, we propose a new Unsupervised Adaptive Feature Selection with Binary Hashing (UAFS-BH) model, which learns binary hash codes as weakly-supervised multi-labels and simultaneously exploits the learned labels to guide feature selection…”
Get full text
Journal Article -
15
Development of a binary classifier model from extended facial codes toward video-based pain recognition in cancer patients
ISSN: 1877-8879, 1877-8879Published: Germany 26.10.2023Published in Scandinavian journal of pain (26.10.2023)“… Facial expressions are the most investigated pain behavior features for APA. We constructed a binary classifier model for discriminating between the absence and presence of pain through video analysis…”
Get more information
Journal Article -
16
Feature Extraction Methods for Binary Code Similarity Detection Using Neural Machine Translation Models
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2023Published in IEEE Access (2023)“…Binary code similarity detection is an effective analysis technique for vulnerability, bug, and plagiarism detection in software for which the source code cannot be obtained…”
Get full text
Journal Article -
17
The Santa Barbara Binary−disk Code Comparison
ISSN: 0004-637X, 1538-4357Published: Philadelphia The American Astronomical Society 01.08.2024Published in The Astrophysical journal (01.08.2024)“… The goal of this study is to determine whether all codes agree on a numerically converged solution and to determine the necessary resolution for convergence and the number of binary orbits that must…”
Get full text
Journal Article -
18
POSYDON Version 2: Population Synthesis with Detailed Binary-evolution Simulations across a Cosmological Range of Metallicities
ISSN: 0067-0049, 1538-4365, 1538-4365Published: Saskatoon The American Astronomical Society 01.11.2025Published in The Astrophysical journal. Supplement series (01.11.2025)“… of detailed binary evolution models computed using the MESA code, which follows both stars’ structures as a binary system evolves through its complete evolution…”
Get full text
Journal Article -
19
An Instruction Embedding Model for Binary Code Analysis
ISBN: 1085612910, 9781085612913Published: ProQuest Dissertations & Theses 01.01.2019“…Binary code analysis is important for understanding programs without access to the original source code, which is common with proprietary software…”
Get full text
Dissertation -
20
Semantic Awareness Model For Binary Operator Code
Published: IEEE 03.11.2023Published in 2023 International Conference on Image Processing, Computer Vision and Machine Learning (ICICML) (03.11.2023)“… The above attack methods require a certain understanding of the structure of the model, so it becomes a challenge to restore the category of binary operators…”
Get full text
Conference Proceeding

