Search

Showing total 32 results

Search Constraints

Start Over You searched for: Topic binary codes Remove constraint Topic: binary codes Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years Publisher association for computing machinery Remove constraint Publisher: association for computing machinery
32 results

Search Results

1. Deep Adaptive Graph Clustering via von Mises-Fisher Distributions.

2. A Survey of Binary Code Similarity.

3. Deep Neighborhood-aware Proxy Hashing with Uniform Distribution Constraint for Cross-modal Retrieval.

4. ARCTURUS: Full Coverage Binary Similarity Analysis with Reachability-guided Emulation.

5. Mitigating Debugger-based Attacks to Java Applications with Self-debugging.

6. HARR: Learning Discriminative and High-Quality Hash Codes for Image Retrieval.

7. Search Efficient Binary Network Embedding.

8. LibAM: An Area Matching Framework for Detecting Third-Party Libraries in Binaries.

9. Grey-box Concolic Testing on Binary Code.

10. Discrete Listwise Content-aware Recommendation.

11. Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis.

12. A Survey on Hyperdimensional Computing aka Vector Symbolic Architectures, Part II: Applications, Cognitive Models, and Challenges.

13. A Survey on Hyperdimensional Computing aka Vector Symbolic Architectures, Part I: Models and Data Transformations.

14. Security Best Practices: A Critical Analysis Using IoT as a Case Study.

15. Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure.

16. ONION: Online Semantic Autoencoder Hashing for Cross-Modal Retrieval.

17. DIRE and its Data: Neural Decompiled Variable Renamings with Respect to Software Class.

18. A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features.

19. Asia’s Surging Interest in Binary Analysis.

20. Efficient Multi-modal Hashing with Online Query Adaption for Multimedia Retrieval.

21. DINOS: Data INspired Oligo Synthesis for DNA Data Storage.

22. Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies.

23. Graph Neural News Recommendation with User Existing and Potential Interest Modeling.

24. Burn After Reading: A Shadow Stack with Microsecond-level Runtime Rerandomization for Protecting Return Addresses.

25. Probability Ordinal-Preserving Semantic Hashing for Large-Scale Image Retrieval.

26. Internal Evaluation of Unsupervised Outlier Detection.

27. Type Inference on Executables.

28. Billions and Billions of Constraints: Whitebox Fuzz Testing in Production.

29. Combinatorial Filters: Sensor Beams, Obstacles, and Possible Paths.

30. A Cooperative MIMO Framework for Wireless Sensor Networks.

31. Comprehensive Formal Verification of an OS Microkernel.

32. Binary-Code Obfuscations in Prevalent Packer Tools.