{"id":"https://openalex.org/W7125951446","doi":"https://doi.org/10.1109/commnet68224.2025.11288883","title":"Bin2Vec: Interpretable and Auditable Multi-View Binary Analysis for Code Plagiarism Detection","display_name":"Bin2Vec: Interpretable and Auditable Multi-View Binary Analysis for Code Plagiarism Detection","publication_year":2025,"publication_date":"2025-12-03","ids":{"openalex":"https://openalex.org/W7125951446","doi":"https://doi.org/10.1109/commnet68224.2025.11288883"},"language":null,"primary_location":{"id":"doi:10.1109/commnet68224.2025.11288883","is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet68224.2025.11288883","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 8th International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124125624","display_name":"Moussa Moussaoui","orcid":null},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Moussa Moussaoui","raw_affiliation_strings":["Ibn Tofail University,Computer Science Research Laboratory(LaRI), Faculty of Science,Kenitra,Morocco,14000"],"affiliations":[{"raw_affiliation_string":"Ibn Tofail University,Computer Science Research Laboratory(LaRI), Faculty of Science,Kenitra,Morocco,14000","institution_ids":["https://openalex.org/I3121676899"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124073748","display_name":"Tarik Houichime","orcid":null},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Tarik Houichime","raw_affiliation_strings":["Mohammed V University In Rabat,LRIT, Faculty of Science,Rabat,Morocco,10112"],"affiliations":[{"raw_affiliation_string":"Mohammed V University In Rabat,LRIT, Faculty of Science,Rabat,Morocco,10112","institution_ids":["https://openalex.org/I126477371"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112560111","display_name":"Abdelalim Sadiq","orcid":null},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Abdelalim Sadiq","raw_affiliation_strings":["Ibn Tofail University,Computer Science Research Laboratory(LaRI), Faculty of Science,Kenitra,Morocco,14000"],"affiliations":[{"raw_affiliation_string":"Ibn Tofail University,Computer Science Research Laboratory(LaRI), Faculty of Science,Kenitra,Morocco,14000","institution_ids":["https://openalex.org/I3121676899"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5124125624"],"corresponding_institution_ids":["https://openalex.org/I3121676899"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.85789734,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.5837000012397766,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.5837000012397766,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.24320000410079956,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11492","display_name":"Academic integrity and plagiarism","score":0.05939999967813492,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5453000068664551},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5216000080108643},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.5055999755859375},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.4846999943256378},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.4758000075817108},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4684999883174896},{"id":"https://openalex.org/keywords/plagiarism-detection","display_name":"Plagiarism detection","score":0.4075999855995178},{"id":"https://openalex.org/keywords/bridge","display_name":"Bridge (graph theory)","score":0.39649999141693115}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7975000143051147},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5453000068664551},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5216000080108643},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.5055999755859375},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4862000048160553},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.4846999943256378},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.4758000075817108},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4684999883174896},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.41179999709129333},{"id":"https://openalex.org/C2780907237","wikidata":"https://www.wikidata.org/wiki/Q2986238","display_name":"Plagiarism detection","level":2,"score":0.4075999855995178},{"id":"https://openalex.org/C100776233","wikidata":"https://www.wikidata.org/wiki/Q2532492","display_name":"Bridge (graph theory)","level":2,"score":0.39649999141693115},{"id":"https://openalex.org/C63435697","wikidata":"https://www.wikidata.org/wiki/Q864135","display_name":"Binary code","level":3,"score":0.3767000138759613},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.37450000643730164},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36399999260902405},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3610000014305115},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.35530000925064087},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3425999879837036},{"id":"https://openalex.org/C98183937","wikidata":"https://www.wikidata.org/wiki/Q2112188","display_name":"Program analysis","level":2,"score":0.33869999647140503},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.33230000734329224},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3312999904155731},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.3158999979496002},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.3122999966144562},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.28940001130104065},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.27079999446868896},{"id":"https://openalex.org/C12186640","wikidata":"https://www.wikidata.org/wiki/Q6815743","display_name":"Memory model","level":3,"score":0.26969999074935913},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.26170000433921814},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.26010000705718994},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.25690001249313354}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/commnet68224.2025.11288883","is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet68224.2025.11288883","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 8th International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"We":[0,117],"introduce":[1],"Bin2Vec,":[2],"a":[3,12,29,53,96],"new":[4],"framework":[5],"that":[6,75,109,136,172],"helps":[7],"compare":[8],"software":[9,197],"programs":[10,61,205],"in":[11,206],"clear":[13],"and":[14,37,48,83,101,129,142,157,176,184,208],"explainable":[15,177],"way.":[16],"Instead":[17],"of":[18,24,71,123,145,204],"focusing":[19],"only":[20],"on":[21,120,165],"one":[22],"type":[23],"information,":[25],"Bin2Vec":[26,66,93,119,169],"combines":[27],"what":[28],"program":[30],"looks":[31],"like":[32,194],"(its":[33,46],"built-in":[34],"functions,":[35],"imports,":[36],"exports)":[38],"with":[39],"how":[40],"it":[41,44,181,188],"behaves":[42],"when":[43,57],"runs":[45],"instructions":[47],"memory":[49,158],"usage).":[50],"This":[51],"gives":[52],"more":[54,154,164],"complete":[55],"picture":[56],"deciding":[58],"whether":[59],"two":[60,124],"are":[62,173],"similar":[63],"or":[64,199],"not.":[65],"represents":[67],"these":[68],"different":[69],"types":[70],"information":[72],"as":[73,95],"views":[74],"can":[76,110,189],"be":[77,111,190],"inspected":[78],"separately":[79],"using":[80],"easy-to-read":[81],"charts,":[82],"then":[84],"brings":[85],"them":[86],"together":[87],"into":[88],"an":[89,140],"overall":[90],"similarity":[91],"score.":[92],"acts":[94],"bridge":[97],"between":[98],"binary":[99],"representations":[100,108],"machine":[102],"learning":[103],"techniques":[104],"by":[105,114],"generating":[106],"feature":[107],"efficiently":[112],"processed":[113],"machine-learning":[115],"models.":[116],"tested":[118],"multiple":[121],"versions":[122,152,162],"well-known":[125],"Windows":[126],"programs,":[127],"PuTTY":[128,151],"7-Zip.":[130],"The":[131],"primary":[132],"results":[133],"strongly":[134],"confirmed":[135],"our":[137],"method":[138],"compute":[139],"optimal":[141],"visualization-friendly":[143],"representation":[144],"the":[146],"analyzed":[147],"software.":[148],"For":[149],"example,":[150],"showed":[153],"complex":[155],"behavior":[156],"activity,":[159],"while":[160],"7-Zip":[161],"focused":[163],"performance-related":[166],"patterns.":[167],"Overall,":[168],"provides":[170],"decisions":[171],"both":[174],"reliable":[175],"to":[178,186,192],"humans.":[179],"Because":[180],"is":[182],"modular":[183],"easy":[185],"extend,":[187],"applied":[191],"tasks":[193],"auditing,":[195],"verifying":[196],"origins,":[198],"quickly":[200],"screening":[201],"large":[202],"numbers":[203],"cybersecurity":[207],"reverse-engineering":[209],"work.":[210]},"counts_by_year":[],"updated_date":"2026-02-23T20:09:44.859080","created_date":"2026-01-29T00:00:00"}
