{"id":"https://openalex.org/W2956382393","doi":"https://doi.org/10.1109/icc.2019.8761073","title":"Understand Code Style: Efficient CNN-Based Compiler Optimization Recognition System","display_name":"Understand Code Style: Efficient CNN-Based Compiler Optimization Recognition System","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2956382393","doi":"https://doi.org/10.1109/icc.2019.8761073","mag":"2956382393"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2019.8761073","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761073","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102027444","display_name":"Shouguo Yang","orcid":"https://orcid.org/0000-0003-4385-8261"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shouguo Yang","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101451091","display_name":"Zhiqiang Shi","orcid":"https://orcid.org/0000-0001-6168-8003"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiqiang Shi","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100459540","display_name":"Guodong Zhang","orcid":"https://orcid.org/0000-0002-1867-5992"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guodong Zhang","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100365310","display_name":"Mingxuan Li","orcid":"https://orcid.org/0000-0002-4610-7554"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingxuan Li","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066513378","display_name":"Yuan Ma","orcid":"https://orcid.org/0000-0002-3828-6054"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Ma","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061643975","display_name":"Limin Sun","orcid":"https://orcid.org/0000-0003-2745-7521"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Limin Sun","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5102027444"],"corresponding_institution_ids":["https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":1.1729,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.78917501,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.9268009662628174},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8969155550003052},{"id":"https://openalex.org/keywords/optimizing-compiler","display_name":"Optimizing compiler","score":0.6811352968215942},{"id":"https://openalex.org/keywords/program-optimization","display_name":"Program optimization","score":0.6765128374099731},{"id":"https://openalex.org/keywords/loop-optimization","display_name":"Loop optimization","score":0.595195472240448},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.5632219314575195},{"id":"https://openalex.org/keywords/code-generation","display_name":"Code generation","score":0.5258039832115173},{"id":"https://openalex.org/keywords/compiler-correctness","display_name":"Compiler correctness","score":0.5028650164604187},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.49232161045074463},{"id":"https://openalex.org/keywords/binary-code","display_name":"Binary code","score":0.4772990942001343},{"id":"https://openalex.org/keywords/interprocedural-optimization","display_name":"Interprocedural optimization","score":0.42960113286972046},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.4249922037124634},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.42496562004089355},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.12834352254867554},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10509610176086426},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.09816128015518188},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.07958191633224487}],"concepts":[{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.9268009662628174},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8969155550003052},{"id":"https://openalex.org/C190902152","wikidata":"https://www.wikidata.org/wiki/Q1325106","display_name":"Optimizing compiler","level":3,"score":0.6811352968215942},{"id":"https://openalex.org/C139571649","wikidata":"https://www.wikidata.org/wiki/Q1156793","display_name":"Program optimization","level":3,"score":0.6765128374099731},{"id":"https://openalex.org/C29331672","wikidata":"https://www.wikidata.org/wiki/Q3354468","display_name":"Loop optimization","level":4,"score":0.595195472240448},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.5632219314575195},{"id":"https://openalex.org/C133162039","wikidata":"https://www.wikidata.org/wiki/Q1061077","display_name":"Code generation","level":3,"score":0.5258039832115173},{"id":"https://openalex.org/C68366613","wikidata":"https://www.wikidata.org/wiki/Q5156378","display_name":"Compiler correctness","level":3,"score":0.5028650164604187},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.49232161045074463},{"id":"https://openalex.org/C63435697","wikidata":"https://www.wikidata.org/wiki/Q864135","display_name":"Binary code","level":3,"score":0.4772990942001343},{"id":"https://openalex.org/C111564260","wikidata":"https://www.wikidata.org/wiki/Q4288856","display_name":"Interprocedural optimization","level":5,"score":0.42960113286972046},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4249922037124634},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.42496562004089355},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.12834352254867554},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10509610176086426},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.09816128015518188},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.07958191633224487},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2019.8761073","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761073","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W596492259","https://openalex.org/W1412775481","https://openalex.org/W1680927362","https://openalex.org/W1978364288","https://openalex.org/W2112537911","https://openalex.org/W2151436713","https://openalex.org/W2613904329","https://openalex.org/W2627063456","https://openalex.org/W2749008552","https://openalex.org/W2791018263","https://openalex.org/W2998704965","https://openalex.org/W3105926539","https://openalex.org/W4297747285","https://openalex.org/W6617952372","https://openalex.org/W6680532216","https://openalex.org/W6737778391","https://openalex.org/W6745899033"],"related_works":["https://openalex.org/W4246454774","https://openalex.org/W2121223013","https://openalex.org/W2083681681","https://openalex.org/W1488300410","https://openalex.org/W1597127505","https://openalex.org/W4220800565","https://openalex.org/W2577630842","https://openalex.org/W2013570895","https://openalex.org/W2324321492","https://openalex.org/W4384571653"],"abstract_inverted_index":{"Compiler":[0],"optimization":[1,21,40,61,72,89,179,207],"level":[2,62,73],"recognition":[3,74],"can":[4],"be":[5,96],"applied":[6],"to":[7,14,52,95,106,198],"vulnerability":[8],"discovery":[9],"and":[10,42,57,81,84,103,120,141,219],"binary":[11,30,55,100,114,220],"analysis.":[12,222],"Due":[13],"the":[15,23,26,29,87,117,132,155,163,169,176,184,200],"exists":[16],"of":[17,28,38,128,162],"many":[18],"different":[19,44,177,205],"compilation":[20],"options,":[22],"difference":[24,170],"in":[25,171],"contents":[27],"file":[31,101],"is":[32,49,93,104,136,188],"very":[33,50,97],"complicated.":[34],"There":[35],"are":[36],"thousands":[37],"compiler":[39,60,71,88,178,206],"algorithms":[41],"multiple":[43],"processor":[45],"architectures,":[46],"so":[47],"it":[48,142],"difficult":[51],"manually":[53],"analyze":[54,199],"files":[56,115],"recognize":[58,86],"its":[59],"with":[63],"rules.":[64],"This":[65,181],"paper":[66],"first":[67],"proposes":[68],"a":[69,110,137,144,196],"CNN-based":[70,139],"model:":[75],"BinEye.":[76],"The":[77,91],"system":[78,140],"extracts":[79],"semantic":[80],"structural":[82],"differences":[83,202],"automatically":[85],"levels.":[90],"model":[92,118,124,164,185],"designed":[94],"suitable":[98],"for":[99,116,214],"processing":[102],"easy":[105],"understand.":[107],"We":[108],"built":[109],"dataset":[111],"containing":[112],"80028":[113],"training":[119],"testing.":[121],"Our":[122],"proposed":[123,187],"achieves":[125],"an":[126],"accuracy":[127],"over":[129],"97%.":[130],"At":[131],"same":[133],"time,":[134],"BinEye":[135],"fully":[138],"has":[143,210],"faster":[145,153],"forward":[146],"calculation":[147],"speed,":[148],"at":[149],"least":[150],"8":[151],"times":[152],"than":[154],"normal":[156],"RNN-based":[157],"model.":[158],"Through":[159],"our":[160,192],"analysis":[161],"output,":[165],"we":[166,186,194],"successfully":[167],"found":[168],"assembly":[172],"codes":[173],"caused":[174,203],"by":[175,204],"level.":[180],"means":[182],"that":[183],"interpretable.":[189],"Based":[190],"on":[191],"model,":[193],"propose":[195],"method":[197],"code":[201],"levels,":[208],"which":[209],"great":[211],"guiding":[212],"significance":[213],"analyzing":[215],"closed":[216],"source":[217],"compilers":[218],"security":[221]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5}],"updated_date":"2026-03-23T07:41:27.035349","created_date":"2025-10-10T00:00:00"}
