{"id":"https://openalex.org/W4391793068","doi":"https://doi.org/10.1109/icceic60201.2023.10426711","title":"Applying Binary Code Similarity Detection on Acceleration Processor","display_name":"Applying Binary Code Similarity Detection on Acceleration Processor","publication_year":2023,"publication_date":"2023-10-20","ids":{"openalex":"https://openalex.org/W4391793068","doi":"https://doi.org/10.1109/icceic60201.2023.10426711"},"language":"en","primary_location":{"id":"doi:10.1109/icceic60201.2023.10426711","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icceic60201.2023.10426711","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 4th International Conference on Computer Engineering and Intelligent Control (ICCEIC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100524197","display_name":"Guang Yin","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guang Yin","raw_affiliation_strings":["National University of Defense Technology,College of Computer,Changsha,China","College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Computer,Changsha,China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110374351","display_name":"Yong Tang","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Tang","raw_affiliation_strings":["National University of Defense Technology,College of Computer,Changsha,China","College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Computer,Changsha,China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100617974","display_name":"Wei Xie","orcid":"https://orcid.org/0009-0005-1667-4995"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Xie","raw_affiliation_strings":["National University of Defense Technology,College of Computer,Changsha,China","College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Computer,Changsha,China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046175931","display_name":"Zhenhao Luo","orcid":"https://orcid.org/0000-0003-2266-1064"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenhao Luo","raw_affiliation_strings":["National University of Defense Technology,College of Computer,Changsha,China","College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Computer,Changsha,China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101877535","display_name":"Yaohua Wang","orcid":"https://orcid.org/0000-0002-9556-5535"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yaohua Wang","raw_affiliation_strings":["National University of Defense Technology,College of Computer,Changsha,China","College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Computer,Changsha,China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100524197"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21355606,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"246","issue":null,"first_page":"454","last_page":"459"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9498000144958496,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7632563710212708},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6616893410682678},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.5886843204498291},{"id":"https://openalex.org/keywords/binary-code","display_name":"Binary code","score":0.5886568427085876},{"id":"https://openalex.org/keywords/acceleration","display_name":"Acceleration","score":0.550284743309021},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5359787344932556},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.5359009504318237},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4417882561683655},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4417727291584015},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.43278759717941284},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.43216660618782043},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.39961785078048706},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.35211867094039917},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3372003436088562},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3353349268436432},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18207034468650818},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1384844183921814},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.11143198609352112},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09113234281539917}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7632563710212708},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6616893410682678},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.5886843204498291},{"id":"https://openalex.org/C63435697","wikidata":"https://www.wikidata.org/wiki/Q864135","display_name":"Binary code","level":3,"score":0.5886568427085876},{"id":"https://openalex.org/C117896860","wikidata":"https://www.wikidata.org/wiki/Q11376","display_name":"Acceleration","level":2,"score":0.550284743309021},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5359787344932556},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.5359009504318237},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4417882561683655},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4417727291584015},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.43278759717941284},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.43216660618782043},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39961785078048706},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.35211867094039917},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3372003436088562},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3353349268436432},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18207034468650818},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1384844183921814},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.11143198609352112},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09113234281539917},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0},{"id":"https://openalex.org/C74650414","wikidata":"https://www.wikidata.org/wiki/Q11397","display_name":"Classical mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icceic60201.2023.10426711","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icceic60201.2023.10426711","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 4th International Conference on Computer Engineering and Intelligent Control (ICCEIC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2147996021","https://openalex.org/W2511803001","https://openalex.org/W2516577067","https://openalex.org/W2532962075","https://openalex.org/W2749008552","https://openalex.org/W2888698761","https://openalex.org/W3105926539","https://openalex.org/W3153398259","https://openalex.org/W4281390154"],"related_works":["https://openalex.org/W2429057255","https://openalex.org/W2187546663","https://openalex.org/W148745890","https://openalex.org/W4389670110","https://openalex.org/W2611942503","https://openalex.org/W2765199869","https://openalex.org/W2034043169","https://openalex.org/W1638297612","https://openalex.org/W2161708016","https://openalex.org/W3061941318"],"abstract_inverted_index":{"Binary":[0],"code":[1,60,117],"similarity":[2,61,118],"detection,":[3,25,62,119],"as":[4],"an":[5],"integral":[6],"part":[7],"of":[8,20,41,58,81],"network":[9,46],"security,":[10],"has":[11],"remained":[12],"a":[13,67],"hot":[14],"spot":[15],"in":[16],"the":[17,38,56,93,100,115],"research":[18,57],"fields":[19],"intellectual":[21],"property":[22],"protection,":[23],"vulnerability":[24],"patch":[26],"analysis,":[27],"and":[28,44,50,76,98,103,112,123],"malicious":[29],"software":[30],"detection.":[31],"It":[32],"carries":[33],"significant":[34],"usability":[35],"value.":[36],"With":[37],"rapid":[39],"development":[40],"deep":[42,95],"learning":[43,96],"neural":[45],"technologies,":[47],"new":[48],"algorithms":[49],"thoughts":[51],"have":[52],"been":[53],"introduced":[54],"into":[55],"binary":[59,116],"achieving":[63],"breakthrough":[64],"progress.":[65],"MT-3000,":[66],"heterogeneous":[68],"multi-zone":[69],"acceleration":[70,107],"processor,":[71],"which":[72],"is":[73],"entirely":[74],"designed":[75],"implemented":[77],"by":[78],"National":[79],"University":[80],"Defense":[82],"Technology,":[83],"possesses":[84],"powerful":[85],"computing":[86],"performance.":[87],"In":[88],"this":[89],"paper,":[90],"based":[91],"on":[92,114],"latest":[94],"theory":[97],"using":[99],"domestically":[101],"produced":[102],"controllable":[104],"high-performance":[105],"MT-3000":[106],"processor":[108],"for":[109],"relevant":[110,121],"tests":[111],"researches":[113],"proposes":[120],"conclusions":[122],"suggestions.":[124]},"counts_by_year":[],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
