{"id":"https://openalex.org/W7126085867","doi":"https://doi.org/10.1109/jiot.2026.3659328","title":"DECodeT5: A Lightweight and Efficient Neural Decompiler With Assembly Semantic Assistance","display_name":"DECodeT5: A Lightweight and Efficient Neural Decompiler With Assembly Semantic Assistance","publication_year":2026,"publication_date":"2026-01-29","ids":{"openalex":"https://openalex.org/W7126085867","doi":"https://doi.org/10.1109/jiot.2026.3659328"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2026.3659328","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2026.3659328","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124208695","display_name":"Li Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Li Liu","raw_affiliation_strings":["School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064377432","display_name":"Fanghui Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fanghui Sun","raw_affiliation_strings":["School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124200490","display_name":"Shen Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shen Wang","raw_affiliation_strings":["School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"],"raw_orcid":"https://orcid.org/0000-0002-5748-5438","affiliations":[{"raw_affiliation_string":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073476456","display_name":"Xunzhi Jiang","orcid":"https://orcid.org/0000-0001-8624-8557"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xunzhi Jiang","raw_affiliation_strings":["School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"],"raw_orcid":"https://orcid.org/0000-0001-8624-8557","affiliations":[{"raw_affiliation_string":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5124208695"],"corresponding_institution_ids":["https://openalex.org/I204983213"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19076797,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"8","first_page":"16388","last_page":"16402"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.3546000123023987,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.3546000123023987,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.16329999268054962,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.15700000524520874,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.6827999949455261},{"id":"https://openalex.org/keywords/code-generation","display_name":"Code generation","score":0.5070000290870667},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.4767000079154968},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.45820000767707825},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.4537999927997589},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.44020000100135803},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.4341000020503998},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.4221000075340271},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.39809998869895935}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8623999953269958},{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.6827999949455261},{"id":"https://openalex.org/C133162039","wikidata":"https://www.wikidata.org/wiki/Q1061077","display_name":"Code generation","level":3,"score":0.5070000290870667},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.484499990940094},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.4767000079154968},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.45820000767707825},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.4537999927997589},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.44020000100135803},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.4341000020503998},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.4221000075340271},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.39809998869895935},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.3671000003814697},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.3659999966621399},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3522000014781952},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.3513999879360199},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3481000065803528},{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.3386000096797943},{"id":"https://openalex.org/C202491316","wikidata":"https://www.wikidata.org/wiki/Q272683","display_name":"Instruction set","level":2,"score":0.3303999900817871},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.32749998569488525},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3151000142097473},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.3142000138759613},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3068000078201294},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3057999908924103},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.29600000381469727},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.29510000348091125},{"id":"https://openalex.org/C509989072","wikidata":"https://www.wikidata.org/wiki/Q15188241","display_name":"Model-driven architecture","level":4,"score":0.2946000099182129},{"id":"https://openalex.org/C157170001","wikidata":"https://www.wikidata.org/wiki/Q4781507","display_name":"Applications of artificial intelligence","level":2,"score":0.29100000858306885},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.28790000081062317},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.28790000081062317},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.2824999988079071},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.26930001378059387},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.2563999891281128}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2026.3659328","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2026.3659328","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8","score":0.44284549355506897}],"awards":[{"id":"https://openalex.org/G1181419631","display_name":null,"funder_award_id":"No. LH2024F023","funder_id":"https://openalex.org/F4320323085","funder_display_name":"Natural Science Foundation of Heilongjiang Province"},{"id":"https://openalex.org/G1546571806","display_name":null,"funder_award_id":"No. JCKY2023603C043","funder_id":"https://openalex.org/F4320335833","funder_display_name":"National Defense Basic Scientific Research Program of China"},{"id":"https://openalex.org/G3445562932","display_name":null,"funder_award_id":"LH2024F023","funder_id":"https://openalex.org/F4320323085","funder_display_name":"Natural Science Foundation of Heilongjiang Province"},{"id":"https://openalex.org/G6874605992","display_name":null,"funder_award_id":"JCKY2023603C043","funder_id":"https://openalex.org/F4320335833","funder_display_name":"National Defense Basic Scientific Research Program of China"}],"funders":[{"id":"https://openalex.org/F4320323085","display_name":"Natural Science Foundation of Heilongjiang Province","ror":null},{"id":"https://openalex.org/F4320335833","display_name":"National Defense Basic Scientific Research Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Decompilation":[0],"plays":[1],"a":[2,58,79,182,221],"critical":[3],"role":[4],"in":[5,83,174,207,213],"firmware":[6,226],"analysis":[7,227],"and":[8,38,41,60,133,152,168,210,228],"reverse":[9,217],"engineering":[10,218],"by":[11,77,138,165,170],"enabling":[12],"the":[13,32,66,72,102,107,141,150],"recovery":[14,161],"of":[15,85,109,115,176,186],"high-level":[16,39],"source":[17],"code":[18,37,74,111],"from":[19,98],"binary":[20],"executables.":[21],"However,":[22],"existing":[23],"neural":[24,62],"decompilation":[25,63,123],"models":[26,46],"often":[27],"face":[28],"challenges":[29],"due":[30],"to":[31,105,215],"semantic":[33,96,160],"gap":[34],"between":[35],"assembly":[36,81,99],"languages,":[40],"they":[42],"typically":[43],"require":[44],"large-scale":[45],"that":[47,156,193],"impose":[48],"significant":[49],"computational":[50],"demands.":[51],"In":[52],"this":[53],"paper,":[54],"we":[55],"propose":[56],"DECodeT5,":[57],"lightweight":[59],"efficient":[61],"method":[64],"for":[65,93,205,224],"C":[67],"language.":[68],"DECodeT5":[69,116,157,180],"builds":[70],"upon":[71],"CodeT5":[73],"generation":[75],"model":[76,184],"integrating":[78],"pre-trained":[80],"encoder":[82,142],"place":[84],"its":[86,211],"original":[87],"embedding":[88],"layer.":[89],"This":[90],"modification":[91],"allows":[92],"more":[94,171],"effective":[95],"learning":[97],"code,":[100],"improving":[101],"model\u2019s":[103],"ability":[104],"capture":[106],"intricacies":[108],"assembly-to-source":[110],"mapping.":[112],"The":[113],"architecture":[114],"not":[117],"only":[118,187],"accelerates":[119],"convergence":[120],"during":[121],"end-to-end":[122],"tasks":[124],"but":[125],"also":[126],"supports":[127],"rapid":[128],"adaptation":[129],"across":[130],"different":[131],"compilers":[132],"instruction":[134],"set":[135],"architectures":[136],"(ISAs)":[137],"swapping":[139],"out":[140],"module":[143],"as":[144,196,198],"needed.":[145],"Our":[146],"experimental":[147],"evaluation":[148],"on":[149],"HumanEval":[151],"Exebench":[153],"benchmarks":[154],"reveals":[155],"significantly":[158],"improves":[159],"accuracy,":[162],"outperforming":[163],"Ghidra":[164],"over":[166],"83%":[167],"LLM4Decompile":[169],"than":[172],"43%":[173],"terms":[175],"execution":[177],"recovery.":[178],"Furthermore,":[179],"maintains":[181],"compact":[183],"size":[185],"360M":[188],"parameters,":[189],"providing":[190],"inference":[191],"speeds":[192],"are":[194],"twice":[195],"fast":[197],"LLM4Decompile.":[199],"These":[200],"results":[201],"underscore":[202],"DECodeT5\u2019s":[203],"suitability":[204],"deployment":[206],"resource-constrained":[208],"environments":[209],"flexibility":[212],"adapting":[214],"real-world":[216],"scenarios,":[219],"offering":[220],"practical":[222],"solution":[223],"modern":[225],"security":[229],"tasks.":[230]},"counts_by_year":[],"updated_date":"2026-04-09T06:08:40.794217","created_date":"2026-01-30T00:00:00"}
