Author of the publication

Cross-Architecture Binary Semantics Understanding via Similar Code Comparison.

, , , and . SANER, page 57-67. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient radial basis functions mesh deformation with greedy algorithm based on recurrence Choleskey decomposition and parallel computing., , , , , and . J. Comput. Physics, (2019)Binary code clone detection across architectures and compiling configurations., , , and . ICPC, page 88-98. IEEE Computer Society, (2017)BinMatch: A Semantics-Based Hybrid Approach on Binary Code Clone Analysis., , , , , and . ICSME, page 104-114. IEEE Computer Society, (2018)EPMC: efficient parallel memory compression in deep neural network training., , , , , and . Neural Comput. Appl., 34 (1): 757-769 (2022)Multiple convolutional neural networks for multivariate time series prediction., , , , , , and . Neurocomputing, (2019)Transcode: Detecting Status Code Mapping Errors in Large-Scale Systems., , , , , , , and . ASE, page 829-841. IEEE, (2021)Automatically Patching Vulnerabilities of Binary Programs via Code Transfer From Correct Versions., , and . IEEE Access, (2019)Embroidery: Patching Vulnerable Binary Code of Fragmentized Android Devices., , , , , and . ICSME, page 47-57. IEEE Computer Society, (2017)NativeSpeaker: Identifying Crypto Misuses in Android Native Code Libraries., , , , , , and . Inscrypt, volume 10726 of Lecture Notes in Computer Science, page 301-320. Springer, (2017)A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison., , , , and . CoRR, (2019)