共 36 条
[1]
Amin Sara, 2020, 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), P302, DOI 10.1109/ICIoT48696.2020.9089638
[2]
Baesens B, 2000, KES'2000: FOURTH INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED INTELLIGENT ENGINEERING SYSTEMS & ALLIED TECHNOLOGIES, VOLS 1 AND 2, PROCEEDINGS, P313, DOI 10.1109/KES.2000.885819
[3]
Caselden Dan, 2013, Computer Security - ESORICS 2013. 18th European Symposium on Research in Computer Security. Proceedings: LNCS 8134, P164, DOI 10.1007/978-3-642-40203-6_10
[4]
Unleashing MAYHEM on Binary Code
[J].
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2012,
:380-394
[5]
Chabbi Milind., 2014, P ANN IEEEACM INT S, P76
[8]
Chi Zhang, 2021, International Journal of Simulation and Process Modelling, V16, P1, DOI 10.1504/IJSPM.2021.113070
[9]
Clause James, 2007, P 2007 INT S SOFTW T, P196
[10]
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization
[J].
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019),
2019,
:472-489