{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T11:57:23Z","timestamp":1774267043146,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/icc.2019.8761073","type":"proceedings-article","created":{"date-parts":[[2019,7,16]],"date-time":"2019-07-16T00:16:31Z","timestamp":1563236191000},"page":"1-6","source":"Crossref","is-referenced-by-count":17,"title":["Understand Code Style: Efficient CNN-Based Compiler Optimization Recognition System"],"prefix":"10.1109","author":[{"given":"Shouguo","family":"Yang","sequence":"first","affiliation":[]},{"given":"Zhiqiang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Guodong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Mingxuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Limin","family":"Sun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2006.710.715"},{"key":"ref11","article-title":"HIMALlA:Recovering Compiler Optimization Levels from Binaries by Deep Learning","author":"chen","year":"2018","journal-title":"Intelligent Systems Conference 2018"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.4370040303"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"ref14","first-page":"611","article-title":"Recognizing Functions in Binaries with Neural Networks","author":"c r","year":"2015","journal-title":"USENIX Security Symposium"},{"key":"ref15","first-page":"1137","article-title":"A neural probabilistic language model","volume":"3","author":"bengio","year":"2003","journal-title":"Journal of Machine Learning Research"},{"key":"ref16","article-title":"Buildroot - Making Embedded Linux Easy","year":"2018"},{"key":"ref17","article-title":"IDA: About","year":"2018"},{"key":"ref18","article-title":"zynamics.com - BinDiff","year":"2018"},{"key":"ref19","article-title":"Zsh","year":"2018"},{"key":"ref4","article-title":"CWE - CWE-14: Compiler Removal of Code to Clear Buffers","volume":"3","year":"2018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.33"},{"key":"ref6","article-title":"Using the GNU Compiler Collection (GCe): Optimize Options","year":"2018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23159"},{"key":"ref8","article-title":"Malware detection by eating a whole exe","author":"raff","year":"2017"},{"key":"ref7","article-title":"Blanket execution: Dynamic similarity testing for program binaries and components","author":"egele","year":"2014","journal-title":"USENIX"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062387"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522728"},{"key":"ref9","article-title":"Convolutional sequence to sequence learning","author":"gehring","year":"2017"},{"key":"ref20","year":"2018"},{"key":"ref21","year":"0"}],"event":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","location":"Shanghai, China","start":{"date-parts":[[2019,5,20]]},"end":{"date-parts":[[2019,5,24]]}},"container-title":["ICC 2019 - 2019 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8753818\/8761046\/08761073.pdf?arnumber=8761073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:09:04Z","timestamp":1657854544000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8761073\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icc.2019.8761073","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}