{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:41:22Z","timestamp":1730234482571,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T00:00:00Z","timestamp":1697760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T00:00:00Z","timestamp":1697760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,20]]},"DOI":"10.1109\/icceic60201.2023.10426711","type":"proceedings-article","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T23:35:26Z","timestamp":1707867326000},"page":"454-459","source":"Crossref","is-referenced-by-count":0,"title":["Applying Binary Code Similarity Detection on Acceleration Processor"],"prefix":"10.1109","author":[{"given":"Guang","family":"Yin","sequence":"first","affiliation":[{"name":"National University of Defense Technology,College of Computer,Changsha,China"}]},{"given":"Yong","family":"Tang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology,College of Computer,Changsha,China"}]},{"given":"Wei","family":"Xie","sequence":"additional","affiliation":[{"name":"National University of Defense Technology,College of Computer,Changsha,China"}]},{"given":"Zhenhao","family":"Luo","sequence":"additional","affiliation":[{"name":"National University of Defense Technology,College of Computer,Changsha,China"}]},{"given":"Yaohua","family":"Wang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology,College of Computer,Changsha,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s42514-022-00095-y"},{"key":"ref2","first-page":"3044","article-title":"Optimizing Convolution Neural Network on the TI C6678 multicore DSP [J]","volume-title":"MATEC Web of Conferences","volume":"246","author":"Guozhao"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2014.7040989"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3446371"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240480"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.04.002"},{"issue":"9","key":"ref9","first-page":"1105","article-title":"A Survey of Binary Code Similarity Detection Techniques Based on Machine Learning[J]","volume":"55","author":"Ye","year":"2022","journal-title":"Communications Technology"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970326"}],"event":{"name":"2023 4th International Conference on Computer Engineering and Intelligent Control (ICCEIC)","start":{"date-parts":[[2023,10,20]]},"location":"Guangzhou, China","end":{"date-parts":[[2023,10,22]]}},"container-title":["2023 4th International Conference on Computer Engineering and Intelligent Control (ICCEIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10424971\/10426625\/10426711.pdf?arnumber=10426711","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T01:12:40Z","timestamp":1710378760000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10426711\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,20]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icceic60201.2023.10426711","relation":{},"subject":[],"published":{"date-parts":[[2023,10,20]]}}}