{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T02:13:44Z","timestamp":1730254424989,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icphys.2018.8390815","type":"proceedings-article","created":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T19:28:02Z","timestamp":1529954882000},"page":"835-840","source":"Crossref","is-referenced-by-count":1,"title":["Vector representation of machine instructions for vulnerability assessment of digital infrastructure components"],"prefix":"10.1109","author":[{"given":"Roman","family":"Demidov","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Pechenkin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1037\/h0042519"},{"key":"ref11","first-page":"216","author":"rosenblatt","year":"1965","journal-title":"C"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1983.6313076"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.4.541"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/323533a0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2006.18.7.1527"},{"journal-title":"Playing atari with deep reinforcement learning","year":"2013","author":"mnih","key":"ref17"},{"key":"ref18","first-page":"1137","article-title":"A neural probabilistic language model","volume":"3","author":"bengio","year":"2003","journal-title":"J Mach Learn Res"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-013-5335-x"},{"key":"ref28","first-page":"338","article-title":"Long short-term memory recurrent neural network architectures for large-scale acoustic modeling","author":"sak","year":"2014","journal-title":"Proceedings of the Conference of the International Speech Communication Association-Interspeech"},{"key":"ref4","article-title":"Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning","author":"alemi","year":"2017","journal-title":"AAAI"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref27","article-title":"Unicorn: Next Generation CPU Emulator Framework","author":"hoang-vu","year":"2015","journal-title":"Blackhat Conference"},{"key":"ref6","article-title":"Deep Speech: Scaling up end-to-end speech recognition","author":"ng","year":"2015","journal-title":"Presentation from an SF Meetup hosted event at NVIDIA"},{"journal-title":"Visualizing data using t-sne","year":"2008","author":"laurens van der","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390177"},{"key":"ref8","article-title":"Word Embeddings for Speech Recognition","author":"bengio","year":"2014","journal-title":"Proceedings of the Conference of the International Speech Communication Association-Interspeech"},{"key":"ref7","article-title":"Learning to Rank Short Text Pairs with Convolutional Deep Neural Networks","author":"aliaksei","year":"2015","journal-title":"SIGIR"},{"key":"ref2","article-title":"ImageNet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2016.7763528"},{"key":"ref9","article-title":"Deep Convolutional Neural Networks for Sentiment Analysis of Short Texts","author":"dos santos","year":"2014","journal-title":"COLING"},{"key":"ref20","article-title":"Bilingual Word Embeddings for Phrase-Based Machine Translation","author":"will","year":"2013","journal-title":"EMNLP"},{"key":"ref22","article-title":"Deep Learning on disassembly","author":"davis","year":"2015","journal-title":"BlackHat"},{"key":"ref21","first-page":"935","article-title":"Zero-shot learning through cross-modal transfer","volume":"1","author":"richard","year":"2013","journal-title":"Proceedings of the 26th International Conference on Neural Information Processing Systems-Volume 1 (NIPS'13)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606610"},{"key":"ref23","first-page":"1606","article-title":"Learning Unified Features from Natural and Programming Languages for Locating Buggy Source Code","author":"huo","year":"2016","journal-title":"Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI'16)"},{"key":"ref26","article-title":"The difficulty of training deep architectures and the effect of unsupervised pretraining","author":"erhan","year":"2009","journal-title":"Proceedings of International Conference on Artificial Intelligence and Statistics"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931041"}],"event":{"name":"2018 IEEE Industrial Cyber-Physical Systems (ICPS)","start":{"date-parts":[[2018,5,15]]},"location":"St. Petersburg","end":{"date-parts":[[2018,5,18]]}},"container-title":["2018 IEEE Industrial Cyber-Physical Systems (ICPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8376183\/8387624\/08390815.pdf?arnumber=8390815","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,30]],"date-time":"2018-07-30T18:37:53Z","timestamp":1532975873000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8390815\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icphys.2018.8390815","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}