{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:31:32Z","timestamp":1763202692154,"version":"3.37.3"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["DGE 1565215"],"award-info":[{"award-number":["DGE 1565215"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1109\/ijcnn55064.2022.9892426","type":"proceedings-article","created":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T19:56:04Z","timestamp":1664567764000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Geometric Analysis and Metric Learning of Instruction Embeddings"],"prefix":"10.1109","author":[{"given":"Sajib","family":"Biswas","sequence":"first","affiliation":[{"name":"Florida State University,Department of Computer Science,Tallahassee,Florida"}]},{"given":"Timothy","family":"Barao","sequence":"additional","affiliation":[{"name":"Florida State University,Department of Computer Science,Tallahassee,Florida"}]},{"given":"John","family":"Lazzari","sequence":"additional","affiliation":[{"name":"Florida State University,Department of Computer Science,Tallahassee,Florida"}]},{"given":"Jeret","family":"McCoy","sequence":"additional","affiliation":[{"name":"Florida State University,Department of Computer Science,Tallahassee,Florida"}]},{"given":"Xiuwen","family":"Liu","sequence":"additional","affiliation":[{"name":"Florida State University,Department of Computer Science,Tallahassee,Florida"}]},{"given":"Alexander","family":"Kostandarithes","sequence":"additional","affiliation":[{"name":"Florida State University,Department of Computer Science,Tallahassee,Florida"}]}],"member":"263","reference":[{"key":"ref31","article-title":"Visualizing data using t-sne","volume":"9","author":"van der maaten","year":"2008","journal-title":"Journal of Machine Learning Research"},{"key":"ref30","article-title":"In defense of the triplet loss for person re-identification","author":"hermans","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref10","article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","author":"devlin","year":"2019","journal-title":"NAACL"},{"journal-title":"Improving language understanding by generative pre-training","year":"2018","author":"radford","key":"ref11"},{"key":"ref12","article-title":"Albert: A lite bert for self-supervised learning of language representations","author":"lan","year":"2019","journal-title":"ArXiv"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"ref14","article-title":"Neural machine translation inspired binary code similarity comparison beyond function pairs","author":"zuo","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484587"},{"key":"ref16","article-title":"Attention is all you need","author":"vaswani","year":"2017","journal-title":"NIPS"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9206645"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2014.16"},{"key":"ref19","article-title":"A neural probabilistic language model","author":"bengio","year":"2003","journal-title":"J Mach Learn Res"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1006"},{"key":"ref4","article-title":"Malware detection by eating a whole exe","author":"raff","year":"0","journal-title":"Workshops at the Thirtieth AAAI Conference on Artificial Intelligence"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1448"},{"key":"ref3","first-page":"611","article-title":"Recognizing functions in binaries with neural networks","author":"shin","year":"0","journal-title":"24th USENIX Security Symposium (USENIX Security 15)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref5","first-page":"667","article-title":"?diff: cross-version binary code similarity detection with dnn","author":"liu","year":"0","journal-title":"Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2902362"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.27"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11431-020-1647-3"},{"key":"ref1","first-page":"2296","article-title":"Reverse engineering: an essence for software re-engineering and program analysis","volume":"2","author":"gahalaut","year":"2010","journal-title":"International Journal of Engineering Science and Technology"},{"key":"ref20","article-title":"Efficient estimation of word representations in vector space","author":"mikolov","year":"2013","journal-title":"ICLRE"},{"key":"ref22","article-title":"Learning binary code with deep learning to detect software weakness","author":"lee","year":"0","journal-title":"KSII The 9th International Conference on Internet (ICONI) 2017 Symposium"},{"key":"ref21","article-title":"Distributed representations of words and phrases and their compositionality","author":"mikolov","year":"2013","journal-title":"NIPS"},{"key":"ref24","first-page":"1188","article-title":"Distributed representations of sentences and documents","author":"le","year":"0","journal-title":"International Conference on Machine Learning"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24311"},{"key":"ref26","article-title":"Trex: Learning execution semantics from micro-traces for binary similarity","author":"pei","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5466"}],"event":{"name":"2022 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2022,7,18]]},"location":"Padua, Italy","end":{"date-parts":[[2022,7,23]]}},"container-title":["2022 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9891857\/9889787\/09892426.pdf?arnumber=9892426","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T22:57:20Z","timestamp":1667516240000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9892426\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/ijcnn55064.2022.9892426","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]}}}