{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T20:54:42Z","timestamp":1775768082564,"version":"3.50.1"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T00:00:00Z","timestamp":1776211200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T00:00:00Z","timestamp":1776211200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T00:00:00Z","timestamp":1776211200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012335","name":"National Defense Basic Scientific Research Program of China","doi-asserted-by":"publisher","award":["JCKY2023603C043"],"award-info":[{"award-number":["JCKY2023603C043"]}],"id":[{"id":"10.13039\/501100012335","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development (RD) Plan of Heilongjiang Province","award":["2022ZX01C01"],"award-info":[{"award-number":["2022ZX01C01"]}]},{"DOI":"10.13039\/501100005046","name":"Natural Science Foundation of Heilongjiang Province of China","doi-asserted-by":"publisher","award":["LH2024F023"],"award-info":[{"award-number":["LH2024F023"]}],"id":[{"id":"10.13039\/501100005046","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2026,4,15]]},"DOI":"10.1109\/jiot.2026.3659328","type":"journal-article","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:25:38Z","timestamp":1769721938000},"page":"16388-16402","source":"Crossref","is-referenced-by-count":0,"title":["DECodeT5: A Lightweight and Efficient Neural Decompiler With Assembly Semantic Assistance"],"prefix":"10.1109","volume":"13","author":[{"given":"Li","family":"Liu","sequence":"first","affiliation":[{"name":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"}]},{"given":"Fanghui","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5748-5438","authenticated-orcid":false,"given":"Shen","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8624-8557","authenticated-orcid":false,"given":"Xunzhi","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-emnlp.385"},{"key":"ref2","article-title":"Nova+: Generative language models for assembly code with hierarchical attention and contrastive learning","author":"Jiang","year":"2023","journal-title":"arXiv:2311.13721"},{"key":"ref3","article-title":"Symbol preference aware generative models for recovering variable names from stripped binary","author":"Xu","year":"2023","journal-title":"arXiv:2306.02546"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.18"},{"key":"ref5","first-page":"95","article-title":"A large-scale analysis of the security of embedded firmwares","volume-title":"Proc. 23rd USENIX Secur. Symp.","author":"Costin"},{"key":"ref6","volume-title":"Ghidra","year":"2024"},{"key":"ref7","volume-title":"IDA Pro","year":"2023"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2022.23009"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CGO57630.2024.10444788"},{"key":"ref10","first-page":"1","article-title":"Ahoy sailr! there is no need to DREAM of C: A compiler-aware structuring algorithm for binary decompilation","volume-title":"Proc. USENIX Secur.","author":"Basque"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23185"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.emnlp-main.203"},{"key":"ref13","article-title":"ReF decompile: Relabeling and function call enhanced decompile","author":"Feng","year":"2025","journal-title":"arXiv:2502.12221"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.685"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3520312.3534867"},{"key":"ref17","article-title":"Towards neural decompilation","author":"Katz","year":"2019","journal-title":"arXiv:1905.08325"},{"key":"ref18","first-page":"3703","article-title":"Coda: An end-to-end neural program decompiler","volume-title":"Proc. NeurIPS","volume":"32","author":"Fu"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6451"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1810.04805"},{"key":"ref21","article-title":"HuggingFace\u2019s transformers: State-of-the-art natural language processing","author":"Wolf","year":"2019","journal-title":"arXiv:1910.03771"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CGO51591.2021.9370322"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1525\/9780520940420-020"},{"key":"ref24","article-title":"DeepSeek-coder: When the large language model meets programming - the rise of code intelligence","author":"Guo","year":"2024","journal-title":"arXiv:2401.14196"},{"key":"ref25","article-title":"DeepSeek-V3 technical report","volume-title":"arXiv:2412.19437","author":"Liu","year":"2024"},{"key":"ref26","volume-title":"Reverse Compilation Techniques","author":"Cifuentes","year":"1994"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380250706"},{"key":"ref28","first-page":"353","article-title":"Native x86 decompilation using semantics-preserving structural analysis and iterative control-flow structuring","volume-title":"Proc. USENIX Secur.","author":"Brumley"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2004.42"},{"key":"ref30","first-page":"798","article-title":"Learning to analyze binary computer code","volume-title":"Proc. AAAI","author":"Rosenblum"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_37"},{"key":"ref32","first-page":"845","article-title":"BYTEWEIGHT: Learning to recognize functions in binary code","volume-title":"Proc. USENIX Secur.","author":"Bao"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3582016.3582058"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397370"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2018.8585654"},{"key":"ref36","article-title":"Semantics-recovering decompilation through neural machine translation","author":"Liang","year":"2021","journal-title":"arXiv:2112.15491"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3567998"},{"key":"ref38","article-title":"Refining decompiled c code with large language models","author":"Kin Wong","year":"2023","journal-title":"arXiv:2310.06530"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330222"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P15-1150"},{"key":"ref41","first-page":"2552","article-title":"Tree-to-tree neural networks for program translation","volume-title":"Proc. ICLR","author":"Chen"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1004"},{"key":"ref43","first-page":"1","article-title":"StarCoder: May the source be with you!","author":"Li","year":"2023","journal-title":"Trans. Mach. Learn. Res."},{"key":"ref44","article-title":"Code llama: Open foundation models for code","author":"Rozi\u00e9re","year":"2023","journal-title":"arXiv:2308.12950"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24401"},{"key":"ref46","article-title":"Training compute-optimal large language models","author":"Hoffmann","year":"2022","journal-title":"arXiv:2203.15556"},{"key":"ref47","first-page":"20","article-title":"Meaningful variable names for decompiled code: A machine translation approach","volume-title":"Proc. IEEE\/ACM 26th Int. Conf. Program Comprehension (ICPC)","author":"Jaffe"},{"key":"ref48","article-title":"In nomine function: Naming functions in stripped binaries with neural networks","author":"Artuso","year":"2019","journal-title":"arXiv:1912.07946"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00064"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00051"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510162"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385997"},{"key":"ref53","first-page":"1","article-title":"Gated graph sequence neural networks","volume-title":"Proc. ICLR","author":"Li"},{"key":"ref54","first-page":"4327","article-title":"Augmenting decompiler output with learned variable names and types","volume-title":"Proc. USENIX Secur.","author":"Chen"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11477814\/11367734.pdf?arnumber=11367734","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:48:24Z","timestamp":1775764104000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11367734\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,15]]},"references-count":54,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2026.3659328","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,15]]}}}