{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:14:36Z","timestamp":1772039676765,"version":"3.50.1"},"reference-count":60,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T00:00:00Z","timestamp":1692576000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T00:00:00Z","timestamp":1692576000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,21]]},"DOI":"10.1109\/pst58708.2023.10320193","type":"proceedings-article","created":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T19:06:27Z","timestamp":1700679987000},"page":"1-11","source":"Crossref","is-referenced-by-count":3,"title":["Investigating Neural-based Function Name Reassignment from the Perspective of Binary Code Representation"],"prefix":"10.1109","author":[{"given":"Guoqiang","family":"Chen","sequence":"first","affiliation":[{"name":"University of Science and Technology of China,Hefei,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Han","family":"Gao","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China,Hefei,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jie","family":"Zhang","sequence":"additional","affiliation":[{"name":"Nanyang Technological University,Singapore"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yanru","family":"He","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China,Hefei,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shaoyin","family":"Cheng","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China,Hefei,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China,Hefei,China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.nlp4prog-1.6"},{"key":"ref2","article-title":"Augmenting decompiler output with learned variable names and types","volume-title":"31st USENIX Security Symposium (USENIX Security 22)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00064"},{"key":"ref4","article-title":"IDA Pro","author":"SA","year":"2021"},{"key":"ref5","article-title":"Binary Ninja","year":"2021"},{"key":"ref6","article-title":"Ghidra","year":"2021"},{"key":"ref7","first-page":"1875","article-title":"An observational investigation of reverse engineers\u2019 processes","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Votipka"},{"key":"ref8","first-page":"65","article-title":"An investigation of procedure and variable names as beacons during program comprehension","volume-title":"Empirical studies of programmers: Fourth workshop","author":"Gellenbeck"},{"key":"ref9","article-title":"The Dataset of Nero","author":"David","year":"2021"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243866"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3428293"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427265"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464804"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560612"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PST52912.2021.9647828"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/PST52912.2021.9647771"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PST55820.2022.9851984"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3290353"},{"key":"ref19","article-title":"Structured neural summarization","volume-title":"International Conference on Learning Representations","author":"Fernandes"},{"key":"ref20","first-page":"4998","article-title":"A transformer-based approach for source code summarization","volume-title":"Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics","author":"Ahmad"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2020.2979701"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3056139"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24311"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_15"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2918326"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2956932"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3275524"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/int.22436"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3264820.3264821"},{"key":"ref31","first-page":"8476","article-title":"How could neural networks understand programs?","volume-title":"International Conference on Machine Learning","author":"Peng"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534367"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00036"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_37"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23294"},{"key":"ref36","article-title":"Semi-supervised classification with graph convolutional networks","volume-title":"5th International Conference on Learning Representations, ICLR 2017, Toulon, France, April 24-26, 2017, Conference Track Proceedings","author":"Kipf"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref38","author":"Pei","year":"2020","journal-title":"Trex: Learning execution semantics from micro-traces for binary similarity"},{"key":"ref39","author":"Devlin","year":"2018","journal-title":"Bert: Pre-training of deep bidirectional transformers for language understanding"},{"issue":"140","key":"ref40","first-page":"1","article-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","volume-title":"Journal of Machine Learning Research","volume":"21","author":"Raffel","year":"2020"},{"key":"ref41","article-title":"Mcsema: Static translation of x86 instructions to llvm","volume-title":"ReCon 2014 Conference","author":"Dinaburg"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387550"},{"key":"ref43","first-page":"66","article-title":"SentencePiece: A simple and language independent subword tokenizer and detokenizer for neural text processing","volume-title":"Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing: System Demonstrations","author":"Kudo"},{"key":"ref44","article-title":"pygments","author":"Unger","year":"2021"},{"key":"ref45","article-title":"XFL: extreme function labeling","volume-title":"CoRR","author":"Patrick-Evans","year":"2021"},{"key":"ref46","first-page":"66","article-title":"Subword regularization: Improving neural network translation models with multiple subword candidates","volume-title":"Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers)","author":"Kudo"},{"key":"ref47","first-page":"1724","article-title":"Learning phrase representations using RNN encoder\u2013decoder for statistical machine translation","volume-title":"Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP)","author":"Cho"},{"key":"ref48","first-page":"5998","article-title":"Attention is all you need","volume-title":"Advances in Neural Information Processing Systems 30","author":"Vaswani","year":"2017"},{"key":"ref49","first-page":"1810","article-title":"Learning deep transformer models for machine translation","volume-title":"Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics","author":"Wang"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1205"},{"key":"ref51","article-title":"Enterprise Open Source and Linux \u2014 Ubuntu","year":"2021"},{"key":"ref52","article-title":"Ubuntu Debug Symbol Packages","year":"2021"},{"key":"ref53","article-title":"Neural machine translation by jointly learning to align and translate","volume":"abs\/1409.0473","author":"Bahdanau","year":"2015","journal-title":"CoRR"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/p17-4012"},{"key":"ref55","first-page":"45","article-title":"Software Framework for Topic Modelling with Large Corpora","volume-title":"Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks","author":"\u0158eh\u016f\u0159ek"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1201.0490"},{"key":"ref57","article-title":"PyTorch","year":"2021"},{"key":"ref58","article-title":"python-Levenshtein","author":"Haapala","year":"2021"},{"key":"ref59","first-page":"10 524","article-title":"On layer normalization in the transformer architecture","volume-title":"International Conference on Machine Learning","author":"Xiong"},{"key":"ref60","first-page":"2978","article-title":"Transformer-XL: Attentive language models beyond a fixed-length context","volume-title":"Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics","author":"Dai"}],"event":{"name":"2023 20th Annual International Conference on Privacy, Security and Trust (PST)","location":"Copenhagen, Denmark","start":{"date-parts":[[2023,8,21]]},"end":{"date-parts":[[2023,8,23]]}},"container-title":["2023 20th Annual International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10320127\/10319983\/10320193.pdf?arnumber=10320193","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:07:09Z","timestamp":1747804029000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10320193\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,21]]},"references-count":60,"URL":"https:\/\/doi.org\/10.1109\/pst58708.2023.10320193","relation":{},"subject":[],"published":{"date-parts":[[2023,8,21]]}}}