{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T21:38:10Z","timestamp":1763415490876,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T00:00:00Z","timestamp":1576800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natural Science Foundation of China","award":["61802433 and 61802435"],"award-info":[{"award-number":["61802433 and 61802435"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,20]]},"DOI":"10.1145\/3377713.3377738","type":"proceedings-article","created":{"date-parts":[[2020,2,7]],"date-time":"2020-02-07T10:07:26Z","timestamp":1581070046000},"page":"160-165","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Recurrent Neural Network Based Binary Code Vulnerability Detection"],"prefix":"10.1145","author":[{"given":"Jianyun","family":"Zheng","sequence":"first","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"}]},{"given":"Jianmin","family":"Pang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"}]},{"given":"Xiaochuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"}]},{"given":"Xin","family":"Zhou","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"}]},{"given":"MingLiang","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"}]},{"given":"Jun","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2020,2,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"VulDeePecker: A Deep Learning-Based System for Vulnerability Detection[J]. arXiv preprint arXiv:1801.01681","author":"Li Z","year":"2018","unstructured":"Li Z , Zou D , Xu S , VulDeePecker: A Deep Learning-Based System for Vulnerability Detection[J]. arXiv preprint arXiv:1801.01681 , 2018 . Li Z, Zou D, Xu S, et al. VulDeePecker: A Deep Learning-Based System for Vulnerability Detection[J]. arXiv preprint arXiv:1801.01681, 2018."},{"key":"e_1_3_2_1_2_1","volume-title":"SySeVR: a framework for using deep learning to detect software vulnerabilities[J]. arXiv preprint arXiv:1807.06756","author":"Li Z","year":"2018","unstructured":"Li Z , Zou D , Xu S , SySeVR: a framework for using deep learning to detect software vulnerabilities[J]. arXiv preprint arXiv:1807.06756 , 2018 . Li Z, Zou D, Xu S, et al. SySeVR: a framework for using deep learning to detect software vulnerabilities[J]. arXiv preprint arXiv:1807.06756, 2018."},{"key":"e_1_3_2_1_3_1","volume-title":"Automated software vulnerability detection with machine learning[J]. arXiv preprint arXiv:1803.04497","author":"Harer J A","year":"2018","unstructured":"Harer J A , Kim L Y , Russell R L , Automated software vulnerability detection with machine learning[J]. arXiv preprint arXiv:1803.04497 , 2018 . Harer J A, Kim L Y, Russell R L, et al. Automated software vulnerability detection with machine learning[J]. arXiv preprint arXiv:1803.04497, 2018."},{"key":"e_1_3_2_1_4_1","volume-title":"Automated vulnerability detection in source code using deep representation learning[C]\/\/2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA)","author":"Russell R","year":"2018","unstructured":"Russell R , Kim L , Hamilton L , Automated vulnerability detection in source code using deep representation learning[C]\/\/2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA) . IEEE , 2018 : 757--762. Russell R, Kim L, Hamilton L, et al. Automated vulnerability detection in source code using deep representation learning[C]\/\/2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, 2018: 757--762."},{"key":"e_1_3_2_1_5_1","volume-title":"Matula P. Retdec: An open-source machine-code decompiler[J]","author":"Kroustek J","year":"2017","unstructured":"Kroustek J , Matula P. Retdec: An open-source machine-code decompiler[J] . 2017 . Kroustek J, Matula P. Retdec: An open-source machine-code decompiler[J]. 2017."},{"volume-title":"IEEE Computer Society","author":"Lattner C","key":"e_1_3_2_1_6_1","unstructured":"Lattner C , Adve V. LLVM : A compilation framework for lifelong program analysis & transformation[C]\/\/Proceedings of the international symposium on Code generation and optimization: feedback-directed and runtime optimization . IEEE Computer Society , 2004: 75. Lattner C, Adve V. LLVM: A compilation framework for lifelong program analysis & transformation[C]\/\/Proceedings of the international symposium on Code generation and optimization: feedback-directed and runtime optimization. IEEE Computer Society, 2004: 75."},{"key":"e_1_3_2_1_7_1","volume-title":"Ba J. Adam: A method for stochastic optimization[J]. arXiv preprint arXiv:1412.6980","author":"Kingma D P","year":"2014","unstructured":"Kingma D P , Ba J. Adam: A method for stochastic optimization[J]. arXiv preprint arXiv:1412.6980 , 2014 . Kingma D P, Ba J. Adam: A method for stochastic optimization[J]. arXiv preprint arXiv:1412.6980, 2014."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of Neuro-Nimes, 91(8)","author":"Bottou","year":"1991","unstructured":"L. Bottou . Stochastic gradient learning in neural networks . Proceedings of Neuro-Nimes, 91(8) , 1991 . L. Bottou. Stochastic gradient learning in neural networks. Proceedings of Neuro-Nimes, 91(8), 1991."},{"key":"e_1_3_2_1_9_1","first-page":"2","volume":"4","author":"Tieleman G.","year":"2012","unstructured":"T. Tieleman and G. Hinton . Lecture 6.5-rmsprop: Divide the gradient by a running average of its recent magnitude. COURSERA: Neural Networks for Machine Learning , 4 : 2 , 2012 . T. Tieleman and G. Hinton. Lecture 6.5-rmsprop: Divide the gradient by a running average of its recent magnitude. COURSERA: Neural Networks for Machine Learning, 4:2, 2012.","journal-title":"COURSERA: Neural Networks for Machine Learning"},{"key":"e_1_3_2_1_10_1","unstructured":"Glorot X Bengio Y. Understanding the difficulty of training deep feedforward neural networks[C]\/\/Proceedings of the thirteenth international conference on artificial intelligence and statistics. 2010: 249--256.  Glorot X Bengio Y. Understanding the difficulty of training deep feedforward neural networks[C]\/\/Proceedings of the thirteenth international conference on artificial intelligence and statistics. 2010: 249--256."},{"key":"e_1_3_2_1_11_1","unstructured":"Software Assurance Reference Dataset https:\/\/samate.nist.gov\/SRD\/ index.php.  Software Assurance Reference Dataset https:\/\/samate.nist.gov\/SRD\/ index.php."},{"key":"e_1_3_2_1_12_1","volume-title":"Deep Learning mit Python und Keras: Das Praxis-Handbuch vom Entwickler der Keras-Bibliothek[M]","author":"Chollet F.","year":"2018","unstructured":"Chollet F. Deep Learning mit Python und Keras: Das Praxis-Handbuch vom Entwickler der Keras-Bibliothek[M] . MITP-Verlags GmbH & Co. KG , 2018 . Chollet F. Deep Learning mit Python und Keras: Das Praxis-Handbuch vom Entwickler der Keras-Bibliothek[M]. MITP-Verlags GmbH & Co. KG, 2018."}],"event":{"name":"ACAI 2019: 2019 2nd International Conference on Algorithms, Computing and Artificial Intelligence","sponsor":["Chinese Univ. of Hong Kong Chinese University of Hong Kong"],"location":"Sanya China","acronym":"ACAI 2019"},"container-title":["Proceedings of the 2019 2nd International Conference on Algorithms, Computing and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377713.3377738","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377713.3377738","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:55Z","timestamp":1750202635000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377713.3377738"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,20]]},"references-count":12,"alternative-id":["10.1145\/3377713.3377738","10.1145\/3377713"],"URL":"https:\/\/doi.org\/10.1145\/3377713.3377738","relation":{},"subject":[],"published":{"date-parts":[[2019,12,20]]},"assertion":[{"value":"2020-02-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}