{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:22Z","timestamp":1750220482690,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Key Research and Development Program of Shaanxi","award":["2019ZDLGY07-08"],"award-info":[{"award-number":["2019ZDLGY07-08"]}]},{"DOI":"10.13039\/501100017596","name":"Natural Science Basic Research Program of Shaanxi Province","doi-asserted-by":"publisher","award":["2018JQ6078, 2020GY-010, 2020JM-582"],"award-info":[{"award-number":["2018JQ6078, 2020GY-010, 2020JM-582"]}],"id":[{"id":"10.13039\/501100017596","id-type":"DOI","asserted-by":"publisher"}]},{"name":"International Science and Technology Cooperation Program of Shaanxi","award":["2018KW-049, 2019KW-008"],"award-info":[{"award-number":["2018KW-049, 2019KW-008"]}]},{"DOI":"10.13039\/501100019491","name":"National Natural Science Foundation of China - State Grid Corporation Joint Fund for Smart Grid","doi-asserted-by":"publisher","award":["61702414"],"award-info":[{"award-number":["61702414"]}],"id":[{"id":"10.13039\/501100019491","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology of Xi'an","award":["2019218114GXRC017CG018-GXYD17.16"],"award-info":[{"award-number":["2019218114GXRC017CG018-GXYD17.16"]}]},{"name":"the Special Funds for Construction of Key Disciplines in Universities in Shaanxi"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,24]]},"DOI":"10.1145\/3488933.3489033","type":"proceedings-article","created":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T11:36:59Z","timestamp":1645789019000},"page":"280-286","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Functionality Recognition on Binary Code with Neural Representation Learning"],"prefix":"10.1145","author":[{"given":"Zhenzhou","family":"Tian","sequence":"first","affiliation":[{"name":"Xi'an University of Posts and Telecommunications, School of Computer Science and Technology, China"}]},{"given":"Jinrui","family":"Li","sequence":"additional","affiliation":[{"name":"Xi'an University of Posts and Telecommunications, School of Computer Science and Technology, China"}]},{"given":"Peng","family":"Xue","sequence":"additional","affiliation":[{"name":"Xi'an University of Posts and Telecommunications, School of Computer Science and Technology, China"}]},{"given":"Jie","family":"Tian","sequence":"additional","affiliation":[{"name":"Xi'an University of Posts and Telecommunications, School of Computer Science and Technology, China"}]},{"given":"Hengchao","family":"Mao","sequence":"additional","affiliation":[{"name":"Xi'an University of Posts and Telecommunications, School of Computer Science and Technology, China"}]},{"given":"Yaqian","family":"Huang","sequence":"additional","affiliation":[{"name":"Xi'an University of Posts and Telecommunications, School of Computer Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2022,2,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"RoyChanchal K. CordyJames R. KoschkeRainer: Comparison and evaluationof code clone detection techniques and tools. Science of Computer Programming (2009)  RoyChanchal K. CordyJames R. KoschkeRainer: Comparison and evaluationof code clone detection techniques and tools. Science of Computer Programming (2009)","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"e_1_3_2_1_2_1","first-page":"125","volume-title":"Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005.","author":"Holmes R.","year":"2005","unstructured":"Holmes , R. , Murphy , G. : Using structural context to recommend source code examples . Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005. pp. 117\u2013 125 ( 2005 ) Holmes, R., Murphy, G.: Using structural context to recommend source code examples. Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005. pp. 117\u2013125 (2005)"},{"volume-title":"Proceedings ofthe 36th International Conference on Software Engineering (2014)","author":"Keivanloo I.","key":"e_1_3_2_1_3_1","unstructured":"Keivanloo , I. , Rilling , J. , Zou , Y. : Spotting working code examples . Proceedings ofthe 36th International Conference on Software Engineering (2014) Keivanloo, I., Rilling, J., Zou, Y.: Spotting working code examples. Proceedings ofthe 36th International Conference on Software Engineering (2014)"},{"volume-title":"IASTED Conf. on Software Engineering and Applications (2004)","author":"Higo Y.","key":"e_1_3_2_1_4_1","unstructured":"Higo , Y. , Kamiya , T. , Kusumoto , S. , Inoue , K. : Aries: Refactoring support environment based on code clone analysis . In: IASTED Conf. on Software Engineering and Applications (2004) Higo, Y., Kamiya, T., Kusumoto, S., Inoue, K.: Aries: Refactoring support environment based on code clone analysis. In: IASTED Conf. on Software Engineering and Applications (2004)"},{"key":"e_1_3_2_1_5_1","volume-title":"Roy","author":"Zibran M.","year":"2011","unstructured":"Zibran , M. , Roy , C. : Towards flexible code clone detection, management, and refactoring in ide. In : IWSC \u201911 ( 2011 ) Zibran, M., Roy, C.: Towards flexible code clone detection, management, and refactoring in ide. In: IWSC \u201911 (2011)"},{"key":"e_1_3_2_1_6_1","volume-title":"Chiu","author":"Jiang L.","year":"2007","unstructured":"Jiang , L. , Su , Z. , Chiu , E. : Context-based detection of clone-related bugs. In :ESEC-FSE \u201907 ( 2007 ) Jiang, L., Su, Z., Chiu, E.: Context-based detection of clone-related bugs. In:ESEC-FSE \u201907 (2007)"},{"key":"e_1_3_2_1_7_1","volume-title":"Zhou","author":"Li Z.","year":"2004","unstructured":"Li , Z. , Lu , S. , Myagmar , S. , Zhou , Y. : Cp-miner: A tool for finding copy-paste andrelated bugs in operating system code. In : OSDI ( 2004 ) Li, Z., Lu, S., Myagmar, S., Zhou, Y.: Cp-miner: A tool for finding copy-paste andrelated bugs in operating system code. In: OSDI (2004)"},{"volume-title":"USENIX Security Symposium (2015)","author":"Shin E.C.","key":"e_1_3_2_1_8_1","unstructured":"Shin , E.C. , Song , D. , Moazzezi , R. : Recognizing functions in binaries with neuralnetworks . In: USENIX Security Symposium (2015) Shin, E.C., Song, D., Moazzezi, R.: Recognizing functions in binaries with neuralnetworks. In: USENIX Security Symposium (2015)"},{"volume-title":"USENIX Security Symposium (2017)","author":"Chua Z.L.","key":"e_1_3_2_1_9_1","unstructured":"Chua , Z.L. , Shen , S. , Saxena , P. , Liang , Z. : Neural nets can learn function typesignatures from binaries . In: USENIX Security Symposium (2017) Chua, Z.L., Shen, S., Saxena, P., Liang, Z.: Neural nets can learn function typesignatures from binaries. In: USENIX Security Symposium (2017)"},{"key":"e_1_3_2_1_10_1","volume-title":"Baldoni","author":"Massarelli L.","year":"2019","unstructured":"Massarelli , L. , Luna , G.A.D. , Petroni , F. , Querzoni , L. , Baldoni , R. : Investigatinggraph embedding neural networks with unsupervised features extraction for binary analysis ( 2019 ) Massarelli, L., Luna, G.A.D., Petroni, F., Querzoni, L., Baldoni, R.: Investigatinggraph embedding neural networks with unsupervised features extraction for binary analysis (2019)"},{"key":"e_1_3_2_1_11_1","volume-title":"Zeng","author":"Zuo F.","year":"1808","unstructured":"Zuo , F. , Li , X. , Zhang , Z. , Young , P. , Luo , L. , Zeng , Q. : Neural machine translation inspired binary code similarity comparison beyond function pairs. ArXiv abs\/ 1808 .04706 (2019) Zuo, F., Li, X., Zhang, Z., Young, P., Luo, L., Zeng, Q.: Neural machine translation inspired binary code similarity comparison beyond function pairs. ArXiv abs\/1808.04706 (2019)"},{"volume-title":"Proceedingsof the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (2018)","author":"Zhao G.","key":"e_1_3_2_1_12_1","unstructured":"Zhao , G. , Huang , J. : Deepsim: deep learning code functional similarity . Proceedingsof the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (2018) Zhao, G., Huang, J.: Deepsim: deep learning code functional similarity. Proceedingsof the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (2018)"},{"key":"e_1_3_2_1_13_1","volume-title":"Dean","author":"Mikolov T.","year":"2013","unstructured":"Mikolov , T. , Chen , K. , Corrado , G. , Dean , J. : Efficient estimation of word representations in vector space. In : ICLR ( 2013 ) Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. In: ICLR (2013)"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"e_1_3_2_1_15_1","volume-title":"Dean","author":"Mikolov T.","year":"2013","unstructured":"Mikolov , T. , Sutskever , I. , Chen , K. , Corrado , G. , Dean , J. : Distributed representations of words and phrases and their compositionality. In : NIPS ( 2013 ) Mikolov, T., Sutskever, I., Chen, K., Corrado, G., Dean, J.: Distributed representations of words and phrases and their compositionality. In: NIPS (2013)"},{"key":"e_1_3_2_1_16_1","volume-title":"Zhang","author":"Johnson R.","year":"2017","unstructured":"Johnson , R. , Zhang , T. : Deep pyramid convolutional neural networks for text categorization. In : ACL ( 2017 ) Johnson, R., Zhang, T.: Deep pyramid convolutional neural networks for text categorization. In: ACL (2017)"},{"key":"e_1_3_2_1_17_1","volume-title":"Bengio","author":"Cho K.","year":"2014","unstructured":"Cho , K. , Merrienboer , B.V. , C\u00b8aglar Gu\u00a8lc\u00b8ehre , Bahdanau, D., Bougares , F. , Schwenk , H. , Bengio , Y. : Learning phrase representations using rnn encoder\u2013decoder for statistical machine translation. ArXiv abs\/1406.1078 ( 2014 ) Cho, K., Merrienboer, B.V., C\u00b8aglar Gu\u00a8lc\u00b8ehre, Bahdanau, D., Bougares, F.,Schwenk, H., Bengio, Y.: Learning phrase representations using rnn encoder\u2013decoder for statistical machine translation. ArXiv abs\/1406.1078 (2014)"},{"key":"e_1_3_2_1_18_1","volume-title":"Bengio","author":"Chung J.","year":"2014","unstructured":"Chung , J. , C\u00b8aglar Gu\u00a8lc\u00b8ehre , Cho, K. , Bengio , Y. : Empirical evaluation of gatedrecurrent neural networks on sequence modeling. ArXiv abs\/1412.3555 ( 2014 ) Chung, J., C\u00b8aglar Gu\u00a8lc\u00b8ehre, Cho, K., Bengio, Y.: Empirical evaluation of gatedrecurrent neural networks on sequence modeling. ArXiv abs\/1412.3555 (2014)"},{"issue":"7","key":"e_1_3_2_1_19_1","first-page":"164","volume":"26","author":"Gong Z.L.","year":"2009","unstructured":"Gong , Z.L. , Zhang , D.X. , Ming-Ming , H.U. : An improved svm algorithm for chinesetext classification. Computer Simulation 26 ( 7 ), 164 \u2013 167 ( 2009 ) Gong, Z.L., Zhang, D.X., Ming-Ming, H.U.: An improved svm algorithm for chinesetext classification. Computer Simulation 26(7), 164\u2013167 (2009)","journal-title":"Computer Simulation"},{"volume-title":"AAAI Workshops (2018)","author":"Bui N.D.Q.","key":"e_1_3_2_1_20_1","unstructured":"Bui , N.D.Q. , Jiang , L. , Yu , Y. : Cross-language learning for program classification using bilateral tree-based convolutional neural networks . In: AAAI Workshops (2018) Bui, N.D.Q., Jiang, L., Yu, Y.: Cross-language learning for program classification using bilateral tree-based convolutional neural networks. In: AAAI Workshops (2018)"},{"key":"e_1_3_2_1_21_1","volume-title":"Chen","author":"Crussell J.","year":"2012","unstructured":"Crussell , J. , Gibler , C. , Chen , H. : Attack of the clones: Detecting cloned applications on android markets. In : ESORICS ( 2012 ) Crussell, J., Gibler, C., Chen, H.: Attack of the clones: Detecting cloned applications on android markets. In: ESORICS (2012)"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368132"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957835"},{"key":"e_1_3_2_1_24_1","volume-title":"Yu","author":"Liu C.","year":"2006","unstructured":"Liu , C. , Chen , C. , Han , J. , Yu , P.S. : Gplag : detection of software plagiarism byprogram dependence graph analysis. In : KDD \u201906 ( 2006 ) Liu, C., Chen, C., Han, J., Yu, P.S.: Gplag: detection of software plagiarism byprogram dependence graph analysis. In: KDD \u201906 (2006)"},{"key":"e_1_3_2_1_25_1","volume-title":"Y.J.","author":"Chilowicz M.","year":"2020","unstructured":"Chilowicz , M. , Duris , E. , Jiang , L. , Ellis , M.G. , Anderson , C. , Evans , W.S. , Fraser ,\u00b4 C. , Ma , F. , Greenan , K. , Cui , B. , Guan , J. , Guo , T. , Han , L. , Wang , J.W. , quotCode , Y.J. , Kim, Y. : Multi-agent based sequence algorithm for detecting plagiarism and clones in java source code using abstract syntax tree ( 2020 ) Chilowicz, M., Duris, E., Jiang, L., Ellis, M.G., Anderson, C., Evans, W.S., Fraser,\u00b4 C., Ma, F., Greenan, K., Cui, B., Guan, J., Guo, T., Han, L., Wang, J.W., quotCode, Y.J., Kim, Y.: Multi-agent based sequence algorithm for detecting plagiarism and clones in java source code using abstract syntax tree (2020)"},{"key":"e_1_3_2_1_26_1","unstructured":"Xin L.: Similarity analysis of malware's function-call graphs. Computer Engineering and Science (2014)  Xin L.: Similarity analysis of malware's function-call graphs. Computer Engineering and Science (2014)"},{"key":"e_1_3_2_1_27_1","volume-title":"Zmrhal","author":"Olenick B.M.","year":"2010","unstructured":"Olenick , B.M. , Szyperski , C.A. , Hunt , D.G. , Hughes , G.L. , Manis , W.A. , Zmrhal , T. : Accessing and manipulating data in a data flow graph ( 2010 ) Olenick, B.M., Szyperski, C.A., Hunt, D.G., Hughes, G.L., Manis, W.A., Zmrhal, T.: Accessing and manipulating data in a data flow graph (2010)"},{"key":"e_1_3_2_1_28_1","volume-title":"Li","author":"Lu M.","year":"1903","unstructured":"Lu , M. , Tan , D. , Xiong , N. , Chen , Z. , Li , H. : Program classification usinggated graph attention neural network for online programming service. ArXiv abs\/ 1903 .03804 (2019) Lu, M., Tan, D., Xiong, N., Chen, Z., Li, H.: Program classification usinggated graph attention neural network for online programming service. ArXiv abs\/1903.03804 (2019)"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.23919\/FRUCT.2019.8711909"},{"volume-title":"https:\/\/radimrehurek.com\/gensim\/models\/word2vec.html. Last accessed7","year":"2021","key":"e_1_3_2_1_30_1","unstructured":"gensim. https:\/\/radimrehurek.com\/gensim\/models\/word2vec.html. Last accessed7 Jan 2021 gensim. https:\/\/radimrehurek.com\/gensim\/models\/word2vec.html. Last accessed7 Jan 2021"},{"key":"e_1_3_2_1_31_1","unstructured":"Niitsuma H.: Word2vec is only a special case of kernel correspondence analysisand kernels for natural language processing. ArXiv abs\/1605.05087 (2016)  Niitsuma H.: Word2vec is only a special case of kernel correspondence analysisand kernels for natural language processing. ArXiv abs\/1605.05087 (2016)"}],"event":{"name":"AIPR 2021: 2021 4th International Conference on Artificial Intelligence and Pattern Recognition","acronym":"AIPR 2021","location":"Xiamen China"},"container-title":["2021 4th International Conference on Artificial Intelligence and Pattern Recognition"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488933.3489033","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488933.3489033","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:49:00Z","timestamp":1750193340000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488933.3489033"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,24]]},"references-count":31,"alternative-id":["10.1145\/3488933.3489033","10.1145\/3488933"],"URL":"https:\/\/doi.org\/10.1145\/3488933.3489033","relation":{},"subject":[],"published":{"date-parts":[[2021,9,24]]},"assertion":[{"value":"2022-02-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}