{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:18:10Z","timestamp":1730344690886,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,1]]},"DOI":"10.23919\/wac50355.2021.9559467","type":"proceedings-article","created":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:32:30Z","timestamp":1633908750000},"page":"71-76","source":"Crossref","is-referenced-by-count":2,"title":["Binary Vulnerability Mining Based on Long Short-Term Memory Network"],"prefix":"10.23919","author":[{"given":"Wenlei","family":"Ouyang","sequence":"first","affiliation":[]},{"given":"Meng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qiqi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jianchao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Efficient Estimation of Word Representations in Vector Space","author":"mikolov","year":"2013","journal-title":"Computer Science"},{"journal-title":"Convolutional LSTM network A machine learning approach for precipitation nowcasting","year":"2015","author":"shi","key":"ref11"},{"journal-title":"Review of recurrent neural networks_ Yang Li","year":"0","key":"ref12"},{"journal-title":"BERT Pre-training of deep bidirectional transformers for language understanding","year":"2018","author":"devlin","key":"ref13"},{"key":"ref4","first-page":"95","article-title":"Vulnerability mining technology based on source code and binary file_ Fu Tao","volume":"39","author":"tao","year":"2018","journal-title":"Software"},{"journal-title":"Application of artificial intelligence technology in the field of security vulnerability_ Sun Hongyu","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2923227"},{"key":"ref5","first-page":"2040","article-title":"Survey of software vulnerability mining methods based on machine learning_ Li Yun","volume":"31","author":"yun","year":"2020","journal-title":"Acta Softw Sinica"},{"journal-title":"Neural Network-based Graph Embedding for Cross-PlatformBinary Code Similarity Detection","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.54"},{"journal-title":"Read one picture_ Overview of China&#x2019;s Internet security situation in 2019_ Yu Zhaohui","year":"0","key":"ref2"},{"journal-title":"Review of Cyberspace Security Research in the field of Social Sciences in China_ The perspective of topic meta-analysis_ Liu chongrui","year":"0","key":"ref1"},{"key":"ref9","first-page":"155","article-title":"Research progress of digital geometry processing and analysis technology based on deep learning_ Xia Qing","volume":"56","author":"qing","year":"2019","journal-title":"Computer Research and Development"}],"event":{"name":"2021 World Automation Congress (WAC)","start":{"date-parts":[[2021,8,1]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2021,8,5]]}},"container-title":["2021 World Automation Congress (WAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9559429\/9559420\/09559467.pdf?arnumber=9559467","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T21:10:29Z","timestamp":1639429829000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9559467\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,1]]},"references-count":13,"URL":"https:\/\/doi.org\/10.23919\/wac50355.2021.9559467","relation":{},"subject":[],"published":{"date-parts":[[2021,8,1]]}}}