Статті в журналах з теми "Binary code learning"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Binary code learning".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Mohan Liu, Mohan Liu, Xiaoming Tang Mohan Liu, and Hanming Fei Xiaoming Tang. "Design of Malicious Code Detection System Based on Binary Code Slicing." 電腦學刊 33, no. 3 (June 2022): 225–38. http://dx.doi.org/10.53106/199115992022063303018.
Повний текст джерелаZhou, Xiang, Fumin Shen, Yang Yang, Guangwei Gao, and Yuan Wang. "Binary code learning via optimal class representations." Neurocomputing 208 (October 2016): 59–65. http://dx.doi.org/10.1016/j.neucom.2015.12.129.
Повний текст джерелаZhou, Lei, Xiao Bai, Xianglong Liu, Jun Zhou, and Edwin R. Hancock. "Learning binary code for fast nearest subspace search." Pattern Recognition 98 (February 2020): 107040. http://dx.doi.org/10.1016/j.patcog.2019.107040.
Повний текст джерелаLi, Xiang, Yuanping Nie, Zhi Wang, Xiaohui Kuang, Kefan Qiu, Cheng Qian, and Gang Zhao. "BMOP: Bidirectional Universal Adversarial Learning for Binary OpCode Features." Wireless Communications and Mobile Computing 2020 (December 2, 2020): 1–11. http://dx.doi.org/10.1155/2020/8876632.
Повний текст джерелаJeong, Junho, Yangsun Lee, Uduakobong George Offong, and Yunsik Son. "A Type Information Reconstruction Scheme Based on Long Short-Term Memory for Weakness Analysis in Binary File." International Journal of Software Engineering and Knowledge Engineering 28, no. 09 (September 2018): 1267–86. http://dx.doi.org/10.1142/s0218194018400156.
Повний текст джерелаLo, James Ting-Ho, and Bryce Mackey-Williams Carey. "A Cortical Learning Machine for Learning Real-Valued and Ranked Data." International Journal of Clinical Medicine and Bioengineering 1, no. 1 (December 30, 2021): 12–24. http://dx.doi.org/10.35745/ijcmb2021v01.01.0003.
Повний текст джерелаShen, Fumin, Xiang Zhou, Yang Yang, Jingkuan Song, Heng Tao Shen, and Dacheng Tao. "A Fast Optimization Method for General Binary Code Learning." IEEE Transactions on Image Processing 25, no. 12 (December 2016): 5610–21. http://dx.doi.org/10.1109/tip.2016.2612883.
Повний текст джерелаDo, Thanh-Toan, Tuan Hoang, Dang-Khoa Le Tan, Anh-Dzung Doan, and Ngai-Man Cheung. "Compact Hash Code Learning With Binary Deep Neural Network." IEEE Transactions on Multimedia 22, no. 4 (April 2020): 992–1004. http://dx.doi.org/10.1109/tmm.2019.2935680.
Повний текст джерелаGao, Hao, Tong Zhang, Songqiang Chen, Lina Wang, and Fajiang Yu. "FUSION: Measuring Binary Function Similarity with Code-Specific Embedding and Order-Sensitive GNN." Symmetry 14, no. 12 (December 2, 2022): 2549. http://dx.doi.org/10.3390/sym14122549.
Повний текст джерелаZhang, Daokun, Jie Yin, Xingquan Zhu, and Chengqi Zhang. "Search Efficient Binary Network Embedding." ACM Transactions on Knowledge Discovery from Data 15, no. 4 (June 2021): 1–27. http://dx.doi.org/10.1145/3436892.
Повний текст джерелаDo, Thanh-Toan, Khoa Le, Tuan Hoang, Huu Le, Tam V. Nguyen, and Ngai-Man Cheung. "Simultaneous Feature Aggregating and Hashing for Compact Binary Code Learning." IEEE Transactions on Image Processing 28, no. 10 (October 2019): 4954–69. http://dx.doi.org/10.1109/tip.2019.2913509.
Повний текст джерелаTian, Donghai, Xiaoqi Jia, Rui Ma, Shuke Liu, Wenjing Liu, and Changzhen Hu. "BinDeep: A deep learning approach to binary code similarity detection." Expert Systems with Applications 168 (April 2021): 114348. http://dx.doi.org/10.1016/j.eswa.2020.114348.
Повний текст джерелаWeng, Zhenyu, and Yuesheng Zhu. "Online Hashing with Efficient Updating of Binary Codes." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (April 3, 2020): 12354–61. http://dx.doi.org/10.1609/aaai.v34i07.6920.
Повний текст джерелаWang, Jinpeng, Ziyun Zeng, Bin Chen, Tao Dai, and Shu-Tao Xia. "Contrastive Quantization with Code Memory for Unsupervised Image Retrieval." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 3 (June 28, 2022): 2468–76. http://dx.doi.org/10.1609/aaai.v36i3.20147.
Повний текст джерелаZhuang, Yuan, Baobao Wang, Jianguo Sun, Haoyang Liu, Shuqi Yang, and Qingan Da. "Deep Learning-Based Program-Wide Binary Code Similarity for Smart Contracts." Computers, Materials & Continua 74, no. 1 (2023): 1011–24. http://dx.doi.org/10.32604/cmc.2023.028058.
Повний текст джерелаGeorgiopoulos, Michael, Gregory L. Heileman, and Juxin Huang. "Convergence Properties of Learning in ART1." Neural Computation 2, no. 4 (December 1990): 502–9. http://dx.doi.org/10.1162/neco.1990.2.4.502.
Повний текст джерелаPholdee, Nantiwat, and Sujin Bureerat. "Estimation of Distribution Algorithm Using Correlation between Binary Elements: A New Binary-Code Metaheuristic." Mathematical Problems in Engineering 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/6043109.
Повний текст джерелаFRIEDRICH, JOHANNES, ROBERT URBANCZIK, and WALTER SENN. "CODE-SPECIFIC LEARNING RULES IMPROVE ACTION SELECTION BY POPULATIONS OF SPIKING NEURONS." International Journal of Neural Systems 24, no. 05 (May 30, 2014): 1450002. http://dx.doi.org/10.1142/s0129065714500026.
Повний текст джерелаMohapatra, Sudhir Kumar, Srinivas Prasad, Dwiti Krishna Bebarta, Tapan Kumar Das, Kathiravan Srinivasan, and Yuh-Chung Hu. "Automatic Hate Speech Detection in English-Odia Code Mixed Social Media Data Using Machine Learning Techniques." Applied Sciences 11, no. 18 (September 15, 2021): 8575. http://dx.doi.org/10.3390/app11188575.
Повний текст джерелаWang, Yazhou, Bing Li, Yan Zhang, Jiaxin Wu, and Qianya Ma. "A Secure Biometric Key Generation Mechanism via Deep Learning and Its Application." Applied Sciences 11, no. 18 (September 13, 2021): 8497. http://dx.doi.org/10.3390/app11188497.
Повний текст джерелаSong, Yang, Qiyu Kang, and Wee Peng Tay. "Error-Correcting Output Codes with Ensemble Diversity for Robust Learning in Neural Networks." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 11 (May 18, 2021): 9722–29. http://dx.doi.org/10.1609/aaai.v35i11.17169.
Повний текст джерелаEscalada, Javier, Francisco Ortin, and Ted Scully. "An Efficient Platform for the Automatic Extraction of Patterns in Native Code." Scientific Programming 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/3273891.
Повний текст джерелаKeller, Patrick, Abdoul Kader Kaboré, Laura Plein, Jacques Klein, Yves Le Traon, and Tegawendé F. Bissyandé. "What You See is What it Means! Semantic Representation Learning of Code based on Visualization and Transfer Learning." ACM Transactions on Software Engineering and Methodology 31, no. 2 (April 30, 2022): 1–34. http://dx.doi.org/10.1145/3485135.
Повний текст джерелаRocha, Kyle Akira, Jeff J. Andrews, Christopher P. L. Berry, Zoheyr Doctor, Aggelos K. Katsaggelos, Juan Gabriel Serra Pérez, Pablo Marchant, et al. "Active Learning for Computationally Efficient Distribution of Binary Evolution Simulations." Astrophysical Journal 938, no. 1 (October 1, 2022): 64. http://dx.doi.org/10.3847/1538-4357/ac8b05.
Повний текст джерелаBADUROWICZ, Marcin. "DETECTION OF SOURCE CODE IN INTERNET TEXTS USING AUTOMATICALLY GENERATED MACHINE LEARNING MODELS." Applied Computer Science 18, no. 1 (March 30, 2022): 89–98. http://dx.doi.org/10.35784/acs-2022-7.
Повний текст джерелаRen, Yanduo, Jiangbo Qian, Yihong Dong, Yu Xin, and Huahui Chen. "AVBH: Asymmetric Learning to Hash with Variable Bit Encoding." Scientific Programming 2020 (January 21, 2020): 1–11. http://dx.doi.org/10.1155/2020/2424381.
Повний текст джерелаLee, Sangwoo, and Jungwon Cho. "Malware Authorship Attribution Model using Runtime Modules based on Automated Analysis." JOIV : International Journal on Informatics Visualization 6, no. 1-2 (May 31, 2022): 214. http://dx.doi.org/10.30630/joiv.6.1-2.941.
Повний текст джерелаSchmidhuber, Jürgen. "Learning Factorial Codes by Predictability Minimization." Neural Computation 4, no. 6 (November 1992): 863–79. http://dx.doi.org/10.1162/neco.1992.4.6.863.
Повний текст джерелаWang, Zhen, Nannan Wu, Xiaohan Yang, Bingqi Yan, and Pingping Liu. "Deep Learning Triplet Ordinal Relation Preserving Binary Code for Remote Sensing Image Retrieval Task." Remote Sensing 13, no. 23 (November 26, 2021): 4786. http://dx.doi.org/10.3390/rs13234786.
Повний текст джерелаHung, Cheng-An, and Sheng-Fuu Lin. "Supervised Adaptive Hamming Net for Classification of Multiple-Valued Patterns." International Journal of Neural Systems 08, no. 02 (April 1997): 181–200. http://dx.doi.org/10.1142/s0129065797000203.
Повний текст джерелаNaeem, Muhammad Rehan, Rashid Amin, Sultan S. Alshamrani, and Abdullah Alshehri. "Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition." Computational Intelligence and Neuroscience 2022 (April 21, 2022): 1–12. http://dx.doi.org/10.1155/2022/6294058.
Повний текст джерелаMidyanti, Dwi Marisa. "Combination of SOM-RBF for drought code prediction using rainfall and air temperature data." Jurnal Teknologi dan Sistem Komputer 8, no. 1 (November 18, 2019): 64–68. http://dx.doi.org/10.14710/jtsiskom.8.1.2020.64-68.
Повний текст джерелаJiang, Jian, and Fen Zhang. "Detecting Portable Executable Malware by Binary Code Using an Artificial Evolutionary Fuzzy LSTM Immune System." Security and Communication Networks 2021 (July 7, 2021): 1–12. http://dx.doi.org/10.1155/2021/3578695.
Повний текст джерелаZhang, Zheng, Xiaofeng Zhu, Guangming Lu, and Yudong Zhang. "Probability Ordinal-Preserving Semantic Hashing for Large-Scale Image Retrieval." ACM Transactions on Knowledge Discovery from Data 15, no. 3 (April 12, 2021): 1–22. http://dx.doi.org/10.1145/3442204.
Повний текст джерелаPanthaplackel, Sheena, Milos Gligoric, Raymond J. Mooney, and Junyi Jessy Li. "Associating Natural Language Comment and Source Code Entities." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 05 (April 3, 2020): 8592–99. http://dx.doi.org/10.1609/aaai.v34i05.6382.
Повний текст джерелаTang, Xu, Chao Liu, Jingjing Ma, Xiangrong Zhang, Fang Liu, and Licheng Jiao. "Large-Scale Remote Sensing Image Retrieval Based on Semi-Supervised Adversarial Hashing." Remote Sensing 11, no. 17 (September 1, 2019): 2055. http://dx.doi.org/10.3390/rs11172055.
Повний текст джерелаAkgun, Devrim. "PyTorch Operations Based Approach for Computing Local Binary Patterns." U.Porto Journal of Engineering 7, no. 4 (November 26, 2021): 61–69. http://dx.doi.org/10.24840/2183-6493_007.004_0005.
Повний текст джерелаChen, Ling-qing, Mei-ting Wu, Li-fang Pan, and Ru-bin Zheng. "Grade Prediction in Blended Learning Using Multisource Data." Scientific Programming 2021 (September 11, 2021): 1–15. http://dx.doi.org/10.1155/2021/4513610.
Повний текст джерелаLi, Jun Yi, and Jian Hua Li. "Fast Image Search with Pixel-Based Deep Learning Framework via Efficient Compact Binary Code and Addictive Latent Layer." International Journal of Pattern Recognition and Artificial Intelligence 32, no. 03 (November 22, 2017): 1859004. http://dx.doi.org/10.1142/s0218001418590048.
Повний текст джерелаKong, Vungsovanreach, Oui Somakhamixay, Wan-Sup Cho, Gilwon Kang, Heesun Won, HyungChul Rah, and Heui Je Bang. "Recurrence risk prediction of acute coronary syndrome per patient as a personalized ACS recurrence risk: a retrospective study." PeerJ 10 (November 15, 2022): e14348. http://dx.doi.org/10.7717/peerj.14348.
Повний текст джерелаZhao, Yujie, Zhanyong Tang, Guixin Ye, Xiaoqing Gong, and Dingyi Fang. "Input-Output Example-Guided Data Deobfuscation on Binary." Security and Communication Networks 2021 (December 13, 2021): 1–16. http://dx.doi.org/10.1155/2021/4646048.
Повний текст джерелаKiger, John, Shen-Shyang Ho, and Vahid Heydari. "Malware Binary Image Classification Using Convolutional Neural Networks." International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 469–78. http://dx.doi.org/10.34190/iccws.17.1.59.
Повний текст джерелаLeventi-Peetz, Anastasia-Maria, and Kai Weber. "Probabilistic machine learning for breast cancer classification." Mathematical Biosciences and Engineering 20, no. 1 (2022): 624–55. http://dx.doi.org/10.3934/mbe.2023029.
Повний текст джерелаBajaber, Asrar, and Lamiaa Elrefaei. "Biometric Template Protection for Dynamic Touch Gestures Based on Fuzzy Commitment Scheme and Deep Learning." Mathematics 10, no. 3 (January 25, 2022): 362. http://dx.doi.org/10.3390/math10030362.
Повний текст джерелаМоскаленко, В’ячеслав Васильович, Микола Олександрович Зарецький, Артем Геннадійович Коробов, Ярослав Юрійович Ковальський, Артур Фанісович Шаєхов, Віктор Анатолійович Семашко та Андрій Олександрович Панич. "Модель та метод навчання для класифікаційного аналізу рівня води в стічних трубах за даними відео інспекції". RADIOELECTRONIC AND COMPUTER SYSTEMS, № 2 (2 червня 2021): 4–15. http://dx.doi.org/10.32620/reks.2021.2.01.
Повний текст джерелаМоскаленко, В’ячеслав Васильович, Микола Олександрович Зарецький, Ярослав Юрійович Ковальський та Сергій Сергійович Мартиненко. "МОДЕЛЬ І МЕТОД НАВЧАННЯ КЛАСИФІКАТОРА КОНТЕКСТІВ СПОСТЕРЕЖЕННЯ НА ЗОБРАЖЕННЯХ ВІДЕОІНСПЕКЦІЇ СТІЧНИХ ТРУБ". RADIOELECTRONIC AND COMPUTER SYSTEMS, № 3 (28 вересня 2020): 59–66. http://dx.doi.org/10.32620/reks.2020.3.06.
Повний текст джерелаPachganov, Stepan, Khalimat Murtazalieva, Aleksei Zarubin, Dmitry Sokolov, Duane R. Chartier, and Tatiana V. Tatarinova. "TransPrise: a novel machine learning approach for eukaryotic promoter prediction." PeerJ 7 (November 1, 2019): e7990. http://dx.doi.org/10.7717/peerj.7990.
Повний текст джерелаChen, Xize, Xiaoyu Qu, Yufeng Qian, and Yiyao Zhang. "Music Recognition Using Blockchain Technology and Deep Learning." Computational Intelligence and Neuroscience 2022 (August 8, 2022): 1–13. http://dx.doi.org/10.1155/2022/7025338.
Повний текст джерелаLiu, Xinyue, Qinghua Li, and Yuangang Li. "Count-Based Exploration via Embedded State Space for Deep Reinforcement Learning." Wireless Communications and Mobile Computing 2022 (May 17, 2022): 1–8. http://dx.doi.org/10.1155/2022/1238571.
Повний текст джерелаLin, Chun, Yijia Xu, Yong Fang, and Zhonglin Liu. "VulEye: A Novel Graph Neural Network Vulnerability Detection Approach for PHP Application." Applied Sciences 13, no. 2 (January 6, 2023): 825. http://dx.doi.org/10.3390/app13020825.
Повний текст джерела