Cited By
View all- Alrabaee SDebbabi MShirani PWang LYoussef ARahimian ANouh LMouheb DHuang HHanna AAlrabaee SDebbabi MShirani PWang LYoussef ARahimian ANouh LMouheb DHuang HHanna A(2020)Binary Analysis OverviewBinary Code Fingerprinting for Cybersecurity10.1007/978-3-030-34238-8_2(7-44)Online publication date: 1-Mar-2020
- Kanetaka YTakagi HMaeda YFukushima N(2024)SlidingConv: Domain-Specific Description of Sliding Discrete Cosine Transform Convolution for HalideIEEE Access10.1109/ACCESS.2023.334566012(7563-7583)Online publication date: 2024
- Liu ZYuan YWang SXie XMa LCalandrino JTroncoso C(2023)Decompiling x86 deep neural network executablesProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620649(7357-7374)Online publication date: 9-Aug-2023
- Show More Cited By