Sign in

A Binary Code Vulnerability Mining Method Based on Generative Adversarial Networks.

Ji LaiShuo LiQigui Yao
Published in: ICAIS (3) (2022)
Keyphrases
  • dynamic programming
  • pairwise
  • multi modal
  • data sets
  • hamming distance