Evading control flow graph based GNN malware detectors via active opcode insertion method with maliciousness preserving. [PDF]
Peng H+9 more
europepmc +1 more source
Tools for specifying and executing synchronized multimedia presentations [PDF]
Gerold Blakowski+2 more
openalex +1 more source
Using memorization to achieve polynomial complexity of purely functional executable specifications of non-deterministic top-down parsers [PDF]
Richard Frost
openalex +1 more source
The BioRECIPE Knowledge Representation Format. [PDF]
Holtzapple E+7 more
europepmc +1 more source
''Ideal'' directly executed languages: an analytical argument for emulation
Lee W. Hoevel
openalex +2 more sources
Executing loops on a fine-grained MIMD architecture [PDF]
Sun-Ah Lee, Rajiv Gupta
openalex +1 more source
A Generic Approach to Automatic Deobfuscation of Executable Code
Babak Yadegari+3 more
semanticscholar +1 more source
Part B: SLICE-MSI-A Machine Learning Interface for System Suitability Testing of Mass Spectrometry Imaging Platforms. [PDF]
Kibbe RR, Mills Q, Sohn AL, Muddiman DC.
europepmc +1 more source
A resolution method from predicate logic specification into executable code [PDF]
Kouichi Ono+3 more
openalex +1 more source