no code implementations • 8 Aug 2018 • Fei Zuo, Xiaopeng Li, Patrick Young, Lannan Luo, Qiang Zeng, Zhexin Zhang
The solutions to these two problems have many applications, such as cross-architecture vulnerability discovery and code plagiarism detection.