Fig. 3From: Bin2vec: learning representations of binary executable programs for security tasksHere we show how redundant instructions were removed to contract the graph. On the left the graph is shown before the contraction, and on the right it is demonstrated after the contractionBack to article page