{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:10:11Z","timestamp":1773511811183,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030503987","type":"print"},{"value":"9783030503994","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-50399-4_24","type":"book-chapter","created":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T11:02:37Z","timestamp":1591700557000},"page":"244-253","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Reinforcement Learning-Based Fuzzing Technology"],"prefix":"10.1007","author":[{"given":"Zheng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Baojiang","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,10]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Vinesh, N., Rawat, S., Bos, H., Giuffrida, C., Sethumadhavan, M.: Confuzz\u2014a concurrency fuzzer. In: First International Conference on Sustainable Technologies for Computational Intelligence, pp. 667\u2013691. Springer (2020)","DOI":"10.1007\/978-981-15-0029-9_53"},{"key":"24_CR2","doi-asserted-by":"publisher","unstructured":"Padhye, R., Lemieux, C., Sen, K.: JQF: coverage-guided property-based testing in Java. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2019) (2019). https:\/\/doi.org\/10.1145\/3293882.3339002","DOI":"10.1145\/3293882.3339002"},{"key":"24_CR3","unstructured":"Serebryany, K.: Libfuzzer a library for coverage-guided fuzz testing. LLVM project (2015)"},{"key":"24_CR4","unstructured":"Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction. MIT Press, Cambridge (2018)"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Dolan-Gavitt, B., Hulin, P., Kirda, E., Leek, T., Mambretti, A., Robertson, W., Ulrich, F., Whelan, R.: LAVA: large-scale automated vulnerability addition. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 110\u2013121. IEEE (2016)","DOI":"10.1109\/SP.2016.15"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Lemieux, C., Padhye, R., Sen, K., Song, D.: PerfFuzz: automatically generating pathological inputs. In: Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 254\u2013265. ACM (2018)","DOI":"10.1145\/3213846.3213874"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Padhye, R., Lemieux, C., Sen, K., Simon, L., Vijayakumar, H.: FuzzFactory: domain-specific fuzzing with waypoints. In: Proceedings of the ACM on Programming Languages vol. 3, no. OOPSLA, pp. 174 (2019)","DOI":"10.1145\/3360600"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Lemieux, C., Sen, K.: FairFuzz: a targeted mutation strategy for increasing greybox fuzz testing coverage. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 475\u2013485. ACM (2018)","DOI":"10.1145\/3238147.3238176"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Wang, Y., Jia, P., Liu, L., Liu, J.: A systematic review of fuzzing based on machine learning techniques. arXiv preprint. arXiv:1908.01262 (2019)","DOI":"10.1371\/journal.pone.0237749"},{"key":"24_CR10","unstructured":"Li, Y., Ji, S., Lv, C., Chen, Y., Chen, J., Gu, Q., Wu, C.: V-Fuzz: Vulnerability-oriented evolutionary fuzzing. arXiv preprint. arXiv:1901.01142 (2019)"},{"key":"24_CR11","doi-asserted-by":"publisher","first-page":"36340","DOI":"10.1109\/ACCESS.2019.2903291","volume":"7","author":"Y Wang","year":"2019","unstructured":"Wang, Y., Wu, Z., Wei, Q., Wang, Q.: NeuFuzz: efficient fuzzing with deep neural network. IEEE Access 7, 36340\u201336352 (2019)","journal-title":"IEEE Access"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"B\u00f6ttinger, K., Godefroid, P., Singh, R.: Deep reinforcement fuzzing. In: 2018 IEEE Security\u00a8 and Privacy Workshops (SPW), pp. 116\u2013122. IEEE (2018)","DOI":"10.1109\/SPW.2018.00026"},{"key":"24_CR13","unstructured":"Drozd, W., Wagner, M.D.: FuzzerGym: a competitive framework for fuzzing and learning. arXiv preprint. arXiv:1807.07490 (2018)"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Wu, Z., Johnson, E., Yang, W., Bastani, O., Song, D., Peng, J., Xie, T.: REINAM: reinforcement learning for input-grammar inference. In: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 488\u2013498. ACM (2019)","DOI":"10.1145\/3338906.3338958"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Kuznetsov, A., Yeromin, Y., Shapoval, O., Chernov, K., Popova, M., Serdukov, K.: Automated software vulnerability testing using deep learning methods. In: 2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON), pp. 837\u2013841. IEEE (2019)","DOI":"10.1109\/UKRCON.2019.8879997"},{"key":"24_CR16","unstructured":"Sutton, R.S., McAllester, D.A., Singh, S.P., Mansour, Y.: Policy gradient methods for reinforcement learning with function approximation. In: Advances in Neural Information Processing Systems, pp. 1057\u20131063 (2000)"},{"key":"24_CR17","unstructured":"Silver, D., Lever, G., Heess, N., Degris, T., Wierstra, D., Riedmiller, M.: Deterministic policy gradient algorithms (2014)"},{"key":"24_CR18","unstructured":"Lillicrap, T.P., Hunt, J.J., Pritzel, A., Heess, N., Erez, T., Tassa, Y., Silver, D., Wierstra, D.: Continuous control with deep reinforcement learning. arXiv preprint. arXiv:1509.02971 (2015)"},{"key":"24_CR19","unstructured":"Rajpal, M., Blum, W., Singh, R.: Not all bytes are equal: neural byte sieve for fuzzing. arXiv preprint. arXiv:1711.04596 (2017)"},{"key":"24_CR20","unstructured":"Zalewski, M.: American fuzzy lop - a security-oriented fuzzer. https:\/\/github.com\/google\/AFL"},{"issue":"5","key":"24_CR21","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1103\/PhysRev.36.823","volume":"36","author":"GE Uhlenbeck","year":"1930","unstructured":"Uhlenbeck, G.E., Ornstein, L.S.: On the theory of the Brownian motion. Phys. Rev. 36(5), 823 (1930)","journal-title":"Phys. Rev."}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50399-4_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T11:57:21Z","timestamp":1616155041000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-50399-4_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,10]]},"ISBN":["9783030503987","9783030503994"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50399-4_24","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,10]]},"assertion":[{"value":"10 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lodz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imis2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/imis\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}