{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T23:10:19Z","timestamp":1743549019185,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031861482","type":"print"},{"value":"9783031861499","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-86149-9_9","type":"book-chapter","created":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T22:39:52Z","timestamp":1743547192000},"page":"88-97","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["GRLfuzz: Gan-Powered Fuzzing Based on\u00a0Deep Reinforcement Learning"],"prefix":"10.1007","author":[{"given":"Yuan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Baojiang","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,1]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1109\/TSE.2017.2785841","volume":"45","author":"M B\u00f6hme","year":"2017","unstructured":"B\u00f6hme, M., Pham, V.T., Roychoudhury, A.: Coverage-based greybox fuzzing as markov chain. IEEE Trans. Softw. Eng. 45, 489\u2013506 (2017)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"B\u00f6hme, M., Pham, V.T., Nguyen, M.D., et al.: Directed greybox fuzzing. In: Proceedings of the. ACM SIGSAC Conference on Computer and Communications Security 2017, pp. 2329\u20132344 (2017)","DOI":"10.1145\/3133956.3134020"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Chen, P., Chen, H.: Angora: efficient fuzzing by principled search. In: 2018 Symposium on Security and Privacy (SP), pp. 711\u2013725. IEEE, San Francisco (2018)","DOI":"10.1109\/SP.2018.00046"},{"key":"9_CR4","doi-asserted-by":"publisher","unstructured":"Drozd, W., Wagner, M.D.: FuzzerGym: a competitive framework for fuzzing and learning. arXiv (2018). https:\/\/doi.org\/10.48550\/arXiv.1807.07490","DOI":"10.48550\/arXiv.1807.07490"},{"key":"9_CR5","unstructured":"Vykov, D.: Syzkaller (2016). https:\/\/github.com\/google\/syzkaller"},{"key":"9_CR6","unstructured":"Fioraldi, A., Maier, D., Ei\u00dffeldt, H., et al.: AFL++: combining incremental steps of fuzzing research. In: 14th USENIX Workshop on Offensive Technologies (WOOT 20) (2020)"},{"key":"9_CR7","first-page":"2613","volume":"23","author":"H Hasselt","year":"2010","unstructured":"Hasselt, H.: Double Q-learning. Adv. Neural. Inf. Process. Syst. 23, 2613\u20132621 (2010)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"9_CR8","unstructured":"Lyu, C., Ji, S., Li, Y., et al.: Smartseed: smart seed generation for efficient fuzzing (2018)"},{"key":"9_CR9","unstructured":"Lillicrap, T.P., Hunt, J.J., et al.: Continuous control with deep reinforcement learning. arXiv preprint arXiv:1509.02971 (2015)"},{"key":"9_CR10","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/96267.96279","volume":"33","author":"BP Miller","year":"1990","unstructured":"Miller, B.P., Fredriksen, L., So, B.: An empirical study of the reliability of UNIX utilities. Commun. ACM 33, 32\u201344 (1990)","journal-title":"Commun. ACM"},{"key":"9_CR11","unstructured":"Zalewski, M.: American Fuzzy Lop (2019). https:\/\/github.com\/Google\/AFL. Accessed 10 Sept 2019"},{"key":"9_CR12","unstructured":"Eddington, M.: Peach fuzzing platform. http:\/\/community.peachfuzzer.com\/WhatIsPeach.html"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Rawat, S., Jain, V., Kumar, A., et al.: VUzzer: application-aware evolutionary fuzzing. In: Network and Distributed System Security Symposium (NDSS), vol. 17, pp. 1\u201314 (2017)","DOI":"10.14722\/ndss.2017.23404"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Stephens, N., Grosen, J., Salls, C., et al.: Driller: augmenting fuzzing through selective symbolic execution. In: The Network and Distributed System Security Symposium 2016 (NDSS), San Diego, California, USA, pp. 1-16 (2016)","DOI":"10.14722\/ndss.2016.23368"},{"key":"9_CR15","unstructured":"Son, S., Lee, S., Han, H., et al.: Montage: a neural network language model-guided javascript fuzzer. In: 20th USENIX Security Symposium (USENIX Security 2020) (2020)"},{"key":"9_CR16","unstructured":"Serebryany, K.: libFuzzer\u2013a library for coverage-guided fuzz testing. LLVM project (2015)"},{"key":"9_CR17","doi-asserted-by":"publisher","unstructured":"Pham, V., Boehme, M., Santosa, A.E., Caciulescu, A.R., Roychoudhury, A.: Smart greybox fuzzing. IEEE Trans. Softw. Eng. (2019). https:\/\/doi.org\/10.1109\/TSE.2019.2941681","DOI":"10.1109\/TSE.2019.2941681"},{"key":"9_CR18","unstructured":"Zong, P., Lv, T., Wang, D., et al.: Fuzzguard: filtering out unreachable inputs in directed grey-box fuzzing through deep learning. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 2255\u20132269 (2020)"},{"key":"9_CR19","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-030-50399-4_24","volume-title":"Innovative Mobile and Internet Services in Ubiquitous Computing","author":"Z Zhang","year":"2021","unstructured":"Zhang, Z., Cui, B., Chen, C.: Reinforcement learning-based fuzzing technology. In: Barolli, L., Poniszewska-Maranda, A., Park, H. (eds.) IMIS 2020. AISC, vol. 1195, pp. 244\u2013253. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-50399-4_24"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internet, Data and Web Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-86149-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T22:40:02Z","timestamp":1743547202000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-86149-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031861482","9783031861499"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-86149-9_9","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EIDWT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Emerging Internet, Data & Web Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Matsue","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 February 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 February 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eidwt12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/eidwt\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}