{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:13:44Z","timestamp":1772039624343,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2024,4,23]],"date-time":"2024-04-23T00:00:00Z","timestamp":1713830400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,23]],"date-time":"2024-04-23T00:00:00Z","timestamp":1713830400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U2333205, 62302025, 62276017"],"award-info":[{"award-number":["U2333205, 62302025, 62276017"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U2333205, 62302025, 62276017"],"award-info":[{"award-number":["U2333205, 62302025, 62276017"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U2333205, 62302025, 62276017"],"award-info":[{"award-number":["U2333205, 62302025, 62276017"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U2333205, 62302025, 62276017"],"award-info":[{"award-number":["U2333205, 62302025, 62276017"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U2333205, 62302025, 62276017"],"award-info":[{"award-number":["U2333205, 62302025, 62276017"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"State Grid Co., Ltd. Technology R&D Project","award":["5108-202303439A-3-2-ZN"],"award-info":[{"award-number":["5108-202303439A-3-2-ZN"]}]},{"name":"State Grid Co., Ltd. Technology R&D Project","award":["5108-202303439A-3-2-ZN"],"award-info":[{"award-number":["5108-202303439A-3-2-ZN"]}]},{"name":"State Grid Co., Ltd. Technology R&D Project","award":["5108-202303439A-3-2-ZN"],"award-info":[{"award-number":["5108-202303439A-3-2-ZN"]}]},{"name":"State Grid Co., Ltd. Technology R&D Project","award":["5108-202303439A-3-2-ZN"],"award-info":[{"award-number":["5108-202303439A-3-2-ZN"]}]},{"name":"State Grid Co., Ltd. Technology R&D Project","award":["5108-202303439A-3-2-ZN"],"award-info":[{"award-number":["5108-202303439A-3-2-ZN"]}]},{"name":"the 2022 CCF-NSFOCUS Kun-Peng Scientific Research Fund"},{"name":"the Opening Project of Shanghai Trusted Industrial Control Platform"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s13042-024-02153-z","type":"journal-article","created":{"date-parts":[[2024,4,23]],"date-time":"2024-04-23T12:02:11Z","timestamp":1713873731000},"page":"4403-4421","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Seq2Seq-AFL: Fuzzing via sequence-to-sequence model"],"prefix":"10.1007","volume":"15","author":[{"given":"Liqun","family":"Yang","sequence":"first","affiliation":[]},{"given":"Chaoren","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jinxin","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Hongcheng","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Long","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Zhoujun","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,23]]},"reference":[{"issue":"9","key":"2153_CR1","doi-asserted-by":"publisher","first-page":"3519","DOI":"10.1109\/TCSII.2023.3261405","volume":"70","author":"T Wu","year":"2023","unstructured":"Wu T, Liu J, Xue L, Wu Y (2023) Fixed-time synchronization of multilayer complex networks under denial-of-service attacks. IEEE Trans Circuits Syst II Express Briefs 70(9):3519\u20133523. https:\/\/doi.org\/10.1109\/TCSII.2023.3261405","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"issue":"7","key":"2153_CR2","doi-asserted-by":"publisher","first-page":"2038","DOI":"10.1109\/TCAD.2021.3099084","volume":"41","author":"D Min","year":"2022","unstructured":"Min D, Ko Y, Walker R, Lee J, Kim Y (2022) A content-based ransomware detection and backup solid-state drive for ransomware defense. IEEE Trans Comput Aided Des Integr Circuits Syst 41(7):2038\u20132051. https:\/\/doi.org\/10.1109\/TCAD.2021.3099084","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"issue":"3","key":"2153_CR3","doi-asserted-by":"publisher","first-page":"1544","DOI":"10.1109\/TDSC.2020.3027690","volume":"19","author":"S Gan","year":"2022","unstructured":"Gan S et al (2022) Path sensitive fuzzing for native applications. IEEE Trans Dependable Secure Comput 19(3):1544\u20131561. https:\/\/doi.org\/10.1109\/TDSC.2020.3027690","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"12","key":"2153_CR4","doi-asserted-by":"publisher","first-page":"5084","DOI":"10.1109\/TSE.2023.3326056","volume":"49","author":"D Iorga","year":"2023","unstructured":"Iorga D, Wickerson J, Donaldson AF (2023) Simulating operational memory models using off-the-shelf program analysis tools. IEEE Trans Software Eng 49(12):5084\u20135102. https:\/\/doi.org\/10.1109\/TSE.2023.3326056","journal-title":"IEEE Trans Software Eng"},{"issue":"11","key":"2153_CR5","doi-asserted-by":"publisher","first-page":"4457","DOI":"10.1109\/TCAD.2022.3201471","volume":"41","author":"F Zuo","year":"2022","unstructured":"Zuo F et al (2022) Vulnerability detection of ICS protocols via cross-state fuzzing. IEEE Trans Comput Aided Des Integr Circuits Syst 41(11):4457\u20134468. https:\/\/doi.org\/10.1109\/TCAD.2022.3201471","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"key":"2153_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3244825","author":"Y Li","year":"2023","unstructured":"Li Y et al (2023) G-Fuzz: a directed fuzzing framework for gVisor. IEEE Trans Dependable Secure Comput. https:\/\/doi.org\/10.1109\/TDSC.2023.3244825","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"8","key":"2153_CR7","doi-asserted-by":"publisher","first-page":"4004","DOI":"10.1109\/TSE.2023.3278129","volume":"49","author":"R He","year":"2023","unstructured":"He R, He H, Zhang Y, Zhou M (2023) Automating dependency updates in practice: an exploratory study on GitHub dependabot. IEEE Trans Software Eng 49(8):4004\u20134022. https:\/\/doi.org\/10.1109\/TSE.2023.3278129","journal-title":"IEEE Trans Software Eng"},{"key":"2153_CR8","unstructured":"Zhang Zenong et al. {FIXREVERTER}: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing. 31st USENIX Security Symposium (USENIX Security 22). 2022."},{"key":"2153_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2023.3322406","author":"H Dai","year":"2023","unstructured":"Dai H, Sun CA, Liu H, Zhang X (2023) DFuzzer: diversity-driven seed queue construction of fuzzing for deep learning models. IEEE Trans Reliab. https:\/\/doi.org\/10.1109\/TR.2023.3322406","journal-title":"IEEE Trans Reliab"},{"key":"2153_CR10","doi-asserted-by":"publisher","unstructured":"Klooster T, Turkmen F, Broenink G, Hove RT, B\u00f6hme M (2023) Continuous fuzzing: a study of the effectiveness and scalability of fuzzing in CI\/CD pipelines. 2023 IEEE\/ACM International Workshop on Search-Based and Fuzz Testing (SBFT), Melbourne, Australia, 2023, pp 25-32. https:\/\/doi.org\/10.1109\/SBFT59156.2023.00015","DOI":"10.1109\/SBFT59156.2023.00015"},{"key":"2153_CR11","first-page":"11","volume":"2020","author":"V Barinov","year":"2020","unstructured":"Barinov V, Kashkarov M, Kazmin A (2020) Applying compiler-based binary watermarking technology to ensure binary compatibility in GNU\/Linux distribution. 2020 Ivannikov Ispras Open Conference (ISPRAS). Moscow, Russia 2020:11\u201315","journal-title":"Moscow, Russia"},{"issue":"5","key":"2153_CR12","doi-asserted-by":"publisher","first-page":"2469","DOI":"10.1109\/TDSC.2019.2954088","volume":"18","author":"G Lin","year":"2021","unstructured":"Lin G (2021) Software vulnerability discovery via learning multi-domainknowledge bases. IEEE Trans Dependable Secure Comput 18(5):2469\u20132485. https:\/\/doi.org\/10.1109\/TDSC.2019.2954088","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"10","key":"2153_CR13","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.1109\/JPROC.2020.2993293","volume":"108","author":"G Lin","year":"2020","unstructured":"Lin G, Wen S, Han Q-L, Zhang J, Xiang Y (2020) Software vulnerability detection using deep neural networks: a survey. Proc IEEE 108(10):1825\u20131848. https:\/\/doi.org\/10.1109\/JPROC.2020.2993293","journal-title":"Proc IEEE"},{"key":"2153_CR14","doi-asserted-by":"publisher","unstructured":"Croft Roland, et al. An empirical study of rule-based and learning-based approaches for static application security testing. Proceedings of the 15th ACM\/IEEE international symposium on empirical software engineering and measurement (ESEM). (2021). https:\/\/doi.org\/10.1145\/3475716.3475781.","DOI":"10.1145\/3475716.3475781"},{"key":"2153_CR15","doi-asserted-by":"publisher","unstructured":"Dinh Sung Ta, et al (2021) Favocado: fuzzing the binding code of javascript engines using semantically correct test cases. NDSS. https:\/\/doi.org\/10.14722\/ndss.2021.24224.","DOI":"10.14722\/ndss.2021.24224"},{"key":"2153_CR16","unstructured":"Cloosters T et al (2022) SGXFuzz: efficiently synthesizing nested structures for SGX enclave fuzzing. 31st USENIX Security Symposium (USENIX Security 22)"},{"key":"2153_CR17","doi-asserted-by":"publisher","first-page":"4434","DOI":"10.1007\/s11227-017-1980-3","volume":"74","author":"SJ Kim","year":"2018","unstructured":"Kim SJ, Shon T (2018) Field classification-based novel fuzzing case generation for ICS protocols. J Supercomput 74:4434\u20134450. https:\/\/doi.org\/10.1007\/s11227-017-1980-3","journal-title":"J Supercomput"},{"key":"2153_CR18","doi-asserted-by":"publisher","unstructured":"Kiss Bal\u00e1zs, et al. Combining static and dynamic analyses for vulnerability detection: illustration on heartbleed. Hardware and Software: Verification and Testing: 11th International Haifa Verification Conference, HVC 2015, Haifa, Israel, Proceedings 11. Springer International Publishing, Cham. 2015. https:\/\/doi.org\/10.1007\/978-3-319-26287-1_3.","DOI":"10.1007\/978-3-319-26287-1_3"},{"key":"2153_CR19","doi-asserted-by":"publisher","first-page":"49327","DOI":"10.1109\/ACCESS.2019.2911121","volume":"7","author":"Z Li","year":"2019","unstructured":"Li Z, Zhao H, Shi J, Huang Y, Xiong J (2019) An intelligent fuzzing data generation method based on deep adversarial learning. IEEE Access. 7:49327\u201349340. https:\/\/doi.org\/10.1109\/ACCESS.2019.2911121","journal-title":"IEEE Access."},{"key":"2153_CR20","doi-asserted-by":"publisher","unstructured":"Wang J, Chen B, Wei L, Liu Y (2017) Skyfire: data-driven seed generation for fuzzing. 2017 IEEE Symposium on Security and Privacy (SP), San Jose. pp. 579\u2013594. https:\/\/doi.org\/10.1109\/sp.2017.23.","DOI":"10.1109\/sp.2017.23"},{"key":"2153_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3182373","author":"Y Xue","year":"2022","unstructured":"Xue Y et al (2022) xFuzz: machine learning guided cross-contract fuzzing. IEEE Trans Dependable Secure Comput. https:\/\/doi.org\/10.1109\/TDSC.2022.3182373","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"23","key":"2153_CR22","doi-asserted-by":"publisher","first-page":"20718","DOI":"10.1109\/JIOT.2023.3303780","volume":"10","author":"L Situ","year":"2023","unstructured":"Situ L et al (2023) Physical devices-agnostic hybrid fuzzing of IoT firmware. IEEE Internet Things J 10(23):20718\u201320734. https:\/\/doi.org\/10.1109\/JIOT.2023.3303780","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"2153_CR23","doi-asserted-by":"publisher","first-page":"2782","DOI":"10.1109\/TII.2022.3211888","volume":"19","author":"B Wang","year":"2023","unstructured":"Wang B, Wang R, Song H (2023) Toward the trustworthiness of industrial robotics using differential fuzz testing. IEEE Trans Ind Inf. 19(3):2782\u20132791. https:\/\/doi.org\/10.1109\/TII.2022.3211888","journal-title":"IEEE Trans Ind Inf."},{"key":"2153_CR24","unstructured":"Rajpal Mohit, William Blum, Rishabh Singh (2017) Not all bytes are equal: Neural byte sieve for fuzzing. arXiv preprint arXiv:1711.04596."},{"key":"2153_CR25","doi-asserted-by":"publisher","unstructured":"She D, Pei K, Epstein D, Yang J, Ray B, Jana S. NEUZZ: efficient fuzzing with neural program smoothing. 2019 IEEE Symposium on Security and Privacy (SP), San Francisco. 2019. pp. 803-817. https:\/\/doi.org\/10.1109\/sp.2019.00052","DOI":"10.1109\/sp.2019.00052"},{"key":"2153_CR26","doi-asserted-by":"publisher","unstructured":"She Dongdong, et al. MTFuzz: fuzzing with a multi-task neural network. Proceedings of the 28th ACM joint meeting on European software engineering conference and symposium on the foundations of software engineering. 2020. https:\/\/doi.org\/10.1145\/3410251.","DOI":"10.1145\/3410251"},{"key":"2153_CR27","doi-asserted-by":"publisher","unstructured":"Wang X, Hu C, Ma R, Li B, Wang X (2020) LAFuzz: neural network for efficient fuzzing.\u201d 2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI), Baltimore. 2020. pp. 603\u2013611. https:\/\/doi.org\/10.1109\/ictai50040.2020.00098.","DOI":"10.1109\/ictai50040.2020.00098"},{"key":"2153_CR28","doi-asserted-by":"publisher","unstructured":"Hu Zhicheng, et al. GANFuzz: a GAN-based industrial network protocol fuzzing framework. Proceedings of the 15th ACM International Conference on Computing Frontiers. 2018. https:\/\/doi.org\/10.1145\/3203217.3203241.","DOI":"10.1145\/3203217.3203241"},{"key":"2153_CR29","unstructured":"Zalewski M. American fuzzy lop. http:\/\/lcamtuf.coredump.c\/afl 2014."},{"key":"2153_CR30","doi-asserted-by":"publisher","unstructured":"Aschermann C, Frassetto T, Holz T, et al. NAUTILUS: fishing for deep bugs with grammars. Network and distributed system security symposium. 2019. https:\/\/doi.org\/10.14722\/ndss.2019.23412.","DOI":"10.14722\/ndss.2019.23412"},{"key":"2153_CR31","unstructured":"Lyu C, Ji S, Zhang C, et al. MOPT: optimized mutation scheduling for fuzzers. USENIX Security Symposium. 2019."},{"key":"2153_CR32","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428","author":"M Bhme","year":"2016","unstructured":"B\u00f6hme M, Pham\nV-T, Roychoudhury A (2019) Coverage-based greybox fuzzing as markov chain. IEEE Trans Software Eng 45(5):489-506.\nhttps:\/\/doi.org\/10.1109\/TSE.2017.2785841","journal-title":"IEEE Trans Software Eng."},{"key":"2153_CR33","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.23","author":"J Wang","year":"2017","unstructured":"Wang J, Chen B, Wei L et al (2017) Skyfire: data-driven seed generation for fuzzing. IEEE. https:\/\/doi.org\/10.1109\/SP.2017.23","journal-title":"IEEE"},{"issue":"3","key":"2153_CR34","doi-asserted-by":"publisher","first-page":"2765","DOI":"10.1109\/TKDE.2021.3112749","volume":"35","author":"P Hao","year":"2023","unstructured":"Hao P et al (2023) Lifelong property price prediction: a case study for the toronto real estate market. IEEE Trans Knowl Data Eng 35(3):2765\u20132780. https:\/\/doi.org\/10.1109\/TKDE.2021.3112749","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2153_CR35","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1109\/TASLP.2021.3138670","volume":"30","author":"Li Qian","year":"2022","unstructured":"Qian Li et al (2022) Reinforcement learning-based dialogue guided event extraction to exploit argument relations. IEEE\/ACM Trans Audio Speech Lang Process 30:520\u2013533. https:\/\/doi.org\/10.1109\/TASLP.2021.3138670","journal-title":"IEEE\/ACM Trans Audio Speech Lang Process"},{"issue":"10","key":"2153_CR36","doi-asserted-by":"publisher","first-page":"10801","DOI":"10.1109\/JSEN.2023.3266104","volume":"23","author":"L Ma","year":"2023","unstructured":"Ma L, Zhao Y, Wang B, Shen F (2023) A multistep sequence-to-sequence model with attention LSTM neural networks for industrial soft sensor application. IEEE Sens J 23(10):10801\u201310813. https:\/\/doi.org\/10.1109\/JSEN.2023.3266104","journal-title":"IEEE Sens J"},{"issue":"8","key":"2153_CR37","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput. 9(8):1735\u20131780. https:\/\/doi.org\/10.1162\/neco.1997.9.8.1735","journal-title":"Neural Comput."},{"issue":"9","key":"2153_CR38","doi-asserted-by":"publisher","first-page":"3540","DOI":"10.1109\/TSE.2021.3100858","volume":"48","author":"HD Menendez","year":"2022","unstructured":"Menendez HD, Clark D (2022) Hashing fuzzing: introducing input diversity to improve crash detection. IEEE Trans Software Eng 48(9):3540\u20133553. https:\/\/doi.org\/10.1109\/TSE.2021.3100858","journal-title":"IEEE Trans Software Eng"},{"issue":"6","key":"2153_CR39","doi-asserted-by":"publisher","first-page":"2028","DOI":"10.1109\/TSE.2020.3047766","volume":"48","author":"BP Miller","year":"2022","unstructured":"Miller BP, Zhang M, Heymann ER (2022) The relevance of classic fuzz testing: have we solved this one? IEEE Trans Software Eng 48(6):2028\u20132039. https:\/\/doi.org\/10.1109\/TSE.2020.3047766","journal-title":"IEEE Trans Software Eng"},{"issue":"11","key":"2153_CR40","doi-asserted-by":"publisher","first-page":"4433","DOI":"10.1109\/TSE.2021.3119721","volume":"48","author":"R Arizon-Peretz","year":"2022","unstructured":"Arizon-Peretz R, Hadar I, Luria G (2022) The importance of securityis in the eye of the beholder: cultural, organizational, and personal factors affecting the implementation of security by design. IEEE Trans Software Eng 48(11):4433\u20134446. https:\/\/doi.org\/10.1109\/TSE.2021.3119721","journal-title":"IEEE Trans Software Eng"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02153-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-024-02153-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02153-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T16:32:47Z","timestamp":1726245167000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-024-02153-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,23]]},"references-count":40,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["2153"],"URL":"https:\/\/doi.org\/10.1007\/s13042-024-02153-z","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,23]]},"assertion":[{"value":"19 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}