{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T17:25:56Z","timestamp":1767374756510,"version":"3.37.3"},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602178"],"award-info":[{"award-number":["61602178"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shanghai Science and Technology Committee Rising-Star Program","award":["18QB1402000"],"award-info":[{"award-number":["18QB1402000"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2911121","type":"journal-article","created":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T20:40:43Z","timestamp":1556224843000},"page":"49327-49340","source":"Crossref","is-referenced-by-count":45,"title":["An Intelligent Fuzzing Data Generation Method Based on Deep Adversarial Learning"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8249-8532","authenticated-orcid":false,"given":"Zhihui","family":"Li","sequence":"first","affiliation":[{"name":"National Trusted Embedded Software Engineering Technology Research Center, East China Normal University, Shanghai, China"}]},{"given":"Hui","family":"Zhao","sequence":"additional","affiliation":[{"name":"National Trusted Embedded Software Engineering Technology Research Center, East China Normal University, Shanghai, China"}]},{"given":"Jianqi","family":"Shi","sequence":"additional","affiliation":[{"name":"National Trusted Embedded Software Engineering Technology Research Center, East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2102-4303","authenticated-orcid":false,"given":"Yanhong","family":"Huang","sequence":"additional","affiliation":[{"name":"National Trusted Embedded Software Engineering Technology Research Center, East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2341-0259","authenticated-orcid":false,"given":"Jiawen","family":"Xiong","sequence":"additional","affiliation":[{"name":"National Trusted Embedded Software Engineering Technology Research Center, East China Normal University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3020078.3021740"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s00199-015-0934-3"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.19"},{"journal-title":"Deep architectures for neural machine translation","year":"2017","author":"barone","key":"ref33"},{"journal-title":"Neural machine translation by jointly learning to align and translate","year":"2014","author":"bahdanau","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2134090"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2205597"},{"key":"ref37","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/34.655647"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2016.7577314"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2015.7102588"},{"journal-title":"Wireshark","year":"2018","key":"ref62"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2430536.2430540"},{"journal-title":"Beckhoff","year":"2015","key":"ref63"},{"journal-title":"End to End Learning for Self-Driving Cars","year":"2016","author":"bojarski","key":"ref28"},{"journal-title":"Ek1100","year":"2019","key":"ref64"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.79"},{"journal-title":"El1004","year":"2000","key":"ref65"},{"journal-title":"El2004","year":"2015","key":"ref66"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1177\/0278364914549607"},{"journal-title":"Et2000","year":"2015","key":"ref67"},{"journal-title":"Soem","year":"2015","key":"ref68"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2017.2649104"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"journal-title":"Industrial Network Security Securing Critical Infrastructure Networks for Smart Grid SCADA and Other Industrial Control Systems","year":"2014","author":"knapp","key":"ref1"},{"article-title":"Machine learning for input fuzzing","year":"2018","author":"godefroid","key":"ref20"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"article-title":"Fuzzing: The state of the art","year":"2012","author":"mcnally","key":"ref21"},{"key":"ref24","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1126\/science.1127647","article-title":"Reducing the dimensionality of data with neural networks","volume":"313","author":"hinton","year":"2006","journal-title":"Science"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299173"},{"key":"ref51","first-page":"1135","article-title":"Learning both weights and connections for efficient neural network","author":"han","year":"2015","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref59","first-page":"698","article-title":"Are GANS created equal? a large-scale study","author":"lucic","year":"2018","journal-title":"Proc Adv Neural Inf Process Syst"},{"journal-title":"Progressive growing of GANs for improved quality stability and variation","year":"2017","author":"karras","key":"ref58"},{"key":"ref57","first-page":"6626","article-title":"Gans trained by a two time-scale update rule converge to a local nash equilibrium","author":"heusel","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst"},{"journal-title":"A note on the evaluation of generative models","year":"2015","author":"theis","key":"ref56"},{"key":"ref55","first-page":"213","article-title":"How good is my gan?","author":"shmelkov","year":"2018","journal-title":"Proc Eur Conf Comput Vis (ECCV)"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1145\/3203217.3203241","article-title":"Ganfuzz: A Gan-based industrial network protocol fuzzing framework","author":"hu","year":"2018","journal-title":"Proc 15th ACM Int Conf Comput Frontiers"},{"key":"ref53","first-page":"81","article-title":"Fuzzy depth based routing protocol for underwater acoustic wireless sensor networks","volume":"7","author":"mohammadi","year":"2015","journal-title":"J Telecommun Electron Comput Eng"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176348546"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SBST.2017.11"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/978-0-387-35413-2_16","article-title":"Software security assessment through specification mutations and fault injection","author":"kaksonen","year":"2001","journal-title":"Communications and Multimedia Security Issues of the New Century"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1007\/978-3-319-67558-9_28","article-title":"Generalised dice overlap as a deep learning loss function for highly unbalanced segmentations","author":"sudre","year":"2017","journal-title":"Deep Learning in Medical Image Analysis and Multimodal Learning for Clinical Decision Support"},{"journal-title":"The Advantages of Block-based Protocol Analysis for Security Testing","year":"2002","author":"aitel","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1326304.1326313"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1145\/1379022.1375607","article-title":"Grammar-based whitebox fuzzing","volume":"43","author":"godefroid","year":"2008","journal-title":"ACM SIGPLAN Notices"},{"journal-title":"Not all bytes are equal Neural byte sieve for fuzzing","year":"2017","author":"rajpal","key":"ref15"},{"key":"ref16","first-page":"3104","article-title":"Sequence to sequence learning with neural networks","author":"sutskever","year":"2014","journal-title":"Proc Adv Neural Inf Process Syst"},{"journal-title":"America","year":"0","key":"ref17"},{"journal-title":"Smartseed Smart seed generation for efficient fuzzing","year":"2018","author":"lv","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00026"},{"journal-title":"Wasserstein GAN","year":"2017","author":"arjovsky","key":"ref4"},{"article-title":"Fuzz revisited: A re-examination of the reliability of unix utilities and services","year":"1995","author":"miller","key":"ref3"},{"journal-title":"Lr-gan Layered recursive generative adversarial networks for image generation","year":"2017","author":"yang","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.299"},{"key":"ref8","volume":"29","author":"swales","year":"1999","journal-title":"Open MODBUS\/TCP specification"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.14"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1049\/el:19920877"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2172434"},{"journal-title":"Adam A method for stochastic optimization","year":"2014","author":"kingma","key":"ref46"},{"key":"ref45","first-page":"1139","article-title":"On the importance of initialization and momentum in deep learning","author":"sutskever","year":"2013","journal-title":"Proc Int Conf Mach Learn"},{"journal-title":"Empirical evaluation of rectified activations in convolutional network","year":"2015","author":"xu","key":"ref48"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2657381"},{"key":"ref42","first-page":"3308","article-title":"Veegan: Reducing mode collapse in gans using implicit variational learning","author":"srivastava","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref41","first-page":"580","article-title":"Which neural net architectures give rise to exploding and vanishing gradients?","author":"hanin","year":"2018","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref44","first-page":"265","article-title":"On optimization methods for deep learning","author":"le","year":"2011","journal-title":"Proc Int Conf Int Conf Mach Learn"},{"journal-title":"Unsupervised Representation learning with deep convolutional generative adversarial networks CoRR","year":"2015","author":"radford","key":"ref43"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08691434.pdf?arnumber=8691434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,15]],"date-time":"2024-01-15T21:23:27Z","timestamp":1705353807000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8691434\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":70,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2911121","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2019]]}}}