{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:25:39Z","timestamp":1775067939581,"version":"3.50.1"},"reference-count":72,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2023.3347652","type":"journal-article","created":{"date-parts":[[2023,12,26]],"date-time":"2023-12-26T19:30:14Z","timestamp":1703619014000},"page":"14437-14454","source":"Crossref","is-referenced-by-count":11,"title":["Machine Learning-Based Fuzz Testing Techniques: A Survey"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-8518-9010","authenticated-orcid":false,"given":"Ao","family":"Zhang","sequence":"first","affiliation":[{"name":"College of Artificial Intelligence, Tianjin University of Science and Technology, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2131-1257","authenticated-orcid":false,"given":"Yiying","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Artificial Intelligence, Tianjin University of Science and Technology, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9112-6865","authenticated-orcid":false,"given":"Yao","family":"Xu","sequence":"additional","affiliation":[{"name":"College of Artificial Intelligence, Tianjin University of Science and Technology, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1115-8607","authenticated-orcid":false,"given":"Cong","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Artificial Intelligence, Tianjin University of Science and Technology, Tianjin, China"}]},{"given":"Siwei","family":"Li","sequence":"additional","affiliation":[{"name":"State Grid Information and Telecommunication Company Ltd., Beijing, China"}]}],"member":"263","reference":[{"issue":"7","key":"ref1","first-page":"630","article-title":"Automated vulnerability mining and attack detection","volume":"8","author":"Wen","year":"2022","journal-title":"J. Inf. Secur. Res."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/978-0-387-35413-2_16","volume-title":"Communications and Multimedia Security Issues of the New Century","volume":"64","author":"Kaksonen","year":"2001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2090147.2094081"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2022.3192991"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105598"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"issue":"5","key":"ref8","first-page":"944","article-title":"A review of fuzzing techniques","volume":"58","author":"Ren","year":"2021","journal-title":"J. Comput. Res. Develop."},{"key":"ref9","author":"Zalewski","year":"2017","journal-title":"American Fuzzy Lop"},{"issue":"4","key":"ref10","first-page":"500","article-title":"Fuzzing method based on path risk fitness","volume":"55","author":"Zhou","year":"2022","journal-title":"Commun. Technol."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354249"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.50"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"issue":"6","key":"ref14","first-page":"1978","article-title":"TaintPoint: Fuzzing taint flow efficiently with live trace","volume":"33","author":"Fang","year":"2022","journal-title":"J. Softw."},{"issue":"6","key":"ref15","first-page":"1046","article-title":"Overview of parallel fuzzing","volume":"44","author":"Gu","year":"2022","journal-title":"Comput. Eng. Sci."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00063"},{"issue":"4","key":"ref17","first-page":"55","article-title":"SiCsFuzzer: A sparse-instrumentation-based fuzzing platform for closed source software","volume":"7","author":"Liu","year":"2022","journal-title":"J. Cyber Secur."},{"issue":"2","key":"ref18","first-page":"132","article-title":"High-performance directional fuzzing scheme based on deep reinforcement learning","volume":"9","author":"Xiao","year":"2023","journal-title":"Chin. J. Netw. Inf. Secur."},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2022.05.001"},{"issue":"4","key":"ref20","first-page":"988","article-title":"Deep learning-based hybrid fuzz testing","volume":"32","author":"Gao","year":"2021","journal-title":"J. Softw."},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180177"},{"key":"ref22","first-page":"745","article-title":"QSYM: A practical concolic execution engine tailored for hybrid fuzzing","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Yun"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102242"},{"issue":"8","key":"ref24","first-page":"30","article-title":"Optimizing seed selection in fuzzing based on deep learning","volume":"28","author":"Xiao","year":"2022","journal-title":"Mod. Comput."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2903291"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/tcyb.2020.3013675"},{"issue":"3","key":"ref27","first-page":"680","article-title":"Fuzzy test method for industrial control protocol combining genetic algorithm","volume":"38","author":"Zhang","year":"2021","journal-title":"Appl. Res. Comput."},{"key":"ref28","article-title":"Research and implementation of web vulnerability detecting based on fuzzing test","author":"Zhou","year":"2020"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCECE54139.2022.9712748"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23159"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118162"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00043"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00026"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/AEMCSE51986.2021.00238"},{"key":"ref35","article-title":"Research on fuzz testing technology based on DDPG reinforcement learning algorithm","author":"Zhang","year":"2021"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115618"},{"issue":"2","key":"ref37","first-page":"160","article-title":"Research on efficient fuzzing technology based on deep learning","volume":"14","author":"Liu","year":"2021","journal-title":"Highlights Sciencepaper"},{"issue":"6","key":"ref38","first-page":"1","article-title":"Optimization of fuzzing seed input based on machine learning","volume":"30","author":"Wang","year":"2021","journal-title":"Comput. Syst. Appl."},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3203217.3203241"},{"issue":"10","key":"ref40","first-page":"310","article-title":"PGNFuzz: Pointer generation network based fuzzing framework for industry control protocols","volume":"49","author":"Wang","year":"2022","journal-title":"Comput. Sci."},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/icst.2019.00016"},{"key":"ref42","article-title":"Research on fuzzy testing technology based on deep learning","author":"Liu","year":"2021"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011044"},{"issue":"6","key":"ref44","first-page":"1996","article-title":"Compiler fuzzing test case generation with feed-forward neural network","volume":"33","author":"Xu","year":"2022","journal-title":"J. Softw."},{"key":"ref45","first-page":"2613","article-title":"Montage: A neural network language model-guided JavaScript engine fuzzer","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Lee"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454054"},{"key":"ref47","article-title":"A review of machine learning applications in fuzzing","author":"Saavedra","year":"2019","journal-title":"arXiv:1906.11133"},{"key":"ref48","article-title":"Not all bytes are equal: Neural byte sieve for fuzzing","author":"Rajpal","year":"2017","journal-title":"arXiv:1711.04596"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-021-1663-7"},{"issue":"18","key":"ref50","first-page":"147","article-title":"Directed greybox fuzzing technology based on LSTM and dynamic strategy","volume":"58","author":"Li","year":"2022","journal-title":"Comput. Eng. Appl."},{"issue":"10","key":"ref51","first-page":"149","article-title":"Research on fuzzy testing technology of Modbus TCP protocol based on genetic algorithm","volume":"40","author":"Xiang","year":"2020","journal-title":"Ship Electron. Eng."},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2078\/1\/012015"},{"issue":"2","key":"ref53","first-page":"217","article-title":"Fuzzing testing sample set optimization scheme based on heuristic genetic algorithm","volume":"48","author":"Wang","year":"2022","journal-title":"J. Beijing Univ. Aeronaut. Astronaut."},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103197"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.06.082"},{"issue":"5","key":"ref56","first-page":"318","article-title":"Testcase filtering method based on QRNN for network protocol","volume":"49","author":"Hu","year":"2022","journal-title":"Comput. Sci."},{"key":"ref57","article-title":"Improving grey-box fuzzing by modeling program behavior","author":"Karamcheti","year":"2018","journal-title":"arXiv:1811.08973"},{"key":"ref58","first-page":"2255","article-title":"FuzzGuard: Filtering out unreachable inputs in directed greybox fuzzingthrough deep learning","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Zong"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CONFLUENCE.2017.7943132"},{"issue":"3","key":"ref60","first-page":"90","article-title":"SmartSeed: Smart seed generation strategy for fuzzing testing","volume":"12","author":"Lv","year":"2021","journal-title":"J. Eng. Heilongjiang Univ."},{"key":"ref61","volume-title":"Honggfuzz","year":"2016"},{"key":"ref62","volume-title":"ClusterFuzz","year":"2020"},{"key":"ref63","article-title":"Research on efficient fuzzing technology based on deep learning and parallelization","author":"Tang","year":"2022"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102694"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/DSC53577.2021.00059"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.10.079"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510092"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.18293\/SEKE2022-126"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC48623.2020.9084765"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.15"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2941681"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICETCI55101.2022.9832143"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10374347.pdf?arnumber=10374347","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T23:41:58Z","timestamp":1706830918000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10374347\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":72,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3347652","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}