{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:19:43Z","timestamp":1773839983051,"version":"3.50.1"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61932012"],"award-info":[{"award-number":["61932012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802171"],"award-info":[{"award-number":["61802171"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/tr.2021.3107165","type":"journal-article","created":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T20:42:11Z","timestamp":1631565731000},"page":"1671-1685","source":"Crossref","is-referenced-by-count":40,"title":["Duo: Differential Fuzzing for Deep Learning Operators"],"prefix":"10.1109","volume":"70","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7284-1931","authenticated-orcid":false,"given":"Xufan","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4930-9637","authenticated-orcid":false,"given":"Jiawei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9930-7111","authenticated-orcid":false,"given":"Chunrong","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jiang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Chai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9592-7022","authenticated-orcid":false,"given":"Zhenyu","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Genetic algorithm in code coverage guided fuzz testing","author":"j\u00e4\u00e4skel\u00e4","year":"2016"},{"key":"ref38","first-page":"127","article-title":"Analysis of mutation and generation-based fuzzing","volume":"56","author":"miller","year":"2007","journal-title":"Independent Security Evaluators"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908095"},{"key":"ref32","first-page":"100","article-title":"Differential testing for software","volume":"10","author":"mckeeman","year":"1998","journal-title":"Digit Tech J"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00080"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264835"},{"key":"ref37","article-title":"American fuzzy lop fuzzer","author":"zalewski","year":"0"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/2093548.2093564","article-title":"Whitebox fuzzing for security testing","volume":"55","author":"godefroid","year":"2012","journal-title":"Commun ACM"},{"key":"ref35","article-title":"Evmfuzz: Differential fuzz testing of ethereum virtual machine","author":"fu","year":"2019"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2018.8585565"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2693418"},{"key":"ref27","first-page":"1061","article-title":"Hamming distance metric learning","author":"norouzi","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330579"},{"key":"ref2","first-page":"656","article-title":"Convolutional-recursive deep learning for 3d object classification","volume":"25","author":"socher","year":"2012","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21918"},{"key":"ref20","first-page":"265","article-title":"Tensorflow: A. system for large-scale machine learning","author":"abadi","year":"0","journal-title":"Proc 12th USENIX Symp Operating Syst Des Implementation"},{"key":"ref22","first-page":"1","article-title":"Mnn: A universal and efficient inference engine","volume":"2","author":"jiang","year":"0","journal-title":"Proc Machine Learning and Systems"},{"key":"ref21","first-page":"8026","article-title":"Pytorch: An imperative style, high-performance deep learning library","author":"paszke","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-017-1166-8"},{"key":"ref23","article-title":"Mxnet: A flexible and efficient machine learning library for heterogeneous distributed systems","author":"chen","year":"2016","journal-title":"NeurIPS Workshop on Machine Learning Systems (LearningSys)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11740-9_34"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MET.2017.2"},{"key":"ref51","article-title":"Fdfuzz: Applying feature detection to fuzz deep learning systems","volume":"15","author":"wang","year":"2019","journal-title":"Int J Performability Eng"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464843"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409761"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338955"},{"key":"ref10","article-title":"Correctness verification of neural networks","author":"yang","year":"0","journal-title":"Proceedings of NeurIPS Workshop on Machine Learning with Guarantees"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3190619.3190637"},{"key":"ref40","article-title":"Deepsmartfuzzer: Reward guided test generation for deep learning","volume":"2640","author":"demir","year":"0","journal-title":"Proceedings of the workshop on Artificial Intelligence Safety 2020 co-located with the 29th International Joint Conference on Artificial Intelligence and the 17th Pacific Rim International Conference on Artificial Intelligence (IJCAI-PRICAJ)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238165"},{"key":"ref13","first-page":"2096","article-title":"Domain-adversarial training of neural networks","volume":"17","author":"ganin","year":"2016","journal-title":"J Mach Learn Res"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213866"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/AITEST49225.2020.00015"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00107"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59410-7_40"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00078"},{"key":"ref19","article-title":"Iso\/iec\/ieee 60559: 2011(e) information technology&#x2013;microprocessor systems&#x2013;floating-point arithmetic","year":"2011","journal-title":"Standard"},{"key":"ref4","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref3","first-page":"173","article-title":"Deep speech 2: End-to-end speech recognition in english and mandarin","author":"amodei","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref5","first-page":"1","article-title":"Interpretability of deep learning nodels: A. survey of results","author":"chakraborty","year":"0","journal-title":"Proc IEEE SmartWorld Ubiquitous Intell Comput Adv Trusted Computed Scalable Comput Commun Cloud Big Data Comput Internet People Smart City Innov"},{"key":"ref8","first-page":"1","article-title":"Automated whitebox testing of deep learning systems","author":"pei","year":"0","journal-title":"Proc 26th Symp Operating Syst Princ"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/368"},{"key":"ref49","article-title":"Metamorphic testing: A new approach for generating next test cases","author":"chen","year":"1998"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkg509"},{"key":"ref45","article-title":"Libfuzzer-a library for coverage-guided fuzz testing","author":"serebryany","year":"2015"},{"key":"ref48","article-title":"Fast gradient attack on network embedding","author":"chen","year":"2018"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594302"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1137\/07070111X"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00016"},{"key":"ref44","article-title":"American fuzzy lop (AFL)","author":"zalewski","year":"2017"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1236(87)90068-1"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/9629389\/09536229.pdf?arnumber=9536229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T22:10:22Z","timestamp":1643667022000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9536229\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":54,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tr.2021.3107165","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]}}}