{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T06:33:15Z","timestamp":1772519595711,"version":"3.50.1"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1109\/tr.2022.3208239","type":"journal-article","created":{"date-parts":[[2022,10,11]],"date-time":"2022-10-11T15:29:37Z","timestamp":1665502177000},"page":"1276-1289","source":"Crossref","is-referenced-by-count":11,"title":["CoCoFuzzing: Testing Neural <u>Co<\/u>de Models With <u>Co<\/u>verage-Guided <u>Fuzzing<\/u>"],"prefix":"10.1109","volume":"72","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1659-1960","authenticated-orcid":false,"given":"Moshi","family":"Wei","sequence":"first","affiliation":[{"name":"York University, Toronto, ON, Canada"}]},{"given":"Yuchao","family":"Huang","sequence":"additional","affiliation":[{"name":"Institute of Software, Chinese Academy of Sciences, Bejing, China"}]},{"given":"Jinqiu","family":"Yang","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9941-6713","authenticated-orcid":false,"given":"Junjie","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Software, Chinese Academy of Sciences, Bejing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0531-5717","authenticated-orcid":false,"given":"Song","family":"Wang","sequence":"additional","affiliation":[{"name":"York University, Toronto, ON, Canada"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"ref15","article-title":"CAGFuzz: Coverage-guided adversarial generative fuzzing testing of deep learning systems","author":"zhang","year":"2019"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330579"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106552"},{"key":"ref52","article-title":"Semantic robustness of models of source code","author":"ramakrishnan","year":"2020"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950334"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS49710.2020.00050"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2962027"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5469"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1316"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3359591.3359735"},{"key":"ref18","article-title":"Adversarial examples for models of code","author":"yefet","year":"2019"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387445"},{"key":"ref50","first-page":"10623","article-title":"Deep gamblers: Learning to abstain with portfolio theory","volume":"32","author":"liu","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICST49551.2021.00016"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00126"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00011"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00058"},{"key":"ref42","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00126"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00021"},{"key":"ref43","article-title":"Adversarial examples in the physical world","author":"kurakin","year":"2016"},{"key":"ref49","first-page":"896","article-title":"Adversarial robustness for code","author":"bielik","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549145"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2022.107001"},{"key":"ref9","first-page":"376","article-title":"Clear: Contrastive learning for API recommendation","author":"wei","year":"0","journal-title":"Proc 4th Int Conf Software Engineering"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3196321.3196334"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.449"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC48747.2019.00076"},{"key":"ref5","first-page":"2091","article-title":"A convolutional attention network for extreme summarization of source code","author":"allamanis","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264835"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3115\/1073083.1073135"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227109"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238172"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180220"},{"key":"ref30","first-page":"4901","article-title":"Tensorfuzz: Debugging neural networks with coverage-guided fuzzing","author":"odena","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref33","first-page":"861","article-title":"Optimizing seed selection for fuzzing","author":"rebert","year":"0","journal-title":"Proc 23rd USENIX Secur Symp"},{"key":"ref32","article-title":"Libfuzzer: A library for coverage-guided fuzz testing (within LLVM)","author":"serebryany","year":"0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3290353"},{"key":"ref1","article-title":"code2seq: Generating sequences from structured representations of code","author":"alon","year":"2018"},{"key":"ref39","article-title":"GraphCodeBERT: Pre-training code representations with data flow","author":"guo","year":"2020","journal-title":"arXiv 2009 08366"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D15-1166"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00097"},{"key":"ref26","first-page":"7354","article-title":"Self-attention generative adversarial networks","author":"zhang","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/604"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3296979.3192412"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11963"},{"key":"ref28","article-title":"American fuzzy lop","author":"zalewski","year":"2014"},{"key":"ref27","first-page":"5998","article-title":"Attention is all you need","author":"vaswani","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref29","article-title":"Announcing OSS-Fuzz: Continuous fuzzing for open source software","author":"aizatsky","year":"0","journal-title":"Google Testing Blog"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/10236915\/09916170.pdf?arnumber=9916170","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T17:36:59Z","timestamp":1760636219000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9916170\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":54,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tr.2022.3208239","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9]]}}}