{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T16:14:21Z","timestamp":1769098461908,"version":"3.49.0"},"reference-count":76,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62227805"],"award-info":[{"award-number":["62227805"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072398"],"award-info":[{"award-number":["62072398"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key R&#x0026;D Program of China","doi-asserted-by":"publisher","award":["2020AAA0107700"],"award-info":[{"award-number":["2020AAA0107700"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"SUTD-ZJU IDEA Grant for Visiting Professors","award":["SUTD-ZJUVP201901"],"award-info":[{"award-number":["SUTD-ZJUVP201901"]}]},{"name":"Alibaba-Zhejiang University Joint Institute of Frontier Technologies"},{"name":"National Key Laboratory of Science and Technology on Information System Security","award":["6142111210301"],"award-info":[{"award-number":["6142111210301"]}]},{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing"},{"name":"Key Laboratory of Cyberspace Situation Awareness of Henan Province","award":["HNTS2022001"],"award-info":[{"award-number":["HNTS2022001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1109\/tse.2023.3309330","type":"journal-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T17:59:55Z","timestamp":1698083995000},"page":"4829-4845","source":"Crossref","is-referenced-by-count":1,"title":["Constructing Cyber-Physical System Testing Suites Using Active Sensor Fuzzing"],"prefix":"10.1109","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6087-8243","authenticated-orcid":false,"given":"Fan","family":"Zhang","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2596-2221","authenticated-orcid":false,"given":"Qianmei","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4364-049X","authenticated-orcid":false,"given":"Bohan","family":"Xuan","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"given":"Yuqi","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, ShanghaiTech University, Shanghai, China"}]},{"given":"Wei","family":"Lin","sequence":"additional","affiliation":[{"name":"Information Systems Technology and Design Pillar, Singapore University of Technology and Design, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9376-2471","authenticated-orcid":false,"given":"Christopher M.","family":"Poskitt","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, Singapore Management University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3545-1392","authenticated-orcid":false,"given":"Jun","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, Singapore Management University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9584-0082","authenticated-orcid":false,"given":"Binbin","family":"Chen","sequence":"additional","affiliation":[{"name":"Information Systems Technology and Design Pillar, Singapore University of Technology and Design, Singapore"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Cyber-physical systems (CPS)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837461"},{"key":"ref3","article-title":"Water treatment plant hacked, chemical mix changed for tap supplies","volume-title":"Register","volume":"24","author":"Leyden","year":"2016"},{"key":"ref4","article-title":"Cyber-attack against Ukrainian critical infrastructure","year":"2016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134640"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IWESEP.2017.12"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.149"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6160641"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264893"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243781"},{"key":"ref11","article-title":"Detecting zero-day controller hijacking attacks on the power-grid with enhanced deep learning","author":"He","year":"2018"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264896"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196546"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264894"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264890"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196532"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274748"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3761722"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243751"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966959"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33630-5_7"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897855"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48989-6_10"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2875008"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00016"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243752"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3203245"},{"key":"ref28","article-title":"iTrust Labs: Datasets","year":"2019"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71368-7_8"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2018.2878597"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397376"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19835-9_21"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14295-6_17"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.06.038"},{"key":"ref35","volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"Goldberg","year":"1989"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/978-94-015-7744-1_2","article-title":"Simulated annealing","volume-title":"Simulated Annealing: Theory and Applications","author":"Laarhoven","year":"1987"},{"key":"ref37","article-title":"Secure Water Treatment (SWaT)","year":"2019"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00093"},{"key":"ref39","volume-title":"Fuzzing for Software Security Testing and Quality Assurance","author":"Takanen","year":"2018"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.50"},{"key":"ref41","article-title":"American fuzzy lop","author":"Zalewski"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2994487.2994492"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.36"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23265"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1162\/089976600300015015"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref47","first-page":"155","article-title":"Support vector regression machines","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NIPS)","author":"Drucker"},{"key":"ref48","article-title":"Keras.","author":"Chollet"},{"key":"ref49","first-page":"108","article-title":"API design for machine learning software: Experiences from the scikit-learn project","volume-title":"Proc. ECML PKDD Workshop, Lang. Data Mining Mach. Learn.","author":"Buitinck","year":"2013"},{"key":"ref50","article-title":"pycomm","author":"Ruscito"},{"key":"ref51","article-title":"Supplementary material"},{"key":"ref52","first-page":"5105","article-title":"Feature importance ranking for deep learning","volume":"33","author":"Wojtas","year":"2020","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btq134"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2017.91"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00027"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2017.29"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2291004"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-51738-4_4"},{"key":"ref61","first-page":"1","article-title":"DeepFuzzSL: Generating models with deep learning to find bugs in the simulink toolchain","volume-title":"Proc. 2nd Workshop Testing Deep Learn. Deep Learn. Testing (DeepTest)","author":"Shrestha"},{"key":"ref62","first-page":"445","article-title":"Fuzzing with code fragments","volume-title":"Proc. 21st USENIX Secur. Symp. (USENIX Secur.)","author":"Holler"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115618"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030088"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2897035.2897041"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274745"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23043"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991126"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_30"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95582-7_5"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38574-2_14"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31424-7_34"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.12"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2723871"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48989-6_28"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-015-0367-0"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/10320136\/10292692.pdf?arnumber=10292692","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T10:35:14Z","timestamp":1709375714000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10292692\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11]]},"references-count":76,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tse.2023.3309330","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11]]}}}