{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T13:09:36Z","timestamp":1768309776019,"version":"3.49.0"},"reference-count":73,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1109\/tse.2025.3619966","type":"journal-article","created":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T17:36:49Z","timestamp":1760117809000},"page":"360-375","source":"Crossref","is-referenced-by-count":0,"title":["MirrorFuzz: Leveraging LLM and Shared Bugs for Deep Learning Framework APIs Fuzzing"],"prefix":"10.1109","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4561-5869","authenticated-orcid":false,"given":"Shiwen","family":"Ou","sequence":"first","affiliation":[{"name":"College of Electronic Engineering, National University of Defense Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8878-510X","authenticated-orcid":false,"given":"Yuwei","family":"Li","sequence":"additional","affiliation":[{"name":"College of Electronic Engineering, National University of Defense Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8524-0139","authenticated-orcid":false,"given":"Lu","family":"Yu","sequence":"additional","affiliation":[{"name":"College of Electronic Engineering, National University of Defense Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8849-8808","authenticated-orcid":false,"given":"Chengkun","family":"Wei","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3875-9915","authenticated-orcid":false,"given":"Tingke","family":"Wen","sequence":"additional","affiliation":[{"name":"College of Electronic Engineering, National University of Defense Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7884-7998","authenticated-orcid":false,"given":"Qiangpu","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Electronic Engineering, National University of Defense Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0601-4879","authenticated-orcid":false,"given":"Yu","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Electronic Engineering, National University of Defense Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-1802-3290","authenticated-orcid":false,"given":"Haizhi","family":"Tang","sequence":"additional","affiliation":[{"name":"College of Electronic Engineering, National University of Defense Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5775-5824","authenticated-orcid":false,"given":"Zulie","family":"Pan","sequence":"additional","affiliation":[{"name":"College of Electronic Engineering, National University of Defense Technology, Hefei, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2020.103627"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-023-01925-4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642773"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3627217.3627233"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3604237.3626869"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21918"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3650212.3680364"},{"key":"ref8","first-page":"2383","article-title":"{IvySyn}: \u201cAutomated vulnerability discovery in deep learning frameworks","volume-title":"Proc. 32nd USENIX Secur. Symp. (USENIX Secur.)","author":"Christou","year":"2023"},{"key":"ref9","first-page":"7393","article-title":"Differential testing of cross deep learning framework {APIs}: Revealing inconsistencies and vulnerabilities","volume-title":"Proc. 32nd USENIX Secur. Symp. (USENIX Secur.)","author":"Deng","year":"2023"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00024"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-023-10389-6"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/sp61157.2025.00012"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5555\/3454287.3455008"},{"key":"ref14","first-page":"265","article-title":"{TensorFlow}: A system for {\u201cLarge-Scale,\u201d} \u201cmachine learning","volume-title":"Proc. 12th USENIX Symp. Operat. Syst. Design Implementation (OSDI)","author":"Abadi","year":"2016"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380395"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338955"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3587155"},{"key":"ref18","article-title":"A survey of deep learning library testing methods","author":"Zhang","year":"2024"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00107"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409761"},{"key":"ref21","first-page":"486","article-title":"Audee: Automated testing for deep learning frameworks","volume-title":"Proc. 35th IEEE\/ACM Int. Conf. Automat. Softw. Eng.","author":"Guo","year":"2020"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510092"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3628159"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510041"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549085"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534220"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510165"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00105"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598088"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598067"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3623343"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3688838"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3650212.3680383"},{"key":"ref34","article-title":"Fuzzing BusyBox: Leveraging LLM and crash reuse for embedded bug unearthing","author":"Oliinyk","year":"2024"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/icse55347.2025.00132"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859089"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560664"},{"key":"ref38","article-title":"OneFlow"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-020-3097-4"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2024.3509975"},{"key":"ref41","article-title":"The GitHub repository of MirrorFuzz"},{"key":"ref42","article-title":"Ivy: Templated deep learning for inter-framework portability","author":"Lenton","year":"2021"},{"key":"ref43","article-title":"Candle"},{"key":"ref44","article-title":"Flax: A neural network library and ecosystem for JAX","author":"Heek","year":"2024"},{"key":"ref45","article-title":"Code Llama: Open foundation models for code","author":"Roziere","year":"2023"},{"key":"ref46","article-title":"CodeGemma: Open code models based on Gemma","author":"Team","year":"2024"},{"key":"ref47","article-title":"Qwen2. 5-coder technical report","author":"Hui","year":"2024"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref49","article-title":"Open neural network exchange"},{"key":"ref50","article-title":"PyTorch vulnerability statistics"},{"key":"ref51","article-title":"GitHub issue of PyTorch"},{"key":"ref52","article-title":"GitHub rest API for issue"},{"key":"ref53","article-title":"Google Colab"},{"key":"ref54","article-title":"Tree-sitter: An incremental parsing system for programming tools"},{"key":"ref55","first-page":"24824","article-title":"Chain-of-thought prompting elicits reasoning in large language models","volume":"35","author":"Wei","year":"2022","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref56","article-title":"Levenshtein distance"},{"key":"ref57","article-title":"Term frequency\u2013inverse document frequency,"},{"key":"ref58","article-title":"Cosine similarity"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2018917395"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-acl.137"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3341174"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3703155"},{"key":"ref63","article-title":"BS4"},{"key":"ref64","article-title":"Requests"},{"key":"ref65","article-title":"Hugging face"},{"key":"ref66","article-title":"Coverage.py"},{"key":"ref67","first-page":"309","article-title":"{AddressSanitizer}: \u201cA fast address sanity checker","volume-title":"Proc. USENIX Annu. Technical Conf. (USENIX ATC)","author":"Serebryany","year":"2012"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549123"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3575693.3575707"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616337"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2021.3107165"},{"key":"ref72","article-title":"Keras","year":"2015"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2024.3461657"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/32\/11346545\/11201027.pdf?arnumber=11201027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T08:11:25Z","timestamp":1768291885000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11201027\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":73,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tse.2025.3619966","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]}}}