{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T22:58:57Z","timestamp":1772837937692,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":79,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T00:00:00Z","timestamp":1604793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,8]]},"DOI":"10.1145\/3368089.3409723","type":"proceedings-article","created":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T00:43:06Z","timestamp":1607647386000},"page":"737-749","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["MTFuzz: fuzzing with a multi-task neural network"],"prefix":"10.1145","author":[{"given":"Dongdong","family":"She","sequence":"first","affiliation":[{"name":"Columbia University, USA"}]},{"given":"Rahul","family":"Krishna","sequence":"additional","affiliation":[{"name":"Columbia University, USA"}]},{"given":"Lu","family":"Yan","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"given":"Suman","family":"Jana","sequence":"additional","affiliation":[{"name":"Columbia University, USA"}]},{"given":"Baishakhi","family":"Ray","sequence":"additional","affiliation":[{"name":"Columbia University, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,8]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2020. Address Sanitizer Thread Sanitizer and Memory Sanitizer. https:\/\/github. com\/google\/sanitizers.  2020. Address Sanitizer Thread Sanitizer and Memory Sanitizer. https:\/\/github. com\/google\/sanitizers."},{"key":"e_1_3_2_2_2_1","unstructured":"2020. UndefinedBehaviorSanitizer. https:\/\/clang.llvm.org\/docs\/ UndefinedBehaviorSanitizer.html.  2020. UndefinedBehaviorSanitizer. https:\/\/clang.llvm.org\/docs\/ UndefinedBehaviorSanitizer.html."},{"key":"e_1_3_2_2_3_1","unstructured":"2020. xmlwf xml parser. https:\/\/libexpat.github.io\/.  2020. xmlwf xml parser. https:\/\/libexpat.github.io\/."},{"key":"e_1_3_2_2_4_1","volume-title":"12th USENIX Symp. on Operating Systems Design and Implementation (OSDI). 265-283","author":"Abadi Mart\u00edn","year":"2016","unstructured":"Mart\u00edn Abadi , Paul Barham , Jianmin Chen , Zhifeng Chen , Andy Davis , Jefrey Dean , Matthieu Devin , Sanjay Ghemawat , Geofrey Irving , Michael Isard , 2016 . Tensorflow: A system for large-scale machine learning . In 12th USENIX Symp. on Operating Systems Design and Implementation (OSDI). 265-283 . Mart\u00edn Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jefrey Dean, Matthieu Devin, Sanjay Ghemawat, Geofrey Irving, Michael Isard, et al. 2016. Tensorflow: A system for large-scale machine learning. In 12th USENIX Symp. on Operating Systems Design and Implementation (OSDI). 265-283."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.17"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Andreas Argyriou Theodoros Evgeniou and Massimiliano Pontil. 2008. Convex multi-task feature learning. Machine learning 73 3 ( 2008 ) 243-272.  Andreas Argyriou Theodoros Evgeniou and Massimiliano Pontil. 2008. Convex multi-task feature learning. Machine learning 73 3 ( 2008 ) 243-272.","DOI":"10.1007\/s10994-007-5040-8"},{"key":"e_1_3_2_2_7_1","volume-title":"Fuzzing for security. 1 ( 2012 )","author":"Arya Abhishek","year":"2013","unstructured":"Abhishek Arya and Cris Neckar . 2012. Fuzzing for security. 1 ( 2012 ) , 2013 . https:\/\/blog.chromium.org\/ 2012 \/04\/fuzzing-for-security.html Abhishek Arya and Cris Neckar. 2012. Fuzzing for security. 1 ( 2012 ), 2013. https:\/\/blog.chromium.org\/ 2012 \/04\/fuzzing-for-security.html"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23371"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140587.3062349"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"Jonathan Baxter. 1997. A Bayesian\/information theoretic model of learning to learn via multiple task sampling. Machine learning 28 1 ( 1997 ) 7-39.  Jonathan Baxter. 1997. A Bayesian\/information theoretic model of learning to learn via multiple task sampling. Machine learning 28 1 ( 1997 ) 7-39.","DOI":"10.1023\/A:1007327622663"},{"key":"e_1_3_2_2_11_1","volume-title":"Representation learning: A review and new perspectives","author":"Bengio Yoshua","year":"2013","unstructured":"Yoshua Bengio , Aaron Courville , and Pascal Vincent . 2013. Representation learning: A review and new perspectives . IEEE transactions on pattern analysis and machine intelligence 35, 8 ( 2013 ), 1798-1828. Yoshua Bengio, Aaron Courville, and Pascal Vincent. 2013. Representation learning: A review and new perspectives. IEEE transactions on pattern analysis and machine intelligence 35, 8 ( 2013 ), 1798-1828."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/e17-2026"},{"key":"e_1_3_2_2_13_1","first-page":"1985","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Blazytko Tim","year":"2019","unstructured":"Tim Blazytko , Cornelius Aschermann , Moritz Schl\u00f6gel , Ali Abbasi , Sergej Schumilo , Simon W\u00f6rner , and Thorsten Holz . 2019 . GRIMOIRE: Synthesizing Structure while Fuzzing . In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA , 1985 - 2002 . https:\/\/www.usenix.org\/conference\/ usenixsecurity19\/presentation\/blazytko Tim Blazytko, Cornelius Aschermann, Moritz Schl\u00f6gel, Ali Abbasi, Sergej Schumilo, Simon W\u00f6rner, and Thorsten Holz. 2019. GRIMOIRE: Synthesizing Structure while Fuzzing. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 1985-2002. https:\/\/www.usenix.org\/conference\/ usenixsecurity19\/presentation\/blazytko"},{"key":"e_1_3_2_2_14_1","article-title":"Coveragebased greybox fuzzing as markov chain","volume":"45","author":"B\u00f6hme Marcel","year":"2017","unstructured":"Marcel B\u00f6hme , Van-Thuan Pham , and Abhik Roychoudhury . 2017 . Coveragebased greybox fuzzing as markov chain . IEEE Transactions on Software Engineering 45 , 5 ( 2017 ), 489-506. Marcel B\u00f6hme, Van-Thuan Pham, and Abhik Roychoudhury. 2017. Coveragebased greybox fuzzing as markov chain. IEEE Transactions on Software Engineering 45, 5 ( 2017 ), 489-506.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00026"},{"key":"e_1_3_2_2_16_1","first-page":"209","volume-title":"USENIX Symp. on Operating Systems Design and Implementation (OSDI)","volume":"8","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , Dawson R Engler , 2008 . KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs .. In USENIX Symp. on Operating Systems Design and Implementation (OSDI) , Vol. 8 . 209 - 224 . Cristian Cadar, Daniel Dunbar, Dawson R Engler, et al. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs.. In USENIX Symp. on Operating Systems Design and Implementation (OSDI), Vol. 8. 209-224."},{"key":"e_1_3_2_2_17_1","first-page":"87","article-title":"Algorithms and applications for multitask learning","author":"Caruana Rich","year":"1996","unstructured":"Rich Caruana . 1996 . Algorithms and applications for multitask learning . In Icml. 87 - 95 . Rich Caruana. 1996. Algorithms and applications for multitask learning. In Icml. 87-95.","journal-title":"Icml."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Rich Caruana. 1997. Multitask learning. Machine learning 28 1 ( 1997 ) 41-75.  Rich Caruana. 1997. Multitask learning. Machine learning 28 1 ( 1997 ) 41-75.","DOI":"10.1023\/A:1007379606734"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.50"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_2_21_1","volume-title":"Infogan: Interpretable representation learning by information maximizing generative adversarial nets. In Advances in neural information processing systems. 2172-2180.","author":"Chen Xi","year":"2016","unstructured":"Xi Chen , Yan Duan , Rein Houthooft , John Schulman , Ilya Sutskever , and Pieter Abbeel . 2016 . Infogan: Interpretable representation learning by information maximizing generative adversarial nets. In Advances in neural information processing systems. 2172-2180. Xi Chen, Yan Duan, Rein Houthooft, John Schulman, Ilya Sutskever, and Pieter Abbeel. 2016. Infogan: Interpretable representation learning by information maximizing generative adversarial nets. In Advances in neural information processing systems. 2172-2180."},{"key":"e_1_3_2_2_22_1","unstructured":"Fran\u00e7ois Chollet et al. 2015. Keras. https:\/\/keras.io.  Fran\u00e7ois Chollet et al. 2015. Keras. https:\/\/keras.io."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390177"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281218"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1619645.1619732"},{"key":"e_1_3_2_2_26_1","unstructured":"Darpa. 2016. Cyber Grand Challenge. http:\/\/archive.darpa.mil\/ cybergrandchallenge\/.  Darpa. 2016. Cyber Grand Challenge. http:\/\/archive.darpa.mil\/ cybergrandchallenge\/."},{"key":"e_1_3_2_2_27_1","volume-title":"LAVA: Large-Scale Automated Vulnerability Addition. In 2016 IEEE Symposium on Security and Privacy (SP).","author":"Dolan-Gavitt B.","unstructured":"B. Dolan-Gavitt , P. Hulin , E. Kirda , T. Leek , A. Mambretti , W. Robertson , F. Ulrich , and R. Whelan . 2016 . LAVA: Large-Scale Automated Vulnerability Addition. In 2016 IEEE Symposium on Security and Privacy (SP). B. Dolan-Gavitt, P. Hulin, E. Kirda, T. Leek, A. Mambretti, W. Robertson, F. Ulrich, and R. Whelan. 2016. LAVA: Large-Scale Automated Vulnerability Addition. In 2016 IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_2_28_1","unstructured":"Chris Evans Matt Moore and Tavis Ormandy. 2011. Fuzzing at scale. Google Online Security Blog ( 2011 ).  Chris Evans Matt Moore and Tavis Ormandy. 2011. Fuzzing at scale. Google Online Security Blog ( 2011 )."},{"key":"e_1_3_2_2_29_1","volume-title":"2016 IEEE International Conference on Robotics and Automation (ICRA) ( 2015 ), 512-519","author":"Finn Chelsea","year":"2015","unstructured":"Chelsea Finn , Xin Yu Tan , Yan Duan , Trevor Darrell , Sergey Levine , and Pieter Abbeel . 2015 . Deep spatial autoencoders for visuomotor learning . 2016 IEEE International Conference on Robotics and Automation (ICRA) ( 2015 ), 512-519 . Chelsea Finn, Xin Yu Tan, Yan Duan, Trevor Darrell, Sergey Levine, and Pieter Abbeel. 2015. Deep spatial autoencoders for visuomotor learning. 2016 IEEE International Conference on Robotics and Automation (ICRA) ( 2015 ), 512-519."},{"key":"e_1_3_2_2_30_1","volume-title":"GREYONE: Data Flow Sensitive Fuzzing. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Gan Shuitao","year":"2020","unstructured":"Shuitao Gan , Chao Zhang , Peng Chen , Bodong Zhao , Xiaojun Qin , Dong Wu , and Zuoning Chen . 2020 . GREYONE: Data Flow Sensitive Fuzzing. In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, Boston, MA. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/gan Shuitao Gan, Chao Zhang, Peng Chen, Bodong Zhao, Xiaojun Qin, Dong Wu, and Zuoning Chen. 2020. GREYONE: Data Flow Sensitive Fuzzing. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, Boston, MA. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/gan"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375607"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_2_33_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium 8 ( 2008 ), 151-166","author":"Godefroid Patrice","year":"2008","unstructured":"Patrice Godefroid , Michael Y Levin , and David A Molnar . 2008 . Automated Whitebox Fuzz Testing . In Proceedings of the Network and Distributed System Security Symposium 8 ( 2008 ), 151-166 . Patrice Godefroid, Michael Y Levin, and David A Molnar. 2008. Automated Whitebox Fuzz Testing. In Proceedings of the Network and Distributed System Security Symposium 8 ( 2008 ), 151-166."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155573"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623641"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04180-8_52"},{"key":"e_1_3_2_2_37_1","unstructured":"S Hocevar. 2011. zzuf-multi-purpose fuzzer.  S Hocevar. 2011. zzuf-multi-purpose fuzzer."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970321"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.579"},{"key":"e_1_3_2_2_41_1","unstructured":"Tejas D Kulkarni William F Whitney Pushmeet Kohli and Josh Tenenbaum. 2015. Deep convolutional inverse graphics network. In Advances in neural information processing systems. 2539-2547.  Tejas D Kulkarni William F Whitney Pushmeet Kohli and Josh Tenenbaum. 2015. Deep convolutional inverse graphics network. In Advances in neural information processing systems. 2539-2547."},{"key":"e_1_3_2_2_42_1","unstructured":"Abhishek Kumar Prasanna Sattigeri and Avinash Balakrishnan. 2017. Variational inference of disentangled latent concepts from unlabeled observations. arXiv preprint arXiv:1711.00848 ( 2017 ).  Abhishek Kumar Prasanna Sattigeri and Avinash Balakrishnan. 2017. Variational inference of disentangled latent concepts from unlabeled observations. arXiv preprint arXiv:1711.00848 ( 2017 )."},{"key":"e_1_3_2_2_43_1","volume-title":"Proceedings of the 33rd IEEE\/ACM International Conference on Automated Software Engineering. Acm.","author":"Lemieux Caroline","year":"2018","unstructured":"Caroline Lemieux and Koushik Sen . 2018 . Fairfuzz: Targeting rare branches to rapidly increase greybox fuzz testing coverage . In Proceedings of the 33rd IEEE\/ACM International Conference on Automated Software Engineering. Acm. Caroline Lemieux and Koushik Sen. 2018. Fairfuzz: Targeting rare branches to rapidly increase greybox fuzz testing coverage. In Proceedings of the 33rd IEEE\/ACM International Conference on Automated Software Engineering. Acm."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106295"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2016.7487381"},{"key":"e_1_3_2_2_46_1","volume-title":"Proceedings of the 32nd International Conference on International Conference on Machine Learning-Volume 37","author":"Long Mingsheng","unstructured":"Mingsheng Long , Yue Cao , Jianmin Wang , and Michael I. Jordan . 2015. Learning Transferable Features with Deep Adaptation Networks . In Proceedings of the 32nd International Conference on International Conference on Machine Learning-Volume 37 ( Lille, France) (ICML'15). Mingsheng Long, Yue Cao, Jianmin Wang, and Michael I. Jordan. 2015. Learning Transferable Features with Deep Adaptation Networks. In Proceedings of the 32nd International Conference on International Conference on Machine Learning-Volume 37 ( Lille, France) (ICML'15)."},{"key":"e_1_3_2_2_47_1","volume-title":"Manuel Egele, Edward J Schwartz, and Maverick Woo.","author":"Manes Valentin JM","year":"2018","unstructured":"Valentin JM Manes , HyungSeok Han , Choongwoo Han , Sang Kil Cha , Manuel Egele, Edward J Schwartz, and Maverick Woo. 2018 . Fuzzing : Art , science, and engineering. arXiv preprint arXiv: 1812. 00140 ( 2018 ). Valentin JM Manes, HyungSeok Han, Choongwoo Han, Sang Kil Cha, Manuel Egele, Edward J Schwartz, and Maverick Woo. 2018. Fuzzing: Art, science, and engineering. arXiv preprint arXiv: 1812. 00140 ( 2018 )."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.100"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24855-2_157"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24855-2_157"},{"key":"e_1_3_2_2_51_1","volume-title":"Proceedings of the 22nd National Conference on Artificial Intelligence-Volume 1 ( AAAI ' 07 ).","author":"Mihalkova Lilyana","unstructured":"Lilyana Mihalkova , Tuyen Huynh , and Raymond J. Mooney . 2007. Mapping and Revising Markov Logic Networks for Transfer Learning . In Proceedings of the 22nd National Conference on Artificial Intelligence-Volume 1 ( AAAI ' 07 ). Lilyana Mihalkova, Tuyen Huynh, and Raymond J. Mooney. 2007. Mapping and Revising Markov Logic Networks for Transfer Learning. In Proceedings of the 22nd National Conference on Artificial Intelligence-Volume 1 ( AAAI ' 07 )."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"crossref","unstructured":"Barton P Miller Louis Fredriksen and Bryan So. 1990. An empirical study of the reliability of UNIX utilities. Comm. ACM 33 12 ( 1990 ) 32-44.  Barton P Miller Louis Fredriksen and Bryan So. 1990. An empirical study of the reliability of UNIX utilities. Comm. ACM 33 12 ( 1990 ) 32-44.","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_2_53_1","unstructured":"Max Moroz and Kostya Serebryany. 2016. Guided in-process fuzzing of Chrome components.  Max Moroz and Kostya Serebryany. 2016. Guided in-process fuzzing of Chrome components."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/icse.2019.00034"},{"key":"e_1_3_2_2_55_1","unstructured":"Art B. Owen. 2013. Monte Carlo theory methods and examples.  Art B. Owen. 2013. Monte Carlo theory methods and examples."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.11.045"},{"key":"e_1_3_2_2_57_1","volume-title":"Alexandru R\u0103zvan C\u0103ciulescu, and Abhik Roychoudhury","author":"Pham Thuan","year":"2019","unstructured":"Thuan Pham , Marcel B\u00f6hme , Andrew Santosa , Alexandru R\u0103zvan C\u0103ciulescu, and Abhik Roychoudhury . 2019 . Smart Greybox Fuzzing. In IEEE Transactions on Software Engineering . Thuan Pham, Marcel B\u00f6hme, Andrew Santosa, Alexandru R\u0103zvan C\u0103ciulescu, and Abhik Roychoudhury. 2019. Smart Greybox Fuzzing. In IEEE Transactions on Software Engineering."},{"key":"e_1_3_2_2_58_1","volume-title":"Advances in Neural Information Processing Systems 5, [NIPS Conference].","author":"Pratt Lorien Y.","unstructured":"Lorien Y. Pratt . 1992. Discriminability-Based Transfer between Neural Networks . In Advances in Neural Information Processing Systems 5, [NIPS Conference]. San Francisco, CA, USA . Lorien Y. Pratt. 1992. Discriminability-Based Transfer between Neural Networks. In Advances in Neural Information Processing Systems 5, [NIPS Conference]. San Francisco, CA, USA."},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143934"},{"key":"e_1_3_2_2_60_1","unstructured":"Mohit Rajpal William Blum and Rishabh Singh. 2017. Not all bytes are equal: Neural byte sieve for fuzzing. arXiv preprint arXiv:1711.04596 ( 2017 ) 1-10. arXiv: 1711.04596 http:\/\/arxiv.org\/abs\/1711.04596  Mohit Rajpal William Blum and Rishabh Singh. 2017. Not all bytes are equal: Neural byte sieve for fuzzing. arXiv preprint arXiv:1711.04596 ( 2017 ) 1-10. arXiv: 1711.04596 http:\/\/arxiv.org\/abs\/1711.04596"},{"key":"e_1_3_2_2_61_1","unstructured":"Sebastian Ruder. 2017. An overview of multi-task learning in deep neural networks. arXiv preprint arXiv:1706.05098 ( 2017 ).  Sebastian Ruder. 2017. An overview of multi-task learning in deep neural networks. arXiv preprint arXiv:1706.05098 ( 2017 )."},{"key":"e_1_3_2_2_62_1","volume-title":"A Review of Machine Learning Applications in Fuzzing. ( 2019 ). arXiv","author":"Saavedra Gary J","year":"1906","unstructured":"Gary J Saavedra , Kathryn N Rodhouse , Daniel M Dunlavy , and Philip W Kegelmeyer . 2019. A Review of Machine Learning Applications in Fuzzing. ( 2019 ). arXiv : 1906 .11133 http:\/\/arxiv.org\/abs\/ 1906.11133 Gary J Saavedra, Kathryn N Rodhouse, Daniel M Dunlavy, and Philip W Kegelmeyer. 2019. A Review of Machine Learning Applications in Fuzzing. ( 2019 ). arXiv: 1906.11133 http:\/\/arxiv.org\/abs\/ 1906.11133"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/11817963_38"},{"key":"e_1_3_2_2_64_1","volume-title":"Neutaint: Eficient Dynamic Taint Analysis with Neural Networks. arXiv preprint arXiv","author":"She Dongdong","year":"2019","unstructured":"Dongdong She , Yizheng Chen , Baishakhi Ray , and Suman Jana . 2019 . Neutaint: Eficient Dynamic Taint Analysis with Neural Networks. arXiv preprint arXiv : 1907. 03756 ( 2019 ). Dongdong She, Yizheng Chen, Baishakhi Ray, and Suman Jana. 2019. Neutaint: Eficient Dynamic Taint Analysis with Neural Networks. arXiv preprint arXiv: 1907. 03756 ( 2019 )."},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00052"},{"key":"e_1_3_2_2_66_1","volume-title":"Guest editor","author":"Silver Daniel","year":"2008","unstructured":"Daniel Silver and Kristin Bennett . 2008. Guest editor 's introduction: Special issue on inductive transfer learning. Machine Learning ( 12 2008 ), 215-220. Daniel Silver and Kristin Bennett. 2008. Guest editor's introduction: Special issue on inductive transfer learning. Machine Learning ( 12 2008 ), 215-220."},{"key":"e_1_3_2_2_67_1","unstructured":"Karen Simonyan Andrea Vedaldi and Andrew Zisserman. 2013. Deep inside convolutional networks: Visualising image classification models and saliency maps. arXiv preprint arXiv:1312.6034 ( 2013 ).  Karen Simonyan Andrea Vedaldi and Andrew Zisserman. 2013. Deep inside convolutional networks: Visualising image classification models and saliency maps. arXiv preprint arXiv:1312.6034 ( 2013 )."},{"key":"e_1_3_2_2_68_1","volume-title":"Which Tasks Should Be Learned Together in Multi-task Learning? arXiv preprint arXiv","author":"Standley Trevor","year":"1905","unstructured":"Trevor Standley , Amir R Zamir , Dawn Chen , Leonidas Guibas , Jitendra Malik , and Silvio Savarese . 2019. Which Tasks Should Be Learned Together in Multi-task Learning? arXiv preprint arXiv : 1905 . 07553 ( 2019 ). Trevor Standley, Amir R Zamir, Dawn Chen, Leonidas Guibas, Jitendra Malik, and Silvio Savarese. 2019. Which Tasks Should Be Learned Together in Multi-task Learning? arXiv preprint arXiv: 1905. 07553 ( 2019 )."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49409-8_35"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2018.8500504"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45886-1_2"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/icse.2019.00081"},{"key":"e_1_3_2_2_73_1","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019 ). Raid, 1-15","author":"Wang Jinghan","year":"2019","unstructured":"Jinghan Wang , Yue Duan , Wei Song , Heng Yin , and Chengyu Song . 2019 . Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing , In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019 ). Raid, 1-15 . https:\/\/github. Jinghan Wang, Yue Duan, Wei Song, Heng Yin, and Chengyu Song. 2019. Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing, In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019 ). Raid, 1-15. https:\/\/github."},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276990"},{"key":"e_1_3_2_2_75_1","first-page":"712","volume-title":"Proceedings of the 41st ACM\/IEEE International Conference on Software Engineering (ICSE'19)","author":"You Wei Zhen","year":"2018","unstructured":"Wei Zhen You , Xuwei Liu , Shiqing Ma , David Perry , Xiangyu Zhang , and Bin Liang . 2018 . SLF: fuzzing without valid seed inputs . In Proceedings of the 41st ACM\/IEEE International Conference on Software Engineering (ICSE'19) . Acm , 712 - 723 . Wei Zhen You, Xuwei Liu, Shiqing Ma, David Perry, Xiangyu Zhang, and Bin Liang. 2018. SLF: fuzzing without valid seed inputs. In Proceedings of the 41st ACM\/IEEE International Conference on Software Engineering (ICSE'19). Acm, 712-723."},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00057"},{"key":"e_1_3_2_2_77_1","unstructured":"Michal Zalewski. 2017. American fuzzy lop. URL: http:\/\/lcamtuf. coredump. cx\/afl ( 2017 ).  Michal Zalewski. 2017. American fuzzy lop. URL: http:\/\/lcamtuf. coredump. cx\/afl ( 2017 )."},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00391"},{"key":"e_1_3_2_2_79_1","unstructured":"Yu Zhang and Qiang Yang. 2017. A survey on multi-task learning. arXiv preprint arXiv:1707.08114 ( 2017 ) 1-20. arXiv: 1707.08114 http:\/\/arxiv.org\/abs\/1707.08114  Yu Zhang and Qiang Yang. 2017. A survey on multi-task learning. arXiv preprint arXiv:1707.08114 ( 2017 ) 1-20. arXiv: 1707.08114 http:\/\/arxiv.org\/abs\/1707.08114"}],"event":{"name":"ESEC\/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Virtual Event USA","acronym":"ESEC\/FSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409723","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:40Z","timestamp":1750203880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409723"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,8]]},"references-count":79,"alternative-id":["10.1145\/3368089.3409723","10.1145\/3368089"],"URL":"https:\/\/doi.org\/10.1145\/3368089.3409723","relation":{},"subject":[],"published":{"date-parts":[[2020,11,8]]},"assertion":[{"value":"2020-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}