{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:55:03Z","timestamp":1773154503810,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T00:00:00Z","timestamp":1686960000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,17]]},"DOI":"10.1145\/3606043.3606050","type":"proceedings-article","created":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T17:08:44Z","timestamp":1700154524000},"page":"46-55","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["AFL-RL: A Reinforcement Learning Based Mutation Scheduling Optimization Method for Fuzzing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-9598-7275","authenticated-orcid":false,"given":"Menglin","family":"Li","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9036-486X","authenticated-orcid":false,"given":"Haoran","family":"Zhu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0207-2628","authenticated-orcid":false,"given":"Haochen","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2145-633X","authenticated-orcid":false,"given":"Jingtian","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Second Life: An interactive qualitative analysis[C]\/\/Society for Information Technology & Teacher Education International Conference","author":"Sanchez J.","year":"2007","unstructured":"Sanchez J. Second Life: An interactive qualitative analysis[C]\/\/Society for Information Technology & Teacher Education International Conference . Association for the Advancement of Computing in Education (AACE), 2007 : 1240-1243. Sanchez J. Second Life: An interactive qualitative analysis[C]\/\/Society for Information Technology & Teacher Education International Conference. Association for the Advancement of Computing in Education (AACE), 2007: 1240-1243."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480751"},{"key":"e_1_3_2_1_3_1","volume-title":"Paphos, Cyprus, September 2\u20136","author":"Bruun A","year":"2019","unstructured":"Bruun A , Stentoft M L . Lifelogging in the wild: Participant experiences of using lifelogging as a research tool[C]\/\/Human-Computer Interaction\u2013INTERACT 2019: 17th IFIP TC 13 International Conference , Paphos, Cyprus, September 2\u20136 , 2019 , Proceedings, Part III 17. Springer International Publishing , 2019: 431-451. Bruun A, Stentoft M L. Lifelogging in the wild: Participant experiences of using lifelogging as a research tool[C]\/\/Human-Computer Interaction\u2013INTERACT 2019: 17th IFIP TC 13 International Conference, Paphos, Cyprus, September 2\u20136, 2019, Proceedings, Part III 17. Springer International Publishing, 2019: 431-451."},{"key":"e_1_3_2_1_4_1","volume-title":"Technologies, Applications, and Challenges[J]. arXiv preprint arXiv:2111.09673","author":"Ning H","year":"2021","unstructured":"Ning H , Wang H , Lin Y , A Survey on Metaverse: the State-of-the-art , Technologies, Applications, and Challenges[J]. arXiv preprint arXiv:2111.09673 , 2021 . Ning H, Wang H, Lin Y, A Survey on Metaverse: the State-of-the-art, Technologies, Applications, and Challenges[J]. arXiv preprint arXiv:2111.09673, 2021."},{"key":"e_1_3_2_1_5_1","first-page":"1","volume":"2021","author":"Grider D","unstructured":"Grider D , Maximo M. The metaverse: Web 3.0 virtual cloud economies[J]. Grayscale Research , 2021 : 1 - 19 . Grider D, Maximo M. The metaverse: Web 3.0 virtual cloud economies[J]. Grayscale Research, 2021: 1-19.","journal-title":"Grayscale Research"},{"key":"e_1_3_2_1_6_1","unstructured":"\u201cAmerican Fuzzy Lop\u201d http:\/\/lcamtuf.coredump.cx\/afl\/.  \u201cAmerican Fuzzy Lop\u201d http:\/\/lcamtuf.coredump.cx\/afl\/."},{"key":"e_1_3_2_1_7_1","first-page":"1","volume":"17","author":"Rawat S","year":"2017","unstructured":"Rawat S , Jain V , Kumar A , V Uzzer : Application-aware Evolutionary Fuzzing[C]\/\/ NDSS . 2017 , 17 : 1 - 14 . Rawat S, Jain V, Kumar A, VUzzer: Application-aware Evolutionary Fuzzing[C]\/\/NDSS. 2017, 17: 1-14.","journal-title":"NDSS"},{"key":"e_1_3_2_1_8_1","volume-title":"Qin X","author":"Gan S","year":"2018","unstructured":"Gan S , Zhang C , Qin X , Collafl : Path sensitive fuzzing[C]\/\/ 2018 IEEE Symposium on Security and Privacy (SP). IEEE , 2018: 679-696. Gan S, Zhang C, Qin X, Collafl: Path sensitive fuzzing[C]\/\/2018 IEEE Symposium on Security and Privacy (SP). IEEE, 2018: 679-696."},{"key":"e_1_3_2_1_9_1","unstructured":"R.Swiecki \u201cHonggfuzz\u201d http:\/\/code.google.com\/p\/honggfuzz\/.  R.Swiecki \u201cHonggfuzz\u201d http:\/\/code.google.com\/p\/honggfuzz\/."},{"key":"e_1_3_2_1_10_1","volume-title":"Machine learning for input fuzzing[C]\/\/2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"Godefroid P","year":"2017","unstructured":"Godefroid P , Peleg H , Singh R. Learn &fuzz : Machine learning for input fuzzing[C]\/\/2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE) . IEEE , 2017 : 50-59. Godefroid P, Peleg H, Singh R. Learn&fuzz: Machine learning for input fuzzing[C]\/\/2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE, 2017: 50-59."},{"key":"e_1_3_2_1_11_1","volume-title":"Wei L","author":"Wang J","year":"2017","unstructured":"Wang J , Chen B , Wei L , Skyfire : Data-driven seed generation for fuzzing[C]\/\/ 2017 IEEE Symposium on Security and Privacy (SP). IEEE , 2017: 579-594. Wang J, Chen B, Wei L, Skyfire: Data-driven seed generation for fuzzing[C]\/\/2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017: 579-594."},{"key":"e_1_3_2_1_12_1","volume-title":"Holz T","author":"Aschermann C","year":"2019","unstructured":"Aschermann C , Frassetto T , Holz T , NAUTILUS : Fishing for Deep Bugs with Grammars [C]\/\/NDSS. 2019 . Aschermann C, Frassetto T, Holz T, NAUTILUS: Fishing for Deep Bugs with Grammars[C]\/\/NDSS. 2019."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2949662"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature24270"},{"key":"e_1_3_2_1_15_1","volume-title":"Emergence of locomotion behaviours in rich environments[J]. arXiv preprint arXiv:1707.02286","author":"Heess N, TB D","year":"2017","unstructured":"Heess N, TB D , Sriram S , Emergence of locomotion behaviours in rich environments[J]. arXiv preprint arXiv:1707.02286 , 2017 . Heess N, TB D, Sriram S, Emergence of locomotion behaviours in rich environments[J]. arXiv preprint arXiv:1707.02286, 2017."},{"key":"e_1_3_2_1_16_1","volume-title":"A survey of deep reinforcement learning in video games[J]. arXiv preprint arXiv:1912.10944","author":"Shao K","year":"2019","unstructured":"Shao K , Tang Z , Zhu Y , A survey of deep reinforcement learning in video games[J]. arXiv preprint arXiv:1912.10944 , 2019 . Shao K, Tang Z, Zhu Y, A survey of deep reinforcement learning in video games[J]. arXiv preprint arXiv:1912.10944, 2019."},{"key":"e_1_3_2_1_17_1","volume-title":"PMLR","author":"Fujimoto S","unstructured":"Fujimoto S , Hoof H , Meger D. Addressing function approximation error in actor-critic methods[C]\/\/International conference on machine learning . PMLR , 2018: 1587-1596. Fujimoto S, Hoof H, Meger D. Addressing function approximation error in actor-critic methods[C]\/\/International conference on machine learning. PMLR, 2018: 1587-1596."},{"key":"e_1_3_2_1_18_1","volume-title":"Li Y","author":"Lyu C","year":"1807","unstructured":"Lyu C , Ji S , Li Y , Smartseed : Smart seed generation for efficient fuzzing[J]. arXiv preprint arXiv: 1807 .02606, 2018. Lyu C, Ji S, Li Y, Smartseed: Smart seed generation for efficient fuzzing[J]. arXiv preprint arXiv:1807.02606, 2018."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Wu Z Johnson E Yang W REINAM: reinforcement learning for input-grammar inference[C]\/\/Proceedings of the 2019 27th acm joint meeting on european software engineering conference and symposium on the foundations of software engineering. 2019: 488-498.  Wu Z Johnson E Yang W REINAM: reinforcement learning for input-grammar inference[C]\/\/Proceedings of the 2019 27th acm joint meeting on european software engineering conference and symposium on the foundations of software engineering. 2019: 488-498.","DOI":"10.1145\/3338906.3338958"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916583"},{"key":"e_1_3_2_1_21_1","unstructured":"Lee\n      S Han\n      H S Cha S K Montage: A neural network language model-guided javascript engine fuzzer[C]\/\/Proceedings of the 29th USENIX Conference on Security Symposium.\n  2020\n  :  \n  2613\n  -\n  2630\n  .  Lee S Han H S Cha S K Montage: A neural network language model-guided javascript engine fuzzer[C]\/\/Proceedings of the 29th USENIX Conference on Security Symposium. 2020: 2613-2630."},{"key":"e_1_3_2_1_22_1","volume-title":"Wang D","author":"Zong P","unstructured":"Zong P , Lv T , Wang D , Fuzzguard : Filtering out unreachable inputs in directed grey-box fuzzing through deep learning[C]\/\/Proceedings of the 29th USENIX Conference on Security Symposium. 2020: 2255-2269. Zong P, Lv T, Wang D, Fuzzguard: Filtering out unreachable inputs in directed grey-box fuzzing through deep learning[C]\/\/Proceedings of the 29th USENIX Conference on Security Symposium. 2020: 2255-2269."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"B\u00f6hme M Pham V T Nguyen M D Directed greybox fuzzing[C]\/\/Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017: 2329-2344.  B\u00f6hme M Pham V T Nguyen M D Directed greybox fuzzing[C]\/\/Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017: 2329-2344.","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_24_1","volume-title":"Deep reinforcement fuzzing[C]\/\/2018 IEEE Security and Privacy Workshops (SPW)","author":"B\u00f6ttinger K","year":"2018","unstructured":"B\u00f6ttinger K , Godefroid P , Singh R. Deep reinforcement fuzzing[C]\/\/2018 IEEE Security and Privacy Workshops (SPW) . IEEE , 2018 : 116-122. B\u00f6ttinger K, Godefroid P, Singh R. Deep reinforcement fuzzing[C]\/\/2018 IEEE Security and Privacy Workshops (SPW). IEEE, 2018: 116-122."},{"key":"e_1_3_2_1_25_1","volume-title":"ICICS 2022, Canterbury, UK, September 5\u20138, 2022, Proceedings. Cham: Springer International Publishing","author":"Li X","unstructured":"Li X , Liu X , Chen L , FuzzBoost : Reinforcement Compiler Fuzzing[C]\/\/Information and Communications Security: 24th International Conference , ICICS 2022, Canterbury, UK, September 5\u20138, 2022, Proceedings. Cham: Springer International Publishing , 2022: 359-375. Li X, Liu X, Chen L, FuzzBoost: Reinforcement Compiler Fuzzing[C]\/\/Information and Communications Security: 24th International Conference, ICICS 2022, Canterbury, UK, September 5\u20138, 2022, Proceedings. Cham: Springer International Publishing, 2022: 359-375."},{"key":"e_1_3_2_1_26_1","volume-title":"Wagner M D. Fuzzergym: A competitive framework for fuzzing and learning[J]. arXiv preprint arXiv:1807.07490","author":"Drozd W","year":"2018","unstructured":"Drozd W , Wagner M D. Fuzzergym: A competitive framework for fuzzing and learning[J]. arXiv preprint arXiv:1807.07490 , 2018 . Drozd W, Wagner M D. Fuzzergym: A competitive framework for fuzzing and learning[J]. arXiv preprint arXiv:1807.07490, 2018."},{"key":"e_1_3_2_1_27_1","volume-title":"Automated software vulnerability testing using deep learning methods[C]\/\/2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON)","author":"Kuznetsov A","year":"2019","unstructured":"Kuznetsov A , Yeromin Y , Shapoval O , Automated software vulnerability testing using deep learning methods[C]\/\/2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON) . IEEE , 2019 : 837-841. Kuznetsov A, Yeromin Y, Shapoval O, Automated software vulnerability testing using deep learning methods[C]\/\/2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON). IEEE, 2019: 837-841."}],"event":{"name":"HP3C 2023: 2023 7th International Conference on High Performance Compilation, Computing and Communications","location":"Jinan China","acronym":"HP3C 2023"},"container-title":["Proceedings of the 2023 7th International Conference on High Performance Compilation, Computing and Communications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3606043.3606050","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3606043.3606050","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:07Z","timestamp":1750178767000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3606043.3606050"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,17]]},"references-count":27,"alternative-id":["10.1145\/3606043.3606050","10.1145\/3606043"],"URL":"https:\/\/doi.org\/10.1145\/3606043.3606050","relation":{},"subject":[],"published":{"date-parts":[[2023,6,17]]},"assertion":[{"value":"2023-11-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}