{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:23:22Z","timestamp":1773840202112,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CCF-2131943,CCF-2141474"],"award-info":[{"award-number":["CCF-2131943,CCF-2141474"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616337","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"657-669","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["NeuRI: Diversifying DNN Generation via Inductive Rule Inference"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7122-8625","authenticated-orcid":false,"given":"Jiawei","family":"Liu","sequence":"first","affiliation":[{"name":"University of Illinois, Urbana-Champaign, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0202-2122","authenticated-orcid":false,"given":"Jinjun","family":"Peng","sequence":"additional","affiliation":[{"name":"Columbia University, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4164-3208","authenticated-orcid":false,"given":"Yuyao","family":"Wang","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5175-2702","authenticated-orcid":false,"given":"Lingming","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana-Champaign, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.7222132"},{"key":"e_1_3_2_2_2_1","unstructured":"2022. Building the Future of TensorFlow \u2014 The TensorFlow Blog. https:\/\/blog.tensorflow.org\/2022\/10\/building-the-future-of-tensorflow.html"},{"key":"e_1_3_2_2_3_1","unstructured":"2022. \"Compute Sanitizer :: CUDA Toolkit Documentation\". https:\/\/docs.nvidia.com\/cuda\/compute-sanitizer\/index.html"},{"key":"e_1_3_2_2_4_1","unstructured":"2022. GCOV. https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/Gcov.html"},{"key":"e_1_3_2_2_5_1","unstructured":"2022. PyTorch 2.0 | PyTorch. https:\/\/pytorch.org\/get-started\/pytorch-2.0\/"},{"key":"e_1_3_2_2_6_1","unstructured":"2022. Source-based Code Coverage \u2014 Clang 15.0.0 documentation. https:\/\/releases.llvm.org\/15.0.0\/tools\/clang\/docs\/SourceBasedCodeCoverage.html"},{"key":"e_1_3_2_2_7_1","unstructured":"2022. \"UndefinedBehaviorSanitizer \u2014 Clang 16.0.0git documentation\". https:\/\/clang.llvm.org\/docs\/UndefinedBehaviorSanitizer.html"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","unstructured":"2023. ESEC\/FSE\u201923 Artifact for \"NeuRI: Diversifying DNN Generation via Inductive Rule Inference\". Zenodo. https:\/\/doi.org\/10.5281\/zenodo.8319975 10.5281\/zenodo.8319975","DOI":"10.5281\/zenodo.8319975"},{"key":"e_1_3_2_2_9_1","volume-title":"12th USENIX symposium on operating systems design and implementation (OSDI 16)","author":"Abadi Mart\u00edn","year":"2016","unstructured":"Mart\u00edn Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, and Michael Isard. 2016. Tensorflow: A system for large-scale machine learning. In 12th USENIX symposium on operating systems design and implementation (OSDI 16). 265\u2013283."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54577-5_18"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598067"},{"key":"e_1_3_2_2_13_1","volume-title":"Chenyuan Yang, Shizhuo Dylan Zhang, Shujing Yang, and Lingming Zhang.","author":"Deng Yinlin","year":"2023","unstructured":"Yinlin Deng, Chunqiu Steven Xia, Chenyuan Yang, Shizhuo Dylan Zhang, Shujing Yang, and Lingming Zhang. 2023. Large language models are edge-case fuzzers: Testing deep learning libraries via fuzzgpt. arXiv preprint arXiv:2304.02014."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549085"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549085"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/3322706.3361996"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_2_18_1","unstructured":"Google. 2015. Keras. https:\/\/keras.io"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510092"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416571"},{"key":"e_1_3_2_2_21_1","unstructured":"Aric Hagberg Pieter Swart and Daniel S Chult. 2008. Exploring network structure dynamics and function using NetworkX. Los Alamos National Lab.(LANL) Los Alamos NM (United States)."},{"key":"e_1_3_2_2_22_1","volume-title":"Long short-term memory. Neural computation, 9, 8","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation, 9, 8 (1997), 1735\u20131780."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00236-017-0294-5"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510454.3528638"},{"key":"e_1_3_2_2_26_1","volume-title":"HFL: Hybrid Fuzzing on the Linux Kernel. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020","author":"Kim Kyungtae","year":"2020","unstructured":"Kyungtae Kim, Dae R. Jeong, Chung Hwan Kim, Yeongjin Jang, Insik Shin, and Byoungyoung Lee. 2020. HFL: Hybrid Fuzzing on the Linux Kernel. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss-paper\/hfl-hybrid-fuzzing-on-the-linux-kernel\/"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/291080.291104"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3575693.3575707"},{"key":"e_1_3_2_2_30_1","unstructured":"Jiawei Liu Jinjun Peng Yuyao Wang and Lingming Zhang. 2023. Artifact for ESEC\/FSE\u201923 paper \"NeuRI: Diversifying DNN Generation via Inductive Rule Inference\". https:\/\/github.com\/ise-uiuc\/neuri-artifact"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3527317"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00037"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485496"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00023"},{"key":"e_1_3_2_2_36_1","unstructured":"OpenAI. 2022. ChatGPT: Optimizing Language Models for Dialogue. https:\/\/openai.com\/blog\/chatgpt\/"},{"key":"e_1_3_2_2_37_1","unstructured":"OpenAI. 2022. DALL\u00b7E 2. https:\/\/openai.com\/dall-e-2\/"},{"key":"e_1_3_2_2_38_1","volume-title":"Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems, 32","author":"Paszke Adam","year":"2019","unstructured":"Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, and Luca Antiga. 2019. Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems, 32 (2019), 8026\u20138037."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00107"},{"key":"e_1_3_2_2_40_1","unstructured":"PyTorch. 2022. Numerical accuracy \u2014 PyTorch master documentation. https:\/\/pytorch.org\/docs\/master\/notes\/numerical_accuracy.html##linear-algebra-torch-linalg"},{"key":"e_1_3_2_2_41_1","unstructured":"PyTorch. 2022. TorchDynamo and TorchInductor Tutorial. https:\/\/pytorch.org\/tutorials\/intermediate\/dynamo_tutorial.html"},{"key":"e_1_3_2_2_42_1","unstructured":"John Regehr. 2020. Responsible and Effective Bugfinding. https:\/\/blog.regehr.org\/archives\/2037"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_2_44_1","volume-title":"2012 USENIX Annual Technical Conference (USENIX ATC 12)","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitriy Vyukov. 2012. $AddressSanitizer$: A Fast Address Sanity Checker. In 2012 USENIX Annual Technical Conference (USENIX ATC 12). 309\u2013318."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517034"},{"key":"e_1_3_2_2_46_1","unstructured":"TensorFlow. 2022. tf.cast | TensorFlow v2.11.0. https:\/\/www.tensorflow.org\/api_docs\/python\/tf\/cast"},{"key":"e_1_3_2_2_47_1","volume-title":"Using TensorFlow Securely \u2013 TensorFlow models are programs. https:\/\/github.com\/tensorflow\/tensorflow\/security\/policy##tensorflow-models-are-programs [Online","author":"Contributors TensorFlow","year":"2023","unstructured":"TensorFlow Contributors. 2023. Using TensorFlow Securely \u2013 TensorFlow models are programs. https:\/\/github.com\/tensorflow\/tensorflow\/security\/policy##tensorflow-models-are-programs [Online; accessed 3-Jan-2023]"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509578.2509586"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499370.2462174"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598105"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409761"},{"key":"e_1_3_2_2_52_1","volume-title":"Learning Structural Descriptions From Examples","author":"Winston Patrick H.","unstructured":"Patrick H. Winston. 1970. Learning Structural Descriptions From Examples. Cambridge, MA, USA."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534220"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00105"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993532"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3526113.3545653"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","unstructured":"Hong Zhu Patrick A. V. Hall and John H. R. May. 1997. Software Unit Test Coverage and Adequacy. ACM Comput. Surv. 29 4 (1997) dec 366\u2013427. issn:0360-0300 https:\/\/doi.org\/10.1145\/267580.267590 10.1145\/267580.267590","DOI":"10.1145\/267580.267590"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"San Francisco CA USA","acronym":"ESEC\/FSE '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616337","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:11Z","timestamp":1750178171000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616337"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":57,"alternative-id":["10.1145\/3611643.3616337","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616337","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}