{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:54:22Z","timestamp":1773154462689,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,1,15]],"date-time":"2024-01-15T00:00:00Z","timestamp":1705276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,1,15]]},"DOI":"10.1145\/3641181.3641182","type":"proceedings-article","created":{"date-parts":[[2024,4,11]],"date-time":"2024-04-11T18:04:10Z","timestamp":1712858650000},"page":"105-110","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["AMNeuzz: A Strongly Directed Fuzz Testing Method Based on Attention Mechanism"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7391-1217","authenticated-orcid":false,"given":"Lei","family":"Zhang","sequence":"first","affiliation":[{"name":"Department of Information Technology, State Grid Shanghai Electric Power Research Institute, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3371-279X","authenticated-orcid":false,"given":"Binbin","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Information Technology, State Grid Shanghai Electric Power Research Institute, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2661-5222","authenticated-orcid":false,"given":"Chang","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Information Technology, State Grid Shanghai Electric Power Research Institute, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4328-6507","authenticated-orcid":false,"given":"Mi","family":"Wen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Shanghai University of Electric Power, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5834-0602","authenticated-orcid":false,"given":"Yan","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Shanghai University of Electric Power, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0389-3281","authenticated-orcid":false,"given":"Liangliang","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Shanghai University of Electric Power, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,11]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"32","article-title":"An empirical study of the reliability of UNIX utilities","volume":"1990","author":"Miller BP","unstructured":"Miller BP, Fredriksen L, So B. \"An empirical study of the reliability of UNIX utilities\". Communications of the ACM,1990,33(12):32\u201344.","journal-title":"Communications of the ACM"},{"key":"e_1_3_2_1_2_1","volume-title":"Comparing White-box and Black-box Test Prioritization. International Conference. IEEE","author":"Henard C","unstructured":"Henard C, Papadakis M, Harman M, Comparing White-box and Black-box Test Prioritization. International Conference. IEEE, 2016:523-534. DOI :10.1145\/2884781.2884791."},{"key":"e_1_3_2_1_3_1","first-page":"2121","volume":"12","author":"Methods","year":"2011","unstructured":"Methods for Online Learning and Stochastic Optimization. Journal of Machine Learning Research, 12:2121\u20132159, 2011.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2903291"},{"key":"e_1_3_2_1_5_1","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses","unstructured":"CHEN Y, AHMADI M, WANG B, MEUZZ: smart seed scheduling for hybrid fuzzing. 23rd International Symposium on Research in Attacks, Intrusions and Defenses, 2020: 77-92."},{"key":"e_1_3_2_1_6_1","volume-title":"smart seed generation for efficient fuzzing. arXiv Preprint arXiv","author":"Smartseed","year":"1807","unstructured":"LYU C, JI S, LI Y, Smartseed: smart seed generation for efficient fuzzing. arXiv Preprint arXiv: 1807.02606, 2018."},{"key":"e_1_3_2_1_7_1","volume-title":"32rd IEEE International Conference on Automated Software Engineering. IEEE","author":"Learnfuzz","unstructured":"GODEFROID P, PELEG H, SINGH R. Learnfuzz: machine learning for input fuzzing. 32rd IEEE International Conference on Automated Software Engineering. IEEE, 2017: 50-59."},{"key":"e_1_3_2_1_8_1","volume-title":"2017 IEEE Symposium on Security and Privacy (SP). IEEE","author":"Skyfire","unstructured":"WANG J, CHEN B, WEI L, Skyfire: datadriven seed generation for fuzzing. 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017: 579-594."},{"key":"e_1_3_2_1_9_1","volume-title":"2018 IEEE Security and Privacy Workshops (SPW). IEEE","author":"B\u00d6 TTINGER K, GODEFROID P, SINGH R","unstructured":"B\u00d6TTINGER K, GODEFROID P, SINGH R. Deep reinforcement fuzzing. 2018 IEEE Security and Privacy Workshops (SPW). IEEE, 2018: 116-122."},{"key":"e_1_3_2_1_10_1","volume-title":"Not all bytes are equal: neural byte sieve for fuzzing. arXiv Preprint arXiv: 1711.04596","year":"2017","unstructured":"RAJPAL M, BLUM W, SINGH R. Not all bytes are equal: neural byte sieve for fuzzing. arXiv Preprint arXiv: 1711.04596, 2017."},{"key":"e_1_3_2_1_11_1","first-page":"2255","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Fuzzguard","year":"2020","unstructured":"ZONG P, LV T, WANG D, Fuzzguard: filtering out unreachable inputs in directed grey-box fuzzing through deep learning. 29th USENIX Security Symposium (USENIX Security 20), 2020: 2255-2269."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis. Santa Barbara: ACM","unstructured":"SPIEKER H, GOTLIEB A, MARIJAN D, Reinforcement learning for automatic test case prioritization and selection in continuous integration. Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis. Santa Barbara: ACM, 2017: 12-22."},{"key":"e_1_3_2_1_13_1","volume-title":"2018 IEEE Symposium on Security and Privacy (SP). San Francisco: IEEE","author":"Angora","unstructured":"CHEN P, CHEN H. Angora: efficient fuzzing by principled search. 2018 IEEE Symposium on Security and Privacy (SP). San Francisco: IEEE, 2018: 711-725."},{"key":"e_1_3_2_1_14_1","volume-title":"EPSTEIN D","year":"2018","unstructured":"SHE D D, PEI K X, EPSTEIN D, NEUZZ: Efficient fuzzing with neural program learning [EB\/OL]. Ithaca: arXiv [2018-07-15]. https:\/\/arxiv.org\/abs\/1807.05620."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 24th USENIX Conference on Security Symposium. Washington D.C.: USENIX Association","unstructured":"SHIN E C R, SONG D, MOAZZEZI R. Recognizing funcitons in binaries with neural networks. Proceedings of the 24th USENIX Conference on Security Symposium. Washington D.C.: USENIX Association, 2015: 611-626."},{"key":"e_1_3_2_1_16_1","volume-title":"Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv: 1409. 0473","author":"Bahdanau D","year":"2014","unstructured":"Bahdanau D, Cho K, Bengio Y. Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv: 1409. 0473, 2014."},{"key":"e_1_3_2_1_17_1","volume-title":"Effective approaches to attention-based neural machine translation. arXiv preprint arXiv: 1508. 04025","author":"Luong MT","year":"2015","unstructured":"Luong MT, Pham H, Manning CD. Effective approaches to attention-based neural machine translation. arXiv preprint arXiv: 1508. 04025, 2015."},{"key":"e_1_3_2_1_18_1","first-page":"441","volume-title":"Proc. of the 8th Int'l Joint Conf. on Natural Language Processing (Vol.1: Long Papers).","author":"Salton G","year":"2017","unstructured":"Salton G, Ross R, Kelleher J. Attentive language models. In: Proc. of the 8th Int'l Joint Conf. on Natural Language Processing (Vol.1: Long Papers). 2017. 441-450."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013159"},{"issue":"5","key":"e_1_3_2_1_20_1","first-page":"1294","article-title":"Empirical studies on deep-learning-based security bug report prediction methods","volume":"31","author":"Zheng W","year":"2020","unstructured":"Zheng W, Chen JZ, Wu XX, Chen X, Xia X. Empirical studies on deep-learning-based security bug report prediction methods. Ruan Jian Xue Bao\/Journal of Software, 2020, 31(5): 1294-1313.","journal-title":"Ruan Jian Xue Bao\/Journal of Software"},{"key":"e_1_3_2_1_21_1","volume-title":"A neural attention model for abstractive sentence summarization. arXiv preprint arXiv: 1509.00685","author":"Rush AM","year":"2015","unstructured":"Rush AM, Chopra S, Weston J. A neural attention model for abstractive sentence summarization. arXiv preprint arXiv: 1509.00685, 2015."},{"key":"e_1_3_2_1_22_1","volume-title":"A deep reinforced model for abstractive summarization. arXiv preprint arXiv: 1705.04304","author":"Paulus R","year":"2017","unstructured":"Paulus R, Xiong C, Socher R. A deep reinforced model for abstractive summarization. arXiv preprint arXiv: 1705.04304, 2017."}],"event":{"name":"ICCDE 2024: 2024 10th International Conference on Computing and Data Engineering","location":"Bangkok Thailand","acronym":"ICCDE 2024"},"container-title":["Proceedings of the 2024 10th International Conference on Computing and Data Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641181.3641182","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3641181.3641182","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:10:40Z","timestamp":1755972640000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641181.3641182"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,15]]},"references-count":22,"alternative-id":["10.1145\/3641181.3641182","10.1145\/3641181"],"URL":"https:\/\/doi.org\/10.1145\/3641181.3641182","relation":{},"subject":[],"published":{"date-parts":[[2024,1,15]]},"assertion":[{"value":"2024-04-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}