共 23 条
[1]
Almagableh A, 2017, International Journal of Performability Engineering, V13, P73, DOI [10.23940/ijpe.17.01.p6.7386, DOI 10.23940/ijpe.17.01.p6.7386, 10.23940/ijpe.17.01.p6.7386, DOI 10.23940/IJPE.17.01.P6.7386, 10.1515/polyeng-2013-0244]
[2]
Auer P, 1995, AN S FDN CO, P322, DOI 10.1109/SFCS.1995.492488
[4]
Regret Analysis of Stochastic and Nonstochastic Multi-armed Bandit Problems
[J].
FOUNDATIONS AND TRENDS IN MACHINE LEARNING,
2012, 5 (01)
:1-122
[5]
Angora: Efficient Fuzzing by Principled Search
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2018,
:711-725
[6]
LAVA: Large-scale Automated Vulnerability Addition
[J].
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2016,
:110-121
[7]
Huang HQ, 2022, P IEEE S SECUR PRIV, P36, DOI [10.1109/SP46214.2022.00007, 10.1109/SP46214.2022.9833751]
[8]
Evaluating Fuzz Testing
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:2123-2138
[9]
Kun Jeremy, 2024, Adversarial bandits and the exp3 algorithm
[10]
CEREBRO: Context-Aware Adaptive Fuzzing for Effective Vulnerability Detection
[J].
ESEC/FSE'2019: PROCEEDINGS OF THE 2019 27TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING,
2019,
:533-544