Submitted:
28 February 2026
Posted:
02 March 2026
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Materials and Methods
2.1. Sample and Study Setting
2.2. Experimental Design and Control Setup
2.3. Measurement Methods and Quality Control
2.4. Data Processing and Model Formulation
2.5. Implementation Details and Reproducibility
3. Results and Discussion
3.1. Overall Fuzzing Performance on Linux Kernels
3.2. Deep-Path Exploration and Subsystem Behavior
3.3. Overhead, Ablation, and Stability of the Scheduler
3.4. Comparison with Related RL-Guided Fuzzers and Implications
4. Conclusion
References
- Gatla, O. R.; Zhang, D.; Xu, W.; Zheng, M. Understanding Persistent-memory-related Issues in the Linux Kernel. ACM Transactions on Storage 2023, 19(4), 1–28. [Google Scholar] [CrossRef]
- Li, T.; Jiang, Y.; Hong, E.; Liu, S. Organizational Development in High-Growth Biopharmaceutical Companies: A Data-Driven Approach to Talent Pipeline and Competency Modeling. 2025. [Google Scholar]
- Bai, W. Phishing website detection based on machine learning algorithm. 2020 International Conference on Computing and Data Science (CDS), 2020, August; ieee; pp. 293–298. [Google Scholar]
- Bulekov, A.; Das, B.; Hajnoczi, S.; Egele, M. No grammar, no problem: Towards fuzzing the linux kernel without system-call descriptions. Network and Distributed System Security (NDSS) Symposium, 2023, January. [Google Scholar]
- Ben Khadra, M. A.; Stoffel, D.; Kunz, W. Efficient binary-level coverage analysis. In Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020, November; pp. 1153–1164. [Google Scholar]
- Gu, X.; Tian, X.; Yang, J.; Liu, M. Building and Performance Validation of a Digital Twin Regulatory Framework for Financial Compliance and Market Transparency. 2025. [Google Scholar] [CrossRef]
- Kasri, W.; Himeur, Y.; Alkhazaleh, H. A.; Tarapiah, S.; Atalla, S.; Mansoor, W.; Al-Ahmad, H. From vulnerability to defense: The role of large language models in enhancing cybersecurity. Computation 2025, 13(2), 30. [Google Scholar] [CrossRef]
- Qin, F.; Cheng, H. Y.; Sneeringer, R.; Vlachostergiou, M.; Acharya, S.; Liu, H.; Yao, L. ExoForm: Shape memory and self-fusing semi-rigid wearables. Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems, 2021, May; pp. 1–8. [Google Scholar]
- Butkovic, M. Using Reinforcement Learning For Security Test Generation: A Systematic Mapping Study. 2024. [Google Scholar]
- Tan, L.; Liu, D.; Liu, X.; Wu, W.; Jiang, H. Efficient Grey Wolf Optimization: A High-Performance Optimizer with Reduced Memory Usage and Accelerated Convergence. 2025. [Google Scholar] [CrossRef]
- Scott, J.; Mora, F.; Ganesh, V. Banditfuzz: A reinforcement-learning based performance fuzzer for smt solvers. In International Workshop on Numerical Software Verification; Springer International Publishing: Cham, July 2020; pp. 68–86. [Google Scholar]
- Bai, W.; Wu, Q. Towards more effective responsible disclosure for vulnerability research. Proc. of EthiCS, 2023. [Google Scholar]
- Bertino, E.; Bhardwaj, S.; Cicala, F.; Gong, S.; Karim, I.; Katsis, C.; Mahgoub, A. Y. Software security analysis. In Machine learning techniques for cybersecurity; Springer International Publishing: Cham, 2023; pp. 47–69. [Google Scholar]
- Nian, J.; Yang, M.; Gao, X.; Liu, H.; Fang, F.; Cheng, L.; Wu, X. RPFF-PA: Reliable and Parallel Fault-tolerant Framework for Path Latency Reduction Deployed in Register Arrays. In ACM Transactions on Embedded Computing Systems; 2025. [Google Scholar]
- Ramakrishna, S. Dynamic Safety Assurance of Autonomous Cyber-Physical Systems. Doctoral dissertation, Vanderbilt University, 2022. [Google Scholar]
- Sheu, J. B.; Gao, X. Q. Alliance or no alliance—Bargaining power in competing reverse supply chains. European Journal of Operational Research 2014, 233(2), 313–325. [Google Scholar] [CrossRef]
- Nelson, L.; Van Geffen, J.; Torlak, E.; Wang, X. Specification and verification in the field: Applying formal methods to {BPF} just-in-time compilers in the linux kernel. 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20), 2020; pp. 41–61. [Google Scholar]
- Du, Y. Research on Deep Learning Models for Forecasting Cross-Border Trade Demand Driven by Multi-Source Time-Series Data. Journal of Science, Innovation & Social Impact 2025, 1(2), 63–70. [Google Scholar]
- Zomaya, A. Y.; Ward, C.; Macey, B. Genetic scheduling for parallel processor systems: comparative studies and performance issues. IEEE Transactions on Parallel and Distributed systems 2002, 10(8), 795–812. [Google Scholar] [CrossRef]
- Bogetti, A. T.; Mostofian, B.; Dickson, A.; Pratt, A. J.; Saglam, A. S.; Harrison, P. O.; Chong, L. T. A suite of tutorials for the WESTPA rare-events sampling software [Article v1. 0]. Living journal of computational molecular science 2019, 1(2), 10607. [Google Scholar] [CrossRef] [PubMed]
- Mao, Y.; Ma, X.; Li, J. Research on API Security Gateway and Data Access Control Model for Multi-Tenant Full-Stack Systems. 2025. [Google Scholar]
- Rottleuthner, M.; Schmidt, T. C.; Wählisch, M. Sense your power: The ECO approach to energy awareness for IoT devices. ACM Transactions on Embedded Computing Systems (TECS) 2021, 20(3), 1–25. [Google Scholar] [CrossRef]
- Mao, Y.; Ma, X.; Li, J. Research on Web System Anomaly Detection and Intelligent Operations Based on Log Modeling and Self-Supervised Learning. 2025. [Google Scholar] [CrossRef]
- Bulekov, A.; Das, B.; Hajnoczi, S.; Egele, M. No grammar, no problem: Towards fuzzing the linux kernel without system-call descriptions. Network and Distributed System Security (NDSS) Symposium, 2023, January. [Google Scholar]
- Liu, S.; Feng, H.; Liu, X. A Study on the Mechanism of Generative Design Tools’ Impact on Visual Language Reconstruction: An Interactive Analysis of Semantic Mapping and User Cognition; Authorea Preprints, 2025. [Google Scholar]


Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).