{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T17:45:34Z","timestamp":1769535934140,"version":"3.49.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,1]]},"DOI":"10.1109\/cloudnet59005.2023.10490075","type":"proceedings-article","created":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T13:51:58Z","timestamp":1712670718000},"page":"229-237","source":"Crossref","is-referenced-by-count":3,"title":["From Ambiguity to Explicitness: NLP-Assisted 5G Specification Abstraction for Formal Analysis"],"prefix":"10.1109","author":[{"given":"Shiyu","family":"Yuan","sequence":"first","affiliation":[{"name":"Stevens Institute of Technology,Hoboken,NJ"}]},{"given":"Jingda","family":"Yang","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology,Hoboken,NJ"}]},{"given":"Sudhanshu","family":"Arya","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology,Hoboken,NJ"}]},{"given":"Carlo","family":"Lipizzi","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology,Hoboken,NJ"}]},{"given":"Ying","family":"Wang","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology,Hoboken,NJ"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Formal and fuzzing amplification: Targeting vulnerability detection in 5g and beyond","author":"Yang","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3369613"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243846"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51644.2023.10059624"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354263"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN51631.2021.9477326"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MeditCom49071.2021.9647461"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR54439.2022.9831286"},{"key":"ref9","article-title":"Machine learning-assisted bayesian inference for jamming detection in 5g nr","author":"Jere","year":"2023"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12132838"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/drones7070479"},{"key":"ref12","article-title":"Radar altimeter redesign for multi-stage interference risk mitigation in 5g and beyond","author":"Rock","year":"2023"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SoSE59841.2023.10178673"},{"key":"ref14","article-title":"Distributed 3d-beam reforming for hovering-tolerant uavs communication over coexistence: A deep-q learning for intelligent space-air-ground integrated networks","author":"Arya","year":"2023"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom54947.2022.9982756"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5220\/0010837600003123"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet59005.2023.10490042"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2019.00082"},{"key":"ref19","article-title":"5G; NR; Radio Resource Control (RRC); Protocol specification","journal-title":"3rd Generation Partnership Project (3GPP), Technical Specification (TS) 38.331, 07 2020, version 16.1.0"},{"key":"ref20","article-title":"Speech and language processing: An introduction to natural language processing, computational linguistics, and speech recognition","author":"Jurafsky"},{"key":"ref21","article-title":"Knowledge graph anchored information-extraction for domain-specific insights","author":"Khetan","year":"2021"},{"key":"ref22","article-title":"Information extraction in domain and generic documents: Findings from heuristic-based and data-driven approaches","author":"Yuan","year":"2023"},{"key":"ref23","article-title":"Cyner: A python library for cybersecurity named entity recognition","author":"Alam","year":"2022"},{"key":"ref24","first-page":"28","article-title":"The tradeoffs between open and traditional relation extraction","volume-title":"Proceedings of ACL-08: HLT","author":"Banko"},{"key":"ref25","article-title":"Tabula: A language to model spreadsheet tables","author":"Mendes","year":"2017"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/p14-5010"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref28","article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3560815"}],"event":{"name":"2023 IEEE 12th International Conference on Cloud Networking (CloudNet)","location":"Hoboken, NJ, USA","start":{"date-parts":[[2023,11,1]]},"end":{"date-parts":[[2023,11,3]]}},"container-title":["2023 IEEE 12th International Conference on Cloud Networking (CloudNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10490006\/10490015\/10490075.pdf?arnumber=10490075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T04:34:20Z","timestamp":1769488460000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10490075\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,1]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/cloudnet59005.2023.10490075","relation":{},"subject":[],"published":{"date-parts":[[2023,11,1]]}}}