{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:43:52Z","timestamp":1772905432670,"version":"3.50.1"},"reference-count":170,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179445","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"864-881","source":"Crossref","is-referenced-by-count":9,"title":["SoK: Anti-Facial Recognition Technology"],"prefix":"10.1109","author":[{"given":"Emily","family":"Wenger","sequence":"first","affiliation":[{"name":"University of Chicago"}]},{"given":"Shawn","family":"Shan","sequence":"additional","affiliation":[{"name":"University of Chicago"}]},{"given":"Haitao","family":"Zheng","sequence":"additional","affiliation":[{"name":"University of Chicago"}]},{"given":"Ben Y.","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of Chicago"}]}],"member":"263","reference":[{"key":"ref1","article-title":"The perpetual lineup","author":"Garvie","year":"2016","journal-title":"Georgetown Law Center on Privacy and Technology"},{"key":"ref2","article-title":"Twelve Days in Xinjiang: How China\u2019s Surveillance State Overwhelms Daily Life","author":"Chin","year":"2017","journal-title":"The Wall Street Journal"},{"key":"ref3","article-title":"One month, 500,000 face scans: How China is using AI to profile a minority","volume":"14","author":"Mozur","year":"2019","journal-title":"The New York Times"},{"key":"ref4","article-title":"How Russia is using facial recognition to police its coronavirus lockdown","author":"Reevell","year":"2021","journal-title":"ABC News"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1201\/9781003278290-26"},{"key":"ref6","article-title":"Clearview AI\u2019s Facial Recognition App Called Illegal in Canada","author":"Hill","year":"2021","journal-title":"The New York Times"},{"key":"ref7","article-title":"Collection of Biometric Data from Aliens Upon Entry to and Departure from the United States","year":"2020","journal-title":"USCBP-2020-0062"},{"key":"ref8","article-title":"Ongoing Face Recognition Vendor Test (FRVT)","author":"Grother","year":"2018","journal-title":"NIST"},{"key":"ref9","article-title":"America Under Watch","author":"Garvie","year":"2019","journal-title":"Georgetown Law Center on Privacy and Technology"},{"key":"ref10","article-title":"Face Recognition at the Sales Office","author":"Pan","year":"2020","journal-title":"AI Outpost"},{"key":"ref11","article-title":"Fears for children\u2019s privacy as Delhi schools install facial recognition","author":"Chandran","year":"2021","journal-title":"Reuters"},{"key":"ref12","article-title":"Amazon extends moratorium on police use of facial recognition technology","author":"Jeans","year":"2020","journal-title":"Forbes"},{"key":"ref13","article-title":"IBM CEO\u2019s Letter to Congress on Racial Justice Reform","author":"Krishna","year":"2020"},{"key":"ref14","article-title":"Ban dangerous facial recognition technology that amplifies racist policing","year":"2021","journal-title":"Amnesty International"},{"key":"ref15","article-title":"Stop facial recognition","volume-title":"Big Brother Watch","year":"2021"},{"key":"ref16","article-title":"Facebook plans to shut down its facial recognition program","author":"Rodriguez","year":"2021","journal-title":"CNBC"},{"key":"ref17","article-title":"DeepBlur: A simple and effective method for natural image obfuscation","author":"Li","year":"2021"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.06.039"},{"key":"ref19","article-title":"Fawkes: Protecting Privacy Against Unauthorized Deep Learning Models","volume-title":"Proc. of USENIX Security","author":"Shan"},{"key":"ref20","article-title":"Unlearnable examples: Making personal data unexploitable","volume-title":"Proc. of ICLR","author":"Huang"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0044"},{"key":"ref22","article-title":"LowKey: Leveraging Adversarial Attacks to Protect Social Media Users from Facial Recognition","volume-title":"Proc. of ICLR","author":"Cherepanova"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0008"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58548-8_1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00105"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58558-7_39"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0032"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102993"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00415"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412236"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376434"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3449177"},{"key":"ref33","article-title":"CV Dazzle: Camouflage from face detection","volume-title":"Master\u2019s thesis","author":"Harvey","year":"2010"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3096024"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.01.041"},{"key":"ref36","article-title":"Gender shades: Intersectional accuracy disparities in commercial gender classification","volume-title":"Proc. of FaaCT","author":"Buolamwini"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2020.102809"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1162\/jocn.1991.3.1.71"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/34.598228"},{"key":"ref40","article-title":"The world\u2019s scariest facial recognition company, explained","author":"Heilweil","year":"2020"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00552"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01400"},{"key":"ref46","article-title":"Amazon rekognition"},{"key":"ref47","article-title":"Facial Recognition Technology: Privacy and Accuracy Issues Related to Commercial Uses","year":"2020","journal-title":"GAO-20-522"},{"key":"ref48","article-title":"Facial Recognition Technology: Federal Law Enforcement Agencies Should Better Assess Privacy and Other Risks","year":"2021","journal-title":"GAO-21-518"},{"key":"ref49","volume-title":"Idemia"},{"key":"ref50","volume-title":"Clearview.ai"},{"key":"ref51","volume-title":"Azure face recognition"},{"key":"ref52","volume-title":"Amazon rekognition"},{"key":"ref53","volume-title":"Megvii"},{"key":"ref54","volume-title":"Sensetime"},{"key":"ref55","volume-title":"Yitu"},{"key":"ref56","volume-title":"Cloudwalk"},{"key":"ref57","article-title":"Build your own face recognition service using amazon rekognition","author":"Petters","journal-title":"AWS Machine Learning Blog"},{"key":"ref58","article-title":"Inside the creepy and impressive startup funded by the Chinese government that is developing AI that can recognize anyone, anywere","author":"Jacobs","year":"2018","journal-title":"Business Insider"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"ref60","article-title":"Garbage In, Garbage Out: Face Recognition on Flawed Data","author":"Garvie","journal-title":"Georgetown Law Center on Privacy and Technology"},{"key":"ref61","article-title":"Huawei\/Megvii Uyghur Alarms","year":"2020"},{"key":"ref62","article-title":"Biometric Breakthrough: How CBP is Meeting Its Mandate and Keeping America Safe","author":"Mason","journal-title":"U.S. Customs and Border Protection Website"},{"key":"ref63","article-title":"Game Over: Chinese Company Deploys Facial Recognition to Limit Youths\u2019 Play","author":"May","year":"2021","journal-title":"New York Times"},{"key":"ref64","article-title":"Facial recognition tech fights coronavirus in Chinese city","year":"2020","journal-title":"France24 News"},{"key":"ref65","article-title":"Mapped: The State of Facial Recognition Around the World","author":"Capitalist","year":"2020"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46487-9_6"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00020"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025068"},{"key":"ref69","article-title":"Learning Face Representation from Scratch","author":"Yi","year":"2014"},{"key":"ref70","article-title":"Facial Recognition: CBP and TSA are Taking Steps to Implement Programs, but CBP Should Address Privacy and System Performance Issues","year":"2020","journal-title":"GAO-20-568"},{"key":"ref71","article-title":"China State TV Exposes Wide Illegal Use Of Facial Recognition Cameras In Commercial Properties","year":"2021","journal-title":"China Money Network"},{"key":"ref72","article-title":"Hong Kong protesters are using lasers to distract and confuse. Police are shining lights right back","author":"Mahtani","year":"2019","journal-title":"The Washington Post"},{"key":"ref73","article-title":"Here\u2019s a way forward on facial recognition","author":"Friedman","year":"2019","journal-title":"The New York Times"},{"key":"ref74","article-title":"Defund facial recognition","author":"Devich-Cyril","year":"2020","journal-title":"The Atlantic"},{"key":"ref75","article-title":"More Than Half of U.S. Adults Trust Law Enforcement to Use Facial Recognition Responsibly","author":"Smith","year":"2019","journal-title":"Pew Research Center"},{"key":"ref76","article-title":"Beyond Face Value: Public Attitudes to Facial Recognition Technology","year":"2019"},{"key":"ref77","article-title":"Facial Recognition: A cross-national Survey on Public Acceptance, Privacy, and Discrimination","volume-title":"Proc. of ICML LML Workshop","author":"Steinacker"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106894"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423347"},{"key":"ref80","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-36504-4_11","article-title":"Privacy tradeoffs: Myth or reality?","volume-title":"Proc. of FC","author":"Wright"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445885"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr46437.2021.01498"},{"key":"ref83","article-title":"Naturalistic physical adversarial patch for object detectors","volume-title":"Proc. of ICCV","author":"Chen"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33720-9_44"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86608-2_3"},{"key":"ref86","article-title":"Disrupting model training with adversarial shortcuts","author":"Evtimov","year":"2021"},{"key":"ref87","article-title":"Robust unlearnable examples: Protecting data privacy against adversarial learning","volume-title":"Proc. of ICLR","author":"Fu"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/2502081.2502121"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2019.00215"},{"key":"ref91","article-title":"Invisible mask: Practical attacks on face recognition with infrared","author":"Zhou","year":"2018"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00790"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8803269"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ijcb48548.2020.9304898"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/3351261"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/BIOSIG52210.2021.9548291"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00387"},{"key":"ref98","article-title":"You are how you click: Clickstream analysis for sybil detection","volume-title":"Proc. of USENIX Security","author":"Wang"},{"key":"ref99","first-page":"275","article-title":"Robots welcome: Ethical and legal considerations for web crawling and scraping","volume":"13","author":"Gold","year":"2017","journal-title":"Wash. JL Tech. & Arts"},{"key":"ref100","article-title":"Detection of web scraping using machine learning","author":"Parikh","year":"2018","journal-title":"Open access international journal of Science and Engineering"},{"key":"ref101","article-title":"Detection of web api content scraping: An empirical study of machine learning algorithms","author":"Jawad","year":"2017"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2015.7275720"},{"key":"ref103","article-title":"Scraping by the Numbers","author":"Clark","year":"2021","journal-title":"Facebook blog"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313742"},{"key":"ref105","volume-title":"Pimeyes"},{"key":"ref106","article-title":"Major Tech Company Using Facial Recognition to ID Workers","author":"Rogoway","year":"2020","journal-title":"The Oregonian"},{"key":"ref107","article-title":"Apple sued in nightmare case involving teen wrongly accused of shoplifting, driver\u2019s permit used by impostor, and unreliable facial-rec tech","author":"Clayburn","year":"2021","journal-title":"The Register"},{"key":"ref108","article-title":"Walmart\u2019s Use of Sci-fi Tech To Spot Shoplifters Raises Privacy Questions","author":"Roberts","year":"2015","journal-title":"Fortune"},{"key":"ref109","article-title":"How to protect your phone and identity at protests","year":"2021","journal-title":"Amnesty International"},{"key":"ref110","article-title":"How to disappear on Happiness Avenue in Beijing","author":"Ni","year":"2020","journal-title":"BBC"},{"key":"ref111","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11302"},{"key":"ref114","article-title":"Sparse Adversarial Attack to Object Detection","author":"Bao","year":"2020"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969125"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref117","article-title":"We Can Always Catch You: Detecting Adversarial Patched Objects WITH or WITHOUT Signature","author":"Liang","year":"2021"},{"key":"ref118","article-title":"Segment and Complete: Defending Object Detectors against Adversarial Patch Attacks with Robust Patch Detection","author":"Liu","year":"2021"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484757"},{"key":"ref120","article-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain","volume-title":"Proc. of Machine Learning and Computer Security Workshop","author":"Gu"},{"key":"ref121","article-title":"Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning","author":"Chen","year":"2017"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref123","article-title":"Transferable clean-label poisoning attacks on deep neural nets","volume-title":"Proc. of ICML","author":"Zhu"},{"key":"ref124","article-title":"Poison frogs! targeted clean-label poisoning attacks on neural networks","volume-title":"Proc. of NeurIPS","author":"Shafahi"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134057"},{"key":"ref126","article-title":"Defense-gan: Protecting classifiers against adversarial attacks using generative models","author":"Samangouei","year":"2018"},{"key":"ref127","article-title":"Stochastic activation pruning for robust adversarial defense","author":"Dhillon","year":"2018"},{"key":"ref128","article-title":"Magnet and \u2018efficient defenses against adversarial attacks are not robust to adversarial examples","author":"Carlini","year":"2017"},{"key":"ref129","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","volume-title":"Proc. of ICML","author":"Athalye"},{"key":"ref130","article-title":"On adaptive attacks to adversarial example defenses","volume-title":"Proc. of NeurIPS","author":"Tramer"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90567-5_28"},{"key":"ref132","article-title":"Data poisoning won\u2019t save you from facial recognition","author":"Radiya-Dixit","year":"2021","journal-title":"arXiv"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/fg57933.2023.10042617"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2008.925384"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01443"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01491"},{"key":"ref137","article-title":"A Photo Used To Be Worth A Thousand Words, But Thanks To Social Media Photos Have Lost Their Value","author":"Suciu","year":"2019","journal-title":"Forbes online"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23119"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref140","article-title":"Radioactive data: tracing through training","volume-title":"Proc. of ICML","author":"Sablayrolles"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2038751"},{"key":"ref142","article-title":"Facial Recognition Market Size, Share and Trends Report, 2021 - 2028","year":"2021"},{"key":"ref143","article-title":"This Israeli Face-recognition Startup is Secretly Tracking Palestinians","author":"Ziv","year":"2019"},{"key":"ref144","article-title":"Chinese Police Use Face Recognition to Find Child Abducted 30 Years Ago","year":"2020"},{"key":"ref145","article-title":"Pinellas County Sheriff\u2019s Office Facial Recognition Program","volume-title":"Pinellas County Sheriff\u2019s Office","year":"2019"},{"key":"ref146","article-title":"International statement: End-to-end encryption and public safety","year":"2020","journal-title":"United States Department of Justice, press release"},{"key":"ref147","article-title":"Robustness disparities in commercial face detection","author":"Dooley","year":"2021"},{"key":"ref148","article-title":"Fairness Properties of Face Recognition and Obfuscation Systems","author":"Rosenberg","year":"2021"},{"key":"ref149","article-title":"Bias and Fairness of Evasion Attacks in Image Perturbation","volume-title":"All Master\u2019s Theses","author":"Qin","year":"2021"},{"key":"ref150","article-title":"Surveillance state: how Gulf governments keep watch on us","author":"Mackenzie","year":"2021","journal-title":"Wired Magazine"},{"key":"ref151","article-title":"How Facial Recognition is Taking Over a French City","author":"Kayali","year":"2019","journal-title":"Politico"},{"key":"ref152","article-title":"Kenyan police launch facial recognition on urban CCTV network","author":"Burt","year":"2018","journal-title":"Biometric Update"},{"key":"ref153","article-title":"Police facial recognition use in Belarus, Greece, Myanmar raises rights, data privacy concerns","author":"Pivcevic","year":"2021","journal-title":"Biometric Update"},{"key":"ref154","article-title":"Independent Report on the London Metropolitan Police Service\u2019s Trial of Live Facial Recognition Technology","author":"Fussey","year":"2019"},{"key":"ref155","article-title":"China exports facial ID technology to Zimbabwe","volume":"12","author":"Jie","year":"2018","journal-title":"Global Times"},{"key":"ref156","article-title":"Buenos Aires is using facial recognition system that tracks child suspects, rights group says","author":"Mellen","year":"2020","journal-title":"The Washington Post"},{"key":"ref157","article-title":"We are hurtling towards a surveillance state: the rise of facial recognition technology","author":"Devlin","year":"2019","journal-title":"The Guardian"},{"key":"ref158","article-title":"Inside China\u2019s Dystopian Dreams: A.I., Shame and Lots of Cameras","author":"Mozur","year":"2018","journal-title":"The New York Times"},{"key":"ref159","article-title":"Malaysian police adopt Chinese AI surveillance technology","author":"Tan","year":"2018","journal-title":"Nikkei Asia"},{"key":"ref160","article-title":"Facial recognition in schools: systems deployed in Europe and the US amid privacy concerns","author":"Mascillno","year":"2021","journal-title":"Biometric Update"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1080\/17439884.2020.1686014"},{"key":"ref162","article-title":"System soon to identify risky goods, individuals at borders","author":"Khan","year":"2020","journal-title":"Dawn News"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-020-03188-2"},{"key":"ref164","article-title":"The retail stores you probably shop at that use facial-recognition technology","author":"Towney","year":"2021","journal-title":"Business Insider"},{"key":"ref165","article-title":"We went inside Alibaba\u2019s global headquarters. Here\u2019s what we saw","author":"Saiidi","year":"2019"},{"key":"ref166","article-title":"In-Car Biometric Technology For Human Interaction","year":"2020","journal-title":"Hyundai Motor Group, blog article"},{"key":"ref167","article-title":"Subaru Forester Is First Mainstream Model To Offer Facial Recognition Technology","author":"Lyon","year":"2018","journal-title":"Forbes"},{"key":"ref168","article-title":"JetBlue will test facial recognition for boarding","author":"Smith","year":"2017","journal-title":"CNN Business"},{"key":"ref169","article-title":"Could facial recognition be the future of airport security? Delta Air Lines is testing it out","year":"2021","journal-title":"CBS News"},{"key":"ref170","article-title":"Because There Were Cameras, I Didnt Ask Any Questions","author":"Byler","year":"2020","journal-title":"China File"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,5,21]]},"end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179445.pdf?arnumber=10179445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,21]],"date-time":"2024-07-21T04:18:29Z","timestamp":1721535509000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179445\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":170,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179445","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}