{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T15:34:55Z","timestamp":1777736095334,"version":"3.51.4"},"reference-count":87,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["IIS2107224"],"award-info":[{"award-number":["IIS2107224"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"ONR","doi-asserted-by":"publisher","award":["N000142312124"],"award-info":[{"award-number":["N000142312124"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Visual. Comput. Graphics"],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1109\/tvcg.2025.3549537","type":"journal-article","created":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T17:38:32Z","timestamp":1741628312000},"page":"2756-2766","source":"Crossref","is-referenced-by-count":18,"title":["Explainable XR: Understanding User Behaviors of XR Environments Using LLM-Assisted Analytics Framework"],"prefix":"10.1109","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-2341-3862","authenticated-orcid":false,"given":"Yoonsang","family":"Kim","sequence":"first","affiliation":[{"name":"Center for Visual Computing at Stony Brook University, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2000-6823","authenticated-orcid":false,"given":"Zainab","family":"Aamir","sequence":"additional","affiliation":[{"name":"Center for Visual Computing at Stony Brook University, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6477-1495","authenticated-orcid":false,"given":"Mithilesh","family":"Singh","sequence":"additional","affiliation":[{"name":"Center for Visual Computing at Stony Brook University, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6644-5983","authenticated-orcid":false,"given":"Saeed","family":"Boorboor","sequence":"additional","affiliation":[{"name":"Center for Visual Computing at Stony Brook University, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0996-8590","authenticated-orcid":false,"given":"Klaus","family":"Mueller","sequence":"additional","affiliation":[{"name":"Center for Visual Computing at Stony Brook University, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0796-6196","authenticated-orcid":false,"given":"Arie E.","family":"Kaufman","sequence":"additional","affiliation":[{"name":"Center for Visual Computing at Stony Brook University, New York, USA"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Apple. Developer","year":"2024"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2023.1122200"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/VRW62533.2024.00241"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/tvcg.2023.3340770"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2023.3332511"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3611659.3615695"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-019-01242-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3279778.3279795"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445651"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN60899.2024.10651056"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/tvcg.2023.3327396"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/tvcg.2024.3456388"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2024.3413195"},{"key":"ref14","volume-title":"Cognitive3d","year":"2024"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3626705.3627803"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2019.2934785"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3448018.3458008"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642579"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/VRW58643.2023.00105"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.acl-demo.11"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3654777.3676379"},{"key":"ref22","article-title":"Do llms know about hallucination? an empirical investigation of llm\u2019s hidden states","author":"Duan","year":"2024","journal-title":"arXiv preprint"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3698130"},{"key":"ref24","author":"Feldman","year":"2023","journal-title":"Trapping llm hallucinations using tagged context prompts"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445576"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3531073.3534472"},{"key":"ref27","author":"Guo","year":"2023","journal-title":"Evaluating large language models: A comprehensive survey"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR-Adjunct57072.2022.00080"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3355089.3356490"},{"key":"ref30","author":"Huang","year":"2024","journal-title":"Towards llm-powered verilog rtl assistant: Self-verification and self-correction"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517550"},{"key":"ref32","first-page":"415","article-title":"Enabling {Fine-Grained} permissions for augmented reality applications with recognizers","volume-title":"Proc. of USENIX Security","author":"Jana","year":"2013"},{"key":"ref33","article-title":"Unified user-centric context: Who, where, when, what, how and why","volume-title":"Proc. of ubiPCMM","author":"Jang"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580760"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2024.3372107"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.123"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517542"},{"key":"ref38","author":"Kadavath","year":"2022","journal-title":"Language models (mostly) know what they know"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2407707.2407727"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3592433"},{"key":"ref41","first-page":"1","article-title":"Do I Just Tap My Headset? How Novice Users Discover Gestural Interactions with Consumer Augmented Reality Applications","volume-title":"Proc. of IMWUT","author":"Khurana","year":"2024"},{"key":"ref42","article-title":"Design of privacy preservation system in augmented reality","volume-title":"Proc. of VizSec","author":"Kim","year":"2021"},{"key":"ref43","first-page":"929","article-title":"Erebus: Access control for augmented reality systems","volume-title":"Proc. of USENIX Security","author":"Kim","year":"2023"},{"issue":"2","key":"ref44","first-page":"1171","article-title":"Shared surfaces and spaces: Collaborative data visualisation in a co-located immersive environment","volume":"27","author":"Lee","year":"2020","journal-title":"IEEE TVCG"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3485444.3487642"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-main.20"},{"key":"ref47","author":"Lin","year":"2022","journal-title":"Teaching models to express their uncertainty in words"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3631700.3665185"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580715"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-demo.31"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/IT-ELA50150.2020.9253082"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/VRW62533.2024.00095"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3503250"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2019.8797777"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2019.2898763"},{"key":"ref56","first-page":"895","article-title":"Unique Identification of 50,000+ Virtual Reality Users from Head & Hand Motion Data","volume-title":"Proc. of USENIX Security","author":"Nair","year":"2023"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639187"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376330"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3562939.3565630"},{"key":"ref60","volume-title":"Learning to reason with llms","year":"2024"},{"key":"ref61","volume-title":"Openai o1 system card","year":"2024"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3132818.3132822"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01741"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3573381.3596150"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660319"},{"key":"ref66","author":"Romero","year":"2023","journal-title":"GaitGuard: Towards Private Gait in Mixed Reality"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445426"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/GEN4DS63889.2024.00008"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/tvcg.2022.3148007"},{"key":"ref70","first-page":"159","article-title":"Going through the motions:ar\/vr keylogging from user head motions","volume-title":"Proc. of USENIX Security","author":"Slocum","year":"2023"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.3389\/frvir.2022.912078"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173996"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3197517.3201294"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2023.3247113"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3524273.3532909"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/VRW62533.2024.00089"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3526113.3545656"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2018.8448289"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/tvcg.2021.3099002"},{"key":"ref82","author":"Xu","year":"2024","journal-title":"Hallucination is inevitable: An innate limitation of large language models"},{"key":"ref83","author":"Yao","year":"2023","journal-title":"Llm lies: Hallucinations are not bugs, but features as adversarial examples"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2022.3150520"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/caidcd.2010.5681344"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3611659.3615718"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/tvcg.2020.3030343"},{"key":"ref88","first-page":"3979","article-title":"It\u2019s all in your head (se): Side-channel attacks on ar\/r systems","volume-title":"Proc. of USENIX Security","author":"Zhang","year":"2023"},{"key":"ref89","article-title":"Leva: Using large language models to enhance visual analytics","author":"Zhao","year":"2024","journal-title":"IEEE TVCG"}],"container-title":["IEEE Transactions on Visualization and Computer Graphics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/2945\/10977053\/10919202.pdf?arnumber=10919202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,26]],"date-time":"2025-04-26T05:08:43Z","timestamp":1745644123000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10919202\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":87,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tvcg.2025.3549537","relation":{},"ISSN":["1077-2626","1941-0506","2160-9306"],"issn-type":[{"value":"1077-2626","type":"print"},{"value":"1941-0506","type":"electronic"},{"value":"2160-9306","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5]]}}}