{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T15:51:55Z","timestamp":1776441115811,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,10]],"date-time":"2018-06-10T00:00:00Z","timestamp":1528588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1266183, 1423061\/1422417, 1564104\/1564046"],"award-info":[{"award-number":["1266183, 1423061\/1422417, 1564104\/1564046"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,10]]},"DOI":"10.1145\/3210240.3210344","type":"proceedings-article","created":{"date-parts":[[2018,7,6]],"date-time":"2018-07-06T12:36:06Z","timestamp":1530880566000},"page":"296-309","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":53,"title":["Brain Password"],"prefix":"10.1145","author":[{"given":"Feng","family":"Lin","sequence":"first","affiliation":[{"name":"University at Buffalo, the State University of New York, Buffalo, New York, USA and University of Colorado Denver, Denver, Colorado, USA"}]},{"given":"Kun Woo","family":"Cho","sequence":"additional","affiliation":[{"name":"University at Buffalo, the State University of New York, Buffalo, New York, USA"}]},{"given":"Chen","family":"Song","sequence":"additional","affiliation":[{"name":"University at Buffalo, the State University of New York, Buffalo, New York, USA"}]},{"given":"Wenyao","family":"Xu","sequence":"additional","affiliation":[{"name":"University at Buffalo, the State University of New York, Buffalo, New York, USA"}]},{"given":"Zhanpeng","family":"Jin","sequence":"additional","affiliation":[{"name":"University at Buffalo, the State University of New York, Buffalo, New York, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,6,10]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"The Kendall rank correlation coefficient. Encyclopedia of Measurement and Statistics","author":"Abdi Herv\u00e9","year":"2007","unstructured":"Herv\u00e9 Abdi . 2007. The Kendall rank correlation coefficient. Encyclopedia of Measurement and Statistics . Sage , Thousand Oaks, CA ( 2007 ), 508--510. Herv\u00e9 Abdi. 2007. The Kendall rank correlation coefficient. Encyclopedia of Measurement and Statistics. Sage, Thousand Oaks, CA (2007), 508--510."},{"key":"e_1_3_2_2_2_1","volume-title":"Methods of EEG signal features extraction using linear analysis in frequency and time-frequency domains. ISRN neuroscience","author":"Al-Fahoum Amjed S","year":"2014","unstructured":"Amjed S Al-Fahoum and Ausilah A Al-Fraihat . 2014. Methods of EEG signal features extraction using linear analysis in frequency and time-frequency domains. ISRN neuroscience ( 2014 ). Amjed S Al-Fahoum and Ausilah A Al-Fraihat. 2014. Methods of EEG signal features extraction using linear analysis in frequency and time-frequency domains. ISRN neuroscience (2014)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-005-9001-0"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1523\/JNEUROSCI.4343-05.2006"},{"key":"e_1_3_2_2_5_1","volume-title":"Memory: Anatomical organization of candidate brain regions. Comprehensive Physiology","author":"Amaral David G","year":"1987","unstructured":"David G Amaral . 1987 . Memory: Anatomical organization of candidate brain regions. Comprehensive Physiology (1987). David G Amaral. 1987. Memory: Anatomical organization of candidate brain regions. Comprehensive Physiology (1987)."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.04.025"},{"key":"e_1_3_2_2_7_1","volume-title":"5th IEEE International Coference on Neural Engineering","author":"Ashby Corey","unstructured":"Corey Ashby , Amit Bhatia , Francesco Tenore , and Jacob Vogelstein . 2011. Low-cost electroencephalogram (EEG) based authentication . In 5th IEEE International Coference on Neural Engineering . IEEE , 442--445. Corey Ashby, Amit Bhatia, Francesco Tenore, and Jacob Vogelstein. 2011. Low-cost electroencephalogram (EEG) based authentication. In 5th IEEE International Coference on Neural Engineering. IEEE, 442--445."},{"key":"e_1_3_2_2_8_1","volume-title":"Proc. of the Symposium on Usable Privacy and Security.","author":"Bailey Daniel V","year":"2014","unstructured":"Daniel V Bailey , Markus D\u00fcrmuth , and Christof Paar . 2014 . Typing passwords with voice recognition: How to authenticate to Google Glass . In Proc. of the Symposium on Usable Privacy and Security. Daniel V Bailey, Markus D\u00fcrmuth, and Christof Paar. 2014. Typing passwords with voice recognition: How to authenticate to Google Glass. In Proc. of the Symposium on Usable Privacy and Security."},{"key":"e_1_3_2_2_9_1","volume-title":"International Conference on Biometrics. Springer, 265--272","author":"Baldisserra Denis","year":"2006","unstructured":"Denis Baldisserra , Annalisa Franco , Dario Maio , and Davide Maltoni . 2006 . Fake fingerprint detection by odor analysis . In International Conference on Biometrics. Springer, 265--272 . Denis Baldisserra, Annalisa Franco, Dario Maio, and Davide Maltoni. 2006. Fake fingerprint detection by odor analysis. In International Conference on Biometrics. Springer, 265--272."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1523\/JNEUROSCI.4163-07.2007"},{"key":"e_1_3_2_2_11_1","volume-title":"d.}. EEG test. https:\/\/www.betterhealth.vic.gov.au\/health\/-conditionsandtreatments\/eeg-test Accessed by","year":"2017","unstructured":"BetterHealth. {n. d.}. EEG test. https:\/\/www.betterhealth.vic.gov.au\/health\/-conditionsandtreatments\/eeg-test Accessed by September 17, 2017 . BetterHealth. {n. d.}. EEG test. https:\/\/www.betterhealth.vic.gov.au\/health\/-conditionsandtreatments\/eeg-test Accessed by September 17, 2017."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2002.808031"},{"key":"e_1_3_2_2_13_1","volume-title":"Hacking Mobile Phones Using 2D Printed Fingerprints. PasswordResearch","author":"Cao Kai","year":"2016","unstructured":"Kai Cao and Anil K Jain . 2016. Hacking Mobile Phones Using 2D Printed Fingerprints. PasswordResearch ( 2016 ). Kai Cao and Anil K Jain. 2016. Hacking Mobile Phones Using 2D Printed Fingerprints. PasswordResearch (2016)."},{"key":"e_1_3_2_2_14_1","unstructured":"Chaos Computer Club (CCC). 2014. Fingerprint biometrics hacked again. http:\/\/www.ccc.de\/en\/updates\/2014\/ursel. Accessed by May 13 2017.  Chaos Computer Club (CCC). 2014. Fingerprint biometrics hacked again. http:\/\/www.ccc.de\/en\/updates\/2014\/ursel. Accessed by May 13 2017."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_3_2_2_16_1","volume-title":"Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case. In International Conference on Applied Cryptography and Network Security. Springer, 648--665","author":"Chauhan Jagmohan","year":"2016","unstructured":"Jagmohan Chauhan , Hassan Jameel Asghar , Anirban Mahanti , and Mohamed Ali Kaafar . 2016 . Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case. In International Conference on Applied Cryptography and Network Security. Springer, 648--665 . Jagmohan Chauhan, Hassan Jameel Asghar, Anirban Mahanti, and Mohamed Ali Kaafar. 2016. Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case. In International Conference on Applied Cryptography and Network Security. Springer, 648--665."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41320-9_1"},{"key":"e_1_3_2_2_18_1","volume-title":"Palmhashing: a novel approach for cancelable biometrics. Information processing letters 93, 1","author":"Connie Tee","year":"2005","unstructured":"Tee Connie , Andrew Teoh , Michael Goh , and David Ngo . 2005. Palmhashing: a novel approach for cancelable biometrics. Information processing letters 93, 1 ( 2005 ), 1--5. Tee Connie, Andrew Teoh, Michael Goh, and David Ngo. 2005. Palmhashing: a novel approach for cancelable biometrics. Information processing letters 93, 1 (2005), 1--5."},{"key":"e_1_3_2_2_19_1","volume-title":"IEEE International Joint Conference on Neural Networks. IEEE, 3145--3152","author":"Seno Bernardo Dal","year":"2008","unstructured":"Bernardo Dal Seno , Matteo Matteucci , and Luca Mainardi . 2008 . A genetic algorithm for automatic feature extraction in P300 detection . In IEEE International Joint Conference on Neural Networks. IEEE, 3145--3152 . Bernardo Dal Seno, Matteo Matteucci, and Luca Mainardi. 2008. A genetic algorithm for automatic feature extraction in P300 detection. In IEEE International Joint Conference on Neural Networks. IEEE, 3145--3152."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSRE.2013.2254724"},{"key":"e_1_3_2_2_21_1","volume-title":"Automatic rejection of event-related potential trials and components using independent component analysis","author":"Delorme A","unstructured":"A Delorme , S Makeig , TZ Jung , and TJ Sejnowski . 2001. Automatic rejection of event-related potential trials and components using independent component analysis . In Society for Neuroscience Abstracts , Vol . 27. A Delorme, S Makeig, TZ Jung, and TJ Sejnowski. 2001. Automatic rejection of event-related potential trials and components using independent component analysis. In Society for Neuroscience Abstracts, Vol. 27."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1038\/35036213"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1113\/jphysiol.2006.127142"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.1984.310437"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.11.024"},{"key":"e_1_3_2_2_26_1","volume-title":"Detecting trends using Spearman's rank correlation coefficient. Environmental forensics 2, 4","author":"Gautheir Thomas D","year":"2001","unstructured":"Thomas D Gautheir . 2001. Detecting trends using Spearman's rank correlation coefficient. Environmental forensics 2, 4 ( 2001 ), 359--362. Thomas D Gautheir. 2001. Detecting trends using Spearman's rank correlation coefficient. Environmental forensics 2, 4 (2001), 359--362."},{"key":"e_1_3_2_2_27_1","unstructured":"Google. 2016. Google Glass. https:\/\/www.google.com\/glass\/start\/.  Google. 2016. Google Glass. https:\/\/www.google.com\/glass\/start\/."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1152\/jn.00105.2010"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.93.2.922"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jneumeth.2007.03.005"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2290866"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SBB.2004.1364378"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0926-6410(03)00145-9"},{"key":"e_1_3_2_2_34_1","volume-title":"Estimation and hypothesis testing of cointegration vectors in Gaussian vector autoregressive models. Econometrica: Journal of the Econometric Society","author":"Johansen S\u00f8ren","year":"1991","unstructured":"S\u00f8ren Johansen . 1991. Estimation and hypothesis testing of cointegration vectors in Gaussian vector autoregressive models. Econometrica: Journal of the Econometric Society ( 1991 ), 1551--1580. S\u00f8ren Johansen. 1991. Estimation and hypothesis testing of cointegration vectors in Gaussian vector autoregressive models. Econometrica: Journal of the Econometric Society (1991), 1551--1580."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0896-6273(00)80911-3"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2016.7456514"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1213\/ANE.0b013e3181d3e647"},{"key":"e_1_3_2_2_38_1","volume-title":"Information Security and Privacy: 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings.","volume":"9723","author":"Liu Joseph K","year":"2016","unstructured":"Joseph K Liu and Ron Steinfeld . 2016 . Information Security and Privacy: 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings. Vol. 9723 . Springer. Joseph K Liu and Ron Steinfeld. 2016. Information Security and Privacy: 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings. Vol. 9723. Springer."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1088\/1741-2560\/9\/2\/026014"},{"key":"e_1_3_2_2_41_1","unstructured":"Markets and Markets. 2015. Global Head-Mounted Display Market 2016-2020. http:\/\/www.marketsandmarkets.com\/Market-Reports\/head-mounted-display-hmd-market-729.html.  Markets and Markets. 2015. Global Head-Mounted Display Market 2016-2020. http:\/\/www.marketsandmarkets.com\/Market-Reports\/head-mounted-display-hmd-market-729.html."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362827"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791210"},{"key":"e_1_3_2_2_44_1","unstructured":"Tom M Mitchell etal 1997. Machine learning. WCB.   Tom M Mitchell et al. 1997. Machine learning. WCB."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2427849"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.222"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1013"},{"key":"e_1_3_2_2_48_1","volume-title":"Observing the transformation of experience into memory. Trends in cognitive sciences 6, 2","author":"Paller Ken A","year":"2002","unstructured":"Ken A Paller and Anthony D Wagner . 2002. Observing the transformation of experience into memory. Trends in cognitive sciences 6, 2 ( 2002 ), 93--102. Ken A Paller and Anthony D Wagner. 2002. Observing the transformation of experience into memory. Trends in cognitive sciences 6, 2 (2002), 93--102."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCI-CC.2012.6311208"},{"key":"e_1_3_2_2_50_1","unstructured":"PlayStation. 2016. PlayStation VR. https:\/\/www.playstation.com\/enus\/explore\/playstation-vr\/.  PlayStation. 2016. PlayStation VR. https:\/\/www.playstation.com\/enus\/explore\/playstation-vr\/."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0168-5597(97)96139-6"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"crossref","unstructured":"M Poulos M Rangoussi N Alexandris A Evangelou etal 2002. Person identification from the EEG using nonlinear signal classification. Methods of information in Medicine 41 1 (2002) 64--75.  M Poulos M Rangoussi N Alexandris A Evangelou et al. 2002. Person identification from the EEG using nonlinear signal classification. Methods of information in Medicine 41 1 (2002) 64--75.","DOI":"10.1055\/s-0038-1634316"},{"key":"e_1_3_2_2_53_1","first-page":"173","article-title":"Extracting information from neuronal populations: information theory and decoding approaches. Nature reviews","volume":"10","author":"Quiroga Rodrigo Quian","year":"2009","unstructured":"Rodrigo Quian Quiroga and Stefano Panzeri . 2009 . Extracting information from neuronal populations: information theory and decoding approaches. Nature reviews . Neuroscience 10 , 3 (2009), 173 . Rodrigo Quian Quiroga and Stefano Panzeri. 2009. Extracting information from neuronal populations: information theory and decoding approaches. Nature reviews. Neuroscience 10, 3 (2009), 173.","journal-title":"Neuroscience"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2003.1211511"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2802083.2808391"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2543524"},{"key":"e_1_3_2_2_57_1","unstructured":"Samsung. 2015. Samsung VR. http:\/\/www.samsung.com\/us\/explore\/gearvr\/?cid=van-mb-cph-0716-10000089.  Samsung. 2015. Samsung VR. http:\/\/www.samsung.com\/us\/explore\/gearvr\/?cid=van-mb-cph-0716-10000089."},{"key":"e_1_3_2_2_58_1","volume-title":"Multiple emitter location and signal parameter estimation","author":"Schmidt Ralph","year":"1986","unstructured":"Ralph Schmidt . 1986. Multiple emitter location and signal parameter estimation . IEEE transactions on antennas and propagation 34, 3 ( 1986 ), 276--280. Ralph Schmidt. 1986. Multiple emitter location and signal parameter estimation. IEEE transactions on antennas and propagation 34, 3 (1986), 276--280."},{"key":"e_1_3_2_2_59_1","volume-title":"Sanjay Kumar Singh, and Amit Kumar Ray","author":"Singh Yogendra Narain","year":"2012","unstructured":"Yogendra Narain Singh , Sanjay Kumar Singh, and Amit Kumar Ray . 2012 . Bioelectrical signals as emerging biometrics: Issues and challenges. ISRN Signal Processing ( 2012). Yogendra Narain Singh, Sanjay Kumar Singh, and Amit Kumar Ray. 2012. Bioelectrical signals as emerging biometrics: Issues and challenges. ISRN Signal Processing (2012)."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524367"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.150.3700.1187"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1162\/jocn.2006.18.9.1488"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146269.1146282"},{"key":"e_1_3_2_2_65_1","unstructured":"Endel Tulving et al. 1972. Episodic and semantic memory. Organization of memory 1 (1972) 381--403.  Endel Tulving et al. 1972. Episodic and semantic memory. Organization of memory 1 (1972) 381--403."},{"key":"e_1_3_2_2_66_1","volume-title":"Parietal lobe contributions to episodic memory retrieval. Trends in cognitive sciences 9, 9","author":"Wagner Anthony D","year":"2005","unstructured":"Anthony D Wagner , Benjamin J Shannon , Itamar Kahn , and Randy L Buckner . 2005. Parietal lobe contributions to episodic memory retrieval. Trends in cognitive sciences 9, 9 ( 2005 ), 445--453. Anthony D Wagner, Benjamin J Shannon, Itamar Kahn, and Randy L Buckner. 2005. Parietal lobe contributions to episodic memory retrieval. Trends in cognitive sciences 9, 9 (2005), 445--453."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2006.25"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-8986.2007.00620.x"},{"key":"e_1_3_2_2_69_1","volume-title":"Simulation of EEG: dynamic changes in synaptic efficacy, cerebral rhythms, and dissipative and generative activity in cortex. Biological cybernetics 81, 2","author":"Wright JJ","year":"1999","unstructured":"JJ Wright . 1999. Simulation of EEG: dynamic changes in synaptic efficacy, cerebral rhythms, and dissipative and generative activity in cortex. Biological cybernetics 81, 2 ( 1999 ), 131--147. JJ Wright. 1999. Simulation of EEG: dynamic changes in synaptic efficacy, cerebral rhythms, and dissipative and generative activity in cortex. Biological cybernetics 81, 2 (1999), 131--147."},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.10.023"}],"event":{"name":"MobiSys '18: The 16th Annual International Conference on Mobile Systems, Applications, and Services","location":"Munich Germany","acronym":"MobiSys '18","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3210240.3210344","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3210240.3210344","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3210240.3210344","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:48Z","timestamp":1750210788000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3210240.3210344"}},"subtitle":["A Secure and Truly Cancelable Brain Biometrics for Smart Headwear"],"short-title":[],"issued":{"date-parts":[[2018,6,10]]},"references-count":69,"alternative-id":["10.1145\/3210240.3210344","10.1145\/3210240"],"URL":"https:\/\/doi.org\/10.1145\/3210240.3210344","relation":{},"subject":[],"published":{"date-parts":[[2018,6,10]]},"assertion":[{"value":"2018-06-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}