{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:29:12Z","timestamp":1765888152264,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":74,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3308558.3313539","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"3063-3071","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["A Large-scale Study on the Risks of the HTML5 WebAPI for Mobile Sensor-based Attacks"],"prefix":"10.1145","author":[{"given":"Francesco","family":"Marcantoni","sequence":"first","affiliation":[{"name":"Univ. of Illinois at Chicago, USA"}]},{"given":"Michalis","family":"Diamantaris","sequence":"additional","affiliation":[{"name":"FORTH, Greece"}]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[{"name":"FORTH, Greece"}]},{"given":"Jason","family":"Polakis","sequence":"additional","affiliation":[{"name":"Univ. of Illinois at Chicago, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. Alexa - Top 50 Banks and Institutions. https:\/\/www.alexa.com\/topsites\/category\/Business\/Financial_Services\/Banking_Services\/Banks_and_Institutions.  {n. d.}. Alexa - Top 50 Banks and Institutions. https:\/\/www.alexa.com\/topsites\/category\/Business\/Financial_Services\/Banking_Services\/Banks_and_Institutions."},{"key":"e_1_3_2_1_2_1","unstructured":"{n. d.}. Domains exhibiting differences in the WebAPI calls reported by our system and Das et al.https:\/\/www.cs.uic.edu\/~webapi\/.  {n. d.}. Domains exhibiting differences in the WebAPI calls reported by our system and Das et al.https:\/\/www.cs.uic.edu\/~webapi\/."},{"key":"e_1_3_2_1_3_1","unstructured":"{n. d.}. The EU General Data Protection Regulation. https:\/\/eugdpr.org.  {n. d.}. The EU General Data Protection Regulation. https:\/\/eugdpr.org."},{"key":"e_1_3_2_1_4_1","unstructured":"{n. d.}. Mozilla Support - Does Firefox share my location with websites?https:\/\/support.mozilla.org\/en-US\/kb\/does-firefox-share-my-location-websites.  {n. d.}. Mozilla Support - Does Firefox share my location with websites?https:\/\/support.mozilla.org\/en-US\/kb\/does-firefox-share-my-location-websites."},{"key":"e_1_3_2_1_5_1","unstructured":"{n. d.}. Request prompts for dangerous permissions. https:\/\/developer.android.com\/guide\/topics\/permissions\/overview#dangerous-permission-prompt.  {n. d.}. Request prompts for dangerous permissions. https:\/\/developer.android.com\/guide\/topics\/permissions\/overview#dangerous-permission-prompt."},{"key":"e_1_3_2_1_6_1","unstructured":"{n. d.}. US Banks on the Internet. http:\/\/www.thecommunitybanker.com\/bank_links\/.  {n. d.}. US Banks on the Internet. http:\/\/www.thecommunitybanker.com\/bank_links\/."},{"key":"e_1_3_2_1_7_1","unstructured":"{n. d.}. VirusTotal: Analyze suspicious files and URLs to detect types of malware. https:\/\/www.virustotal.com.  {n. d.}. VirusTotal: Analyze suspicious files and URLs to detect types of malware. https:\/\/www.virustotal.com."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991091"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2708685"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-088"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00004"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644928"},{"key":"e_1_3_2_1_13_1","unstructured":"Ben Alman. {n. d.}. Monkey-patch (hook) functions for debugging and stuff. https:\/\/github.com\/cowboy\/javascript-hooker. Accessed: 2018-04-23.  Ben Alman. {n. d.}. Monkey-patch (hook) functions for debugging and stuff. https:\/\/github.com\/cowboy\/javascript-hooker. Accessed: 2018-04-23."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_30"},{"key":"e_1_3_2_1_15_1","unstructured":"Hristo Bojinov Yan Michalevsky Gabi Nakibly and Dan Boneh. 2014. Mobile device identification via sensor fingerprinting. arXiv preprint arXiv:1408.1416(2014).  Hristo Bojinov Yan Michalevsky Gabi Nakibly and Dan Boneh. 2014. Mobile device identification via sensor fingerprinting. arXiv preprint arXiv:1408.1416(2014)."},{"key":"e_1_3_2_1_16_1","unstructured":"Liang Cai and Hao Chen. 2011. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion.HotSec 11(2011) 9-9.   Liang Cai and Hao Chen. 2011. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion.HotSec 11(2011) 9-9."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258268"},{"key":"e_1_3_2_1_18_1","unstructured":"Cortesi Aldo and Hils Mayimilian and Kriechbaumer Thomas. {n. d.}. mitmproxy. https:\/\/mitmproxy.org. v. 3.0.3.  Cortesi Aldo and Hils Mayimilian and Kriechbaumer Thomas. {n. d.}. mitmproxy. https:\/\/mitmproxy.org. v. 3.0.3."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243860"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660325"},{"key":"e_1_3_2_1_21_1","unstructured":"Anupam Das Nikita Borisov and Matthew Caesar. 2016. Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses.. In NDSS.  Anupam Das Nikita Borisov and Matthew Caesar. 2016. Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses.. In NDSS."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0005"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2017.8081600"},{"key":"e_1_3_2_1_24_1","unstructured":"Luke Deshotels. 2014. Inaudible Sound as a Covert Channel in Mobile Devices.. In WOOT.   Luke Deshotels. 2014. Inaudible Sound as a Covert Channel in Mobile Devices.. In WOOT."},{"key":"e_1_3_2_1_25_1","volume-title":"Romit Roy Choudhury, and Srihari Nelakuditi","author":"Dey Sanorita","year":"2014","unstructured":"Sanorita Dey , Nirupam Roy , Wenyuan Xu , Romit Roy Choudhury, and Srihari Nelakuditi . 2014 . AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable.. In NDSS. Sanorita Dey, Nirupam Roy, Wenyuan Xu, Romit Roy Choudhury, and Srihari Nelakuditi. 2014. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable.. In NDSS."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300027"},{"key":"e_1_3_2_1_27_1","volume-title":"Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data. In 26th Annual Network and Distributed System Security Symposium (NDSS '19)","author":"Drakonakis Kostas","year":"2019","unstructured":"Kostas Drakonakis , Panagiotis Ilia , Sotiris Ioannidis , and Jason Polakis . 2019 . Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data. In 26th Annual Network and Distributed System Security Symposium (NDSS '19) . Kostas Drakonakis, Panagiotis Ilia, Sotiris Ioannidis, and Jason Polakis. 2019. Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data. In 26th Annual Network and Distributed System Security Symposium (NDSS '19)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881151.1881152"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_30_1","unstructured":"Tobias Fiebig Jan Krissler and Ronny H\u00e4nsch. 2014. Security Impact of High Resolution Smartphone Cameras.. In WOOT.   Tobias Fiebig Jan Krissler and Ronny H\u00e4nsch. 2014. Security Impact of High Resolution Smartphone Cameras.. In WOOT."},{"volume-title":"d.}. Mobile HTML5 Compatibility on Mobile Devices","author":"Firtman Maximiliano","key":"e_1_3_2_1_31_1","unstructured":"Maximiliano Firtman . {n. d.}. Mobile HTML5 Compatibility on Mobile Devices . http:\/\/mobilehtml5.org\/. Accessed: 2018-04-22. Maximiliano Firtman. {n. d.}. Mobile HTML5 Compatibility on Mobile Devices. http:\/\/mobilehtml5.org\/. Accessed: 2018-04-22."},{"key":"e_1_3_2_1_32_1","volume-title":"Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels. In International cryptology conference.","author":"Genkin Daniel","year":"2018","unstructured":"Daniel Genkin , Mihir Pattani , Roei Schuster , and Eran Tromer . 2018 . Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels. In International cryptology conference. Daniel Genkin, Mihir Pattani, Roei Schuster, and Eran Tromer. 2018. Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels. In International cryptology conference."},{"volume-title":"International cryptology conference","author":"Genkin Daniel","key":"e_1_3_2_1_33_1","unstructured":"Daniel Genkin , Adi Shamir , and Eran Tromer . 2014. RSA key extraction via low-bandwidth acoustic cryptanalysis . In International cryptology conference . Springer , 444-461. Daniel Genkin, Adi Shamir, and Eran Tromer. 2014. RSA key extraction via low-bandwidth acoustic cryptanalysis. In International cryptology conference. Springer, 444-461."},{"key":"e_1_3_2_1_34_1","unstructured":"ghostwords. {n. d.}. Browser fingerprinting protection for everybody. https:\/\/github.com\/ghostwords\/chameleon. Accessed: 2018-06-09.  ghostwords. {n. d.}. Browser fingerprinting protection for everybody. https:\/\/github.com\/ghostwords\/chameleon. Accessed: 2018-06-09."},{"volume-title":"d.}. Mobile and tablet internet usage exceeds desktop for first time worldwide","author":"Stats Global","key":"e_1_3_2_1_35_1","unstructured":"Global Stats . {n. d.}. Mobile and tablet internet usage exceeds desktop for first time worldwide . http:\/\/gs.statcounter.com\/press\/mobile-and-tablet-internet-usage-exceeds-desktop-for-first-time-worldwide. Accessed: 2018-04-19. Global Stats. {n. d.}. Mobile and tablet internet usage exceeds desktop for first time worldwide. http:\/\/gs.statcounter.com\/press\/mobile-and-tablet-internet-usage-exceeds-desktop-for-first-time-worldwide. Accessed: 2018-04-19."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2012.6151305"},{"key":"e_1_3_2_1_37_1","volume-title":"Reconstructing what you said: Text Inference using Smartphone Motion","author":"Hodges Duncan","year":"2018","unstructured":"Duncan Hodges and Oliver Buckley . 2018. Reconstructing what you said: Text Inference using Smartphone Motion . IEEE Transactions on Mobile Computing( 2018 ). Duncan Hodges and Oliver Buckley. 2018. Reconstructing what you said: Text Inference using Smartphone Motion. IEEE Transactions on Mobile Computing(2018)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2611489"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818032"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2012.6374552"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664247"},{"key":"e_1_3_2_1_42_1","unstructured":"Pierre Laperdrix. 2017. Browser Fingerprinting: Exploring Device Diversity to Augment Authentification and Build Client-Side Countermeasures. Ph.D. Dissertation. Rennes INSA.  Pierre Laperdrix. 2017. Browser Fingerprinting: Exploring Device Diversity to Augment Authentification and Build Client-Side Countermeasures. Ph.D. Dissertation. Rennes INSA."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.57"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420958"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-017-0369-x"},{"key":"e_1_3_2_1_47_1","volume-title":"USENIX Security Symposium. 1053-1067","author":"Michalevsky Yan","year":"2014","unstructured":"Yan Michalevsky , Dan Boneh , and Gabi Nakibly . 2014 . Gyrophone: Recognizing Speech from Gyroscope Signals .. In USENIX Security Symposium. 1053-1067 . Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing Speech from Gyroscope Signals.. In USENIX Security Symposium. 1053-1067."},{"key":"e_1_3_2_1_48_1","unstructured":"Elinor Mills. {n. d.}. Device identification in online banking is privacy threat expert says. https:\/\/www.cnet.com\/news\/device-identification-in-online-banking-is-privacy-threat-expert-says\/.  Elinor Mills. {n. d.}. Device identification in online banking is privacy threat expert says. https:\/\/www.cnet.com\/news\/device-identification-in-online-banking-is-privacy-threat-expert-says\/."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_15"},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of W2SP","author":"Mowery Keaton","year":"2012","unstructured":"Keaton Mowery and Hovav Shacham . 2012 . Pixel Perfect: Fingerprinting Canvas in HTML5 . In Proceedings of W2SP 2012. Keaton Mowery and Hovav Shacham. 2012. Pixel Perfect: Fingerprinting Canvas in HTML5. In Proceedings of W2SP 2012."},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the Mobile Security Technologies Workshop (MoST).","author":"Mutchler Patrick","year":"2015","unstructured":"Patrick Mutchler , Adam Doupe\u00b4 , John Mitchell , Chris Kruegel , and Giovanni Vigna . 2015 . A large-scale study of mobile web app security . In Proceedings of the Mobile Security Technologies Workshop (MoST). Patrick Mutchler, Adam Doupe\u00b4, John Mitchell, Chris Kruegel, and Giovanni Vigna. 2015. A large-scale study of mobile web app security. In Proceedings of the Mobile Security Technologies Workshop (MoST)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.31"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.160"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29883-2_18"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_2_1_57_1","unstructured":"Ashis Kumar Ratha Shibani Sahu and Priya Meher. 2018. HTML5 in Web Development: A New Approach. (2018).  Ashis Kumar Ratha Shibani Sahu and Priya Meher. 2018. HTML5 in Web Development: A New Approach. (2018)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1689239.1689243"},{"key":"e_1_3_2_1_59_1","volume-title":"Mesh and Ad Hoc Communications and Networks (SECON), 2013 10th Annual IEEE Communications Society Conference on. IEEE, 149-157","author":"Ren Yanzhi","year":"2013","unstructured":"Yanzhi Ren , Yingying Chen , Mooi Choo Chuah , and Jie Yang . 2013 . Smartphone based user verification leveraging gait recognition for mobile healthcare systems. In Sensor , Mesh and Ad Hoc Communications and Networks (SECON), 2013 10th Annual IEEE Communications Society Conference on. IEEE, 149-157 . Yanzhi Ren, Yingying Chen, Mooi Choo Chuah, and Jie Yang. 2013. Smartphone based user verification leveraging gait recognition for mobile healthcare systems. In Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2013 10th Annual IEEE Communications Society Conference on. IEEE, 149-157."},{"key":"e_1_3_2_1_60_1","unstructured":"rovo89. {n. d.}. Xposed framework. https:\/\/repo.xposed.info. Accessed: 2018-06-14.  rovo89. {n. d.}. Xposed framework. https:\/\/repo.xposed.info. Accessed: 2018-06-14."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278574"},{"key":"e_1_3_2_1_62_1","first-page":"17","volume-title":"NDSS","volume":"11","author":"Schlegel Roman","year":"2011","unstructured":"Roman Schlegel , Kehuan Zhang , Xiao-yong Zhou, Mehool Intwala , Apu Kapadia , and XiaoFeng Wang . 2011 . Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones .. In NDSS , Vol. 11 . 17 - 33 . Roman Schlegel, Kehuan Zhang, Xiao-yong Zhou, Mehool Intwala, Apu Kapadia, and XiaoFeng Wang. 2011. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.. In NDSS, Vol. 11. 17-33."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987466"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666622"},{"key":"e_1_3_2_1_65_1","unstructured":"Greg Sterling. {n. d.}. Mobile Devices Now Driving 56 Percent Of Traffic To Top Sites.  Greg Sterling. {n. d.}. Mobile Devices Now Driving 56 Percent Of Traffic To Top Sites."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28537-0_16"},{"key":"e_1_3_2_1_67_1","volume-title":"Mobility and Security (NTMS), 2015 7th International Conference on. IEEE, 1-5.","author":"Upathilake Randika","year":"2015","unstructured":"Randika Upathilake , Yingkun Li , and Ashraf Matrawy . 2015 . A classification of web browser fingerprinting techniques. In New Technologies , Mobility and Security (NTMS), 2015 7th International Conference on. IEEE, 1-5. Randika Upathilake, Yingkun Li, and Ashraf Matrawy. 2015. A classification of web browser fingerprinting techniques. In New Technologies, Mobility and Security (NTMS), 2015 7th International Conference on. IEEE, 1-5."},{"key":"e_1_3_2_1_68_1","first-page":"27","volume-title":"NSDI","volume":"11","author":"Wang Yong","year":"2011","unstructured":"Yong Wang , Daniel Burgener , Marcel Flores , Aleksandar Kuzmanovic , and Cheng Huang . 2011 . Towards Street-Level Client-Independent IP Geolocation .. In NSDI , Vol. 11 . 27 - 27 . Yong Wang, Daniel Burgener, Marcel Flores, Aleksandar Kuzmanovic, and Cheng Huang. 2011. Towards Street-Level Client-Independent IP Geolocation.. In NSDI, Vol. 11. 27-27."},{"key":"e_1_3_2_1_69_1","first-page":"31","article-title":"Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting.","volume":"6","author":"Wang Yi-Min","year":"2006","unstructured":"Yi-Min Wang , Doug Beck , Jeffrey Wang , Chad Verbowski , and Brad Daniels . 2006 . Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting. SRUTI 6 (2006), 31 - 36 . Yi-Min Wang, Doug Beck, Jeffrey Wang, Chad Verbowski, and Brad Daniels. 2006. Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting.SRUTI 6(2006), 31-36.","journal-title":"SRUTI"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186088"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228636"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660300"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.9775"}],"event":{"name":"WWW '19: The Web Conference","sponsor":["IW3C2 International World Wide Web Conference Committee"],"location":"San Francisco CA USA","acronym":"WWW '19"},"container-title":["The World Wide Web Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308558.3313539","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308558.3313539","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:20Z","timestamp":1750204400000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308558.3313539"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":74,"alternative-id":["10.1145\/3308558.3313539","10.1145\/3308558"],"URL":"https:\/\/doi.org\/10.1145\/3308558.3313539","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}