{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:23:00Z","timestamp":1772644980248,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"University Grant Committee of the Hong Kong Special Administrative Region","award":["14208019"],"award-info":[{"award-number":["14208019"]}]},{"name":"University Grant Committee of the Hong Kong Special Administrative Region","award":["14208818"],"award-info":[{"award-number":["14208818"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3384732","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:23Z","timestamp":1601915603000},"page":"47-59","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":57,"title":["Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic"],"prefix":"10.1145","author":[{"given":"Shuaike","family":"Dong","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Zhou","family":"Li","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Di","family":"Tang","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Jiongyi","family":"Chen","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Chang Sha, China"}]},{"given":"Menghan","family":"Sun","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Kehuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"March","author":"Accessed","year":"2019","unstructured":"Accessed : March 2019 . 2017 Roundup Of Internet Of Things Forecasts . https:\/\/www.forbes.com\/sites\/louiscolumbus\/2017\/12\/10\/2017-roundupof-internet-of-things-forecasts\/. Accessed: March 2019. 2017 Roundup Of Internet Of Things Forecasts. https:\/\/www.forbes.com\/sites\/louiscolumbus\/2017\/12\/10\/2017-roundupof-internet-of-things-forecasts\/."},{"key":"e_1_3_2_1_2_1","volume-title":"March","author":"Accessed","year":"2019","unstructured":"Accessed : March 2019 . AWS IoT Core . https:\/\/aws.amazon.com\/cn\/iot-core\/. Accessed: March 2019. AWS IoT Core. https:\/\/aws.amazon.com\/cn\/iot-core\/."},{"key":"e_1_3_2_1_3_1","volume-title":"March","author":"Accessed","year":"2019","unstructured":"Accessed : March 2019 . Can a MAC address be traced? https:\/\/askleo.com\/can_a_mac_address_be_traced\/. Accessed: March 2019. Can a MAC address be traced? https:\/\/askleo.com\/can_a_mac_address_be_traced\/."},{"key":"e_1_3_2_1_4_1","volume-title":"March","author":"Accessed","year":"2019","unstructured":"Accessed : March 2019 . Digital Ocean Droplets . https:\/\/www.digitalocean.com\/products\/droplets. Accessed: March 2019. Digital Ocean Droplets. https:\/\/www.digitalocean.com\/products\/droplets."},{"key":"e_1_3_2_1_5_1","volume-title":"March","author":"Accessed","year":"2019","unstructured":"Accessed : March 2019 . Monkeyrunner . https:\/\/developer.android.com\/studio\/test\/monkeyrunner. Accessed: March 2019. Monkeyrunner. https:\/\/developer.android.com\/studio\/test\/monkeyrunner."},{"key":"e_1_3_2_1_6_1","volume-title":"March","author":"Accessed","year":"2019","unstructured":"Accessed : March 2019 . OpenVPN over TCP vs. UDP : Which should I choose? https:\/\/www.bestvpn.com\/guides\/openvpn-tcp-vs-udp-difference-choose\/. Accessed: March 2019. OpenVPN over TCP vs. UDP: Which should I choose? https:\/\/www.bestvpn.com\/guides\/openvpn-tcp-vs-udp-difference-choose\/."},{"key":"e_1_3_2_1_7_1","volume-title":"March","author":"Accessed","year":"2019","unstructured":"Accessed : March 2019 . Raspberry Pi . https:\/\/www.raspberrypi.org\/documentation\/. Accessed: March 2019. Raspberry Pi. https:\/\/www.raspberrypi.org\/documentation\/."},{"key":"e_1_3_2_1_8_1","volume-title":"March","author":"Accessed","year":"2019","unstructured":"Accessed : March 2019 . SmartThings Motion Sensor ( 2015 model). https:\/\/support.smartthings.com\/hc\/en-us\/articles\/205957580-SmartThings-Motion-Sensor-2015-model-. Accessed: March 2019. SmartThings Motion Sensor (2015 model). https:\/\/support.smartthings.com\/hc\/en-us\/articles\/205957580-SmartThings-Motion-Sensor-2015-model-."},{"key":"e_1_3_2_1_9_1","volume-title":"Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and A. Selcuk Uluagac.","author":"Acar Abbas","year":"2018","unstructured":"Abbas Acar , Hossein Fereidooni , Tigist Abera , Amit Kumar Sikder , Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and A. Selcuk Uluagac. 2018 . Peek-a-Boo: I see your smart home activities, even encrypted! CoRR abs\/1808.02741 (2018). Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and A. Selcuk Uluagac. 2018. Peek-a-Boo: I see your smart home activities, even encrypted! CoRR abs\/1808.02741 (2018)."},{"key":"e_1_3_2_1_10_1","volume-title":"Bentley","author":"Aksu Hidayet","year":"2018","unstructured":"Hidayet Aksu , A. Selcuk Uluagac , and Elizabeth S . Bentley . 2018 . Identification of Wearable Devices with Bluetooth. CoRR abs\/1809.10387 (2018). arXiv:1809.10387 http:\/\/arxiv.org\/abs\/1809.10387 Hidayet Aksu, A. Selcuk Uluagac, and Elizabeth S. Bentley. 2018. Identification of Wearable Devices with Bluetooth. CoRR abs\/1809.10387 (2018). arXiv:1809.10387 http:\/\/arxiv.org\/abs\/1809.10387"},{"key":"e_1_3_2_1_11_1","volume-title":"A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic. CoRR abs\/1705.06805","author":"Apthorpe Noah","year":"2017","unstructured":"Noah Apthorpe , Dillon Reisman , and Nick Feamster . 2017. A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic. CoRR abs\/1705.06805 ( 2017 ). arXiv:1705.06805 http:\/\/arxiv.org\/abs\/1705.06805 Noah Apthorpe, Dillon Reisman, and Nick Feamster. 2017. A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic. CoRR abs\/1705.06805 (2017). arXiv:1705.06805 http:\/\/arxiv.org\/abs\/1705.06805"},{"key":"e_1_3_2_1_12_1","volume-title":"Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic. CoRR abs\/1708.05044","author":"Apthorpe Noah","year":"2017","unstructured":"Noah Apthorpe , Dillon Reisman , Srikanth Sundaresan , Arvind Narayanan , and Nick Feamster . 2017. Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic. CoRR abs\/1708.05044 ( 2017 ). arXiv:1708.05044 http:\/\/arxiv.org\/abs\/1708.05044 Noah Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, and Nick Feamster. 2017. Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic. CoRR abs\/1708.05044 (2017). arXiv:1708.05044 http:\/\/arxiv.org\/abs\/1708.05044"},{"key":"e_1_3_2_1_13_1","volume-title":"Real-time Analysis of Privacy-(un)aware IoT Applications. CoRR abs\/1911.10461","author":"Babun Leonardo","year":"2019","unstructured":"Leonardo Babun , Z. Berkay Celik , Patrick D. McDaniel , and A. Selcuk Uluagac . 2019. Real-time Analysis of Privacy-(un)aware IoT Applications. CoRR abs\/1911.10461 ( 2019 ). arXiv:1911.10461 http:\/\/arxiv.org\/abs\/1911.10461 Leonardo Babun, Z. Berkay Celik, Patrick D. McDaniel, and A. Selcuk Uluagac. 2019. Real-time Analysis of Privacy-(un)aware IoT Applications. CoRR abs\/1911.10461 (2019). arXiv:1911.10461 http:\/\/arxiv.org\/abs\/1911.10461"},{"key":"e_1_3_2_1_14_1","first-page":"1","article-title":"Stateful NAT64: Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers","volume":"6146","author":"Bagnulo Marcelo","year":"2011","unstructured":"Marcelo Bagnulo , Philip Matthews , and Iljitsch van Beijnum . 2011 . Stateful NAT64: Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers . RFC 6146 (2011), 1 -- 45 . https:\/\/doi.org\/10.17487\/RFC6146 10.17487\/RFC6146 Marcelo Bagnulo, Philip Matthews, and Iljitsch van Beijnum. 2011. Stateful NAT64: Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers. RFC 6146 (2011), 1--45. https:\/\/doi.org\/10.17487\/RFC6146","journal-title":"RFC"},{"key":"e_1_3_2_1_15_1","volume-title":"5th International Workshop, PET 2005","author":"Bissias George Dean","year":"2005","unstructured":"George Dean Bissias , Marc Liberatore , David D. Jensen , and Brian Neil Levine . 2005 . Privacy Vulnerabilities in Encrypted HTTP Streams. In Privacy Enhancing Technologies , 5th International Workshop, PET 2005 , Cavtat, Croatia, May 30- June 1, 2005, Revised Selected Papers. 1--11. https:\/\/doi.org\/10.1007\/11767831_1 10.1007\/11767831_1 George Dean Bissias, Marc Liberatore, David D. Jensen, and Brian Neil Levine. 2005. Privacy Vulnerabilities in Encrypted HTTP Streams. In Privacy Enhancing Technologies, 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers. 1--11. https:\/\/doi.org\/10.1007\/11767831_1"},{"key":"e_1_3_2_1_16_1","volume-title":"Sensitive Information Tracking in Commodity IoT. In 27th USENIX Security Symposium, USENIX Security 2018","author":"Celik Z. Berkay","year":"2018","unstructured":"Z. Berkay Celik , Leonardo Babun , Amit Kumar Sikder , Hidayet Aksu , Gang Tan , Patrick D. McDaniel , and A. Selcuk Uluagac . 2018 . Sensitive Information Tracking in Commodity IoT. In 27th USENIX Security Symposium, USENIX Security 2018 , Baltimore, MD, USA, August 15--17 , 2018 , William Enck and Adrienne Porter Felt (Eds.). USENIX Association, 1687--1704. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/celik Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick D. McDaniel, and A. Selcuk Uluagac. 2018. Sensitive Information Tracking in Commodity IoT. In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15--17, 2018, William Enck and Adrienne Porter Felt (Eds.). USENIX Association, 1687--1704. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/celik"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258054"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_2_1_19_1","first-page":"1","article-title":"A Framework for IP Based Virtual Private Networks","volume":"2764","author":"Gleeson Bryan","year":"2000","unstructured":"Bryan Gleeson , Arthur Lin , Juha Hein\u00e4nen , Grenville Armitage , and Andrew G. Malis . 2000 . A Framework for IP Based Virtual Private Networks . RFC 2764 (2000), 1 -- 62 . https:\/\/doi.org\/10.17487\/RFC2764 10.17487\/RFC2764 Bryan Gleeson, Arthur Lin, Juha Hein\u00e4nen, Grenville Armitage, and Andrew G.Malis. 2000. A Framework for IP Based Virtual Private Networks. RFC 2764 (2000), 1--62. https:\/\/doi.org\/10.17487\/RFC2764","journal-title":"RFC"},{"key":"e_1_3_2_1_20_1","volume-title":"Deep Learning","author":"Goodfellow Ian","unstructured":"Ian Goodfellow , Yoshua Bengio , and Aaron Courville . 2016. Deep Learning . MIT Press . http:\/\/www.deeplearningbook.org. Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep Learning. MIT Press. http:\/\/www.deeplearningbook.org."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASRU.2013.6707742"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2005.06.042"},{"key":"e_1_3_2_1_23_1","first-page":"1","article-title":"DNS Queries over HTTPS (DoH)","volume":"8484","author":"Hoffman Paul E.","year":"2018","unstructured":"Paul E. Hoffman and Patrick McManus . 2018 . DNS Queries over HTTPS (DoH) . RFC 8484 (2018), 1 -- 21 . https:\/\/doi.org\/10.17487\/RFC8484 10.17487\/RFC8484 Paul E. Hoffman and Patrick McManus. 2018. DNS Queries over HTTPS (DoH). RFC 8484 (2018), 1--21. https:\/\/doi.org\/10.17487\/RFC8484","journal-title":"RFC"},{"key":"e_1_3_2_1_24_1","first-page":"1","article-title":"Specification for DNS over Transport Layer Security (TLS)","volume":"7858","author":"Hu Zi","year":"2016","unstructured":"Zi Hu , Liang Zhu , John S. Heidemann , Allison Mankin , Duane Wessels , and Paul E. Hoffman . 2016 . Specification for DNS over Transport Layer Security (TLS) . RFC 7858 (2016), 1 -- 19 . Zi Hu, Liang Zhu, John S. Heidemann, Allison Mankin, Duane Wessels, and Paul E. Hoffman. 2016. Specification for DNS over Transport Layer Security (TLS). RFC 7858 (2016), 1--19.","journal-title":"RFC"},{"key":"e_1_3_2_1_25_1","volume-title":"Network Traffic Anomaly Detection. CoRR abs\/1402.0856","author":"Huang Hong","year":"2014","unstructured":"Hong Huang , Hussein Al-Azzawi , and Hajar Brani . 2014. Network Traffic Anomaly Detection. CoRR abs\/1402.0856 ( 2014 ). arXiv:1402.0856 http:\/\/arxiv.org\/abs\/1402.0856 Hong Huang, Hussein Al-Azzawi, and Hajar Brani. 2014. Network Traffic Anomaly Detection. CoRR abs\/1402.0856 (2014). arXiv:1402.0856 http:\/\/arxiv.org\/abs\/1402.0856"},{"key":"e_1_3_2_1_26_1","volume-title":"Bidirectional LSTM-CRF Models for Sequence Tagging. CoRR abs\/1508.01991","author":"Huang Zhiheng","year":"2015","unstructured":"Zhiheng Huang , Wei Xu , and Kai Yu. 2015. Bidirectional LSTM-CRF Models for Sequence Tagging. CoRR abs\/1508.01991 ( 2015 ). Zhiheng Huang, Wei Xu, and Kai Yu. 2015. Bidirectional LSTM-CRF Models for Sequence Tagging. CoRR abs\/1508.01991 (2015)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2791588"},{"key":"e_1_3_2_1_28_1","volume-title":"Wetzel","author":"Lipton Zachary Chase","year":"2016","unstructured":"Zachary Chase Lipton , David C. Kale , Charles Elkan , and Randall C . Wetzel . 2016 . Learning to Diagnose with LSTM Recurrent Neural Networks. CoRR abs\/1511.03677 (2016). Zachary Chase Lipton, David C. Kale, Charles Elkan, and Randall C. Wetzel. 2016. Learning to Diagnose with LSTM Recurrent Neural Networks. CoRR abs\/1511.03677 (2016)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2747560"},{"key":"e_1_3_2_1_30_1","volume-title":"Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on. IEEE, 2177--2184","author":"Miettinen Markus","year":"2017","unstructured":"Markus Miettinen , Samuel Marchal , Ibbad Hafeez , N Asokan , Ahmad-Reza Sadeghi , and Sasu Tarkoma . 2017 . IoT Sentinel: Automated device-type identification for security enforcement in IoT . In Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on. IEEE, 2177--2184 . Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N Asokan, Ahmad-Reza Sadeghi, and Sasu Tarkoma. 2017. IoT Sentinel: Automated device-type identification for security enforcement in IoT. In Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on. IEEE, 2177--2184."},{"key":"e_1_3_2_1_31_1","volume-title":"Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Kai Chen , Greg Corrado , and Jeffrey Dean . 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 ( 2013 ). Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2369033"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23105"},{"key":"e_1_3_2_1_35_1","volume-title":"Rajib Ranjan Maiti, and Nils Ole Tippenhauer","author":"Siby Sandra","year":"2017","unstructured":"Sandra Siby , Rajib Ranjan Maiti, and Nils Ole Tippenhauer . 2017 . IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods. CoRR abs\/1701.05007 (2017). arXiv:1701.05007 http:\/\/arxiv.org\/abs\/1701.05007 Sandra Siby, Rajib Ranjan Maiti, and Nils Ole Tippenhauer. 2017. IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods. CoRR abs\/1701.05007 (2017). arXiv:1701.05007 http:\/\/arxiv.org\/abs\/1701.05007"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2017.8116438"},{"key":"e_1_3_2_1_38_1","first-page":"1","article-title":"IP Network Address Translator (NAT) Terminology and Considerations","volume":"2663","author":"Srisuresh Pyda","year":"1999","unstructured":"Pyda Srisuresh and Matt Holdrege . 1999 . IP Network Address Translator (NAT) Terminology and Considerations . RFC 2663 (1999), 1 -- 30 . https:\/\/doi.org\/10.17487\/RFC2663 10.17487\/RFC2663 Pyda Srisuresh and Matt Holdrege. 1999. IP Network Address Translator (NAT) Terminology and Considerations. RFC 2663 (1999), 1--30. https:\/\/doi.org\/10.17487\/RFC2663","journal-title":"RFC"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052709"},{"key":"e_1_3_2_1_40_1","unstructured":"Ilya Sutskever Oriol Vinyals and Quoc V Le. 2014. Sequence to sequence learning with neural networks. In Advances in neural information processing systems. 3104--3112.  Ilya Sutskever Oriol Vinyals and Quoc V Le. 2014. Sequence to sequence learning with neural networks. In Advances in neural information processing systems. 3104--3112."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.40"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.4018\/jdwm.2007070101"},{"key":"e_1_3_2_1_43_1","volume-title":"IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, CCIS 2014","author":"Yu Jishen","year":"2014","unstructured":"Jishen Yu , Feng Liu , Wenli Zhou , and Hua Yu . 2014 . Hadoop-based network traffic anomaly detection in backbone . In IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, CCIS 2014 , Shenzhen, China, November 27--29 , 2014. 140--145. https:\/\/doi.org\/10.1109\/CCIS.2014.717571 10.1109\/CCIS.2014.717571 Jishen Yu, Feng Liu, Wenli Zhou, and Hua Yu. 2014. Hadoop-based network traffic anomaly detection in backbone. In IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, CCIS 2014, Shenzhen, China, November 27--29, 2014. 140--145. https:\/\/doi.org\/10.1109\/CCIS.2014.717571"}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"ASIA CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384732","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384732","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:27Z","timestamp":1750200087000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384732"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":43,"alternative-id":["10.1145\/3320269.3384732","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3384732","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}