{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T18:25:05Z","timestamp":1776795905674,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":89,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2030521,CNS-2055233"],"award-info":[{"award-number":["CNS-2030521,CNS-2055233"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Amazon Research Award"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484559","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"69-85","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications"],"prefix":"10.1145","author":[{"given":"Qingying","family":"Hao","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Licheng","family":"Luo","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Steve T.K.","family":"Jan","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Gang","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7274"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23058"},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. of ICML.","author":"Athalye Anish","year":"2018","unstructured":"Anish Athalye, Logan Engstrom, Andrew Ilyas, and Kevin Kwok. 2018. Synthesizing Robust Adversarial Examples. In Proc. of ICML."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134615"},{"key":"e_1_3_2_1_5_1","unstructured":"Microsoft Bing. 2021. Microsoft Bing Images. https:\/\/www.bing.com\/images\/trending."},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of USENIX Security.","author":"Borgolte Kevin","year":"2015","unstructured":"Kevin Borgolte, Christopher Kruegel, and Giovanni Vigna. 2015. Meerkat: Detecting website defacements through image-based object recognition. In Proc. of USENIX Security."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00506"},{"key":"e_1_3_2_1_8_1","unstructured":"Johannes Buchner. 2021. ImageHash. https:\/\/github.com\/JohannesBuchner\/imagehash."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313482"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.598"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. of USENIX Security.","author":"Chen Yuxuan","year":"2020","unstructured":"Yuxuan Chen, Xuejing Yuan, Jiangshan Zhang, Yue Zhao, Shengzhi Zhang, Kai Chen, and XiaoFeng Wang. 2020. Deviltextquoterights Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices. In Proc. of USENIX Security."},{"key":"e_1_3_2_1_14_1","volume-title":"Robust Hash Functions for Digital Watermarking. IEEE Int Conf Information Technology: Coding Computing","author":"Fridrich Jiri","year":"2000","unstructured":"Jiri Fridrich and Miroslav Goljan. 2000. Robust Hash Functions for Digital Watermarking. IEEE Int Conf Information Technology: Coding Computing (2000)."},{"key":"e_1_3_2_1_15_1","unstructured":"Robert Frischholz. 2021. Reverse Image Search -- Searching People by Photos. https:\/\/facedetection.com\/online-reverse-image-search\/."},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of IMC.","author":"Goga Oana","year":"2015","unstructured":"Oana Goga, Giridhari Venkatadri, and Krishna P Gummadi. 2015. The doppelg\"anger bot attack: Exploring identity impersonation in online social networks. In Proc. of IMC."},{"key":"e_1_3_2_1_17_1","volume-title":"Explaining and Harnessing Adversarial Examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J.","year":"2014","unstructured":"Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and Harnessing Adversarial Examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_18_1","unstructured":"Google. 2021. Google Image Search. https:\/\/www.google.com\/imghp."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2012.11.009"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1631272.1631376"},{"key":"e_1_3_2_1_21_1","volume-title":"Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN. arXiv preprint arXiv:1702.05983","author":"Hu Weiwei","year":"2017","unstructured":"Weiwei Hu and Ying Tan. 2017. Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN. arXiv preprint arXiv:1702.05983 (2017)."},{"key":"e_1_3_2_1_22_1","volume-title":"Black-box Adversarial Attacks with Limited Queries and Information. arXiv preprint arXiv:1804.08598","author":"Ilyas Andrew","year":"2018","unstructured":"Andrew Ilyas, Logan Engstrom, Anish Athalye, and Jessy Lin. 2018. Black-box Adversarial Attacks with Limited Queries and Information. arXiv preprint arXiv:1804.08598 (2018)."},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. of NeurIPS.","author":"Ilyas Andrew","year":"2019","unstructured":"Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Logan Engstrom, Brandon Tran, and Aleksander Madry. 2019. Adversarial Examples Are Not Bugs, They Are Features. In Proc. of NeurIPS."},{"key":"e_1_3_2_1_24_1","unstructured":"Infringement-Report. 2021. ImageRaider. https:\/\/infringement.report\/api\/raider-reverse-image-search\/."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767732"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00044"},{"key":"e_1_3_2_1_27_1","unstructured":"Seon Joo Kim. 2021. Real and Fake Face Detection: Discriminate Real and Fake Face Images. https:\/\/www.kaggle.com\/ciplab\/real-and-fake-face-detection."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134002"},{"key":"e_1_3_2_1_29_1","unstructured":"Evan Klinger and David Starkweather. 2021. pHash: The open source perceptual hash library. https:\/\/www.phash.org\/docs\/."},{"key":"e_1_3_2_1_30_1","article-title":"A robust image authentication system distinguishing JPEG compression from malicious manipulation","volume":"11","author":"Lin Ching-Yung","year":"2001","unstructured":"Ching-Yung Lin and Shih-Fu Chang. 2001. A robust image authentication system distinguishing JPEG compression from malicious manipulation. IEEE Transactions on Circuits and Systems for Video Technology, Vol. 11 (2001).","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.227"},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. of CVPR.","author":"Liu Wei","unstructured":"Wei Liu, Jun Wang, Rongrong Ji, Yu-Gang Jiang, and S. Chang. 2012. Supervised Hashing with Kernels. In Proc. of CVPR."},{"key":"e_1_3_2_1_33_1","volume-title":"Proc. of ICML.","author":"Liu Wei","year":"2011","unstructured":"Wei Liu, Jun Wang, Sanjiv Kumar, and Shih-Fu Chang. 2011. Hashing with Graphs. In Proc. of ICML."},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. of ICLR.","author":"Liu Yanpei","year":"2017","unstructured":"Yanpei Liu, Xinyun Chen, Chang Liu, and Dawn Song. 2017. Delving into Transferable Adversarial Examples and Black-box Attacks. In Proc. of ICLR."},{"key":"e_1_3_2_1_35_1","article-title":"Distinctive Image Features from Scale-Invariant","volume":"60","author":"Lowe David G.","year":"2004","unstructured":"David G. Lowe. 2004. Distinctive Image Features from Scale-Invariant Keypoints. Int. J. Comput. Vision, Vol. 60, 2 (2004).","journal-title":"Keypoints. Int. J. Comput. Vision"},{"key":"e_1_3_2_1_36_1","unstructured":"Commons Machinery. 2021. Blockhash. http:\/\/blockhash.io\/."},{"key":"e_1_3_2_1_37_1","volume-title":"Proc. of ICLR.","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In Proc. of ICLR."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v13i01.3271"},{"key":"e_1_3_2_1_39_1","volume-title":"Proc. of ACM Workshop on Security and Privacy in Digital Rights Management.","author":"Kivancc M.","unstructured":"M. Kivancc Mihcc ak and Ramarathnam Venkatesan. 2002. New Iterative Geometric Methods for Robust Perceptual Image Hashing. In Proc. of ACM Workshop on Security and Privacy in Digital Rights Management."},{"key":"e_1_3_2_1_40_1","volume-title":"Proc. of NDSS.","author":"Miramirkhani Najmeh","year":"2016","unstructured":"Najmeh Miramirkhani, Oleksii Starov, and Nick Nikiforakis. 2016. Dial one for scam: Analyzing and detecting technical support scams. In Proc. of NDSS."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7314"},{"key":"e_1_3_2_1_42_1","volume-title":"Evans","author":"Monga Vishal","year":"2004","unstructured":"Vishal Monga and Brian L. Evans. 2004. Robust perceptual image hashing using feature points. In Proc. of ICIP."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2567983"},{"key":"e_1_3_2_1_45_1","volume-title":"IMD2020: A Large-Scale Annotated Dataset Tailored for Detecting Manipulated Images. In Proc. of IEEE Winter Applications of Computer Vision Workshops.","author":"Novoz\u00e1msk\u00fd Adam","year":"2020","unstructured":"Adam Novoz\u00e1msk\u00fd, Babak Mahdian, and Stanislav Saic. 2020. IMD2020: A Large-Scale Annotated Dataset Tailored for Detecting Manipulated Images. In Proc. of IEEE Winter Applications of Computer Vision Workshops."},{"key":"e_1_3_2_1_46_1","volume-title":"Proc. of CSET.","author":"Panum Thomas Kobber","year":"2020","unstructured":"Thomas Kobber Panum, Kaspar Hageman, Ren\u00e9 Rydhof Hansen, and Jens Myrup Pedersen. 2020. Towards Adversarial Phishing Detection. In Proc. of CSET."},{"key":"e_1_3_2_1_47_1","volume-title":"Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples. arXiv preprint arXiv:1605.07277","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot, Patrick McDaniel, and Ian Goodfellow. 2016a. Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples. arXiv preprint arXiv:1605.07277 (2016)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_3_2_1_50_1","volume-title":"Measuring EWhoring. In Proc. of IMC.","author":"Pastrana Sergio","year":"2019","unstructured":"Sergio Pastrana, Alice Hutchings, Daniel Thomas, and Juan Tapiador. 2019. Measuring EWhoring. In Proc. of IMC."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"e_1_3_2_1_52_1","unstructured":"Pixsy. 2021. Pixsy. https:\/\/www.pixsy.com\/."},{"key":"e_1_3_2_1_53_1","volume-title":"Proc. of USENIX Security.","author":"Quiring Erwin","year":"2020","unstructured":"Erwin Quiring, David Klein, Daniel Arp, Martin Johns, and Konrad Rieck. 2020. Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning. In Proc. of USENIX Security."},{"key":"e_1_3_2_1_54_1","volume-title":"Proc. of NDSS.","author":"Rafique M. Zubair","year":"2017","unstructured":"M. Zubair Rafique, Tom Van Goethem, Wouter Joosen, Christophe Huygens, and Nick Nikiforakis. 2017. It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services. In Proc. of NDSS."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313427"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7356"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313688"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1996.560425"},{"key":"e_1_3_2_1_60_1","volume-title":"Proc. of USENIX Security.","author":"Shan Shawn","year":"2020","unstructured":"Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, and Ben Zhao. 2020. Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models. In Proc. of USENIX Security."},{"key":"e_1_3_2_1_61_1","volume-title":"Reiter","author":"Sharif Mahmood","year":"2016","unstructured":"Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, and Michael K. Reiter. 2016. Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In Proc. of CCS."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329801"},{"key":"e_1_3_2_1_63_1","volume-title":"Proc. of USENIX Security.","author":"Singh Rachee","year":"2017","unstructured":"Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, and Vern Paxson. 2017. Characterizing the nature and dynamics of Tor exit blocking. In Proc. of USENIX Security."},{"key":"e_1_3_2_1_64_1","volume-title":"CSCW","volume":"3","author":"Starbird Kate","year":"2019","unstructured":"Kate Starbird, Ahmer Arif, and Tom Wilson. 2019. Disinformation as Collaborative Work: Surfacing the Participatory Nature of Strategic Information Operations. CSCW, Vol. 3 (2019)."},{"key":"e_1_3_2_1_65_1","volume-title":"Proc. of USENIX Security.","author":"Suya Fnu","year":"2020","unstructured":"Fnu Suya, Jianfeng Chi, David Evans, and Yuan Tian. 2020. Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries. In Proc. of USENIX Security."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873601"},{"key":"e_1_3_2_1_67_1","volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.45"},{"key":"e_1_3_2_1_69_1","unstructured":"TinEye. 2021. TinEye. https:\/\/tineye.com\/."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354222"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355600"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329830"},{"key":"e_1_3_2_1_73_1","volume-title":"Video of Delaware County poll workers filling out ballots was manipulated and lacked context, officials say. Inquirer. (6","author":"Vella Vinny","year":"2020","unstructured":"Vinny Vella. 2020. Video of Delaware County poll workers filling out ballots was manipulated and lacked context, officials say. Inquirer. (6 November 2020)."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2000.899541"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"crossref","unstructured":"J. Wang S. Kumar and S. Chang. 2012. Semi-Supervised Hashing for Large-Scale Search. IEEE Transactions on Pattern Analysis and Machine Intelligence (2012).","DOI":"10.1109\/TPAMI.2012.48"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2407698"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v15i1.18102"},{"key":"e_1_3_2_1_78_1","volume-title":"Spectral Hashing. In Proc. of NeurIPS.","author":"Weiss Yair","year":"2009","unstructured":"Yair Weiss, Antonio Torralba, and Rob Fergus. 2009. Spectral Hashing. In Proc. of NeurIPS."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2007.4284791"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24712-5_9"},{"key":"e_1_3_2_1_81_1","volume-title":"Proc. of CVPR.","author":"Wu Zhong","year":"2009","unstructured":"Zhong Wu, Qifa Ke, Michael Isard, and Jian Sun. 2009. Bundling Features for Large Scale Partial-Duplicate Web Image Search. In Proc. of CVPR."},{"key":"e_1_3_2_1_82_1","volume-title":"Proc. of USENIX Security.","author":"Xiao Qixue","year":"2019","unstructured":"Qixue Xiao, Yufei Chen, Chao Shen, Yu Chen, and Kang Li. 2019. Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms. In Proc. of USENIX Security."},{"key":"e_1_3_2_1_83_1","unstructured":"Yandex. 2021. Yandex Image Search. https:\/\/yandex.com\/images\/."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2006.265125"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00032"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278550"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7342"},{"key":"e_1_3_2_1_88_1","volume-title":"Implementation and Benchmarking of Perceptual Image Hash Functions. Master's thesis","author":"Zauner Christoph","year":"2010","unstructured":"Christoph Zauner. 2010. Implementation and Benchmarking of Perceptual Image Hash Functions. Master's thesis, Upper Austria University of Applied Sciences, Hagenberg Campus. (2010)."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484559","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484559","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:54:33Z","timestamp":1763499273000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484559"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":89,"alternative-id":["10.1145\/3460120.3484559","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484559","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}