{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T20:15:54Z","timestamp":1776888954352,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key R&D Program of China","award":["2018YFB1800304"],"award-info":[{"award-number":["2018YFB1800304"]}]},{"name":"NSFC","award":["61625203 & 61832013"],"award-info":[{"award-number":["61625203 & 61832013"]}]},{"name":"ONR","award":["N00014-18-2893"],"award-info":[{"award-number":["N00014-18-2893"]}]},{"name":"BNRist","award":["BNR2020RC01013"],"award-info":[{"award-number":["BNR2020RC01013"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484796","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"108-125","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["A Hard Label Black-box Adversarial Attack Against Graph Neural Networks"],"prefix":"10.1145","author":[{"given":"Jiaming","family":"Mu","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Binghui","family":"Wang","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology, Chicagao, IL, USA"}]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Kun","family":"Sun","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, CA, USA"}]},{"given":"Mingwei","family":"Xu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Zhuotao","family":"Liu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIBGRAPI51738.2020.00035"},{"key":"e_1_3_2_2_2_1","volume-title":"International Conference on Machine Learning. PMLR, 560--569","author":"Bernstein Jeremy","year":"2018","unstructured":"Jeremy Bernstein, Yu-Xiang Wang, Kamyar Azizzadenesheli, and Animashree Anandkumar. 2018. signSGD: Compressed optimisation for non-convex problems. In International Conference on Machine Learning. PMLR, 560--569."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_3_2_2_4_1","volume-title":"International Conference on Machine Learning. PMLR, 1003--1013","author":"Bojchevski Aleksandar","year":"2020","unstructured":"Aleksandar Bojchevski, Johannes Klicpera, and Stephan G\u00fcnnemann. 2020. Efficient robustness certificates for discrete data: Sparsity-aware randomized smoothing for graphs, images and more. In International Conference on Machine Learning. PMLR, 1003--1013."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Heng Chang Yu Rong Tingyang Xu Wenbing Huang Honglei Zhang Peng Cui Wenwu Zhu and Junzhou Huang. 2020. A Restricted Black-Box Adversarial Framework Towards Attacking Graph Embedding Models.. In AAAI. 3389--3396.","DOI":"10.1609\/aaai.v34i04.5741"},{"key":"e_1_3_2_2_6_1","volume-title":"MGA: Momentum Gradient Attack on Network. arXiv preprint arXiv:2002.11320","author":"Chen Jinyin","year":"2020","unstructured":"Jinyin Chen, Yixian Chen, Haibin Zheng, Shijing Shen, Shanqing Yu, Dan Zhang, and Qi Xuan. 2020. MGA: Momentum Gradient Attack on Network. arXiv preprint arXiv:2002.11320 (2020)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2020.3004059"},{"key":"e_1_3_2_2_8_1","volume-title":"2020 b","author":"Chen Jinyin","year":"2020","unstructured":"Jinyin Chen, Xiang Lin, Hui Xiong, Yangyang Wu, Haibin Zheng, and Qi Xuan. 2020 b. Smoothing Adversarial Training for GNN. IEEE Transactions on Computational Social Systems (2020)."},{"key":"e_1_3_2_2_9_1","volume-title":"Fast gradient attack on network embedding. arXiv preprint arXiv:1809.02797","author":"Chen Jinyin","year":"2018","unstructured":"Jinyin Chen, Yangyang Wu, Xuanheng Xu, Yixian Chen, Haibin Zheng, and Qi Xuan. 2018. Fast gradient attack on network embedding. arXiv preprint arXiv:1809.02797 (2018)."},{"key":"e_1_3_2_2_10_1","volume-title":"Supervised community detection with line graph neural networks. arXiv preprint arXiv:1705.08415","author":"Chen Zhengdao","year":"2017","unstructured":"Zhengdao Chen, Xiang Li, and Joan Bruna. 2017. Supervised community detection with line graph neural networks. arXiv preprint arXiv:1705.08415 (2017)."},{"key":"e_1_3_2_2_11_1","volume-title":"Query-efficient hard-label black-box attack: An optimization-based approach. arXiv preprint arXiv:1807.04457","author":"Cheng Minhao","year":"2018","unstructured":"Minhao Cheng, Thong Le, Pin-Yu Chen, Jinfeng Yi, Huan Zhang, and Cho-Jui Hsieh. 2018. Query-efficient hard-label black-box attack: An optimization-based approach. arXiv preprint arXiv:1807.04457 (2018)."},{"key":"e_1_3_2_2_12_1","volume-title":"Sign-opt: A query-efficient hard-label adversarial attack. arXiv preprint arXiv:1909.10773","author":"Cheng Minhao","year":"2019","unstructured":"Minhao Cheng, Simranjit Singh, Patrick Chen, Pin-Yu Chen, Sijia Liu, and Cho-Jui Hsieh. 2019. Sign-opt: A query-efficient hard-label adversarial attack. arXiv preprint arXiv:1909.10773 (2019)."},{"key":"e_1_3_2_2_13_1","volume-title":"Adversarial attack on graph structured data. arXiv preprint arXiv:1806.02371","author":"Dai Hanjun","year":"2018","unstructured":"Hanjun Dai, Hui Li, Tian Tian, Xin Huang, Lin Wang, Jun Zhu, and Le Song. 2018. Adversarial attack on graph structured data. arXiv preprint arXiv:1806.02371 (2018)."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371789"},{"key":"e_1_3_2_2_15_1","volume-title":"Graph u-nets. arXiv preprint arXiv:1905.05178","author":"Gao Hongyang","year":"2019","unstructured":"Hongyang Gao and Shuiwang Ji. 2019. Graph u-nets. arXiv preprint arXiv:1905.05178 (2019)."},{"key":"e_1_3_2_2_16_1","volume-title":"Neural message passing for quantum chemistry. arXiv preprint arXiv:1704.01212","author":"Gilmer Justin","year":"2017","unstructured":"Justin Gilmer, Samuel S Schoenholz, Patrick F Riley, Oriol Vinyals, and George E Dahl. 2017. Neural message passing for quantum chemistry. arXiv preprint arXiv:1704.01212 (2017)."},{"key":"e_1_3_2_2_17_1","unstructured":"Will Hamilton Zhitao Ying and Jure Leskovec. 2017a. Inductive representation learning on large graphs. Advances in neural information processing systems. 1024--1034."},{"key":"e_1_3_2_2_18_1","volume-title":"Representation learning on graphs: Methods and applications. arXiv preprint arXiv:1709.05584","author":"Hamilton William L","year":"2017","unstructured":"William L Hamilton, Rex Ying, and Jure Leskovec. 2017b. Representation learning on graphs: Methods and applications. arXiv preprint arXiv:1709.05584 (2017)."},{"key":"e_1_3_2_2_19_1","volume-title":"Neil Zhenqiang Gong, and Yang Zhang","author":"He Xinlei","year":"2020","unstructured":"Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, and Yang Zhang. 2020. Stealing Links from Graph Neural Networks. arXiv preprint arXiv:2005.02131 (2020)."},{"key":"e_1_3_2_2_20_1","volume-title":"Robust graph convolutional networks with directional graph adversarial training. Applied Intelligence","author":"Hu Weibo","year":"2021","unstructured":"Weibo Hu, Chuan Chen, Yaomin Chang, Zibin Zheng, and Yunfei Du. 2021. Robust graph convolutional networks with directional graph adversarial training. Applied Intelligence (2021), 1--15."},{"key":"e_1_3_2_2_21_1","volume-title":"Strategies for Pre-training Graph Neural Networks. arXiv preprint arXiv:1905.12265","author":"Hu Weihua","year":"2019","unstructured":"Weihua Hu, Bowen Liu, Joseph Gomes, Marinka Zitnik, Percy Liang, Vijay Pande, and Jure Leskovec. 2019. Strategies for Pre-training Graph Neural Networks. arXiv preprint arXiv:1905.12265 (2019)."},{"key":"e_1_3_2_2_22_1","volume-title":"Venkata Jaya Shankar Ashish Peruri, and Xinhua Zhang","author":"Jin Hongwei","year":"2020","unstructured":"Hongwei Jin, Zhan Shi, Venkata Jaya Shankar Ashish Peruri, and Xinhua Zhang. 2020. Certified Robustness of Graph Convolution Networks for Graph Classification under Topological Attacks. Advances in Neural Information Processing Systems, Vol. 33 (2020)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-67664-3_24"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1137\/S1064827595287997"},{"key":"e_1_3_2_2_25_1","volume-title":"Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_3_2_2_26_1","volume-title":"Self-attention graph pooling. arXiv preprint arXiv:1904.08082","author":"Lee Junhyun","year":"2019","unstructured":"Junhyun Lee, Inyeop Lee, and Jaewoo Kang. 2019. Self-attention graph pooling. arXiv preprint arXiv:1904.08082 (2019)."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384750"},{"key":"e_1_3_2_2_28_1","volume-title":"International Conference on Learning Representations .","author":"Liu Sijia","year":"2018","unstructured":"Sijia Liu, Pin-Yu Chen, Xiangyi Chen, and Mingyi Hong. 2018a. signSGD via zeroth-order oracle. In International Conference on Learning Representations ."},{"key":"e_1_3_2_2_29_1","first-page":"3727","article-title":"Zeroth-order stochastic variance reduction for nonconvex optimization","volume":"31","author":"Liu Sijia","year":"2018","unstructured":"Sijia Liu, Bhavya Kailkhura, Pin-Yu Chen, Paishun Ting, Shiyu Chang, and Lisa Amini. 2018b. Zeroth-order stochastic variance reduction for nonconvex optimization. Advances in Neural Information Processing Systems, Vol. 31 (2018), 3727--3737.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_30_1","volume-title":"A unified framework for data poisoning attack to graph-based semi-supervised learning. arXiv preprint arXiv:1910.14147","author":"Liu Xuanqing","year":"2019","unstructured":"Xuanqing Liu, Si Si, Xiaojin Zhu, Yang Li, and Cho-Jui Hsieh. 2019. A unified framework for data poisoning attack to graph-based semi-supervised learning. arXiv preprint arXiv:1910.14147 (2019)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357815"},{"key":"e_1_3_2_2_32_1","volume-title":"Black-box adversarial attacks on graph neural networks with limited node access. arXiv preprint arXiv:2006.05057","author":"Ma Jiaqi","year":"2020","unstructured":"Jiaqi Ma, Shuangrui Ding, and Qiaozhu Mei. 2020. Black-box adversarial attacks on graph neural networks with limited node access. arXiv preprint arXiv:2006.05057 (2020)."},{"key":"e_1_3_2_2_33_1","volume-title":"Attacking graph convolutional networks via rewiring. arXiv preprint arXiv:1906.03750","author":"Ma Yao","year":"2019","unstructured":"Yao Ma, Suhang Wang, Tyler Derr, Lingfei Wu, and Jiliang Tang. 2019. Attacking graph convolutional networks via rewiring. arXiv preprint arXiv:1906.03750 (2019)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01029"},{"key":"e_1_3_2_2_35_1","volume-title":"ICML 2020 Workshop on Graph Representation Learning and Beyond (GRL+2020)","author":"Morris Christopher","year":"2020","unstructured":"Christopher Morris, Nils M. Kriege, Franka Bause, Kristian Kersting, Petra Mutzel, and Marion Neumann. 2020. TUDataset: A collection of benchmark datasets for learning with graphs. In ICML 2020 Workshop on Graph Representation Learning and Beyond (GRL+2020) .arxiv: 2007.08663 www.graphlearning.io"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10208-015-9296-2"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89689-0_33"},{"key":"e_1_3_2_2_38_1","volume-title":"Dropedge: Towards deep graph convolutional networks on node classification. In ICLR .","author":"Rong Yu","year":"2020","unstructured":"Yu Rong, Wenbing Huang, Tingyang Xu, and Junzhou Huang. 2020. Dropedge: Towards deep graph convolutional networks on node classification. In ICLR ."},{"key":"e_1_3_2_2_39_1","unstructured":"S. K. Nayar S. A. Nene and H. Murase. 1996. Columbia Object Image Library. https:\/\/www.cs.columbia.edu\/CAVE\/software\/softlib\/coil-100.php. (1996)."},{"key":"e_1_3_2_2_40_1","article-title":"Weisfeiler-lehman graph kernels","volume":"12","author":"Shervashidze Nino","year":"2011","unstructured":"Nino Shervashidze, Pascal Schweitzer, Erik Jan Van Leeuwen, Kurt Mehlhorn, and Karsten M Borgwardt. 2011. Weisfeiler-lehman graph kernels. Journal of Machine Learning Research, Vol. 12, 9 (2011).","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_2_41_1","volume-title":"Node injection attacks on graphs via reinforcement learning. arXiv preprint arXiv:1909.06543","author":"Sun Yiwei","year":"2019","unstructured":"Yiwei Sun, Suhang Wang, Xianfeng Tang, Tsung-Yu Hsieh, and Vasant Honavar. 2019. Node injection attacks on graphs via reinforcement learning. arXiv preprint arXiv:1909.06543 (2019)."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006004"},{"key":"e_1_3_2_2_43_1","volume-title":"Adversarial Attack on Hierarchical Graph Pooling Neural Networks. arXiv preprint arXiv:2005.11560","author":"Tang Haoteng","year":"2020","unstructured":"Haoteng Tang, Guixiang Ma, Yurong Chen, Lei Guo, Wei Wang, Bo Zeng, and Liang Zhan. 2020. Adversarial Attack on Hierarchical Graph Pooling Neural Networks. arXiv preprint arXiv:2005.11560 (2020)."},{"key":"e_1_3_2_2_44_1","volume-title":"Gang Li, and Wei Wang.","author":"Tian Yunzhe","year":"2021","unstructured":"Yunzhe Tian, Jiqiang Liu, Endong Tong, Wenjia Niu, Liang Chang, Qi Alfred Chen, Gang Li, and Wei Wang. 2021. Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure. Security and Communication Networks, Vol. 2021 (2021)."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0103-5"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354206"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"crossref","unstructured":"Binghui Wang Jinyuan Jia Xiaoyu Cao and Neil Zhenqiang Gong. 2021. Certified robustness of graph neural networks against adversarial structural perturbation. In ACM SIGKDD .","DOI":"10.1145\/3447548.3467295"},{"key":"e_1_3_2_2_48_1","volume-title":"Evasion Attacks to Graph Neural Networks via Influence Function. arXiv preprint arXiv:2009.00203","author":"Wang Binghui","year":"2020","unstructured":"Binghui Wang, Tianxiang Zhou, Minhua Lin, Pan Zhou, Ang Li, Meng Pang, Cai Fu, Hai Li, and Yiran Chen. 2020. Evasion Attacks to Graph Neural Networks via Influence Function. arXiv preprint arXiv:2009.00203 (2020)."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"Shen Wang Zhengzhang Chen Xiao Yu Ding Li Jingchao Ni Lu-An Tang Jiaping Gui Zhichun Li Haifeng Chen and S Yu Philip. 2019. Heterogeneous Graph Matching Networks for Unknown Malware Detection.. In IJCAI. 3762--3770.","DOI":"10.24963\/ijcai.2019\/522"},{"key":"e_1_3_2_2_50_1","volume-title":"Attack graph convolutional networks by adding fake nodes. arXiv preprint arXiv:1810.10751","author":"Wang Xiaoyun","year":"2018","unstructured":"Xiaoyun Wang, Minhao Cheng, Joe Eaton, Cho-Jui Hsieh, and Felix Wu. 2018. Attack graph convolutional networks by adding fake nodes. arXiv preprint arXiv:1810.10751 (2018)."},{"key":"e_1_3_2_2_51_1","volume-title":"Christopher Fifty, Tao Yu, and Kilian Q Weinberger. 2019 b. Simplifying graph convolutional networks. arXiv preprint arXiv:1902.07153","author":"Wu Felix","year":"2019","unstructured":"Felix Wu, Tianyi Zhang, Amauri Holanda de Souza Jr, Christopher Fifty, Tao Yu, and Kilian Q Weinberger. 2019 b. Simplifying graph convolutional networks. arXiv preprint arXiv:1902.07153 (2019)."},{"key":"e_1_3_2_2_52_1","volume-title":"2019 a. Adversarial examples on graph data: Deep insights into attack and defense. arXiv preprint arXiv:1903.01610","author":"Wu Huijun","year":"2019","unstructured":"Huijun Wu, Chen Wang, Yuriy Tyshetskiy, Andrew Docherty, Kai Lu, and Liming Zhu. 2019 a. Adversarial examples on graph data: Deep insights into attack and defense. arXiv preprint arXiv:1903.01610 (2019)."},{"key":"e_1_3_2_2_53_1","volume-title":"Graph backdoor. arXiv preprint arXiv:2006.11890","author":"Xi Zhaohan","year":"2020","unstructured":"Zhaohan Xi, Ren Pang, Shouling Ji, and Ting Wang. 2020. Graph backdoor. arXiv preprint arXiv:2006.11890 (2020)."},{"key":"e_1_3_2_2_54_1","volume-title":"Topology attack and defense for graph neural networks: An optimization perspective. arXiv preprint arXiv:1906.04214","author":"Xu Kaidi","year":"2019","unstructured":"Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Mingyi Hong, and Xue Lin. 2019. Topology attack and defense for graph neural networks: An optimization perspective. arXiv preprint arXiv:1906.04214 (2019)."},{"key":"e_1_3_2_2_55_1","volume-title":"How powerful are graph neural networks? arXiv preprint arXiv:1810.00826","author":"Xu Keyulu","year":"2018","unstructured":"Keyulu Xu, Weihua Hu, Jure Leskovec, and Stefanie Jegelka. 2018a. How powerful are graph neural networks? arXiv preprint arXiv:1810.00826 (2018)."},{"key":"e_1_3_2_2_56_1","volume-title":"Representation learning on graphs with jumping knowledge networks. arXiv preprint arXiv:1806.03536","author":"Xu Keyulu","year":"2018","unstructured":"Keyulu Xu, Chengtao Li, Yonglong Tian, Tomohiro Sonobe, Ken-ichi Kawarabayashi, and Stefanie Jegelka. 2018b. Representation learning on graphs with jumping knowledge networks. arXiv preprint arXiv:1806.03536 (2018)."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783417"},{"key":"e_1_3_2_2_58_1","unstructured":"Zhitao Ying Jiaxuan You Christopher Morris Xiang Ren Will Hamilton and Jure Leskovec. 2018. Hierarchical graph representation learning with differentiable pooling. In Advances in neural information processing systems. 4800--4810."},{"key":"e_1_3_2_2_59_1","unstructured":"Muhan Zhang and Yixin Chen. 2018. Link prediction based on graph neural networks. In Advances in Neural Information Processing Systems. 5165--5175."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11782"},{"key":"e_1_3_2_2_61_1","volume-title":"Backdoor attacks to graph neural networks. arXiv preprint arXiv:2006.11165","author":"Zhang Zaixi","year":"2020","unstructured":"Zaixi Zhang, Jinyuan Jia, Binghui Wang, and Neil Zhenqiang Gong. 2020. Backdoor attacks to graph neural networks. arXiv preprint arXiv:2006.11165 (2020)."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3358106"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"},{"key":"e_1_3_2_2_64_1","volume-title":"Adversarial attacks on graph neural networks via meta learning. arXiv preprint arXiv:1902.08412","author":"Z\u00fcgner Daniel","year":"2019","unstructured":"Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Adversarial attacks on graph neural networks via meta learning. arXiv preprint arXiv:1902.08412 (2019)."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484796","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484796","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484796","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:53:37Z","timestamp":1763499217000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484796"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":64,"alternative-id":["10.1145\/3460120.3484796","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484796","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}