{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T14:15:48Z","timestamp":1775225748326,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":96,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3485383","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"86-107","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":68,"title":["Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information"],"prefix":"10.1145","author":[{"given":"Baolin","family":"Zheng","sequence":"first","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Peipei","family":"Jiang","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Qian","family":"Wang","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Chao","family":"Shen","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, Xi'an, China"}]},{"given":"Cong","family":"Wang","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Hong Kong, China"}]},{"given":"Yunjie","family":"Ge","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Qingyang","family":"Teng","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Shenyi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2014. Alexa. https:\/\/developer.amazon.com\/en-US\/alexa."},{"key":"e_1_3_2_2_2_1","unstructured":"2014. Kaldi. http:\/\/kaldi-asr.org."},{"key":"e_1_3_2_2_3_1","unstructured":"2015. iFlytek Speech-to-Text. https:\/\/www.xfyun.cn\/services\/voicedictation."},{"key":"e_1_3_2_2_4_1","unstructured":"2018. Alexa Auto SDK. https:\/\/developer.amazon.com\/en-US\/alexa\/alexa-auto\/sdk."},{"key":"e_1_3_2_2_5_1","unstructured":"2018. Google Cloud Speech-to-Text. https:\/\/cloud.google.com\/speech-to-text."},{"key":"e_1_3_2_2_6_1","unstructured":"2018. Microsoft Azure Speech Service. https:\/\/azure.microsoft.com\/en-us\/services\/cognitive-services\/speech-services\/."},{"key":"e_1_3_2_2_7_1","unstructured":"2018. Talentedsoft. http:\/\/www.talentedsoft.com\/."},{"key":"e_1_3_2_2_8_1","unstructured":"2020. Common Voice Dataset. https:\/\/voice.mozilla.org\/en\/datasets."},{"key":"e_1_3_2_2_9_1","unstructured":"2020. Jingdong Speaker Recognition. https:\/\/www.jdcloud.com\/en\/products\/voiceprint-recognition."},{"key":"e_1_3_2_2_10_1","unstructured":"2020. Tencent Short Speech Recognition. https:\/\/cloud.tencent.com\/document\/product\/1093."},{"key":"e_1_3_2_2_11_1","unstructured":"2021. Alibaba Short Speech Recognition. https:\/\/www.alibabacloud.com\/zh\/product\/intelligent-speech-interaction."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23362"},{"key":"e_1_3_2_2_13_1","volume-title":"Srivastava","author":"Alzantot Moustafa","year":"2019","unstructured":"Moustafa Alzantot, Yash Sharma, Supriyo Chakraborty, Huan Zhang, Cho-Jui Hsieh, and Mani B. Srivastava. 2019. Genattack: Practical Black-box Attacks with Gradient-free Optimization. In Proc. of GECCO."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311956"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1570256.1570342"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA460743"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/591"},{"key":"e_1_3_2_2_18_1","volume-title":"Instance Adaptive Adversarial Training: Improved Accuracy Tradeoffs in Neural Nets. CoRR abs\/1910.08051","author":"Balaji Yogesh","year":"2019","unstructured":"Yogesh Balaji, Tom Goldstein, and Judy Hoffman. 2019. Instance Adaptive Adversarial Training: Improved Accuracy Tradeoffs in Neural Nets. CoRR abs\/1910.08051 (2019)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01258-8_10"},{"key":"e_1_3_2_2_20_1","first-page":"13","article-title":"Biometric Authentication: A Review. International Journal of u-and e-Service","volume":"2","author":"Bhattacharyya Debnath","year":"2009","unstructured":"Debnath Bhattacharyya, Rahul Ranjan, Farkhod Alisherov, Minkyu Choi, et al. 2009. Biometric Authentication: A Review. International Journal of u-and e-Service, Science and Technology 2, 3 (2009), 13--28.","journal-title":"Science and Technology"},{"key":"e_1_3_2_2_21_1","volume-title":"Proc. of ICLR.","author":"Brendel Wieland","year":"2018","unstructured":"Wieland Brendel, Jonas Rauber, and Matthias Bethge. 2018. Decision-based Adversarial Attacks: Reliable Attacks Against Black-box Machine Learning Models. In Proc. of ICLR."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/520"},{"key":"e_1_3_2_2_23_1","volume-title":"Proc. of USENIX Security.","author":"Carlini Nicholas","year":"2016","unstructured":"Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David A. Wagner, and Wenchao Zhou. 2016. Hidden Voice Commands. In Proc. of USENIX Security."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00004"},{"key":"e_1_3_2_2_27_1","volume-title":"Wainwright","author":"Chen Jianbo","year":"2020","unstructured":"Jianbo Chen, Michael I. Jordan, and Martin J. Wainwright. 2020. HopSkipJumpAttack: A Query-efficient Decision-based Attack. In Proc. of IEEE S&P."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"e_1_3_2_2_29_1","volume-title":"Improved Techniques for Model Inversion Attacks. CoRR abs\/2010.04092","author":"Chen Si","year":"2020","unstructured":"Si Chen, Ruoxi Jia, and Guo-Jun Qi. 2020. Improved Techniques for Model Inversion Attacks. CoRR abs\/2010.04092 (2020)."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.133"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23055"},{"key":"e_1_3_2_2_32_1","volume-title":"Proc. of USENIX Security.","author":"Chen Yuxuan","year":"2020","unstructured":"Yuxuan Chen, Xuejing Yuan, Jiangshan Zhang, Yue Zhao, Shengzhi Zhang, Kai Chen, and XiaoFeng Wang. 2020. Devil's Whisper: A General Approach for Physical Adversarial Attacks Against Commercial Black-box Speech Recognition Devices. In Proc. of USENIX Security."},{"key":"e_1_3_2_2_33_1","volume-title":"Proc. of ICLR.","author":"Cheng Minhao","year":"2019","unstructured":"Minhao Cheng, Thong Le, Pin-Yu Chen, Huan Zhang, Jinfeng Yi, and Cho-Jui Hsieh. 2019. Query-efficient Hard-label Black-box Attack: An Optimization-based Approach. In Proc. of ICLR."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00790"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384733"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(97)00073-1"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6248074"},{"key":"e_1_3_2_2_39_1","volume-title":"Crafting Adversarial Examples for Speech Paralinguistics Applications. CoRR abs\/1711.03280","author":"Gong Yuan","year":"2017","unstructured":"Yuan Gong and Christian Poellabauer. 2017. Crafting Adversarial Examples for Speech Paralinguistics Applications. CoRR abs\/1711.03280 (2017)."},{"key":"e_1_3_2_2_40_1","volume-title":"Proc. of ICLR.","author":"Goodfellow Ian J.","year":"2015","unstructured":"Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In Proc. of ICLR."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"e_1_3_2_2_42_1","volume-title":"Ng","author":"Hannun Awni Y.","year":"2014","unstructured":"Awni Y. Hannun, Carl Case, Jared Casper, Bryan Catanzaro, Greg Diamos, Erich Elsen, Ryan Prenger, Sanjeev Satheesh, Shubho Sengupta, Adam Coates, and Andrew Y. Ng. 2014. Deep Speech: Scaling up End-to-end Speech Recognition. CoRR abs\/1412.5567 (2014)."},{"key":"e_1_3_2_2_43_1","volume-title":"The CMA Evolution Strategy: A Tutorial. CoRR abs\/1604.00772","author":"Hansen Nikolaus","year":"2016","unstructured":"Nikolaus Hansen. 2016. The CMA Evolution Strategy: A Tutorial. CoRR abs\/1604.00772 (2016)."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.399423"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2205597"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/02763869.2018.1404391"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1900006"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143997.1144082"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.1995189"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2021.101199"},{"key":"e_1_3_2_2_51_1","volume-title":"Study of Pre-processing Defenses Against Adversarial Attacks on State-of-the-art Speaker Recognition Systems. CoRR abs\/2101.08909","author":"Joshi Sonal","year":"2021","unstructured":"Sonal Joshi, Jes\u00fas Villalba, Laureano Moro-Vel\u00e1zquez, and Najim Dehak. 2021. Study of Pre-processing Defenses Against Adversarial Attacks on State-of-the-art Speaker Recognition Systems. CoRR abs\/2101.08909 (2021)."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1971.223392"},{"key":"e_1_3_2_2_53_1","volume-title":"Adversarial Black-box Attacks for Automatic Speech Recognition Systems Using Multi-objective Genetic Optimization. CoRR abs\/1811.01312","author":"Khare Shreya","year":"2018","unstructured":"Shreya Khare, Rahul Aralikatte, and Senthil Mani. 2018. Adversarial Black-box Attacks for Automatic Speech Recognition Systems Using Multi-objective Genetic Optimization. CoRR abs\/1811.01312 (2018)."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2009.08.009"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462693"},{"key":"e_1_3_2_2_56_1","volume-title":"Hinton","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. ImageNet Classification with Deep Convolutional Neural Networks. In Proc. of NeurIPS."},{"key":"e_1_3_2_2_57_1","volume-title":"Proc. of USENIX Security.","author":"Kumar Deepak","year":"2018","unstructured":"Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, and Michael Bailey. 2018. Skill Squatting Attacks on Amazon Alexa. In Proc. of USENIX Security."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA613971"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940562"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41278-3_43"},{"key":"e_1_3_2_2_61_1","volume-title":"Proc. of ICLR.","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In Proc. of ICLR."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_2_63_1","unstructured":"Lindasalwa Muda Mumtaj Begam and I. Elamvazuthi. 2010. Voice Recognition Algorithms Using Mel Frequency Cepstral Coefficient (MFCC) and Dynamic Time Warping (DTW) Techniques. CoRR abs\/1003.4083 (2010)."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-950"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-1808"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682992"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178964"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"crossref","unstructured":"Kenneth V. Price. 2013. Differential Evolution. In Handbook of Optimization. 187--214.","DOI":"10.1007\/978-3-642-30504-7_8"},{"key":"e_1_3_2_2_69_1","volume-title":"Proc. of ACM ICML.","author":"Qin Yao","year":"2019","unstructured":"Yao Qin, Nicholas Carlini, Garrison W. Cottrell, Ian J. Goodfellow, and Colin Raffel. 2019. Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition. In Proc. of ACM ICML."},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASRU.2017.8268935"},{"key":"e_1_3_2_2_71_1","volume-title":"Proc. of IEEE ICASSP.","author":"Reynolds Douglas A","year":"2002","unstructured":"Douglas A Reynolds. 2002. An Overview of Automatic Speaker Recognition Technology. In Proc. of IEEE ICASSP."},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/89.365379"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23288"},{"key":"e_1_3_2_2_75_1","volume-title":"Robust Over-the-air Adversarial Examples Against Automatic Speech Recognition Systems. CoRR abs\/1908.01551","author":"Sch\u00f6nherr Lea","year":"2019","unstructured":"Lea Sch\u00f6nherr, Steffen Zeiler, Thorsten Holz, and Dorothea Kolossa. 2019. Robust Over-the-air Adversarial Examples Against Automatic Speech Recognition Systems. CoRR abs\/1908.01551 (2019)."},{"key":"e_1_3_2_2_76_1","volume-title":"Proc. of NeurIPS.","author":"Shafahi Ali","year":"2019","unstructured":"Ali Shafahi, Mahyar Najibi, Amin Ghiasi, Zheng Xu, John P. Dickerson, Christoph Studer, Larry S. Davis, Gavin Taylor, and Tom Goldstein. 2019. Adversarial Training for Free!. In Proc. of NeurIPS."},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-620"},{"key":"e_1_3_2_2_78_1","volume-title":"Proc. of ICLR.","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian J. Goodfellow, and Rob Fergus. 2014. Intriguing Properties of Neural Networks. In Proc. of ICLR."},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2009.2037873"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00016"},{"key":"e_1_3_2_2_81_1","volume-title":"McDaniel","author":"Tram\u00e8r Florian","year":"2018","unstructured":"Florian Tram\u00e8r, Alexey Kurakin, Nicolas Papernot, Ian J. Goodfellow, Dan Boneh, and Patrick D. McDaniel. 2018. Ensemble Adversarial Training: Attacks and Defenses. In Proc. of ICLR."},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3026543"},{"key":"e_1_3_2_2_83_1","volume-title":"Generalizing Adversarial Examples by AdaBelief Optimizer. CoRR abs\/2101.09930","author":"Wang Yixiang","year":"2021","unstructured":"Yixiang Wang, Jiqiang Liu, and Xiaolin Chang. 2021. Generalizing Adversarial Examples by AdaBelief Optimizer. CoRR abs\/2101.09930 (2021)."},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00175354"},{"key":"e_1_3_2_2_85_1","volume-title":"Proc. of ICLR.","author":"Wong Eric","unstructured":"Eric Wong, Leslie Rice, and J. Zico Kolter. 2020. Fast Is Better Than Free: Revisiting Adversarial Training. In Proc. of ICLR."},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/741"},{"key":"e_1_3_2_2_87_1","volume-title":"Adversarial Example Generation with AdaBelief Optimizer and Crop Invariance. CoRR abs\/2102.03726","author":"Yang Bo","year":"2021","unstructured":"Bo Yang, Hengwei Zhang, Yuchen Zhang, Kaiyong Xu, and Jindong Wang. 2021. Adversarial Example Generation with AdaBelief Optimizer and Crop Invariance. CoRR abs\/2102.03726 (2021)."},{"key":"e_1_3_2_2_88_1","volume-title":"Proc. of ICLR.","author":"Yang Zhuolin","year":"2019","unstructured":"Zhuolin Yang, Bo Li, Pin-Yu Chen, and Dawn Song. 2019. Characterizing Audio Adversarial Examples Using Temporal Dependency. In Proc. of ICLR."},{"key":"e_1_3_2_2_89_1","volume-title":"Proc. of IEEE CEC.","author":"Yang Zhenyu","year":"2008","unstructured":"Zhenyu Yang, Ke Tang, and Xin Yao. 2008. Multilevel Cooperative Coevolution for Large Scale Optimization. In Proc. of IEEE CEC."},{"key":"e_1_3_2_2_90_1","volume-title":"Gunter","author":"Yuan Xuejing","year":"2018","unstructured":"Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, and Carl A. Gunter. 2018. CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In Proc. of USENIX Security."},{"key":"e_1_3_2_2_91_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-1608"},{"key":"e_1_3_2_2_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"e_1_3_2_2_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00016"},{"key":"e_1_3_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"e_1_3_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23525"},{"key":"e_1_3_2_2_96_1","volume-title":"Duncan","author":"Zhuang Juntang","year":"2020","unstructured":"Juntang Zhuang, Tommy Tang, Yifan Ding, Sekhar C. Tatikonda, Nicha C. Dvornek, Xenophon Papademetris, and James S. Duncan. 2020. AdaBelief Optimizer: Adapting Stepsizes by the Belief in Observed Gradients. In Proc. of NeurIPS."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485383","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485383","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:47:55Z","timestamp":1763498875000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485383"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":96,"alternative-id":["10.1145\/3460120.3485383","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3485383","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}