{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:02:11Z","timestamp":1773154931509,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,11]],"date-time":"2021-07-11T00:00:00Z","timestamp":1625961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,7,11]]},"DOI":"10.1145\/3460319.3464837","type":"proceedings-article","created":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T22:18:43Z","timestamp":1625782723000},"page":"566-579","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":69,"title":["Empirical evaluation of smart contract testing: what is the best choice?"],"prefix":"10.1145","author":[{"given":"Meng","family":"Ren","sequence":"first","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Zijing","family":"Yin","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Fuchen","family":"Ma","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Zhenyang","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Waterloo, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0955-503X","authenticated-orcid":false,"given":"Yu","family":"Jiang","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Chengnian","family":"Sun","sequence":"additional","affiliation":[{"name":"University of Waterloo, Canada"}]},{"given":"Huizhong","family":"Li","sequence":"additional","affiliation":[{"name":"WeBank, China"}]},{"given":"Yan","family":"Cai","sequence":"additional","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2021,7,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985795"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3182657"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385990"},{"key":"e_1_3_2_1_4_1","volume-title":"Vandal: A scalable security analysis framework for smart contracts. arXiv preprint arXiv:1809.03981.","author":"Brent Lexi","year":"2018","unstructured":"Lexi Brent , Anton Jurisevic , Michael Kong , Eric Liu , Francois Gauthier , Vincent Gramoli , Ralph Holz , and Bernhard Scholz . 2018 . Vandal: A scalable security analysis framework for smart contracts. arXiv preprint arXiv:1809.03981. Lexi Brent, Anton Jurisevic, Michael Kong, Eric Liu, Francois Gauthier, Vincent Gramoli, Ralph Holz, and Bernhard Scholz. 2018. Vandal: A scalable security analysis framework for smart contracts. arXiv preprint arXiv:1809.03981."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985995"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32409-4_18"},{"key":"e_1_3_2_1_7_1","volume-title":"DEFECTCHECKER: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode. arxiv:2009.02663.","author":"Chen Jiachi","year":"2020","unstructured":"Jiachi Chen , Xin Xia , David Lo , John Grundy , Xiapu Luo , and Ting Chen . 2020 . DEFECTCHECKER: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode. arxiv:2009.02663. Jiachi Chen, Xin Xia, David Lo, John Grundy, Xiapu Luo, and Ting Chen. 2020. DEFECTCHECKER: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode. arxiv:2009.02663."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2989002"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884650"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2019.8870156"},{"key":"e_1_3_2_1_11_1","unstructured":"ConsenSys. 2018. Mythril. https:\/\/github.com\/ConsenSys\/mythril-classic  ConsenSys. 2018. Mythril. https:\/\/github.com\/ConsenSys\/mythril-classic"},{"key":"e_1_3_2_1_12_1","unstructured":"A Day and E Medvedev. 2019. Ethereum in BigQuery: a public dataset for smart contract analytics.  A Day and E Medvedev. 2019. Ethereum in BigQuery: a public dataset for smart contract analytics."},{"key":"e_1_3_2_1_13_1","volume-title":"LAVA: Large-Scale Automated Vulnerability Addition. In 2016 IEEE Symposium on Security and Privacy (SP). 110\u2013121","author":"Dolan-Gavitt B.","unstructured":"B. Dolan-Gavitt , P. Hulin , E. Kirda , T. Leek , A. Mambretti , W. Robertson , F. Ulrich , and R. Whelan . 2016 . LAVA: Large-Scale Automated Vulnerability Addition. In 2016 IEEE Symposium on Security and Privacy (SP). 110\u2013121 . B. Dolan-Gavitt, P. Hulin, E. Kirda, T. Leek, A. Mambretti, W. Robertson, F. Ulrich, and R. Whelan. 2016. LAVA: Large-Scale Automated Vulnerability Addition. In 2016 IEEE Symposium on Security and Privacy (SP). 110\u2013121."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380364"},{"key":"e_1_3_2_1_15_1","unstructured":"Etherscan. 2019. Etherscan. https:\/\/etherscan.io\/  Etherscan. 2019. Etherscan. https:\/\/etherscan.io\/"},{"key":"e_1_3_2_1_16_1","volume-title":"Slither: A Static Analysis Framework for Smart Contracts. In 2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB). 8\u201315","author":"Feist J.","unstructured":"J. Feist , G. Grieco , and A. Groce . 2019 . Slither: A Static Analysis Framework for Smart Contracts. In 2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB). 8\u201315 . J. Feist, G. Grieco, and A. Groce. 2019. Slither: A Static Analysis Framework for Smart Contracts. In 2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB). 8\u201315."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397385"},{"key":"e_1_3_2_1_18_1","unstructured":"Google. 2018. Fuzzer Test Suite. https:\/\/github.com\/google\/fuzzer-test-suite  Google. 2018. Fuzzer Test Suite. https:\/\/github.com\/google\/fuzzer-test-suite"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568278"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00120"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276486"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89722-6_10"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363230"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Bin Hu Zongyang Zhang Jianwei Liu Yizhong Liu Jiayuan Yin Rongxing Lu and Xiaodong Lin. 2020. A Comprehensive Survey on Smart Contract Construction and Execution: Paradigms Tools and Systems. arXiv preprint arXiv:2008.13413.  Bin Hu Zongyang Zhang Jianwei Liu Yizhong Liu Jiayuan Yin Rongxing Lu and Xiaodong Lin. 2020. A Comprehensive Survey on Smart Contract Construction and Execution: Paradigms Tools and Systems. arXiv preprint arXiv:2008.13413.","DOI":"10.1016\/j.patter.2020.100179"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380424"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_1_27_1","volume-title":"ZEUS: Analyzing Safety of Smart Contracts.. In NDSS.","author":"Kalra Sukrit","year":"2018","unstructured":"Sukrit Kalra , Seep Goel , Mohan Dhawan , and Subodh Sharma . 2018 . ZEUS: Analyzing Safety of Smart Contracts.. In NDSS. Sukrit Kalra, Seep Goel, Mohan Dhawan, and Subodh Sharma. 2018. ZEUS: Analyzing Safety of Smart Contracts.. In NDSS."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-018-0002-y"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183495"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240728"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Loi Luu Duc-Hiep Chu Hrishi Olickel Prateek Saxena and Aquinas Hobor. 2016. Making Smart Contracts Smarter. IACR Cryptology ePrint Archive 633.  Loi Luu Duc-Hiep Chu Hrishi Olickel Prateek Saxena and Aquinas Hobor. 2016. Making Smart Contracts Smarter. IACR Cryptology ePrint Archive 633.","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_1_33_1","volume-title":"Gasfuzz: Generating high gas consumption inputs to avoid out-of-gas vulnerability. arXiv preprint arXiv:1910.02945.","author":"Ma Fuchen","year":"2019","unstructured":"Fuchen Ma , Ying Fu , Meng Ren , Wanting Sun , Zhe Liu , Yu Jiang , Jun Sun , and Jiaguang Sun . 2019 . Gasfuzz: Generating high gas consumption inputs to avoid out-of-gas vulnerability. arXiv preprint arXiv:1910.02945. Fuchen Ma, Ying Fu, Meng Ren, Wanting Sun, Zhe Liu, Yu Jiang, Jun Sun, and Jiaguang Sun. 2019. Gasfuzz: Generating high gas consumption inputs to avoid out-of-gas vulnerability. arXiv preprint arXiv:1910.02945."},{"key":"e_1_3_2_1_34_1","article-title":"The art, science, and engineering of fuzzing: A survey","author":"Marie Man\u00e8s Valentin Jean","year":"2019","unstructured":"Valentin Jean Marie Man\u00e8s , HyungSeok Han , Choongwoo Han , Sang Kil Cha , Manuel Egele , Edward J Schwartz , and Maverick Woo . 2019 . The art, science, and engineering of fuzzing: A survey . IEEE Transactions on Software Engineering. Valentin Jean Marie Man\u00e8s, HyungSeok Han, Choongwoo Han, Sang Kil Cha, Manuel Egele, Edward J Schwartz, and Maverick Woo. 2019. The art, science, and engineering of fuzzing: A survey. IEEE Transactions on Software Engineering.","journal-title":"IEEE Transactions on Software Engineering."},{"key":"e_1_3_2_1_35_1","volume-title":"Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts. In Principles of Security and Trust, Lujo Bauer and Ralf K\u00fcsters (Eds.)","author":"Mavridou Anastasia","year":"2018","unstructured":"Anastasia Mavridou and Aron Laszka . 2018 . Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts. In Principles of Security and Trust, Lujo Bauer and Ralf K\u00fcsters (Eds.) . Springer International Publishing , Cham . 270\u2013277. isbn:978-3-319-89722-6 Anastasia Mavridou and Aron Laszka. 2018. Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts. In Principles of Security and Trust, Lujo Bauer and Ralf K\u00fcsters (Eds.). Springer International Publishing, Cham. 270\u2013277. isbn:978-3-319-89722-6"},{"key":"e_1_3_2_1_36_1","unstructured":"MITRE. 2018. Common vulnerabilities and exposures. https:\/\/cve.mitre.org\/  MITRE. 2018. Common vulnerabilities and exposures. https:\/\/cve.mitre.org\/"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00133"},{"key":"e_1_3_2_1_38_1","volume-title":"Smart Contract Weakness Classification and Test Cases. https:\/\/swcregistry.io\/ Accessed","author":"X.","year":"2019","unstructured":"Myth X. 2019. Smart Contract Weakness Classification and Test Cases. https:\/\/swcregistry.io\/ Accessed November 4, 2019 . MythX. 2019. Smart Contract Weakness Classification and Test Cases. https:\/\/swcregistry.io\/ Accessed November 4, 2019."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Tai D Nguyen Long H Pham Jun Sun Yun Lin and Quang Tran Minh. 2020. sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart Contracts. arXiv preprint arXiv:2004.08563.  Tai D Nguyen Long H Pham Jun Sun Yun Lin and Quang Tran Minh. 2020. sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart Contracts. arXiv preprint arXiv:2004.08563.","DOI":"10.1145\/3377811.3380334"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406332"},{"key":"e_1_3_2_1_42_1","unstructured":"Trail of Bits. 2018. ethersplay. https:\/\/github.com\/crytic\/ethersplay  Trail of Bits. 2018. ethersplay. https:\/\/github.com\/crytic\/ethersplay"},{"key":"e_1_3_2_1_43_1","volume-title":"Kim-Kwang Raymond Choo, and Amritraj Singh","author":"Parizi Reza M","year":"2018","unstructured":"Reza M Parizi , Ali Dehghantanha , Kim-Kwang Raymond Choo, and Amritraj Singh . 2018 . Empirical vulnerability analysis of automated smart contracts security testing on blockchains. arXiv preprint arXiv:1809.02702. Reza M Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo, and Amritraj Singh. 2018. Empirical vulnerability analysis of automated smart contracts security testing on blockchains. arXiv preprint arXiv:1809.02702."},{"key":"e_1_3_2_1_44_1","unstructured":"Daniel Perez and Benjamin Livshits. 2019. Smart contract vulnerabilities: Does anyone care? arXiv preprint arXiv:1902.06710.  Daniel Perez and Benjamin Livshits. 2019. Smart contract vulnerabilities: Does anyone care? arXiv preprint arXiv:1902.06710."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00024"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134073"},{"key":"e_1_3_2_1_47_1","unstructured":"Purathani Praitheeshan Lei Pan Jiangshan Yu Joseph Liu and Robin Doss. 2019. Security analysis methods on Ethereum smart contract vulnerabilities: a survey. arXiv preprint arXiv:1908.08605.  Purathani Praitheeshan Lei Pan Jiangshan Yu Joseph Liu and Robin Doss. 2019. Security analysis methods on Ethereum smart contract vulnerabilities: a survey. arXiv preprint arXiv:1908.08605."},{"key":"e_1_3_2_1_48_1","unstructured":"Raine Revere. 2018. solgraph. https:\/\/github.com\/raineorshine\/solgraph  Raine Revere. 2018. solgraph. https:\/\/github.com\/raineorshine\/solgraph"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00032"},{"key":"e_1_3_2_1_50_1","volume-title":"Porosity: A decompiler for blockchain-based smart contracts bytecode. DEF con, 25","author":"Suiche Matt","year":"2017","unstructured":"Matt Suiche . 2017 . Porosity: A decompiler for blockchain-based smart contracts bytecode. DEF con, 25 (2017), 11. Matt Suiche. 2017. Porosity: A decompiler for blockchain-based smart contracts bytecode. DEF con, 25 (2017), 11."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194115"},{"key":"e_1_3_2_1_52_1","volume-title":"Arthur Gervais, and Radu State.","author":"Torres Christof Ferreira","year":"2020","unstructured":"Christof Ferreira Torres , Antonio Ken Iannillo , Arthur Gervais, and Radu State. 2020 . Towards Smart Hybrid Fuzzing for Smart Contracts . arXiv preprint arXiv:2005.12156. Christof Ferreira Torres, Antonio Ken Iannillo, Arthur Gervais, and Radu State. 2020. Towards Smart Hybrid Fuzzing for Smart Contracts. arXiv preprint arXiv:2005.12156."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"e_1_3_2_1_54_1","volume-title":"28th $USENIX$ Security Symposium ($USENIX$ Security 19). 1591\u20131607.","author":"Torres Christof Ferreira","unstructured":"Christof Ferreira Torres and Mathis Steichen . 2019. The art of the scam: Demystifying honeypots in ethereum smart contracts . In 28th $USENIX$ Security Symposium ($USENIX$ Security 19). 1591\u20131607. Christof Ferreira Torres and Mathis Steichen. 2019. The art of the scam: Demystifying honeypots in ethereum smart contracts. In 28th $USENIX$ Security Symposium ($USENIX$ Security 19). 1591\u20131607."},{"key":"e_1_3_2_1_55_1","volume-title":"Securify: Practical Security Analysis of Smart Contracts. In ACM Conference on Computer and Communications Security.","author":"Tsankov Petar","unstructured":"Petar Tsankov , Andrei Marian Dan , Dana Drachsler-Cohen , Arthur Gervais , Florian Buenzli , and Martin T. Vechev . 2018 . Securify: Practical Security Analysis of Smart Contracts. In ACM Conference on Computer and Communications Security. Petar Tsankov, Andrei Marian Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian Buenzli, and Martin T. Vechev. 2018. Securify: Practical Security Analysis of Smart Contracts. In ACM Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_56_1","unstructured":"Patrick Ventuzelo. 2018. Octopus. https:\/\/github.com\/pventuzelo\/octopus  Patrick Ventuzelo. 2018. Octopus. https:\/\/github.com\/pventuzelo\/octopus"},{"key":"e_1_3_2_1_57_1","unstructured":"Mingzhe Wang Jie Liang Chijin Zhou Yuanliang Chen Zhiyong Wu and Yu Jiang. [n.d.]. Industrial Oriented Evaluation of Fuzzing Techniques.  Mingzhe Wang Jie Liang Chijin Zhou Yuanliang Chen Zhiyong Wu and Yu Jiang. [n.d.]. Industrial Oriented Evaluation of Fuzzing Techniques."},{"key":"e_1_3_2_1_58_1","first-page":"1","article-title":"ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts","author":"Wang W.","year":"2020","unstructured":"W. Wang , J. Song , G. Xu , Y. Li , H. Wang , and C. Su . 2020 . ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts . IEEE Transactions on Network Science and Engineering , 1 \u2013 1 . W. Wang, J. Song, G. Xu, Y. Li, H. Wang, and C. Su. 2020. ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts. IEEE Transactions on Network Science and Engineering, 1\u20131.","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"e_1_3_2_1_59_1","volume-title":"Harvey: A greybox fuzzer for smart contracts. arXiv preprint arXiv:1905.06944.","author":"W\u00fcstholz Valentin","year":"2019","unstructured":"Valentin W\u00fcstholz and Maria Christakis . 2019 . Harvey: A greybox fuzzer for smart contracts. arXiv preprint arXiv:1905.06944. Valentin W\u00fcstholz and Maria Christakis. 2019. Harvey: A greybox fuzzer for smart contracts. arXiv preprint arXiv:1905.06944."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377812.3390908"},{"key":"e_1_3_2_1_61_1","unstructured":"Pengcheng Zhang Feng Xiao and Xiapu Luo. 2019. SolidityCheck: Quickly Detecting Smart Contract Problems Through Regular Expressions. arXiv preprint arXiv:1911.09425.  Pengcheng Zhang Feng Xiao and Xiapu Luo. 2019. SolidityCheck: Quickly Detecting Smart Contract Problems Through Regular Expressions. arXiv preprint arXiv:1911.09425."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328743"},{"key":"e_1_3_2_1_63_1","volume-title":"Security Symposium ($USENIX$ Security 18)","author":"Zhou Yi","year":"2018","unstructured":"Yi Zhou , Deepak Kumar , Surya Bakshi , Joshua Mason , Andrew Miller , and Michael Bailey . 2018 . Erays: reverse engineering ethereum\u2019s opaque smart contracts. In 27th $USENIX$ Security Symposium ($USENIX$ Security 18) . 1371\u20131385. Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, and Michael Bailey. 2018. Erays: reverse engineering ethereum\u2019s opaque smart contracts. In 27th $USENIX$ Security Symposium ($USENIX$ Security 18). 1371\u20131385."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329845"}],"event":{"name":"ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual Denmark","acronym":"ISSTA '21","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460319.3464837","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460319.3464837","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:36Z","timestamp":1750195476000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460319.3464837"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,11]]},"references-count":64,"alternative-id":["10.1145\/3460319.3464837","10.1145\/3460319"],"URL":"https:\/\/doi.org\/10.1145\/3460319.3464837","relation":{},"subject":[],"published":{"date-parts":[[2021,7,11]]},"assertion":[{"value":"2021-07-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}