{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:56:05Z","timestamp":1765356965881,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T00:00:00Z","timestamp":1626825600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"EPSRC","award":["EP\/P024394\/1, EP\/R033501\/1"],"award-info":[{"award-number":["EP\/P024394\/1, EP\/R033501\/1"]}]},{"DOI":"10.13039\/100004318","name":"Microsoft","doi-asserted-by":"publisher","award":["Microsoft Cloud Computing Research Centre"],"award-info":[{"award-number":["Microsoft Cloud Computing Research Centre"]}],"id":[{"id":"10.13039\/100004318","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,7,21]]},"DOI":"10.1145\/3461702.3462566","type":"proceedings-article","created":{"date-parts":[[2021,7,31]],"date-time":"2021-07-31T01:21:38Z","timestamp":1627694498000},"page":"597-607","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Monitoring AI Services for Misuse"],"prefix":"10.1145","author":[{"given":"Seyyed Ahmad","family":"Javadi","sequence":"first","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Chris","family":"Norval","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Richard","family":"Cloete","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Jatinder","family":"Singh","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2021,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.01.001"},{"key":"e_1_3_2_1_2_1","unstructured":"Amazon. 2019 a. Build an AI-driven Application. https:\/\/aws.amazon.com\/machine-learning\/ai-services\/  Amazon. 2019 a. Build an AI-driven Application. https:\/\/aws.amazon.com\/machine-learning\/ai-services\/"},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon. 2019 b. DetectFaces. https:\/\/docs.aws.amazon.com\/en_pv\/rekognition\/latest\/dg\/API_DetectFaces.html  Amazon. 2019 b. DetectFaces. https:\/\/docs.aws.amazon.com\/en_pv\/rekognition\/latest\/dg\/API_DetectFaces.html"},{"key":"e_1_3_2_1_4_1","unstructured":"Amazon. 2020. Amazon Rekognition FAQs. https:\/\/aws.amazon.com\/rekognition\/faqs\/?nc=sn&loc=7  Amazon. 2020. Amazon Rekognition FAQs. https:\/\/aws.amazon.com\/rekognition\/faqs\/?nc=sn&loc=7"},{"key":"e_1_3_2_1_5_1","volume-title":"Security and Privacy Issues in Deep Learning . arXiv preprint arXiv:1807.11655","author":"Bae Ho","year":"2018","unstructured":"Ho Bae , Jaehee Jang , Dahuin Jung , Hyemi Jang , Heonseok Ha , and Sungroh Yoon . 2018. Security and Privacy Issues in Deep Learning . arXiv preprint arXiv:1807.11655 ( 2018 ). Ho Bae, Jaehee Jang, Dahuin Jung, Hyemi Jang, Heonseok Ha, and Sungroh Yoon. 2018. Security and Privacy Issues in Deep Learning . arXiv preprint arXiv:1807.11655 (2018)."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the ACM Conference on Fairness, Accountability, and Transparency (FAT*). ACM, 210--219","author":"Bietti Elettra","year":"2020","unstructured":"Elettra Bietti . 2020 . From Ethics Washing to Ethics Bashing: A View on Tech Ethics from within Moral Philosophy . In Proceedings of the ACM Conference on Fairness, Accountability, and Transparency (FAT*). ACM, 210--219 . https:\/\/doi.org\/10.1145\/3351095.3372860 Elettra Bietti. 2020. From Ethics Washing to Ethics Bashing: A View on Tech Ethics from within Moral Philosophy. In Proceedings of the ACM Conference on Fairness, Accountability, and Transparency (FAT*). ACM, 210--219. https:\/\/doi.org\/10.1145\/3351095.3372860"},{"key":"e_1_3_2_1_7_1","volume-title":"et almbox","author":"Brundage Miles","year":"2018","unstructured":"Miles Brundage , Shahar Avin , Jack Clark , Helen Toner , Peter Eckersley , Ben Garfinkel , Allan Dafoe , Paul Scharre , Thomas Zeitzoff , Bobby Filar , et almbox . 2018 . The Malicious Use of Artificial Intelligence: Forecasting, Prevention , and Mitigation . arXiv preprint arXiv:1802.07228 (2018). Miles Brundage, Shahar Avin, Jack Clark, Helen Toner, Peter Eckersley, Ben Garfinkel, Allan Dafoe, Paul Scharre, Thomas Zeitzoff, Bobby Filar, et almbox. 2018. The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation . arXiv preprint arXiv:1802.07228 (2018)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Jennifer Cobbe and Jatinder Singh. 2021. Artificial Intelligence as a Service: Legal Responsibilities Liabilities and Policy Challenges. Available on SSRN . https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3824736  Jennifer Cobbe and Jatinder Singh. 2021. Artificial Intelligence as a Service: Legal Responsibilities Liabilities and Policy Challenges. Available on SSRN . https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3824736","DOI":"10.2139\/ssrn.3824736"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-018-09471-x"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.24018\/ejers.2017.2.1.237"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2347736.2347755"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 2nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","volume":"96","author":"Ester Martin","year":"1996","unstructured":"Martin Ester , Hans-Peter Kriegel , J\u00f6rg Sander , Xiaowei Xu , 1996 . A Density-based Algorithm for Discovering Clusters in Large Spatial Databases with Noise . In Proceedings of the 2nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining , Vol. 96 . 226--231. Martin Ester, Hans-Peter Kriegel, J\u00f6rg Sander, Xiaowei Xu, et almbox. 1996. A Density-based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. In Proceedings of the 2nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining , Vol. 96. 226--231."},{"key":"e_1_3_2_1_13_1","unstructured":"EU Commission. 2020. Digital Services Act . https:\/\/ec.europa.eu\/digital-single-market\/en\/digital-services-act-package  EU Commission. 2020. Digital Services Act . https:\/\/ec.europa.eu\/digital-single-market\/en\/digital-services-act-package"},{"key":"e_1_3_2_1_14_1","volume-title":"Proposal for a Regulation of the European Parliament and of the Council Laying Down Harmonised Rules on Artificial Intelligence","author":"EU Commission","year":"2021","unstructured":"EU Commission . 2021. Proposal for a Regulation of the European Parliament and of the Council Laying Down Harmonised Rules on Artificial Intelligence ( Artificial Intelligence Act) and Amending Certain Union Legislative Acts . COM( 2021 ) 206 (2021). EU Commission. 2021. Proposal for a Regulation of the European Parliament and of the Council Laying Down Harmonised Rules on Artificial Intelligence (Artificial Intelligence Act) and Amending Certain Union Legislative Acts . COM(2021) 206 (2021)."},{"key":"e_1_3_2_1_15_1","unstructured":"European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation) .  European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation) ."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-018-0475-8"},{"key":"e_1_3_2_1_17_1","unstructured":"Google. 2019 a. AI and Machine Learning Products. https:\/\/cloud.google.com\/products\/ai\/building-blocks\/  Google. 2019 a. AI and Machine Learning Products. https:\/\/cloud.google.com\/products\/ai\/building-blocks\/"},{"key":"e_1_3_2_1_18_1","unstructured":"Google. 2019 b. Our Approach to Facial Recognition. https:\/\/ai.google\/responsibilities\/facial-recognition\/  Google. 2019 b. Our Approach to Facial Recognition. https:\/\/ai.google\/responsibilities\/facial-recognition\/"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3371409"},{"key":"e_1_3_2_1_20_1","unstructured":"Kori Hale. 2020. Amazon Halts Police of its Facial Recognition Technology Following Years of Criticism . https:\/\/www.forbes.com\/sites\/korihale\/2020\/06\/15\/amazon-microsoft--ibm-slightly-social-distancing-from-the-8-billion-facial-recognition-market  Kori Hale. 2020. Amazon Halts Police of its Facial Recognition Technology Following Years of Criticism . https:\/\/www.forbes.com\/sites\/korihale\/2020\/06\/15\/amazon-microsoft--ibm-slightly-social-distancing-from-the-8-billion-facial-recognition-market"},{"key":"e_1_3_2_1_21_1","first-page":"99","article-title":"Deepfakes: False Pornography Is Here and the Law Cannot Protect You","volume":"17","author":"Harris Douglas","year":"2018","unstructured":"Douglas Harris . 2018 . Deepfakes: False Pornography Is Here and the Law Cannot Protect You . Duke Law and Technology Review , Vol. 17 (2018), 99 . Douglas Harris. 2018. Deepfakes: False Pornography Is Here and the Law Cannot Protect You. Duke Law and Technology Review , Vol. 17 (2018), 99.","journal-title":"Duke Law and Technology Review"},{"volume-title":"Proceedings of 2018 IEEE International Symposium on High Performance Computer Architecture. 620--629","author":"Hazelwood K.","key":"e_1_3_2_1_22_1","unstructured":"K. Hazelwood , S. Bird , D. Brooks , S. Chintala , U. Diril , D. Dzhulgakov , M. Fawzy , B. Jia , Y. Jia , A. Kalro , J. Law , K. Lee , J. Lu , P. Noordhuis , M. Smelyanskiy , L. Xiong , and X. Wang . 2018. Applied Machine Learning at Facebook: A Datacenter Infrastructure Perspective . In Proceedings of 2018 IEEE International Symposium on High Performance Computer Architecture. 620--629 . K. Hazelwood, S. Bird, D. Brooks, S. Chintala , U. Diril, D. Dzhulgakov , M. Fawzy, B. Jia, Y. Jia, A. Kalro, J. Law , K. Lee, J. Lu, P. Noordhuis, M. Smelyanskiy, L. Xiong, and X. Wang. 2018. Applied Machine Learning at Facebook: A Datacenter Infrastructure Perspective. In Proceedings of 2018 IEEE International Symposium on High Performance Computer Architecture. 620--629."},{"key":"e_1_3_2_1_23_1","volume-title":"Labeled Faces in the Wild: A Database for Studying Face Recognition in Unconstrained Environments. In Workshop on Faces in Real-Life Images: Detection, Alignment, and Recognition .","author":"Huang Gary B","year":"2008","unstructured":"Gary B Huang , Marwan Mattar , Tamara Berg , and Eric Learned-Miller . 2008 . Labeled Faces in the Wild: A Database for Studying Face Recognition in Unconstrained Environments. In Workshop on Faces in Real-Life Images: Detection, Alignment, and Recognition . Gary B Huang, Marwan Mattar, Tamara Berg, and Eric Learned-Miller. 2008. Labeled Faces in the Wild: A Database for Studying Face Recognition in Unconstrained Environments. In Workshop on Faces in Real-Life Images: Detection, Alignment, and Recognition ."},{"key":"e_1_3_2_1_24_1","unstructured":"IBM. 2019. IBM Watson Products and Solutions. https:\/\/www.ibm.com\/watson\/products-services  IBM. 2019. IBM Watson Products and Solutions. https:\/\/www.ibm.com\/watson\/products-services"},{"volume-title":"An Introduction to Statistical Learning","author":"James Gareth","key":"e_1_3_2_1_25_1","unstructured":"Gareth James , Daniela Witten , Trevor Hastie , and Robert Tibshirani . 2013. An Introduction to Statistical Learning . Vol. 112 . Springer . Gareth James, Daniela Witten, Trevor Hastie, and Robert Tibshirani. 2013. An Introduction to Statistical Learning. Vol. 112. Springer."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375873"},{"key":"e_1_3_2_1_27_1","unstructured":"Michael Kwet. 2020. The Real Question: When Do We Ban Human Drivers? https:\/\/theintercept.com\/2020\/07\/14\/microsoft-police-state-mass-surveillance-facial-recognition\/  Michael Kwet. 2020. The Real Question: When Do We Ban Human Drivers? https:\/\/theintercept.com\/2020\/07\/14\/microsoft-police-state-mass-surveillance-facial-recognition\/"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056489"},{"key":"e_1_3_2_1_30_1","unstructured":"Microsoft. 2019 a. Cognitive Services. https:\/\/azure.microsoft.com\/en-gb\/services\/cognitive-services  Microsoft. 2019 a. Cognitive Services. https:\/\/azure.microsoft.com\/en-gb\/services\/cognitive-services"},{"key":"e_1_3_2_1_31_1","unstructured":"Microsoft. 2019 b. Cognitive Services Pricing Face API. https:\/\/azure.microsoft.com\/en-gb\/pricing\/details\/cognitive-services\/face-api\/  Microsoft. 2019 b. Cognitive Services Pricing Face API. https:\/\/azure.microsoft.com\/en-gb\/pricing\/details\/cognitive-services\/face-api\/"},{"key":"e_1_3_2_1_32_1","first-page":"88","article-title":"Now You See Me: Now You Still Do: Facial Recognition Technology and The Growing Lack of Privacy . BUJ Sci","volume":"23","author":"Naker Sharon","year":"2017","unstructured":"Sharon Naker and Dov Greenbaum . 2017 . Now You See Me: Now You Still Do: Facial Recognition Technology and The Growing Lack of Privacy . BUJ Sci . & Tech. L. , Vol. 23 (2017), 88 -- 122 . Sharon Naker and Dov Greenbaum. 2017. Now You See Me: Now You Still Do: Facial Recognition Technology and The Growing Lack of Privacy . BUJ Sci. & Tech. L. , Vol. 23 (2017), 88--122.","journal-title":"& Tech. L."},{"key":"e_1_3_2_1_33_1","first-page":"421","article-title":"Alexa, What Should We Do about Privacy: Protecting Privacy for Users of Voice-Activated Devices","volume":"93","author":"Pfeifle Anne","year":"2018","unstructured":"Anne Pfeifle . 2018 . Alexa, What Should We Do about Privacy: Protecting Privacy for Users of Voice-Activated Devices . Wash. L. Rev. , Vol. 93 (2018), 421 -- 458 . Anne Pfeifle. 2018. Alexa, What Should We Do about Privacy: Protecting Privacy for Users of Voice-Activated Devices . Wash. L. Rev. , Vol. 93 (2018), 421--458.","journal-title":"Wash. L. Rev."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.6264"},{"key":"e_1_3_2_1_35_1","volume-title":"Gaussian Mixture Models . Encyclopedia of biometrics","author":"Reynolds Douglas A","year":"2009","unstructured":"Douglas A Reynolds . 2009. Gaussian Mixture Models . Encyclopedia of biometrics , Vol. 741 ( 2009 ). Douglas A Reynolds. 2009. Gaussian Mixture Models . Encyclopedia of biometrics , Vol. 741 (2009)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.152"},{"key":"e_1_3_2_1_37_1","first-page":"127","article-title":"Building Trust in Artificial Intelligence","volume":"72","author":"Rossi Francesca","year":"2019","unstructured":"Francesca Rossi . 2019 . Building Trust in Artificial Intelligence . Journal of international affairs , Vol. 72 , 1 (2019), 127 -- 134 . Francesca Rossi. 2019. Building Trust in Artificial Intelligence . Journal of international affairs , Vol. 72, 1 (2019), 127--134.","journal-title":"Journal of international affairs"},{"key":"e_1_3_2_1_38_1","unstructured":"David Sandberg. 2020. Face Recognition Using Tensorflow. https:\/\/github.com\/davidsandberg\/facenet  David Sandberg. 2020. Face Recognition Using Tensorflow. https:\/\/github.com\/davidsandberg\/facenet"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375804"},{"volume-title":"Proceedings of the Conference on Computer Vision and Pattern Recognition. 815--823","author":"Schroff F.","key":"e_1_3_2_1_40_1","unstructured":"F. Schroff , D. Kalenichenko , and J. Philbin . 2015. FaceNet: A Unified Embedding for Face Recognition and Clustering . In Proceedings of the Conference on Computer Vision and Pattern Recognition. 815--823 . F. Schroff, D. Kalenichenko, and J. Philbin. 2015. FaceNet: A Unified Embedding for Face Recognition and Clustering. In Proceedings of the Conference on Computer Vision and Pattern Recognition. 815--823."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287598"},{"key":"e_1_3_2_1_42_1","volume-title":"2020 USENIX Annual Technical Conference (ATC)) . 205--218","author":"Shahrad Mohammad","year":"2020","unstructured":"Mohammad Shahrad , Rodrigo Fonseca , \u00cd nigo Goiri, Gohar Chaudhry , Paul Batum , Jason Cooke , Eduardo Laureano , Colby Tresness , Mark Russinovich , and Ricardo Bianchini . 2020 . Serverless in the wild: Characterizing and optimizing the serverless workload at a large cloud provider . In 2020 USENIX Annual Technical Conference (ATC)) . 205--218 . Mohammad Shahrad, Rodrigo Fonseca, \u00cd nigo Goiri, Gohar Chaudhry, Paul Batum, Jason Cooke, Eduardo Laureano, Colby Tresness, Mark Russinovich, and Ricardo Bianchini. 2020. Serverless in the wild: Characterizing and optimizing the serverless workload at a large cloud provider. In 2020 USENIX Annual Technical Conference (ATC)) . 205--218."},{"key":"e_1_3_2_1_43_1","unstructured":"The Partnership on AI. 2020 a. About Us . https:\/\/www.partnershiponai.org\/about\/  The Partnership on AI. 2020 a. About Us . https:\/\/www.partnershiponai.org\/about\/"},{"key":"e_1_3_2_1_44_1","unstructured":"The Partnership on AI. 2020 b. When AI Systems Fail: Introducing the AI Incident Database. https:\/\/www.partnershiponai.org\/aiincidentdatabase\/  The Partnership on AI. 2020 b. When AI Systems Fail: Introducing the AI Incident Database. https:\/\/www.partnershiponai.org\/aiincidentdatabase\/"},{"key":"e_1_3_2_1_45_1","unstructured":"The Royal Society. 2018. The Impact of Artificial Intelligence on Work. https:\/\/royalsociety.org\/-\/media\/policy\/projects\/ai-and-work\/evidence-synthesis-the-impact-of-AI-on-work.PDF  The Royal Society. 2018. The Impact of Artificial Intelligence on Work. https:\/\/royalsociety.org\/-\/media\/policy\/projects\/ai-and-work\/evidence-synthesis-the-impact-of-AI-on-work.PDF"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Cristian Vaccari and Andrew Chadwick. 2020. Deepfakes and Disinformation: Exploring the Impact of Synthetic Political Video on Deception Uncertainty and Trust in News. Social Media  Cristian Vaccari and Andrew Chadwick. 2020. Deepfakes and Disinformation: Exploring the Impact of Synthetic Political Video on Deception Uncertainty and Trust in News. Social Media","DOI":"10.1177\/2056305120903408"},{"key":"e_1_3_2_1_47_1","volume-title":"1--13. https:\/\/doi.org\/10.1177\/2056305120903408","author":"Society , Vol. 6, 1","year":"2020","unstructured":"Society , Vol. 6, 1 ( 2020 ), 1--13. https:\/\/doi.org\/10.1177\/2056305120903408 Society , Vol. 6, 1 (2020), 1--13. https:\/\/doi.org\/10.1177\/2056305120903408"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v17i1\/2.13008"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372833"},{"key":"e_1_3_2_1_50_1","volume-title":"Responsible Facial Recognition and Beyond . arXiv:1909.12935","author":"Zeng Yi","year":"2019","unstructured":"Yi Zeng , Enmeng Lu , Yinqian Sun , and Ruochen Tian . 2019. Responsible Facial Recognition and Beyond . arXiv:1909.12935 ( 2019 ). Yi Zeng, Enmeng Lu, Yinqian Sun, and Ruochen Tian. 2019. Responsible Facial Recognition and Beyond . arXiv:1909.12935 (2019)."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.51593\/20190003"}],"event":{"name":"AIES '21: AAAI\/ACM Conference on AI, Ethics, and Society","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","AAAI"],"location":"Virtual Event USA","acronym":"AIES '21"},"container-title":["Proceedings of the 2021 AAAI\/ACM Conference on AI, Ethics, and Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3461702.3462566","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3461702.3462566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:49:06Z","timestamp":1750193346000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3461702.3462566"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,21]]},"references-count":51,"alternative-id":["10.1145\/3461702.3462566","10.1145\/3461702"],"URL":"https:\/\/doi.org\/10.1145\/3461702.3462566","relation":{},"subject":[],"published":{"date-parts":[[2021,7,21]]},"assertion":[{"value":"2021-07-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}