{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T16:15:43Z","timestamp":1762272943828,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100009614","name":"Petroleum Technology Development Fund","doi-asserted-by":"publisher","award":["PTDF\/ED\/OSS\/PHD\/1275\/17"],"award-info":[{"award-number":["PTDF\/ED\/OSS\/PHD\/1275\/17"]}],"id":[{"id":"10.13039\/501100009614","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3494107.3522772","type":"proceedings-article","created":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T16:36:10Z","timestamp":1652805370000},"page":"41-51","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Robust, Effective and Resource Efficient Deep Neural Network for Intrusion Detection in IoT Networks"],"prefix":"10.1145","author":[{"given":"Idris","family":"Zakariyya","sequence":"first","affiliation":[{"name":"Robert Gordon University, Aberdeen, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Harsha","family":"Kalutarage","sequence":"additional","affiliation":[{"name":"Robert Gordon University, Aberdeen, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M. Omar","family":"Al-Kadri","sequence":"additional","affiliation":[{"name":"Birmingham City University, Birmingham, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2018.e00938"},{"key":"e_1_3_2_2_2_1","first-page":"978","article-title":"Neural networks and deep learning","volume":"10","author":"Aggarwal Charu C","year":"2018","unstructured":"Charu C Aggarwal 2018 . Neural networks and deep learning . Springer 10 (2018), 978 -- 973 . Charu C Aggarwal et al. 2018. Neural networks and deep learning. Springer 10 (2018), 978--3.","journal-title":"Springer"},{"key":"e_1_3_2_2_3_1","unstructured":"Manos Antonakakis Tim April Michael Bailey Matt Bernhard Elie Bursztein Jaime Cochran Zakir Durumeric J Alex Halderman Luca Invernizzi Michalis Kallitsis etal 2017. Understanding the mirai botnet. In 26th {USENIX} security symposium ({USENIX} Security 17). 1093--1110.  Manos Antonakakis Tim April Michael Bailey Matt Bernhard Elie Bursztein Jaime Cochran Zakir Durumeric J Alex Halderman Luca Invernizzi Michalis Kallitsis et al. 2017. Understanding the mirai botnet. In 26th {USENIX} security symposium ({USENIX} Security 17). 1093--1110."},{"key":"e_1_3_2_2_4_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"283","author":"Athalye Anish","year":"2018","unstructured":"Anish Athalye , Nicholas Carlini , and David Wagner . 2018 . Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples . In Proceedings of the 35th International Conference on Machine Learning (Proceedings of Machine Learning Research , Vol. 80), Jennifer Dy and Andreas Krause (Eds.). PMLR, 274-- 283 . https:\/\/proceedings.mlr.press\/v80\/athalye18a.html Anish Athalye, Nicholas Carlini, and David Wagner. 2018. Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples. In Proceedings of the 35th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 80), Jennifer Dy and Andreas Krause (Eds.). PMLR, 274--283. https:\/\/proceedings.mlr.press\/v80\/athalye18a.html"},{"key":"e_1_3_2_2_5_1","volume-title":"27th International telecommunication networks and applications conference (ITNAC). IEEE, 1--6.","author":"Bhunia Suman Sankar","year":"2017","unstructured":"Suman Sankar Bhunia and Mohan Gurusamy . 2017 . Dynamic attack detection and mitigation in IoT using SDN. In 2017 27th International telecommunication networks and applications conference (ITNAC). IEEE, 1--6. Suman Sankar Bhunia and Mohan Gurusamy. 2017. Dynamic attack detection and mitigation in IoT using SDN. In 2017 27th International telecommunication networks and applications conference (ITNAC). IEEE, 1--6."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666652.2666666"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-017-9729-9"},{"volume-title":"Backpropagation: theory, architectures, and applications","author":"Chauvin Yves","key":"e_1_3_2_2_8_1","unstructured":"Yves Chauvin and David E Rumelhart . 2013. Backpropagation: theory, architectures, and applications . Psychology press . Yves Chauvin and David E Rumelhart. 2013. Backpropagation: theory, architectures, and applications. Psychology press."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.nanoen.2020.105414"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/su12166434"},{"key":"e_1_3_2_2_11_1","first-page":"1","article-title":"Intrusion detection systems for IoT-based smart environments: a survey","volume":"7","author":"Elrawy Mohamed Faisal","year":"2018","unstructured":"Mohamed Faisal Elrawy , Ali Ismail Awad , and Hesham FA Hamed . 2018 . Intrusion detection systems for IoT-based smart environments: a survey . Journal of Cloud Computing 7 , 1 (2018), 1 -- 20 . Mohamed Faisal Elrawy, Ali Ismail Awad, and HeshamFA Hamed. 2018. Intrusion detection systems for IoT-based smart environments: a survey. Journal of Cloud Computing 7, 1 (2018), 1--20.","journal-title":"Journal of Cloud Computing"},{"key":"e_1_3_2_2_12_1","unstructured":"Ian J. Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. arXiv:1412.6572 [stat.ML]  Ian J. Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. arXiv:1412.6572 [stat.ML]"},{"key":"e_1_3_2_2_13_1","volume-title":"Dally","author":"Han Song","year":"2015","unstructured":"Song Han , Jeff Pool , John Tran , and William J . Dally . 2015 . Learning bothWeights and Connections for Efficient Neural Networks . arXiv:1506.02626 [cs.NE] Song Han, Jeff Pool, John Tran, and William J. Dally. 2015. Learning bothWeights and Connections for Efficient Neural Networks. arXiv:1506.02626 [cs.NE]"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.0-136"},{"key":"e_1_3_2_2_15_1","volume-title":"IHS Markit Says. Retrieved","author":"Howell Jenalea","year":"2019","unstructured":"Jenalea Howell . [n. d.]. Number of Connected IoT Devices Will Surge to 125 Billion by 2030 , IHS Markit Says. Retrieved March 03, 2019 from https:\/\/news.ihsmarkit.com\/prviewer\/release_only\/slug\/numberconnected- iot-devices-will-surge-125-billion-2030-ihs-markit-says Jenalea Howell. [n. d.]. Number of Connected IoT Devices Will Surge to 125 Billion by 2030, IHS Markit Says. Retrieved March 03, 2019 from https:\/\/news.ihsmarkit.com\/prviewer\/release_only\/slug\/numberconnected- iot-devices-will-surge-125-billion-2030-ihs-markit-says"},{"key":"e_1_3_2_2_16_1","volume-title":"Gpipe: Efficient training of giant neural networks using pipeline parallelism. Advances in neural information processing systems 32","author":"Huang Yanping","year":"2019","unstructured":"Yanping Huang , Youlong Cheng , Ankur Bapna , Orhan Firat , Dehao Chen , Mia Chen , HyoukJoong Lee , Jiquan Ngiam , Quoc V Le , YonghuiWu, 2019 . Gpipe: Efficient training of giant neural networks using pipeline parallelism. Advances in neural information processing systems 32 (2019), 103--112. Yanping Huang, Youlong Cheng, Ankur Bapna, Orhan Firat, Dehao Chen, Mia Chen, HyoukJoong Lee, Jiquan Ngiam, Quoc V Le, YonghuiWu, et al. 2019. Gpipe: Efficient training of giant neural networks using pipeline parallelism. Advances in neural information processing systems 32 (2019), 103--112."},{"key":"e_1_3_2_2_17_1","volume-title":"2017 International Conference on Hardware\/Software Codesign and System Synthesis (CODES+ ISSS). IEEE, 1--10","author":"Iandola Forrest","year":"2017","unstructured":"Forrest Iandola and Kurt Keutzer . 2017 . Keynote: small neural nets are beautiful: enabling embedded systems with small deep-neural-network architectures . In 2017 International Conference on Hardware\/Software Codesign and System Synthesis (CODES+ ISSS). IEEE, 1--10 . Forrest Iandola and Kurt Keutzer. 2017. Keynote: small neural nets are beautiful: enabling embedded systems with small deep-neural-network architectures. In 2017 International Conference on Hardware\/Software Codesign and System Synthesis (CODES+ ISSS). IEEE, 1--10."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966185"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_2_19_1","unstructured":"intel. 2020 . Choose Precision . Retrieved Aug 10, 2020 from https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/should-ichoose- fp16-or-fp32-for-my-deep-learning-model.html intel. 2020. Choose Precision. Retrieved Aug 10, 2020 from https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/should-ichoose- fp16-or-fp32-for-my-deep-learning-model.html"},{"key":"e_1_3_2_2_20_1","volume-title":"Numerical Python: Scientific Computing and Data Science Applications with Numpy, SciPy and Matplotlib","author":"Johansson Robert","year":"2018","unstructured":"Robert Johansson . 2018 . Numerical Python: Scientific Computing and Data Science Applications with Numpy, SciPy and Matplotlib . Apress . Robert Johansson. 2018. Numerical Python: Scientific Computing and Data Science Applications with Numpy, SciPy and Matplotlib. Apress."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2017.102"},{"volume-title":"Automated Machine Learning","author":"Komer Brent","key":"e_1_3_2_2_22_1","unstructured":"Brent Komer , James Bergstra , and Chris Eliasmith . 2019. Hyperopt-sklearn . In Automated Machine Learning . Springer , Cham , 97--111. Brent Komer, James Bergstra, and Chris Eliasmith. 2019. Hyperopt-sklearn. In Automated Machine Learning. Springer, Cham, 97--111."},{"key":"e_1_3_2_2_23_1","first-page":"54","article-title":"Applying Big Data Processing and Machine Learning Methods for Mobile Internet of Things Security Monitoring","volume":"8","author":"Kotenko Igor V","year":"2018","unstructured":"Igor V Kotenko , Igor Saenko , and Alexander Branitskiy . 2018 . Applying Big Data Processing and Machine Learning Methods for Mobile Internet of Things Security Monitoring . J. Internet Serv. Inf. Secur. 8 , 3 (2018), 54 -- 63 . Igor V Kotenko, Igor Saenko, and Alexander Branitskiy. 2018. Applying Big Data Processing and Machine Learning Methods for Mobile Internet of Things Security Monitoring. J. Internet Serv. Inf. Secur. 8, 3 (2018), 54--63.","journal-title":"J. Internet Serv. Inf. Secur."},{"key":"e_1_3_2_2_24_1","unstructured":"Alexey Kurakin Ian Goodfellow and Samy Bengio. 2017. Adversarial Machine Learning at Scale. arXiv:1611.01236 [cs.CV]  Alexey Kurakin Ian Goodfellow and Samy Bengio. 2017. Adversarial Machine Learning at Scale. arXiv:1611.01236 [cs.CV]"},{"key":"e_1_3_2_2_25_1","volume-title":"Points of significance: Regularization. Nature methods 13, 10","author":"Lever Jake","year":"2016","unstructured":"Jake Lever , Martin Krzywinski , and Naomi Altman . 2016. Points of significance: Regularization. Nature methods 13, 10 ( 2016 ), 803--805. Jake Lever, Martin Krzywinski, and Naomi Altman. 2016. Points of significance: Regularization. Nature methods 13, 10 (2016), 803--805."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.013"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"e_1_3_2_2_28_1","volume-title":"Mixed Precision Training. In International Conference on Learning Representations.","author":"Micikevicius Paulius","year":"2018","unstructured":"Paulius Micikevicius , Sharan Narang , Jonah Alben , Gregory Diamos , Erich Elsen , David Garcia , Boris Ginsburg , Michael Houston , Oleksii Kuchaiev , Ganesh Venkatesh , 2018 . Mixed Precision Training. In International Conference on Learning Representations. Paulius Micikevicius, Sharan Narang, Jonah Alben, Gregory Diamos, Erich Elsen, David Garcia, Boris Ginsburg, Michael Houston, Oleksii Kuchaiev, Ganesh Venkatesh, et al. 2018. Mixed Precision Training. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_29_1","volume-title":"Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. arXiv:1802.09089 [cs.CR]","author":"Mirsky Yisroel","year":"2018","unstructured":"Yisroel Mirsky , Tomer Doitshman , Yuval Elovici , and Asaf Shabtai . 2018 . Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. arXiv:1802.09089 [cs.CR] Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, and Asaf Shabtai. 2018. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. arXiv:1802.09089 [cs.CR]"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2844341"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2018.00058"},{"key":"e_1_3_2_2_32_1","unstructured":"Nicolas Papernot Fartash Faghri Nicholas Carlini Ian Goodfellow Reuben Feinman Alexey Kurakin Cihang Xie Yash Sharma Tom Brown Aurko Roy Alexander Matyasko Vahid Behzadan Karen Hambardzumyan Zhishuai Zhang Yi-Lin Juang Zhi Li Ryan Sheatsley Abhibhav Garg Jonathan Uesato Willi Gierke Yinpeng Dong David Berthelot Paul Hendricks Jonas Rauber Rujun Long and Patrick McDaniel. 2018. Technical Report on the CleverHans v2.1.0 Adversarial Examples Library. arXiv:1610.00768 [cs.LG]  Nicolas Papernot Fartash Faghri Nicholas Carlini Ian Goodfellow Reuben Feinman Alexey Kurakin Cihang Xie Yash Sharma Tom Brown Aurko Roy Alexander Matyasko Vahid Behzadan Karen Hambardzumyan Zhishuai Zhang Yi-Lin Juang Zhi Li Ryan Sheatsley Abhibhav Garg Jonathan Uesato Willi Gierke Yinpeng Dong David Berthelot Paul Hendricks Jonas Rauber Rujun Long and Patrick McDaniel. 2018. Technical Report on the CleverHans v2.1.0 Adversarial Examples Library. arXiv:1610.00768 [cs.LG]"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_3_2_2_34_1","volume-title":"Retrieved","author":"Pedregosa Fabian","year":"2019","unstructured":"Fabian Pedregosa . 2019 . Memory-profiler: a module for monitoring memory usage of a Python program . Retrieved March 10, 2021 from https:\/\/github.com\/ pythonprofilers\/memory_profiler Fabian Pedregosa. 2019. Memory-profiler: a module for monitoring memory usage of a Python program. Retrieved March 10, 2021 from https:\/\/github.com\/ pythonprofilers\/memory_profiler"},{"key":"e_1_3_2_2_35_1","volume-title":"Scikit-learn: Machine learning in Python. the Journal of machine Learning research 12","author":"Pedregosa Fabian","year":"2011","unstructured":"Fabian Pedregosa , Ga\u00ebl Varoquaux , Alexandre Gramfort , Vincent Michel , Bertrand Thirion , Olivier Grisel , Mathieu Blondel , Peter Prettenhofer , Ron Weiss , Vincent Dubourg , 2011 . Scikit-learn: Machine learning in Python. the Journal of machine Learning research 12 (2011), 2825--2830. Fabian Pedregosa, Ga\u00ebl Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, et al. 2011. Scikit-learn: Machine learning in Python. the Journal of machine Learning research 12 (2011), 2825--2830."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.100199"},{"key":"e_1_3_2_2_37_1","volume-title":"Retrieved","author":"Pumperla Max","year":"2021","unstructured":"Max Pumperla . [n. d.]. Hyperas : Hyperopt: A very simple and convenient wrapper for hyperparameter optimization . Retrieved October 10, 2021 from https: \/\/github.com\/maxpumperla\/hyperas Max Pumperla. [n. d.]. Hyperas: Hyperopt: A very simple and convenient wrapper for hyperparameter optimization. Retrieved October 10, 2021 from https: \/\/github.com\/maxpumperla\/hyperas"},{"key":"e_1_3_2_2_38_1","volume-title":"Efficient Deep Structure Learning for Resource-Limited IoT Devices. In GLOBECOM 2020--2020 IEEE Global Communications Conference. IEEE, 1--6.","author":"Shen Shibo","year":"2020","unstructured":"Shibo Shen , Rongpeng Li , Zhifeng Zhao , Qing Liu , Jing Liang , and Honggang Zhang . 2020 . Efficient Deep Structure Learning for Resource-Limited IoT Devices. In GLOBECOM 2020--2020 IEEE Global Communications Conference. IEEE, 1--6. Shibo Shen, Rongpeng Li, Zhifeng Zhao, Qing Liu, Jing Liang, and Honggang Zhang. 2020. Efficient Deep Structure Learning for Resource-Limited IoT Devices. In GLOBECOM 2020--2020 IEEE Global Communications Conference. IEEE, 1--6."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00015"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3064259"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.034"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi10080076"},{"volume-title":"Retrieved","year":"2022","key":"e_1_3_2_2_43_1","unstructured":"TensorFlow. 2022 . float16 Quantization . Retrieved Feb 13, 2022 from https: \/\/www.tensorflow.org\/lite\/performance\/post_training_float16_quant TensorFlow. 2022. float16 Quantization. Retrieved Feb 13, 2022 from https: \/\/www.tensorflow.org\/lite\/performance\/post_training_float16_quant"},{"key":"e_1_3_2_2_44_1","unstructured":"Florian Tram\u00e8r Alexey Kurakin Nicolas Papernot Ian Goodfellow Dan Boneh and Patrick McDaniel. 2020. Ensemble Adversarial Training: Attacks and Defenses. arXiv:1705.07204 [stat.ML]  Florian Tram\u00e8r Alexey Kurakin Nicolas Papernot Ian Goodfellow Dan Boneh and Patrick McDaniel. 2020. Ensemble Adversarial Training: Attacks and Defenses. arXiv:1705.07204 [stat.ML]"},{"key":"e_1_3_2_2_45_1","volume-title":"Retrieved","author":"Zakariyya Idris","year":"2021","unstructured":"Idris Zakariyya . 2021 . Resource Efficient IoT DNNs Algorithm . Retrieved November 12, 2021 from https:\/\/github.com\/izakariyya\/R_DNN_IoT Idris Zakariyya. 2021. Resource Efficient IoT DNNs Algorithm. Retrieved November 12, 2021 from https:\/\/github.com\/izakariyya\/R_DNN_IoT"},{"key":"e_1_3_2_2_46_1","volume-title":"Low-Precision Training in Logarithmic Number System using MultiplicativeWeight Update. CoRR abs\/2106.13914","author":"Zhao Jiawei","year":"2021","unstructured":"Jiawei Zhao , Steve Dai , Rangharajan Venkatesan , Ming-Yu Liu , Brucek Khailany , Bill Dally , and Anima Anandkumar . 2021. Low-Precision Training in Logarithmic Number System using MultiplicativeWeight Update. CoRR abs\/2106.13914 ( 2021 ). arXiv:2106.13914 https:\/\/arxiv.org\/abs\/2106.13914 Jiawei Zhao, Steve Dai, Rangharajan Venkatesan, Ming-Yu Liu, Brucek Khailany, Bill Dally, and Anima Anandkumar. 2021. Low-Precision Training in Logarithmic Number System using MultiplicativeWeight Update. CoRR abs\/2106.13914 (2021). arXiv:2106.13914 https:\/\/arxiv.org\/abs\/2106.13914"}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Nagasaki Japan","acronym":"ASIA CCS '22"},"container-title":["Proceedings of the 8th ACM on Cyber-Physical System Security Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494107.3522772","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3494107.3522772","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:45Z","timestamp":1750188645000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494107.3522772"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":46,"alternative-id":["10.1145\/3494107.3522772","10.1145\/3494107"],"URL":"https:\/\/doi.org\/10.1145\/3494107.3522772","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}