{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:20:53Z","timestamp":1759940453060,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,14]],"date-time":"2021-12-14T00:00:00Z","timestamp":1639440000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,14]]},"DOI":"10.1145\/3498851.3499024","type":"proceedings-article","created":{"date-parts":[[2022,4,11]],"date-time":"2022-04-11T22:34:41Z","timestamp":1649716481000},"page":"520-528","source":"Crossref","is-referenced-by-count":2,"title":["A Subgraph Isomorphism-based Attack Towards Social Networks"],"prefix":"10.1145","author":[{"given":"Mengjiao","family":"Guo","sequence":"first","affiliation":[{"name":"Swinburne University of Technology, Australia"}]},{"given":"Chi-Hung","family":"Chi","sequence":"additional","affiliation":[{"name":"Software and Computational Systems Program, Data 61, CSIRO, Australia"}]},{"given":"Hui","family":"Zheng","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Australia"}]},{"given":"Jing","family":"He","sequence":"additional","affiliation":[{"name":"Nanjing University of Finance and Economics, China"}]},{"given":"Xiaoting","family":"Zhang","sequence":"additional","affiliation":[{"name":"Nanjing University of Finance and Economics, China"}]}],"member":"320","published-online":{"date-parts":[[2022,4,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Abawajy Jemal H. Mohd Izuan Hafez Ninggal and Tutut Herawan. \"Privacy preserving social network data publication.\"\u00a0IEEE communications surveys & tutorials\u00a018.3 (2016): 1974-1997. Abawajy Jemal H. Mohd Izuan Hafez Ninggal and Tutut Herawan. \"Privacy preserving social network data publication.\"\u00a0IEEE communications surveys & tutorials\u00a018.3 (2016): 1974-1997.","DOI":"10.1109\/COMST.2016.2533668"},{"key":"e_1_3_2_1_2_1","unstructured":"Sun Lichao \"Adversarial attack and defense on graph data: A survey.\"\u00a0arXiv preprint arXiv:1812.10528\u00a0(2018). Sun Lichao \"Adversarial attack and defense on graph data: A survey.\"\u00a0arXiv preprint arXiv:1812.10528\u00a0(2018)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Bhagat Smriti \"Prediction Promotes Privacy in Dynamic Social Networks.\"\u00a0WOSN\u00a02010 (2010). Bhagat Smriti \"Prediction Promotes Privacy in Dynamic Social Networks.\"\u00a0WOSN\u00a02010 (2010).","DOI":"10.1145\/1772690.1772803"},{"key":"e_1_3_2_1_4_1","volume-title":"9-22","author":"An","year":"2016","unstructured":"Lv, Yinghua, \" An efficient and scalable density-based clustering algorithm for datasets with complex structures.\"\u00a0Neurocomputing\u00a0171 ( 2016 ): 9-22 . Lv, Yinghua, \"An efficient and scalable density-based clustering algorithm for datasets with complex structures.\"\u00a0Neurocomputing\u00a0171 (2016): 9-22."},{"key":"e_1_3_2_1_5_1","first-page":"633","article-title":"Efficient processing of graph similarity search","volume":"3","author":"Chung Chin-Wan","year":"2015","unstructured":"Choi, Ryan, and Chin-Wan Chung . \" Efficient processing of graph similarity search .\" \u00a0World Wide Web\u00a018 . 3 ( 2015 ): 633 - 659 . Choi, Ryan, and Chin-Wan Chung. \"Efficient processing of graph similarity search.\"\u00a0World Wide Web\u00a018.3 (2015): 633-659.","journal-title":"\u00a0World Wide Web\u00a018"},{"key":"e_1_3_2_1_6_1","volume-title":"IEEE","author":"Zhao Peixiang","year":"2017","unstructured":"Liang, Yongjiang, and Peixiang Zhao . \"Similarity search in graph databases: A multi-layered indexing approach.\"\u00a02017 IEEE 33rd International Conference on Data Engineering (ICDE) . IEEE , 2017 . Liang, Yongjiang, and Peixiang Zhao. \"Similarity search in graph databases: A multi-layered indexing approach.\"\u00a02017 IEEE 33rd International Conference on Data Engineering (ICDE). IEEE, 2017."},{"key":"e_1_3_2_1_7_1","first-page":"190","volume-title":"Proceedings of the 16th international conference on World Wide Web","author":"Backstrom L.","year":"2007","unstructured":"L. Backstrom , C. Dwork , and J. Kleinberg . Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW \u201907 : Proceedings of the 16th international conference on World Wide Web , pages 181\u2013 190 , New York, NY, USA , 2007 . ACM Press. L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW \u201907: Proceedings of the 16th international conference on World Wide Web, pages 181\u2013190, New York, NY, USA, 2007. ACM Press."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/321921.321925"},{"key":"e_1_3_2_1_10_1","volume-title":"VF2 Plus: An improved version of VF2 for Biological Graphs, 10.1007\/978-3-319-188224-7","author":"Carletti V.","year":"2015","unstructured":"V. Carletti , F. Pasquale , and V. Mario , VF2 Plus: An improved version of VF2 for Biological Graphs, 10.1007\/978-3-319-188224-7 , 2015 . V. Carletti, F. Pasquale, and V. Mario, VF2 Plus: An improved version of VF2 for Biological Graphs, 10.1007\/978-3-319-188224-7, 2015."},{"key":"e_1_3_2_1_11_1","volume-title":"An improved version of VF2 for biological graphs.\"\u00a0International Workshop on Graph-Based Representations in Pattern Recognition","author":"Foggia Pasquale","year":"2015","unstructured":"Carletti, Vincenzo, Pasquale Foggia , and Mario Vento . \"VF2 Plus : An improved version of VF2 for biological graphs.\"\u00a0International Workshop on Graph-Based Representations in Pattern Recognition . Springer , Cham , 2015 . Carletti, Vincenzo, Pasquale Foggia, and Mario Vento. \"VF2 Plus: An improved version of VF2 for biological graphs.\"\u00a0International Workshop on Graph-Based Representations in Pattern Recognition. Springer, Cham, 2015."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2018.02.018"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453899"},{"key":"e_1_3_2_1_14_1","first-page":"203","volume-title":"Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology. ACM","author":"Zhang S.","year":"2009","unstructured":"S. Zhang , S. Li , and J. Yang , \u201c Gaddi: distance index based subgraph matching in biological networks ,\u201d in Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology. ACM , 2009 , pp. 192\u2013 203 . S. Zhang, S. Li, and J. Yang, \u201cGaddi: distance index based subgraph matching in biological networks,\u201d in Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology. ACM, 2009, pp. 192\u2013203."},{"key":"e_1_3_2_1_15_1","first-page":"418","volume-title":"Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. ACM","author":"He H.","year":"2008","unstructured":"H. He and A. K. Singh , \u201c Graphs-at-a-time: query language and access methods for graph databases ,\u201d in Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. ACM , 2008 , pp. 405\u2013 418 . H. He and A. K. Singh, \u201cGraphs-at-a-time: query language and access methods for graph databases,\u201d in Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. ACM, 2008, pp. 405\u2013418."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920887"},{"key":"e_1_3_2_1_17_1","first-page":"717","article-title":"SVD-based incremental approaches for recommender systems","volume":"4","year":"2015","unstructured":"Zhou, Xun , \" SVD-based incremental approaches for recommender systems .\" \u00a0Journal of Computer and System Sciences\u00a081 . 4 ( 2015 ): 717 - 733 . Zhou, Xun, \"SVD-based incremental approaches for recommender systems.\"\u00a0Journal of Computer and System Sciences\u00a081.4 (2015): 717-733.","journal-title":"\u00a0Journal of Computer and System Sciences\u00a081"},{"key":"e_1_3_2_1_18_1","first-page":"125","volume-title":"Security and Privacy, 2008. SP 2008. IEEE Symposium On. Robust de-anonymization of large sparse datasets (IEEE","author":"Narayanan A.","year":"2008","unstructured":"A. Narayanan , V. Shmatikov , in Security and Privacy, 2008. SP 2008. IEEE Symposium On. Robust de-anonymization of large sparse datasets (IEEE , New York , 2008 ), pp. 111\u2013 125 A.Narayanan, V. Shmatikov, in Security and Privacy, 2008. SP 2008. IEEE Symposium On. Robust de-anonymization of large sparse datasets (IEEE, New York, 2008), pp. 111\u2013125"},{"key":"e_1_3_2_1_19_1","first-page":"187","volume-title":"Security and Privacy, 2009 30th IEEE Symposium On. De-anonymizing social networks (IEEE","author":"Narayanan A.","year":"2009","unstructured":"A. Narayanan , V. Shmatikov , in Security and Privacy, 2009 30th IEEE Symposium On. De-anonymizing social networks (IEEE , New York , 2009 ), pp. 173\u2013 187 A.Narayanan, V. Shmatikov, in Security and Privacy, 2009 30th IEEE Symposium On. De-anonymizing social networks (IEEE, New York, 2009), pp. 173\u2013187"},{"key":"e_1_3_2_1_20_1","first-page":"637","volume-title":"Proceedings of the 2012 ACM Conference on Computer and Communications Security. Deanonymizing mobility traces: using social network as a side-channel (ACM","author":"Srivatsa M.","year":"2012","unstructured":"M. Srivatsa , M. Hicks , in Proceedings of the 2012 ACM Conference on Computer and Communications Security. Deanonymizing mobility traces: using social network as a side-channel (ACM , New York , 2012 ), pp. 628\u2013 637 M.Srivatsa, M. Hicks, in Proceedings of the 2012 ACM Conference on Computer and Communications Security. Deanonymizing mobility traces: using social network as a side-channel (ACM, New York, 2012), pp. 628\u2013637"},{"key":"e_1_3_2_1_21_1","first-page":"515","volume-title":"IEEE 24th International Conference on Data Engineering","author":"Zhou B.","year":"2008","unstructured":"B. Zhou and J. Pei . Preserving privacy in social networks against neighborhood attacks . IEEE 24th International Conference on Data Engineering , pages 506\u2013 515 , 2008 . B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. IEEE 24th International Conference on Data Engineering, pages 506\u2013515, 2008."},{"key":"e_1_3_2_1_22_1","volume-title":"PAKDD","author":"Ying X.","year":"2009","unstructured":"X. Ying and X. Wu . On link privacy in randomizing social networks . In PAKDD , 2009 . X. Ying and X. Wu. On link privacy in randomizing social networks. In PAKDD, 2009."},{"key":"e_1_3_2_1_23_1","first-page":"2583","article-title":"A novel subgraph K+-isomorphism method in social network based on graph similarity detection","volume":"8","year":"2018","unstructured":"Rong, Huan , \" A novel subgraph K+-isomorphism method in social network based on graph similarity detection .\" \u00a0Soft Computing\u00a022 . 8 ( 2018 ): 2583 - 2601 . Rong, Huan, \"A novel subgraph K+-isomorphism method in social network based on graph similarity detection.\"\u00a0Soft Computing\u00a022.8 (2018): 2583-2601.","journal-title":"\u00a0Soft Computing\u00a022"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453873"},{"key":"e_1_3_2_1_25_1","first-page":"557","article-title":"k-anonymity: A model for protecting privacy","volume":"05","year":"2002","unstructured":"Sweeney, Latanya. \" k-anonymity: A model for protecting privacy .\" \u00a0International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a010 . 05 ( 2002 ): 557 - 570 . Sweeney, Latanya. \"k-anonymity: A model for protecting privacy.\"\u00a0International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a010.05 (2002): 557-570.","journal-title":"\u00a0International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a010"},{"key":"e_1_3_2_1_26_1","first-page":"53","volume-title":"Springer","year":"2008","unstructured":"Domingo-Ferrer, Josep. \"A survey of inference control methods for privacy-preserving data mining.\"\u00a0Privacy-preserving data mining . Springer , Boston, MA , 2008 . 53 - 80 . Domingo-Ferrer, Josep. \"A survey of inference control methods for privacy-preserving data mining.\"\u00a0Privacy-preserving data mining. Springer, Boston, MA, 2008. 53-80."},{"key":"e_1_3_2_1_27_1","first-page":"5","volume-title":"KDD","author":"Kleinberg J. M.","year":"2007","unstructured":"J. M. Kleinberg . Challenges in mining social network data: processes, privacy, and paradoxes . In KDD , pages 4\u2013 5 , 2007 . J. M. Kleinberg. Challenges in mining social network data: processes, privacy, and paradoxes. In KDD, pages 4\u20135, 2007."},{"key":"e_1_3_2_1_28_1","volume-title":"An Efficient Solution to Detect Common Topologies in Money Launderings based on Coupling and Connection","author":"He Jing","year":"2021","unstructured":"Jing He , Jiao Tian , Yuanyuan Wu , Xinyi Cai , Kai Zhang , Mengjiao Guo , Hui Zheng , Junfeng Wu , Yimu Ji , An Efficient Solution to Detect Common Topologies in Money Launderings based on Coupling and Connection , IEEE Intelligent Systems , doi: 10.1109\/MIS. 2021 .3057590. Jing He, Jiao Tian, Yuanyuan Wu, Xinyi Cai, Kai Zhang, Mengjiao Guo, Hui Zheng, Junfeng Wu, Yimu Ji, An Efficient Solution to Detect Common Topologies in Money Launderings based on Coupling and Connection, IEEE Intelligent Systems, doi: 10.1109\/MIS.2021.3057590."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Jing He \u00a0Jinjun Chen \u00a0Guangyan Huang \u00a0Mengjiao Guo \u00a0Zhiwang Zhang \u00a0Hui Zheng \u00a0Yunyao Li \u00a0Ruchuan Wang \u00a0Weibei Fan \u00a0Chi-Huang Chi \u00a0Weiping Ding \u00a0Paulo A. de Souza \u00a0Bin Chen \u00a0Run-Wei Li \u00a0Jie Shang \u00a0Andre van Zundert: A Fuzzy Theory Based Topological Distance Measurement for Undirected Multigraphs.\u00a0FUZZ-IEEE\u00a02020:\u00a01-10 Jing He \u00a0Jinjun Chen \u00a0Guangyan Huang \u00a0Mengjiao Guo \u00a0Zhiwang Zhang \u00a0Hui Zheng \u00a0Yunyao Li \u00a0Ruchuan Wang \u00a0Weibei Fan \u00a0Chi-Huang Chi \u00a0Weiping Ding \u00a0Paulo A. de Souza \u00a0Bin Chen \u00a0Run-Wei Li \u00a0Jie Shang \u00a0Andre van Zundert: A Fuzzy Theory Based Topological Distance Measurement for Undirected Multigraphs.\u00a0FUZZ-IEEE\u00a02020:\u00a01-10","DOI":"10.1109\/FUZZ48607.2020.9177559"},{"volume-title":"IEEE","year":"2010","key":"e_1_3_2_1_30_1","unstructured":"Shang, Haichuan, \"Similarity search on supergraph containment.\"\u00a02010 IEEE 26th International Conference on Data Engineering (ICDE 2010) . IEEE , 2010 . Shang, Haichuan, \"Similarity search on supergraph containment.\"\u00a02010 IEEE 26th International Conference on Data Engineering (ICDE 2010). IEEE, 2010."},{"key":"e_1_3_2_1_31_1","volume-title":"IEEE","author":"Zhao Peixiang","year":"2017","unstructured":"Liang, Yongjiang, and Peixiang Zhao . \"Similarity search in graph databases: A multi-layered indexing approach.\"\u00a02017 IEEE 33rd International Conference on Data Engineering (ICDE) . IEEE , 2017 . Liang, Yongjiang, and Peixiang Zhao. \"Similarity search in graph databases: A multi-layered indexing approach.\"\u00a02017 IEEE 33rd International Conference on Data Engineering (ICDE). IEEE, 2017."},{"key":"e_1_3_2_1_32_1","first-page":"68","article-title":"Maximum common subgraph isomorphism algorithms and their applications in molecular science: a review","volume":"1","author":"Rarey Matthias","year":"2011","unstructured":"Ehrlich, Hans\u2010Christian, and Matthias Rarey . \" Maximum common subgraph isomorphism algorithms and their applications in molecular science: a review .\" \u00a0Wiley Interdisciplinary Reviews: Computational Molecular Science\u00a01 . 1 ( 2011 ): 68 - 79 . Ehrlich, Hans\u2010Christian, and Matthias Rarey. \"Maximum common subgraph isomorphism algorithms and their applications in molecular science: a review.\"\u00a0Wiley Interdisciplinary Reviews: Computational Molecular Science\u00a01.1 (2011): 68-79.","journal-title":"\u00a0Wiley Interdisciplinary Reviews: Computational Molecular Science\u00a01"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-015-0381-6"},{"key":"e_1_3_2_1_34_1","first-page":"640","article-title":"On the complexity of sequence-to-graph alignment","volume":"4","year":"2020","unstructured":"Jain, Chirag , \" On the complexity of sequence-to-graph alignment .\" \u00a0Journal of Computational Biology\u00a027 . 4 ( 2020 ): 640 - 654 . Jain, Chirag, \"On the complexity of sequence-to-graph alignment.\"\u00a0Journal of Computational Biology\u00a027.4 (2020): 640-654.","journal-title":"\u00a0Journal of Computational Biology\u00a027"},{"key":"e_1_3_2_1_35_1","first-page":"1","article-title":"A survey on graph kernels","volume":"1","author":"Nils","year":"2020","unstructured":"Kriege, Nils M., Fredrik D. Johansson , and Christopher Morris . \" A survey on graph kernels .\" \u00a0Applied Network Science\u00a05 . 1 ( 2020 ): 1 - 42 . Kriege, Nils M., Fredrik D. Johansson, and Christopher Morris. \"A survey on graph kernels.\"\u00a0Applied Network Science\u00a05.1 (2020): 1-42.","journal-title":"\u00a0Applied Network Science\u00a05"},{"key":"e_1_3_2_1_36_1","volume-title":"A Survey on Graph-Based Pattern Matching.\"\u00a0AAAI Fall Symposium: Capturing and Using Patterns for Evidence Detection","author":"Structure Matching","year":"2006","unstructured":"Gallagher, Brian. \" Matching Structure and Semantics : A Survey on Graph-Based Pattern Matching.\"\u00a0AAAI Fall Symposium: Capturing and Using Patterns for Evidence Detection . 2006 . Gallagher, Brian. \"Matching Structure and Semantics: A Survey on Graph-Based Pattern Matching.\"\u00a0AAAI Fall Symposium: Capturing and Using Patterns for Evidence Detection. 2006."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Jing He Jinjun Chen Guangyan Huang Jie Cao Zhiwang Zhang Hui Zheng Peng Zhang Roozbeh Zarei Ferry Sansoto Ruchuan Wang Yimu Ji Weibei Fan Zhijun Xie Xiancheng Wang Mengjiao Guo Chi-Hung Chi PauloA.de Souza Jiekui Zhang Youtao Li Xiaojun Chen Yong Shi David Green Taraporewalla Kersi Andr\u00e9 Van Zundert Polynomial-time Algorithm for Simple Undirected Graph Isomorphism Concurrency and Computation Practice and Experience. https:\/\/doi.org\/10.1002\/cpe.5484 (CCPE Top downloaded paper 2018-2019) Jing He Jinjun Chen Guangyan Huang Jie Cao Zhiwang Zhang Hui Zheng Peng Zhang Roozbeh Zarei Ferry Sansoto Ruchuan Wang Yimu Ji Weibei Fan Zhijun Xie Xiancheng Wang Mengjiao Guo Chi-Hung Chi PauloA.de Souza Jiekui Zhang Youtao Li Xiaojun Chen Yong Shi David Green Taraporewalla Kersi Andr\u00e9 Van Zundert Polynomial-time Algorithm for Simple Undirected Graph Isomorphism Concurrency and Computation Practice and Experience. https:\/\/doi.org\/10.1002\/cpe.5484 (CCPE Top downloaded paper 2018-2019)","DOI":"10.1002\/cpe.5484"},{"volume-title":"Erratum: A polynomial-time algorithm for simple undirected graph isomorphism, Concurrency and Computation: Practice and Experience","author":"He Jing","key":"e_1_3_2_1_38_1","unstructured":"Jing He , Guangyan Huang , Jie Cao , Zhiwang Zhang , Hui Zheng , Peng Zhang , Roozbeh Zarei , Ferry Susanto , Ruchuan Wang , Yimu Ji , Weibei Fan , Zhijun Xie , Xiancheng Wang , Mengjiao Guo , Chi-Hung Chi , Paulo A. de Souza , Jiekui Zhang , Youtao Li , Xiaojun Chen , Yong Shi , Taraporewalla Kersi , Andr\u00e9 Van Zundert , Erratum: A polynomial-time algorithm for simple undirected graph isomorphism, Concurrency and Computation: Practice and Experience , Article ID : CPE 6599 Jing He, Guangyan Huang, Jie Cao, Zhiwang Zhang, Hui Zheng, Peng Zhang, Roozbeh Zarei, Ferry Susanto, Ruchuan Wang, Yimu Ji, Weibei Fan, Zhijun Xie, Xiancheng Wang, Mengjiao Guo, Chi-Hung Chi, Paulo A.de Souza, Jiekui Zhang, Youtao Li, Xiaojun Chen, Yong Shi, Taraporewalla Kersi, Andr\u00e9 Van Zundert, Erratum: A polynomial-time algorithm for simple undirected graph isomorphism, Concurrency and Computation: Practice and Experience, Article ID: CPE6599"},{"key":"e_1_3_2_1_39_1","volume-title":"Introduction to Linear Algebra","author":"Strang","year":"1998","unstructured":"Strang G. ( 1998 ). Introduction to Linear Algebra ( 3 rd ed.). Wellesley-Cambridge Press . ISBN 978-0-9614088-5-5 Strang G. (1998). Introduction to Linear Algebra (3rd ed.). Wellesley-Cambridge Press. ISBN 978-0-9614088-5-5","edition":"3"}],"event":{"name":"WI-IAT '21: IEEE\/WIC\/ACM International Conference on Web Intelligence","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence"],"location":"ESSENDON VIC Australia","acronym":"WI-IAT '21"},"container-title":["IEEE\/WIC\/ACM International Conference on Web Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3498851.3499024","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3498851.3499024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:37Z","timestamp":1750188637000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3498851.3499024"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,14]]},"references-count":38,"alternative-id":["10.1145\/3498851.3499024","10.1145\/3498851"],"URL":"https:\/\/doi.org\/10.1145\/3498851.3499024","relation":{},"subject":[],"published":{"date-parts":[[2021,12,14]]}}}