{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T16:33:10Z","timestamp":1767976390950,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":120,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T00:00:00Z","timestamp":1645488000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ARO","award":["W911NF1920321"],"award-info":[{"award-number":["W911NF1920321"]}]},{"name":"DOE","award":["DESC0014195 0003"],"award-info":[{"award-number":["DESC0014195 0003"]}]},{"name":"NSF","award":["CCF-2119184"],"award-info":[{"award-number":["CCF-2119184"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,28]]},"DOI":"10.1145\/3503222.3507775","type":"proceedings-article","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T20:49:01Z","timestamp":1645562941000},"page":"240-254","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Protecting adaptive sampling from information leakage on low-power sensors"],"prefix":"10.1145","author":[{"given":"Tejas","family":"Kannan","sequence":"first","affiliation":[{"name":"University of Chicago, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0816-8150","authenticated-orcid":false,"given":"Henry","family":"Hoffmann","sequence":"additional","affiliation":[{"name":"University of Chicago, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Graphical Password Dataset."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. TI MSP430 EnergyTrace Technology. https:\/\/www.ti.com\/lit\/ug\/slau157as\/slau157as.pdf?ts=1628556110549&ref_url=https%253A%252F%252Fwww.ti.com%252Ftool%252FENERGYTRACE"},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. TI MSP430 FR5994 Datasheet. https:\/\/www.ti.com\/lit\/ds\/symlink\/msp430fr5994.pdf"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229565.3229568"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2009.2023818"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIM.2009.4811133"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2007.4428700"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35395-6_30"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380403.2380425"},{"key":"e_1_3_2_1_10_1","volume-title":"26th $USENIX$ security symposium ($USENIX$ Security 17). 1093\u20131110.","author":"Antonakakis Manos","unstructured":"Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J Alex Halderman, Luca Invernizzi, and Michalis Kallitsis. 2017. Understanding the mirai botnet. In 26th $USENIX$ security symposium ($USENIX$ Security 17). 1093\u20131110."},{"key":"e_1_3_2_1_11_1","volume-title":"Brad E Zacharia, Randy D\u2019Amico, Justin Slomian, Jean Yves Reginster, and Olivier Bruy\u00e8re.","author":"Appelboom Geoff","year":"2014","unstructured":"Geoff Appelboom, Elvis Camacho, Mickey E Abraham, Samuel S Bruce, Emmanuel LP Dumont, Brad E Zacharia, Randy D\u2019Amico, Justin Slomian, Jean Yves Reginster, and Olivier Bruy\u00e8re. 2014. Smart wearable body sensors for patient self-assessment and monitoring. Archives of public health, 72, 1 (2014), 1\u20139."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0040"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.005"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806620"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17520-6_2"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3266444.3266452"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0070"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352543"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665949"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660362"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"key":"e_1_3_2_1_22_1","volume-title":"Jordi Torres, and Shih-Fu Chang.","author":"Campos V\u00edctor","year":"2017","unstructured":"V\u00edctor Campos, Brendan Jou, Xavier Gir\u00f3-i Nieto, Jordi Torres, and Shih-Fu Chang. 2017. Skip RNN: Learning to skip state updates in recurrent neural networks. arXiv preprint arXiv:1708.06834."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062356"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236076"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69170-9_5"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12002-2_33"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2011.60"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3123955"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873594"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2019.2907539"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378473"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1316689.1316741"},{"key":"e_1_3_2_1_33_1","volume-title":"Adapting sampling interval of sensor networks using on-line reinforcement learning. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). 460\u2013465","author":"Dias Gabriel Martins","unstructured":"Gabriel Martins Dias, Maddalena Nurchis, and Boris Bellalta. 2016. Adapting sampling interval of sensor networks using on-line reinforcement learning. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). 460\u2013465."},{"key":"e_1_3_2_1_34_1","unstructured":"Thai Duong and Julianno Rizzo. [n.d.]. The CRIME attack. https:\/\/docs.google.com\/presentation\/d\/11eBmGiHbYcHR9gL5nDyZChu_-lCa2GizeuOfaLU2HOU"},{"key":"e_1_3_2_1_35_1","unstructured":"Morris Dworkin Elaine Barker James Nechvatal James Foti Lawrence Bassham E. Roback and James Dray. 2001. Advanced Encryption Standard (AES)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0192684"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319155"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"David Formby Preethi Srinivasan Andrew M Leonard Jonathan D Rogers and Raheem A Beyah. 2016. Who\u2019s in control of your control system? Device fingerprinting for cyber-physical systems. In NDSS.","DOI":"10.14722\/ndss.2016.23142"},{"key":"e_1_3_2_1_40_1","first-page":"771","article-title":"A short introduction to boosting","volume":"14","author":"Freund Yoav","year":"1999","unstructured":"Yoav Freund, Robert Schapire, and Naoki Abe. 1999. A short introduction to boosting. Journal-Japanese Society For Artificial Intelligence, 14, 771-780 (1999), 1612.","journal-title":"Journal-Japanese Society For Artificial Intelligence"},{"key":"e_1_3_2_1_41_1","unstructured":"Warren Frick and Carlos Niederstrasser. 2018. Small launch vehicles-a 2018 state of the industry survey."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544294"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1110"},{"key":"e_1_3_2_1_44_1","volume-title":"ICARUS: Attacking low Earth orbit satellite networks. In 2021 $USENIX$ Annual Technical Conference ($USENIX$ $ATC$ 21). 317\u2013331.","author":"Giuliari Giacomo","year":"2021","unstructured":"Giacomo Giuliari, Tommaso Ciussani, Adrian Perrig, and Ankit Singla. 2021. ICARUS: Attacking low Earth orbit satellite networks. In 2021 $USENIX$ Annual Technical Conference ($USENIX$ $ATC$ 21). 317\u2013331."},{"key":"e_1_3_2_1_45_1","unstructured":"Yoel Gluck Neal Harris and Angelo Prado. 2013. BREACH: reviving the CRIME attack. Unpublished manuscript."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304011"},{"key":"e_1_3_2_1_47_1","unstructured":"Ashvin Goel David Steere Calton Pu and Jonathan Walpole. 1998. SWiFT: A Feedback Control and Dynamic Reconfiguration Toolkit."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3235-1"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815403"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228409"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2977054"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0010(199802)76:2<263::AID-JSFA943>3.0.CO;2-F"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2004.1404503"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2017.2728698"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2007.146"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS52030.2021.00020"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509541"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45661-9_21"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2362336.2362340"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0006-y"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.3390\/e19110631"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1582379.1582631"},{"key":"e_1_3_2_1_64_1","unstructured":"Yann LeCun. 1998. The MNIST database of handwritten digits. http:\/\/yann. lecun. com\/exdb\/mnist\/."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212508"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180437"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20082174"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15497-3_13"},{"key":"e_1_3_2_1_69_1","unstructured":"Matt Mahoney. 2012. Data compression explained. mattmahoney.net."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570751"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2011.2156795"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2008.080300"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614379.1614385"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127777.1127833"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004593"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173184"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354198"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3410992.3411001"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968456.2974043"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.2193\/2008-102"},{"key":"e_1_3_2_1_81_1","volume-title":"Proceedings of the 30th International Conference on Neural Information Processing Systems. 3889\u20133897","author":"Neil Daniel","year":"2016","unstructured":"Daniel Neil, Michael Pfeiffer, and Shih-Chii Liu. 2016. Phased LSTM: Accelerating recurrent network training for long or event-based sequences. In Proceedings of the 30th International Conference on Neural Information Processing Systems. 3889\u20133897."},{"key":"e_1_3_2_1_82_1","article-title":"Permutation tests for studying classifier performance","volume":"11","author":"Ojala Markus","year":"2010","unstructured":"Markus Ojala and Gemma C Garriga. 2010. Permutation tests for studying classifier performance.. Journal of Machine Learning Research, 11, 6 (2010).","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"crossref","unstructured":"Andriy Panchenko Fabian Lanze Jan Pennekamp Thomas Engel Andreas Zinnen Martin Henze and Klaus Wehrle. 2016. Website fingerprinting at internet scale. In NDSS.","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287866"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paerosci.2016.11.002"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00049"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"crossref","unstructured":"Jordi Puig-Suari Clark Turner and William Ahlgren. 2001. Development of the standard CubeSat deployer and a CubeSat class PicoSatellite. In 2001 IEEE aerospace conference proceedings (cat. No. 01TH8542). 1 1\u2013347.","DOI":"10.1109\/AERO.2001.931726"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3296957.3173199"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550352"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8824954"},{"key":"e_1_3_2_1_91_1","volume-title":"Empirical inference","author":"Schapire Robert E","unstructured":"Robert E Schapire. 2013. Explaining AdaBoost. In Empirical inference. Springer, 37\u201352."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1258\/1357633054461994"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358261"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196556"},{"key":"e_1_3_2_1_95_1","volume-title":"Rajib Ranjan Maiti, and Nils Tippenhauer","author":"Siby Sandra","year":"2017","unstructured":"Sandra Siby, Rajib Ranjan Maiti, and Nils Tippenhauer. 2017. IoTscanner: Detecting and classifying privacy threats in IoT neighborhoods. arXiv preprint arXiv:1701.05007."},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024689"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519097"},{"key":"e_1_3_2_1_98_1","volume-title":"Eon: A Language and Runtime System for Perpetual Systems. In In Proceedings of The Fifth International ACM Conference on Embedded Networked Sensor Systems (SenSys \u201907)","author":"Sorber Jacob","unstructured":"Jacob Sorber, Alexander Kostadinov, Matthew Garber, Matthew Brennan, Mark D. Corner, and Emery D. Berger. 2007. Eon: A Language and Runtime System for Perpetual Systems. In In Proceedings of The Fifth International ACM Conference on Embedded Networked Sensor Systems (SenSys \u201907), Syndey."},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162092"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2018.06.003"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409663"},{"key":"e_1_3_2_1_102_1","volume-title":"International workshop on security protocols. 172\u2013182","author":"Stajano Frank","year":"1999","unstructured":"Frank Stajano and Ross Anderson. 1999. The resurrecting duckling: Security issues for ad-hoc wireless networks. In International workshop on security protocols. 172\u2013182."},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.7053"},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.04.025"},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16458-4_2"},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2018.8460821"},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2008.4526293"},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378489"},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.7"},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7179026"},{"key":"e_1_3_2_1_111_1","volume-title":"Farmbeats: An iIoT platform for data-driven agriculture. In 14th $USENIX$ Symposium on Networked Systems Design and Implementation ($NSDI$ 17). 515\u2013529.","author":"Vasisht Deepak","year":"2017","unstructured":"Deepak Vasisht, Zerina Kapetanovic, Jongho Won, Xinxin Jin, Ranveer Chandra, Sudipta Sinha, Ashish Kapoor, Madhusudhan Sudarshan, and Sean Stratman. 2017. Farmbeats: An iIoT platform for data-driven agriculture. In 14th $USENIX$ Symposium on Networked Systems Design and Implementation ($NSDI$ 17). 515\u2013529."},{"key":"e_1_3_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0129065716500374"},{"key":"e_1_3_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790121"},{"key":"e_1_3_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173206"},{"key":"e_1_3_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984641"},{"key":"e_1_3_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1007\/11840930_66"},{"key":"e_1_3_2_1_117_1","unstructured":"Charles V Wright Scott E Coull and Fabian Monrose. 2009. Traffic morphing: An efficient defense against statistical traffic analysis. In NDSS. 9."},{"key":"e_1_3_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.63"},{"key":"e_1_3_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031522"},{"key":"e_1_3_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022267"}],"event":{"name":"ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Lausanne Switzerland","acronym":"ASPLOS '22","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507775","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503222.3507775","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503222.3507775","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:49Z","timestamp":1750188649000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507775"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,22]]},"references-count":120,"alternative-id":["10.1145\/3503222.3507775","10.1145\/3503222"],"URL":"https:\/\/doi.org\/10.1145\/3503222.3507775","relation":{},"subject":[],"published":{"date-parts":[[2022,2,22]]},"assertion":[{"value":"2022-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}