{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T01:53:15Z","timestamp":1769910795812,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3511513","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"41-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning"],"prefix":"10.1145","author":[{"given":"Ismat","family":"Jarin","sequence":"first","affiliation":[{"name":"University of Michigan-Dearborn, Dearborn, MI, USA"}]},{"given":"Birhanu","family":"Eshete","sequence":"additional","affiliation":[{"name":"University of Michigan-Dearborn, Dearborn, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_2_2_1","volume-title":"https:\/\/github.com\/tensorflow\/privacy","author":"Andrew Galen","year":"2020","unstructured":"Galen Andrew , Steve Chien , , and Nicolas Papernot . 2020. TensorFlow Privacy . https:\/\/github.com\/tensorflow\/privacy , Vol. abs\/ 2002 .08570 ( 2020 ). arxiv: 2002.08570 Galen Andrew, Steve Chien, , and Nicolas Papernot. 2020. TensorFlow Privacy. https:\/\/github.com\/tensorflow\/privacy , Vol. abs\/2002.08570 (2020). arxiv: 2002.08570"},{"key":"e_1_3_2_2_3_1","volume-title":"TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part I (Lecture Notes in Computer Science","volume":"658","author":"Bun Mark","year":"2016","unstructured":"Mark Bun and Thomas Steinke . 2016 . Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds. In Theory of Cryptography - 14th International Conference , TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part I (Lecture Notes in Computer Science , Vol. 9985). 635-- 658 . Mark Bun and Thomas Steinke. 2016. Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds. In Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part I (Lecture Notes in Computer Science, Vol. 9985). 635--658."},{"key":"e_1_3_2_2_4_1","volume-title":"The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. In 28th USENIX Security Symposium, USENIX Security 2019","author":"Carlini Nicholas","year":"2019","unstructured":"Nicholas Carlini , Chang Liu , \u00da lfar Erlingsson, Jernej Kos , and Dawn Song . 2019 . The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. In 28th USENIX Security Symposium, USENIX Security 2019 , Santa Clara, CA, USA, August 14--16 , 2019 . USENIX Association, 267--284. Nicholas Carlini, Chang Liu, \u00da lfar Erlingsson, Jernej Kos, and Dawn Song. 2019. The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. In 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14--16, 2019 . USENIX Association, 267--284."},{"key":"e_1_3_2_2_5_1","volume-title":"Proceedings of the Twenty-Second Annual Conference on Neural Information Processing Systems","author":"Chaudhuri Kamalika","year":"2008","unstructured":"Kamalika Chaudhuri and Claire Monteleoni . 2008 . Privacy-preserving logistic regression. In Advances in Neural Information Processing Systems 21 , Proceedings of the Twenty-Second Annual Conference on Neural Information Processing Systems , Vancouver, British Columbia, Canada, December 8--11 , 2008. Curran Associates, Inc., 289--296. Kamalika Chaudhuri and Claire Monteleoni. 2008. Privacy-preserving logistic regression. In Advances in Neural Information Processing Systems 21, Proceedings of the Twenty-Second Annual Conference on Neural Information Processing Systems, Vancouver, British Columbia, Canada, December 8--11, 2008. Curran Associates, Inc., 289--296."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2021036"},{"key":"e_1_3_2_2_7_1","volume-title":"Local Privacy and Statistical Minimax Rates. In 54th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2013","author":"Duchi John C.","year":"2013","unstructured":"John C. Duchi , Michael I. Jordan , and Martin J. Wainwright . 2013 . Local Privacy and Statistical Minimax Rates. In 54th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2013 , 26--29 October , 2013 , Berkeley, CA, USA. IEEE Computer Society, 429--438. John C. Duchi, Michael I. Jordan, and Martin J. Wainwright. 2013. Local Privacy and Statistical Minimax Rates. In 54th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2013, 26--29 October, 2013, Berkeley, CA, USA. IEEE Computer Society, 429--438."},{"key":"e_1_3_2_2_8_1","volume-title":"Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4--7, 2006, Proceedings (Lecture Notes in Computer Science","volume":"284","author":"Dwork Cynthia","unstructured":"Cynthia Dwork , Frank McSherry , Kobbi Nissim , and Adam D. Smith . 2006. Calibrating Noise to Sensitivity in Private Data Analysis. In Theory of Cryptography , Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4--7, 2006, Proceedings (Lecture Notes in Computer Science , Vol. 3876). 265-- 284 . Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam D. Smith. 2006. Calibrating Noise to Sensitivity in Private Data Analysis. In Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4--7, 2006, Proceedings (Lecture Notes in Computer Science, Vol. 3876). 265--284."},{"key":"e_1_3_2_2_9_1","first-page":"3","article-title":"The Algorithmic Foundations of Differential Privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork and Aaron Roth . 2014 . The Algorithmic Foundations of Differential Privacy . Found. Trends Theor. Comput. Sci. , Vol. 9 , 3 -- 4 (2014), 211--407. Cynthia Dwork and Aaron Roth. 2014. The Algorithmic Foundations of Differential Privacy. Found. Trends Theor. Comput. Sci. , Vol. 9, 3--4 (2014), 211--407.","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_2_11_1","volume-title":"DS 2017, Kyoto, Japan, October 15--17, 2017, Proceedings (Lecture Notes in Computer Science","volume":"90","author":"Fukuchi Kazuto","year":"2017","unstructured":"Kazuto Fukuchi , Quang Khai Tran , and Jun Sakuma . 2017 . Differentially Private Empirical Risk Minimization with Input Perturbation. In Discovery Science - 20th International Conference , DS 2017, Kyoto, Japan, October 15--17, 2017, Proceedings (Lecture Notes in Computer Science , Vol. 10558). Springer, 82-- 90 . Kazuto Fukuchi, Quang Khai Tran, and Jun Sakuma. 2017. Differentially Private Empirical Risk Minimization with Input Perturbation. In Discovery Science - 20th International Conference, DS 2017, Kyoto, Japan, October 15--17, 2017, Proceedings (Lecture Notes in Computer Science, Vol. 10558). Springer, 82--90."},{"key":"e_1_3_2_2_12_1","volume-title":"P\u00f3 l Mac Aonghusa, and Killian Levacher","author":"Holohan Naoise","year":"2019","unstructured":"Naoise Holohan , Stefano Braghin , P\u00f3 l Mac Aonghusa, and Killian Levacher . 2019 . Diffprivlib : The IBM Differential Privacy Library . CoRR , Vol. abs\/ 1907 .02444 (2019). Naoise Holohan, Stefano Braghin, P\u00f3 l Mac Aonghusa, and Killian Levacher. 2019. Diffprivlib: The IBM Differential Privacy Library. CoRR , Vol. abs\/1907.02444 (2019)."},{"key":"e_1_3_2_2_13_1","volume-title":"USA","author":"Jarin Ismat","year":"2021","unstructured":"Ismat Jarin and Birhanu Eshete . 2021 . PRICURE: Privacy-Preserving Collaborative Inference in a Multi-Party Setting. In IWSPA@CODASPY 2021: ACM Workshop on Security and Privacy Analytics, Virtual Event , USA , April 28, 2021 . ACM, 25--35. Ismat Jarin and Birhanu Eshete. 2021. PRICURE: Privacy-Preserving Collaborative Inference in a Multi-Party Setting. In IWSPA@CODASPY 2021: ACM Workshop on Security and Privacy Analytics, Virtual Event, USA, April 28, 2021 . ACM, 25--35."},{"key":"e_1_3_2_2_14_1","volume-title":"Evaluating Differentially Private Machine Learning in Practice. In 28th USENIX Security Symposium, USENIX Security 2019","author":"Jayaraman Bargav","year":"2019","unstructured":"Bargav Jayaraman and David Evans . 2019 . Evaluating Differentially Private Machine Learning in Practice. In 28th USENIX Security Symposium, USENIX Security 2019 , Santa Clara, CA, USA, August 14--16 , 2019 . USENIX Association, 1895--1912. Bargav Jayaraman and David Evans. 2019. Evaluating Differentially Private Machine Learning in Practice. In 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14--16, 2019 . USENIX Association, 1895--1912."},{"key":"e_1_3_2_2_15_1","volume-title":"Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018","author":"Jayaraman Bargav","year":"2018","unstructured":"Bargav Jayaraman , Lingxiao Wang , David Evans , and Quanquan Gu . 2018 . Distributed Learning without Distress: Privacy-Preserving Empirical Risk Minimization . In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018 , NeurIPS 2018, December 3--8, 2018, Montr\u00e9 al, Canada . 6346--6357. Bargav Jayaraman, Lingxiao Wang, David Evans, and Quanquan Gu. 2018. Distributed Learning without Distress: Privacy-Preserving Empirical Risk Minimization. In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, December 3--8, 2018, Montr\u00e9 al, Canada . 6346--6357."},{"key":"e_1_3_2_2_16_1","volume-title":"Revisiting Membership Inference Under Realistic Assumptions. CoRR","author":"Jayaraman Bargav","year":"2020","unstructured":"Bargav Jayaraman , Lingxiao Wang , David Evans , and Quanquan Gu. 2020. Revisiting Membership Inference Under Realistic Assumptions. CoRR , Vol. abs\/ 2005 .10881 ( 2020 ). Bargav Jayaraman, Lingxiao Wang, David Evans, and Quanquan Gu. 2020. Revisiting Membership Inference Under Realistic Assumptions. CoRR , Vol. abs\/2005.10881 (2020)."},{"key":"e_1_3_2_2_17_1","volume-title":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019 . 259--274","author":"Jia Jinyuan","unstructured":"Jinyuan Jia , Ahmed Salem , Michael Backes , Yang Zhang , and Neil Zhenqiang Gong . [n.d.]. MemGuard : Defending against Black-Box Membership Inference Attacks via Adversarial Examples . In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019 . 259--274 . Jinyuan Jia, Ahmed Salem, Michael Backes, Yang Zhang, and Neil Zhenqiang Gong. [n.d.]. MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019 . 259--274."},{"key":"e_1_3_2_2_18_1","unstructured":"Kaggle. 2007. All Lending Club loan data. https:\/\/www.kaggle.com\/wordsforthewise\/lending-club .  Kaggle. 2007. All Lending Club loan data. https:\/\/www.kaggle.com\/wordsforthewise\/lending-club ."},{"key":"e_1_3_2_2_19_1","unstructured":"Kaggle. 2020. COVID-19 patient pre-condition dataset. https:\/\/www.kaggle.com\/tanmoyx\/covid19-patient-precondition-dataset .  Kaggle. 2020. COVID-19 patient pre-condition dataset. https:\/\/www.kaggle.com\/tanmoyx\/covid19-patient-precondition-dataset ."},{"key":"e_1_3_2_2_20_1","volume-title":"Input Perturbation: A New Paradigm between Central and Local Differential Privacy. CoRR","author":"Kang Yilin","year":"2020","unstructured":"Yilin Kang , Yong Liu , Ben Niu , Xinyi Tong , Likun Zhang , and Weiping Wang . 2020 . Input Perturbation: A New Paradigm between Central and Local Differential Privacy. CoRR , Vol. abs\/ 2002 .08570 (2020). arxiv: 2002.08570 Yilin Kang, Yong Liu, Ben Niu, Xinyi Tong, Likun Zhang, and Weiping Wang. 2020. Input Perturbation: A New Paradigm between Central and Local Differential Privacy. CoRR , Vol. abs\/2002.08570 (2020). arxiv: 2002.08570"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46128-1_50"},{"key":"e_1_3_2_2_22_1","unstructured":"Keras. [n.d.]. The CIFAR-10 dataset. https:\/\/keras.io\/api\/datasets\/cifar10\/l .  Keras. [n.d.]. The CIFAR-10 dataset. https:\/\/keras.io\/api\/datasets\/cifar10\/l ."},{"key":"e_1_3_2_2_23_1","volume-title":"Exploiting Unintended Feature Leakage in Collaborative Learning. In 2019 IEEE Symposium on Security and Privacy, SP 2019","author":"Melis Luca","year":"2019","unstructured":"Luca Melis , Congzheng Song , Emiliano De Cristofaro , and Vitaly Shmatikov . 2019 . Exploiting Unintended Feature Leakage in Collaborative Learning. In 2019 IEEE Symposium on Security and Privacy, SP 2019 , San Francisco, CA, USA, May 19--23 , 2019. IEEE, 691--706. Luca Melis, Congzheng Song, Emiliano De Cristofaro, and Vitaly Shmatikov. 2019. Exploiting Unintended Feature Leakage in Collaborative Learning. In 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19--23, 2019. IEEE, 691--706."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.11"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_2_2_26_1","volume-title":"Improving Deep Learning with Differential Privacy using Gradient Encoding and Denoising. CoRR","author":"Nasr Milad","year":"2020","unstructured":"Milad Nasr , Reza Shokri , and Amir Houmansadr . 2020. Improving Deep Learning with Differential Privacy using Gradient Encoding and Denoising. CoRR , Vol. abs\/ 2007 .11524 ( 2020 ). Milad Nasr, Reza Shokri, and Amir Houmansadr. 2020. Improving Deep Learning with Differential Privacy using Gradient Encoding and Denoising. CoRR , Vol. abs\/2007.11524 (2020)."},{"key":"e_1_3_2_2_27_1","volume-title":"5th International Conference on Learning Representations, ICLR 2017 . OpenReview.net.","author":"Papernot Nicolas","year":"2017","unstructured":"Nicolas Papernot , Mart'i n Abadi , \u00da lfar Erlingsson, Ian J. Goodfellow , and Kunal Talwar . 2017 . Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data . In 5th International Conference on Learning Representations, ICLR 2017 . OpenReview.net. Nicolas Papernot, Mart'i n Abadi, \u00da lfar Erlingsson, Ian J. Goodfellow, and Kunal Talwar. 2017. Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data. In 5th International Conference on Learning Representations, ICLR 2017 . OpenReview.net."},{"key":"e_1_3_2_2_28_1","volume-title":"6th International Conference on Learning Representations, ICLR","author":"Papernot Nicolas","year":"2018","unstructured":"Nicolas Papernot , Shuang Song , Ilya Mironov , Ananth Raghunathan , Kunal Talwar , and \u00da lfar Erlingsson. 2018. Scalable Private Learning with PATE . In 6th International Conference on Learning Representations, ICLR 2018 , Vancouver, BC , Canada, April 30 - May 3, 2018, Conference Track Proceedings. OpenReview .net. Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, and \u00da lfar Erlingsson. 2018. Scalable Private Learning with PATE. In 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings. OpenReview.net."},{"key":"e_1_3_2_2_29_1","first-page":"61","article-title":"Membership Inference Attack against Differentially Private Deep Learning","volume":"11","author":"Atiqur Rahman Md.","year":"2018","unstructured":"Md. Atiqur Rahman , Tanzila Rahman , Robert Lagani\u00e8 re, and Noman Mohammed . 2018 . Membership Inference Attack against Differentially Private Deep Learning Model. Trans. Data Priv. , Vol. 11 , 1 (2018), 61 -- 79 . Md. Atiqur Rahman, Tanzila Rahman, Robert Lagani\u00e8 re, and Noman Mohammed. 2018. Membership Inference Attack against Differentially Private Deep Learning Model. Trans. Data Priv. , Vol. 11, 1 (2018), 61--79.","journal-title":"Model. Trans. Data Priv."},{"key":"e_1_3_2_2_30_1","volume-title":"Membership Inference Attacks against Machine Learning Models. CoRR","author":"Shokri Reza","year":"2016","unstructured":"Reza Shokri , Marco Stronati , and Vitaly Shmatikov . 2016. Membership Inference Attacks against Machine Learning Models. CoRR , Vol. abs\/ 1610 .05820 ( 2016 ). Reza Shokri, Marco Stronati, and Vitaly Shmatikov. 2016. Membership Inference Attacks against Machine Learning Models. CoRR , Vol. abs\/1610.05820 (2016)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134077"},{"key":"e_1_3_2_2_32_1","volume-title":"Chasing Your Long Tails: Differentially Private Prediction in Health Care Settings. In FAccT '21: 2021 ACM Conference on Fairness, Accountability, and Transparency . 723--734","author":"Suriyakumar Vinith M.","year":"2021","unstructured":"Vinith M. Suriyakumar , Nicolas Papernot , Anna Goldenberg , and Marzyeh Ghassemi . 2021 . Chasing Your Long Tails: Differentially Private Prediction in Health Care Settings. In FAccT '21: 2021 ACM Conference on Fairness, Accountability, and Transparency . 723--734 . Vinith M. Suriyakumar, Nicolas Papernot, Anna Goldenberg, and Marzyeh Ghassemi. 2021. Chasing Your Long Tails: Differentially Private Prediction in Health Care Settings. In FAccT '21: 2021 ACM Conference on Fairness, Accountability, and Transparency . 723--734."},{"key":"e_1_3_2_2_33_1","first-page":"601","article-title":"Stealing Machine Learning Models via Prediction APIs. In 25th USENIX Security Symposium","volume":"16","author":"Florian Tram\u00e8","year":"2016","unstructured":"Florian Tram\u00e8 r, Fan Zhang , Ari Juels , Michael K. Reiter , and Thomas Ristenpart . 2016 . Stealing Machine Learning Models via Prediction APIs. In 25th USENIX Security Symposium , USENIX Security 16. 601 -- 618 . Florian Tram\u00e8 r, Fan Zhang, Ari Juels, Michael K. Reiter, and Thomas Ristenpart. 2016. Stealing Machine Learning Models via Prediction APIs. In 25th USENIX Security Symposium, USENIX Security 16. 601--618.","journal-title":"USENIX Security"},{"key":"e_1_3_2_2_34_1","volume-title":"Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems","author":"Wang Di","year":"2017","unstructured":"Di Wang , Minwei Ye , and Jinhui Xu. 2017. Differentially Private Empirical Risk Minimization Revisited: Faster and More General . In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017 , December 4--9, 2017, Long Beach, CA, USA. 2722--2731. Di Wang, Minwei Ye, and Jinhui Xu. 2017. Differentially Private Empirical Risk Minimization Revisited: Faster and More General. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4--9, 2017, Long Beach, CA, USA. 2722--2731."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00027"},{"key":"e_1_3_2_2_36_1","volume-title":"Mohamed Ali K\u00e2 afar, and Nicolas Kourtellis","author":"Hao Zhao Benjamin Zi","year":"2020","unstructured":"Benjamin Zi Hao Zhao , Mohamed Ali K\u00e2 afar, and Nicolas Kourtellis . 2020 . Not one but many Tradeoffs : Privacy Vs. Utility in Differentially Private Machine Learning . (2020), 15--26. Benjamin Zi Hao Zhao, Mohamed Ali K\u00e2 afar, and Nicolas Kourtellis. 2020. Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning. (2020), 15--26."}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","location":"Baltimore MD USA","acronym":"CODASPY '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511513","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3511513","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:39Z","timestamp":1750188639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511513"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":36,"alternative-id":["10.1145\/3508398.3511513","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3511513","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}