{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T08:24:08Z","timestamp":1774167848352,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation of China","award":["62032001,62032008"],"award-info":[{"award-number":["62032001,62032008"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CSR1618384"],"award-info":[{"award-number":["CSR1618384"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key RD Program of China","award":["2018YFB1003604"],"award-info":[{"award-number":["2018YFB1003604"]}]},{"name":"PKU-Baidu Fund","award":["2020BD001"],"award-info":[{"award-number":["2020BD001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1145\/3524610.3527900","type":"proceedings-article","created":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T15:19:30Z","timestamp":1666279170000},"page":"366-377","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Exploring GNN based program embedding technologies for binary related tasks"],"prefix":"10.1145","author":[{"given":"Yixin","family":"Guo","sequence":"first","affiliation":[{"name":"Peking University, Beijing, China and Peng Cheng Lab, Shenzhen, China"}]},{"given":"Pengcheng","family":"Li","sequence":"additional","affiliation":[{"name":"TikTok Inc"}]},{"given":"Yingwei","family":"Luo","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China and Peng Cheng Lab, Shenzhen, China"}]},{"given":"Xiaolin","family":"Wang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China and Peng Cheng Lab, Shenzhen, China"}]},{"given":"Zhenlin","family":"Wang","sequence":"additional","affiliation":[{"name":"Michigan Tech"}]}],"member":"320","published-online":{"date-parts":[[2022,10,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International conference on machine learning. PMLR","author":"Allamanis Miltiadis","year":"2016","unstructured":"Miltiadis Allamanis , Hao Peng , and Charles Sutton . 2016 . A convolutional attention network for extreme summarization of source code . In International conference on machine learning. PMLR , 2091--2100. Miltiadis Allamanis, Hao Peng, and Charles Sutton. 2016. A convolutional attention network for extreme summarization of source code. In International conference on machine learning. PMLR, 2091--2100."},{"key":"e_1_3_2_1_2_1","volume-title":"International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=H1gKYo09tX","author":"Alon Uri","year":"2019","unstructured":"Uri Alon , Omer Levy , and Eran Yahav . 2019 . code2seq: Generating Sequences from Structured Representations of Code . In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=H1gKYo09tX Uri Alon, Omer Levy, and Eran Yahav. 2019. code2seq: Generating Sequences from Structured Representations of Code. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=H1gKYo09tX"},{"key":"e_1_3_2_1_3_1","volume-title":"International Conference on Machine Learning. PMLR, 245--256","author":"Alon Uri","year":"2020","unstructured":"Uri Alon , Roy Sadaka , Omer Levy , and Eran Yahav . 2020 . Structural language models of code . In International Conference on Machine Learning. PMLR, 245--256 . Uri Alon, Roy Sadaka, Omer Levy, and Eran Yahav. 2020. Structural language models of code. In International Conference on Machine Learning. PMLR, 245--256."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290353"},{"key":"e_1_3_2_1_5_1","unstructured":"D. Bahdanau K. Cho and Y. Bengio. 2014. Neural Machine Translation by Jointly Learning to Align and Translate. Computer Science (2014).  D. Bahdanau K. Cho and Y. Bengio. 2014. Neural Machine Translation by Jointly Learning to Align and Translate. Computer Science (2014)."},{"key":"e_1_3_2_1_6_1","volume-title":"Alice Shoshana Jakobovits, and Torsten Hoefler","author":"Ben-Nun Tal","year":"2018","unstructured":"Tal Ben-Nun , Alice Shoshana Jakobovits, and Torsten Hoefler . 2018 . Neural code comprehension: A learnable representation of code semantics. arXiv preprint arXiv:1806.07336 (2018). Tal Ben-Nun, Alice Shoshana Jakobovits, and Torsten Hoefler. 2018. Neural code comprehension: A learnable representation of code semantics. arXiv preprint arXiv:1806.07336 (2018)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259016.2259033"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 32nd Conference on Neural Information Processing Systems (NeurIPS","author":"Chen Xinyun","year":"2018","unstructured":"Xinyun Chen , Chang Liu , and Dawn Song . 2018 . Tree-to-tree Neural Networks for Program Translation, 2018 . In Proceedings of the 32nd Conference on Neural Information Processing Systems (NeurIPS 2018), Montr\u00e9al, QC, Canada. 2--8. Xinyun Chen, Chang Liu, and Dawn Song. 2018. Tree-to-tree Neural Networks for Program Translation, 2018. In Proceedings of the 32nd Conference on Neural Information Processing Systems (NeurIPS 2018), Montr\u00e9al, QC, Canada. 2--8."},{"key":"e_1_3_2_1_9_1","volume-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)","author":"Cheng Xiao","year":"2021","unstructured":"Xiao Cheng , Haoyu Wang , Jiayi Hua , Guoai Xu , and Yulei Sui . 2021. DeepWukong. ACM Transactions on Software Engineering and Methodology (TOSEM) ( 2021 ). Xiao Cheng, Haoyu Wang, Jiayi Hua, Guoai Xu, and Yulei Sui. 2021. DeepWukong. ACM Transactions on Software Engineering and Methodology (TOSEM) (2021)."},{"key":"e_1_3_2_1_10_1","volume-title":"Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling. CoRR abs\/1412.3555","author":"Chung Junyoung","year":"2014","unstructured":"Junyoung Chung , \u00c7aglar G\u00fcl\u00e7ehre , KyungHyun Cho , and Yoshua Bengio . 2014. Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling. CoRR abs\/1412.3555 ( 2014 ). arXiv:1412.3555 http:\/\/arxiv.org\/abs\/1412.3555 Junyoung Chung, \u00c7aglar G\u00fcl\u00e7ehre, KyungHyun Cho, and Yoshua Bengio. 2014. Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling. CoRR abs\/1412.3555 (2014). arXiv:1412.3555 http:\/\/arxiv.org\/abs\/1412.3555"},{"key":"e_1_3_2_1_11_1","volume-title":"International conference on machine learning. PMLR, 2702--2711","author":"Dai Hanjun","year":"2016","unstructured":"Hanjun Dai , Bo Dai , and Le Song . 2016 . Discriminative embeddings of latent variable models for structured data . In International conference on machine learning. PMLR, 2702--2711 . Hanjun Dai, Bo Dai, and Le Song. 2016. Discriminative embeddings of latent variable models for structured data. In International conference on machine learning. PMLR, 2702--2711."},{"key":"e_1_3_2_1_12_1","volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding.","author":"Devlin J.","year":"2018","unstructured":"J. Devlin , M. W. Chang , K. Lee , and K. Toutanova . 2018 . BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. (2018). J. Devlin, M. W. Chang, K. Lee, and K. Toutanova. 2018. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. (2018)."},{"key":"e_1_3_2_1_13_1","volume-title":"International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=SJeqs6EFvB","author":"Dinella Elizabeth","year":"2020","unstructured":"Elizabeth Dinella , Hanjun Dai , Ziyang Li , Mayur Naik , Le Song , and Ke Wang . 2020 . HOPPITY: Learning graph transformations to detect and fix bugs in programs . In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=SJeqs6EFvB Elizabeth Dinella, Hanjun Dai, Ziyang Li, Mayur Naik, Le Song, and Ke Wang. 2020. HOPPITY: Learning graph transformations to detect and fix bugs in programs. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=SJeqs6EFvB"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24311"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273480"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"e_1_3_2_1_18_1","volume-title":"Using program slicing in software maintenance. Software Engineering","author":"Lyle B. K.","year":"1991","unstructured":"Gallagher, B. K. , Lyle , and R. J. 1991. Using program slicing in software maintenance. Software Engineering , IEEE Transactions on ( 1991 ). Gallagher, B. K., Lyle, and R. J. 1991. Using program slicing in software maintenance. Software Engineering, IEEE Transactions on (1991)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31865-1_25"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586120"},{"key":"e_1_3_2_1_21_1","volume-title":"International conference on learning representations.","author":"Hellendoorn Vincent J","year":"2019","unstructured":"Vincent J Hellendoorn , Charles Sutton , Rishabh Singh , Petros Maniatis , and David Bieber . 2019 . Global relational models of source code . In International conference on learning representations. Vincent J Hellendoorn, Charles Sutton, Rishabh Singh, Petros Maniatis, and David Bieber. 2019. Global relational models of source code. In International conference on learning representations."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2902362"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196321.3196334"},{"key":"e_1_3_2_1_24_1","volume-title":"Learning and Evaluating Contextual Embedding of Source Code. In International Conference on Machine Learning. PMLR, 5110--5121","author":"Kanade Aditya","year":"2020","unstructured":"Aditya Kanade , Petros Maniatis , Gogul Balakrishnan , and Kensen Shi . 2020 . Learning and Evaluating Contextual Embedding of Source Code. In International Conference on Machine Learning. PMLR, 5110--5121 . Aditya Kanade, Petros Maniatis, Gogul Balakrishnan, and Kensen Shi. 2020. Learning and Evaluating Contextual Embedding of Source Code. In International Conference on Machine Learning. PMLR, 5110--5121."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2017.83"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the International Symposium on Memory Management.","author":"Li Pengcheng","year":"2014","unstructured":"Pengcheng Li , Chen Ding , and Hao Luo . 2014 . Modeling Heap Data Growth Using Average Liveness . In Proceedings of the International Symposium on Memory Management. Pengcheng Li, Chen Ding, and Hao Luo. 2014. Modeling Heap Data Growth Using Average Liveness. In Proceedings of the International Symposium on Memory Management."},{"key":"e_1_3_2_1_27_1","volume-title":"Learning Forward Reuse Distance. ArXiv abs\/2007.15859","author":"Li Pengcheng","year":"2020","unstructured":"Pengcheng Li and Yongbin Gu. 2020. Learning Forward Reuse Distance. ArXiv abs\/2007.15859 ( 2020 ). Pengcheng Li and Yongbin Gu. 2020. Learning Forward Reuse Distance. ArXiv abs\/2007.15859 (2020)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3046678"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2926697.2926708"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2014.24"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304067"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of ICLR'16 (proceedings of iclr'16 ed.). https:\/\/www.microsoft.com\/en-us\/research\/publication\/gated-graph-sequence-neural-networks","author":"Li Yujia","year":"2016","unstructured":"Yujia Li , Richard Zemel , Marc Brockschmidt , and Daniel Tarlow . 2016 . Gated Graph Sequence Neural Networks . In Proceedings of ICLR'16 (proceedings of iclr'16 ed.). https:\/\/www.microsoft.com\/en-us\/research\/publication\/gated-graph-sequence-neural-networks Yujia Li, Richard Zemel, Marc Brockschmidt, and Daniel Tarlow. 2016. Gated Graph Sequence Neural Networks. In Proceedings of ICLR'16 (proceedings of iclr'16 ed.). https:\/\/www.microsoft.com\/en-us\/research\/publication\/gated-graph-sequence-neural-networks"},{"key":"e_1_3_2_1_33_1","volume-title":"An Imitation Learning Approach for Cache Replacement. arXiv preprint arXiv:2006.16239","author":"Liu Evan Zheran","year":"2020","unstructured":"Evan Zheran Liu , Milad Hashemi , Kevin Swersky , Parthasarathy Ranganathan , and Junwhan Ahn . 2020. An Imitation Learning Approach for Cache Replacement. arXiv preprint arXiv:2006.16239 ( 2020 ). Evan Zheran Liu, Milad Hashemi, Kevin Swersky, Parthasarathy Ranganathan, and Junwhan Ahn. 2020. An Imitation Learning Approach for Cache Replacement. arXiv preprint arXiv:2006.16239 (2020)."},{"key":"e_1_3_2_1_34_1","volume-title":"Program Classification Using Gated Graph Attention Neural Network for Online Programming Service. CoRR abs\/1903.03804","author":"Lu Mingming","year":"2019","unstructured":"Mingming Lu , Dingwu Tan , Naixue Xiong , Zailiang Chen , and Haifeng Li. 2019. Program Classification Using Gated Graph Attention Neural Network for Online Programming Service. CoRR abs\/1903.03804 ( 2019 ). arXiv:1903.03804 http:\/\/arxiv.org\/abs\/1903.03804 Mingming Lu, Dingwu Tan, Naixue Xiong, Zailiang Chen, and Haifeng Li. 2019. Program Classification Using Gated Graph Attention Neural Network for Online Programming Service. CoRR abs\/1903.03804 (2019). arXiv:1903.03804 http:\/\/arxiv.org\/abs\/1903.03804"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2016.7482086"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240302.3240419"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3018743.3018759"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10139"},{"key":"e_1_3_2_1_39_1","unstructured":"Nvidia-Inc. 2017. Nvidia Tesla V100 GPU Architecture. https:\/\/images.nvidia.com\/content\/volta-architecture\/pdf\/volta-architecture-whitepaper.pdf.  Nvidia-Inc. 2017. Nvidia Tesla V100 GPU Architecture. https:\/\/images.nvidia.com\/content\/volta-architecture\/pdf\/volta-architecture-whitepaper.pdf."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276517"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594321"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2005605"},{"key":"e_1_3_2_1_43_1","volume-title":"International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=SJetQpEYvB","author":"Shi Zhan","year":"2020","unstructured":"Zhan Shi , Kevin Swersky , Daniel Tarlow , Parthasarathy Ranganathan , and Milad Hashemi . 2020 . Learning execution through neural code fusion . In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=SJetQpEYvB Zhan Shi, Kevin Swersky, Daniel Tarlow, Parthasarathy Ranganathan, and Milad Hashemi. 2020. Learning execution through neural code fusion. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=SJetQpEYvB"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_45_1","unstructured":"SPEC. 2017. SPEC CPU Benchmarks. (2017). http:\/\/www.spec.org\/benchmarks.html#cpu.  SPEC. 2017. SPEC CPU Benchmarks. (2017). http:\/\/www.spec.org\/benchmarks.html#cpu."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00103"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392717.3392754"},{"key":"e_1_3_2_1_48_1","volume-title":"Evaluating Representation Learning of Code Changes for Predicting Patch Correctness in Program Repair. In 2020 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 981--992","author":"Tian H.","unstructured":"H. Tian , K. Liu , A. K. Kabore , A. Koyuncu , L. Li , J. Klein , and T. F. Bissyand\u00e9 . 2020 . Evaluating Representation Learning of Code Changes for Predicting Patch Correctness in Program Repair. In 2020 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 981--992 . H. Tian, K. Liu, A. K. Kabore, A. Koyuncu, L. Li, J. Klein, and T. F. Bissyand\u00e9. 2020. Evaluating Representation Learning of Code Changes for Predicting Patch Correctness in Program Repair. In 2020 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 981--992."},{"key":"e_1_3_2_1_49_1","volume-title":"arXiv","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani , Noam Shazeer , Niki Parmar , Jakob Uszkoreit , Llion Jones , Aidan N Gomez , Lukasz Kaiser , and Illia Polosukhin . 2017. Attention Is All You Need. arXiv ( 2017 ). Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017. Attention Is All You Need. arXiv (2017)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385999"},{"key":"e_1_3_2_1_51_1","volume-title":"Dynamic Neural Program Embeddings for Program Repair. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=BJuWrGW0Z","author":"Wang Ke","year":"2018","unstructured":"Ke Wang , Zhendong Su , and Rishabh Singh . 2018 . Dynamic Neural Program Embeddings for Program Repair. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=BJuWrGW0Z Ke Wang, Zhendong Su, and Rishabh Singh. 2018. Dynamic Neural Program Embeddings for Program Repair. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=BJuWrGW0Z"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"e_1_3_2_1_53_1","unstructured":"Cheng Yang Zhiyuan Liu Deli Zhao Maosong Sun and Edward Chang. 2015. Network representation learning with rich text information. In Twenty-fourth international joint conference on artificial intelligence.  Cheng Yang Zhiyuan Liu Deli Zhao Maosong Sun and Edward Chang. 2015. Network representation learning with rich text information. In Twenty-fourth international joint conference on artificial intelligence."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5466"},{"key":"e_1_3_2_1_55_1","volume-title":"CodeCMR: Cross-Modal Retrieval For Function-Level Binary Source Code Matching. Advances in Neural Information Processing Systems 33","author":"Yu Zeping","year":"2020","unstructured":"Zeping Yu , Wenxin Zheng , Jiaqi Wang , Qiyi Tang , Sen Nie , and Shi Wu. 2020. CodeCMR: Cross-Modal Retrieval For Function-Level Binary Source Code Matching. Advances in Neural Information Processing Systems 33 ( 2020 ). Zeping Yu, Wenxin Zheng, Jiaqi Wang, Qiyi Tang, Sen Nie, and Shi Wu. 2020. CodeCMR: Cross-Modal Retrieval For Function-Level Binary Source Code Matching. Advances in Neural Information Processing Systems 33 (2020)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aiopen.2021.01.001"}],"event":{"name":"ICPC '22: 30th International Conference on Program Comprehension","location":"Virtual Event","acronym":"ICPC '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 30th IEEE\/ACM International Conference on Program Comprehension"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524610.3527900","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3524610.3527900","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3524610.3527900","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:53Z","timestamp":1750183793000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524610.3527900"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":56,"alternative-id":["10.1145\/3524610.3527900","10.1145\/3524610"],"URL":"https:\/\/doi.org\/10.1145\/3524610.3527900","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"2022-10-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}