{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T18:25:06Z","timestamp":1776795906320,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T00:00:00Z","timestamp":1655683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bundesministerium f\u00fcr Bildung und Forschung","award":["13N15343"],"award-info":[{"award-number":["13N15343"]}]},{"name":"National Research Center for Applied Cybersecurity ATHENE"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,21]]},"DOI":"10.1145\/3531146.3533073","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T14:27:10Z","timestamp":1655735230000},"page":"58-69","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Learning to Break Deep Perceptual Hashing: The Use Case NeuralHash"],"prefix":"10.1145","author":[{"given":"Lukas","family":"Struppek","sequence":"first","affiliation":[{"name":"Department of Computer Science, Technical University of Darmstadt, Germany"}]},{"given":"Dominik","family":"Hintersdorf","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Technical University of Darmstadt, Germany"}]},{"given":"Daniel","family":"Neider","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Software Systems, Germany and Safety and Explainability of Learning Systems, Carl von Ossietzky University of Oldenburg, Germany"}]},{"given":"Kristian","family":"Kersting","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Centre for Cognitive Science, Technical University of Darmstadt, Germany and Hessian Center for Artificial Intelligence, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Hal Abelson Ross Anderson Steven\u00a0M. Bellovin Josh Benaloh Matt Blaze Jon Callas Whitfield Diffie Susan Landau Peter\u00a0G. Neumann Ronald\u00a0L. Rivest Jeffrey\u00a0I. Schiller Bruce Schneier Vanessa Teague and Carmela Troncoso. 2021. Bugs in our Pockets: The Risks of Client-Side Scanning. CoRR abs\/2110.07450(2021)."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/pixnio.com\/creative-commons-license, accessed","author":"Appel Mathias","year":"2021","unstructured":"Mathias Appel. 2017. PIXNIO-226632-4681x3100.jpeg. https:\/\/pixnio.com\/creative-commons-license, accessed Sept. 23, 2021; Cropped; License: https:\/\/pixnio.com\/creative-commons-license."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/github.com\/anishathalye\/neural-hash-collider, accessed","author":"Athalye Anish","year":"2021","unstructured":"Anish Athalye. 2021. NeuralHash Collider. https:\/\/github.com\/anishathalye\/neural-hash-collider, accessed Oct. 12, 2021."},{"key":"e_1_3_2_1_4_1","unstructured":"Jiawang Bai Bin Chen Yiming Li Dongxian Wu Weiwei Guo Shu-tao Xia and En-hui Yang. 2020. Targeted Attack for Deep Hashing based Retrieval. In ECCV."},{"key":"e_1_3_2_1_5_1","volume-title":"The Apple PSI Protocol. https:\/\/www.apple.com\/child-safety\/pdf\/Technical_Assessment_of_CSAM_Detection_Mihir_Bellare.pdf, accessed","author":"Bellare Mihir","year":"2021","unstructured":"Mihir Bellare. 2021. The Apple PSI Protocol. https:\/\/www.apple.com\/child-safety\/pdf\/Technical_Assessment_of_CSAM_Detection_Mihir_Bellare.pdf, accessed: Oct. 1, 2021."},{"key":"e_1_3_2_1_6_1","volume-title":"Cross-Party Letter of Member of the European Parliament Against General Monitoring. https:\/\/www.patrick-breyer.de\/wp-content\/uploads\/2021\/11\/20211020_Letter_General_Monitoring.pdf, accessed","author":"Breyer Patrick","year":"2021","unstructured":"Patrick Breyer, Alviina Alamets\u00e4, Rosa D\u2019Amato, Pernando Barrena, Saskia Bricmont, Antoni Com\u00edn, Gwendoline Delbos-Corfield, Francesca Donato, Cornelia Ernst, Claudia Gamon, Mark\u00e9ta Gregorov\u00e1, Francisco Guerreiro, Svenja Hahn, Irena Joveva, Petra Kammerevert, Marcel Kolaja, Moritz K\u00f6rner, Karen Melchior, Clara Ponsat\u00ed, and Mikul\u00e1\u0161 Peksa. 2021. Cross-Party Letter of Member of the European Parliament Against General Monitoring. https:\/\/www.patrick-breyer.de\/wp-content\/uploads\/2021\/11\/20211020_Letter_General_Monitoring.pdf, accessed: Nov. 19, 2021."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_9_1","volume-title":"EU strategy for a more effective fight against child sexual abuse. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:52020DC0607, accessed","author":"European Commission","year":"2021","unstructured":"European Commission. 2020. EU strategy for a more effective fight against child sexual abuse. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:52020DC0607, accessed: Nov. 16, 2021."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 37th International Conference on Machine Learning (ICML)(Proceedings of Machine Learning Research, Vol.\u00a0119)","author":"Croce Francesco","year":"2020","unstructured":"Francesco Croce and Matthias Hein. 2020. Minimally distorted Adversarial Examples with a Fast Adaptive Boundary Attack. In Proceedings of the 37th International Conference on Machine Learning (ICML)(Proceedings of Machine Learning Research, Vol.\u00a0119). 2196\u20132205."},{"key":"e_1_3_2_1_11_1","volume-title":"Imagenet: A large-scale hierarchical image database. In CVPR. 248\u2013255.","author":"Deng Jia","year":"2009","unstructured":"Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. 2009. Imagenet: A large-scale hierarchical image database. In CVPR. 248\u2013255."},{"key":"e_1_3_2_1_12_1","unstructured":"Brian Dolhansky and Cristian Canton-Ferrer. 2020. Adversarial collision attacks on image hashing functions. CoRR abs\/2011.09473(2020)."},{"key":"e_1_3_2_1_13_1","unstructured":"Xiaoyi Dong Dongdong Chen Jianmin Bao Chuan Qin Lu Yuan Weiming Zhang Nenghai Yu and Dong Chen. 2020. GreedyFool: Distortion-Aware Sparse Adversarial Attack. In Conference on Neural Information Processing Systems (NeurIPS) Hugo Larochelle Marc\u2019Aurelio Ranzato Raia Hadsell Maria-Florina Balcan and Hsuan-Tien Lin (Eds.)."},{"key":"e_1_3_2_1_14_1","volume-title":"Boosting Adversarial Attacks With Momentum. In 2018 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 9185\u20139193","author":"Dong Yinpeng","year":"2018","unstructured":"Yinpeng Dong, Fangzhou Liao, Tianyu Pang, Hang Su, Jun Zhu, Xiaolin Hu, and Jianguo Li. 2018. Boosting Adversarial Attacks With Momentum. In 2018 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 9185\u20139193."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2017.7973569"},{"key":"e_1_3_2_1_16_1","volume-title":"Novelty detection and analysis in convolutional neural networks. Master\u2019s thesis","author":"Eshed Noam","unstructured":"Noam Eshed. 2020. Novelty detection and analysis in convolutional neural networks. Master\u2019s thesis. Cornell University."},{"key":"e_1_3_2_1_17_1","volume-title":"Open-Sourcing Photo- and Video-Matching Technology to Make the Internet Safer. https:\/\/about.fb.com\/news\/2019\/08\/open-source-photo-video-matching, accessed","year":"2021","unstructured":"Facebook. 2019. Open-Sourcing Photo- and Video-Matching Technology to Make the Internet Safer. https:\/\/about.fb.com\/news\/2019\/08\/open-source-photo-video-matching, accessed Oct. 18, 2021."},{"key":"e_1_3_2_1_18_1","volume-title":"United Kingdom\u00a0Government.","author":"Department for Digital, Culture","year":"2021","unstructured":"Department for Digital, Culture, Media & Sport, United Kingdom\u00a0Government. 2021. Draft Online Safety Bill. https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/985033\/Draft_Online_Safety_Bill_Bookmarked.pdf, accessed: Nov. 16, 2021."},{"key":"e_1_3_2_1_19_1","volume-title":"CyberTipline - By the Numbers. https:\/\/www.missingkids.org\/gethelpnow\/cybertipline, accessed","author":"National\u00a0Center for Missing & Exploited\u00a0Children. 2021.","year":"2021","unstructured":"National\u00a0Center for Missing & Exploited\u00a0Children. 2021. CyberTipline - By the Numbers. https:\/\/www.missingkids.org\/gethelpnow\/cybertipline, accessed: Oct. 1, 2021."},{"key":"e_1_3_2_1_20_1","volume-title":"Apple\u2019s CSAM detection technology. https:\/\/www.apple.com\/child-safety\/pdf\/Technical_Assessment_of_CSAM_Detection_David_Forsyth.pdf, accessed","author":"Forsyth David","year":"2021","unstructured":"David Forsyth. 2021. Apple\u2019s CSAM detection technology. https:\/\/www.apple.com\/child-safety\/pdf\/Technical_Assessment_of_CSAM_Detection_David_Forsyth.pdf, accessed: Oct. 1, 2021."},{"key":"e_1_3_2_1_21_1","unstructured":"Aristides Gionis Piotr Indyk and Rajeev Motwani. 1999. Similarity Search in High Dimensions via Hashing. In VLDB. 518\u2013529."},{"key":"e_1_3_2_1_22_1","unstructured":"Ian Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In ICLR."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"R. Hadsell S. Chopra and Y. LeCun. 2006. Dimensionality Reduction by Learning an Invariant Mapping. In CVPR Vol.\u00a02. 1735\u20131742.","DOI":"10.1109\/CVPR.2006.100"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484559"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Andrew Howard Mark Sandler Grace Chu Liang-Chieh Chen Bo Chen Mingxing Tan Weijun Wang Yukun Zhu Ruoming Pang Vijay Vasudevan Quoc\u00a0V. Le and Hartwig Adam. 2019. Searching for MobileNetV3. In ICCV.","DOI":"10.1109\/ICCV.2019.00140"},{"key":"e_1_3_2_1_26_1","volume-title":"CSAM Detection - Technical Summary. https:\/\/www.apple.com\/child-safety\/pdf\/CSAM_Detection_Technical_Summary.pdf, accessed","author":"Apple Inc.","year":"2021","unstructured":"Apple Inc.2021. CSAM Detection - Technical Summary. https:\/\/www.apple.com\/child-safety\/pdf\/CSAM_Detection_Technical_Summary.pdf, accessed: Sept. 22, 2021."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Piotr Indyk and Rajeev Motwani. 1998. Approximate Nearest Neighbors: Towards Removing the Curse of Dimensionality. In ACM - STOC. 604\u2013613.","DOI":"10.1145\/276698.276876"},{"key":"e_1_3_2_1_28_1","unstructured":"Shubham Jain Ana-Maria Cretu and Yves-Alexandre de Montjoye. 2021. Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning. CoRR abs\/2106.09820(2021)."},{"key":"e_1_3_2_1_29_1","volume-title":"Novel Dataset for Fine-Grained Image Categorization. In First Workshop on Fine-Grained Visual Categorization, CVPR.","author":"Khosla Aditya","year":"2011","unstructured":"Aditya Khosla, Nityananda Jayadevaprakash, Bangpeng Yao, and Li Fei-Fei. 2011. Novel Dataset for Fine-Grained Image Categorization. In First Workshop on Fine-Grained Visual Categorization, CVPR."},{"key":"e_1_3_2_1_30_1","volume-title":"apple-neuralhash-attack. https:\/\/github.com\/greentfrapp\/apple-neuralhash-attack, accessed","author":"Kiat Lim\u00a0Swee","year":"2021","unstructured":"Lim\u00a0Swee Kiat. 2021. apple-neuralhash-attack. https:\/\/github.com\/greentfrapp\/apple-neuralhash-attack, accessed Oct. 12, 2021."},{"key":"e_1_3_2_1_31_1","volume-title":"Neural Hash Collision Creator. https:\/\/github.com\/yk\/neural_hash_collision, accessed","author":"Kilcher Yannic","year":"2021","unstructured":"Yannic Kilcher. 2021. Neural Hash Collision Creator. https:\/\/github.com\/yk\/neural_hash_collision, accessed Oct. 12, 2021."},{"key":"e_1_3_2_1_32_1","volume-title":"Kingma and Jimmy Ba","author":"P.","year":"2015","unstructured":"Diederik\u00a0P. Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. In ICLR."},{"key":"e_1_3_2_1_33_1","volume-title":"https:\/\/hackerfactor.com\/blog\/index.php?\/archives\/931-PhotoDNA-and-Limitations.html, accessed","author":"Krawetz Neal","year":"2022","unstructured":"Neal Krawetz. 2021. PhotoDNA and Limitations. https:\/\/hackerfactor.com\/blog\/index.php?\/archives\/931-PhotoDNA-and-Limitations.html, accessed: Jan. 13, 2022."},{"key":"e_1_3_2_1_34_1","volume-title":"Tweets on NeuralHash. https:\/\/twitter.com\/SarahJamieLewis\/status\/1428146453394821125, accessed","author":"Lewis Sarah\u00a0Jamie","year":"2021","unstructured":"Sarah\u00a0Jamie Lewis. 2021. Tweets on NeuralHash. https:\/\/twitter.com\/SarahJamieLewis\/status\/1428146453394821125, accessed: Oct. 1, 2021."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Venice\u00a0Erin Liong Jiwen Lu Gang Wang Pierre Moulin and Jie Zhou. 2015. Deep hashing for compact binary codes learning. In CVPR. 2475\u20132483.","DOI":"10.1109\/CVPR.2015.7298862"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Haomiao Liu Ruiping Wang Shiguang Shan and Xilin Chen. 2016. Deep Supervised Hashing for Fast Image Retrieval. In CVPR. 2064\u20132072.","DOI":"10.1109\/CVPR.2016.227"},{"key":"e_1_3_2_1_37_1","unstructured":"Aleksander Madry Aleksandar Makelov Ludwig Schmidt Dimitris Tsipras and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In ICLR."},{"key":"e_1_3_2_1_38_1","volume-title":"https:\/\/www.microsoft.com\/en-us\/photodna, accessed","author":"DNA.","year":"2021","unstructured":"Microsoft. 2015. PhotoDNA. https:\/\/www.microsoft.com\/en-us\/photodna, accessed Oct. 18, 2021."},{"key":"e_1_3_2_1_39_1","volume-title":"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:32021R1232, accessed","author":"\u00a0the European\u00a0Union Official\u00a0Journal","year":"2021","unstructured":"Official\u00a0Journal of\u00a0the European\u00a0Union. 2021. Regulation (EU) 2021\/1232. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:32021R1232, accessed: Nov. 16, 2021."},{"key":"e_1_3_2_1_40_1","volume-title":"The Limitations of Deep Learning in Adversarial Settings. In IEEE European Symposium on Security and Privacy (EuroS&P). 372\u2013387","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot, Patrick\u00a0D. McDaniel, Somesh Jha, Matt Fredrikson, Z.\u00a0Berkay Celik, and Ananthram Swami. 2016. The Limitations of Deep Learning in Adversarial Settings. In IEEE European Symposium on Security and Privacy (EuroS&P). 372\u2013387."},{"key":"e_1_3_2_1_41_1","volume-title":"A Review of the Cryptography Behind the Apple PSI System. https:\/\/www.apple.com\/child-safety\/pdf\/Technical_Assessment_of_CSAM_Detection_Benny_Pinkas.pdf, accessed","author":"Pinkas Benny","year":"2021","unstructured":"Benny Pinkas. 2021. A Review of the Cryptography Behind the Apple PSI System. https:\/\/www.apple.com\/child-safety\/pdf\/Technical_Assessment_of_CSAM_Detection_Benny_Pinkas.pdf, accessed: Oct. 1, 2021."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"e_1_3_2_1_43_1","volume-title":"The All-Seeing \u201di\u201d: Apple Just Declared War on Your Privacy. https:\/\/edwardsnowden.substack.com\/p\/all-seeing-i, accessed","author":"Snowden Edward","year":"2021","unstructured":"Edward Snowden. 2021. The All-Seeing \u201di\u201d: Apple Just Declared War on Your Privacy. https:\/\/edwardsnowden.substack.com\/p\/all-seeing-i, accessed: Oct. 1, 2021."},{"key":"e_1_3_2_1_44_1","first-page":"828","article-title":"One Pixel Attack for Fooling Deep Neural Networks","volume":"23","author":"Su Jiawei","year":"2019","unstructured":"Jiawei Su, Danilo\u00a0Vasconcellos Vargas, and Kouichi Sakurai. 2019. One Pixel Attack for Fooling Deep Neural Networks. IEEE TEVC 23, 5 (2019), 828\u2013841.","journal-title":"IEEE TEVC"},{"key":"e_1_3_2_1_45_1","unstructured":"Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian Goodfellow and Rob Fergus. 2014. Intriguing properties of neural networks. In ICLR."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Xunguang Wang Zheng Zhang Guangming Lu and Yong Xu. 2021. Targeted Attack and Defense for Deep Hashing. In ACM SIGIR. 2298\u20132302.","DOI":"10.1145\/3404835.3463233"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Xunguang Wang Zheng Zhang Baoyuan Wu Fumin Shen and Guangming Lu. 2021. Prototype-Supervised Adversarial Network for Targeted Attack of Deep Hashing. In CVPR. 16357\u201316366.","DOI":"10.1109\/CVPR46437.2021.01609"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.06.018"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"e_1_3_2_1_50_1","volume-title":"Black Lives Matter protest at US Embassy. https:\/\/commons.wikimedia.org\/wiki\/File:Black_Lives_Matter_protest_at_US_Embassy,_London_01.jpg, accessed","author":"Katie\u00a0Crampton","year":"2021","unstructured":"Katie\u00a0Crampton (WMUK). 2020. Black Lives Matter protest at US Embassy. https:\/\/commons.wikimedia.org\/wiki\/File:Black_Lives_Matter_protest_at_US_Embassy,_London_01.jpg, accessed Sept. 23, 2021; Cropped; License: https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/deed.en."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Dayan Wu Zheng Lin Bo Li Mingzhen Ye and Weiping Wang. 2017. Deep Supervised Hashing for Multi-Label and Large-Scale Image Retrieval. In ACM ICMR. 150\u2013158.","DOI":"10.1145\/3078971.3078989"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Yanru Xiao and Cong Wang. 2021. You See What I Want You To See: Exploring Targeted Black-Box Transferability Attack for Hash-Based Image Retrieval Systems. In CVPR. 1934\u20131943.","DOI":"10.1109\/CVPR46437.2021.00197"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2882908"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"},{"key":"e_1_3_2_1_55_1","unstructured":"F. Zhao Yongzhen Huang Liang Wang and Tieniu Tan. 2015. Deep semantic ranking based hashing for multi-label image retrieval. In CVPR. 1556\u20131564."},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the 38th International Conference on Machine Learning (ICML), Marina Meila and Tong Zhang (Eds.). Vol.\u00a0139","author":"Zhu Mingkang","year":"2021","unstructured":"Mingkang Zhu, Tianlong Chen, and Zhangyang Wang. 2021. Sparse and Imperceptible Adversarial Attack via a Homotopy Algorithm. In Proceedings of the 38th International Conference on Machine Learning (ICML), Marina Meila and Tong Zhang (Eds.). Vol.\u00a0139. 12868\u201312877."}],"event":{"name":"FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency","location":"Seoul Republic of Korea","acronym":"FAccT '22","sponsor":["ACM Association for Computing Machinery"]},"container-title":["2022 ACM Conference on Fairness Accountability and Transparency"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531146.3533073","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3531146.3533073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:10Z","timestamp":1750186930000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531146.3533073"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,20]]},"references-count":56,"alternative-id":["10.1145\/3531146.3533073","10.1145\/3531146"],"URL":"https:\/\/doi.org\/10.1145\/3531146.3533073","relation":{},"subject":[],"published":{"date-parts":[[2022,6,20]]},"assertion":[{"value":"2022-06-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}