{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T14:33:47Z","timestamp":1768314827212,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1145\/3533767.3534393","type":"proceedings-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T14:28:50Z","timestamp":1657895330000},"page":"64-76","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Hunting bugs with accelerated optimal graph vertex matching"],"prefix":"10.1145","author":[{"given":"Xiaohui","family":"Zhang","sequence":"first","affiliation":[{"name":"Renmin University of China, China"}]},{"given":"Yuanjun","family":"Gong","sequence":"additional","affiliation":[{"name":"Renmin University of China, China"}]},{"given":"Bin","family":"Liang","sequence":"additional","affiliation":[{"name":"Renmin University of China, China"}]},{"given":"Jianjun","family":"Huang","sequence":"additional","affiliation":[{"name":"Renmin University of China, China"}]},{"given":"Wei","family":"You","sequence":"additional","affiliation":[{"name":"Renmin University of China, China"}]},{"given":"Wenchang","family":"Shi","sequence":"additional","affiliation":[{"name":"Renmin University of China, China"}]},{"given":"Jian","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. SQLite Forum. https:\/\/www.sqlite.org\/forum \t\t\t\t\t  2020. SQLite Forum. https:\/\/www.sqlite.org\/forum"},{"key":"e_1_3_2_1_2_1","unstructured":"2021. CVE-2021-30019. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-30019 \t\t\t\t\t  2021. CVE-2021-30019. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-30019"},{"key":"e_1_3_2_1_3_1","unstructured":"2021. Issue list of gpac. https:\/\/github.com\/gpac\/gpac\/issues \t\t\t\t\t  2021. Issue list of gpac. https:\/\/github.com\/gpac\/gpac\/issues"},{"key":"e_1_3_2_1_4_1","unstructured":"2021. Issue list of ImageMagick. https:\/\/github.com\/ImageMagick\/ImageMagick\/issues \t\t\t\t\t  2021. Issue list of ImageMagick. https:\/\/github.com\/ImageMagick\/ImageMagick\/issues"},{"key":"e_1_3_2_1_5_1","unstructured":"2021. Issue list of OpenSC. https:\/\/github.com\/OpenSC\/OpenSC\/issues \t\t\t\t\t  2021. Issue list of OpenSC. https:\/\/github.com\/OpenSC\/OpenSC\/issues"},{"key":"e_1_3_2_1_6_1","unstructured":"2021. Pull Request list of gpac. https:\/\/github.com\/gpac\/gpac\/pulls \t\t\t\t\t  2021. Pull Request list of gpac. https:\/\/github.com\/gpac\/gpac\/pulls"},{"key":"e_1_3_2_1_7_1","unstructured":"2021. Pull Request list of ImageMagick. https:\/\/github.com\/ImageMagick\/ImageMagick\/pulls \t\t\t\t\t  2021. Pull Request list of ImageMagick. https:\/\/github.com\/ImageMagick\/ImageMagick\/pulls"},{"key":"e_1_3_2_1_8_1","unstructured":"2021. Pull Request list of mruby. https:\/\/github.com\/mruby\/mruby\/pulls \t\t\t\t\t  2021. Pull Request list of mruby. https:\/\/github.com\/mruby\/mruby\/pulls"},{"key":"e_1_3_2_1_9_1","unstructured":"2021. Pull Request list of OpenSC. https:\/\/github.com\/OpenSC\/OpenSC\/pulls \t\t\t\t\t  2021. Pull Request list of OpenSC. https:\/\/github.com\/OpenSC\/OpenSC\/pulls"},{"key":"e_1_3_2_1_10_1","unstructured":"2022. Fortify. http:\/\/www.fortify.net\/ \t\t\t\t\t  2022. Fortify. http:\/\/www.fortify.net\/"},{"key":"e_1_3_2_1_11_1","volume-title":"Zemel","author":"Adams Ryan Prescott","year":"2011","unstructured":"Ryan Prescott Adams and Richard S . Zemel . 2011 . Ranking via Sinkhorn Propagation. CoRR , abs\/1106.1925 (2011), arXiv:1106.1925. arxiv:1106.1925 Ryan Prescott Adams and Richard S. Zemel. 2011. Ranking via Sinkhorn Propagation. CoRR, abs\/1106.1925 (2011), arXiv:1106.1925. arxiv:1106.1925"},{"key":"e_1_3_2_1_12_1","volume-title":"Ullman","author":"Aho Alfred V.","year":"1986","unstructured":"Alfred V. Aho , Ravi Sethi , and Jeffrey D . Ullman . 1986 . Compilers : Principles, Techniques, and Tools. Addison-Wesley . isbn:0-201-10088-6 https:\/\/www.worldcat.org\/oclc\/12285707 Alfred V. Aho, Ravi Sethi, and Jeffrey D. Ullman. 1986. Compilers: Principles, Techniques, and Tools. Addison-Wesley. isbn:0-201-10088-6 https:\/\/www.worldcat.org\/oclc\/12285707"},{"key":"e_1_3_2_1_13_1","volume-title":"6th International Conference on Learning Representations, ICLR","author":"Allamanis Miltiadis","year":"2018","unstructured":"Miltiadis Allamanis , Marc Brockschmidt , and Mahmoud Khademi . 2018. Learning to Represent Programs with Graphs . In 6th International Conference on Learning Representations, ICLR 2018 , Vancouver, BC , Canada, April 30 - May 3, 2018, Conference Track Proceedings. OpenReview .net. https:\/\/openreview.net\/forum?id=BJOFETxR- Miltiadis Allamanis, Marc Brockschmidt, and Mahmoud Khademi. 2018. Learning to Represent Programs with Graphs. In 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings. OpenReview.net. https:\/\/openreview.net\/forum?id=BJOFETxR-"},{"key":"e_1_3_2_1_14_1","volume-title":"Neural Code Comprehension: A Learnable Representation of Code Semantics. In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018","author":"Ben-Nun Tal","year":"2018","unstructured":"Tal Ben-Nun , Alice Shoshana Jakobovits , and Torsten Hoefler . 2018 . Neural Code Comprehension: A Learnable Representation of Code Semantics. In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018 , NeurIPS 2018, December 3-8, 2018, Montr\u00e9al, Canada. 3589\u20133601. https:\/\/proceedings.neurips.cc\/paper\/2018\/hash\/17c3433fecc21b57000debdf7ad5c930-Abstract.html Tal Ben-Nun, Alice Shoshana Jakobovits, and Torsten Hoefler. 2018. Neural Code Comprehension: A Learnable Representation of Code Semantics. In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, December 3-8, 2018, Montr\u00e9al, Canada. 3589\u20133601. https:\/\/proceedings.neurips.cc\/paper\/2018\/hash\/17c3433fecc21b57000debdf7ad5c930-Abstract.html"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236032"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00012"},{"key":"e_1_3_2_1_17_1","volume-title":"Spectral Networks and Locally Connected Networks on Graphs. In 2nd International Conference on Learning Representations, ICLR","author":"Bruna Joan","year":"2014","unstructured":"Joan Bruna , Wojciech Zaremba , Arthur Szlam , and Yann LeCun . 2014 . Spectral Networks and Locally Connected Networks on Graphs. In 2nd International Conference on Learning Representations, ICLR 2014. Joan Bruna, Wojciech Zaremba, Arthur Szlam, and Yann LeCun. 2014. Spectral Networks and Locally Connected Networks on Graphs. In 2nd International Conference on Learning Representations, ICLR 2014."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451152"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning, ICML 2019","volume":"1485","author":"Cvitkovic Milan","year":"2019","unstructured":"Milan Cvitkovic , Badal Singh , and Animashree Anandkumar . 2019 . Open Vocabulary Learning on Source Code with a Graph-Structured Cache . In Proceedings of the 36th International Conference on Machine Learning, ICML 2019 , 9-15 June 2019, Long Beach, California, USA, Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.) (Proceedings of Machine Learning Research , Vol. 97). PMLR, 1475\u2013 1485 . http:\/\/proceedings.mlr.press\/v97\/cvitkovic19b.html Milan Cvitkovic, Badal Singh, and Animashree Anandkumar. 2019. Open Vocabulary Learning on Source Code with a Graph-Structured Cache. In Proceedings of the 36th International Conference on Machine Learning, ICML 2019, 9-15 June 2019, Long Beach, California, USA, Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.) (Proceedings of Machine Learning Research, Vol. 97). PMLR, 1475\u20131485. http:\/\/proceedings.mlr.press\/v97\/cvitkovic19b.html"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/n19-1423"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23185"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2010.08.004"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2013.32"},{"key":"e_1_3_2_1_25_1","volume-title":"Johnson","author":"Garey M. R.","year":"1979","unstructured":"M. R. Garey and David S . Johnson . 1979 . Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman . isbn:0-7167-1044-7 M. R. Garey and David S. Johnson. 1979. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman. isbn:0-7167-1044-7"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180167"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.38"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3437533"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68279-0_2"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377812.3382172"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning, ICML 2019","volume":"3845","author":"Li Yujia","year":"2019","unstructured":"Yujia Li , Chenjie Gu , Thomas Dullien , Oriol Vinyals , and Pushmeet Kohli . 2019 . Graph Matching Networks for Learning the Similarity of Graph Structured Objects . In Proceedings of the 36th International Conference on Machine Learning, ICML 2019 , 9-15 June 2019, Long Beach, California, USA (Proceedings of Machine Learning Research , Vol. 97). PMLR, 3835\u2013 3845 . http:\/\/proceedings.mlr.press\/v97\/li19d.html Yujia Li, Chenjie Gu, Thomas Dullien, Oriol Vinyals, and Pushmeet Kohli. 2019. Graph Matching Networks for Learning the Similarity of Graph Structured Objects. In Proceedings of the 36th International Conference on Machine Learning, ICML 2019, 9-15 June 2019, Long Beach, California, USA (Proceedings of Machine Learning Research, Vol. 97). PMLR, 3835\u20133845. http:\/\/proceedings.mlr.press\/v97\/li19d.html"},{"key":"e_1_3_2_1_32_1","volume-title":"Gated Graph Sequence Neural Networks. In 4th International Conference on Learning Representations, ICLR 2016, San Juan, Puerto Rico, May 2-4, 2016, Conference Track Proceedings. arxiv:1511","author":"Li Yujia","unstructured":"Yujia Li , Daniel Tarlow , Marc Brockschmidt , and Richard S. Zemel . 2016 . Gated Graph Sequence Neural Networks. In 4th International Conference on Learning Representations, ICLR 2016, San Juan, Puerto Rico, May 2-4, 2016, Conference Track Proceedings. arxiv:1511 .05493 Yujia Li, Daniel Tarlow, Marc Brockschmidt, and Richard S. Zemel. 2016. Gated Graph Sequence Neural Networks. In 4th International Conference on Learning Representations, ICLR 2016, San Juan, Puerto Rico, May 2-4, 2016, Conference Track Proceedings. arxiv:1511.05493"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360588"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081755"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884870"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2005.09.032"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym11020254"},{"key":"e_1_3_2_1_38_1","unstructured":"Amir Makhshari and Mifta Sintaha. [n.d.]. On The Effect of Graph Representation of Source Code in Bug Detection. \t\t\t\t\t  Amir Makhshari and Mifta Sintaha. [n.d.]. On The Effect of Graph Representation of Source Code in Bug Detection."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 33nd International Conference on Machine Learning, ICML 2016, New York City, NY, USA, June 19-24, 2016 (JMLR Workshop and Conference Proceedings","volume":"2023","author":"Niepert Mathias","year":"2016","unstructured":"Mathias Niepert , Mohamed Ahmed , and Konstantin Kutzkov . 2016 . Learning Convolutional Neural Networks for Graphs . In Proceedings of the 33nd International Conference on Machine Learning, ICML 2016, New York City, NY, USA, June 19-24, 2016 (JMLR Workshop and Conference Proceedings , Vol. 48). JMLR.org, 2014\u2013 2023 . http:\/\/proceedings.mlr.press\/v48\/niepert16.html Mathias Niepert, Mohamed Ahmed, and Konstantin Kutzkov. 2016. Learning Convolutional Neural Networks for Graphs. In Proceedings of the 33nd International Conference on Machine Learning, ICML 2016, New York City, NY, USA, June 19-24, 2016 (JMLR Workshop and Conference Proceedings, Vol. 48). JMLR.org, 2014\u20132023. http:\/\/proceedings.mlr.press\/v48\/niepert16.html"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2005605"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294276"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 17th USENIX Security Symposium","author":"Tan Lin","year":"2008","unstructured":"Lin Tan , Xiaolan Zhang , Xiao Ma , Weiwei Xiong , and Yuanyuan Zhou . 2008 . AutoISES: Automatically Inferring Security Specification and Detecting Violations . In Proceedings of the 17th USENIX Security Symposium , July 28-August 1, 2008, San Jose, CA, USA. USENIX Association, 379\u2013394. http:\/\/www.usenix.org\/events\/sec08\/tech\/full_papers\/tan_l\/tan_l.pdf Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, and Yuanyuan Zhou. 2008. AutoISES: Automatically Inferring Security Specification and Detecting Violations. In Proceedings of the 17th USENIX Security Symposium, July 28-August 1, 2008, San Jose, CA, USA. USENIX Association, 379\u2013394. http:\/\/www.usenix.org\/events\/sec08\/tech\/full_papers\/tan_l\/tan_l.pdf"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00012"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2021.09.025"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00315"},{"key":"e_1_3_2_1_47_1","volume-title":"29th USENIX Security Symposium, USENIX Security 2020","author":"Xiao Yang","year":"2020","unstructured":"Yang Xiao , Bihuan Chen , Chendong Yu , Zhengzi Xu , Zimu Yuan , Feng Li , Binghong Liu , Yang Liu , Wei Huo , Wei Zou , and Wenchang Shi . 2020 . MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures . In 29th USENIX Security Symposium, USENIX Security 2020 , August 12-14, 2020. USENIX Association, 1165\u20131182. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/xiao Yang Xiao, Bihuan Chen, Chendong Yu, Zhengzi Xu, Zimu Yuan, Feng Li, Binghong Liu, Yang Liu, Wei Huo, Wei Zou, and Wenchang Shi. 2020. MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures. In 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020. USENIX Association, 1165\u20131182. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/xiao"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"e_1_3_2_1_49_1","volume-title":"Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine Learning. In 5th USENIX Workshop on Offensive Technologies, WOOT\u201911","author":"Yamaguchi Fabian","year":"2011","unstructured":"Fabian Yamaguchi , Felix \"FX\" Lindner , and Konrad Rieck . 2011 . Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine Learning. In 5th USENIX Workshop on Offensive Technologies, WOOT\u201911 , August 8, 2011, San Francisco, CA, USA, Proceedings, David Brumley and Michal Zalewski (Eds.). USENIX Association, 118\u2013127. http:\/\/static.usenix.org\/event\/woot11\/tech\/final_files\/Yamaguchi.pdf Fabian Yamaguchi, Felix \"FX\" Lindner, and Konrad Rieck. 2011. Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine Learning. In 5th USENIX Workshop on Offensive Technologies, WOOT\u201911, August 8, 2011, San Francisco, CA, USA, Proceedings, David Brumley and Michal Zalewski (Eds.). USENIX Association, 118\u2013127. http:\/\/static.usenix.org\/event\/woot11\/tech\/final_files\/Yamaguchi.pdf"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421003"},{"key":"e_1_3_2_1_51_1","volume-title":"Order Matters: Semantic-Aware Neural Networks for Binary Code Similarity Detection. In The Thirty-Fourth AAAI Conference on Artificial Intelligence, AAAI","author":"Yu Zeping","year":"2020","unstructured":"Zeping Yu , Rui Cao , Qiyi Tang , Sen Nie , Junzhou Huang , and Shi Wu . 2020 . Order Matters: Semantic-Aware Neural Networks for Binary Code Similarity Detection. In The Thirty-Fourth AAAI Conference on Artificial Intelligence, AAAI 2020, The Thirty-Second Innovative Applications of Artificial Intelligence Conference, IAAI 2020, The Tenth AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2020, New York, NY, USA, February 7-12, 2020. AAAI Press , 1145\u20131152. https:\/\/ojs.aaai.org\/index.php\/AAAI\/article\/view\/5466 Zeping Yu, Rui Cao, Qiyi Tang, Sen Nie, Junzhou Huang, and Shi Wu. 2020. Order Matters: Semantic-Aware Neural Networks for Binary Code Similarity Detection. In The Thirty-Fourth AAAI Conference on Artificial Intelligence, AAAI 2020, The Thirty-Second Innovative Applications of Artificial Intelligence Conference, IAAI 2020, The Tenth AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2020, New York, NY, USA, February 7-12, 2020. AAAI Press, 1145\u20131152. https:\/\/ojs.aaai.org\/index.php\/AAAI\/article\/view\/5466"},{"key":"e_1_3_2_1_52_1","first-page":"1199","article-title":"Approach of Leveraging Patches to Discover Unknown Vulnerabilities","author":"Zan LI","year":"2018","unstructured":"LI Zan , BIAN Pan , SHI Wen-Chang , and LIANG Bin . 2018 . Approach of Leveraging Patches to Discover Unknown Vulnerabilities . Journal of Software , 1199 \u2013 1212 . (in Chinese). LI Zan, BIAN Pan, SHI Wen-Chang, and LIANG Bin. 2018. Approach of Leveraging Patches to Discover Unknown Vulnerabilities. Journal of Software, 1199\u20131212. (in Chinese).","journal-title":"Journal of Software"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00284"}],"event":{"name":"ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual South Korea","acronym":"ISSTA '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534393","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3533767.3534393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:41Z","timestamp":1750272221000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534393"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":53,"alternative-id":["10.1145\/3533767.3534393","10.1145\/3533767"],"URL":"https:\/\/doi.org\/10.1145\/3533767.3534393","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]},"assertion":[{"value":"2022-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}