{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T15:14:18Z","timestamp":1772032458529,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,26]]},"DOI":"10.1145\/3545948.3545971","type":"proceedings-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T11:21:49Z","timestamp":1666005709000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients"],"prefix":"10.1145","author":[{"given":"Daehee","family":"Jang","sequence":"first","affiliation":[{"name":"Sungshin W. University, South Korea"}]},{"given":"Ammar","family":"Askar","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, United States of America"}]},{"given":"Insu","family":"Yun","sequence":"additional","affiliation":[{"name":"KAIST, South Korea"}]},{"given":"Stephen","family":"Tong","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, United States of America"}]},{"given":"Yiqin","family":"Cai","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, United States of America"}]},{"given":"Taesoo","family":"Kim","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 28th USENIX Security Symposium (Security)","unstructured":"2019. Proceedings of the 28th USENIX Security Symposium (Security) . Santa Clara, CA. 2019. Proceedings of the 28th USENIX Security Symposium (Security). Santa Clara, CA."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 40th IEEE Symposium on Security and Privacy (Oakland)","unstructured":"2019. Proceedings of the 40th IEEE Symposium on Security and Privacy (Oakland) . San Francisco, CA. 2019. Proceedings of the 40th IEEE Symposium on Security and Privacy (Oakland). San Francisco, CA."},{"key":"e_1_3_2_1_3_1","unstructured":"aiohttp. 2019. Async http client\/server framework. https:\/\/github.com\/aio-libs\/aiohttp.  aiohttp. 2019. Async http client\/server framework. https:\/\/github.com\/aio-libs\/aiohttp."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/581571.581573"},{"key":"e_1_3_2_1_5_1","unstructured":"Apple. 2016. Apple Security Bounty. https:\/\/developer.apple.com\/security-bounty\/.  Apple. 2016. Apple Security Bounty. https:\/\/developer.apple.com\/security-bounty\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409729"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00026"},{"key":"e_1_3_2_1_9_1","unstructured":"Bugcrowd. 2011. Bugcrowd: #1 Crowdsourced Cybersecurity Platform. https:\/\/www.bugcrowd.com\/.  Bugcrowd. 2011. Bugcrowd: #1 Crowdsourced Cybersecurity Platform. https:\/\/www.bugcrowd.com\/."},{"key":"e_1_3_2_1_10_1","volume-title":"MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing. arXiv preprint arXiv:2002.08568(2020).","author":"Chen Yaohui","year":"2020","unstructured":"Yaohui Chen , Mansour Ahmadi , Boyu Wang , Long Lu , 2020 . MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing. arXiv preprint arXiv:2002.08568(2020). Yaohui Chen, Mansour Ahmadi, Boyu Wang, Long Lu, 2020. MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing. arXiv preprint arXiv:2002.08568(2020)."},{"key":"e_1_3_2_1_11_1","volume-title":"Enfuzz: Ensemble fuzzing with seed synchronization among diverse fuzzers, See SEC [1].","author":"Chen Yuanliang","year":"2019","unstructured":"Yuanliang Chen , Yu Jiang , Fuchen Ma , Jie Liang , Mingzhe Wang , Chijin Zhou , Xun Jiao , and Zhuo Su . 2019 . Enfuzz: Ensemble fuzzing with seed synchronization among diverse fuzzers, See SEC [1]. Yuanliang Chen, Yu Jiang, Fuchen Ma, Jie Liang, Mingzhe Wang, Chijin Zhou, Xun Jiao, and Zhuo Su. 2019. Enfuzz: Ensemble fuzzing with seed synchronization among diverse fuzzers, See SEC [1]."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00002"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522735"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.15"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2004.1281562"},{"key":"e_1_3_2_1_16_1","unstructured":"Emscripten. 2015. Debugging with Sanitizers. https:\/\/emscripten.org\/docs\/debugging\/Sanitizers.html.  Emscripten. 2015. Debugging with Sanitizers. https:\/\/emscripten.org\/docs\/debugging\/Sanitizers.html."},{"key":"e_1_3_2_1_17_1","unstructured":"Dennis Fisher. 2015. Vupen Founder Launches New Zero-Day Acquisition Firm Zerodium.  Dennis Fisher. 2015. Vupen Founder Launches New Zero-Day Acquisition Firm Zerodium."},{"key":"e_1_3_2_1_18_1","unstructured":"FuzzBuzz. 2019. FuzzBuzz: Fuzzing on autopilot. https:\/\/fuzzbuzz.io\/.  FuzzBuzz. 2019. FuzzBuzz: Fuzzing on autopilot. https:\/\/fuzzbuzz.io\/."},{"key":"e_1_3_2_1_19_1","unstructured":"Fuzzit. 2019. Fuzzit - Continuous Fuzzing Made Simple. https:\/\/fuzzit.dev\/.  Fuzzit. 2019. Fuzzit - Continuous Fuzzing Made Simple. https:\/\/fuzzit.dev\/."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375607"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155573"},{"key":"e_1_3_2_1_22_1","volume-title":"RSA Conference. Springer, 425\u2013440","author":"Golle Philippe","year":"2001","unstructured":"Philippe Golle and Ilya Mironov . 2001 . Uncheatable distributed computations. In Cryptographers\u2019 Track at the RSA Conference. Springer, 425\u2013440 . Philippe Golle and Ilya Mironov. 2001. Uncheatable distributed computations. In Cryptographers\u2019 Track at the RSA Conference. Springer, 425\u2013440."},{"key":"e_1_3_2_1_23_1","unstructured":"Google. 2010. Google Vulnerability Reward Program. https:\/\/www.google.com\/about\/appsecurity\/reward-program\/.  Google. 2010. Google Vulnerability Reward Program. https:\/\/www.google.com\/about\/appsecurity\/reward-program\/."},{"key":"e_1_3_2_1_24_1","unstructured":"Google. 2019. ClusterFuzz: a scalable fuzzing infrastructure. https:\/\/github.com\/google\/clusterfuzz.  Google. 2019. ClusterFuzz: a scalable fuzzing infrastructure. https:\/\/github.com\/google\/clusterfuzz."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062363"},{"key":"e_1_3_2_1_26_1","unstructured":"hackerone. 2012. HackerOne. https:\/\/www.hackerone.com\/.  hackerone. 2012. HackerOne. https:\/\/www.hackerone.com\/."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 21st USENIX Security Symposium (Security)","author":"Holler Christian","year":"2012","unstructured":"Christian Holler , Kim Herzig , and Andreas Zeller . 2012 . Fuzzing with code fragments . In Proceedings of the 21st USENIX Security Symposium (Security) . Bellevue, WA. Christian Holler, Kim Herzig, and Andreas Zeller. 2012. Fuzzing with code fragments. In Proceedings of the 21st USENIX Security Symposium (Security). Bellevue, WA."},{"key":"e_1_3_2_1_28_1","volume-title":"Secure information networks","author":"Jakobsson Markus","unstructured":"Markus Jakobsson and Ari Juels . 1999. Proofs of work and bread pudding protocols . In Secure information networks . Springer , 258\u2013272. Markus Jakobsson and Ari Juels. 1999. Proofs of work and bread pudding protocols. In Secure information networks. Springer, 258\u2013272."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Thomas Kerber Aggelos Kiayias Markulf Kohlweiss and Vassilis Zikas. 2019. Ouroboros crypsinous: Privacy-preserving proof-of-stake See SP1 [2].  Thomas Kerber Aggelos Kiayias Markulf Kohlweiss and Vassilis Zikas. 2019. Ouroboros crypsinous: Privacy-preserving proof-of-stake See SP1 [2].","DOI":"10.1109\/SP.2019.00063"},{"key":"e_1_3_2_1_30_1","volume-title":"Reproducible Containers. In Proceedings of the 25th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)","author":"Navarro Leija Omar","year":"2020","unstructured":"Omar S.\u00a0 Navarro Leija , Kelly Shiptoski , Ryan\u00a0 G. Scott , Baojun Wang , Nicholas Renner , Ryan\u00a0 R. Newton , and Joseph Devietti . 2020 . Reproducible Containers. In Proceedings of the 25th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) . Lausanne, Switzerland. Omar S.\u00a0Navarro Leija, Kelly Shiptoski, Ryan\u00a0G. Scott, Baojun Wang, Nicholas Renner, Ryan\u00a0R. Newton, and Joseph Devietti. 2020. Reproducible Containers. In Proceedings of the 25th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). Lausanne, Switzerland."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5951\/mathteacmiddscho.21.9.0526"},{"key":"e_1_3_2_1_32_1","volume-title":"MOPT: Optimized Mutation Scheduling for Fuzzers, See SEC [1].","author":"Lyu Chenyang","year":"2019","unstructured":"Chenyang Lyu , Shouling Ji , Chao Zhang , Yuwei Li , Wei-Han Lee , Yu Song , and Raheem Beyah . 2019 . MOPT: Optimized Mutation Scheduling for Fuzzers, See SEC [1]. Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, and Raheem Beyah. 2019. MOPT: Optimized Mutation Scheduling for Fuzzers, See SEC [1]."},{"key":"e_1_3_2_1_33_1","unstructured":"Microsoft. 2016. Microsoft Security Risk Detection. https:\/\/www.microsoft.com\/en-us\/security-risk-detection\/.  Microsoft. 2016. Microsoft Security Risk Detection. https:\/\/www.microsoft.com\/en-us\/security-risk-detection\/."},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 18th USENIX Security Symposium (Security)","author":"Molnar David","year":"2009","unstructured":"David Molnar , Xue\u00a0Cong Li , and David\u00a0 A Wagner . 2009 . Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs .. In Proceedings of the 18th USENIX Security Symposium (Security) . Montreal, Canada. David Molnar, Xue\u00a0Cong Li, and David\u00a0A Wagner. 2009. Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs.. In Proceedings of the 18th USENIX Security Symposium (Security). Montreal, Canada."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508254"},{"key":"e_1_3_2_1_36_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/nakamotoinstitute.org\/bitcoin\/.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/nakamotoinstitute.org\/bitcoin\/. Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/nakamotoinstitute.org\/bitcoin\/."},{"key":"e_1_3_2_1_37_1","unstructured":"NVIDIA. 2020. Virus War Goes Viral: Folding@home Gets 1.5+ Exaflops to Fight COVID-19. https:\/\/blogs.nvidia.com\/blog\/2020\/04\/01\/foldingathome-exaflop-coronavirus\/.  NVIDIA. 2020. Virus War Goes Viral: Folding@home Gets 1.5+ Exaflops to Fight COVID-19. https:\/\/blogs.nvidia.com\/blog\/2020\/04\/01\/foldingathome-exaflop-coronavirus\/."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447852.3458720"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (Security)","author":"Osterlund Sebastian","year":"2020","unstructured":"Sebastian Osterlund , Kaveh Razavi , Herbert Bos , and Cristiano Giuffrida . 2020 . ParmeSan: Sanitizer-guided Greybox Fuzzing . In Proceedings of the 29th USENIX Security Symposium (Security) . Boston, MA. Sebastian Osterlund, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2020. ParmeSan: Sanitizer-guided Greybox Fuzzing. In Proceedings of the 29th USENIX Security Symposium (Security). Boston, MA."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"V. Pham M. Boehme A.\u00a0E. Santosa A.\u00a0R. Caciulescu and A. Roychoudhury. 2019. Smart Greybox Fuzzing. IEEE Transactions on Software Engineering(2019) 1\u20131.  V. Pham M. Boehme A.\u00a0E. Santosa A.\u00a0R. Caciulescu and A. Roychoudhury. 2019. Smart Greybox Fuzzing. IEEE Transactions on Software Engineering(2019) 1\u20131.","DOI":"10.1109\/TSE.2019.2941681"},{"key":"e_1_3_2_1_41_1","unstructured":"Mohit Rajpal William Blum and Rishabh Singh. 2017. Not all bytes are equal: Neural byte sieve for fuzzing. arXiv preprint arXiv:1711.04596(2017).  Mohit Rajpal William Blum and Rishabh Singh. 2017. Not all bytes are equal: Neural byte sieve for fuzzing. arXiv preprint arXiv:1711.04596(2017)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236084"},{"key":"e_1_3_2_1_43_1","unstructured":"Fan Sang Daehee Jang Ming-Wei Shih and Taesoo Kim. 2019. P2FAAS: Toward Privacy-Preserving Fuzzing as a Service. arXiv preprint arXiv:1909.11164(2019).  Fan Sang Daehee Jang Ming-Wei Shih and Taesoo Kim. 2019. P2FAAS: Toward Privacy-Preserving Fuzzing as a Service. arXiv preprint arXiv:1909.11164(2019)."},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the 26th USENIX Security Symposium (Security)","author":"Serebryany Kostya","year":"2017","unstructured":"Kostya Serebryany . 2017 . OSS-Fuzz - Google\u2019s continuous fuzzing service for open source software . In Proceedings of the 26th USENIX Security Symposium (Security) . Vancouver, Canada. Kostya Serebryany. 2017. OSS-Fuzz - Google\u2019s continuous fuzzing service for open source software. In Proceedings of the 26th USENIX Security Symposium (Security). Vancouver, Canada."},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the 2012 USENIX Annual Technical Conference (ATC)","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany , Derek Bruening , Alexander Potapenko , and Dmitriy Vyukov . 2012 . AddressSanitizer: A fast address sanity checker . In Proceedings of the 2012 USENIX Annual Technical Conference (ATC) . Boston, MA. Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitriy Vyukov. 2012. AddressSanitizer: A fast address sanity checker. In Proceedings of the 2012 USENIX Annual Technical Conference (ATC). Boston, MA."},{"key":"e_1_3_2_1_46_1","volume-title":"NEUZZ: Efficient fuzzing with neural program smoothing, See SP1 [2].","author":"She Dongdong","year":"2019","unstructured":"Dongdong She , Kexin Pei , Dave Epstein , Junfeng Yang , Baishakhi Ray , and Suman Jana . 2019 . NEUZZ: Efficient fuzzing with neural program smoothing, See SP1 [2]. Dongdong She, Kexin Pei, Dave Epstein, Junfeng Yang, Baishakhi Ray, and Suman Jana. 2019. NEUZZ: Efficient fuzzing with neural program smoothing, See SP1 [2]."},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the 2019 Annual Network and Distributed System Security Symposium (NDSS)","author":"Shen Shiqi","year":"2019","unstructured":"Shiqi Shen , Shweta Shinde , Soundarya Ramesh , Abhik Roychoudhury , and Prateek Saxena . 2019 . Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints .. In Proceedings of the 2019 Annual Network and Distributed System Security Symposium (NDSS) . San Diego, CA. Shiqi Shen, Shweta Shinde, Soundarya Ramesh, Abhik Roychoudhury, and Prateek Saxena. 2019. Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints.. In Proceedings of the 2019 Annual Network and Distributed System Security Symposium (NDSS). San Diego, CA."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134105"},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the 2004 USENIX Annual Technical Conference (ATC)","author":"Srinivasan M","year":"2004","unstructured":"Sudarshan\u00a0 M Srinivasan , Srikanth Kandula , Christopher\u00a0 R Andrews , Yuanyuan Zhou , 2004 . Flashback: A lightweight extension for rollback and deterministic replay for software debugging . In Proceedings of the 2004 USENIX Annual Technical Conference (ATC) . Boston, MA. Sudarshan\u00a0M Srinivasan, Srikanth Kandula, Christopher\u00a0R Andrews, Yuanyuan Zhou, 2004. Flashback: A lightweight extension for rollback and deterministic replay for software debugging. In Proceedings of the 2004 USENIX Annual Technical Conference (ATC). Boston, MA."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"e_1_3_2_1_51_1","volume-title":"The Day DES Died","author":"De\u00a0Zande Paul Van","unstructured":"Paul Van De\u00a0Zande . 2001. The Day DES Died . SANS Institute , Jul . Paul Van De\u00a0Zande. 2001. The Day DES Died. SANS Institute, Jul."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238200"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.23"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516736"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134046"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905744"},{"key":"e_1_3_2_1_57_1","volume-title":"Proceedings of the 27th USENIX Security Symposium (Security)","author":"Yun Insu","year":"2018","unstructured":"Insu Yun , Sangho Lee , Meng Xu , Yeongjin Jang , and Taesoo Kim . 2018 . QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing . In Proceedings of the 27th USENIX Security Symposium (Security) . Baltimore, MD. Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, and Taesoo Kim. 2018. QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In Proceedings of the 27th USENIX Security Symposium (Security). Baltimore, MD."},{"key":"e_1_3_2_1_58_1","unstructured":"Zero Day Initiative. 2007. Welcome To Pwn2Own 2020 - The schedule and live results. https:\/\/www.thezdi.com\/blog\/2020\/3\/17\/welcome-to-pwn2own-2020-the-schedule-and-live-results.  Zero Day Initiative. 2007. Welcome To Pwn2Own 2020 - The schedule and live results. https:\/\/www.thezdi.com\/blog\/2020\/3\/17\/welcome-to-pwn2own-2020-the-schedule-and-live-results."}],"event":{"name":"RAID 2022: 25th International Symposium on Research in Attacks, Intrusions and Defenses","location":"Limassol Cyprus","acronym":"RAID 2022"},"container-title":["Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545971","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545948.3545971","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:17Z","timestamp":1750188617000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545971"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":58,"alternative-id":["10.1145\/3545948.3545971","10.1145\/3545948"],"URL":"https:\/\/doi.org\/10.1145\/3545948.3545971","relation":{},"subject":[],"published":{"date-parts":[[2022,10,26]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}