{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:46Z","timestamp":1750219786693,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T00:00:00Z","timestamp":1691107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the National Natural Science Foundation of China","award":["62076138"],"award-info":[{"award-number":["62076138"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,6]]},"DOI":"10.1145\/3580305.3599495","type":"proceedings-article","created":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T18:10:58Z","timestamp":1691172658000},"page":"2570-2581","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Self-Adaptive Perturbation Radii for Adversarial Training"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9473-8537","authenticated-orcid":false,"given":"Huimin","family":"Wu","sequence":"first","affiliation":[{"name":"Nanjing University of Information Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4895-4060","authenticated-orcid":false,"given":"Wanli","family":"Shi","sequence":"additional","affiliation":[{"name":"Nanjing University of Information Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0918-518X","authenticated-orcid":false,"given":"Chenkang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Nanjing University of Information Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8653-1117","authenticated-orcid":false,"given":"Bin","family":"Gu","sequence":"additional","affiliation":[{"name":"Nanjing University of Information Science and Technology &amp; Mohamed bin Zayed University of Artificial Intelligence, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2023,8,4]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Instance adaptive adversarial training: Improved accuracy tradeoffs in neural nets. arXiv preprint arXiv:1910.08051","author":"Balaji Yogesh","year":"2019","unstructured":"Yogesh Balaji , Tom Goldstein , Judy Hoffman , and Ruitong Huang . 2019. Instance adaptive adversarial training: Improved accuracy tradeoffs in neural nets. arXiv preprint arXiv:1910.08051 ( 2019 ). Yogesh Balaji, Tom Goldstein, Judy Hoffman, and Ruitong Huang. 2019. Instance adaptive adversarial training: Improved accuracy tradeoffs in neural nets. arXiv preprint arXiv:1910.08051 (2019)."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557234"},{"key":"e_1_3_2_2_3_1","first-page":"463","article-title":"Rademacher and Gaussian complexities: Risk bounds and structural results","volume":"3","author":"Bartlett Peter L","year":"2002","unstructured":"Peter L Bartlett and Shahar Mendelson . 2002 . Rademacher and Gaussian complexities: Risk bounds and structural results . Journal of Machine Learning Research , Vol. 3 , Nov (2002), 463 -- 482 . Peter L Bartlett and Shahar Mendelson. 2002. Rademacher and Gaussian complexities: Risk bounds and structural results. Journal of Machine Learning Research, Vol. 3, Nov (2002), 463--482.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_2_4_1","volume-title":"International Conference on Machine Learning. PMLR, 664--674","author":"Bietti Alberto","year":"2019","unstructured":"Alberto Bietti , Gr\u00e9goire Mialon , Dexiong Chen , and Julien Mairal . 2019 . A kernel perspective for regularizing deep neural networks . In International Conference on Machine Learning. PMLR, 664--674 . Alberto Bietti, Gr\u00e9goire Mialon, Dexiong Chen, and Julien Mairal. 2019. A kernel perspective for regularizing deep neural networks. In International Conference on Machine Learning. PMLR, 664--674."},{"key":"e_1_3_2_2_5_1","volume-title":"Davide Maiorca, Giorgio Fumera, Giorgio Giacinto, and Fabio Roli.","author":"Biggio Battista","year":"2014","unstructured":"Battista Biggio , Igino Corona , Blaine Nelson , Benjamin IP Rubinstein , Davide Maiorca, Giorgio Fumera, Giorgio Giacinto, and Fabio Roli. 2014 . Security evaluation of support vector machines in adversarial environments. In Support Vector Machines Applications. Springer , 105--153. Battista Biggio, Igino Corona, Blaine Nelson, Benjamin IP Rubinstein, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto, and Fabio Roli. 2014. Security evaluation of support vector machines in adversarial environments. In Support Vector Machines Applications. Springer, 105--153."},{"key":"e_1_3_2_2_6_1","volume-title":"International Conference on Machine Learning","author":"Biggio Battista","year":"2012","unstructured":"Battista Biggio , Blaine Nelson , and Pavel Laskov . 2012 . Poisoning attacks against support vector machines . International Conference on Machine Learning (2012), 1467--1474. Battista Biggio, Blaine Nelson, and Pavel Laskov. 2012. Poisoning attacks against support vector machines. International Conference on Machine Learning (2012), 1467--1474."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-2604-3_16"},{"key":"e_1_3_2_2_8_1","volume-title":"International Conference on Machine Learning. PMLR, 831--840","author":"Bubeck S\u00e9bastien","year":"2019","unstructured":"S\u00e9bastien Bubeck , Yin Tat Lee , Eric Price , and Ilya Razenshteyn . 2019 . Adversarial examples from computational constraints . In International Conference on Machine Learning. PMLR, 831--840 . S\u00e9bastien Bubeck, Yin Tat Lee, Eric Price, and Ilya Razenshteyn. 2019. Adversarial examples from computational constraints. In International Conference on Machine Learning. PMLR, 831--840."},{"key":"e_1_3_2_2_9_1","volume-title":"Towards Evaluating the Robustness of Neural Networks. IEEE Symposium on Security and Privacy","author":"Carlini Nicholas","year":"2017","unstructured":"Nicholas Carlini and David Wagner . 2017 . Towards Evaluating the Robustness of Neural Networks. IEEE Symposium on Security and Privacy (2017), 39--57. Nicholas Carlini and David Wagner. 2017. Towards Evaluating the Robustness of Neural Networks. IEEE Symposium on Security and Privacy (2017), 39--57."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"e_1_3_2_2_11_1","volume-title":"Cat: Customized adversarial training for improved robustness. arXiv preprint arXiv:2002.06789","author":"Cheng Minhao","year":"2020","unstructured":"Minhao Cheng , Qi Lei , Pin-Yu Chen , Inderjit Dhillon , and Cho-Jui Hsieh . 2020 . Cat: Customized adversarial training for improved robustness. arXiv preprint arXiv:2002.06789 (2020). Minhao Cheng, Qi Lei, Pin-Yu Chen, Inderjit Dhillon, and Cho-Jui Hsieh. 2020. Cat: Customized adversarial training for improved robustness. arXiv preprint arXiv:2002.06789 (2020)."},{"key":"e_1_3_2_2_12_1","volume-title":"International conference on machine learning. PMLR, 2206--2216","author":"Croce Francesco","year":"2020","unstructured":"Francesco Croce and Matthias Hein . 2020 . Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks . In International conference on machine learning. PMLR, 2206--2216 . Francesco Croce and Matthias Hein. 2020. Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In International conference on machine learning. PMLR, 2206--2216."},{"key":"e_1_3_2_2_13_1","unstructured":"Bo Dai Bo Xie Niao He Yingyu Liang Anant Raj Maria-Florina F Balcan and Le Song. 2014. Scalable kernel methods via doubly stochastic gradients. In Advances in Neural Information Processing Systems. 3041--3049.  Bo Dai Bo Xie Niao He Yingyu Liang Anant Raj Maria-Florina F Balcan and Le Song. 2014. Scalable kernel methods via doubly stochastic gradients. In Advances in Neural Information Processing Systems. 3041--3049."},{"key":"e_1_3_2_2_14_1","volume-title":"Kry Yik Chau Lui, and Ruitong Huang","author":"Ding Gavin Weiguang","year":"2018","unstructured":"Gavin Weiguang Ding , Yash Sharma , Kry Yik Chau Lui, and Ruitong Huang . 2018 . Mma training: Direct input space margin maximization through adversarial training. arXiv preprint arXiv:1812.02637 (2018). Gavin Weiguang Ding, Yash Sharma, Kry Yik Chau Lui, and Ruitong Huang. 2018. Mma training: Direct input space margin maximization through adversarial training. arXiv preprint arXiv:1812.02637 (2018)."},{"key":"e_1_3_2_2_15_1","volume-title":"Explaining and Harnessing Adversarial Examples. International Conference on Learning Representations","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow , Jonathon Shlens , and Christian Szegedy . 2014 . Explaining and Harnessing Adversarial Examples. International Conference on Learning Representations (2014). Ian Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and Harnessing Adversarial Examples. International Conference on Learning Representations (2014)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i6.20632"},{"key":"e_1_3_2_2_17_1","unstructured":"Hal Daum\u00e9 Iii. 2004. From Zero to Reproducing Kernel Hilbert Spaces in Twelve Pages or Less. http:\/\/legacydirs.umiacs.umd.edu\/ hal\/docs\/daume04rkhs.pdf.  Hal Daum\u00e9 Iii. 2004. From Zero to Reproducing Kernel Hilbert Spaces in Twelve Pages or Less. http:\/\/legacydirs.umiacs.umd.edu\/ hal\/docs\/daume04rkhs.pdf."},{"key":"e_1_3_2_2_18_1","volume-title":"Self-paced Curriculum Learning. In Twenty-Ninth AAAI Conference on Artificial Intelligence. 2694--2700","author":"Jiang Lu","year":"2015","unstructured":"Lu Jiang , Deyu Meng , Qian Zhao , Shiguang Shan , and Alexander G Hauptmann . 2015 . Self-paced Curriculum Learning. In Twenty-Ninth AAAI Conference on Artificial Intelligence. 2694--2700 . Lu Jiang, Deyu Meng, Qian Zhao, Shiguang Shan, and Alexander G Hauptmann. 2015. Self-paced Curriculum Learning. In Twenty-Ninth AAAI Conference on Artificial Intelligence. 2694--2700."},{"key":"e_1_3_2_2_19_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba . 2014 . Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014). Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_2_20_1","unstructured":"A. Krizhevsky and G. Hinton. 2009. Learning multiple layers of features from tiny images. Master's thesis Department of Computer Science University of Toronto (2009).  A. Krizhevsky and G. Hinton. 2009. Learning multiple layers of features from tiny images. Master's thesis Department of Computer Science University of Toronto (2009)."},{"key":"e_1_3_2_2_21_1","volume-title":"International Conference on Learning Representations","author":"Kurakin Alexey","year":"2017","unstructured":"Alexey Kurakin , Ian Goodfellow , Samy Bengio , and David Wagner . 2017 . Adversarial Machine Learning at Scale . International Conference on Learning Representations (2017). Alexey Kurakin, Ian Goodfellow, Samy Bengio, and David Wagner. 2017. Adversarial Machine Learning at Scale. International Conference on Learning Representations (2017)."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"volume-title":"Probability in Banach Spaces: isoperimetry and processes","author":"Ledoux Michel","key":"e_1_3_2_2_23_1","unstructured":"Michel Ledoux and Michel Talagrand . 1991. Probability in Banach Spaces: isoperimetry and processes . Vol. 23 . Springer Science & Business Media . Michel Ledoux and Michel Talagrand. 1991. Probability in Banach Spaces: isoperimetry and processes. Vol. 23. Springer Science & Business Media."},{"key":"e_1_3_2_2_24_1","volume-title":"International Conference on Learning Representations","author":"Madry Aleksander","year":"2017","unstructured":"Aleksander Madry , Aleksandar Makelov , Ludwig Schmidt , Dimitris Tsipras , and Adrian Vladu . 2017 . Towards Deep Learning Models Resistant to Adversarial Attacks . International Conference on Learning Representations (2017). Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2017. Towards Deep Learning Models Resistant to Adversarial Attacks. International Conference on Learning Representations (2017)."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2858821"},{"volume-title":"Foundations of machine learning","author":"Mohri Mehryar","key":"e_1_3_2_2_26_1","unstructured":"Mehryar Mohri , Afshin Rostamizadeh , and Ameet Talwalkar . 2018. Foundations of machine learning . MIT press . Mehryar Mohri, Afshin Rostamizadeh, and Ameet Talwalkar. 2018. Foundations of machine learning. MIT press."},{"key":"e_1_3_2_2_27_1","volume-title":"Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. arXiv preprint arXiv:1605.07277","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Patrick McDaniel , and Ian Goodfellow . 2016. Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. arXiv preprint arXiv:1605.07277 ( 2016 ). Nicolas Papernot, Patrick McDaniel, and Ian Goodfellow. 2016. Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. arXiv preprint arXiv:1605.07277 (2016)."},{"key":"e_1_3_2_2_28_1","volume-title":"Practical Black-Box Attacks against Machine Learning. Computer and Communications Security","author":"Papernot Nicolas","year":"2017","unstructured":"Nicolas Papernot , Patrick Mcdaniel , Ian Goodfellow , Somesh Jha , Z Berkay Celik , and Ananthram Swami . 2017. Practical Black-Box Attacks against Machine Learning. Computer and Communications Security ( 2017 ), 506--519. Nicolas Papernot, Patrick Mcdaniel, Ian Goodfellow, Somesh Jha, Z Berkay Celik, and Ananthram Swami. 2017. Practical Black-Box Attacks against Machine Learning. Computer and Communications Security (2017), 506--519."},{"key":"e_1_3_2_2_29_1","volume-title":"Adversarially Robust Generalization Requires More Data. Neural Information Processing Systems","author":"Schmidt L.","year":"2018","unstructured":"L. Schmidt , S. Santurkar , D. Tsipras , K. Talwar , and Aleksander Mdry . 2018. Adversarially Robust Generalization Requires More Data. Neural Information Processing Systems ( 2018 ). L. Schmidt, S. Santurkar, D. Tsipras, K. Talwar, and Aleksander Mdry. 2018. Adversarially Robust Generalization Requires More Data. Neural Information Processing Systems (2018)."},{"key":"e_1_3_2_2_30_1","volume-title":"Adversarial training for free! arXiv preprint arXiv:1904.12843","author":"Shafahi Ali","year":"2019","unstructured":"Ali Shafahi , Mahyar Najibi , Amin Ghiasi , Zheng Xu , John Dickerson , Christoph Studer , Larry S Davis , Gavin Taylor , and Tom Goldstein . 2019. Adversarial training for free! arXiv preprint arXiv:1904.12843 ( 2019 ). Ali Shafahi, Mahyar Najibi, Amin Ghiasi, Zheng Xu, John Dickerson, Christoph Studer, Larry S Davis, Gavin Taylor, and Tom Goldstein. 2019. Adversarial training for free! arXiv preprint arXiv:1904.12843 (2019)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i11.17158"},{"key":"e_1_3_2_2_32_1","volume-title":"Quadruply stochastic gradients for large scale nonlinear semi-supervised AUC optimization. arXiv preprint arXiv:1907.12416","author":"Shi Wanli","year":"2019","unstructured":"Wanli Shi , Bin Gu , Xiang Li , Xiang Geng , and Heng Huang . 2019. Quadruply stochastic gradients for large scale nonlinear semi-supervised AUC optimization. arXiv preprint arXiv:1907.12416 ( 2019 ). Wanli Shi, Bin Gu, Xiang Li, Xiang Geng, and Heng Huang. 2019. Quadruply stochastic gradients for large scale nonlinear semi-supervised AUC optimization. arXiv preprint arXiv:1907.12416 (2019)."},{"key":"e_1_3_2_2_33_1","volume-title":"International Conference on Learning Representations.","author":"Tsipras Dimitris","year":"2018","unstructured":"Dimitris Tsipras , Shibani Santurkar , Logan Engstrom , Alexander Turner , and Aleksander Madry . 2018 . Robustness May Be at Odds with Accuracy . In International Conference on Learning Representations. Dimitris Tsipras, Shibani Santurkar, Logan Engstrom, Alexander Turner, and Aleksander Madry. 2018. Robustness May Be at Odds with Accuracy. In International Conference on Learning Representations."},{"volume-title":"High-dimensional statistics: A non-asymptotic viewpoint","author":"Wainwright Martin J","key":"e_1_3_2_2_34_1","unstructured":"Martin J Wainwright . 2019. High-dimensional statistics: A non-asymptotic viewpoint . Vol. 48 . Cambridge University Press . Martin J Wainwright. 2019. High-dimensional statistics: A non-asymptotic viewpoint. Vol. 48. Cambridge University Press."},{"key":"e_1_3_2_2_35_1","volume-title":"On the Convergence and Robustness of Adversarial Training. In International Conference on Machine Learning.","author":"Wang Yisen","year":"2019","unstructured":"Yisen Wang , Xingjun Ma , James Bailey , Jinfeng Yi , Bowen Zhou , and Quanquan Gu . 2019 . On the Convergence and Robustness of Adversarial Training. In International Conference on Machine Learning. Yisen Wang, Xingjun Ma, James Bailey, Jinfeng Yi, Bowen Zhou, and Quanquan Gu. 2019. On the Convergence and Robustness of Adversarial Training. In International Conference on Machine Learning."},{"key":"e_1_3_2_2_36_1","volume-title":"Fast is better than free: Revisiting adversarial training. arXiv preprint arXiv:2001.03994","author":"Wong Eric","year":"2020","unstructured":"Eric Wong , Leslie Rice , and J Zico Kolter . 2020. Fast is better than free: Revisiting adversarial training. arXiv preprint arXiv:2001.03994 ( 2020 ). Eric Wong, Leslie Rice, and J Zico Kolter. 2020. Fast is better than free: Revisiting adversarial training. arXiv preprint arXiv:2001.03994 (2020)."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17237"},{"key":"e_1_3_2_2_38_1","volume-title":"International Workshop on Artificial Intelligence and Statistics. PMLR, 323--329","author":"Wyner Abraham J","year":"2003","unstructured":"Abraham J Wyner . 2003 . On boosting and the exponential loss . In International Workshop on Artificial Intelligence and Statistics. PMLR, 323--329 . Abraham J Wyner. 2003. On boosting and the exponential loss. In International Workshop on Artificial Intelligence and Statistics. PMLR, 323--329."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2010.11.016"},{"key":"e_1_3_2_2_40_1","volume-title":"European Conference on Artificial Intelligence","author":"Xiao Han","year":"2012","unstructured":"Han Xiao , Huang Xiao , and Claudia Eckert . 2012 . Adversarial label flips attack on support vector machines . European Conference on Artificial Intelligence (2012), 870--875. Han Xiao, Huang Xiao, and Claudia Eckert. 2012. Adversarial label flips attack on support vector machines. European Conference on Artificial Intelligence (2012), 870--875."},{"key":"e_1_3_2_2_41_1","unstructured":"Jiancong Xiao Yanbo Fan Ruoyu Sun and Zhi-Quan Luo. 2021. Adversarial Rademacher Complexity of Deep Neural Networks. (2021).  Jiancong Xiao Yanbo Fan Ruoyu Sun and Zhi-Quan Luo. 2021. Adversarial Rademacher Complexity of Deep Neural Networks. (2021)."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/1577069.1755834"},{"key":"e_1_3_2_2_43_1","volume-title":"International Conference on Machine Learning. PMLR, 7472--7482","author":"Zhang Hongyang","year":"2019","unstructured":"Hongyang Zhang , Yaodong Yu , Jiantao Jiao , Eric Xing , Laurent El Ghaoui , and Michael Jordan . 2019 . Theoretically principled trade-off between robustness and accuracy . In International Conference on Machine Learning. PMLR, 7472--7482 . Hongyang Zhang, Yaodong Yu, Jiantao Jiao, Eric Xing, Laurent El Ghaoui, and Michael Jordan. 2019. Theoretically principled trade-off between robustness and accuracy. In International Conference on Machine Learning. PMLR, 7472--7482."},{"key":"e_1_3_2_2_44_1","volume-title":"International Conference on Machine Learning. PMLR, 11278--11287","author":"Zhang Jingfeng","year":"2020","unstructured":"Jingfeng Zhang , Xilie Xu , Bo Han , Gang Niu , Lizhen Cui , Masashi Sugiyama , and Mohan Kankanhalli . 2020 . Attacks which do not kill training make adversarial learning stronger . In International Conference on Machine Learning. PMLR, 11278--11287 . Jingfeng Zhang, Xilie Xu, Bo Han, Gang Niu, Lizhen Cui, Masashi Sugiyama, and Mohan Kankanhalli. 2020. Attacks which do not kill training make adversarial learning stronger. In International Conference on Machine Learning. PMLR, 11278--11287."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339697"}],"event":{"name":"KDD '23: The 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Long Beach CA USA","acronym":"KDD '23"},"container-title":["Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599495","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3580305.3599495","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:52Z","timestamp":1750178272000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599495"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,4]]},"references-count":45,"alternative-id":["10.1145\/3580305.3599495","10.1145\/3580305"],"URL":"https:\/\/doi.org\/10.1145\/3580305.3599495","relation":{},"subject":[],"published":{"date-parts":[[2023,8,4]]},"assertion":[{"value":"2023-08-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}