{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T06:32:34Z","timestamp":1770705154498,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":90,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Security Agency","doi-asserted-by":"publisher","award":["H98230-21-1-0324"],"award-info":[{"award-number":["H98230-21-1-0324"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2113880,2331908"],"award-info":[{"award-number":["2113880,2331908"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Microsoft AI Security"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589334.3645619","type":"proceedings-article","created":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T07:08:13Z","timestamp":1715152093000},"page":"1835-1846","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["The Matter of Captchas: An Analysis of a Brittle Security Feature on the Modern Web"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2328-6895","authenticated-orcid":false,"given":"Behzad","family":"Ousat","sequence":"first","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2175-5383","authenticated-orcid":false,"given":"Esteban","family":"Schafir","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7416-6092","authenticated-orcid":false,"given":"Duc C.","family":"Hoang","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0934-1664","authenticated-orcid":false,"given":"Mohammad Ali","family":"Tofighi","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4019-181X","authenticated-orcid":false,"given":"Cuong V.","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Durham University, Durham, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5311-451X","authenticated-orcid":false,"given":"Sajjad","family":"Arshad","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9823-3464","authenticated-orcid":false,"given":"Selcuk","family":"Uluagac","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7841-3409","authenticated-orcid":false,"given":"Amin","family":"Kharraz","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). 1129--1140","author":"Acar Gunes","year":"2013","unstructured":"Gunes Acar, Marc Juarez, Nick Nikiforakis, Claudia Diaz, Seda G\u00fcrses, Frank Piessens, and Bart Preneel. 2013. FPDetective: Dusting theWeb for Fingerprinters. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). 1129--1140."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91356-4_9"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991091"},{"key":"e_1_3_2_2_4_1","volume-title":"Proceedings of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). 135--159","author":"Azad Babak Amin","year":"2020","unstructured":"Babak Amin Azad, Oleksii Starov, Pierre Laperdrix, and Nick Nikiforakis. 2020. Web Runner 2049: Evaluating Third-Party Anti-Bot Services. In Proceedings of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). 135--159."},{"key":"e_1_3_2_2_5_1","volume-title":"Proceedings of the USENIX Conference on Offensive Technologies (WOOT).","author":"Bursztein Elie","year":"2014","unstructured":"Elie Bursztein, Jonathan Aigrain, Angelika Moscicki, and John C Mitchell. 2014. The End is Nigh: Generic Solving of Text-based CAPTCHAs. In Proceedings of the USENIX Conference on Offensive Technologies (WOOT)."},{"key":"e_1_3_2_2_6_1","unstructured":"Python Captcha. 2023. https:\/\/pypi.org\/project\/captcha\/."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449837"},{"key":"e_1_3_2_2_8_1","volume-title":"https:\/\/arxiv.org\/abs\/1901.01107. arXiv preprint","author":"Chenghui Shi","year":"2019","unstructured":"Shi Chenghui, Xu Xiaogang, Ji Shouling, Bu Kai, Chen Jianhai, Beyah Raheem, and Wang Ting. 2019. Adversarial CAPTCHAs. https:\/\/arxiv.org\/abs\/1901.01107. arXiv preprint (2019). arXiv:1901.01107"},{"key":"e_1_3_2_2_9_1","unstructured":"CloudFlare. 2022. What is bot traffic? | How to stop bot traffic? https:\/\/www. cloudflare.com\/learning\/bots\/what-is-bot-traffic\/. Accessed: 10-05--2022."},{"key":"e_1_3_2_2_10_1","unstructured":"Captcha Cracker. 2022. https:\/\/github.com\/chxj1992\/captcha_cracker. Accessed: 10-06--2022."},{"key":"e_1_3_2_2_11_1","unstructured":"DataDome. 2022. How to stop unwanted bot traffic to your website and servers. https:\/\/datadome.co\/bot-detection\/what-is-bot-traffic-stop-unwantedbot- traffic\/. Accessed: 10-05--2022."},{"key":"e_1_3_2_2_12_1","unstructured":"DataDome. 2022. State-of-the-Art Protection Against Automated Attacks. https: \/\/datadome.co\/. Accessed: 10-05--2022."},{"key":"e_1_3_2_2_13_1","unstructured":"Google Developers. 2022. reCAPTCHA v3. https:\/\/developers.google.com\/ recaptcha\/docs\/v3. Accessed: 09-05--2023."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417869"},{"key":"e_1_3_2_2_15_1","unstructured":"DrMahdiRezaei. 2022. Deep Captcha. https:\/\/github.com\/DrMahdiRezaei\/Deep- CAPTCHA. Accessed: 10-06--2022."},{"key":"e_1_3_2_2_16_1","unstructured":"Vojta Drmota. [n. d.]. Apify - Contact Details Scraper. https:\/\/apify.com\/vdrmota\/ contact-info-scraper."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20810-7_21"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2014.102"},{"key":"e_1_3_2_2_21_1","volume-title":"YOLOX: Exceeding YOLO Series in","author":"Ge Zheng","year":"2021","unstructured":"Zheng Ge, Songtao Liu, Feng Wang, Zeming Li, and Jian Sun. 2021. YOLOX: Exceeding YOLO Series in 2021. arXiv preprint arXiv:2107.08430 (2021)."},{"key":"e_1_3_2_2_22_1","volume-title":"An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Ghasemisharif Mohammad","year":"2018","unstructured":"Mohammad Ghasemisharif, Amrutha Ramesh, Stephen Checkoway, Chris Kanich, and Jason Polakis. 2018. O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 1475--1492. https:\/\/www.usenix.org\/conference\/ usenixsecurity18\/presentation\/ghasemisharif"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW54247.2022.9833872"},{"key":"e_1_3_2_2_24_1","unstructured":"Google. Accessed: 03--3--2023. Chrome UX Report. https:\/\/developer.chrome.com\/ docs\/crux\/."},{"key":"e_1_3_2_2_25_1","unstructured":"Google Developers. [n. d.]. reCAPTCHA API Documentation. https:\/\/developers. google.com\/recaptcha\/docs\/display."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477142"},{"key":"e_1_3_2_2_27_1","unstructured":"Ziji Guo. 2017. World-wide cloaking phishing websites detection. Ph.D. Dissertation."},{"key":"e_1_3_2_2_28_1","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). 1075--1086","author":"Haichang Gao","year":"2013","unstructured":"Gao Haichang, Wei Wang, Jiao Qi, Xuqin Wang, Xiyang Liu, and Jeff Yan. 2013. The robustness of hollow CAPTCHAs. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). 1075--1086."},{"key":"e_1_3_2_2_29_1","volume-title":"Proceedings of the Annual Network and Distributed System Security Symposium (NDSS).","author":"Haichang Gao","year":"2016","unstructured":"Gao Haichang, Jeff Yan, Cao Fang, Zhang Zhengya, Lei Lei, Tang Mengyun, Zhang Ping, Zhou Xin, Wang Xuqin, and Li Jiawei. 2016. A Simple Generic Attack on Text Captchas. In Proceedings of the Annual Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_2_30_1","unstructured":"hCaptcha. [n. d.]. hCaptcha Documentation. https:\/\/docs.hcaptcha.com\/."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3339267"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.50"},{"key":"e_1_3_2_2_33_1","unstructured":"JackonYang. 2022. Captcha Tensorflow. https:\/\/github.com\/JackonYang\/captchatensorflow. Accessed: 12-06--2022."},{"key":"e_1_3_2_2_34_1","unstructured":"JasonLiTW. 2022. Simple Railway Captcha Solver. https:\/\/github.com\/JasonLiTW\/ simple-railway-captcha-solver. Accessed: 10-06--2022."},{"key":"e_1_3_2_2_35_1","unstructured":"Jeff Posnick. Accessed: 08--22--2023. Preparing for AppCache removal. https: \/\/web.dev\/appcache-removal\/."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575366"},{"key":"e_1_3_2_2_37_1","unstructured":"johnnyzn. 2022. DW GAN. https:\/\/github.com\/johnnyzn\/DW-GAN. Accessed: 10-06--2022."},{"key":"e_1_3_2_2_38_1","unstructured":"Kasada Blog Post. Accessed: 08--25--2023. CAPTCHA is Obsolete Stop Asking Customers If They're Human. https:\/\/www.kasada.io\/captcha-is-obsolete\/."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00044"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-021-09608-4"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62105-0_7"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386040"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.57"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-09234-3_8"},{"key":"e_1_3_2_2_45_1","unstructured":"lllcho. 2022. Captcha Breaking. https:\/\/github.com\/lllcho\/CAPTCHA-breaking. Accessed: 10-06--2022."},{"key":"e_1_3_2_2_46_1","unstructured":"Microsoft Security. Accessed: 08--25--2023. What is two-factor authentication? https:\/\/www.microsoft.com\/en-us\/security\/business\/security-101\/what-istwo- factor-authentication-2fa."},{"key":"e_1_3_2_2_47_1","volume-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). 302--311","author":"Mirian Ariana","year":"2019","unstructured":"Ariana Mirian, Nikunj Bhagat, Caitlin Sadowski, Adrienne Porter Felt, Stefan Savage, and Geoffrey M. Voelker. 2019.Web Feature Deprecation: ACase Study for Chrome. In 2019 IEEE\/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). 302--311. https:\/\/doi.org\/10.1109\/ ICSE-SEIP.2019.00044"},{"key":"e_1_3_2_2_48_1","volume-title":"Proceedings of the USENIX Security Symposium (USENIX Security).","author":"Motoyama Marti","year":"2010","unstructured":"Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M Voelker, and Stefan Savage. 2010. Re:CAPTCHAs - Understanding CAPTCHASolving Services in an Economic Context. In Proceedings of the USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741090"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"e_1_3_2_2_51_1","unstructured":"nladuo. 2022. captcha-break. https:\/\/github.com\/nladuo\/captcha-break. Accessed: 12-06--2022."},{"key":"e_1_3_2_2_52_1","volume-title":"Deep-CAPTCHA: A Deep Learning Based CAPTCHA Solver for Vulnerability Assessment. Available at SSRN 3633354","author":"Nouri Zahra","year":"2020","unstructured":"Zahra Nouri and Mahdi Rezaei. 2020. Deep-CAPTCHA: A Deep Learning Based CAPTCHA Solver for Vulnerability Assessment. Available at SSRN 3633354 (2020)."},{"key":"e_1_3_2_2_53_1","unstructured":"NPM. 2023. CaptchaGen. https:\/\/www.npmjs.com\/package\/captchagen."},{"key":"e_1_3_2_2_54_1","unstructured":"Ob01. 2022. SimGAN-Captcha. https:\/\/github.com\/0b01\/SimGAN-Captcha. Accessed: 10-06--2022."},{"key":"e_1_3_2_2_55_1","unstructured":"OpenAI. 2022. Introducing chatgpt. https:\/\/openai.com\/blog\/chatgpt."},{"key":"e_1_3_2_2_56_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Oz Harun","year":"2023","unstructured":"Harun Oz, Ahmet Aris, Abbas Acar, G\u00fcliz Seray Tuncay, Leonardo Babun, and Selcuk Uluagac. 2023. R\u00f8B: Ransomware over Modern Web Browsers. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 7073--7090. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/ presentation\/oz"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3514229"},{"key":"e_1_3_2_2_58_1","article-title":"Algorithm border tracing vs scanline in blob detection for robot soccer vision system","volume":"11","author":"Pratomo Awang Hendrianto","year":"2019","unstructured":"Awang Hendrianto Pratomo, Anggit Ferdita Nugraha, Joko Siswantoro, and Mohammad Faidzul Nasruddin. 2019. Algorithm border tracing vs scanline in blob detection for robot soccer vision system. International Journal of Advances in Soft Computing & Its Applications 11, 3 (2019).","journal-title":"International Journal of Advances in Soft Computing & Its Applications"},{"key":"e_1_3_2_2_59_1","unstructured":"ptigas. 2022. Simple Captcha Solver. https:\/\/github.com\/ptigas\/simple-captchasolver. Accessed: 10-06--2022."},{"key":"e_1_3_2_2_60_1","unstructured":"Quantcast. 2023. Measure Audience Insights. https:\/\/www.quantcast.com\/ products\/measure-audience-insights\/."},{"key":"e_1_3_2_2_61_1","unstructured":"Captcha Recognize. 2022. https:\/\/github.com\/PatrickLib\/captcha_recognize. Accessed: 12-06--2022."},{"key":"e_1_3_2_2_62_1","unstructured":"Reid Tatoris Benedikt Wolters. Accessed: 08--25--2023. The end of the road for Cloudflare CAPTCHAs. https:\/\/blog.cloudflare.com\/end-cloudflare-captcha\/."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2015.23006"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.64"},{"key":"e_1_3_2_2_65_1","unstructured":"SimilarWeb. [n. d.]. https:\/\/www.similarweb.com\/."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052596"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.18"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3168681"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2821096"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2821096"},{"key":"e_1_3_2_2_71_1","unstructured":"The Chrome Project. Accessed: 08--22--2023. NPAPI deprecation: developer guide. https:\/\/www.chromium.org\/developers\/npapi-deprecation\/."},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_1"},{"key":"e_1_3_2_2_73_1","volume-title":"Evasion Techniques: User-Agent Blocking. https:\/\/info. phishlabs.com\/blog\/evasion-techniques-user-agent-blocking.","author":"George Trey","year":"2020","unstructured":"Trey George. 2020. Evasion Techniques: User-Agent Blocking. https:\/\/info. phishlabs.com\/blog\/evasion-techniques-user-agent-blocking."},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179317"},{"key":"e_1_3_2_2_75_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Trickel Erik","year":"2019","unstructured":"Erik Trickel, Oleksii Starov, Alexandros Kapravelos, Nick Nikiforakis, and Adam Doup\u00e9. 2019. Everyone is different: client-side diversification for defending against extension fingerprinting. In 28th USENIX Security Symposium (USENIX Security 19). 1679--1696."},{"key":"e_1_3_2_2_76_1","volume-title":"USENIX Security Symposium.","author":"Wang Ke Coby","unstructured":"Ke Coby Wang and Michael K. Reiter. 2019. Detecting stuffing of a user's credentials at her own accounts. In USENIX Security Symposium."},{"key":"e_1_3_2_2_77_1","unstructured":"Wikipedia contributors. 2021. Levenshtein distance. https:\/\/en.wikipedia.org\/ wiki\/Levenshtein_distance. Accessed: 05--22--2023."},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408671"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408671"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243754"},{"key":"e_1_3_2_2_81_1","unstructured":"ypwhs. 2022. captcha-break. https:\/\/github.com\/ypwhs\/captcha_break. Accessed: 12-06--2022."},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2022.103514"},{"key":"e_1_3_2_2_83_1","unstructured":"Zakir Durumeric. 2022. Cached Chrome Top Million Websites. https:\/\/github. com\/zakird\/crux-top-lists. Accessed: 04-04--2022."},{"key":"e_1_3_2_2_84_1","unstructured":"zakizhou. 2022. Captcha Solver library. https:\/\/github.com\/zakizhou\/CAPTCHA. Accessed: 10-06--2022."},{"key":"e_1_3_2_2_85_1","unstructured":"zer0h. Accessed: 03--1--2024. Alexa Top One Million Websites. https:\/\/github.com\/ zer0h\/top-1000000-domains."},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"crossref","unstructured":"Desheng Zhang Jianhui Zhang Youjun Bu Bo Chen Chongxin Sun Tianyu Wang et al. 2022. A Survey of Browser Fingerprint Research and Application. Wireless Communications and Mobile Computing 2022 (2022).","DOI":"10.1155\/2022\/3363335"},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3505226"},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00021"},{"key":"e_1_3_2_2_89_1","unstructured":"zhengwh. 2022. captcha cracking via a SVM Module. https:\/\/github.com\/ zhengwh\/captcha-svm. Accessed: 10-06--2022."},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950298"}],"event":{"name":"WWW '24: The ACM Web Conference 2024","location":"Singapore Singapore","acronym":"WWW '24","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645619","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589334.3645619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:33:09Z","timestamp":1755822789000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645619"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":90,"alternative-id":["10.1145\/3589334.3645619","10.1145\/3589334"],"URL":"https:\/\/doi.org\/10.1145\/3589334.3645619","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}