{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T01:13:19Z","timestamp":1755825199148,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589335.3648335","type":"proceedings-article","created":{"date-parts":[[2024,5,12]],"date-time":"2024-05-12T18:41:21Z","timestamp":1715539281000},"page":"364-373","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Robustness Analysis of E-Commerce Ranking System"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4458-7419","authenticated-orcid":false,"given":"Ningfei","family":"Wang","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5414-1046","authenticated-orcid":false,"given":"Yupin","family":"Huang","sequence":"additional","affiliation":[{"name":"Amazon, Palo Alto, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9124-016X","authenticated-orcid":false,"given":"Han","family":"Cheng","sequence":"additional","affiliation":[{"name":"Amazon, Palo Alto, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1188-2921","authenticated-orcid":false,"given":"Jiri","family":"Gesi","sequence":"additional","affiliation":[{"name":"Amazon, Palo Alto, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2565-5831","authenticated-orcid":false,"given":"Xiaojie","family":"Wang","sequence":"additional","affiliation":[{"name":"Amazon, Palo Alto, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8315-4612","authenticated-orcid":false,"given":"Vivek","family":"Mittal","sequence":"additional","affiliation":[{"name":"Amazon, Palo Alto, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Eric Arrington. 2019. WHAT IS LATENCY AND HOW MUCH IS IT COSTING YOU. (2019). https:\/\/akfpartners.com\/growth-blog\/what-is-latency"},{"key":"e_1_3_2_2_2_1","volume-title":"Recent advances in adversarial training for adversarial robustness. arXiv preprint arXiv:2102.01356","author":"Bai Tao","year":"2021","unstructured":"Tao Bai, Jinqi Luo, Jun Zhao, Bihan Wen, and Qian Wang. 2021. Recent advances in adversarial training for adversarial robustness. arXiv preprint arXiv:2102.01356 (2021)."},{"key":"e_1_3_2_2_3_1","volume-title":"SIGIR 2012 workshop on open source information retrieval. 17","author":"Bia\u0142ecki Andrzej","year":"2012","unstructured":"Andrzej Bia\u0142ecki, Robert Muir, Grant Ingersoll, and Lucid Imagination. 2012. Apache lucene 4. In SIGIR 2012 workshop on open source information retrieval. 17."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00076"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Nicholas Carlini and David Wagner. 2017. Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp). Ieee 39--57.","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646033"},{"key":"e_1_3_2_2_7_1","volume-title":"Defense of Adversarial Ranking Attack in Text Retrieval: Benchmark and Baseline via Detection. arXiv preprint arXiv:2307.16816","author":"Chen Xuanang","year":"2023","unstructured":"Xuanang Chen, Ben He, Le Sun, and Yingfei Sun. 2023. Defense of Adversarial Ranking Attack in Text Retrieval: Benchmark and Baseline via Detection. arXiv preprint arXiv:2307.16816 (2023)."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3531986"},{"key":"e_1_3_2_2_9_1","first-page":"21","article-title":"P--VALUE, A TRUE TEST OF STATISTICAL SIGNIFICANCE? A CAUTIONARY NOTE","volume":"6","author":"Dahiru Tukur","year":"2008","unstructured":"Tukur Dahiru. 2008. P--VALUE, A TRUE TEST OF STATISTICAL SIGNIFICANCE? A CAUTIONARY NOTE. Annals of Ibadan postgraduate medicine, Vol. 6, 1 (2008), 21--26.","journal-title":"Annals of Ibadan postgraduate medicine"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080832"},{"volume-title":"Learning PySpark","author":"Drabas Tomasz","key":"e_1_3_2_2_11_1","unstructured":"Tomasz Drabas and Denny Lee. 2017. Learning PySpark. Packt Publishing Ltd."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25540-4_25"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-012-9124-1"},{"key":"e_1_3_2_2_14_1","volume-title":"Adversarial robustness via label-smoothing. arXiv preprint arXiv:1906.11567","author":"Goibert Morgane","year":"2019","unstructured":"Morgane Goibert and Elvis Dohmatob. 2019. Adversarial robustness via label-smoothing. arXiv preprint arXiv:1906.11567 (2019)."},{"key":"e_1_3_2_2_15_1","volume-title":"Synthesizing Adversarial Negative Responses for Robust Response Ranking and Evaluation. Computational linguistics Association for Computational Linguistics","author":"Gupta Prakhar","year":"2021","unstructured":"Prakhar Gupta and Yulia Tsvetkov. 2021. Synthesizing Adversarial Negative Responses for Robust Response Ranking and Evaluation. Computational linguistics Association for Computational Linguistics (2021)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"Po-Sen Huang Robert Stanforth Johannes Welbl Chris Dyer Dani Yogatama Sven Gowal Krishnamurthy Dvijotham and Pushmeet Kohli. 2019. Achieving Verified Robustness to Symbol Substitutions via Interval Bound Propagation. In Empirical Methods in Natural Language Processing (EMNLP). 4081--4091.","DOI":"10.18653\/v1\/D19-1419"},{"key":"e_1_3_2_2_17_1","volume-title":"SIGIR 2023 Workshop on eCommerce. https:\/\/www.amazon.science\/publications\/behavior-driven-query-similarity-prediction-based-on-pre-trained-language-models-for-e-commerce-search","author":"Huang Yupin","year":"2023","unstructured":"Yupin Huang, Jiri Gesi, Xinyu Hong, Han Cheng, Kai Zhong, Vivek Mittal, Qingjun Cui, and Vamsi Salaka. 2023. Behavior-driven query similarity prediction based on pre-trained language models for e-commerce search. In SIGIR 2023 Workshop on eCommerce. https:\/\/www.amazon.science\/publications\/behavior-driven-query-similarity-prediction-based-on-pre-trained-language-models-for-e-commerce-search"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.115"},{"key":"e_1_3_2_2_19_1","volume-title":"ACM Transactions on Information Systems (TOIS)","volume":"20","author":"Jaana Kalervo","year":"2002","unstructured":"Kalervo J\"arvelin and Jaana Kek\"al\"ainen. 2002. Cumulated gain-based evaluation of IR techniques. ACM Transactions on Information Systems (TOIS), Vol. 20, 4 (2002), 422--446."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19--1423"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/30.1-2.81"},{"key":"e_1_3_2_2_22_1","first-page":"17148","article-title":"Distilling robust and non-robust features in adversarial examples by information bottleneck","volume":"34","author":"Kim Junho","year":"2021","unstructured":"Junho Kim, Byung-Kwan Lee, and Yong Man Ro. 2021. Distilling robust and non-robust features in adversarial examples by information bottleneck. Advances in Neural Information Processing Systems , Vol. 34 (2021), 17148--17159.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_23_1","volume-title":"International Conference on Machine Learning. PMLR, 3468--3477","author":"Ko Ching-Yun","year":"2019","unstructured":"Ching-Yun Ko, Zhaoyang Lyu, Lily Weng, Luca Daniel, Ngai Wong, and Dahua Lin. 2019. POPQORN: Quantifying robustness of recurrent neural networks. In International Conference on Machine Learning. PMLR, 3468--3477."},{"key":"e_1_3_2_2_24_1","volume-title":"Information retrieval on the web. ACM computing surveys (CSUR)","author":"Kobayashi Mei","year":"2000","unstructured":"Mei Kobayashi and Koichi Takeda. 2000. Information retrieval on the web. ACM computing surveys (CSUR), Vol. 32, 2 (2000), 144--173."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"Anis Koubaa. 2023. GPT-4 vs. GPT-3.5: A Concise Showdown. (2023).","DOI":"10.36227\/techrxiv.22312330.v2"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179303"},{"key":"e_1_3_2_2_27_1","volume-title":"Character-level white-box adversarial attacks against transformers via attachable subwords substitution. arXiv preprint arXiv:2210.17004","author":"Liu Aiwei","year":"2022","unstructured":"Aiwei Liu, Honghai Yu, Xuming Hu, Shu'ang Li, Li Lin, Fukun Ma, Yawen Yang, and Lijie Wen. 2022b. Character-level white-box adversarial attacks against transformers via attachable subwords substitution. arXiv preprint arXiv:2210.17004 (2022)."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560683"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6357"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3614793"},{"key":"e_1_3_2_2_31_1","volume-title":"2023 b. Topic-oriented Adversarial Attacks against Black-box Neural Ranking Models. arXiv preprint arXiv:2304.14867","author":"Liu Yu-An","year":"2023","unstructured":"Yu-An Liu, Ruqing Zhang, Jiafeng Guo, Maarten de Rijke, Wei Chen, Yixing Fan, and Xueqi Cheng. 2023 b. Topic-oriented Adversarial Attacks against Black-box Neural Ranking Models. arXiv preprint arXiv:2304.14867 (2023)."},{"key":"e_1_3_2_2_32_1","unstructured":"Zhiye Liu. 2023. ChatGPT Will Command More Than 30 000 Nvidia GPUs: Report. (2023). https:\/\/www.tomshardware.com\/news\/chatgpt-nvidia-30000-gpus"},{"key":"e_1_3_2_2_33_1","volume-title":"Qi Alfred Chen, and Chao Shen","author":"Ma Chen","year":"2024","unstructured":"Chen Ma, Ningfei Wang, Qi Alfred Chen, and Chao Shen. 2024. SlowTrack: Increasing the Latency of Camera-Based Perception in Autonomous Driving Using Adversarial Examples. In AAAI 2024."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.661"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"crossref","unstructured":"C. D. Manning P. Raghavan and H. Sch\u00fctze. 2008. Introduction to Information Retrieval. Cambridge University Press.","DOI":"10.1017\/CBO9780511809071"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-demos.16"},{"key":"e_1_3_2_2_37_1","volume-title":"Frequency-guided word substitutions for detecting textual adversarial examples. arXiv preprint arXiv:2004.05887","author":"Mozes Maximilian","year":"2020","unstructured":"Maximilian Mozes, Pontus Stenetorp, Bennett Kleinberg, and Lewis D Griffin. 2020. Frequency-guided word substitutions for detecting textual adversarial examples. arXiv preprint arXiv:2004.05887 (2020)."},{"key":"e_1_3_2_2_38_1","volume-title":"A guide to appropriate use of correlation coefficient in medical research. Malawi medical journal","author":"Mukaka Mavuto M","year":"2012","unstructured":"Mavuto M Mukaka. 2012. A guide to appropriate use of correlation coefficient in medical research. Malawi medical journal, Vol. 24, 3 (2012), 69--71."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/24.370218"},{"key":"e_1_3_2_2_40_1","unstructured":"Prolific. 2019. Definitive human data to deliver world-leading research and AI. (2019). https:\/\/www.prolific.co\/"},{"key":"e_1_3_2_2_41_1","volume-title":"International Conference on Machine Learning. PMLR, 7909--7919","author":"Raghunathan Aditi","year":"2020","unstructured":"Aditi Raghunathan, Sang Michael Xie, Fanny Yang, John Duchi, and Percy Liang. 2020. Understanding and Mitigating the Tradeoff between Robustness and Accuracy. In International Conference on Machine Learning. PMLR, 7909--7919."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2099-5_24"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.g7327"},{"key":"e_1_3_2_2_44_1","volume-title":"Sok: On the semantic ai security in autonomous driving. arXiv preprint arXiv:2203.05314","author":"Shen Junjie","year":"2022","unstructured":"Junjie Shen, Ningfei Wang, Ziwen Wan, Yunpeng Luo, Takami Sato, Zhisheng Hu, Xinyang Zhang, Shengjian Guo, Zhenyu Zhong, Kang Li, et al. 2022. Sok: On the semantic ai security in autonomous driving. arXiv preprint arXiv:2203.05314 (2022)."},{"key":"e_1_3_2_2_45_1","volume-title":"Robustness Verification for Transformers. In International Conference on Learning Representations.","author":"Shi Zhouxing","year":"2020","unstructured":"Zhouxing Shi, Huan Zhang, Kai-Wei Chang, Minlie Huang, and Cho-Jui Hsieh. 2020. Robustness Verification for Transformers. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-demo.35"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.344"},{"key":"e_1_3_2_2_48_1","first-page":"11821","article-title":"Towards efficient and effective adversarial training","volume":"34","author":"Sriramanan Gaurang","year":"2021","unstructured":"Gaurang Sriramanan, Sravanti Addepalli, Arya Baburaj, et al. 2021. Towards efficient and effective adversarial training. Advances in Neural Information Processing Systems , Vol. 34 (2021), 11821--11833.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3121050.3121106"},{"key":"e_1_3_2_2_50_1","volume-title":"Attention is all you need. Advances in neural information processing systems","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems , Vol. 30 (2017)."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41592-019-0686--2"},{"key":"e_1_3_2_2_52_1","volume-title":"Adversarial GLUE: A Multi-Task Benchmark for Robustness Evaluation of Language Models. In Thirty-fifth Conference on Neural Information Processing Systems Datasets and Benchmarks Track (Round 2).","author":"Wang Boxin","year":"2021","unstructured":"Boxin Wang, Chejian Xu, Shuohang Wang, Zhe Gan, Yu Cheng, Jianfeng Gao, Ahmed Hassan Awadallah, and Bo Li. 2021b. Adversarial GLUE: A Multi-Task Benchmark for Robustness Evaluation of Language Models. In Thirty-fifth Conference on Neural Information Processing Systems Datasets and Benchmarks Track (Round 2)."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00407"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.naacl-main.87"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911497"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539618.3591865"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2729559"},{"key":"e_1_3_2_2_58_1","volume-title":"Kdgan: Knowledge distillation with generative adversarial networks. Advances in neural information processing systems","author":"Wang Xiaojie","year":"2018","unstructured":"Xiaojie Wang, Rui Zhang, Yu Sun, and Jianzhong Qi. 2018. Kdgan: Knowledge distillation with generative adversarial networks. Advances in neural information processing systems , Vol. 31 (2018)."},{"key":"e_1_3_2_2_59_1","volume-title":"Adversarial distillation for learning with privileged provisions","author":"Wang Xiaojie","year":"2019","unstructured":"Xiaojie Wang, Rui Zhang, Yu Sun, and Jianzhong Qi. 2019. Adversarial distillation for learning with privileged provisions. IEEE transactions on pattern analysis and machine intelligence, Vol. 43, 3 (2019), 786--797."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539813.3545122"},{"key":"e_1_3_2_2_61_1","volume-title":"Conference on learning theory. PMLR, 25--54","author":"Wang Yining","year":"2013","unstructured":"Yining Wang, Liwei Wang, Yuanzhi Li, Di He, and Tie-Yan Liu. 2013. A theoretical analysis of NDCG type ranking measures. In Conference on learning theory. PMLR, 25--54."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576923"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-019-1211-x"},{"key":"e_1_3_2_2_64_1","first-page":"1129","article-title":"Automatic perturbation analysis for scalable certified robustness and beyond","volume":"33","author":"Xu Kaidi","year":"2020","unstructured":"Kaidi Xu, Zhouxing Shi, Huan Zhang, Yihan Wang, Kai-Wei Chang, Minlie Huang, Bhavya Kailkhura, Xue Lin, and Cho-Jui Hsieh. 2020b. Automatic perturbation analysis for scalable certified robustness and beyond. Advances in Neural Information Processing Systems , Vol. 33, 1129--1141.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_65_1","unstructured":"Weilin Xu David Evans and Yanjun Qi. 2017. Feature squeezing: Detecting adversarial examples in deep neural networks. NDSS."},{"key":"e_1_3_2_2_66_1","volume-title":"On the Certified Robustness for Ensemble Models and Beyond. In International Conference on Learning Representations.","author":"Yang Zhuolin","year":"2022","unstructured":"Zhuolin Yang, Linyi Li, Xiaojun Xu, Bhavya Kailkhura, Tao Xie, and Bo Li. 2022. On the Certified Robustness for Ensemble Models and Beyond. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.317"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i4.20303"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390334.1390435"},{"key":"e_1_3_2_2_70_1","volume-title":"Bridge the gap between cv and nlp! a gradient-based textual adversarial attack framework. arXiv preprint arXiv:2110.15317","author":"Yuan Lifan","year":"2021","unstructured":"Lifan Yuan, Yichi Zhang, Yangyi Chen, and Wei Wei. 2021. Bridge the gap between cv and nlp! a gradient-based textual adversarial attack framework. arXiv preprint arXiv:2110.15317 (2021)."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159730"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-demo.43"},{"key":"e_1_3_2_2_73_1","volume-title":"International conference on machine learning. PMLR, 7472--7482","author":"Zhang Hongyang","year":"2019","unstructured":"Hongyang Zhang, Yaodong Yu, Jiantao Jiao, Eric Xing, Laurent El Ghaoui, and Michael Jordan. 2019. Theoretically principled trade-off between robustness and accuracy. In International conference on machine learning. PMLR, 7472--7482."},{"volume-title":"29th $$USENIX$$ Security Symposium ($$USENIX$$ Security 20).","author":"Zhang Xinyang","key":"e_1_3_2_2_74_1","unstructured":"Xinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, and Ting Wang. 2020. Interpretable deep learning under fire. In 29th $$USENIX$$ Security Symposium ($$USENIX$$ Security 20)."},{"key":"e_1_3_2_2_75_1","volume-title":"FreeLB: Enhanced Adversarial Training for Natural Language Understanding. In International Conference on Learning Representations. io","author":"Zhu Chen","year":"2020","unstructured":"Chen Zhu, Yu Cheng, Zhe Gan, Siqi Sun, Tom Goldstein, and Jingjing Liu. 2020. FreeLB: Enhanced Adversarial Training for Natural Language Understanding. In International Conference on Learning Representations. io"}],"event":{"name":"WWW '24: The ACM Web Conference 2024","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Singapore Singapore","acronym":"WWW '24"},"container-title":["Companion Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589335.3648335","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589335.3648335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:39:18Z","timestamp":1755823158000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589335.3648335"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":75,"alternative-id":["10.1145\/3589335.3648335","10.1145\/3589335"],"URL":"https:\/\/doi.org\/10.1145\/3589335.3648335","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}