{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:27Z","timestamp":1750219767783,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T00:00:00Z","timestamp":1686528000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,12]]},"DOI":"10.1145\/3593013.3594086","type":"proceedings-article","created":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T14:40:46Z","timestamp":1686580846000},"page":"1358-1368","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Can Querying for Bias Leak Protected Attributes? Achieving Privacy With Smooth Sensitivity"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-2681-3217","authenticated-orcid":false,"given":"Faisal","family":"Hamman","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Maryland, College Park, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4357-6574","authenticated-orcid":false,"given":"Jiahao","family":"Chen","sequence":"additional","affiliation":[{"name":"Responsible AI LLC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6500-2627","authenticated-orcid":false,"given":"Sanghamitra","family":"Dutta","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Maryland, College Park, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,6,12]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"The cost of a reductions approach to private fair optimization. arXiv preprint arXiv:1906.09613","author":"Alabi Daniel","year":"2019","unstructured":"Daniel Alabi. 2019. The cost of a reductions approach to private fair optimization. arXiv preprint arXiv:1906.09613 (2019)."},{"key":"e_1_3_2_2_2_1","first-page":"38747","article-title":"Beyond ADULT and COMPAS: Fair multi-class prediction via information projection","volume":"35","author":"Alghamdi Wael","year":"2022","unstructured":"Wael Alghamdi, Hsiang Hsu, Haewon Jeong, Hao Wang, Peter Michalak, Shahab Asoodeh, and Flavio Calmon. 2022. Beyond ADULT and COMPAS: Fair multi-class prediction via information projection. Advances in Neural Information Processing Systems 35 (2022), 38747\u201338760.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/3454287.3455674"},{"key":"e_1_3_2_2_4_1","volume-title":"A simple proof of the restricted isometry property for random matrices. Constructive approximation 28","author":"Baraniuk Richard","year":"2008","unstructured":"Richard Baraniuk, Mark Davenport, Ronald DeVore, and Michael Wakin. 2008. A simple proof of the restricted isometry property for random matrices. Constructive approximation 28 (2008), 253\u2013263."},{"key":"e_1_3_2_2_5_1","first-page":"671","article-title":"Big Data\u2019s Disparate Impact","volume":"104","author":"Barocas Solon","year":"2016","unstructured":"Solon Barocas and Andrew D. Selbst. 2016. Big Data\u2019s Disparate Impact. California Law Review 104 (2016), 671.","journal-title":"California Law Review"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/0049124118782533"},{"volume-title":"Privacy against statistical inference. In 2012 50th annual Allerton conference on communication, control, and computing (Allerton)","author":"Calmon Flavio","key":"e_1_3_2_2_7_1","unstructured":"Flavio Calmon and Nadia Fawaz. 2012. Privacy against statistical inference. In 2012 50th annual Allerton conference on communication, control, and computing (Allerton). IEEE, 1401\u20131408."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282765"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.858979"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.crma.2008.03.014"},{"key":"e_1_3_2_2_11_1","volume-title":"Stable signal recovery from incomplete and inaccurate measurements. Communications on Pure and Applied Mathematics: A Journal Issued by the Courant Institute of Mathematical Sciences 59, 8","author":"Candes Emmanuel J","year":"2006","unstructured":"Emmanuel J Candes, Justin K Romberg, and Terence Tao. 2006. Stable signal recovery from incomplete and inaccurate measurements. Communications on Pure and Applied Mathematics: A Journal Issued by the Courant Institute of Mathematical Sciences 59, 8 (2006), 1207\u20131223."},{"key":"e_1_3_2_2_12_1","volume-title":"Candes and Terence Tao","author":"Emmanuel","year":"2006","unstructured":"Emmanuel J. Candes and Terence Tao. 2006. Near-Optimal Signal Recovery From Random Projections: Universal Encoding Strategies?IEEE Transactions on Information Theory 52, 12 (2006), 5406\u20135425."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.914731"},{"key":"e_1_3_2_2_14_1","volume-title":"Fair lending needs explainable models for responsible recommendation. ArXiv abs\/1809.04684","author":"Chen Jiahao","year":"2018","unstructured":"Jiahao Chen. 2018. Fair lending needs explainable models for responsible recommendation. ArXiv abs\/1809.04684 (2018)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287594"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0894-0347-08-00610-3"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1162\/REST_a_00052"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3306618.3314236"},{"key":"e_1_3_2_2_19_1","first-page":"277","article-title":"Lessons Learned: Statistical Techniques and Fair Lending","volume":"11","author":"Courchane Marsha","year":"2000","unstructured":"Marsha Courchane, David Nebhut, and David Nickerson. 2000. Lessons Learned: Statistical Techniques and Fair Lending. Journal of Housing Research 11, 2 (2000), 277\u2013295.","journal-title":"Journal of Housing Research"},{"key":"e_1_3_2_2_20_1","volume-title":"An Overview of Privacy in Machine Learning. CoRR abs\/2005.08679","author":"Cristofaro Emiliano De","year":"2020","unstructured":"Emiliano De Cristofaro. 2020. An Overview of Privacy in Machine Learning. CoRR abs\/2005.08679 (2020). arXiv:2005.08679https:\/\/arxiv.org\/abs\/2005.08679"},{"key":"e_1_3_2_2_21_1","volume-title":"On the Compatibility of Privacy and Fairness. In Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization(UMAP\u201919 Adjunct). 309\u2013315","author":"Cummings Rachel","year":"2019","unstructured":"Rachel Cummings, Varun Gupta, Dhamma Kimpara, and Jamie Morgenstern. 2019. On the Compatibility of Privacy and Fairness. In Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization(UMAP\u201919 Adjunct). 309\u2013315."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134097"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383455.3422567"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.871582"},{"key":"e_1_3_2_2_25_1","unstructured":"Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5794"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3103206"},{"key":"e_1_3_2_2_28_1","volume-title":"International Conference on Machine Learning. PMLR, 2803\u20132813","author":"Dutta Sanghamitra","year":"2020","unstructured":"Sanghamitra Dutta, Dennis Wei, Hazar Yueksel, Pin-Yu Chen, Sijia Liu, and Kush Varshney. 2020. Is there a trade-off between fairness and accuracy? a perspective using mismatched hypothesis testing. In International Conference on Machine Learning. PMLR, 2803\u20132813."},{"key":"e_1_3_2_2_29_1","volume-title":"Differential Privacy. In Proceedings of the 33rd International Conference on Automata, Languages and Programming -","author":"Dwork Cynthia","year":"2006","unstructured":"Cynthia Dwork. 2006. Differential Privacy. In Proceedings of the 33rd International Conference on Automata, Languages and Programming - Volume Part II (Venice, Italy) (ICALP\u201906). Berlin, Heidelberg, 1\u201312."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090255"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_2_32_1","first-page":"3","article-title":"The Algorithmic Foundations of Differential Privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork and Aaron Roth. 2014. The Algorithmic Foundations of Differential Privacy. Found. Trends Theor. Comput. Sci. 9, 3\u20134 (aug 2014), 211\u2013407.","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783311"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_2_35_1","volume-title":"Mahdi Milani Fard, and Serena Wang","author":"Gupta Maya R.","year":"2018","unstructured":"Maya R. Gupta, Andrew Cotter, Mahdi Milani Fard, and Serena Wang. 2018. Proxy Fairness. CoRR abs\/1806.11212 (2018). arXiv:1806.11212http:\/\/arxiv.org\/abs\/1806.11212"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2945386"},{"key":"e_1_3_2_2_37_1","first-page":"3315","article-title":"Equality of Opportunity in Supervised Learning","volume":"29","author":"Hardt Moritz","year":"2016","unstructured":"Moritz Hardt, Eric Price, Eric Price, and Nati Srebro. 2016. Equality of Opportunity in Supervised Learning. In Advances in Neural Information Processing Systems, Vol. 29. 3315\u20133323.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2019.00131"},{"key":"e_1_3_2_2_39_1","volume-title":"Membership Inference Attacks on Machine Learning: A Survey. CoRR abs\/2103.07853","author":"Hu Hongsheng","year":"2021","unstructured":"Hongsheng Hu, Zoran Salcic, Gillian Dobbie, and Xuyun Zhang. 2021. Membership Inference Attacks on Machine Learning: A Survey. CoRR abs\/2103.07853 (2021). arXiv:2103.07853https:\/\/arxiv.org\/abs\/2103.07853"},{"key":"e_1_3_2_2_40_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning","volume":"97","author":"Jagielski Matthew","year":"2019","unstructured":"Matthew Jagielski, Michael Kearns, Jieming Mao, Alina Oprea, Aaron Roth, Saeed Sharifi Malvajerdi, and Jonathan Ullman. 2019. Differentially Private Fair Learning. In Proceedings of the 36th International Conference on Machine Learning, Vol. 97. PMLR, 3000\u20133008."},{"key":"e_1_3_2_2_41_1","volume-title":"Privately Measuring Demographic Performance Disparities in Federated Learning. arXiv preprint arXiv:2206.12183","author":"Juarez Marc","year":"2022","unstructured":"Marc Juarez and Aleksandra Korolova. 2022. \"You Can\u2019t Fix What You Can\u2019t Measure\": Privately Measuring Demographic Performance Disparities in Federated Learning. arXiv preprint arXiv:2206.12183 (2022)."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2020.3850"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2011.83"},{"key":"e_1_3_2_2_44_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning","volume":"80","author":"Kearns Michael","year":"2018","unstructured":"Michael Kearns, Seth Neel, Aaron Roth, and Zhiwei Steven Wu. 2018. Preventing Fairness Gerrymandering: Auditing and Learning for Subgroup Fairness. In Proceedings of the 35th International Conference on Machine Learning, Vol. 80. PMLR, 2564\u20132572."},{"key":"e_1_3_2_2_45_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning","volume":"80","author":"Kilbertus Niki","year":"2018","unstructured":"Niki Kilbertus, Adria Gascon, Matt Kusner, Michael Veale, Krishna Gummadi, and Adrian Weller. 2018. Blind Justice: Fairness with Encrypted Sensitive Attributes. In Proceedings of the 35th International Conference on Machine Learning, Vol. 80. PMLR, 2630\u20132639."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00121"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.14778\/3372716.3372723"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2018.3093"},{"key":"e_1_3_2_2_49_1","first-page":"8136","article-title":"Does mitigating ML's impact disparity require treatment disparity?","volume":"31","author":"Lipton Zachary","year":"2018","unstructured":"Zachary Lipton, Julian McAuley, and Alexandra Chouldechova. 2018. Does mitigating ML's impact disparity require treatment disparity?. In Advances in Neural Information Processing Systems, Vol. 31. 8136\u20138146.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_50_1","volume-title":"Article 31 (mar","author":"Liu Bo","year":"2021","unstructured":"Bo Liu, Ming Ding, Sina Shaham, Wenny Rahayu, Farhad Farokhi, and Zihuai Lin. 2021. When Machine Learning Meets Privacy: A Survey and Outlook. ACM Comput. Surv. 54, 2, Article 31 (mar 2021), 36 pages."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2845388"},{"key":"e_1_3_2_2_52_1","first-page":"169","article-title":"Statistical Properties of Sanitized Results from Differentially Private Laplace Mechanism with Univariate Bounding","volume":"12","author":"Liu Fang","year":"2019","unstructured":"Fang Liu. 2019. Statistical Properties of Sanitized Results from Differentially Private Laplace Mechanism with Univariate Bounding Constraints. Trans. Data Priv. 12 (2019), 169\u2013195.","journal-title":"Constraints. Trans. Data Priv."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.2990154"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1561\/9781680830095"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3457607"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250803"},{"key":"e_1_3_2_2_57_1","first-page":"2097","article-title":"Protecting privacy to prevent discrimination","volume":"56","author":"Roberts Jessica L","year":"2014","unstructured":"Jessica L Roberts. 2014. Protecting privacy to prevent discrimination. Wm. & Mary L. Rev. 56 (2014), 2097.","journal-title":"Wm. & Mary L. Rev."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.2307\/1072940"},{"key":"e_1_3_2_2_59_1","first-page":"14170","article-title":"Washing The Unwashable: On The (Im) possibility of Fairwashing Detection","volume":"35","author":"Shamsabadi Ali Shahin","year":"2022","unstructured":"Ali Shahin Shamsabadi, Mohammad Yaghini, Natalie Dullerud, Sierra Wyllie, Ulrich A\u00efvodji, Aisha Alaagib, S\u00e9bastien Gambs, and Nicolas Papernot. 2022. Washing The Unwashable: On The (Im) possibility of Fairwashing Detection. Advances in Neural Information Processing Systems 35 (2022), 14170\u201314182.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_60_1","unstructured":"Megan Smith Cecilia Munoz and D. J. Patil. 2016. Big Risks Big Opportunities: the Intersection of Big Data and Civil Rights. https:\/\/obamawhitehouse.archives.gov\/blog\/2016\/05\/04\/big-risks-big-opportunities-intersection-big-data-and-civil-rights"},{"key":"e_1_3_2_2_61_1","first-page":"19339","article-title":"No subclass left behind: Fine-grained robustness in coarse-grained classification problems","volume":"33","author":"Sohoni Nimit","year":"2020","unstructured":"Nimit Sohoni, Jared Dunnmon, Geoffrey Angus, Albert Gu, and Christopher R\u00e9. 2020. No subclass left behind: Fine-grained robustness in coarse-grained classification problems. Advances in Neural Information Processing Systems 33 (2020), 19339\u201319352.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313109"},{"key":"e_1_3_2_2_63_1","unstructured":"Kush R Varshney. 2022. Trustworthy Machine Learning. Independently Published."},{"key":"e_1_3_2_2_64_1","volume-title":"Fairer machine learning in the real world: Mitigating discrimination without collecting sensitive data","author":"Veale Michael","year":"2017","unstructured":"Michael Veale and Reuben Binns. 2017. Fairer machine learning in the real world: Mitigating discrimination without collecting sensitive data. Big Data & Society 4, 2 (2017)."},{"key":"e_1_3_2_2_65_1","volume-title":"Hyper-parameter Tuning for Fair Classification without Sensitive Attribute Access. arXiv preprint arXiv:2302.01385","author":"Veldanda Akshaj Kumar","year":"2023","unstructured":"Akshaj Kumar Veldanda, Ivan Brugere, Sanghamitra Dutta, Alan Mishler, and Siddharth Garg. 2023. Hyper-parameter Tuning for Fair Classification without Sensitive Attribute Access. arXiv preprint arXiv:2302.01385 (2023)."},{"key":"e_1_3_2_2_66_1","volume-title":"Fairness Definitions Explained. In 2018 IEEE\/ACM International Workshop on Software Fairness (FairWare)","author":"Verma Sahil","year":"2018","unstructured":"Sahil Verma and Julia Rubin. 2018. Fairness Definitions Explained. In 2018 IEEE\/ACM International Workshop on Software Fairness (FairWare) (Gothenburg, Sweden). IEEE, Piscataway, New Jersey, 1\u20137."},{"key":"e_1_3_2_2_67_1","unstructured":"Neil Vigdor. 2019. Apple Card Investigated After Gender Discrimination Complaints. https:\/\/www.nytimes.com\/2019\/11\/10\/business\/Apple-credit-card-investigation.html"},{"key":"e_1_3_2_2_68_1","volume-title":"Joy Rankin, Emily Rogers, Marcel Salas, and Sarah Myers West.","author":"Whittaker Meredith","year":"2019","unstructured":"Meredith Whittaker, Meryl Alper, Cynthia L. Bennett, Sara Hendren, Liz Kaziunas, Mara Mills, Meredith Ringel Morris, Joy Rankin, Emily Rogers, Marcel Salas, and Sarah Myers West. 2019. Disability, Bias, and AI. Technical Report MSR-TR-2019-38. AI Now Institute."},{"key":"e_1_3_2_2_69_1","volume-title":"Achieving Differential Privacy and Fairness in Logistic Regression. In Companion Proceedings of The 2019 World Wide Web Conference(WWW \u201919)","author":"Xu Depeng","year":"2019","unstructured":"Depeng Xu, Shuhan Yuan, and Xintao Wu. 2019. Achieving Differential Privacy and Fairness in Logistic Regression. In Companion Proceedings of The 2019 World Wide Web Conference(WWW \u201919). 594\u2013599."},{"key":"e_1_3_2_2_70_1","volume-title":"International Conference on Machine Learning. PMLR, 24929\u201324962","author":"Yan Tom","year":"2022","unstructured":"Tom Yan and Chicheng Zhang. 2022. Active fairness auditing. In International Conference on Machine Learning. PMLR, 24929\u201324962."},{"volume-title":"Proceedings of the 26th International Conference on World Wide Web(WWW \u201917)","author":"Zafar Muhammad Bilal","key":"e_1_3_2_2_71_1","unstructured":"Muhammad Bilal Zafar, Isabel Valera, Manuel Gomez Rodriguez, and Krishna P. Gummadi. 2017. Fairness Beyond Disparate Treatment & Disparate Impact: Learning Classification without Disparate Mistreatment. In Proceedings of the 26th International Conference on World Wide Web(WWW \u201917). 1171\u20131180."},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICINFA.2010.5512379"},{"key":"e_1_3_2_2_73_1","first-page":"563","article-title":"Emerging Uniform Structure of Disparate Treatment Discrimination Litigation","volume":"30","author":"Zimmer Michael J","year":"1995","unstructured":"Michael J Zimmer. 1995. Emerging Uniform Structure of Disparate Treatment Discrimination Litigation. Georgia Law Review 30 (1995), 563.","journal-title":"Georgia Law Review"}],"event":{"name":"FAccT '23: the 2023 ACM Conference on Fairness, Accountability, and Transparency","acronym":"FAccT '23","location":"Chicago IL USA"},"container-title":["2023 ACM Conference on Fairness Accountability and Transparency"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3593013.3594086","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3593013.3594086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:19Z","timestamp":1750178239000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3593013.3594086"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,12]]},"references-count":73,"alternative-id":["10.1145\/3593013.3594086","10.1145\/3593013"],"URL":"https:\/\/doi.org\/10.1145\/3593013.3594086","relation":{},"subject":[],"published":{"date-parts":[[2023,6,12]]},"assertion":[{"value":"2023-06-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}