{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T01:11:07Z","timestamp":1775783467691,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["390781972"],"award-info":[{"award-number":["390781972"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"name":"German Federal Ministry of Education and Research","award":["16KIS1165K"],"award-info":[{"award-number":["16KIS1165K"]}]},{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["101043410"],"award-info":[{"award-number":["101043410"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3605764.3623915","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:12:17Z","timestamp":1700568737000},"page":"149-160","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Broken Promises: Measuring Confounding Effects in Learning-based Vulnerability Discovery"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-2854-6419","authenticated-orcid":false,"given":"Erik","family":"Imgrund","sequence":"first","affiliation":[{"name":"SAP Security Research, Karlsruhe, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4337-4390","authenticated-orcid":false,"given":"Tom","family":"Ganz","sequence":"additional","affiliation":[{"name":"SAP Security Research, Karlsruhe, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8349-5912","authenticated-orcid":false,"given":"Martin","family":"H\u00e4rterich","sequence":"additional","affiliation":[{"name":"SAP Security Research, Karlsruhe, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0666-5025","authenticated-orcid":false,"given":"Lukas","family":"Pirch","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Berlin, Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9185-780X","authenticated-orcid":false,"given":"Niklas","family":"Risse","sequence":"additional","affiliation":[{"name":"Max Planck Institute, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5054-8758","authenticated-orcid":false,"given":"Konrad","family":"Rieck","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Berlin, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Learning to Represent Programs with Graphs. CoRR abs\/1711.00740","author":"Allamanis Miltiadis","year":"2017","unstructured":"Miltiadis Allamanis, Marc Brockschmidt, and Mahmoud Khademi. 2017. Learning to Represent Programs with Graphs. CoRR abs\/1711.00740 (2017). arXiv:1711.00740 http:\/\/arxiv.org\/abs\/1711.00740"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678706"},{"key":"e_1_3_2_1_3_1","volume-title":"Dos and Don'ts of Machine Learning in Computer Security. CoRR abs\/2010.09470","author":"Arp Daniel","year":"2020","unstructured":"Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, and Konrad Rieck. 2020. Dos and Don'ts of Machine Learning in Computer Security. CoRR abs\/2010.09470 (2020). arXiv:2010.09470 https:\/\/arxiv.org\/abs\/2010.09470"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3389\/fdata"},{"key":"e_1_3_2_1_5_1","volume-title":"Alice Shoshana Jakobovits, and Torsten Hoefler","author":"Ben-Nun Tal","year":"2018","unstructured":"Tal Ben-Nun, Alice Shoshana Jakobovits, and Torsten Hoefler. 2018. Neural Code Comprehension: A Learnable Representation of Code Semantics. CoRR abs\/1806.07336 (2018). arXiv:1806.07336 http:\/\/arxiv.org\/abs\/1806.07336"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106576"},{"key":"e_1_3_2_1_7_1","volume-title":"Deep learning based vulnerability detection: Are we there yet","author":"Chakraborty Saikat","year":"2021","unstructured":"Saikat Chakraborty, Rahul Krishna, Yangruibo Ding, and Baishakhi Ray. 2021. Deep learning based vulnerability detection: Are we there yet. IEEE Transactions on Software Engineering (2021)."},{"key":"e_1_3_2_1_8_1","volume-title":"Wagner","author":"Chen Yizheng","year":"2023","unstructured":"Yizheng Chen, Zhoujie Ding, Xinyun Chen, and David A. Wagner. 2023. DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection. ArXiv abs\/2304.00409 (2023)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3436877"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534371"},{"key":"e_1_3_2_1_11_1","volume-title":"Elliot Catt, Chris Cundy, Marcus Hutter, Shane Legg, Joel Veness, and Pedro A. Ortega.","author":"Del\u00e9tang Gr\u00e9goire","year":"2023","unstructured":"Gr\u00e9goire Del\u00e9tang, Anian Ruoss, Jordi Grau-Moya, Tim Genewein, Li Kevin Wenliang, Elliot Catt, Chris Cundy, Marcus Hutter, Shane Legg, Joel Veness, and Pedro A. Ortega. 2023. Neural Networks and the Chomsky Hierarchy. arXiv:2207.02098 [cs.LG]"},{"key":"e_1_3_2_1_12_1","volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. CoRR abs\/1810.04805","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. CoRR abs\/1810.04805 (2018). arXiv:1810.04805 http:\/\/arxiv.org\/abs\/1810.04805"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387501"},{"key":"e_1_3_2_1_14_1","volume-title":"Fast Graph Representation Learning with PyTorch Geometric. In ICLR Workshop on Representation Learning on Graphs and Manifolds.","author":"Fey Matthias","unstructured":"Matthias Fey and Jan E. Lenssen. 2019. Fast Graph Representation Learning with PyTorch Geometric. In ICLR Workshop on Representation Learning on Graphs and Manifolds."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3528452"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474369.3486866"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00038"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857720"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.25080\/TCWV9851"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/saner53432.2022.00070"},{"key":"e_1_3_2_1_21_1","unstructured":"Micha Horlboge Erwin Quiring Roland Meyer and Konrad Rieck. 2022. I still know it's you! On Challenges in Anonymizing Source Code. arXiv:2208.12553 [cs.CR]"},{"key":"e_1_3_2_1_22_1","unstructured":"Neil Houlsby Andrei Giurgiu Stanislaw Jastrzebski Bruna Morrone Quentin de Laroussilhe Andrea Gesmundo Mona Attariyan and Sylvain Gelly. 2019. Parameter-Efficient Transfer Learning for NLP. arXiv:1902.00751 [cs.LG]"},{"key":"e_1_3_2_1_23_1","unstructured":"Edward J. Hu Yelong Shen Phillip Wallis Zeyuan Allen-Zhu Yuanzhi Li Shean Wang Lu Wang and Weizhu Chen. 2021. LoRA: Low-Rank Adaptation of Large Language Models. arXiv:2106.09685 [cs.CL]"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3505244"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.62"},{"key":"e_1_3_2_1_26_1","volume-title":"Kipf and Max Welling","author":"Thomas","year":"2016","unstructured":"Thomas N. Kipf and Max Welling. 2016. Semi-Supervised Classification with Graph Convolutional Networks. CoRR abs\/1609.02907 (2016). arXiv:1609.02907 http:\/\/arxiv.org\/abs\/1609.02907"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-1030"},{"key":"e_1_3_2_1_28_1","volume-title":"Lyu","author":"Li Yaoxian","year":"2022","unstructured":"Yaoxian Li, Shiyi Qi, Cuiyun Gao, Yun Peng, David Lo, Zenglin Xu, and Michael R. Lyu. 2022. A Closer Look into Transformer-Based Code Intelligence Through Code Transformation: Challenges and Opportunities. https:\/\/doi.org\/10.48550\/ ARXIV.2207.04285"},{"key":"e_1_3_2_1_29_1","unstructured":"Yujia Li Daniel Tarlow Marc Brockschmidt and Richard Zemel. 2017. Gated Graph Sequence Neural Networks. arXiv:1511.05493 [cs.LG]"},{"key":"e_1_3_2_1_30_1","volume-title":"SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. CoRR abs\/1807.06756","author":"Li Zhen","year":"2018","unstructured":"Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen, Sujuan Wang, and Jialai Wang. 2018. SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. CoRR abs\/1807.06756 (2018). arXiv:1807.06756 http:\/\/arxiv.org\/abs\/1807.06756"},{"key":"e_1_3_2_1_31_1","volume-title":"VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. CoRR abs\/1801.01681","author":"Li Zhen","year":"2018","unstructured":"Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, and Yuyi Zhong. 2018. VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. CoRR abs\/1801.01681 (2018). arXiv:1801.01681 http:\/\/arxiv.org\/abs\/1801.01681"},{"key":"e_1_3_2_1_32_1","unstructured":"Tianyang Lin Yuxin Wang Xiangyang Liu and Xipeng Qiu. 2021. A Survey of Transformers. arXiv:2106.04554 [cs.LG]"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416591"},{"key":"e_1_3_2_1_34_1","unstructured":"Yinhan Liu Myle Ott Naman Goyal Jingfei Du Mandar Joshi Danqi Chen Omer Levy Mike Lewis Luke Zettlemoyer and Veselin Stoyanov. 2019. RoBERTa: A Robustly Optimized BERT Pretraining Approach. arXiv:1907.11692 [cs.CL]"},{"key":"e_1_3_2_1_35_1","unstructured":"Scott Lundberg and Su-In Lee. 2017. A Unified Approach to Interpreting Model Predictions. arXiv:1705.07874 [cs.AI]"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","unstructured":"Judea Pearl. 2009. Causality (2 ed.). Cambridge University Press. https:\/\/doi.org\/ 10.1017\/CBO9780511803161","DOI":"10.1017\/CBO9780511803161"},{"key":"e_1_3_2_1_37_1","unstructured":"Alec Radford Jeff Wu Rewon Child David Luan Dario Amodei and Ilya Sutskever. 2019. Language Models are Unsupervised Multitask Learners. (2019)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/3495724.3497454"},{"key":"e_1_3_2_1_39_1","volume-title":"McConley","author":"Russell Rebecca L.","year":"2018","unstructured":"Rebecca L. Russell, Louis Y. Kim, Lei H. Hamilton, Tomo Lazovich, Jacob A. Harer, Onur Ozdemir, Paul M. Ellingwood, and Marc W. McConley. 2018. Automated Vulnerability Detection in Source Code Using Deep Representation Learning. CoRR abs\/1807.04320 (2018). arXiv:1807.04320 http:\/\/arxiv.org\/abs\/1807.04320"},{"key":"e_1_3_2_1_40_1","volume-title":"Lin (Eds.)","volume":"33","author":"Sanchez-Lengeling Benjamin","year":"2020","unstructured":"Benjamin Sanchez-Lengeling, Jennifer Wei, Brian Lee, Emily Reif, Peter Wang, Wesley Qian, Kevin McCloskey, Lucy Colwell, and Alexander Wiltschko. 2020. Evaluating Attribution for Graph Neural Networks. In Advances in Neural Information Processing Systems, H. Larochelle, M. Ranzato, R. Hadsell, M. F. Balcan, and H. Lin (Eds.), Vol. 33. Curran Associates, Inc., 5898--5910. https:\/\/proceedings. neurips.cc\/paper\/2020\/file\/417fbbf2e9d5a28a855a11894b2e795a-Paper.pdf"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"e_1_3_2_1_42_1","volume-title":"Learning Important Features Through Propagating Activation Differences. CoRR abs\/1704.02685","author":"Shrikumar Avanti","year":"2017","unstructured":"Avanti Shrikumar, Peyton Greenside, and Anshul Kundaje. 2017. Learning Important Features Through Propagating Activation Differences. CoRR abs\/1704.02685 (2017). arXiv:1704.02685 http:\/\/arxiv.org\/abs\/1704.02685"},{"key":"e_1_3_2_1_43_1","volume-title":"International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=PH5PH9ZO_4","author":"Srikant Shashank","year":"2021","unstructured":"Shashank Srikant, Sijia Liu, Tamara Mitrovska, Shiyu Chang, Quanfu Fan, Gaoyuan Zhang, and Una-May O'Reilly. 2021. Generating Adversarial Computer Programs using Optimized Obfuscations. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=PH5PH9ZO_4"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539366"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417058"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3567985"},{"key":"e_1_3_2_1_47_1","volume-title":"A Survey on Explainable Artificial Intelligence (XAI): Towards Medical XAI. CoRR abs\/1907.07374","author":"Tjoa Erico","year":"2019","unstructured":"Erico Tjoa and Cuntai Guan. 2019. A Survey on Explainable Artificial Intelligence (XAI): Towards Medical XAI. CoRR abs\/1907.07374 (2019). arXiv:1907.07374 http:\/\/arxiv.org\/abs\/1907.07374"},{"key":"e_1_3_2_1_48_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N. Gomez Lukasz Kaiser and Illia Polosukhin. 2017. Attention Is All You Need. arXiv:1706.03762 [cs.CL]"},{"key":"e_1_3_2_1_49_1","volume-title":"Graph Attention Networks. International Conference on Learning Representations","author":"Petar","year":"2018","unstructured":"Petar Veli?kovi?, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Li\u00f2, and Yoshua Bengio. 2018. Graph Attention Networks. International Conference on Learning Representations (2018). https:\/\/openreview.net\/forum?id= rJXMpikCZ"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3044773"},{"key":"e_1_3_2_1_51_1","unstructured":"Wenhua Wang Yuqun Zhang Zhengran Zeng and Guandong Xu. 2020. TranS3:? A Transformer-based Framework for Unifying Code Summarization and Code Search. arXiv:2003.03238 [cs.SE]"},{"key":"e_1_3_2_1_52_1","volume-title":"Nghi DQ Bui, Junnan Li, and Steven CH Hoi.","author":"Wang Yue","year":"2023","unstructured":"Yue Wang, Hung Le, Akhilesh Deepak Gotmare, Nghi DQ Bui, Junnan Li, and Steven CH Hoi. 2023. Codet5: Open code large language models for code understanding and generation. arXiv preprint arXiv:2305.07922 (2023)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.685"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00018"},{"key":"e_1_3_2_1_55_1","unstructured":"Konrad Weiss and Christian Banse. 2022. A Language-Independent Analysis Platform for Source Code. arXiv:2203.08424 [cs.CR]"},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: System Demonstrations. Association for Computational Linguistics, Online, 38--45","author":"Wolf Thomas","year":"2020","unstructured":"Thomas Wolf, Lysandre Debut, Victor Sanh, Julien Chaumond, Clement Delangue, Anthony Moi, Pierric Cistac, Tim Rault, R\u00e9mi Louf, Morgan Funtowicz, Joe Davison, Sam Shleifer, Patrick von Platen, Clara Ma, Yacine Jernite, Julien Plu, Canwen Xu, Teven Le Scao, Sylvain Gugger, Mariama Drame, Quentin Lhoest, and Alexander M. Rush. 2020. Transformers: State-of-the-Art Natural Language Processing. In Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: System Demonstrations. Association for Computational Linguistics, Online, 38--45. https:\/\/www.aclweb.org\/anthology\/2020.emnlpdemos.6"},{"key":"e_1_3_2_1_57_1","volume-title":"Yu","author":"Wu Zonghan","year":"2019","unstructured":"Zonghan Wu, Shirui Pan, Fengwen Chen, Guodong Long, Chengqi Zhang, and Philip S. Yu. 2019. A Comprehensive Survey on Graph Neural Networks. CoRR abs\/1901.00596 (2019). arXiv:1901.00596 http:\/\/arxiv.org\/abs\/1901.00596"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.44"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510146"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428230"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111557"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511887"},{"key":"e_1_3_2_1_63_1","volume-title":"Generating Adversarial Examples for Holding Robustness of Source Code Processing Models. In AAAI Conference on Artificial Intelligence.","author":"Zhang Huangzhao","year":"2020","unstructured":"Huangzhao Zhang, Zhuo Li, Ge Li, L. Ma, Yang Liu, and Zhi Jin. 2020. Generating Adversarial Examples for Holding Robustness of Source Code Processing Models. In AAAI Conference on Artificial Intelligence."},{"key":"e_1_3_2_1_64_1","volume-title":"VulSPG: Vulnerability detection based on slice property graph representation learning. CoRR abs\/2109.02527","author":"Zheng Weining","year":"2021","unstructured":"Weining Zheng, Yuan Jiang, and Xiaohong Su. 2021. VulSPG: Vulnerability detection based on slice property graph representation learning. CoRR abs\/2109.02527 (2021). arXiv:2109.02527 https:\/\/arxiv.org\/abs\/2109.02527"},{"key":"e_1_3_2_1_65_1","volume-title":"Xiaoning Du, and Yang Liu.","author":"Zhou Yaqin","year":"2019","unstructured":"Yaqin Zhou, Shangqing Liu, Jing Kai Siow, Xiaoning Du, and Yang Liu. 2019. Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks. CoRR abs\/1909.03496 (2019). arXiv:1909.03496 http:\/\/arxiv.org\/abs\/1909.03496"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3429444"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605764.3623915","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605764.3623915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:35:58Z","timestamp":1755912958000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605764.3623915"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":66,"alternative-id":["10.1145\/3605764.3623915","10.1145\/3605764"],"URL":"https:\/\/doi.org\/10.1145\/3605764.3623915","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}