{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:23:56Z","timestamp":1773840236580,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3605764.3623919","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:12:17Z","timestamp":1700568737000},"page":"209-220","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9467-1523","authenticated-orcid":false,"given":"Mario","family":"D'Onghia","sequence":"first","affiliation":[{"name":"Politecnico di Milano, Milan, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8016-7398","authenticated-orcid":false,"given":"Federico","family":"Di Cesare","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Milan, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8770-9773","authenticated-orcid":false,"given":"Luigi","family":"Gallo","sequence":"additional","affiliation":[{"name":"TIM S.p.A., Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8284-6074","authenticated-orcid":false,"given":"Michele","family":"Carminati","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Milan, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0925-2306","authenticated-orcid":false,"given":"Mario","family":"Polino","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Milan, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4710-5283","authenticated-orcid":false,"given":"Stefano","family":"Zanero","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Milan, Italy"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"https:\/\/www.avast.com\/technology\/ai-and-machine-learning. [Online","year":"2022","unstructured":"2022. Avast. https:\/\/www.avast.com\/technology\/ai-and-machine-learning. [Online; accessed Dec 2nd, 2022]."},{"key":"e_1_3_2_2_2_1","unstructured":"2022. Chocolatey. https:\/\/chocolatey.org\/."},{"key":"e_1_3_2_2_3_1","volume-title":"https:\/\/www.eset.com\/uk\/home\/nod32-antivirus\/. [Online","year":"2022","unstructured":"2022. Eset. https:\/\/www.eset.com\/uk\/home\/nod32-antivirus\/. [Online; accessed Dec 2nd, 2022]"},{"key":"e_1_3_2_2_4_1","volume-title":"https:\/\/www.kaspersky.com\/enterprise-security\/wiki-section\/ products\/machine-learning-in-cybersecurity. [Online","year":"2022","unstructured":"2022. Kaspersky. https:\/\/www.kaspersky.com\/enterprise-security\/wiki-section\/ products\/machine-learning-in-cybersecurity. [Online; accessed Dec 2nd, 2022]."},{"key":"e_1_3_2_2_5_1","unstructured":"2022. VirusShare. https:\/\/virusshare.com\/."},{"key":"e_1_3_2_2_6_1","unstructured":"2022. VirusTotal. https:\/\/virustotal.com\/."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2004.1342667"},{"key":"e_1_3_2_2_8_1","volume-title":"Network and Distributed Systems Security (NDSS) Symposium","author":"Aghakhani Hojjat","year":"2020","unstructured":"Hojjat Aghakhani, Fabio Gritti, Francesco Mecca, Martina Lindorfer, Stefano Ortolani, Davide Balzarotti, Giovanni Vigna, and Christopher Kruegel. 2020. When malware is Packin'Heat; limits of machine learning classifiers based on static analysis features. In Network and Distributed Systems Security (NDSS) Symposium 2020."},{"key":"e_1_3_2_2_9_1","volume-title":"Evading machine learning malware detection. black Hat 2017","author":"Anderson Hyrum S","year":"2017","unstructured":"Hyrum S Anderson, Anant Kharkar, Bobby Filar, and Phil Roth. 2017. Evading machine learning malware detection. black Hat 2017 (2017)."},{"key":"e_1_3_2_2_10_1","volume-title":"Ember: an open dataset for training static pe malware machine learning models. arXiv preprint arXiv:1804.04637","author":"Anderson Hyrum S","year":"2018","unstructured":"Hyrum S Anderson and Phil Roth. 2018. Ember: an open dataset for training static pe malware machine learning models. arXiv preprint arXiv:1804.04637 (2018)."},{"key":"e_1_3_2_2_11_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Arp Daniel","year":"2022","unstructured":"Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, and Konrad Rieck. 2022. Dos and Don'ts of Machine Learning in Computer Security. In 31st USENIX Security Symposium (USENIX Security 22). 3971--3988."},{"key":"e_1_3_2_2_12_1","first-page":"23","article-title":"Drebin: Effective and explainable detection of android malware in your pocket","volume":"14","author":"Arp Daniel","year":"2014","unstructured":"Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck, and CERT Siemens. 2014. Drebin: Effective and explainable detection of android malware in your pocket.. In Ndss, Vol. 14. 23--26.","journal-title":"Ndss"},{"key":"e_1_3_2_2_13_1","volume-title":"Fabio Di Troia, and Mark Stamp","author":"Bhodia Niket","year":"2019","unstructured":"Niket Bhodia, Pratikkumar Prajapati, Fabio Di Troia, and Mark Stamp. 2019. Transfer learning for image-based malware classification. arXiv preprint arXiv:1903.11551 (2019)."},{"key":"e_1_3_2_2_14_1","unstructured":"Brittain Blake. 2022. Apple lawsuit says 'stealth' startup Rivos poached engineers to steal secrets. https:\/\/www.reuters.com\/legal\/litigation\/apple-lawsuit-saysstealth-startup-rivos-poached-engineers-steal-secrets-2022-05-02\/. [Online; accessed Dec 2nd 2022]."},{"key":"e_1_3_2_2_15_1","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2020","author":"Carminati Michele","year":"2020","unstructured":"Michele Carminati, Luca Santini, Mario Polino, and Stefano Zanero. 2020. Evasion Attacks against Banking Fraud Detection Systems. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2020, San Sebastian, Spain, October 14--15, 2020, Manuel Egele and Leyla Bilge (Eds.). USENIX Association, 285--300. https:\/\/www.usenix.org\/conference\/raid2020\/presentation\/ carminati"},{"key":"e_1_3_2_2_16_1","volume-title":"Detecting backdoor attacks on deep neural networks by activation clustering. arXiv preprint arXiv:1811.03728","author":"Chen Bryant","year":"2018","unstructured":"Bryant Chen, Wilka Carvalho, Nathalie Baracaldo, Heiko Ludwig, Benjamin Edwards, Taesung Lee, Ian Molloy, and Biplav Srivastava. 2018. Detecting backdoor attacks on deep neural networks by activation clustering. arXiv preprint arXiv:1811.03728 (2018)."},{"key":"e_1_3_2_2_17_1","volume-title":"Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526","author":"Chen Xinyun","year":"2017","unstructured":"Xinyun Chen, Chang Liu, Bo Li, Kimberly Lu, and Dawn Song. 2017. Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526 (2017)."},{"key":"e_1_3_2_2_18_1","volume-title":"ICML 2021 Workshop on Adversarial Machine Learning.","author":"Chen Xiaoyi","year":"2021","unstructured":"Xiaoyi Chen, Ahmed Salem, Michael Backes, Shiqing Ma, and Yang Zhang. 2021. Badnl: Backdoor attacks against nlp models. In ICML 2021 Workshop on Adversarial Machine Learning."},{"key":"e_1_3_2_2_19_1","volume-title":"Michele Carminati, Mario Polino, and Stefano Zanero.","author":"D'Onghia Mario","year":"2022","unstructured":"Mario D'Onghia, Matteo Salvadore, Benedetto Maria Nespoli, Michele Carminati, Mario Polino, and Stefano Zanero. 2022. Ap\u00edcula: Static Detection of API Calls in Generic Streams of Bytes. Computers & Security (2022), 102775."},{"key":"e_1_3_2_2_20_1","volume-title":"Muhammad Taqi Raza, and Hsinchun Chen","author":"Ebrahimi Mohammadreza","year":"2020","unstructured":"Mohammadreza Ebrahimi, Ning Zhang, James Hu, Muhammad Taqi Raza, and Hsinchun Chen. 2020. Binary black-box evasion attacks against deep learningbased static malware detectors with adversarial byte-level language model. arXiv preprint arXiv:2012.07994 (2020)."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427660"},{"key":"e_1_3_2_2_22_1","first-page":"1","article-title":"Metamorphic malware detection using control flow graph mining","volume":"11","author":"Eskandari Mojtaba","year":"2011","unstructured":"Mojtaba Eskandari and Sattar Hashemi. 2011. Metamorphic malware detection using control flow graph mining. Int. J. Comput. Sci. Netw. Secur 11, 12 (2011), 1--6.","journal-title":"Int. J. Comput. Sci. Netw. Secur"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE-EUC.2017.157"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102550"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359790"},{"key":"e_1_3_2_2_26_1","volume-title":"Deep learning","author":"Goodfellow Ian","unstructured":"Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep learning. MIT press."},{"key":"e_1_3_2_2_27_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_2_28_1","volume-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733","author":"Gu Tianyu","year":"2017","unstructured":"Tianyu Gu, Brendan Dolan-Gavitt, and Siddharth Garg. 2017. Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733 (2017)."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"e_1_3_2_2_30_1","volume-title":"Handcrafted Backdoors in Deep Neural Networks. CoRR abs\/2106.04690","author":"Hong Sanghyun","year":"2021","unstructured":"Sanghyun Hong, Nicholas Carlini, and Alexey Kurakin. 2021. Handcrafted Backdoors in Deep Neural Networks. CoRR abs\/2106.04690 (2021). arXiv:2106.04690 https:\/\/arxiv.org\/abs\/2106.04690"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"key":"e_1_3_2_2_32_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Jordaney Roberto","year":"2017","unstructured":"Roberto Jordaney, Kumar Sharad, Santanu K Dash, Zhi Wang, Davide Papini, Ilia Nouretdinov, and Lorenzo Cavallaro. 2017. Transcend: Detecting concept drift in malware classification models. In 26th USENIX Security Symposium (USENIX Security 17). 625--642."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2013.6597204"},{"key":"e_1_3_2_2_34_1","volume-title":"Proceedings of the 14th International Joint Conference on Artificial Intelligence -","volume":"1","author":"Kephart Jeffrey O.","unstructured":"Jeffrey O. Kephart, Gregory B. Sorkin, William C. Arnold, David M. Chess, Gerald J. Tesauro, and Steve R. White. 1995. Biologically Inspired Defenses against Computer Viruses. In Proceedings of the 14th International Joint Conference on Artificial Intelligence - Volume 1 (Montreal, Quebec, Canada) (IJCAI'95). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 985--996."},{"key":"e_1_3_2_2_35_1","volume-title":"Adversarial malware binaries: Evading deep learning for malware detection in executables. In 2018 26th European signal processing conference (EUSIPCO)","author":"Kolosnjaji Bojan","unstructured":"Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, and Fabio Roli. 2018. Adversarial malware binaries: Evading deep learning for malware detection in executables. In 2018 26th European signal processing conference (EUSIPCO). IEEE, 533--537."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014105"},{"key":"e_1_3_2_2_37_1","unstructured":"Marek Krc\u00e1l Martin B\u00e1lek and Otakar Jasek. 2018. Deep Convolutional Malware Classifiers Can Learn from Raw Executables and Labels Only. In ICLR."},{"key":"e_1_3_2_2_38_1","volume-title":"Artificial intelligence safety and security","author":"Kurakin Alexey","unstructured":"Alexey Kurakin, Ian J Goodfellow, and Samy Bengio. 2018. Adversarial examples in the physical world. In Artificial intelligence safety and security. Chapman and Hall\/CRC, 99--112."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423362"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"e_1_3_2_2_41_1","unstructured":"Yingqi Liu Shiqing Ma Yousra Aafer Wen-Chuan Lee Juan Zhai Weihang Wang and Xiangyu Zhang. 2017. Trojaning attack on neural networks. (2017)."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453086"},{"key":"e_1_3_2_2_43_1","volume-title":"Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083","author":"Madry Aleksander","year":"2017","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)."},{"key":"e_1_3_2_2_44_1","volume-title":"Malware detection using frequency domain-based image visualization and deep learning. arXiv preprint arXiv:2101.10578","author":"Mohammed Tajuddin Manhar","year":"2021","unstructured":"Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, and BS Manjunath. 2021. Malware detection using frequency domain-based image visualization and deep learning. arXiv preprint arXiv:2101.10578 (2021)."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2008.4565046"},{"key":"e_1_3_2_2_46_1","unstructured":"United States Attorney's Office. 2020. Former Uber Executive Sentenced To 18 Months In Jail For Trade Secret Theft From Google. https:\/\/www.justice.gov\/usao-ndca\/pr\/former-uber-executive-sentenced18-months-jail-trade-secret-theft-google. [Online; accessed Dec 2nd 2022]."},{"key":"e_1_3_2_2_47_1","unstructured":"United States Attorney's Office. 2021. Fraudster Sentenced to Prison for Long Running Phone Unlocking Scheme that Defrauded AT&T. https:\/\/www.justice.gov\/opa\/pr\/fraudster-sentenced-prison-long-runningphone-unlocking-scheme-defrauded-att. [Online; accessed Dec 2nd 2022]."},{"key":"e_1_3_2_2_48_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Pendlebury Feargus","year":"2019","unstructured":"Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, and Lorenzo Cavallaro. 2019. {TESSERACT}: Eliminating experimental bias in malware classification across space and time. In 28th USENIX Security Symposium (USENIX Security 19). 729--746."},{"key":"e_1_3_2_2_49_1","volume-title":"Intriguing Properties of Adversarial ML Attacks in the Problem Space. In 2020 IEEE Symposium on Security and Privacy (SP). 1332--1349","author":"Pierazzi Fabio","year":"2020","unstructured":"Fabio Pierazzi, Feargus Pendlebury, Jacopo Cortellazzi, and Lorenzo Cavallaro. 2020. Intriguing Properties of Adversarial ML Attacks in the Problem Space. In 2020 IEEE Symposium on Security and Privacy (SP). 1332--1349. https:\/\/doi.org\/10. 1109\/SP40000.2020.00073"},{"key":"e_1_3_2_2_50_1","volume-title":"Subnet Replacement: Deployment-stage backdoor attack against deep neural networks in gray-box setting. CoRR abs\/2107.07240","author":"Qi Xiangyu","year":"2021","unstructured":"Xiangyu Qi, Jifeng Zhu, Chulin Xie, and Yong Yang. 2021. Subnet Replacement: Deployment-stage backdoor attack against deep neural networks in gray-box setting. CoRR abs\/2107.07240 (2021). arXiv:2107.07240 https:\/\/arxiv.org\/abs\/2107. 07240"},{"key":"e_1_3_2_2_51_1","volume-title":"Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence.","author":"Raff Edward","year":"2018","unstructured":"Edward Raff, Jon Barker, Jared Sylvester, Robert Brandon, Bryan Catanzaro, and Charles K Nicholas. 2018. Malware detection by eating a whole exe. In Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i11.17131"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-016-0283-1"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP53844.2022.00049"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774303"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11747-3_3"},{"key":"e_1_3_2_2_57_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Severi Giorgio","year":"2021","unstructured":"Giorgio Severi, Jim Meyer, Scott Coull, and Alina Oprea. 2021. {ExplanationGuided} Backdoor Poisoning Attacks Against Malware Classifiers. In 30th USENIX Security Symposium (USENIX Security 21). 1487--1504."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1186\/2190-8532-1-1"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCUBEA.2018.8697857"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420987"},{"key":"e_1_3_2_2_62_1","volume-title":"Proceedings of the 3rd Hackers' Workshop on computer and internet security (IITKHACK'09)","author":"Vinod P","year":"2009","unstructured":"P Vinod, R Jaipur, V Laxmi, and M Gaur. 2009. Survey on malware detection methods. In Proceedings of the 3rd Hackers' Workshop on computer and internet security (IITKHACK'09). 74--79."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00034"},{"key":"e_1_3_2_2_65_1","volume-title":"Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers. arXiv preprint arXiv:2202.05470","author":"Yang Limin","year":"2022","unstructured":"Limin Yang, Zhi Chen, Jacopo Cortellazzi, Feargus Pendlebury, Kevin Tu, Fabio Pierazzi, Lorenzo Cavallaro, and Gang Wang. 2022. Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers. arXiv preprint arXiv:2202.05470 (2022)."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354209"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2017.8323963"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605764.3623919","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605764.3623919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:36:43Z","timestamp":1755913003000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605764.3623919"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":67,"alternative-id":["10.1145\/3605764.3623919","10.1145\/3605764"],"URL":"https:\/\/doi.org\/10.1145\/3605764.3623919","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}