{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T03:20:42Z","timestamp":1774495242901,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,11]]},"DOI":"10.1145\/3613904.3642382","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:37:41Z","timestamp":1715416661000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["Non-Consensual Synthetic Intimate Imagery: Prevalence, Attitudes, and Knowledge in 10 Countries"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4463-1096","authenticated-orcid":false,"given":"Rebecca","family":"Umbach","sequence":"first","affiliation":[{"name":"Trust &amp; Safety Research, Google, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2241-7985","authenticated-orcid":false,"given":"Nicola","family":"Henry","sequence":"additional","affiliation":[{"name":"Royal Melbourne Institute of Technology, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4197-1956","authenticated-orcid":false,"given":"Gemma Faye","family":"Beard","sequence":"additional","affiliation":[{"name":"Royal Melbourne Institute of Technology, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1670-7484","authenticated-orcid":false,"given":"Colleen M.","family":"Berryessa","sequence":"additional","affiliation":[{"name":"School of Criminal Justice, Rutgers University, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_2_1_1","doi-asserted-by":"publisher","DOI":"10.3390\/philosophies6010006"},{"key":"e_1_3_3_2_3_1","first-page":"1","article-title":"Let\u2019s talk about (fake) sex baby: A deep dive into the distributive harms of deepfake pornography","volume":"4","author":"Akerley Shelby","year":"2020","unstructured":"Shelby Akerley. 2020. Let\u2019s talk about (fake) sex baby: A deep dive into the distributive harms of deepfake pornography. Arizona Law Journal of Emerging Technologies 4 (2020), 1\u201358.","journal-title":"Arizona Law Journal of Emerging Technologies"},{"key":"e_1_3_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/philosophies6010006"},{"key":"e_1_3_3_2_5_1","unstructured":"Tomas\u00a0J Aragon MP Fay D Wollschlaeger 2020. epitools: Epidemiology Tools. R package version 0.5-10.1. https:\/\/CRAN.R-project.org\/package=epitools."},{"key":"e_1_3_3_2_6_1","unstructured":"Vincent Arel-Bundock. 2024. marginaleffects: Predictions Comparisons Slopes Marginal Means and Hypothesis Tests. https:\/\/marginaleffects.com\/ R package version 0.17.0.9002."},{"key":"e_1_3_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.5817\/CP2021-4-3"},{"key":"e_1_3_3_2_8_1","unstructured":"Youth\u00a0Law Australia. 2021. Image-Based Abuse | Youth Law Australia. https:\/\/yla.org.au\/nt\/topics\/internet-phones-and-technology\/image-based-abuse\/."},{"key":"e_1_3_3_2_9_1","unstructured":"Shannon Bond. 2023. It takes a few dollars and 8 minutes to create a deepfake. And that\u2019s only the start. https:\/\/www.npr.org\/2023\/03\/23\/1165146797\/it-takes-a-few-dollars-and-8-minutes-to-create-a-deepfake-and-thats-only-the-start."},{"key":"e_1_3_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1108\/JACPR-09-2016-0253"},{"key":"e_1_3_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec"},{"key":"e_1_3_3_2_12_1","unstructured":"Yihan Cao Siyu Li Yixin Liu Zhiling Yan Yutong Dai Philip\u00a0S. Yu and Lichao Sun. 2023. A comprehensive survey of AI-generated content (AIGC): A history of generative AI from GAN to ChatGPT. arxiv:2303.04226\u00a0[cs.AI]"},{"key":"e_1_3_3_2_13_1","volume-title":"Reflections on revenge porn: Illustrating why the legal system should adopt a comprehensive response to nonconsensual pornography in the US. Montana Law Review 83 (Sept","author":"Carter Chance","year":"2022","unstructured":"Chance Carter. 2022. Reflections on revenge porn: Illustrating why the legal system should adopt a comprehensive response to nonconsensual pornography in the US. Montana Law Review 83 (Sept. 2022), 293\u2013322. Issue 2. https:\/\/scholarworks.umt.edu\/cgi\/viewcontent.cgi?article=2503&context=mlr."},{"key":"e_1_3_3_2_14_1","volume-title":"Act On Special Cases Concerning The Punishment Of Sexual Crimes. (Aug","author":"Korea Law\u00a0Translation Center","year":"2019","unstructured":"Korea Law\u00a0Translation Center. 2019. Act On Special Cases Concerning The Punishment Of Sexual Crimes. (Aug. 2019)."},{"key":"e_1_3_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3213954"},{"key":"e_1_3_3_2_16_1","volume-title":"Criminalizing revenge porn. Wake Forest Law Review 49 (May","author":"Citron Danielle\u00a0Keats","year":"2014","unstructured":"Danielle\u00a0Keats Citron and Mary\u00a0Anne Franks. 2014. Criminalizing revenge porn. Wake Forest Law Review 49 (May 2014), 345\u2013391."},{"key":"e_1_3_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2020.0100"},{"key":"e_1_3_3_2_18_1","unstructured":"Samantha Cole. 2018. Pornhub is banning AI-generated fake porn videos says they\u2019re nonconsensual. https:\/\/www.vice.com\/en\/article\/zmwvdw\/pornhub-bans-deepfakes."},{"key":"e_1_3_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/10304312.2022.2084039"},{"key":"e_1_3_3_2_20_1","first-page":"887","article-title":"Pornographic deepfakes: The case for federal criminalization of revenge porn\u2019s next tragic act","volume":"88","author":"Delfino A","year":"2019","unstructured":"Rebecca\u00a0A Delfino. 2019. Pornographic deepfakes: The case for federal criminalization of revenge porn\u2019s next tragic act. Fordham Law Review 88 (2019), 887\u2013938.","journal-title":"Fordham Law Review"},{"key":"e_1_3_3_2_21_1","unstructured":"Brian Dolhansky Joanna Bitton Ben Pflaum Jikuo Lu Russ Howes Menglin Wang and Cristian\u00a0Canton Ferrer. 2020. The Deepfake Detection Challenge (DFDC) Dataset. arxiv:2006.07397\u00a0[cs.CV]"},{"key":"e_1_3_3_2_22_1","volume-title":"not politicians, are targeted most often by deepfake videos","author":"Dunn Suzie","year":"2021","unstructured":"Suzie Dunn. 2021. Women, not politicians, are targeted most often by deepfake videos. Centre for International Governance Innovation (March 2021). https:\/\/www.cigionline.org\/articles\/women-not-politicians-are-targeted-most-often-deepfake-videos\/?s=03."},{"key":"e_1_3_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/15564886.2021.2022057"},{"key":"e_1_3_3_2_24_1","unstructured":"eSafety Commissioner. 2023. Image-Based Abuse. https:\/\/www.esafety.gov.au\/key-topics\/image-based-abuse."},{"key":"e_1_3_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524458.3547247"},{"key":"e_1_3_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.54501\/jots.v1i4.56"},{"key":"e_1_3_3_2_27_1","volume-title":"Deepfake laws risk creating more problems than they solve. Regulatory Transparency Project","author":"Feeney Matthew","year":"2021","unstructured":"Matthew Feeney. 2021. Deepfake laws risk creating more problems than they solve. Regulatory Transparency Project (2021). https:\/\/rtp.fedsoc.org\/wp-content\/uploads\/Paper-Deepfake-Laws-Risk-Creating-More-Problems-Than-They-Solve.pdf."},{"key":"e_1_3_3_2_28_1","first-page":"229","article-title":"The federal \u201cdeepfakes","volume":"3","author":"Ferraro F","year":"2020","unstructured":"Matthew\u00a0F Ferraro, Jason\u00a0C Chipman, and Stephen\u00a0W Preston. 2020. The federal \u201cdeepfakes\u201dlaw. The Journal of Robotics, Artificial Intelligence & Law 3, 4 (2020), 229\u2013233.","journal-title":"law. The Journal of Robotics, Artificial Intelligence & Law"},{"key":"e_1_3_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.107141"},{"key":"e_1_3_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1177\/263380762211353"},{"key":"e_1_3_3_2_31_1","unstructured":"Greg Freedman Ellis and Ben Schneider. 2023. srvyr: \u2019dplyr\u2019-Like Syntax for Summary Statistics of Survey Data. https:\/\/CRAN.R-project.org\/package=srvyr R package version 1.2.0."},{"key":"e_1_3_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517446"},{"key":"e_1_3_3_2_33_1","volume-title":"The emergence of deepfakes and its societal implications: A systematic review.TTO (Oct","author":"Gamage Dilrukshi","year":"2021","unstructured":"Dilrukshi Gamage, Kazutoshi Sasahara, and Jiayu Chen. 2021. The emergence of deepfakes and its societal implications: A systematic review.TTO (Oct. 2021), 28\u201339."},{"key":"e_1_3_3_2_34_1","first-page":"1479","article-title":"The new weapon of choice\u201d: Law\u2019s current inability to properly address deepfake pornography","volume":"73","author":"Gieseke Anne\u00a0Pechenik","year":"2020","unstructured":"Anne\u00a0Pechenik Gieseke. 2020. \u201cThe new weapon of choice\u201d: Law\u2019s current inability to properly address deepfake pornography. Vanderbilt Law Review 73 (2020), 1479\u20131515.","journal-title":"Vanderbilt Law Review"},{"key":"e_1_3_3_2_35_1","unstructured":"Google. 2023. Remove involuntary fake pornography from Google. https:\/\/support.google.com\/websearch\/answer\/9116649?hl=en."},{"key":"e_1_3_3_2_36_1","unstructured":"Jeffrey Gottfried. 2019. About three-quarters of Americans favor steps to restrict altered videos and images. https:\/\/www.pewresearch.org\/short-reads\/2019\/06\/14\/about-three-quarters-of-americans-favor-steps-to-restrict-altered-videos-and-images\/."},{"key":"e_1_3_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2110013119"},{"key":"e_1_3_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11229-021-03379-y"},{"key":"e_1_3_3_2_39_1","volume-title":"Image-based sexual abuse: A study on the causes and consequences of non-consensual nude or sexual imagery","author":"Henry Nicola","unstructured":"Nicola Henry, Clare McGlynn, Asher Flynn, Kelly Johnson, Anastasia Powell, and Adrian\u00a0J Scott. 2020. Image-based sexual abuse: A study on the causes and consequences of non-consensual nude or sexual imagery. Routledge, New York, NY."},{"key":"e_1_3_3_2_40_1","unstructured":"Sean Hollister. 2023. Reddit\u2019s AI porn ban has a carveout for Rule 34. https:\/\/www.theverge.com\/2023\/7\/6\/21525998\/reddit-ai-porn-fictional-characters-carveout-sexual-images."},{"key":"e_1_3_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/13600834.2020.1794615"},{"key":"e_1_3_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.isci.2021.103364"},{"key":"e_1_3_3_2_43_1","unstructured":"Pavel Korshunov and S\u00e9bastien Marcel. 2020. Deepfake detection: Humans vs. machines. arxiv:2009.03155\u00a0[cs.CV]"},{"key":"e_1_3_3_2_44_1","first-page":"611","article-title":"Deepfake privacy: Attitudes and regulation","volume":"116","author":"Kugler B","year":"2021","unstructured":"Matthew\u00a0B Kugler and Carly Pace. 2021. Deepfake privacy: Attitudes and regulation. Northwestern University Law Review 116 (2021), 611\u2013680. https:\/\/doi.org\/ssrn.3781968","journal-title":"Northwestern University Law Review"},{"key":"e_1_3_3_2_45_1","volume-title":"A look at global deepfake regulation approaches","author":"Lawson Amanda","year":"2023","unstructured":"Amanda Lawson. 2023. A look at global deepfake regulation approaches. Responsible Artificial Intelligence Institute (April 2023). https:\/\/www.responsible.ai\/post\/a-look-at-global-deepfake-regulation-approaches."},{"key":"e_1_3_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/23268743.2021.1901602"},{"key":"e_1_3_3_2_47_1","volume-title":"Norms or fun? The influence of ethical concerns and perceived enjoyment on the regulation of deepfake information. Internet Research","author":"Li Minghui","year":"2023","unstructured":"Minghui Li and Yan Wan. 2023. Norms or fun? The influence of ethical concerns and perceived enjoyment on the regulation of deepfake information. Internet Research (2023)."},{"key":"e_1_3_3_2_48_1","volume-title":"Survey: Analysis of Complex Survey Samples. R package version 4.2.","author":"Lumley Thomas","year":"2023","unstructured":"Thomas Lumley. 2023. Survey: Analysis of Complex Survey Samples. R package version 4.2."},{"key":"e_1_3_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1080\/23268743.2020.1757499"},{"key":"e_1_3_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517629"},{"key":"e_1_3_3_2_51_1","volume-title":"Warning: Humans cannot reliably detect speech deepfakes. arXiv preprint arXiv:2301.07829","author":"Mai T","year":"2023","unstructured":"Kimberly\u00a0T Mai, Sergi\u00a0D Bray, Toby Davies, and Lewis\u00a0D Griffin. 2023. Warning: Humans cannot reliably detect speech deepfakes. arXiv preprint arXiv:2301.07829 (2023)."},{"key":"e_1_3_3_2_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12119-020-09738-0"},{"key":"e_1_3_3_2_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03766-z"},{"key":"e_1_3_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10691-017-9343-2"},{"key":"e_1_3_3_2_55_1","unstructured":"Joseph\u00a0D. Morelle. 2023. Preventing Deepfakes of Intimate Images Act. https:\/\/www.congress.gov\/bill\/117th-congress\/house-bill\/9631\/text."},{"key":"e_1_3_3_2_56_1","unstructured":"Colette Mortreux Karen Kellard Nicola Henry and Asher Flynn. 2019. Understanding the attitudes and motivations of adults who engage in image-based abuse. (2019). https:\/\/www.esafety.gov.au\/sites\/default\/files\/2019-10\/Research_Report_IBA_Perp_Motivations.pdf."},{"key":"e_1_3_3_2_57_1","volume-title":"GBDF: Gender balanced deepfake dataset towards fair deepfake detection. arXiv preprint arXiv:2207.10246","author":"Nadimpalli Aakash\u00a0Varma","year":"2022","unstructured":"Aakash\u00a0Varma Nadimpalli and Ajita Rattani. 2022. GBDF: Gender balanced deepfake dataset towards fair deepfake detection. arXiv preprint arXiv:2207.10246 (2022)."},{"key":"e_1_3_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2120481119"},{"key":"e_1_3_3_2_59_1","unstructured":"Office of\u00a0the\u00a0eSafety Commissioner\u00a0Australia. 2023. Regulatory Schemes. https:\/\/www.esafety.gov.au\/about-us\/who-we-are\/regulatory-schemes##image-based-abuse-scheme."},{"key":"e_1_3_3_2_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-019-09522-1"},{"key":"e_1_3_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.1177\/1079063218800469"},{"key":"e_1_3_3_2_62_1","doi-asserted-by":"publisher","DOI":"10.1177\/0886260516672"},{"key":"e_1_3_3_2_63_1","unstructured":"Anastasia Powell Adrian Scott Asher Flynn and Nicola Henry. 2020. Image-based sexual abuse: An international study of victims and perpetrators \u2013 A summary report. (2020). https:\/\/research.monash.edu\/en\/publications\/image-based-sexual-abuse-an-international-study-of-victims-and-pe."},{"key":"e_1_3_3_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449978"},{"key":"e_1_3_3_2_65_1","volume-title":"R: A Language and Environment for Statistical Computing","author":"Team R Core","year":"2023","unstructured":"R Core Team. 2023. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria. https:\/\/www.R-project.org\/"},{"key":"e_1_3_3_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579987.3586562"},{"key":"e_1_3_3_2_67_1","doi-asserted-by":"publisher","DOI":"10.26556\/jesp.v22i2.1628"},{"key":"e_1_3_3_2_68_1","doi-asserted-by":"publisher","DOI":"10.1037\/vio0000233"},{"key":"e_1_3_3_2_69_1","unstructured":"Georgina Ryan-White. 2022. Cyberflashing and deepfake pornography. (2022). http:\/\/www.niassembly.gov.uk\/globalassets\/documents\/raise\/publications\/2017-2022\/2022\/justice\/0122.pdf"},{"key":"e_1_3_3_2_70_1","volume-title":"UK\u2019s YouGov says demand from Silicon Valley clients holding up","author":"Sandle Paul","year":"2021","unstructured":"Paul Sandle. 2021. UK\u2019s YouGov says demand from Silicon Valley clients holding up. Reuters (March 2021). https:\/\/www.reuters.com\/business\/uks-yougov-says-demand-silicon-valley-clients-holding-up-2023-03-21\/."},{"key":"e_1_3_3_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581020"},{"key":"e_1_3_3_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517646"},{"key":"e_1_3_3_2_73_1","first-page":"383","article-title":"Protection of victims of deep fake pornography in a legal perspective in Indonesia","volume":"10","author":"Solichah Isnaini\u00a0Imroatus","year":"2023","unstructured":"Isnaini\u00a0Imroatus Solichah, Faizin Sulistio, and Milda Istiqomah. 2023. Protection of victims of deep fake pornography in a legal perspective in Indonesia. International Journal of Multicultural and Multireligious Understanding 10, 1 (2023), 383\u2013390.","journal-title":"International Journal of Multicultural and Multireligious Understanding"},{"key":"e_1_3_3_2_74_1","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2023.2192888"},{"key":"e_1_3_3_2_75_1","volume-title":"Victim blaming, responsibilization and resilience in online sexual abuse and harassment. Victimology: Research, Policy and Activism","author":"Sugiura Lisa","year":"2020","unstructured":"Lisa Sugiura and April Smith. 2020. Victim blaming, responsibilization and resilience in online sexual abuse and harassment. Victimology: Research, Policy and Activism (2020), 45\u201379."},{"key":"e_1_3_3_2_76_1","doi-asserted-by":"publisher","DOI":"10.4300\/JGME-5-4-18"},{"key":"e_1_3_3_2_77_1","doi-asserted-by":"publisher","DOI":"10.1002\/pra2.366"},{"key":"e_1_3_3_2_78_1","doi-asserted-by":"crossref","unstructured":"Loc Trinh and Yan Liu. 2021. An examination of fairness of AI models for deepfake detection. arxiv:2105.00558\u00a0[cs.CV]","DOI":"10.24963\/ijcai.2021\/79"},{"key":"e_1_3_3_2_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2017.06.010"},{"key":"e_1_3_3_2_80_1","volume-title":"Don\u2019t believe your eyes: Fighting deepfaked nonconsensual pornography with tort law","author":"Wang Y","unstructured":"Moncarol\u00a0Y Wang. 2022. Don\u2019t believe your eyes: Fighting deepfaked nonconsensual pornography with tort law. University of Chicago Legal Forum (2022), 415\u2013445."},{"key":"e_1_3_3_2_81_1","doi-asserted-by":"publisher","DOI":"10.22215\/timreview"},{"key":"e_1_3_3_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533779"},{"key":"e_1_3_3_2_83_1","volume-title":"Deepfake video detection using convolutional vision transformer. arXiv preprint arXiv:2102.11126","author":"Wodajo Deressa","year":"2021","unstructured":"Deressa Wodajo and Solomon Atnafu. 2021. Deepfake video detection using convolutional vision transformer. arXiv preprint arXiv:2102.11126 (2021)."},{"key":"e_1_3_3_2_84_1","volume-title":"A comprehensive analysis of AI biases in deepfake detection with massively annotated databases. arXiv preprint arXiv:2208.05845","author":"Xu Ying","year":"2022","unstructured":"Ying Xu, Philipp Terh\u00f6rst, Kiran Raja, and Marius Pedersen. 2022. A comprehensive analysis of AI biases in deepfake detection with massively annotated databases. arXiv preprint arXiv:2208.05845 (2022)."}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642382","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613904.3642382","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:56:47Z","timestamp":1750291007000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642382"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":83,"alternative-id":["10.1145\/3613904.3642382","10.1145\/3613904"],"URL":"https:\/\/doi.org\/10.1145\/3613904.3642382","relation":{},"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}