{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:40:01Z","timestamp":1755974401633,"version":"3.44.0"},"reference-count":16,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T00:00:00Z","timestamp":1703116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2024,1]]},"abstract":"<jats:p>Demystifying rebuttal writing.<\/jats:p>","DOI":"10.1145\/3624722","type":"journal-article","created":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T13:10:41Z","timestamp":1703164241000},"page":"47-49","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Rebuttal How-To: Strategies, Tactics, and the Big Picture in Research"],"prefix":"10.1145","volume":"67","author":[{"given":"Danfeng (Daphne)","family":"Yao","sequence":"first","affiliation":[{"name":"Virginia Tech in Blacksburg, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,12,21]]},"reference":[{"volume-title":"SIGSAC Individualized Cybersecurity Research Mentoring Workshop (iMentor), co-located with ACM Conf. on Computer and Communications Security (2023)","author":"ACM","key":"e_1_2_1_1_1","unstructured":"ACM SIGSAC Individualized Cybersecurity Research Mentoring Workshop (iMentor), co-located with ACM Conf. on Computer and Communications Security (2023); https:\/\/bit.ly\/46OsnXH"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1038\/s43856-022-00165-w"},{"volume-title":"Message from the USENIX Security '20 program co-chairs. (2020)","author":"Capkun S.","key":"e_1_2_1_3_1","unstructured":"Capkun, S. and Roesner, F. Message from the USENIX Security '20 program co-chairs. (2020); https:\/\/bit.ly\/48V7CLO"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3584664"},{"volume-title":"Message from the USENIX Security '21 program co-chairs. (2021)","author":"Greenstadt R.","key":"e_1_2_1_5_1","unstructured":"Greenstadt, R. and Bailey, M. Message from the USENIX Security '21 program co-chairs. (2021); https:\/\/bit.ly\/3LZJmOJ"},{"key":"e_1_2_1_6_1","volume-title":"Advice on writing an author response. (Sept. 17","author":"Hicks M.","year":"2014","unstructured":"Hicks, M. Advice on writing an author response. (Sept. 17, 2014); https:\/\/bit.ly\/3QgRP2E"},{"volume-title":"CHI 2020---The effect of rebuttals. (2019)","author":"McGrenere J.","key":"e_1_2_1_7_1","unstructured":"McGrenere, J., Cockburn, A., and Gould, S. CHI 2020---The effect of rebuttals. (2019); https:\/\/bit.ly\/3QgRP2E"},{"key":"e_1_2_1_8_1","unstructured":"Morris M.R. My rebuttal-writing process for HCI venues. (2020); https:\/\/bit.ly\/48RlExY"},{"key":"e_1_2_1_9_1","unstructured":"Nierstrasz O. Identify the champion. (2000); https:\/\/bit.ly\/3ttXV6R"},{"key":"e_1_2_1_10_1","volume-title":"Medium (May 27","author":"Parikh D.","year":"2020","unstructured":"Parikh, D., Batra, D. and Lee, S. How we write rebuttals. Medium (May 27, 2020); https:\/\/bit.ly\/3ZT6ggq"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345659"},{"key":"e_1_2_1_12_1","unstructured":"Valero C.S. How to Write a Good Paper Rebuttal a practical guide. (2022); https:\/\/bit.ly\/3ZWuUgb"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437255"},{"key":"e_1_2_1_14_1","volume-title":"D. Samples of Computer Science Conference Author Responses. (Feb. 11","author":"Yao","year":"2023","unstructured":"Yao, D. Samples of Computer Science Conference Author Responses. (Feb. 11, 2023); https:\/\/bit.ly\/3FhYTpG"},{"key":"e_1_2_1_15_1","unstructured":"Zeller A. Patterns for writing good rebuttals. (2022); https:\/\/bit.ly\/3QfwoPp"},{"key":"e_1_2_1_16_1","unstructured":"Zeller A. How do different fields review papers? Experiences from ICSE PLDI and CCS. (2021); https:\/\/bit.ly\/3FiyNm8"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3624722","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3624722","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:03:24Z","timestamp":1755972204000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3624722"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,21]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["10.1145\/3624722"],"URL":"https:\/\/doi.org\/10.1145\/3624722","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2023,12,21]]},"assertion":[{"value":"2023-12-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}