{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T18:10:06Z","timestamp":1755886206091,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T00:00:00Z","timestamp":1717113600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-OE0000919"],"award-info":[{"award-number":["DE-OE0000919"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["#2303639"],"award-info":[{"award-number":["#2303639"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,4]]},"DOI":"10.1145\/3632775.3661988","type":"proceedings-article","created":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T15:31:37Z","timestamp":1720539097000},"page":"610-624","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-Preserving Control of Partitioned Energy Resources"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-5767-0844","authenticated-orcid":false,"given":"Evan","family":"Laufer","sequence":"first","affiliation":[{"name":"Stanford University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2934-2701","authenticated-orcid":false,"given":"Philip","family":"Levis","sequence":"additional","affiliation":[{"name":"Stanford University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4961-9539","authenticated-orcid":false,"given":"Ram","family":"Rajagopal","sequence":"additional","affiliation":[{"name":"Stanford University, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. nRF52840 Product Specification v1.7. https:\/\/infocenter.nordicsemi.com\/pdf\/nRF52840_PS_v1.7.pdf."},{"key":"e_1_3_2_1_2_1","unstructured":"2024. Join the Tesla Virtual Power Plant. https:\/\/www.tesla.com\/support\/energy\/tesla-virtual-power-plant-pge."},{"key":"e_1_3_2_1_3_1","unstructured":"2024. libprio-rs crate. https:\/\/github.com\/divviup\/libprio-rs."},{"key":"e_1_3_2_1_4_1","unstructured":"Josh Aas and Tim Geoghegan. 2020. Introducing ISRG Prio Services for Privacy Respecting Metrics. https:\/\/www.abetterinternet.org\/post\/introducing-prio-services\/."},{"volume-title":"I Have a DREAM! (DiffeRentially privatE smArt Metering)","author":"\u00c1cs Gergely","key":"e_1_3_2_1_5_1","unstructured":"Gergely \u00c1cs and Claude Castelluccia. 2011. I Have a DREAM! (DiffeRentially privatE smArt Metering). In Information Hiding, Tom\u00e1\u0161 Filler, Tom\u00e1\u0161 Pevn\u00fd, Scott Craver, and Andrew Ker (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 118\u2013132."},{"key":"e_1_3_2_1_6_1","unstructured":"Surya Addanki Kevin Garbe Eli Jaffe Rafail Ostrovsky and Antigoni Polychroniadou. 2021. Prio+: Privacy Preserving Aggregate Statistics via Boolean Shares. Cryptology ePrint Archive Report 2021\/576. https:\/\/eprint.iacr.org\/2021\/576."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2012.6542936"},{"key":"e_1_3_2_1_8_1","unstructured":"Apple and Google. 2021. Exposure Notification Privacy-preserving Analytics (ENPA) White Paper. Technical Report. https:\/\/covid19-static.cdn-apple.com\/applications\/covid19\/current\/static\/contact-tracing\/pdf\/ENPA_White_Paper.pdf"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.07.005"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_17"},{"volume-title":"Advances in Cryptology \u2014 CRYPTO \u201991","author":"Beaver Donald","key":"e_1_3_2_1_11_1","unstructured":"Donald Beaver. 1992. Efficient Multiparty Protocols Using Circuit Randomization. In Advances in Cryptology \u2014 CRYPTO \u201991, Joan Feigenbaum (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 420\u2013432."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","unstructured":"Eli Ben-Sasson Iddo Bentov Yinon Horesh and Michael Riabzev. 2019. Scalable Zero Knowledge with No Trusted Setup. 701\u2013732. https:\/\/doi.org\/10.1007\/978-3-030-26954-8_23","DOI":"10.1007\/978-3-030-26954-8_23"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Eli Ben-Sasson Alessandro Chiesa Daniel Genkin Eran Tromer and Madars Virza. 2013. SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge. Cryptology ePrint Archive Report 2013\/507. https:\/\/eprint.iacr.org\/2013\/507.","DOI":"10.1007\/978-3-642-40084-1_6"},{"key":"e_1_3_2_1_14_1","unstructured":"Eli Ben-Sasson Alessandro Chiesa Eran Tromer and Madars Virza. 2013. Succinct Non-Interactive Arguments for a von Neumann Architecture. Cryptology ePrint Archive Report 2013\/879. https:\/\/eprint.iacr.org\/2013\/879."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","unstructured":"Eli Ben-Sasson Alessandro Chiesa Eran Tromer and Madars Virza. 2014. Scalable Zero Knowledge via Cycles of Elliptic Curves. 276\u2013294. https:\/\/doi.org\/10.1007\/978-3-662-44381-1_16","DOI":"10.1007\/978-3-662-44381-1_16"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2873069"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/AFIPS.1979.98"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","unstructured":"Dan Boneh Elette Boyle Henry Corrigan-Gibbs Niv Gilboa and Yuval Ishai. 2019. Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs. 67\u201397. https:\/\/doi.org\/10.1007\/978-3-030-26954-8_3","DOI":"10.1007\/978-3-030-26954-8_3"},{"key":"e_1_3_2_1_19_1","unstructured":"Dan Boneh Elette Boyle Henry Corrigan-Gibbs Niv Gilboa and Yuval Ishai. 2019. Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs. Cryptology ePrint Archive Paper 2019\/188. https:\/\/eprint.iacr.org\/2019\/188 https:\/\/eprint.iacr.org\/2019\/188."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Jonathan Bootle Andrea Cerulli Jens Groth Sune Jakobsen and Mary Maller. 2018. Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution. Cryptology ePrint Archive Report 2018\/380. https:\/\/eprint.iacr.org\/2018\/380.","DOI":"10.1007\/978-3-030-03326-2_20"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2336265"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0292-0"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDSS53610.2021.00035"},{"key":"e_1_3_2_1_25_1","volume-title":"Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS. Cryptology ePrint Archive, Report 2019\/1047. https:\/\/eprint.iacr.org\/2019\/1047.","author":"Chiesa Alessandro","year":"2019","unstructured":"Alessandro Chiesa, Yuncong Hu, Mary Maller, Pratyush Mishra, Psi Vesely, and Nicholas Ward. 2019. Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS. Cryptology ePrint Archive, Report 2019\/1047. https:\/\/eprint.iacr.org\/2019\/1047."},{"key":"e_1_3_2_1_26_1","volume-title":"Virtualizing Energy Storage Management Using RAIBA. In 2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Chiueh Tzi","year":"2018","unstructured":"Tzi cker Chiueh, Mao-Cheng Huang, Kai-Cheung Juang, Shih-Hao Liang, and Welkin Ling. 2018. Virtualizing Energy Storage Management Using RAIBA. In 2018 USENIX Annual Technical Conference (USENIX ATC 18). USENIX Association, Boston, MA, 187\u2013198. https:\/\/www.usenix.org\/conference\/atc18\/presentation\/chiueh"},{"key":"e_1_3_2_1_27_1","volume-title":"Prio: Private, Robust, and Scalable Computation of Aggregate Statistics. CoRR abs\/1703.06255","author":"Corrigan-Gibbs Henry","year":"2017","unstructured":"Henry Corrigan-Gibbs and Dan Boneh. 2017. Prio: Private, Robust, and Scalable Computation of Aggregate Statistics. CoRR abs\/1703.06255 (2017). arXiv:1703.06255http:\/\/arxiv.org\/abs\/1703.06255"},{"key":"e_1_3_2_1_28_1","volume-title":"Geppetto: Versatile Verifiable Computation. Cryptology ePrint Archive, Report 2014\/976. https:\/\/eprint.iacr.org\/2014\/976.","author":"Costello Craig","year":"2014","unstructured":"Craig Costello, C\u00e9dric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, and Samee Zahur. 2014. Geppetto: Versatile Verifiable Computation. Cryptology ePrint Archive, Report 2014\/976. https:\/\/eprint.iacr.org\/2014\/976."},{"key":"e_1_3_2_1_29_1","unstructured":"Dalek Cryptography. 2024. Bulletproofs crate. https:\/\/github.com\/dalek-cryptography\/bulletproofs."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Hannah Davis Christopher Patton Mike Rosulek and Phillipp Schoppmann. 2023. Verifiable Distributed Aggregation Functions. Cryptology ePrint Archive Report 2023\/130. https:\/\/eprint.iacr.org\/2023\/130.","DOI":"10.56553\/popets-2023-0126"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Keita Emura. 2017. Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions. 193\u2013213.","DOI":"10.1007\/978-3-319-59870-3_11"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2277938"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/IFEEA54171.2021.00169"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905298"},{"key":"e_1_3_2_1_35_1","volume-title":"PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge. Cryptology ePrint Archive, Report 2019\/953. https:\/\/eprint.iacr.org\/2019\/953.","author":"Gabizon Ariel","year":"2019","unstructured":"Ariel Gabizon, Zachary\u00a0J. Williamson, and Oana Ciobotaru. 2019. PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge. Cryptology ePrint Archive, Report 2019\/953. https:\/\/eprint.iacr.org\/2019\/953."},{"key":"e_1_3_2_1_36_1","volume-title":"Garcia and Bart Jacobs","author":"D.","year":"2011","unstructured":"Flavio\u00a0D. Garcia and Bart Jacobs. 2011. Privacy-Friendly Energy-Metering via Homomorphic Encryption. In Security and Trust Management, Jorge Cuellar, Javier Lopez, Gilles Barthe, and Alexander Pretschner (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 226\u2013238."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/22145.22178"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.08.005"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","unstructured":"Marc Joye and Beno\u00eet Libert. 2013. A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data. 111\u2013125. https:\/\/doi.org\/10.1007\/978-3-642-39884-1_10","DOI":"10.1007\/978-3-642-39884-1_10"},{"key":"e_1_3_2_1_40_1","volume-title":"MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs. Cryptology ePrint Archive, Report 2020\/278. https:\/\/eprint.iacr.org\/2020\/278.","author":"Kosba Ahmed","year":"2020","unstructured":"Ahmed Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, and Dawn Song. 2020. MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs. Cryptology ePrint Archive, Report 2020\/278. https:\/\/eprint.iacr.org\/2020\/278."},{"key":"e_1_3_2_1_41_1","volume-title":"MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs. 2129\u20132146.","author":"Kosba E.","year":"2020","unstructured":"Ahmed\u00a0E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, and Dawn Song. 2020. MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs. 2129\u20132146."},{"volume-title":"Privacy-Friendly Aggregation for the Smart-Grid","author":"Kursawe Klaus","key":"e_1_3_2_1_42_1","unstructured":"Klaus Kursawe, George Danezis, and Markulf Kohlweiss. 2011. Privacy-Friendly Aggregation for the Smart-Grid. In Privacy Enhancing Technologies, Simone Fischer-H\u00fcbner and Nicholas Hopper (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 175\u2013191."},{"key":"e_1_3_2_1_43_1","unstructured":"Fred Lambert. 2023. Tesla has now installed over 500 000 Powerwalls. https:\/\/electrek.co\/2023\/06\/16\/tesla-installed-over-500000-powerwalls\/"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42162-021-00144-w"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132786"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622064"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.124"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2874473"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.86"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2803782"},{"key":"e_1_3_2_1_51_1","volume-title":"Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings. Cryptology ePrint Archive, Report 2019\/099. https:\/\/eprint.iacr.org\/2019\/099.","author":"Maller Mary","year":"2019","unstructured":"Mary Maller, Sean Bowe, Markulf Kohlweiss, and Sarah Meiklejohn. 2019. Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings. Cryptology ePrint Archive, Report 2019\/099. https:\/\/eprint.iacr.org\/2019\/099."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563357.3564082"},{"key":"e_1_3_2_1_53_1","unstructured":"Kassia Micek and Justine Coyne. 2023. US battery storage: Capacity tops 12.5 GW in Q2; 3.5 GW planned in Q3. https:\/\/www.spglobal.com\/commodityinsights\/en\/market-insights\/latest-news\/electric-power\/082523-us-battery-storage-capacity-tops-125-gw-in-q2-35-gw-planned-in-q3"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","unstructured":"C.\u00a0Andrew Neff. 2001. A Verifiable Secret Shuffle and Its Application to e-Voting. 116\u2013125. https:\/\/doi.org\/10.1145\/501983.502000","DOI":"10.1145\/501983.502000"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.47"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046564"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2224389"},{"key":"e_1_3_2_1_58_1","volume-title":"Spartan: Efficient and general-purpose zkSNARKs without trusted setup. Cryptology ePrint Archive, Report 2019\/550. https:\/\/eprint.iacr.org\/2019\/550.","author":"Setty Srinath","year":"2019","unstructured":"Srinath Setty. 2019. Spartan: Efficient and general-purpose zkSNARKs without trusted setup. Cryptology ePrint Archive, Report 2019\/550. https:\/\/eprint.iacr.org\/2019\/550."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_60_1","unstructured":"Elaine Shi T.-H.\u00a0Hubert Chan Eleanor\u00a0G. Rieffel Richard Chow and Dawn Song. 2011. Privacy-Preserving Aggregation of Time-Series Data."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"crossref","unstructured":"Riad\u00a0S. Wahby Srinath T.\u00a0V. Setty Zuocheng Ren Andrew\u00a0J. Blumberg and Michael Walfish. 2015. Efficient RAM and control flow in verifiable outsourced computation.","DOI":"10.14722\/ndss.2015.23097"},{"key":"e_1_3_2_1_62_1","volume-title":"Privacy-Preserving Energy Storage Sharing with Blockchain and Secure Multi-Party Computation. CoRR abs\/2111.02005","author":"Wang Nan","year":"2021","unstructured":"Nan Wang, Sid\u00a0Chi-Kin Chau, and Yue Zhou. 2021. Privacy-Preserving Energy Storage Sharing with Blockchain and Secure Multi-Party Computation. CoRR abs\/2111.02005 (2021). arXiv:2111.02005https:\/\/arxiv.org\/abs\/2111.02005"},{"key":"e_1_3_2_1_63_1","volume-title":"Flashproofs: Efficient Zero-Knowledge Arguments of\u00a0Range and\u00a0Polynomial Evaluation with\u00a0Transparent Setup. In Advances in Cryptology \u2013 ASIACRYPT","author":"Wang Nan","year":"2022","unstructured":"Nan Wang and Sid Chi-Kin Chau. 2022. Flashproofs: Efficient Zero-Knowledge Arguments of\u00a0Range and\u00a0Polynomial Evaluation with\u00a0Transparent Setup. In Advances in Cryptology \u2013 ASIACRYPT 2022, Shweta Agrawal and Dongdai Lin (Eds.). Springer Nature Switzerland, Cham, 219\u2013248."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3014401"},{"key":"e_1_3_2_1_65_1","volume-title":"Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits. Cryptology ePrint Archive, Report 2020\/925. https:\/\/eprint.iacr.org\/2020\/925.","author":"Weng Chenkai","year":"2020","unstructured":"Chenkai Weng, Kang Yang, Jonathan Katz, and Xiao Wang. 2020. Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits. Cryptology ePrint Archive, Report 2020\/925. https:\/\/eprint.iacr.org\/2020\/925."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15985-5_11"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"Kang Yang Pratik Sarkar Chenkai Weng and Xiao Wang. 2021. QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field. Cryptology ePrint Archive Report 2021\/076. https:\/\/eprint.iacr.org\/2021\/076.","DOI":"10.1145\/3460120.3484556"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","unstructured":"Yupeng Zhang Daniel Genkin Jonathan Katz Dimitrios Papadopoulos and Charalampos Papamanthou. 2018. vRAM: Faster Verifiable RAM with Program-Independent Preprocessing. 908\u2013925. https:\/\/doi.org\/10.1109\/SP.2018.00013","DOI":"10.1109\/SP.2018.00013"}],"event":{"name":"e-Energy '24: The 15th ACM International Conference on Future and Sustainable Energy Systems","acronym":"e-Energy '24","location":"Singapore Singapore"},"container-title":["The 15th ACM International Conference on Future and Sustainable Energy Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3632775.3661988","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3632775.3661988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:34:39Z","timestamp":1755884079000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3632775.3661988"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,31]]},"references-count":69,"alternative-id":["10.1145\/3632775.3661988","10.1145\/3632775"],"URL":"https:\/\/doi.org\/10.1145\/3632775.3661988","relation":{},"subject":[],"published":{"date-parts":[[2024,5,31]]},"assertion":[{"value":"2024-05-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}