{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:34:26Z","timestamp":1767339266795,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3637660","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"1331-1344","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["PARL: Poisoning Attacks Against Reinforcement Learning-based Recommender Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9028-9326","authenticated-orcid":false,"given":"Linkang","family":"Du","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2193-4872","authenticated-orcid":false,"given":"Quan","family":"Yuan","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1128-7989","authenticated-orcid":false,"given":"Min","family":"Chen","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5790-5025","authenticated-orcid":false,"given":"Mingyang","family":"Sun","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4221-2162","authenticated-orcid":false,"given":"Peng","family":"Cheng","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3155-3145","authenticated-orcid":false,"given":"Jiming","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"},{"name":"Hangzhou Dianzi University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7208-3392","authenticated-orcid":false,"given":"Zhikun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"ACM Computing Surveys","author":"Afsar M. M.","year":"2022","unstructured":"M. M. Afsar, T. Crump, and B. Far. Reinforcement Learning Based Recommender Systems: A Survey. ACM Computing Surveys, 2022."},{"key":"e_1_3_2_1_2_1","volume-title":"ICML","author":"Biggio B.","year":"2012","unstructured":"B. Biggio, B. Nelson, and P. Laskov. Poisoning Attacks against Support Vector Machines. In ICML, 2012."},{"key":"e_1_3_2_1_3_1","volume-title":"ICASSP","author":"Borgnia E.","year":"2020","unstructured":"E. Borgnia, V. Cherepanova, L. H. Fowl, A. Ghiasi, J. Geiping, M. Goldblum, T. Goldstein, and A. Gupta. Strong Data Augmentation Sanitizes Poisoning and Backdoor Attacks Without an Accuracy Tradeoff. In ICASSP, 2020."},{"key":"e_1_3_2_1_4_1","volume-title":"Neurocomputing","author":"Cai K.","year":"2023","unstructured":"K. Cai, X. Zhu, and Z. Hu. Reward Poisoning Attacks in Deep Reinforcement Learning Based on Exploration Strategies. Neurocomputing, 2023."},{"key":"e_1_3_2_1_5_1","volume-title":"You Might Also Like: Privacy Risks of Collaborative Filtering","author":"Calandrino J. A.","year":"2011","unstructured":"J. A. Calandrino, A. Kilzer, A. Narayanan, E. W. Felten, and V. Shmatikov. You Might Also Like: Privacy Risks of Collaborative Filtering. In IEEE S&P, 2011."},{"key":"e_1_3_2_1_6_1","volume-title":"IEEE TIFS","author":"Chen J.","year":"2021","unstructured":"J. Chen, X. Zhang, R. Zhang, C. Wang, and L. Liu. De-Pois: An Attack-Agnostic Defense against Data Poisoning Attacks. IEEE TIFS, 2021."},{"key":"e_1_3_2_1_7_1","volume-title":"Transactions on Emerging Telecommunications Technologies","author":"Chen L.","year":"2021","unstructured":"L. Chen, Y. Xu, F. Xie, M. Huang, and Z. Zheng. Data Poisoning Attacks on Neighborhood-based Recommender Systems. Transactions on Emerging Telecommunications Technologies, 2021."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/3289600.3290999"},{"key":"e_1_3_2_1_9_1","volume-title":"Knowledge-based Systems","author":"Chen X.","year":"2023","unstructured":"X. Chen, L. Yao, J. J. McAuley, G. Zhou, and X. Wang. Deep Reinforcement Learning in Recommender Systems: A Survey and New Perspectives. Knowledge-based Systems, 2023."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1097047.1097061"},{"key":"e_1_3_2_1_11_1","volume-title":"NDSS","author":"Du L.","year":"2024","unstructured":"L. Du, M. Chen, M. Sun, S. Ji, P. Cheng, J. Chen, and Z. Zhang. ORL-Auditor: Dataset Auditing in Offline Deep Reinforcement Learning. In NDSS, 2024."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/3460120.3485668"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.14778\/3594512.3594520"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/3366423.3380072"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/3274694.3274706"},{"key":"e_1_3_2_1_16_1","volume-title":"A Deep Reinforcement Learning Recommender System With Multiple Policies for Recommendations","author":"Fu M.","year":"2023","unstructured":"M. Fu, L. Huang, A. Rao, A. A. Irissappane, J. Zhang, and H. Qu. A Deep Reinforcement Learning Recommender System With Multiple Policies for Recommendations. IEEE TII, 2023."},{"key":"e_1_3_2_1_17_1","volume-title":"USENIX Security","author":"Gong N. Z.","year":"2016","unstructured":"N. Z. Gong and B. Liu. You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors. In USENIX Security, 2016."},{"key":"e_1_3_2_1_18_1","volume-title":"Apr","author":"Hao K.","year":"2020","unstructured":"K. Hao. How Facebook Uses Machine Learning to Detect Fake Accounts, Apr 2020."},{"key":"e_1_3_2_1_19_1","volume-title":"ACM TIIS","author":"Harper F. M.","year":"2015","unstructured":"F. M. Harper and J. A. Konstan. The MovieLens Datasets: History and Context. ACM TIIS, 2015."},{"key":"e_1_3_2_1_20_1","volume-title":"Emergence of Locomotion Behaviours in Rich Environments. CoRR, abs\/1707.02286","author":"Heess N.","year":"2017","unstructured":"N. Heess, D. TB, S. Sriram, J. Lemmon, J. Merel, G. Wayne, Y. Tassa, T. Erez, Z. Wang, S. M. A. Eslami, M. A. Riedmiller, and D. Silver. Emergence of Locomotion Behaviours in Rich Environments. CoRR, abs\/1707.02286, 2017."},{"key":"e_1_3_2_1_21_1","volume-title":"SIGKDD","author":"Huai M.","year":"2020","unstructured":"M. Huai, J. Sun, R. Cai, L. Yao, and A. Zhang. Malicious Attacks against Deep Reinforcement Learning Interpretations. In SIGKDD, 2020."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.14722\/ndss.2021.24525"},{"key":"e_1_3_2_1_23_1","volume-title":"IJARCS","author":"Kapoor S.","year":"2017","unstructured":"S. Kapoor, V. Kapoor, and R. Kumar. A Review of Attacks and Its Detection Attributes on Collaborative Recommender Systems. IJARCS, 2017."},{"key":"e_1_3_2_1_24_1","volume-title":"NeuIPS","author":"Konda V. R.","year":"1999","unstructured":"V. R. Konda and J. N. Tsitsiklis. Actor-Critic Algorithms. In NeuIPS, 1999."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1073\/pnas.1218772110"},{"key":"e_1_3_2_1_26_1","volume-title":"NeuIPS","author":"Li B.","year":"2016","unstructured":"B. Li, Y. Wang, A. Singh, and Y. Vorobeychik. Data Poisoning Attacks on Factorization-based Collaborative Filtering. In NeuIPS, 2016."},{"key":"e_1_3_2_1_27_1","volume-title":"Continuous Control with Deep Reinforcement Learning. CoRR, abs\/1509.02971","author":"Lillicrap T. P.","year":"2015","unstructured":"T. P. Lillicrap, J. J. Hunt, A. Pritzel, N. Heess, T. Erez, Y. Tassa, D. Silver, and D. Wierstra. Continuous Control with Deep Reinforcement Learning. CoRR, abs\/1509.02971, 2015."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/3340531.3411884"},{"key":"e_1_3_2_1_29_1","volume-title":"Shilling Black-box Recommender Systems by Learning to Generate Fake User Profiles. CoRR, abs\/2206.11433","author":"Lin C.","year":"2022","unstructured":"C. Lin, S. Chen, M. Zeng, S. Zhang, M. Gao, and H. Li. Shilling Black-box Recommender Systems by Learning to Generate Fake User Profiles. CoRR, abs\/2206.11433, 2022."},{"key":"e_1_3_2_1_30_1","volume-title":"IEEE TNNLS","author":"Lin Y.-C. A.","year":"2021","unstructured":"Y.-C. A. Lin, Y. Liu, F. Lin, P. Wu, W. Zeng, and C. Miao. A Survey on Reinforcement Learning for Recommender Systems. IEEE TNNLS, 2021."},{"key":"e_1_3_2_1_31_1","volume-title":"WSDM","author":"Liu F.","year":"2020","unstructured":"F. Liu, H. Guo, X. Li, R. Tang, Y. Ye, and X. He. End-to-End Deep Reinforcement Learning Based Recommendation with Supervised Embedding. In WSDM, 2020."},{"key":"e_1_3_2_1_32_1","volume-title":"Deep Reinforcement Learning based Recommendation with Explicit User-Item Interactions Modeling. CoRR, abs\/1810.12027","author":"Liu F.","year":"2018","unstructured":"F. Liu, R. Tang, X. Li, Y. Ye, H. Chen, H. Guo, and Y. Zhang. Deep Reinforcement Learning based Recommendation with Explicit User-Item Interactions Modeling. CoRR, abs\/1810.12027, 2018."},{"key":"e_1_3_2_1_33_1","volume-title":"SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems. CoRR, abs\/2402.03741","author":"Ma O.","year":"2024","unstructured":"O. Ma, Y. Pu, L. Du, Y. Dai, R. Wang, X. Liu, Y. Wu, and S. Ji. SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems. CoRR, abs\/2402.03741, 2024."},{"key":"e_1_3_2_1_34_1","volume-title":"ACM RecSys","author":"Marlin B. M.","year":"2009","unstructured":"B. M. Marlin and R. S. Zemel. Collaborative Prediction and Ranking with Non-Random Missing Data. In ACM RecSys, 2009."},{"key":"e_1_3_2_1_35_1","volume-title":"ICML","author":"Mnih V.","year":"2016","unstructured":"V. Mnih, A. P. Badia, M. Mirza, A. Graves, T. P. Lillicrap, T. Harley, D. Silver, and K. Kavukcuoglu. Asynchronous Methods for Deep Reinforcement Learning. In ICML, 2016."},{"key":"e_1_3_2_1_36_1","volume-title":"Playing Atari with Deep Reinforcement Learning. CoRR, abs\/1312.5602","author":"Mnih V.","year":"2013","unstructured":"V. Mnih, K. Kavukcuoglu, D. Silver, A. Graves, I. Antonoglou, D. Wierstra, and M. A. Riedmiller. Playing Atari with Deep Reinforcement Learning. CoRR, abs\/1312.5602, 2013."},{"key":"e_1_3_2_1_37_1","volume-title":"ACM TOIT","author":"Mobasher B.","year":"2007","unstructured":"B. Mobasher, R. Burke, R. Bhaumik, and C. Williams. Toward Trustworthy Recommender Systems: An Analysis of Attack Models and Algorithm Robustness. ACM TOIT, 2007."},{"key":"e_1_3_2_1_38_1","volume-title":"Attacks and Remedies in Collaborative Recommendation","author":"Mobasher B.","year":"2007","unstructured":"B. Mobasher, R. D. Burke, R. Bhaumik, and J. J. Sandvig. Attacks and Remedies in Collaborative Recommendation. IEEE Intelligent Systems, 2007."},{"key":"e_1_3_2_1_39_1","volume-title":"ACM TIS","author":"Thanh T. Nguyen","year":"2023","unstructured":"T. Nguyen Thanh, N. D. K. Quach, T. T. Nguyen, T. T. Huynh, V. H. Vu, P. L. Nguyen, J. Jo, and Q. V. H. Nguyen. Poisoning GNN-based Recommender Systems with Generative Surrogate-based Attacks. ACM TIS, 2023."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.18653\/v1\/D19-1018"},{"key":"e_1_3_2_1_41_1","volume-title":"ACM TOIT","author":"O'Mahony M. P.","year":"2004","unstructured":"M. P. O'Mahony, N. J. Hurley, N. Kushmerick, and G. C. M. Silvestre. Collaborative Recommendation: A Robustness Analysis. ACM TOIT, 2004."},{"key":"e_1_3_2_1_42_1","volume-title":"AAAI","author":"O'Mahony M. P.","year":"2005","unstructured":"M. P. O'Mahony, N. J. Hurley, and G. C. Silvestre. Recommender Systems: Attack Types and Strategies. In AAAI, 2005."},{"key":"e_1_3_2_1_43_1","volume-title":"MEICI","author":"Pi H.","year":"2018","unstructured":"H. Pi, Z. Ji, and C. Yang. A Survey of Recommender System from Data Sources Perspective. In MEICI, 2018."},{"key":"e_1_3_2_1_44_1","volume-title":"Security of Industrial Robots: Vulnerabilities, Attacks, and Mitigations","author":"Pu H.","year":"2023","unstructured":"H. Pu, L. He, P. Cheng, M. Sun, and J. Chen. Security of Industrial Robots: Vulnerabilities, Attacks, and Mitigations. IEEE Network, 2023."},{"key":"e_1_3_2_1_45_1","volume-title":"Poisoning Deep Learning based Recommender Model in Federated Learning Scenarios. CoRR, abs\/2204.13594","author":"Rong D.","year":"2022","unstructured":"D. Rong, Q. He, and J. Chen. Poisoning Deep Learning based Recommender Model in Federated Learning Scenarios. CoRR, abs\/2204.13594, 2022."},{"key":"e_1_3_2_1_46_1","volume-title":"Proximal Policy Optimization Algorithms. CoRR, abs\/1707.06347","author":"Schulman J.","year":"2017","unstructured":"J. Schulman, F. Wolski, P. Dhariwal, A. Radford, and O. Klimov. Proximal Policy Optimization Algorithms. CoRR, abs\/1707.06347, 2017."},{"key":"e_1_3_2_1_47_1","volume-title":"Nature","author":"Silver D.","year":"2017","unstructured":"D. Silver, J. Schrittwieser, K. Simonyan, I. Antonoglou, A. Huang, A. Guez, T. Hubert, L. Baker, M. Lai, A. Bolton, Y. Chen, T. P. Lillicrap, F. Hui, L. Sifre, G. van den Driessche, T. Graepel, and D. Hassabis. Mastering the Game of Go without Human Knowledge. Nature, 2017."},{"key":"e_1_3_2_1_48_1","volume-title":"Data Poisoning Attacks on Federated Machine Learning","author":"Sun G.","year":"2020","unstructured":"G. Sun, Y. Cong, J. Dong, Q. Wang, and J. Liu. Data Poisoning Attacks on Federated Machine Learning. IEEE IoTJ, 2020."},{"key":"e_1_3_2_1_49_1","volume-title":"Jan","author":"Tytunovich G.","year":"2022","unstructured":"G. Tytunovich. Council Post: The Great Contamination: How Bots and Fake Users can Skew an Organization's Data and Analytics, Jan 2022."},{"key":"e_1_3_2_1_50_1","volume-title":"NeuIPS","author":"Vaswani A.","year":"2017","unstructured":"A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, L. Kaiser, and I. Polosukhin. Attention is All you Need. In NeuIPS, 2017."},{"key":"e_1_3_2_1_51_1","volume-title":"USENIX Security","author":"Wang H.","year":"2023","unstructured":"H. Wang, Z. Zhang, T. Wang, S. He, M. Backes, J. Chen, and Y. Zhang. PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Model. In USENIX Security, 2023."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_52_1","DOI":"10.1145\/3460120.3484750"},{"key":"e_1_3_2_1_54_1","volume-title":"ACM CCS","author":"Wei C.","year":"2023","unstructured":"C. Wei, M. Zhao, Z. Zhang, M. Chen, W. Meng, B. Liu, Y. Fan, and W. Chen. DPMLBench: Holistic Evaluation of Differentially Private Machine Learning. In ACM CCS, 2023."},{"key":"e_1_3_2_1_55_1","volume-title":"Machine Learning","author":"Williams R. J.","year":"1992","unstructured":"R. J. Williams. Simple Statistical Gradient-Following Algorithms for Connectionist Reinforcement Learning. Machine Learning, 1992."},{"key":"e_1_3_2_1_56_1","volume-title":"USENIX Security","author":"Xing X.","year":"2013","unstructured":"X. Xing, W. Meng, D. Doozan, A. C. Snoeren, N. Feamster, and W. Lee. Take This Personally: Pollution Attacks on Personalized Services. In USENIX Security, 2013."},{"key":"e_1_3_2_1_57_1","first-page":"5459","volume-title":"ICML","author":"Xu T.","year":"2018","unstructured":"T. Xu, Q. Liu, L. Zhao, and J. Peng. Learning to Explore via Meta-Policy Gradient. In ICML, pages 5459--5468, 2018."},{"key":"e_1_3_2_1_58_1","volume-title":"Efficient Reward Poisoning Attacks on Online Deep Reinforcement Learning. CoRR, abs\/2205.14842","author":"Xu Y.","year":"2022","unstructured":"Y. Xu, Q. Zeng, and G. Singh. Efficient Reward Poisoning Attacks on Online Deep Reinforcement Learning. CoRR, abs\/2205.14842, 2022."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_59_1","DOI":"10.14722\/ndss.2017.23020"},{"key":"e_1_3_2_1_60_1","volume":"9","author":"Yang Z.","unstructured":"Z. Yang, L. He, H. Yu, C. Zhao, P. Cheng, and J. Chen. Detecting PLC Intrusions Using Control Invariants. IEEE Internet of Things Journal, 9, 2022.","journal-title":"Things Journal"},{"key":"e_1_3_2_1_61_1","volume-title":"ACM SenSys","author":"Yang Z.","year":"2022","unstructured":"Z. Yang, L. He, H. Yu, C. Zhao, P. Cheng, and J. Chen. Reverse Engineering Physical Semantics of PLC Program Variables Using Control Invariants. In ACM SenSys, 2022."},{"key":"e_1_3_2_1_62_1","volume-title":"USENIX Security","author":"Yuan Q.","year":"2023","unstructured":"Q. Yuan, Z. Zhang, L. Du, M. Chen, P. Cheng, and M. Sun. PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information. In USENIX Security, 2023."},{"key":"e_1_3_2_1_63_1","volume-title":"ACM ASIACCS","author":"Zeng Y.","year":"2020","unstructured":"Y. Zeng, H. Qiu, S. Guo, T. Zhang, M. Qiu, and B. M. Thuraisingham. DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation. In ACM ASIACCS, 2020."},{"key":"e_1_3_2_1_64_1","volume-title":"ICRA","author":"Zhang M.","year":"2016","unstructured":"M. Zhang, Z. McCarthy, C. Finn, S. Levine, and P. Abbeel. Learning Deep Neural Network Policies with Continuous Memory States. In ICRA, 2016."},{"key":"e_1_3_2_1_65_1","volume-title":"ICML","author":"Zhang X.","year":"2020","unstructured":"X. Zhang, Y. Ma, A. Singla, and X. Zhu. Adaptive Reward-Poisoning Attacks against Reinforcement Learning. In ICML, 2020."},{"key":"e_1_3_2_1_66_1","volume-title":"ACM CCS","author":"Zhang Y.","year":"2021","unstructured":"Y. Zhang, X. Yuan, J. Li, J. Lou, L. Chen, and N.-F. Tzeng. Reverse Attack: Black-box Attacks on Collaborative Recommendation. In ACM CCS, 2021."},{"key":"e_1_3_2_1_67_1","volume-title":"ACM CCS","author":"Zhang Z.","year":"2018","unstructured":"Z. Zhang, T. Wang, N. Li, S. He, and J. Chen. CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy. In ACM CCS, 2018."},{"key":"e_1_3_2_1_68_1","volume-title":"USENIX Security","author":"Zhang Z.","year":"2021","unstructured":"Z. Zhang, T. Wang, N. Li, J. Honorio, M. Backes, S. He, J. Chen, and Y. Zhang. PrivSyn: Differentially Private Data Synthesis. In USENIX Security, 2021."},{"key":"e_1_3_2_1_69_1","volume":"201","author":"Zheng G.","unstructured":"G. Zheng, F. Zhang, Z. Zheng, Y. Xiang, N. J. Yuan, X. Xie, and Z. Li. DRN: A Deep Reinforcement Learning Framework for News Recommendation. In WWW, 2018.","journal-title":"News Recommendation. In WWW"},{"key":"e_1_3_2_1_70_1","volume-title":"IEEE TIFS","author":"Zhu H.","year":"2023","unstructured":"H. Zhu, M. Liu, C. Fang, R. Deng, and P. Cheng. Detection-Performance Tradeoff for Watermarking in Industrial Control Systems. IEEE TIFS, 2023."}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"ASIA CCS '24","name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","location":"Singapore Singapore"},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3637660","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:06Z","timestamp":1750290246000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3637660"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":69,"alternative-id":["10.1145\/3634737.3637660","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3637660","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}