{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:30:09Z","timestamp":1760711409986,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T00:00:00Z","timestamp":1724457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CCF-Tencent Rhino-Bird Open Research Fund"},{"name":"Zhejiang Province 'LingYan Research and Development Plan Project","award":["2024C01114"],"award-info":[{"award-number":["2024C01114"]}]},{"name":"Joint Funds of the Zhejiang Provincial Natural Science Foundation of China","award":["LHZSD24F020001"],"award-info":[{"award-number":["LHZSD24F020001"]}]},{"name":"Zhejiang Province High-Level Talents Special Support Program 'Leading Talent of Technological Innovation of Ten-Thousands Talents Program","award":["2022R52046"],"award-info":[{"award-number":["2022R52046"]}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62206056, 72271059, 92270121, 62322606, 62441605, 72101007"],"award-info":[{"award-number":["62206056, 72271059, 92270121, 62322606, 62441605, 72101007"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"SMP-IDATA Open Youth Fund"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,25]]},"DOI":"10.1145\/3637528.3672013","type":"proceedings-article","created":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T04:54:55Z","timestamp":1724561695000},"page":"4059-4070","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Unveiling Privacy Vulnerabilities: Investigating the Role of Structure in Graph Data"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-9570-2154","authenticated-orcid":false,"given":"Hanyang","family":"Yuan","sequence":"first","affiliation":[{"name":"Zhejiang University &amp; Fudan University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2973-1889","authenticated-orcid":false,"given":"Jiarong","family":"Xu","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5300-0122","authenticated-orcid":false,"given":"Cong","family":"Wang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4995-7085","authenticated-orcid":false,"given":"Ziqi","family":"Yang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3841-1919","authenticated-orcid":false,"given":"Chunping","family":"Wang","sequence":"additional","affiliation":[{"name":"Finvolution Group, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9674-4132","authenticated-orcid":false,"given":"Keting","family":"Yin","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5058-4417","authenticated-orcid":false,"given":"Yang","family":"Yang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2024,8,24]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"international conference on machine learning. PMLR, 21--29","author":"Abu-El-Haija Sami","year":"2019","unstructured":"Sami Abu-El-Haija, Bryan Perozzi, Amol Kapoor, Nazanin Alipourfard, Kristina Lerman, Hrayr Harutyunyan, Greg Ver Steeg, and Aram Galstyan. 2019. Mixhop: Higher-order graph convolutional architectures via sparsified neighborhood mixing. In international conference on machine learning. PMLR, 21--29."},{"key":"e_1_3_2_2_2_1","volume-title":"Theodore L Willke, Rong Zhou, Xiangnan Kong, and Hoda Eldardiry.","author":"Ahmed Nesreen K","year":"2018","unstructured":"Nesreen K Ahmed, Ryan Rossi, John Boaz Lee, Theodore L Willke, Rong Zhou, Xiangnan Kong, and Hoda Eldardiry. 2018. Learning role-based graph embeddings. arXiv preprint arXiv:1802.02896 (2018)."},{"key":"e_1_3_2_2_3_1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media","volume":"6","author":"Zamal Faiyaz Al","year":"2012","unstructured":"Faiyaz Al Zamal, Wendy Liu, and Derek Ruths. 2012. Homophily and latent attribute inference: Inferring latent attributes of twitter users from neighbors. In Proceedings of the International AAAI Conference on Web and Social Media, Vol. 6. 387--390."},{"key":"e_1_3_2_2_4_1","volume-title":"International Conference on Machine Learning. PMLR, 695--704","author":"Bojchevski Aleksandar","year":"2019","unstructured":"Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Adversarial attacks on node embeddings via graph poisoning. In International Conference on Machine Learning. PMLR, 695--704."},{"key":"e_1_3_2_2_5_1","first-page":"577","article-title":"Collective data-sanitization for preventing sensitive information inference attacks in social networks","volume":"15","author":"Cai Zhipeng","year":"2016","unstructured":"Zhipeng Cai, Zaobo He, Xin Guan, and Yingshu Li. 2016. Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Transactions on Dependable and Secure Computing, Vol. 15, 4 (2016), 577--590.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-013-0344-8"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3197390"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437963.3441752"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3197554"},{"key":"e_1_3_2_2_10_1","volume-title":"Gaurav Aggarwal, and Prateek Jain.","author":"Daigavane Ameya","year":"2021","unstructured":"Ameya Daigavane, Gagan Madan, Aditya Sinha, Abhradeep Guha Thakurta, Gaurav Aggarwal, and Prateek Jain. 2021. Node-level differentially private graph neural networks. arXiv preprint arXiv:2111.15521 (2021)."},{"key":"e_1_3_2_2_11_1","volume-title":"Kim-Kwang Raymond Choo, and Hai Jin","author":"Ding Xiaofeng","year":"2019","unstructured":"Xiaofeng Ding, Cui Wang, Kim-Kwang Raymond Choo, and Hai Jin. 2019. A novel privacy preserving framework for large scale graph data publishing. IEEE transactions on knowledge and data engineering, Vol. 33, 2 (2019), 331--343."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623703"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Vasisht Duddu Antoine Boutet and Virat Shejwalkar. 2020. Quantifying privacy leakage in graph embedding. In MobiQuitous 2020--17th EAI International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services. 76--85.","DOI":"10.1145\/3448891.3448939"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2015.2430819"},{"key":"e_1_3_2_2_15_1","volume-title":"Inductive representation learning on large graphs. Advances in neural information processing systems","author":"Hamilton Will","year":"2017","unstructured":"Will Hamilton, Zhitao Ying, and Jure Leskovec. 2017. Inductive representation learning on large graphs. Advances in neural information processing systems, Vol. 30 (2017)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339723"},{"key":"e_1_3_2_2_17_1","volume-title":"Netfense: Adversarial defenses against privacy attacks on neural networks for graph data","author":"Hsieh Chung","year":"2021","unstructured":"I-Chung Hsieh and Cheng-Te Li. 2021. Netfense: Adversarial defenses against privacy attacks on neural networks for graph data. IEEE Transactions on Knowledge and Data Engineering (2021)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242594"},{"key":"e_1_3_2_2_19_1","volume-title":"Graph meta learning via local subgraphs. Advances in neural information processing systems","author":"Huang Kexin","year":"2020","unstructured":"Kexin Huang and Marinka Zitnik. 2020. Graph meta learning via local subgraphs. Advances in neural information processing systems, Vol. 33 (2020), 5862--5874."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.3191268"},{"key":"e_1_3_2_2_21_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Jia Jinyuan","year":"2018","unstructured":"Jinyuan Jia and Neil Zhenqiang Gong. 2018. $$AttriGuard$$: A practical defense against attribute inference attacks via adversarial machine learning. In 27th USENIX Security Symposium (USENIX Security 18). 513--529."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052695"},{"key":"e_1_3_2_2_23_1","unstructured":"Zhimeng Jiang Xiaotian Han Chao Fan Zirui Liu Xiao Huang Na Zou Ali Mostafavi and Xia Hu. 2022. Topology Matters in Fair Graph Learning: a Theoretical Pilot Study. (2022)."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2022.4614"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3633518"},{"key":"e_1_3_2_2_26_1","volume-title":"Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_3_2_2_27_1","volume-title":"Inferring user preferences by probabilistic logical reasoning over social networks. arXiv preprint arXiv:1411.2679","author":"Li Jiwei","year":"2014","unstructured":"Jiwei Li, Alan Ritter, and Dan Jurafsky. 2014. Inferring user preferences by probabilistic logical reasoning over social networks. arXiv preprint arXiv:1411.2679 (2014)."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3036583"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632951.2632953"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557079"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.11.083"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Junlong Liao Wenda Fu Cong Wang Zhongyu Wei and Jiarong Xu. 2024. Value at Adversarial Risk: A Graph Defense Strategy Against Cost-Aware Attacks. (2024).","DOI":"10.1609\/aaai.v38i12.29282"},{"key":"e_1_3_2_2_33_1","first-page":"20887","article-title":"Large scale learning on non-homophilous graphs: New benchmarks and strong simple methods","volume":"34","author":"Lim Derek","year":"2021","unstructured":"Derek Lim, Felix Hohne, Xiuyu Li, Sijia Linda Huang, Vaishnavi Gupta, Omkar Bhalerao, and Ser Nam Lim. 2021. Large scale learning on non-homophilous graphs: New benchmarks and strong simple methods. Advances in Neural Information Processing Systems, Vol. 34 (2021), 20887--20902.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_34_1","volume-title":"The Eleventh International Conference on Learning Representations.","author":"Ling Hongyi","year":"2022","unstructured":"Hongyi Ling, Zhimeng Jiang, Youzhi Luo, Shuiwang Ji, and Na Zou. 2022. Learning fair graph representations via automated data augmentations. In The Eleventh International Conference on Learning Representations."},{"key":"e_1_3_2_2_35_1","volume-title":"Beyond Worst-case Attacks: Robust RL with Adaptive Defense via Non-dominated Policies. arXiv preprint arXiv:2402.12673","author":"Liu Xiangyu","year":"2024","unstructured":"Xiangyu Liu, Chenghao Deng, Yanchao Sun, Yongyuan Liang, and Furong Huang. 2024. Beyond Worst-case Attacks: Robust RL with Adaptive Defense via Non-dominated Policies. arXiv preprint arXiv:2402.12673 (2024)."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539483"},{"key":"e_1_3_2_2_37_1","volume-title":"The concrete distribution: A continuous relaxation of discrete random variables. arXiv preprint arXiv:1611.00712","author":"Maddison Chris J","year":"2016","unstructured":"Chris J Maddison, Andriy Mnih, and Yee Whye Teh. 2016. The concrete distribution: A continuous relaxation of discrete random variables. arXiv preprint arXiv:1611.00712 (2016)."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11131931"},{"key":"e_1_3_2_2_39_1","volume-title":"Anonymization techniques for privacy preserving data publishing: A comprehensive survey","author":"Majeed Abdul","year":"2020","unstructured":"Abdul Majeed and Sungchang Lee. 2020. Anonymization techniques for privacy preserving data publishing: A comprehensive survey. IEEE access, Vol. 9 (2020), 8512--8545."},{"key":"e_1_3_2_2_40_1","volume-title":"Birds of a feather: Homophily in social networks. Annual review of sociology","author":"McPherson Miller","year":"2001","unstructured":"Miller McPherson, Lynn Smith-Lovin, and James M Cook. 2001. Birds of a feather: Homophily in social networks. Annual review of sociology, Vol. 27, 1 (2001), 415--444."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718519"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/09537287.2020.1810764"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871487"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00249"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871985.1871993"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098061"},{"key":"e_1_3_2_2_47_1","volume-title":"Aur\u00e9lien Bellet, and Daniel Gatica-Perez.","author":"Sajadmanesh Sina","year":"2023","unstructured":"Sina Sajadmanesh, Ali Shahin Shamsabadi, Aur\u00e9lien Bellet, and Daniel Gatica-Perez. 2023. Gap: Differentially private graph neural networks with aggregation perturbation. In USENIX Security 2023--32nd USENIX Security Symposium."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2015.2442227"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3009908"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467373"},{"key":"e_1_3_2_2_51_1","volume-title":"Graph attention networks. arXiv preprint arXiv:1710.10903","author":"Velivckovi\u0107 Petar","year":"2017","unstructured":"Petar Velivckovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2017. Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467273"},{"key":"e_1_3_2_2_53_1","volume-title":"Safety in Graph Machine Learning: Threats and Safeguards. arXiv preprint arXiv:2405.11034","author":"Wang Song","year":"2024","unstructured":"Song Wang, Yushun Dong, Binchi Zhang, Zihan Chen, Xingbo Fu, Yinhan He, Cong Shen, Chuxu Zhang, Nitesh V Chawla, and Jundong Li. 2024. Safety in Graph Machine Learning: Threats and Safeguards. arXiv preprint arXiv:2405.11034 (2024)."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401144"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i4.20350"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i4.20349"},{"key":"e_1_3_2_2_58_1","first-page":"810","article-title":"Netrl: Task-aware network denoising via deep reinforcement learning","volume":"35","author":"Xu Jiarong","year":"2021","unstructured":"Jiarong Xu, Yang Yang, Shiliang Pu, Yao Fu, Jun Feng, Weihao Jiang, Jiangang Lu, and Chunping Wang. 2021. Netrl: Task-aware network denoising via deep reinforcement learning. IEEE Transactions on Knowledge and Data Engineering, Vol. 35, 1 (2021), 810--823.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_2_59_1","first-page":"3507","article-title":"Robust network enhancement from flawed networks","volume":"34","author":"Xu Jiarong","year":"2020","unstructured":"Jiarong Xu, Yang Yang, Chunping Wang, Zongtao Liu, Jing Zhang, Lei Chen, and Jiangang Lu. 2020. Robust network enhancement from flawed networks. IEEE Transactions on Knowledge and Data Engineering, Vol. 34, 7 (2020), 3507--3520.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_2_60_1","volume-title":"How powerful are graph neural networks? arXiv preprint arXiv:1810.00826","author":"Xu Keyulu","year":"2018","unstructured":"Keyulu Xu, Weihua Hu, Jure Leskovec, and Stefanie Jegelka. 2018. How powerful are graph neural networks? arXiv preprint arXiv:1810.00826 (2018)."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2747643"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512069"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3047124"},{"key":"e_1_3_2_2_64_1","first-page":"28877","article-title":"Do transformers really perform badly for graph representation","volume":"34","author":"Ying Chengxuan","year":"2021","unstructured":"Chengxuan Ying, Tianle Cai, Shengjie Luo, Shuxin Zheng, Guolin Ke, Di He, Yanming Shen, and Tie-Yan Liu. 2021. Do transformers really perform badly for graph representation? Advances in Neural Information Processing Systems, Vol. 34 (2021), 28877--28888.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3545797","article-title":"MLI: A Multi-level Inference Mechanism for User Attributes in Social Networks","volume":"41","author":"Zhang Hang","year":"2022","unstructured":"Hang Zhang, Yajun Yang, Xin Wang, Hong Gao, and Qinghua Hu. 2022. MLI: A Multi-level Inference Mechanism for User Attributes in Social Networks. ACM Transactions on Information Systems, Vol. 41, 2 (2022), 1--30.","journal-title":"ACM Transactions on Information Systems"},{"key":"e_1_3_2_2_66_1","volume-title":"Graph robustness benchmark: Benchmarking the adversarial robustness of graph machine learning. arXiv preprint arXiv:2111.04314","author":"Zheng Qinkai","year":"2021","unstructured":"Qinkai Zheng, Xu Zou, Yuxiao Dong, Yukuo Cen, Da Yin, Jiarong Xu, Yang Yang, and Jie Tang. 2021. Graph robustness benchmark: Benchmarking the adversarial robustness of graph machine learning. arXiv preprint arXiv:2111.04314 (2021)."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym14122531"},{"key":"e_1_3_2_2_68_1","volume-title":"Beyond homophily in graph neural networks: Current limitations and effective designs. Advances in neural information processing systems","author":"Zhu Jiong","year":"2020","unstructured":"Jiong Zhu, Yujun Yan, Lingxiao Zhao, Mark Heimann, Leman Akoglu, and Danai Koutra. 2020. Beyond homophily in graph neural networks: Current limitations and effective designs. Advances in neural information processing systems, Vol. 33 (2020), 7793--7804."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1109\/TIFS.2014.2368363","article-title":"Correlated differential privacy: Hiding information in non-IID data set","volume":"10","author":"Zhu Tianqing","year":"2014","unstructured":"Tianqing Zhu, Ping Xiong, Gang Li, and Wanlei Zhou. 2014. Correlated differential privacy: Hiding information in non-IID data set. IEEE Transactions on Information Forensics and Security, Vol. 10, 2 (2014), 229--242.","journal-title":"IEEE Transactions on Information Forensics and Security"}],"event":{"name":"KDD '24: The 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Barcelona Spain","acronym":"KDD '24"},"container-title":["Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3672013","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637528.3672013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:06Z","timestamp":1750291566000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3672013"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,24]]},"references-count":69,"alternative-id":["10.1145\/3637528.3672013","10.1145\/3637528"],"URL":"https:\/\/doi.org\/10.1145\/3637528.3672013","relation":{},"subject":[],"published":{"date-parts":[[2024,8,24]]},"assertion":[{"value":"2024-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}