{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T06:05:07Z","timestamp":1750831507489,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":72,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,15]]},"DOI":"10.1145\/3643916.3644424","type":"proceedings-article","created":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T12:40:20Z","timestamp":1718282420000},"page":"190-201","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Understanding Regular Expression Denial of Service (ReDoS): Insights from LLM-Generated Regexes and Developer Forums"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7984-3611","authenticated-orcid":false,"given":"Mohammed Latif","family":"Siddiq","sequence":"first","affiliation":[{"name":"University of Notre Dame, Notre Dame, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8379-6871","authenticated-orcid":false,"given":"Jiahao","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Notre Dame, Notre Dame, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8743-2516","authenticated-orcid":false,"given":"Joanna Cecilia Da Silva","family":"Santos","sequence":"additional","affiliation":[{"name":"University of Notre Dame, Notre Dame, Indiana, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,6,13]]},"reference":[{"unstructured":"2022. GitHub Copilot. Accessed Dec 7 2022. https:\/\/github.com\/features\/copilot","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","first-page":"2023","article-title":"Chat completions","volume":"25","year":"2023","unstructured":"2023. Chat completions. Accessed Mar 25, 2023. https:\/\/platform.openai.com\/docs\/guides\/chat","journal-title":"Accessed Mar"},{"volume-title":"Common Vulnerabilities and Exposures (CVE). https:\/\/cve.mitre.org\/index.html [Online","year":"2023","unstructured":"2023. Common Vulnerabilities and Exposures (CVE). https:\/\/cve.mitre.org\/index.html [Online; accessed 11. Sep. 2023].","key":"e_1_3_2_1_3_1"},{"volume-title":"CWE - CWE-1333: Inefficient Regular Expression Complexity (4.13). https:\/\/cwe.mitre.org\/data\/definitions\/1333.html [Online","year":"2023","unstructured":"2023. CWE - CWE-1333: Inefficient Regular Expression Complexity (4.13). https:\/\/cwe.mitre.org\/data\/definitions\/1333.html [Online; accessed 6. Nov. 2023].","key":"e_1_3_2_1_4_1"},{"volume-title":"https:\/\/platform.openai.com\/docs\/models\/gpt-3-5 [Online","year":"2023","unstructured":"2023. GPT-3.5. https:\/\/platform.openai.com\/docs\/models\/gpt-3-5 [Online; accessed 11. Sep. 2023].","key":"e_1_3_2_1_5_1"},{"volume-title":"re2. https:\/\/github.com\/google\/re2 [Online","year":"2023","unstructured":"2023. re2. https:\/\/github.com\/google\/re2 [Online; accessed 5. Nov. 2023].","key":"e_1_3_2_1_6_1"},{"volume-title":"ReDoS checker | Devina.io. https:\/\/devina.io\/redos-checker [Online","year":"2023","unstructured":"2023. ReDoS checker | Devina.io. https:\/\/devina.io\/redos-checker [Online; accessed 5. Nov. 2023].","key":"e_1_3_2_1_7_1"},{"volume-title":"Regular Expression Library. https:\/\/regexlib.com [Online","year":"2023","unstructured":"2023. Regular Expression Library. https:\/\/regexlib.com [Online; accessed 11. Sep. 2023].","key":"e_1_3_2_1_8_1"},{"volume-title":"Stack Exchange API. https:\/\/api.stackexchange.com [Online","year":"2023","unstructured":"2023. Stack Exchange API. https:\/\/api.stackexchange.com [Online; accessed 11. Sep. 2023].","key":"e_1_3_2_1_9_1"},{"volume-title":"Outage Postmortem -","year":"2016","unstructured":"2024. Outage Postmortem - July 20, 2016. https:\/\/stackstatus.tumblr.com\/post\/147710624694\/outage-postmortem-july-20-2016 [Online; accessed 23. Jan. 2024].","key":"e_1_3_2_1_10_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/3524842.3527959"},{"key":"e_1_3_2_1_12_1","volume-title":"Is GitHub's copilot as bad as humans at introducing vulnerabilities in code? arXiv preprint arXiv:2204.04741","author":"Asare Owura","year":"2022","unstructured":"Owura Asare, Meiyappan Nagappan, and N Asokan. 2022. Is GitHub's copilot as bad as humans at introducing vulnerabilities in code? arXiv preprint arXiv:2204.04741 (2022)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/3510003.3510047"},{"key":"e_1_3_2_1_14_1","volume-title":"Analyzing catastrophic backtracking behavior in practical regular expression matching. arXiv preprint arXiv:1405.5599","author":"Berglund Martin","year":"2014","unstructured":"Martin Berglund, Frank Drewes, and Brink Van Der Merwe. 2014. Analyzing catastrophic backtracking behavior in practical regular expression matching. arXiv preprint arXiv:1405.5599 (2014)."},{"key":"e_1_3_2_1_15_1","volume-title":"Lin (Eds.)","volume":"33","author":"Brown Tom","year":"2020","unstructured":"Tom Brown, Benjamin Mann, Nick Ryder, Melanie Subbiah, Jared D Kaplan, Prafulla Dhariwal, Arvind Neelakantan, Pranav Shyam, Girish Sastry, Amanda Askell, Sandhini Agarwal, Ariel Herbert-Voss, Gretchen Krueger, Tom Henighan, Rewon Child, Aditya Ramesh, Daniel Ziegler, Jeffrey Wu, Clemens Winter, Chris Hesse, Mark Chen, Eric Sigler, Mateusz Litwin, Scott Gray, Benjamin Chess, Jack Clark, Christopher Berner, Sam McCandlish, Alec Radford, Ilya Sutskever, and Dario Amodei. 2020. Language Models are Few-Shot Learners. In Advances in Neural Information Processing Systems, H. Larochelle, M. Ranzato, R. Hadsell, M.F. Balcan, and H. Lin (Eds.), Vol. 33. Curran Associates, Inc., 1877--1901."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/2931037.2931073"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/ASE.2017.8115653"},{"key":"e_1_3_2_1_18_1","volume-title":"Jared Kaplan, Harri Edwards, Yuri Burda, Nicholas Joseph, Greg Brockman, et al.","author":"Chen Mark","year":"2021","unstructured":"Mark Chen, Jerry Tworek, Heewoo Jun, Qiming Yuan, Henrique Ponde de Oliveira Pinto, Jared Kaplan, Harri Edwards, Yuri Burda, Nicholas Joseph, Greg Brockman, et al. 2021. Evaluating large language models trained on code. arXiv preprint arXiv:2107.03374 (2021)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/SP46214.2022.9833597"},{"unstructured":"Scott Crosby. 2003. Denial of service through regular expressions. (2003).","key":"e_1_3_2_1_20_1"},{"volume-title":"12th USENIX Security Symposium (USENIX Security 03)","author":"Scott","unstructured":"Scott A. Crosby and Dan S. Wallach. 2003. Denial of Service via Algorithmic Complexity Attacks. In 12th USENIX Security Symposium (USENIX Security 03). USENIX Association, Washington, D.C. https:\/\/www.usenix.org\/conference\/12th-usenix-security-symposium\/denial-service-algorithmic-complexity-attacks","key":"e_1_3_2_1_21_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/3236024.3236027"},{"key":"e_1_3_2_1_23_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Davis James C.","year":"2018","unstructured":"James C. Davis, Eric R. Williamson, and Dongyoon Lee. 2018. A Sense of Time for JavaScript and Node.js: First-Class Timeouts as a Cure for Event Handler Poisoning. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 343--359. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/davis"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/3511861.3511863"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1109\/SP46215.2023.10179442"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/568438.568455"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.18653\/v1\/2021.acl-short.51"},{"unstructured":"Nate Kushman and Regina Barzilay. 2013. Using semantic unification to generate regular expressions from natural language. North American Chapter of the Association for Computational Linguistics (NAACL).","key":"e_1_3_2_1_28_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1109\/ICST.2016.29"},{"key":"e_1_3_2_1_30_1","volume-title":"Suriya Gunasekar, and Yin Tat Lee.","author":"Li Yuanzhi","year":"2023","unstructured":"Yuanzhi Li, S\u00e9bastien Bubeck, Ronen Eldan, Allie Del Giorno, Suriya Gunasekar, and Yin Tat Lee. 2023. Textbooks Are All You Need II: phi-1.5 technical report. arXiv:2309.05463 [cs.CL]"},{"key":"e_1_3_2_1_31_1","volume-title":"ReDoSHunter: A Combined Static and Dynamic Approach for Regular Expression DoS Detection. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Li Yeting","year":"2021","unstructured":"Yeting Li, Zixuan Chen, Jialun Cao, Zhiwu Xu, Qiancheng Peng, Haiming Chen, Liyuan Chen, and Shing-Chi Cheung. 2021. ReDoSHunter: A Combined Static and Dynamic Approach for Regular Expression DoS Detection. In 30th USENIX Security Symposium (USENIX Security 21). 3847--3864."},{"key":"e_1_3_2_1_32_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Li Yeting","year":"2022","unstructured":"Yeting Li, Yecheng Sun, Zhiwu Xu, Jialun Cao, Yuekang Li, Rongchen Li, Haiming Chen, Shing-Chi Cheung, Yang Liu, and Yang Xiao. 2022. RegexScalpel: Regular Expression Denial of Service (ReDoS) Defense by Localize-and-Fix. In 31st USENIX Security Symposium (USENIX Security 22). 4183--4200."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1145\/3324884.3416556"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1109\/SP40001.2021.00062"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.18653\/v1\/D16-1197"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1109\/ASE.2019.00047"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1016\/j.jss.2023.111734"},{"unstructured":"Nadim Nachar et al. 2008. The Mann-Whitney U: A test for assessing whether two independent samples come from the same distribution. Tutorials in quantitative Methods for Psychology 4 1 (2008) 13--20.","key":"e_1_3_2_1_38_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1145\/3524842.3528470"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.18653\/v1\/D19-1677"},{"key":"e_1_3_2_1_41_1","volume-title":"Masum Hasan, Anindya Iqbal, and Joanna C. S. Santos.","author":"Paul Rishov","year":"2023","unstructured":"Rishov Paul, Md. Mohib Hossain, Mohammed Latif Siddiq, Masum Hasan, Anindya Iqbal, and Joanna C. S. Santos. 2023. Enhancing Automated Program Repair through Fine-tuning and Prompt Engineering. arXiv:2304.07840 [cs.LG]"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1109\/SP46214.2022.9833571"},{"key":"e_1_3_2_1_43_1","volume-title":"The impact of AI on developer productivity: Evidence from GitHub copilot. arXiv preprint arXiv:2302.06590","author":"Peng Sida","year":"2023","unstructured":"Sida Peng, Eirini Kalliamvakou, Peter Cihon, and Mert Demirer. 2023. The impact of AI on developer productivity: Evidence from GitHub copilot. arXiv preprint arXiv:2302.06590 (2023)."},{"key":"e_1_3_2_1_44_1","volume-title":"Do Users Write More Insecure Code with AI Assistants? arXiv preprint arXiv:2211.03622","author":"Perry Neil","year":"2022","unstructured":"Neil Perry, Megha Srivastava, Deepak Kumar, and Dan Boneh. 2022. Do Users Write More Insecure Code with AI Assistants? arXiv preprint arXiv:2211.03622 (2022)."},{"key":"e_1_3_2_1_45_1","first-page":"1","article-title":"Exploring the Limits of Transfer Learning with a Unified Text-to-Text Transformer","volume":"21","author":"Raffel Colin","year":"2020","unstructured":"Colin Raffel, Noam Shazeer, Adam Roberts, Katherine Lee, Sharan Narang, Michael Matena, Yanqi Zhou, Wei Li, and Peter J. Liu. 2020. Exploring the Limits of Transfer Learning with a Unified Text-to-Text Transformer. Journal of Machine Learning Research 21, 140 (2020), 1--67. http:\/\/jmlr.org\/papers\/v21\/20-074.html","journal-title":"Journal of Machine Learning Research"},{"volume-title":"International Encyclopedia of Statistical Science. https:\/\/api.semanticscholar.org\/CorpusID:30088448","author":"Rey Denise","unstructured":"Denise Rey and Markus Neuh\u00e4user. 2011. Wilcoxon-Signed-Rank Test. In International Encyclopedia of Statistical Science. https:\/\/api.semanticscholar.org\/CorpusID:30088448","key":"e_1_3_2_1_46_1"},{"key":"e_1_3_2_1_47_1","volume-title":"Breaking the Silence: the Threats of Using LLMs in Software Engineering. In ACM\/IEEE 46th International Conference on Software Engineering-New Ideas and Emerging Results. ACM\/IEEE.","author":"Sallou June","year":"2024","unstructured":"June Sallou, Thomas Durieux, and Annibale Panichella. 2024. Breaking the Silence: the Threats of Using LLMs in Software Engineering. In ACM\/IEEE 46th International Conference on Software Engineering-New Ideas and Emerging Results. ACM\/IEEE."},{"key":"e_1_3_2_1_48_1","volume-title":"Security Implications of Large Language Model Code Assistants: A User Study. arXiv preprint arXiv:2208.09727","author":"Sandoval Gustavo","year":"2022","unstructured":"Gustavo Sandoval, Hammond Pearce, Teo Nys, Ramesh Karri, Brendan Dolan-Gavitt, and Siddharth Garg. 2022. Security Implications of Large Language Model Code Assistants: A User Study. arXiv preprint arXiv:2208.09727 (2022)."},{"key":"e_1_3_2_1_49_1","volume-title":"Survey reveals AI's impact on the developer experience | The GitHub Blog. GitHub Blog (June","author":"Shani Inbal","year":"2023","unstructured":"Inbal Shani. 2023. Survey reveals AI's impact on the developer experience | The GitHub Blog. GitHub Blog (June 2023). https:\/\/github.blog\/2023-06-13-survey-reveals-ais-impact-on-the-developer-experience\/#methodology"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_50_1","DOI":"10.1145\/3238147.3238159"},{"key":"e_1_3_2_1_51_1","volume-title":"A Lightweight Framework for High-Quality Code Generation. arXiv preprint arXiv:2307.08220","author":"Siddiq Mohammed Latif","year":"2023","unstructured":"Mohammed Latif Siddiq, Beatrice Casey, and Joanna Santos. 2023. A Lightweight Framework for High-Quality Code Generation. arXiv preprint arXiv:2307.08220 (2023)."},{"key":"e_1_3_2_1_52_1","volume-title":"An Empirical Study of Code Smells in Transformer-based Code Generation Techniques. In 2022 IEEE 22nd International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, 71--82","author":"Siddiq Mohammed Latif","year":"2022","unstructured":"Mohammed Latif Siddiq, Shafayat H Majumder, Maisha R Mim, Sourov Jajodia, and Joanna CS Santos. 2022. An Empirical Study of Code Smells in Transformer-based Code Generation Techniques. In 2022 IEEE 22nd International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, 71--82."},{"key":"e_1_3_2_1_53_1","volume-title":"Noshin Ulfat, Fahmid Al Rifat, and Vinicius Carvalho Lopes.","author":"Siddiq Mohammed Latif","year":"2023","unstructured":"Mohammed Latif Siddiq, Joanna Santos, Ridwanul Hasan Tanvir, Noshin Ulfat, Fahmid Al Rifat, and Vinicius Carvalho Lopes. 2023. Exploring the Effectiveness of Large Language Models in Generating Unit Tests. arXiv preprint arXiv:2305.00418 (2023)."},{"key":"e_1_3_2_1_54_1","volume-title":"Santos","author":"Siddiq Mohammed Latif","year":"2023","unstructured":"Mohammed Latif Siddiq and Joanna C. S. Santos. 2023. Generate and Pray: Using SALLMS to Evaluate the Security of LLM Generated Code. arXiv:2311.00889 [cs.SE]"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_55_1","DOI":"10.1145\/3512290.3528700"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_56_1","DOI":"10.1145\/2318202.2318207"},{"key":"e_1_3_2_1_57_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Staicu Cristian-Alexandru","year":"2018","unstructured":"Cristian-Alexandru Staicu and Michael Pradel. 2018. Freezing the Web: A Study of {ReDoS} Vulnerabilities in {JavaScript-based} Web Servers. In 27th USENIX Security Symposium (USENIX Security 18). 361--376."},{"key":"e_1_3_2_1_58_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Turo\u0148ov\u00e1 Lenka","year":"2022","unstructured":"Lenka Turo\u0148ov\u00e1, Luk\u00e1\u0161 Hol\u00edk, Ivan Homoliak, Ond\u0159ej Leng\u00e1l, Margus Veanes, and Tom\u00e1\u0161 Vojnar. 2022. Counting in Regexes Considered Harmful: Exposing {ReDoS} Vulnerability of Nonbacktracking Matchers. In 31st USENIX Security Symposium (USENIX Security 22). 4165--4182."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_59_1","DOI":"10.1109\/ICSME46990.2020.00038"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_60_1","DOI":"10.1145\/3491101.3519665"},{"key":"e_1_3_2_1_61_1","volume-title":"Mini-GPTs: Efficient Large Language Models through Contextual Pruning. arXiv preprint arXiv:2312.12682","author":"Valicenti Tim","year":"2023","unstructured":"Tim Valicenti, Justice Vidal, and Ritik Patnaik. 2023. Mini-GPTs: Efficient Large Language Models through Contextual Pruning. arXiv preprint arXiv:2312.12682 (2023)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_62_1","DOI":"10.1145\/3129416.3129440"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_63_1","DOI":"10.5555\/3295222.3295349"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_64_1","DOI":"10.1145\/3611643.3616323"},{"key":"e_1_3_2_1_65_1","volume-title":"Kevin Moran, and Denys Poshyvanyk.","author":"Watson Cody","year":"2021","unstructured":"Cody Watson, Nathan Cooper, David Nader Palacio, Kevin Moran, and Denys Poshyvanyk. 2021. A Systematic Literature Review on the Use of Deep Learning in Software Engineering Research. arXiv:2009.06520 [cs.SE]"},{"unstructured":"Adar Weidman. 2022. Regular expression denial of service - redos. https:\/\/owasp.org\/www-community\/attacks\/Regular_expression_Denial_of_Service_-_ReDoS","key":"e_1_3_2_1_66_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_67_1","DOI":"10.1145\/3607185"},{"key":"e_1_3_2_1_68_1","volume-title":"Marijn JH Heule, and Isil Dillig","author":"W\u00fcstholz Valentin","year":"2017","unstructured":"Valentin W\u00fcstholz, Oswaldo Olivo, Marijn JH Heule, and Isil Dillig. 2017. Static detection of DoS vulnerabilities in programs that use regular expressions. In Tools and Algorithms for the Construction and Analysis of Systems: 23rd International Conference, TACAS 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22--29, 2017, Proceedings, Part II 23. Springer, 3--20."},{"doi-asserted-by":"crossref","unstructured":"Shuai Zhang Xiaodong Gu Yuting Chen and Beijun Shen. 2023. InfeRE: Step-by-Step Regex Generation via Chain of Inference.","key":"e_1_3_2_1_69_1","DOI":"10.1109\/ASE56229.2023.00111"},{"key":"e_1_3_2_1_70_1","volume-title":"AAAI Workshops. 791--794","author":"Zhong Zexuan","year":"2018","unstructured":"Zexuan Zhong, Jiaqi Guo, Wei Yang, Tao Xie, Jian-Guang Lou, Ting Liu, and Dongmei Zhang. 2018. Generating regular expressions from natural language specifications: Are we there yet?. In AAAI Workshops. 791--794."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_71_1","DOI":"10.1145\/3539618.3592047"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_72_1","DOI":"10.1145\/3520312.3534864"}],"event":{"sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"acronym":"ICPC '24","name":"ICPC '24: 32nd IEEE\/ACM International Conference on Program Comprehension","location":"Lisbon Portugal"},"container-title":["Proceedings of the 32nd IEEE\/ACM International Conference on Program Comprehension"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643916.3644424","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643916.3644424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:56:43Z","timestamp":1750291003000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643916.3644424"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,15]]},"references-count":72,"alternative-id":["10.1145\/3643916.3644424","10.1145\/3643916"],"URL":"https:\/\/doi.org\/10.1145\/3643916.3644424","relation":{},"subject":[],"published":{"date-parts":[[2024,4,15]]},"assertion":[{"value":"2024-06-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}