{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:48:32Z","timestamp":1775746112966,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-20-CE25-0002-01"],"award-info":[{"award-number":["ANR-20-CE25-0002-01"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3652892.3700785","type":"proceedings-article","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T19:36:13Z","timestamp":1732736173000},"page":"454-466","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Personalized Privacy-Preserving Federated Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3530-6977","authenticated-orcid":false,"given":"Cedric","family":"Boscher","sequence":"first","affiliation":[{"name":"INSA Lyon, Lyon, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6382-3839","authenticated-orcid":false,"given":"Nawel","family":"Benarba","sequence":"additional","affiliation":[{"name":"INSA Lyon, Lyon, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8422-4209","authenticated-orcid":false,"given":"Fatima","family":"Elhattab","sequence":"additional","affiliation":[{"name":"INSA Lyon, Lyon, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0558-0123","authenticated-orcid":false,"given":"Sara","family":"Bouchenak","sequence":"additional","affiliation":[{"name":"INSA Lyon, Lyon, France"}]}],"member":"320","published-online":{"date-parts":[[2024,12,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2020.0297"},{"key":"e_1_3_2_1_3_1","volume-title":"Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security","author":"Pathum Chamikara Mahawaga Arachchige","unstructured":"Mahawaga Arachchige Pathum Chamikara, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bert\u00f3k, and Ibrahim Khalil. 2022. Local Differential Privacy for Federated Learning. In Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Vol. 13554. Springer, Copenhagen, Denmark, 195--216."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3033171"},{"key":"e_1_3_2_1_5_1","volume-title":"Very Deep Convolutional Neural Networks for Raw Waveforms. In 2017 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2017","author":"Dai Wei","year":"2017","unstructured":"Wei Dai, Chia Dai, Shuhui Qu, Juncheng Li, and Samarjit Das. 2017. Very Deep Convolutional Neural Networks for Raw Waveforms. In 2017 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2017, March 5--9, 2017. IEEE, New Orleans, LA, USA, 421--425."},{"key":"e_1_3_2_1_6_1","article-title":"Adaptive Subgradient Methods for Online Learning and Stochastic Optimization","author":"Duchi John","year":"2011","unstructured":"John Duchi and Elad Hazan. 2011. Adaptive Subgradient Methods for Online Learning and Stochastic Optimization. Journal of Machine Learning Research 12 (July 2011), 2121--2159.","journal-title":"Journal of Machine Learning Research 12"},{"key":"e_1_3_2_1_7_1","volume-title":"Label Inference Attacks Against Vertical Federated Learning. In 31st USENIX Security Symposium, USENIX Security 2022","author":"Fu Chong","year":"2022","unstructured":"Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, and Ting Wang. 2022. Label Inference Attacks Against Vertical Federated Learning. In 31st USENIX Security Symposium, USENIX Security 2022, August 10--12, 2022. USENIX Association, Boston, MA, USA, 1397--1414."},{"key":"e_1_3_2_1_8_1","first-page":"30","article-title":"Federated Learning for Fraud Detection in Accounting and Auditing","volume":"2021","author":"Grimm Stefanie","year":"2021","unstructured":"Stefanie Grimm, Stefanie Schwaar, and Patrick Holzer. 2021. Federated Learning for Fraud Detection in Accounting and Auditing. ERCIM News 2021, 126 (2021), 30.","journal-title":"ERCIM News"},{"key":"e_1_3_2_1_9_1","volume-title":"Detection of Traffic Signs in Real-World Images: The German Traffic Sign Detection Benchmark. In The 2013 International Joint Conference on Neural Networks, IJCNN 2013, August 4--9","author":"Houben Sebastian","year":"2013","unstructured":"Sebastian Houben, Johannes Stallkamp, Jan Salmen, Marc Schlipsing, and Christian Igel. 2013. Detection of Traffic Signs in Real-World Images: The German Traffic Sign Detection Benchmark. In The 2013 International Joint Conference on Neural Networks, IJCNN 2013, August 4--9, 2013. IEEE, Dallas, TX, USA, 1--8."},{"key":"e_1_3_2_1_10_1","unstructured":"Tzu-Ming Harry Hsu Hang Qi and Matthew Brown. 2020. Measuring the Effects of Non-Identical Data Distribution for Federated Visual Classification. arXiv:2002.12062"},{"key":"e_1_3_2_1_11_1","unstructured":"Chao Huang Jianwei Huang and Xin Liu. 2022. Cross-Silo Fderated Learning: Challenges and Opportunities . arXiv:2206.12949"},{"key":"e_1_3_2_1_12_1","volume-title":"Promoting Collaborations in Cross-Silo Federated Learning: Challenges and Opportunities","author":"Huang Chao","year":"2023","unstructured":"Chao Huang, Ming Tang, Qian Ma, Jianwei Huang, and Xin Liu. 2023. Promoting Collaborations in Cross-Silo Federated Learning: Challenges and Opportunities. IEEE Communications Magazine (2023)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363201"},{"key":"e_1_3_2_1_14_1","volume-title":"Accelerated Federated Learning with Decoupled Adaptive Optimization. In International Conference on Machine Learning, ICML 2022","volume":"10322","author":"Jin Jiayin","year":"2022","unstructured":"Jiayin Jin, Jiaxiang Ren, Yang Zhou, Lingjuan Lyu, Ji Liu, and Dejing Dou. 2022. Accelerated Federated Learning with Decoupled Adaptive Optimization. In International Conference on Machine Learning, ICML 2022, 17--23 July 2022 (Proceedings of Machine Learning Research, Vol. 162). PMLR, Baltimore, Maryland, USA, 10298--10322."},{"key":"e_1_3_2_1_15_1","volume-title":"Mime: Mimicking Centralized Stochastic Algorithms in Federated Learning. arXiv:2008.03606","author":"Karimireddy Sai Praneeth","year":"2020","unstructured":"Sai Praneeth Karimireddy, Martin Jaggi, Satyen Kale, Mehryar Mohri, Sashank J Reddi, Sebastian U Stich, and Ananda Theertha Suresh. 2020. Mime: Mimicking Centralized Stochastic Algorithms in Federated Learning. arXiv:2008.03606"},{"key":"e_1_3_2_1_16_1","volume-title":"Adam: A Method for Stochastic Optimization. In 3rd International Conference on Learning Representations, ICLR 2015, May 7--9, 2015, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.)","author":"Diederik","unstructured":"Diederik P. Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. In 3rd International Conference on Learning Representations, ICLR 2015, May 7--9, 2015, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.). San Diego, CA, USA."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/0471722065"},{"key":"e_1_3_2_1_18_1","unstructured":"Alex Krizhevsky Vinod Nair and Geoffrey Hinton. 2010. CIFAR-10 (Canadian Institute for Advanced Research). http:\/\/www.cs.toronto.edu\/kriz\/cifar.html."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3528535.3565240"},{"key":"e_1_3_2_1_20_1","volume-title":"MLMI 2019, Held in Conjunction with MICCAI 2019, October 13, 2019, Proceedings (Lecture Notes in Computer Science","volume":"141","author":"Li Wenqi","year":"2019","unstructured":"Wenqi Li, Fausto Milletar\u00ec, Daguang Xu, Nicola Rieke, Jonny Hancox, Wentao Zhu, Maximilian Baust, Yan Cheng, S\u00e9bastien Ourselin, M. Jorge Cardoso, and Andrew Feng. 2019. Privacy-Preserving Federated Brain Tumour Segmentation. In Machine Learning in Medical Imaging - 10th International Workshop, MLMI 2019, Held in Conjunction with MICCAI 2019, October 13, 2019, Proceedings (Lecture Notes in Computer Science, Vol. 11861). Springer, Shenzhen, China, 133--141."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14778\/3503585.3503592"},{"key":"e_1_3_2_1_22_1","first-page":"5925","article-title":"On Privacy and Personalization in Cross-Silo Federated Learning","volume":"35","author":"Liu Ken","year":"2022","unstructured":"Ken Liu, Shengyuan Hu, Steven Z Wu, and Virginia Smith. 2022. On Privacy and Personalization in Cross-Silo Federated Learning. Advances in Neural Information Processing Systems 35 (2022), 5925--5940.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_23_1","volume-title":"Deep Learning Face Attributes in the Wild. In 2015 IEEE International Conference on Computer Vision, ICCV 2015","author":"Liu Ziwei","year":"2015","unstructured":"Ziwei Liu, Ping Luo, Xiaogang Wang, and Xiaoou Tang. 2015. Deep Learning Face Attributes in the Wild. In 2015 IEEE International Conference on Computer Vision, ICCV 2015, December 7--13, 2015. IEEE Computer Society, Santiago, Chile, 3730--3738."},{"key":"e_1_3_2_1_24_1","unstructured":"Lingjuan Lyu Han Yu and Qiang Yang. 2020. Threats to Federated Learning: A Survey. arXiv:2003.02133"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 37th International Conference on Machine Learning, ICML 2020, 13--18","volume":"6712","author":"Malitsky Yura","year":"2020","unstructured":"Yura Malitsky and Konstantin Mishchenko. 2020. Adaptive Gradient Descent Without Descent. In Proceedings of the 37th International Conference on Machine Learning, ICML 2020, 13--18 July 2020, Virtual Event (Proceedings of Machine Learning Research, Vol. 119). Virtual Event, 6702--6712."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, AISTATS 2017, 20--22","volume":"1282","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Ag\u00fcera y Arcas. 2017. Communication-Efficient Learning of Deep Networks from Decentralized Data. In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, AISTATS 2017, 20--22 April 2017 (Proceedings of Machine Learning Research, Vol. 54). PMLR, Fort Lauderdale, FL, USA, 1273--1282."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0016-0032(96)00063-4"},{"key":"e_1_3_2_1_28_1","volume-title":"Shielding Federated Learning Systems Against Inference Attacks with ARM TrustZone. In Middleware '22: 23rd International Middleware Conference, Quebec, QC, Canada, November 7--11","author":"Messaoud Aghiles Ait","year":"2022","unstructured":"Aghiles Ait Messaoud, Sonia Ben Mokhtar, Vlad Nitu, and Valerio Schiavoni. 2022. Shielding Federated Learning Systems Against Inference Attacks with ARM TrustZone. In Middleware '22: 23rd International Middleware Conference, Quebec, QC, Canada, November 7--11, 2022. ACM, QC, Canada, 335--348."},{"key":"e_1_3_2_1_29_1","volume-title":"Layer-Wise Characterization of Latent Information Leakage in Federated Learning. In The International Conference on Learning Representations (ICLR)","author":"Mo Fan","year":"2021","unstructured":"Fan Mo, Anastasia Borovykh, Mohammad Malekzadeh, Hamed Haddadi, and Soteris Demetriou. 2021. Layer-Wise Characterization of Latent Information Leakage in Federated Learning. In The International Conference on Learning Representations (ICLR), Vol. Workshop on Distributed and Private Machine Learning. Virtual."},{"key":"e_1_3_2_1_30_1","unstructured":"Fan Mo Anastasia Borovykh Mohammad Malekzadeh Hamed Haddadi and Soteris Demetriou. 2021. Quantifying Information Leakage from Gradients. arXiv:2105.13929"},{"key":"e_1_3_2_1_31_1","volume-title":"PPFL: Privacy-Preserving Federated Learning with Trusted Execution Environments. In MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services","author":"Mo Fan","year":"2021","unstructured":"Fan Mo, Hamed Haddadi, Kleomenis Katevas, Eduard Marin, Diego Perino, and Nicolas Kourtellis. 2021. PPFL: Privacy-Preserving Federated Learning with Trusted Execution Environments. In MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, 24 June - 2 July, 2021. ACM, Virtual Event, Wisconsin, USA, 94--108."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 34th International Conference on Machine Learning, ICML 2017, 6--11","volume":"2553","author":"Mukkamala Mahesh Chandra","year":"2017","unstructured":"Mahesh Chandra Mukkamala and Matthias Hein. 2017. Variants of RMSProp and Adagrad with Logarithmic Regret Bounds. In Proceedings of the 34th International Conference on Machine Learning, ICML 2017, 6--11 August 2017 (Proceedings of Machine Learning Research, Vol. 70). PMLR, Sydney, NSW, Australia, 2545--2553."},{"key":"e_1_3_2_1_33_1","unstructured":"Mohammad Naseri Jamie Hayes and Emiliano De Cristofaro. 2020. Toward Robustness and Privacy in Federated Learning: Experimenting with Local and Central Differential Privacy. arXiv:2009.03561"},{"key":"e_1_3_2_1_34_1","volume-title":"Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-Box Inference Attacks Against Centralized and Federated Learning. In 2019 IEEE Symposium on Security and Privacy, SP 2019","author":"Nasr Milad","year":"2019","unstructured":"Milad Nasr, Reza Shokri, and Amir Houmansadr. 2019. Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-Box Inference Attacks Against Centralized and Federated Learning. In 2019 IEEE Symposium on Security and Privacy, SP 2019, May 19--23, 2019. IEEE, San Francisco, CA, USA, 739--753."},{"key":"e_1_3_2_1_35_1","first-page":"5315","article-title":"FLamby: Datasets and Benchmarks for Cross-Silo Federated Learning in Realistic Healthcare Settings","volume":"35","author":"du Terrail Jean Ogier","year":"2022","unstructured":"Jean Ogier du Terrail, Samy-Safwan Ayed, Edwige Cyffers, Felix Grimberg, Chaoyang He, Regis Loeb, Paul Mangold, Tanguy Marchand, Othmane Marfoq, Erum Mushtaq, et al. 2022. FLamby: Datasets and Benchmarks for Cross-Silo Federated Learning in Realistic Healthcare Settings. Advances in Neural Information Processing Systems 35 (2022), 5315--5334.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_36_1","unstructured":"Nicolas Papernot Mart\u00edn Abadi \u00dalfar Erlingsson Ian J. Goodfellow and Kunal Talwar. 2017. Semi-Supervised Knowledge Transfer for Deep Learning from Private Training Data. arXiv:1610.05755"},{"key":"e_1_3_2_1_37_1","unstructured":"Nicolas Papernot Shuang Song Ilya Mironov Ananth Raghunathan Kunal Talwar and \u00dalfar Erlingsson. 2018. Scalable Private Learning with PATE. arXiv:1802.08908"},{"key":"e_1_3_2_1_38_1","volume-title":"Principles of Data Wrangling: Practical Techniques for Data Preparation","author":"Rattenbury Tye","unstructured":"Tye Rattenbury, Joseph M. Hellerstein, Jeffrey Heer, Sean Kandel, and Connor Carreras. 2017. Principles of Data Wrangling: Practical Techniques for Data Preparation. O'Reilly Media, London."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2015.2477777"},{"key":"e_1_3_2_1_40_1","volume-title":"Make Landscape Flatter in Differentially Private Federated Learning. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2023","author":"Shi Yifan","year":"2023","unstructured":"Yifan Shi, Yingqi Liu, Kang Wei, Li Shen, Xueqian Wang, and Dacheng Tao. 2023. Make Landscape Flatter in Differentially Private Federated Learning. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2023, June 17--24, 2023. IEEE, Vancouver, BC, Canada, 24552--24562."},{"key":"e_1_3_2_1_41_1","volume-title":"Membership Inference Attacks Against Machine Learning Models. In 2017 IEEE Symposium on Security and Privacy, SP 2017","author":"Shokri Reza","year":"2017","unstructured":"Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. 2017. Membership Inference Attacks Against Machine Learning Models. In 2017 IEEE Symposium on Security and Privacy, SP 2017, May 22--26, 2017. IEEE Computer Society, San Jose, CA, USA, 3--18."},{"key":"e_1_3_2_1_42_1","volume-title":"Very Deep Convolutional Networks for Large-Scale Image Recognition. In 3rd International Conference on Learning Representations, ICLR 2015, May 7--9, 2015, Conference Track Proceedings","author":"Simonyan Karen","year":"2015","unstructured":"Karen Simonyan and Andrew Zisserman. 2015. Very Deep Convolutional Networks for Large-Scale Image Recognition. In 3rd International Conference on Learning Representations, ICLR 2015, May 7--9, 2015, Conference Track Proceedings. San Diego, CA, USA."},{"key":"e_1_3_2_1_43_1","volume-title":"Ananda Theertha Suresh, and H. Brendan McMahan","author":"Sun Ziteng","year":"2019","unstructured":"Ziteng Sun, Peter Kairouz, Ananda Theertha Suresh, and H. Brendan McMahan. 2019. Can You Really Backdoor Federated Learning? arXiv:1911.07963"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.2993966"},{"key":"e_1_3_2_1_45_1","volume-title":"Speech Commands: A Dataset for Limited-Vocabulary Speech Recognition. arXiv:1804.03209","author":"Warden Pete","year":"2018","unstructured":"Pete Warden. 2018. Speech Commands: A Dataset for Limited-Vocabulary Speech Recognition. arXiv:1804.03209"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.110014"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3045266"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357371"},{"key":"e_1_3_2_1_49_1","unstructured":"Yilun Xu Shengjia Zhao Jiaming Song Russell Stewart and Stefano Ermon. 2020. A Theory of Usable Information Under Computational Constraints. arXiv:2002.10689"},{"key":"e_1_3_2_1_50_1","volume-title":"32nd USENIX Security Symposium, USENIX Security 2023","author":"Yang Yuchen","year":"2023","unstructured":"Yuchen Yang, Bo Hui, Haolin Yuan, Neil Zhenqiang Gong, and Yinzhi Cao. 2023. PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation. In 32nd USENIX Security Symposium, USENIX Security 2023, August 9--11, 2023. USENIX Association, Anaheim, CA, USA, 1595--1612."},{"key":"e_1_3_2_1_51_1","volume-title":"Opacus: User-Friendly Differential Privacy Library in PyTorch. arXiv:2109.12298","author":"Yousefpour Ashkan","year":"2021","unstructured":"Ashkan Yousefpour, Igor Shilov, Alexandre Sablayrolles, Davide Testuggine, Karthik Prasad, Mani Malek, John Nguyen, Sayan Ghosh, Akash Bharadwaj, Jessica Zhao, Graham Cormode, and Ilya Mironov. 2021. Opacus: User-Friendly Differential Privacy Library in PyTorch. arXiv:2109.12298"},{"key":"e_1_3_2_1_52_1","volume-title":"PEFL: A Privacy-Enhanced Federated Learning Scheme for Big Data Analytics. In 2019 IEEE Global Communications Conference, GLOBECOM 2019","author":"Zhang Jiale","year":"2019","unstructured":"Jiale Zhang, Bing Chen, Shui Yu, and Hai Deng. 2019. PEFL: A Privacy-Enhanced Federated Learning Scheme for Big Data Analytics. In 2019 IEEE Global Communications Conference, GLOBECOM 2019, December 9--13, 2019. IEEE, Waikoloa, HI, USA, 1--6."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3148263"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3146448"}],"event":{"name":"Middleware '24: 25th International Middleware Conference","location":"Hong Kong Hong Kong","acronym":"Middleware '24","sponsor":["IFIP","Usenix"]},"container-title":["Proceedings of the 25th International Middleware Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652892.3700785","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3652892.3700785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:53:57Z","timestamp":1750287237000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652892.3700785"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":54,"alternative-id":["10.1145\/3652892.3700785","10.1145\/3652892"],"URL":"https:\/\/doi.org\/10.1145\/3652892.3700785","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}