{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T01:09:17Z","timestamp":1777338557463,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":94,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2103439, 2103038, 2138139 and 2106420"],"award-info":[{"award-number":["2103439, 2103038, 2138139 and 2106420"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"MECRT, Indonesia"},{"name":"4-VA"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670329","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"2177-2191","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Blocking Tracking JavaScript at the Function Granularity"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-5917-4051","authenticated-orcid":false,"given":"Abdul Haddi","family":"Amjad","sequence":"first","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6042-8272","authenticated-orcid":false,"given":"Shaoor","family":"Munir","sequence":"additional","affiliation":[{"name":"University of California, Davis, CA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4500-9354","authenticated-orcid":false,"given":"Zubair","family":"Shafiq","sequence":"additional","affiliation":[{"name":"University of California, Davis, CA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8007-8662","authenticated-orcid":false,"given":"Muhammad Ali","family":"Gulzar","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. A New Way to Control the Ads You See on Facebook and an Update on Ad Blocking. https:\/\/newsroom.fb.com\/news\/2016\/08\/a-new-way-to-controlthe-ads-you-see-on-facebook-and-an-update-on-ad-blocking\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2016. Ping pong with Facebook. https:\/\/web.archive.org\/web\/20160818160457\/https:\/\/adblockplus.org\/blog\/ping-pong-with-facebook."},{"key":"e_1_3_2_1_3_1","unstructured":"2017. AD Blocker's successful assault on Facebook enters its second month. https:\/\/web.archive.org\/web\/20221011151030\/https:\/\/adage.com\/article\/digital\/blockrace-adblock\/311103."},{"key":"e_1_3_2_1_4_1","unstructured":"2018. Ad Network Uses DGA Algorithm to Bypass Ad Blockers and Deploy In-Browser Miners. https:\/\/www.bleepingcomputer.com\/news\/security\/adnetwork-uses-dga-algorithm-to-bypass-ad-blockers-and-deploy-in\\-browserminers\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2018. Who is Stealing My Power III: An Adnetwork Company Case Study. https:\/\/web.archive.org\/web\/20230408021633\/https:\/\/blog.netlab.360.com\/whois-stealing-my-power-iii-an-adnetwork-company-case-study-en\/."},{"key":"e_1_3_2_1_6_1","unstructured":"2019. AdGuard Scriptlets and Resources. https:\/\/github.com\/AdguardTeam\/Scriptlets."},{"key":"e_1_3_2_1_7_1","unstructured":"2020. WebBundles Harmful to Content Blocking Security Tools and the Open Web. https:\/\/web.archive.org\/web\/20230207160252\/https:\/\/brave.com\/webstandards-at-brave\/3-web-bundles\/."},{"key":"e_1_3_2_1_8_1","unstructured":"2022. EasyList. https:\/\/easylist.to\/easylist\/easylist.txt."},{"key":"e_1_3_2_1_9_1","unstructured":"2022. EasyPrivacy. https:\/\/easylist.to\/easylist\/easyprivacy.txt."},{"key":"e_1_3_2_1_10_1","unstructured":"2022. Enhanced Tracking Protection in Firefox for desktop. https:\/\/support.mozilla.org\/en-US\/kb\/enhanced-tracking-protection-firefox-desktop."},{"key":"e_1_3_2_1_11_1","unstructured":"2022. Facebook Is Now Encrypting Links to Prevent URL Stripping. Website. https:\/\/web.archive.org\/web\/20230527091045\/https:\/\/www.schneier.com\/blog\/archives\/2022\/07\/facebook-is-now-encrypting-links-to-prevent-urlstripping.html"},{"key":"e_1_3_2_1_12_1","unstructured":"2022. Tracking Prevention in Microsoft Edge. https:\/\/docs.microsoft.com\/enus\/microsoft-edge\/web-platform\/tracking-prevention."},{"key":"e_1_3_2_1_13_1","unstructured":"2022. uBlock Origin. https:\/\/github.com\/gorhill\/uBlock. https:\/\/github.com\/gorhill\/uBlock"},{"key":"e_1_3_2_1_14_1","unstructured":"2022. Web Almanac - JavaScript. https:\/\/web.archive.org\/web\/20230422093455\/https:\/\/almanac.httparchive.org\/en\/2022\/javascript."},{"key":"e_1_3_2_1_15_1","unstructured":"2023. ads.google. https:\/\/shorturl.at\/nGNW1."},{"key":"e_1_3_2_1_16_1","unstructured":"2023. Background Script. https:\/\/developer.chrome.com\/docs\/extensions\/mv2\/background_pages\/."},{"key":"e_1_3_2_1_17_1","unstructured":"2023. Browserify. http:\/\/browserify.org\/."},{"key":"e_1_3_2_1_18_1","unstructured":"2023. Chrome DevTools Protocol ? chromedevtools.github.io. https:\/\/chromedevtools.github.io\/devtools-protocol\/."},{"key":"e_1_3_2_1_19_1","unstructured":"2023. chrome-extension. https:\/\/developer.chrome.com\/docs\/extensions\/."},{"key":"e_1_3_2_1_20_1","unstructured":"2023. Console Trace. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/console\/trace."},{"key":"e_1_3_2_1_21_1","unstructured":"2023. Content Script. https:\/\/developer.chrome.com\/docs\/extensions\/mv3\/content_scripts\/."},{"key":"e_1_3_2_1_22_1","unstructured":"2023. Cookie Access. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Document\/cookie."},{"key":"e_1_3_2_1_23_1","unstructured":"2023. Debugger API. https:\/\/chromedevtools.github.io\/devtools-protocol\/tot\/Debugger\/."},{"key":"e_1_3_2_1_24_1","unstructured":"2023. Declarative Net Request API. https:\/\/developer.chrome.com\/docs\/extensions\/reference\/declarativeNetRequest\/."},{"key":"e_1_3_2_1_25_1","unstructured":"2023. Fetch API. https:\/\/chromedevtools.github.io\/devtools-protocol\/tot\/Fetch\/."},{"key":"e_1_3_2_1_26_1","unstructured":"2023. Firefox Browser. https:\/\/www.mozilla.org\/en-US\/firefox\/."},{"key":"e_1_3_2_1_27_1","unstructured":"2023. Google. 2021. Chrome User Experience Report. https:\/\/web.dev\/articles\/critical-rendering-path\/measure-crp."},{"key":"e_1_3_2_1_28_1","unstructured":"2023. Local Storage Access. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Window\/localStorage."},{"key":"e_1_3_2_1_29_1","unstructured":"2023. Microsoft-Edge Browser. https:\/\/www.microsoft.com\/en-us\/edge?form=MA13FJ."},{"key":"e_1_3_2_1_30_1","unstructured":"2023. Migrate from Manifest V2 to Manifest V3. https:\/\/developer.chrome.com\/docs\/extensions\/migrating\/blocking-web-requests\/."},{"key":"e_1_3_2_1_31_1","unstructured":"2023. obfuscater.io. https:\/\/obfuscator.io\/."},{"key":"e_1_3_2_1_32_1","unstructured":"2023. onLoad Event. https:\/\/httparchive.org\/reports\/loading-speed."},{"key":"e_1_3_2_1_33_1","unstructured":"2023. Parcel. https:\/\/parceljs.org\/."},{"key":"e_1_3_2_1_34_1","unstructured":"2023. Rollup. https:\/\/rollupjs.org\/."},{"key":"e_1_3_2_1_35_1","unstructured":"2023. Safari Browser. https:\/\/www.apple.com\/safari\/."},{"key":"e_1_3_2_1_36_1","unstructured":"2023. SCmocks. https:\/\/github.com\/SugarCoatJS\/sugarcoat\/tree\/master\/mocks."},{"key":"e_1_3_2_1_37_1","unstructured":"2023. SCresources. https:\/\/github.com\/SugarCoatJS\/sugarcoat-paperdataset\/tree\/master\/resources."},{"key":"e_1_3_2_1_38_1","unstructured":"2023. Selenium. https:\/\/www.selenium.dev\/."},{"key":"e_1_3_2_1_39_1","unstructured":"2023. uBlock Origin Google Analytics Replacement. https:\/\/github.com\/gorhill\/uBlock\/blob\/master\/src\/web_accessible_resources\/google-analytics_analytics.js."},{"key":"e_1_3_2_1_40_1","unstructured":"2023. uBlock Origin Scriptlets. https:\/\/github.com\/uBlock-user\/uBO-Scriptlets. https:\/\/github.com\/uBlock-user\/uBO-Scriptlets"},{"key":"e_1_3_2_1_41_1","unstructured":"2023. uBlock Origin web accessible resources. https:\/\/github.com\/gorhill\/uBlock\/tree\/master\/src\/web_accessible_resources."},{"key":"e_1_3_2_1_42_1","unstructured":"2023. V8. https:\/\/en.wikipedia.org\/wiki\/V8_(JavaScript_engine)."},{"key":"e_1_3_2_1_43_1","unstructured":"2023. Webpack. https:\/\/webpack.js.org."},{"key":"e_1_3_2_1_44_1","unstructured":"2023. Webpack Downloads. https:\/\/npmtrends.com\/webpack."},{"key":"e_1_3_2_1_45_1","unstructured":"2024. GitHub Issue-1. https:\/\/github.com\/easylist\/easylist\/issues\/18242."},{"key":"e_1_3_2_1_46_1","unstructured":"2024. GitHub Issue-2. https:\/\/github.com\/easylist\/easylist\/issues\/18230."},{"key":"e_1_3_2_1_47_1","unstructured":"2024. GitHub Issue-3. https:\/\/github.com\/easylist\/easylist\/issues\/18243."},{"key":"e_1_3_2_1_48_1","unstructured":"2024. GitHub Issue-4. https:\/\/github.com\/easylist\/easylist\/issues\/18185."},{"key":"e_1_3_2_1_49_1","unstructured":"[Accessed 30-Apr-2023]. DOMDomain. https:\/\/chromedevtools.github.io\/devtools-protocol\/tot\/DOM\/."},{"key":"e_1_3_2_1_50_1","unstructured":"[Accessed 30-Apr-2023]. NetworkDomain. https:\/\/chromedevtools.github.io\/devtools-protocol\/tot\/Network\/."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355588"},{"key":"e_1_3_2_1_52_1","unstructured":"Abdul Haddi Amjad Shaoor Munir Zubair Shafiq and Muhammad Ali Gulzar. 2024. Blocking Tracking JavaScript at the Function Granularity. arXiv:2405.18385 [cs.CR]"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487855"},{"key":"e_1_3_2_1_54_1","volume-title":"Blocking JavaScript without Breaking the Web: An Empirical Investigation. arXiv preprint arXiv:2302.01182","author":"Amjad Abdul Haddi","year":"2023","unstructured":"Abdul Haddi Amjad, Zubair Shafiq, and Muhammad Ali Gulzar. 2023. Blocking JavaScript without Breaking the Web: An Empirical Investigation. arXiv preprint arXiv:2302.01182 (2023)."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0056"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.05.003"},{"key":"e_1_3_2_1_57_1","unstructured":"Brave. 2022. A Long List of Ways Brave Goes Beyond Other Browsers to Protect Your Privacy. https:\/\/brave.com\/privacy-features\/. https:\/\/brave.com\/privacyfeatures\/"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449837"},{"key":"e_1_3_2_1_59_1","volume-title":"Detecting Filter List Evasion with Event-Loop-Turn Granularity JavaScript Signatures. In 2021 IEEE Symposium on Security and Privacy (SP).","author":"Chen Quan","year":"2021","unstructured":"Quan Chen, Peter Snyder, Ben Livshits, and Alexandros Kapravelos. 2021. Detecting Filter List Evasion with Event-Loop-Turn Granularity JavaScript Signatures. In 2021 IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10509-8_19"},{"key":"e_1_3_2_1_61_1","volume-title":"CNAME Cloaking-Based Tracking on the Web: Characterization, Detection, and Protection","author":"Dao Ha","year":"2021","unstructured":"Ha Dao, Johan Mazel, and Kensuke Fukuda. 2021. CNAME Cloaking-Based Tracking on the Web: Characterization, Detection, and Protection. IEEE Transactions on Network and Service Management (2021)."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"crossref","unstructured":"Sean M Devine and Nathaniel D Bastian. 2021. An Adversarial Training Based Machine Learning Approach to Malware Classification under Adversarial Conditions.. In HICSS. 1--10.","DOI":"10.24251\/HICSS.2021.102"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0053"},{"key":"e_1_3_2_1_64_1","volume-title":"The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion. PETS","author":"Dimova Yana","year":"2021","unstructured":"Yana Dimova, Gunes Acar, Lukasz Olejnik,Wouter Joosen, and Tom Van Goethem. 2021. The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion. PETS (2021)."},{"key":"e_1_3_2_1_65_1","volume-title":"Mohamed Ali Kaafar, Balachander Krishnamurthy, and Anirban Mahanti.","author":"Ikram Muhammad","year":"2016","unstructured":"Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Balachander Krishnamurthy, and Anirban Mahanti. 2016. Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131387"},{"key":"e_1_3_2_1_67_1","volume-title":"AdGraph: A Graph-Based Approach to Ad and Tracker Blocking","author":"Iqbal Umar","unstructured":"Umar Iqbal, Peter Snyder, Shitong Zhu, Benjamin Livshits, Zhiyun Qian, and Zubair Shafiq. 2020. AdGraph: A Graph-Based Approach to Ad and Tracker Blocking. IEEE."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052674"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512218"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2371458"},{"key":"e_1_3_2_1_73_1","volume-title":"A first look at ad-block detection: A new arms race on the web. arXiv preprint arXiv:1605.05841","author":"Mughees Muhammad Haris","year":"2016","unstructured":"Muhammad Haris Mughees, Zhiyun Qian, Zubair Shafiq, Karishma Dash, and Pan Hui. 2016. A first look at ad-block detection: A new arms race on the web. arXiv preprint arXiv:1605.05841 (2016)."},{"key":"e_1_3_2_1_74_1","volume-title":"COOKIEGRAPH: Understanding and Detecting First-Party Tracking Cookies. arXiv:2208.12370 [cs.CR]","author":"Munir Shaoor","year":"2023","unstructured":"Shaoor Munir, Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, and Carmela Troncoso. 2023. COOKIEGRAPH: Understanding and Detecting First-Party Tracking Cookies. arXiv:2208.12370 [cs.CR]"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568275"},{"key":"e_1_3_2_1_76_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Peng Fei","year":"2014","unstructured":"Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, and Zhendong Su. 2014. {X-Force}:{Force-Executing} Binary Programs for Security Applications. In 23rd USENIX Security Symposium (USENIX Security 14). 829--844."},{"key":"e_1_3_2_1_77_1","volume-title":"TransAST: A Machine Translation-Based Approach for Obfuscated Malicious JavaScript Detection. In 2023 53rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","author":"Qin Yan","unstructured":"Yan Qin, Weiping Wang, Zixian Chen, Hong Song, and Shigeng Zhang. 2023. TransAST: A Machine Translation-Based Approach for Obfuscated Malicious JavaScript Detection. In 2023 53rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 327--338."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598146"},{"key":"e_1_3_2_1_79_1","volume-title":"42nd IEEE Symposium on Security & Privacy, 23--27","author":"Sanchez-Rola Iskander","year":"2021","unstructured":"Iskander Sanchez-Rola, Matteo Dell?Amico, , Davide Balzarotti, Pierre-Antoine Vervier, and Leyla Bilge. 2021. Journey to the center of the cookie ecosystem: Unraveling actors?; roles and relationships. In S&P 2021, 42nd IEEE Symposium on Security & Privacy, 23--27 May 2021, San Francisco, CA, USA."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645493"},{"key":"e_1_3_2_1_81_1","volume-title":"WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Siby Sandra","year":"2022","unstructured":"Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, and Carmela Troncoso. 2022. WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association."},{"key":"e_1_3_2_1_82_1","volume-title":"Filter List Generation for Underserved Regions (WWW '20)","author":"Sj\u00f6sten Alexander","year":"2020","unstructured":"Alexander Sj\u00f6sten, Peter Snyder, Antonio Pastor, Panagiotis Papadopoulos, and Benjamin Livshits. 2020. Filter List Generation for Underserved Regions (WWW '20). Association for Computing Machinery."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484578"},{"key":"e_1_3_2_1_84_1","volume-title":"Proc. ACM Meas. Anal. Comput. Syst.","author":"Snyder Peter","year":"2020","unstructured":"Peter Snyder, Antoine Vastel, and Ben Livshits. 2020. Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking. Proc. ACM Meas. Anal. Comput. Syst. (2020)."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392144"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238221"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355600"},{"key":"e_1_3_2_1_88_1","volume-title":"Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. 205--216","author":"Zheng Yunhui","year":"2016","unstructured":"WeihangWang, Yunhui Zheng, Xinyu Xing, Yonghwi Kwon, Xiangyu Zhang, and Patrick Eugster. 2016. Webranz: web page randomization for better advertisement delivery and web-bot prevention. In Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. 205--216."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950352"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"crossref","first-page":"391","DOI":"10.4028\/www.scientific.net\/AMM.519-520.391","article-title":"Technique of javascript code obfuscation based on control flow tansformations","volume":"519","author":"Wang Zhi Yue","year":"2014","unstructured":"Zhi Yue Wang and Wei Min Wu. 2014. Technique of javascript code obfuscation based on control flow tansformations. Applied Mechanics and Materials 519 (2014), 391--394.","journal-title":"Applied Mechanics and Materials"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44202-9_1"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2334"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950340"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2012.6461002"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670329","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670329","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:57:14Z","timestamp":1755842234000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670329"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":94,"alternative-id":["10.1145\/3658644.3670329","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670329","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}