{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:26:38Z","timestamp":1763018798557,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"The Ripple University Initiative"},{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["#2014552, #1565570,"],"award-info":[{"award-number":["#2014552, #1565570,"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670382","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"3346-3360","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-0450-8939","authenticated-orcid":false,"given":"Ye","family":"Wang","sequence":"first","affiliation":[{"name":"The University of Kansas, Lawrence, KS, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6841-9702","authenticated-orcid":false,"given":"Zeyan","family":"Liu","sequence":"additional","affiliation":[{"name":"The University of Kansas, Lawrence, KS, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8196-2436","authenticated-orcid":false,"given":"Bo","family":"Luo","sequence":"additional","affiliation":[{"name":"The University of Kansas, Lawrence, KS, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0710-3518","authenticated-orcid":false,"given":"Rongqing","family":"Hui","sequence":"additional","affiliation":[{"name":"The University of Kansas, Lawrence, KS, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4079-2228","authenticated-orcid":false,"given":"Fengjun","family":"Li","sequence":"additional","affiliation":[{"name":"The University of Kansas, Lawrence, KS, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"NeurIPS","volume":"31","author":"Adebayo Julius","year":"2018","unstructured":"Julius Adebayo, Justin Gilmer, Michael Muelly, Ian Goodfellow, Moritz Hardt, and Been Kim. 2018. Sanity checks for saliency maps. NeurIPS, Vol. 31 (2018)."},{"key":"e_1_3_2_1_2_1","first-page":"20","article-title":"Openface: A general-purpose face recognition library with mobile applications","volume":"6","author":"Amos Brandon","year":"2016","unstructured":"Brandon Amos, Bartosz Ludwiczuk, Mahadev Satyanarayanan, et al. 2016. Openface: A general-purpose face recognition library with mobile applications. Carnegie Mellon University School of Computer Science, Vol. 6, 2 (2016), 20.","journal-title":"Carnegie Mellon University School of Computer Science"},{"key":"e_1_3_2_1_3_1","unstructured":"Anish Athalye Logan Engstrom Andrew Ilyas and Kevin Kwok. 2018. Synthesizing robust adversarial examples. In ICML. PMLR 284--293."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Q. Cao L.i Shen Weidi Xie O. M. Parkhi and A. Zisserman. 2017. VGGFace2: A dataset for recognising faces across pose and age. (2017). showeprint[arXiv]1710.08092","DOI":"10.1109\/FG.2018.00020"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_6_1","unstructured":"CBP. [online; accessed 19-January-2023]. Say hello to the new face of speed security and safety. https:\/\/biometrics.cbp.gov\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Aditya Chattopadhay Anirban Sarkar Prantik Howlader and Vineeth N Balasubramanian. 2018. Grad-CAM: Generalized Gradient-Based Visual Explanations for Deep Convolutional Networks. In 2018 IEEE WACV.","DOI":"10.1109\/WACV.2018.00097"},{"key":"e_1_3_2_1_8_1","volume-title":"Arcface: Additive angular margin loss for deep face recognition","author":"Deng Jiankang","year":"2019","unstructured":"Jiankang Deng, Jia Guo, Niannan Xue, and Stefanos Zafeiriou. 2019. Arcface: Additive angular margin loss for deep face recognition. In IEEE\/CVF CVPR."},{"key":"e_1_3_2_1_9_1","volume-title":"RetinaFace: Single-stage Dense Face Localisation in the Wild. CoRR","author":"Deng Jiankang","year":"2019","unstructured":"Jiankang Deng, Jia Guo, Yuxiang Zhou, Jinke Yu, Irene Kotsia, and Stefanos Zafeiriou. 2019. RetinaFace: Single-stage Dense Face Localisation in the Wild. CoRR, Vol. abs\/1905.00641 (2019). showeprint[arXiv]1905.00641 http:\/\/arxiv.org\/abs\/1905.00641"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1117\/1.601069"},{"key":"e_1_3_2_1_11_1","volume-title":"ACM CSUR","volume":"54","author":"Du H.","year":"2022","unstructured":"H. Du, H. Shi, D. Zeng, X. Zhang, and T. Mei. 2022. The elements of end-to-end deep face recognition: A survey of recent advances. ACM CSUR, Vol. 54, 10s (2022)."},{"key":"e_1_3_2_1_12_1","volume-title":"Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink. 2021 IEEE\/CVF CVPR","author":"Duan Ranjie","year":"2021","unstructured":"Ranjie Duan, Xiaofeng Mao, Alex K. Qin, Yun Yang, Yuefeng Chen, Shaokai Ye, and Yuan He. 2021. Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink. 2021 IEEE\/CVF CVPR (2021)."},{"key":"e_1_3_2_1_13_1","unstructured":"Erik Learned-Miller et. al. [online; accessed 19-January-2023]. Labeled Faces in the Wild Home. http:\/\/vis-www.cs.umass.edu\/lfw\/index.html."},{"key":"e_1_3_2_1_14_1","unstructured":"Elaine Glusac. 2021. Your Face Is or Will Be Your Boarding Pass. The New York Times. https:\/\/www.nytimes.com\/2021\/12\/07\/travel\/biometrics-airports-security.html [Accessed 20-Dec-2022]."},{"key":"e_1_3_2_1_15_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_16_1","volume-title":"Dodging attack using carefully crafted natural makeup. arXiv preprint arXiv:2109.06467","author":"Guetta Nitzan","year":"2021","unstructured":"Nitzan Guetta, Asaf Shabtai, Inderjeet Singh, Satoru Momiyama, and Yuval Elovici. 2021. Dodging attack using carefully crafted natural makeup. arXiv preprint arXiv:2109.06467 (2021)."},{"volume-title":"Handbook of Biometric Anti-Spoofing","author":"Hernandez-Ortega Javier","key":"e_1_3_2_1_17_1","unstructured":"Javier Hernandez-Ortega, Julian Fierrez, Aythami Morales, and Javier Galbally. 2019. Introduction to face presentation attack detection. In Handbook of Biometric Anti-Spoofing. Springer, 187--206."},{"key":"e_1_3_2_1_18_1","volume-title":"Labeled faces in the wild: Updates and new reporting procedures. Dept. Comput. Sci","author":"Huang Gary B","year":"2014","unstructured":"Gary B Huang and Erik Learned-Miller. 2014. Labeled faces in the wild: Updates and new reporting procedures. Dept. Comput. Sci., Univ. Massachusetts Amherst, Amherst, MA, USA, Tech. Rep, Vol. 14, 003 (2014)."},{"key":"e_1_3_2_1_19_1","unstructured":"Gary B. Huang Manu Ramesh Tamara Berg and Erik Learned-Miller. 2007. Labeled Faces in the Wild: A Database for Studying Face Recognition in Unconstrained Environments. Technical Report 07--49. University of Massachusetts Amherst."},{"key":"e_1_3_2_1_20_1","unstructured":"Stepan Komkov and Aleksandr Petiushko. 2019. AdvHat: Real-world adversarial attack on ArcFace Face ID system. (2019). showeprint[arXiv]1908.08705"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Seyed-Mohsen Moosavi-Dezfooli Alhussein Fawzi and Pascal Frossard. 2016. Deepfool: a simple and accurate method to fool deep neural networks. In CVPR.","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00415"},{"key":"e_1_3_2_1_23_1","unstructured":"OpenCV. 2015. Open Source Computer Vision Library."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Nicolas Papernot Patrick McDaniel Somesh Jha Matt Fredrikson Z Berkay Celik and Ananthram Swami. 2016. The limitations of deep learning in adversarial settings. In Euro S&P.","DOI":"10.1109\/EuroSP.2016.36"},{"volume-title":"On adversarial patches: real-world attack on arcface-100 face recognition system. In 2019 SIBIRCON","author":"Pautov Mikhail","key":"e_1_3_2_1_25_1","unstructured":"Mikhail Pautov, Grigorii Melnikov, Edgar Kaziakhmedov, Klim Kireev, and Aleksandr Petiushko. 2019. On adversarial patches: real-world attack on arcface-100 face recognition system. In 2019 SIBIRCON. IEEE."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","unstructured":"S. Prasad A. Sawant R. Shettigar and S. Sinha. 2011. Real-Time Face Recognition System with Dynamic Training and Enhanced Multi-Algorithm Face Recognition. In ICWET. https:\/\/doi.org\/10.1145\/1980022.1980047","DOI":"10.1145\/1980022.1980047"},{"key":"e_1_3_2_1_27_1","unstructured":"Amazon AWS Rekognition. 2018. Amazon Rekognition. https:\/\/aws.amazon.com\/rekognition\/"},{"key":"e_1_3_2_1_28_1","volume-title":"Market Report","author":"Markets Research","year":"2022","unstructured":"Research and Markets. 2022. Biometrics Global Market Report 2022. https:\/\/www.researchandmarkets.com\/reports\/5652782\/biometrics-global-market-report-2022."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102874"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Ramprasaath R. Selvaraju Michael Cogswell Abhishek Das Ramakrishna Vedantam Devi Parikh and Dhruv Batra. 2017. Grad-CAM: Visual Explanations from Deep Networks via Gradient-Based Localization. In 2017 IEEE ICCV.","DOI":"10.1109\/ICCV.2017.74"},{"key":"e_1_3_2_1_32_1","unstructured":"Sefik Serengil. 2023. deepface. https:\/\/github.com\/serengil\/deepface"},{"volume-title":"LightFace: A Hybrid Deep Face Recognition Framework. In 2020 ASYU","author":"Serengil Sefik Ilkin","key":"e_1_3_2_1_33_1","unstructured":"Sefik Ilkin Serengil and Alper Ozpinar. 2020. LightFace: A Hybrid Deep Face Recognition Framework. In 2020 ASYU. IEEE."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351261"},{"key":"e_1_3_2_1_36_1","volume-title":"Striving for simplicity: The all convolutional net. arXiv preprint arXiv:1412.6806","author":"Springenberg Jost Tobias","year":"2014","unstructured":"Jost Tobias Springenberg, Alexey Dosovitskiy, Thomas Brox, and Martin Riedmiller. 2014. Striving for simplicity: The all convolutional net. arXiv preprint arXiv:1412.6806 (2014)."},{"volume-title":"Technologies for Optical Countermeasures XVIII and High-Power Lasers: Technology and Systems, Platforms, Effects V","author":"Steinvall Ove","key":"e_1_3_2_1_37_1","unstructured":"Ove Steinvall. 2021. The potential role of laser in combating UAVs: Part 2. In Technologies for Optical Countermeasures XVIII and High-Power Lasers: Technology and Systems, Platforms, Effects V, Vol. 11867. SPIE, 14--30."},{"key":"e_1_3_2_1_38_1","volume-title":"NeurIPS","volume":"27","author":"Sun Yi","year":"2014","unstructured":"Yi Sun, Yuheng Chen, Xiaogang Wang, and Xiaoou Tang. 2014. Deep learning face representation by joint identification-verification. NeurIPS, Vol. 27 (2014)."},{"key":"e_1_3_2_1_39_1","volume-title":"Deepid3: Face recognition with very deep neural networks. arXiv:1502.00873","author":"Sun Yi","year":"2015","unstructured":"Yi Sun, Ding Liang, Xiaogang Wang, and Xiaoou Tang. 2015. Deepid3: Face recognition with very deep neural networks. arXiv:1502.00873 (2015)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Christian Szegedy Sergey Ioffe Vincent Vanhoucke and Alexander A Alemi. 2017. Inception-v4 inception-ResNet and the impact of residual connections on learning. In AAAI.","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"e_1_3_2_1_41_1","volume-title":"Deepface: Closing the gap to human-level performance in face verification. In CVPR.","author":"Taigman Yaniv","year":"2014","unstructured":"Yaniv Taigman, Ming Yang, Marc'Aurelio Ranzato, and Lior Wolf. 2014. Deepface: Closing the gap to human-level performance in face verification. In CVPR."},{"key":"e_1_3_2_1_42_1","volume-title":"Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Tang Di","year":"2021","unstructured":"Di Tang, XiaoFeng Wang, Haixu Tang, and Kehuan Zhang. 2021. Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection. In 30th USENIX Security Symposium (USENIX Security 21). 1541--1558."},{"key":"e_1_3_2_1_43_1","unstructured":"Thorlabs. 2023. Thorlabs-HL6750MG 685 nm. https:\/\/www.thorlabs.com\/thorproduct.cfm?partnumber=HL6750MG. [Accessed 04-Jun-2023]."},{"key":"e_1_3_2_1_44_1","unstructured":"Thorlabs. January 16 2019. 785 nm Laser Diode L785H1. https:\/\/www.thorlabs.com\/thorproduct.cfm?partnumber=L785H1"},{"key":"e_1_3_2_1_45_1","unstructured":"Tim Timesler. 2023. Facenet-Pytorch. https:\/\/github.com\/timesler\/facenet-pytorch"},{"key":"e_1_3_2_1_46_1","unstructured":"Mairs Turnstile. 2024. Turnstile Gate with Face Recognition. https:\/\/mairsturnstile.com\/turnstile-gate-with-face-recognition.html."},{"key":"e_1_3_2_1_47_1","volume-title":"IEEE Access","volume":"9","author":"Vakhshiteh F.","year":"2021","unstructured":"F. Vakhshiteh, A. Nickabadi, and R. Ramachandra. 2021. Adversarial attacks against face recognition: A comprehensive study. IEEE Access, Vol. 9 (2021)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01465"},{"key":"e_1_3_2_1_49_1","first-page":"2711","article-title":"Adversarial Sticker: A Stealthy Attack Method in the Physical World","volume":"45","author":"Wei Xingxing","year":"2023","unstructured":"Xingxing Wei, Ying Guo, and Jie Yu. 2023. Adversarial Sticker: A Stealthy Attack Method in the Physical World. IEEE TPAMI, Vol. 45, 3 (2023), 2711--2725.","journal-title":"IEEE TPAMI"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00614"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995566"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01167"},{"volume-title":"Adversarial t-shirt! evading person detectors in a physical world","author":"Xu Kaidi","key":"e_1_3_2_1_53_1","unstructured":"Kaidi Xu, Gaoyuan Zhang, Sijia Liu, Quanfu Fan, Mengshu Sun, Hongge Chen, Pin-Yu Chen, Yanzhi Wang, and Xue Lin. 2020. Adversarial t-shirt! evading person detectors in a physical world. In ECCV. Springer."},{"volume-title":"Privacy visor: Method for preventing face image detection by using differences in human and device sensitivity","author":"Yamada Takayuki","key":"e_1_3_2_1_54_1","unstructured":"Takayuki Yamada, Seiichi Gohshi, and Isao Echizen. 2013. Privacy visor: Method for preventing face image detection by using differences in human and device sensitivity. In IFIP CMS. Springer."},{"key":"e_1_3_2_1_55_1","volume-title":"Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition. In USENIX Security.","author":"Yan C.","year":"2022","unstructured":"C. Yan, Z. Xu, Z. Yin, X. Ji, and W. Xu. 2022. Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition. In USENIX Security."},{"key":"e_1_3_2_1_56_1","volume-title":"Controllable Evaluation and Generation of Physical Adversarial Patch on Face Recognition. arXiv e-prints","author":"Yang Xiao","year":"2022","unstructured":"Xiao Yang, Yinpeng Dong, Tianyu Pang, Zihao Xiao, Hang Su, and Jun Zhu. 2022. Controllable Evaluation and Generation of Physical Adversarial Patch on Face Recognition. arXiv e-prints (2022), arXiv--2203."},{"key":"e_1_3_2_1_57_1","volume-title":"RAID","author":"Yanmao Man","year":"2020","unstructured":"Man Yanmao, Li Ming, and Gerdes Ryan. 2020. GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems. In RAID 2020."},{"key":"e_1_3_2_1_58_1","volume-title":"Adv-makeup: A new imperceptible and transferable attack on face recognition. arXiv preprint arXiv:2105.03162","author":"Yin Bangjie","year":"2021","unstructured":"Bangjie Yin, Wenxuan Wang, Taiping Yao, Junfeng Guo, Zelun Kong, Shouhong Ding, Jilin Li, and Cong Liu. 2021. Adv-makeup: A new imperceptible and transferable attack on face recognition. arXiv preprint arXiv:2105.03162 (2021)."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"e_1_3_2_1_60_1","volume-title":"IEEE TIFS","volume":"16","author":"Zhong Yaoyao","year":"2020","unstructured":"Yaoyao Zhong and Weihong Deng. 2020. Towards transferable adversarial attack against deep face recognition. IEEE TIFS, Vol. 16 (2020)."},{"key":"e_1_3_2_1_61_1","volume-title":"SFace: Sigmoid-Constrained Hypersphere Loss for Robust Face Recognition","author":"Zhong Yaoyao","year":"2021","unstructured":"Yaoyao Zhong, Weihong Deng, Jiani Hu, Dongyue Zhao, Xian Li, and Dongchao Wen. 2021. SFace: Sigmoid-Constrained Hypersphere Loss for Robust Face Recognition. IEEE Transactions on Image Processing (2021)."},{"volume-title":"Learning deep features for discriminative localization","author":"Zhou Bolei","key":"e_1_3_2_1_62_1","unstructured":"Bolei Zhou, Aditya Khosla, Agata Lapedriza, Aude Oliva, and Antonio Torralba. 2016. Learning deep features for discriminative localization. In IEEE CVPR."},{"key":"e_1_3_2_1_63_1","volume-title":"Invisible mask: Practical attacks on face recognition with infrared. arXiv preprint arXiv:1803.04683","author":"Zhou Zhe","year":"2018","unstructured":"Zhe Zhou, Di Tang, Xiaofeng Wang, Weili Han, Xiangyu Liu, and Kehuan Zhang. 2018. Invisible mask: Practical attacks on face recognition with infrared. arXiv preprint arXiv:1803.04683 (2018)."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3107214"},{"key":"e_1_3_2_1_65_1","unstructured":"Zheng-An Zhu Yun-Zhong Lu and Chen-Kuo Chiang. 2019. Generating adversarial examples by makeup attacks on face recognition. In 2019 IEEE ICIP."},{"key":"e_1_3_2_1_66_1","volume-title":"Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Models. arXiv preprint arXiv:2111.10759","author":"Zolfi Alon","year":"2021","unstructured":"Alon Zolfi, Shai Avidan, Yuval Elovici, and Asaf Shabtai. 2021. Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Models. arXiv preprint arXiv:2111.10759 (2021)."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670382","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670382","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:12:51Z","timestamp":1755843171000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670382"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":66,"alternative-id":["10.1145\/3658644.3670382","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670382","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}