{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T13:06:24Z","timestamp":1770555984811,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,10]]},"DOI":"10.1145\/3664646.3664777","type":"proceedings-article","created":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T19:39:56Z","timestamp":1720640396000},"page":"151-160","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Effectiveness of ChatGPT for Static Analysis: How Far Are We?"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-8192-0164","authenticated-orcid":false,"given":"Mohammad Mahdi","family":"Mohajer","sequence":"first","affiliation":[{"name":"York University, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8856-9685","authenticated-orcid":false,"given":"Reem","family":"Aleithan","sequence":"additional","affiliation":[{"name":"York University, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0484-3972","authenticated-orcid":false,"given":"Nima Shiri","family":"Harzevili","sequence":"additional","affiliation":[{"name":"York University, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1659-1960","authenticated-orcid":false,"given":"Moshi","family":"Wei","sequence":"additional","affiliation":[{"name":"York University, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7533-7212","authenticated-orcid":false,"given":"Alvine Boaye","family":"Belle","sequence":"additional","affiliation":[{"name":"York University, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0861-8326","authenticated-orcid":false,"given":"Hung Viet","family":"Pham","sequence":"additional","affiliation":[{"name":"York University, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0617-2877","authenticated-orcid":false,"given":"Song","family":"Wang","sequence":"additional","affiliation":[{"name":"York University, Toronto, Canada"}]}],"member":"320","published-online":{"date-parts":[[2024,7,10]]},"reference":[{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3154717"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/C-CODE.2019.8681007"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338952"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111417"},{"key":"e_1_3_2_1_6_1","unstructured":"Jialun Cao Meiziniu Li Ming Wen and Shing-chi Cheung. 2023. A study on prompt design advantages and limitations of chatgpt for deep learning program repair. arXiv preprint arXiv:2304.08191."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054842"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3542948"},{"key":"e_1_3_2_1_9_1","volume-title":"Haoran Peng, Chenyuan Yang, and Lingming Zhang.","author":"Deng Yinlin","year":"2022","unstructured":"Yinlin Deng, Chunqiu Steven Xia, Haoran Peng, Chenyuan Yang, and Lingming Zhang. 2022. Fuzzing deep-learning libraries via large language models. arXiv preprint arXiv:2212.14834."},{"key":"e_1_3_2_1_10_1","volume-title":"Chenyuan Yang, Shizhuo Dylan Zhang, Shujing Yang, and Lingming Zhang.","author":"Deng Yinlin","year":"2023","unstructured":"Yinlin Deng, Chunqiu Steven Xia, Chenyuan Yang, Shizhuo Dylan Zhang, Shujing Yang, and Lingming Zhang. 2023. Large language models are edge-case fuzzers: Testing deep learning libraries via fuzzgpt. arXiv preprint arXiv:2304.02014."},{"key":"e_1_3_2_1_11_1","volume-title":"Lahiri","author":"Dinella Elizabeth","year":"2022","unstructured":"Elizabeth Dinella, Gabriel Ryan, Todd Mytkowicz, and Shuvendu K. Lahiri. 2022. TOGA: A Neural Method for Test Oracle Generation. ICSE \u201922. Association for Computing Machinery, New York, NY, USA. 2130\u20132141. isbn:9781450392211"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00128"},{"key":"e_1_3_2_1_13_1","unstructured":"Zhiyu Fan Xiang Gao Abhik Roychoudhury and Shin Hwei Tan. 2022. Improving automatically generated code from Codex via Automated Program Repair. arXiv preprint arXiv:2205.10583."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Sidong Feng and Chunyang Chen. 2023. Prompting Is All Your Need: Automated Android Bug Replay with Large Language Models. arXiv preprint arXiv:2306.01987.","DOI":"10.1145\/3597503.3608137"},{"key":"e_1_3_2_1_15_1","volume-title":"VulRepair: A T5-Based Automated Software Vulnerability Repair. ESEC\/FSE","author":"Fu Michael","year":"2022","unstructured":"Michael Fu, Chakkrit Tantithamthavorn, Trung Le, Van Nguyen, and Dinh Phung. 2022. VulRepair: A T5-Based Automated Software Vulnerability Repair. ESEC\/FSE 2022. 935\u2013947."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09731-8"},{"key":"e_1_3_2_1_17_1","unstructured":"Google. 2023. ErrorProne. https:\/\/errorprone.info\/index Accessed on Date"},{"key":"e_1_3_2_1_18_1","unstructured":"Qi Guo and et al.. 2023. Exploring the Potential of ChatGPT in Automated Code Refinement: An Empirical Study. arXiv arxiv:2309.08221. arxiv:2309.08221 Accessed 19 Oct. 2023"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3329667"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597100"},{"key":"e_1_3_2_1_21_1","volume-title":"Automatic Static Bug Detection for Machine Learning Libraries: Are We There Yet? ArXiv, arxiv:2307.04080 Accessed","author":"Harzevili Nima S.","year":"2023","unstructured":"Nima S. Harzevili. 2023. Automatic Static Bug Detection for Machine Learning Libraries: Are We There Yet? ArXiv, arxiv:2307.04080 Accessed 18 Oct. 2023"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Nima Shiri Harzevili Jiho Shin Junjie Wang and Song Wang. 2022. Characterizing and Understanding Software Security Vulnerabilities in Machine Learning Libraries. arXiv preprint arXiv:2203.06502.","DOI":"10.1109\/MSR59073.2023.00018"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.12.007"},{"key":"e_1_3_2_1_24_1","first-page":"169","article-title":"NoRBERT","volume":"2020","author":"Hey Tobias","year":"2020","unstructured":"Tobias Hey, Jan Keim, Anne Koziolek, and Walter F. Tichy. 2020. NoRBERT: Transfer Learning for Requirements Classification. In RE 2020. 169\u2013179.","journal-title":"Transfer Learning for Requirements Classification. In RE"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Xinyi Hou Yanjie Zhao Yue Liu Zhou Yang Kailong Wang Li Li Xiapu Luo David Lo John Grundy and Haoyu Wang. 2023. Large language models for software engineering: A systematic literature review. arXiv preprint arXiv:2308.10620.","DOI":"10.1145\/3695988"},{"key":"e_1_3_2_1_26_1","unstructured":"Infer. [n. d.]. Infer official website. https:\/\/fbinfer.com\/"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00125"},{"key":"e_1_3_2_1_28_1","volume-title":"Inferfix: End-to-end program repair with llms. arXiv preprint arXiv:2303.07263.","author":"Jin Matthew","year":"2023","unstructured":"Matthew Jin, Syed Shahriar, Michele Tufano, Xin Shi, Shuai Lu, Neel Sundaresan, and Alexey Svyatkovskiy. 2023. Inferfix: End-to-end program repair with llms. arXiv preprint arXiv:2303.07263."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i4.25642"},{"key":"e_1_3_2_1_30_1","volume-title":"Khai Loong Aw, and David Lo","author":"Kang Hong Jin","year":"2022","unstructured":"Hong Jin Kang, Khai Loong Aw, and David Lo. 2022. Detecting False Alarms from Automatic Static Analysis Tools: How Far Are We? ICSE \u201922. Association for Computing Machinery, New York, NY, USA. 698\u2013709. isbn:9781450392211"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00194"},{"key":"e_1_3_2_1_32_1","volume-title":"Ernst","author":"Kellogg Martin","year":"2021","unstructured":"Martin Kellogg, Narges Shadab, Manu Sridharan, and Michael D. Ernst. 2021. Lightweight and modular resource leak verification. ESEC\/FSE 2021. Association for Computing Machinery, New York, NY, USA. 181\u2013192. isbn:9781450385626"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510153"},{"key":"e_1_3_2_1_34_1","volume-title":"Advances in Neural Information Processing Systems, S. Koyejo, S. Mohamed, A. Agarwal, D. Belgrave, K. Cho, and A. Oh (Eds.). 35, Curran Associates","author":"Kojima Takeshi","unstructured":"Takeshi Kojima, Shixiang (Shane) Gu, Machel Reid, Yutaka Matsuo, and Yusuke Iwasawa. 2022. Large Language Models are Zero-Shot Reasoners. In Advances in Neural Information Processing Systems, S. Koyejo, S. Mohamed, A. Agarwal, D. Belgrave, K. Cho, and A. Oh (Eds.). 35, Curran Associates, Inc., 22199\u201322213."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510186"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00085"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3613078"},{"key":"e_1_3_2_1_38_1","unstructured":"Haonan Li Yu Hao Yizhuo Zhai and Zhiyun Qian. 2023. The Hitchhiker\u2019s Guide to Program Analysis: A Journey with Large Language Models. arXiv preprint arXiv:2308.00245."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.04.001"},{"key":"e_1_3_2_1_40_1","volume-title":"PCA: memory leak detection using partial call-path analysis. ESEC\/FSE","author":"Li Wen","year":"2020","unstructured":"Wen Li, Haipeng Cai, Yulei Sui, and David Manz. 2020. PCA: memory leak detection using partial call-path analysis. ESEC\/FSE 2020. 1621\u20131625."},{"key":"e_1_3_2_1_41_1","volume-title":"An Empirical Study on the Effectiveness of Static C Code Analyzers for Vulnerability Detection. ISSTA","author":"Lipp Stephan","year":"2022","unstructured":"Stephan Lipp, Sebastian Banescu, and Alexander Pretschner. 2022. An Empirical Study on the Effectiveness of Static C Code Analyzers for Vulnerability Detection. ISSTA 2022. 544\u2013555."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8667970"},{"key":"e_1_3_2_1_43_1","volume-title":"PRCBERT: Prompt Learning for Requirement Classification Using BERT-Based Pretrained Language Models. ASE \u201922. Article 75, 13 pages.","author":"Luo Xianchang","year":"2023","unstructured":"Xianchang Luo, Yinxing Xue, Zhenchang Xing, and Jiamou Sun. 2023. PRCBERT: Prompt Learning for Requirement Classification Using BERT-Based Pretrained Language Models. ASE \u201922. Article 75, 13 pages."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Diego Marcilio Rodrigo Bonif\u00e1cio Eduardo Monteiro Edna Canedo Welder Luz and Gustavo Pinto. 2019. Are Static Analysis Violations Really Fixed? A Closer Look at Realistic Usage of SonarQube. ICPC\u201919. 209\u2013219.","DOI":"10.1109\/ICPC.2019.00040"},{"key":"e_1_3_2_1_45_1","volume-title":"Applying CodeBERT for Automated Program Repair of Java Simple Bugs. In MSR","author":"Mashhadi Ehsan","year":"2021","unstructured":"Ehsan Mashhadi and Hadi Hemmati. 2021. Applying CodeBERT for Automated Program Repair of Java Simple Bugs. In MSR 2021. 505\u2013509."},{"key":"e_1_3_2_1_46_1","volume-title":"Thien Huu Nguyen, Oscar Sainz, Eneko Agirre, Ilana Heintz, and Dan Roth.","author":"Min Bonan","year":"2023","unstructured":"Bonan Min, Hayley Ross, Elior Sulem, Amir Pouran Ben Veyseh, Thien Huu Nguyen, Oscar Sainz, Eneko Agirre, Ilana Heintz, and Dan Roth. 2023. Recent Advances in Natural Language Processing via Large Pre-Trained Language Models: A Survey. ACM Comput. Surv., 56, 2 (2023), Article 30, sep, 40 pages. issn:0360-0300"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.10828316"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3528588.3528651"},{"key":"e_1_3_2_1_49_1","volume-title":"Techniques for Efficient Automated Elimination of False Positives. In SCAM","author":"Muske Tukaram","year":"2020","unstructured":"Tukaram Muske and Alexander Serebrenik. 2020. Techniques for Efficient Automated Elimination of False Positives. In SCAM 2020. 259\u2013263."},{"key":"e_1_3_2_1_50_1","volume-title":"Raymond J Mooney, and Milos Gligoric.","author":"Nie Pengyu","year":"2023","unstructured":"Pengyu Nie, Rahul Banerjee, Junyi Jessy Li, Raymond J Mooney, and Milos Gligoric. 2023. Learning Deep Semantics for Test Completion. arXiv preprint arXiv:2302.10166."},{"key":"e_1_3_2_1_51_1","unstructured":"OpenAI. 2023. ChatGPT. https:\/\/openai.com\/blog\/chatgpt Accessed on Date"},{"key":"e_1_3_2_1_52_1","unstructured":"OpenAI. 2023. ChatGPT-3.5. https:\/\/platform.openai.com\/docs\/models\/gpt-3-5 Accessed on Date"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3002842"},{"key":"e_1_3_2_1_54_1","volume-title":"Hill","author":"Reynolds Zachary P.","year":"2017","unstructured":"Zachary P. Reynolds, Abhinandan B. Jayanth, Ugur Koc, Adam A. Porter, Rajeev R. Raje, and James H. Hill. 2017. Identifying and Documenting False Positive Patterns Generated by Static Code Analysis Tools. In SER&IP 2017. 55\u201361."},{"key":"e_1_3_2_1_55_1","volume-title":"Large Language Models for Automated Program Repair. SPLASH","author":"Ribeiro Francisco","year":"2023","unstructured":"Francisco Ribeiro. 2023. Large Language Models for Automated Program Repair. SPLASH 2023. 7\u20139."},{"key":"e_1_3_2_1_56_1","volume-title":"Alvine B Belle, Song Wang, and Timothy C Lethbridge.","author":"Shahandashti Kimya Khakzad","year":"2024","unstructured":"Kimya Khakzad Shahandashti, Mithila Sivakumar, Mohammad Mahdi Mohajer, Alvine B Belle, Song Wang, and Timothy C Lethbridge. 2024. Evaluating the Effectiveness of GPT-4 Turbo in Creating Defeaters for Assurance Cases. arXiv preprint arXiv:2401.17991."},{"key":"e_1_3_2_1_57_1","first-page":"299","article-title":"EFindBugs","volume":"2011","author":"Shen Haihao","year":"2011","unstructured":"Haihao Shen, Jianhong Fang, and Jianjun Zhao. 2011. EFindBugs: Effective Error Ranking for FindBugs. In ICST 2011. 299\u2013308.","journal-title":"Effective Error Ranking for FindBugs. In ICST"},{"key":"e_1_3_2_1_58_1","unstructured":"Jiho Shin Clark Tang Tahmineh Mohati Maleknaz Nayebi Song Wang and Hadi Hemmati. 2023. Prompt Engineering or Fine Tuning: An Empirical Assessment of Large Language Models in Automated Software Engineering Tasks. arXiv preprint arXiv:2310.10508."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00280"},{"key":"e_1_3_2_1_60_1","volume-title":"Bugs in the Wild: Examining the Effectiveness of Static Analyzers at Finding Real-World Bugs. ESEC\/FSE","author":"Tomassi David A.","year":"2018","unstructured":"David A. Tomassi. 2018. Bugs in the Wild: Examining the Effectiveness of Static Analyzers at Finding Real-World Bugs. ESEC\/FSE 2018. Association for Computing Machinery, New York, NY, USA. 980\u2013982. isbn:9781450355735"},{"key":"e_1_3_2_1_61_1","volume-title":"Tomassi and Cindy Rubio-Gonz\u00e1lez","author":"David","year":"2021","unstructured":"David A. Tomassi and Cindy Rubio-Gonz\u00e1lez. 2021. On the Real-World Effectiveness of Static Bug Detectors at Finding Null Pointer Exceptions. 292\u2013303."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"crossref","unstructured":"Michele Tufano Dawn Drain Alexey Svyatkovskiy and Neel Sundaresan. 2022. Generating Accurate Assert Statements for Unit Test Cases Using Pretrained Transformers. AST \u201922. 54\u201364.","DOI":"10.1145\/3524481.3527220"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180250"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09750-5"},{"key":"e_1_3_2_1_65_1","volume-title":"Voyager: An open-ended embodied agent with large language models. arXiv preprint arXiv:2305.16291.","author":"Wang Guanzhi","year":"2023","unstructured":"Guanzhi Wang, Yuqi Xie, Yunfan Jiang, Ajay Mandlekar, Chaowei Xiao, Yuke Zhu, Linxi Fan, and Anima Anandkumar. 2023. Voyager: An open-ended embodied agent with large language models. arXiv preprint arXiv:2305.16291."},{"key":"e_1_3_2_1_66_1","volume-title":"Is There a \"Golden\" Feature Set for Static Warning Identification? An Experimental Evaluation. ESEM \u201918","author":"Wang Junjie","unstructured":"Junjie Wang, Song Wang, and Qing Wang. 2018. Is There a \"Golden\" Feature Set for Static Warning Identification? An Experimental Evaluation. ESEM \u201918. Association for Computing Machinery, New York, NY, USA. Article 17, 10 pages. isbn:9781450358231"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE48521.2020.00029"},{"key":"e_1_3_2_1_68_1","unstructured":"Jason Wei and et al.. 2022. Chain-of-Thought Prompting Elicits Reasoning in Large Language Models. arXiv arxiv:2201.11903. Accessed 19 Oct. 2023"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2912815"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00129"},{"key":"e_1_3_2_1_71_1","volume-title":"More Repairing Please: Revisiting Automated Program Repair via Zero-Shot Learning. ESEC\/FSE","author":"Xia Chunqiu Steven","year":"2022","unstructured":"Chunqiu Steven Xia and Lingming Zhang. 2022. Less Training, More Repairing Please: Revisiting Automated Program Repair via Zero-Shot Learning. ESEC\/FSE 2022. Association for Computing Machinery, New York, NY, USA. 959\u2013971. isbn:9781450394130"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-09948-6"},{"key":"e_1_3_2_1_73_1","volume-title":"Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers)","author":"Zan Daoguang","unstructured":"Daoguang Zan, Bei Chen, Fengji Zhang, Dianjie Lu, Bingchao Wu, Bei Guan, Wang Yongji, and Jian-Guang Lou. 2023. Large Language Models Meet NL2Code: A Survey. In Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). Association for Computational Linguistics, Toronto, Canada. 7443\u20137464."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"crossref","unstructured":"Zhengran Zeng Hanzhuo Tan Haotian Zhang Jing Li Yuqun Zhang and Lingming Zhang. 2022. An extensive study on pre-trained models for program understanding and generation. In ISSTA. 39\u201351.","DOI":"10.1145\/3533767.3534390"}],"event":{"name":"AIware '24: 1st ACM International Conference on AI-Powered Software","location":"Porto de Galinhas Brazil","acronym":"AIware '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 1st ACM International Conference on AI-Powered Software"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664646.3664777","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664646.3664777","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:45Z","timestamp":1750291425000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664646.3664777"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,10]]},"references-count":73,"alternative-id":["10.1145\/3664646.3664777","10.1145\/3664646"],"URL":"https:\/\/doi.org\/10.1145\/3664646.3664777","relation":{},"subject":[],"published":{"date-parts":[[2024,7,10]]},"assertion":[{"value":"2024-07-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}