{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:33:49Z","timestamp":1772724829603,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"name":"National Science Foundation","award":["NSF CCF 2217016"],"award-info":[{"award-number":["NSF CCF 2217016"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,30]]},"DOI":"10.1145\/3669940.3707260","type":"proceedings-article","created":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T12:28:01Z","timestamp":1738844881000},"page":"133-150","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Cinnamon: A Framework for Scale-Out Encrypted AI"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-8090-0120","authenticated-orcid":false,"given":"Siddharth","family":"Jayashankar","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8931-519X","authenticated-orcid":false,"given":"Edward","family":"Chen","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8492-3813","authenticated-orcid":false,"given":"Tom","family":"Tang","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1061-3419","authenticated-orcid":false,"given":"Wenting","family":"Zheng","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0289-5499","authenticated-orcid":false,"given":"Dimitrios","family":"Skarlatos","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. HEAAN. Online: https:\/\/github.com\/snucrypto\/HEAAN."},{"key":"e_1_3_2_1_2_1","unstructured":"2023. Lattigo v5. Online: https:\/\/github.com\/tuneinsight\/lattigo. EPFLLDS Tune Insight SA."},{"key":"e_1_3_2_1_3_1","volume-title":"HEAP: A Fully Homomorphic Encryption Accelerator with Parallelized Bootstrapping. In 2024 ACM\/IEEE 51st Annual International Symposium on Computer Architecture (ISCA). 756--769","author":"Agrawal Rashmi","year":"2024","unstructured":"Rashmi Agrawal, Anantha Chandrakasan, and Ajay Joshi. 2024. HEAP: A Fully Homomorphic Encryption Accelerator with Parallelized Bootstrapping. In 2024 ACM\/IEEE 51st Annual International Symposium on Computer Architecture (ISCA). 756--769. https:\/\/doi.org\/10.1109\/ ISCA59077.2024.00060"},{"key":"e_1_3_2_1_4_1","volume-title":"FAB: An FPGA-based Accelerator for Bootstrappable Fully Homomorphic Encryption. In 2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA). 882--895","author":"Agrawal R.","unstructured":"R. Agrawal, L. de Castro, G. Yang, C. Juvekar, R. Yazicigil, A. Chandrakasan, V. Vaikuntanathan, and A. Joshi. 2023. FAB: An FPGA-based Accelerator for Bootstrappable Fully Homomorphic Encryption. In 2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA). 882--895."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Ahmad Al Badawi Jack Bates Flavio Bergamaschi David Bruce Cousins Saroja Erabelli Nicholas Genise Shai Halevi Hamish Hunt Andrey Kim Yongwoo Lee Zeyu Liu Daniele Micciancio Ian Quah Yuriy Polyakov Saraswathy R.V. Kurt Rohloff Jonathan Saylor Dmitriy Suponitsky Matthew Triplett Vinod Vaikuntanathan and Vincent Zucca. 2022. OpenFHE: Open-Source Fully Homomorphic Encryption Library. Cryptology ePrint Archive Paper 2022\/915. https:\/\/eprint.iacr.org\/2022\/915","DOI":"10.1145\/3560827.3563379"},{"key":"e_1_3_2_1_6_1","unstructured":"Jean-Claude Bajard Julien Eynard Anwar Hasan and Vincent Zucca. 2016. A Full RNS Variant of FV like Somewhat Homomorphic Encryption Schemes. Cryptology ePrint Archive Paper 2016\/510. https:\/\/eprint.iacr.org\/2016\/510"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.52.0078"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616608"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474366.3486926"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"e_1_3_2_1_11_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Canella Claudio","year":"2019","unstructured":"Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, and Daniel Gruss. 2019. A Systematic Evaluation of Transient Execution Attacks and Defenses. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 249--266. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/ presentation\/canella"},{"key":"e_1_3_2_1_12_1","unstructured":"Capital One. [n. d.]. Information on the Capital One cyber incident. https:\/\/www.capitalone.com\/digital\/facts2019\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","unstructured":"Jung Cheon Han Kyoohyung Andrey Kim Miran Kim and Yongsoo Song. 2018. Bootstrapping for Approximate Homomorphic Encryption. 360--384. https:\/\/doi.org\/10.1007\/978-3-319-78381-9_14","DOI":"10.1007\/978-3-319-78381-9_14"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"Jung Cheon Han Kyoohyung Andrey Kim Miran Kim and Yongsoo Song. 2018. Bootstrapping for Approximate Homomorphic Encryption. 360--384. https:\/\/doi.org\/10.1007\/978-3-319-78381-9_14","DOI":"10.1007\/978-3-319-78381-9_14"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_16_1","volume-title":"DaCapo: Automatic Bootstrapping Management for Efficient Fully Homomorphic Encryption. In 33rd USENIX Security Symposium (USENIX Security. USENIX Association","author":"Cheon Seonyoung","year":"2024","unstructured":"Seonyoung Cheon, Yongwoo Lee, Dongkwan Kim, Ju Min Lee, Sunchul Jung, Taekyung Kim, Dongyoon Lee, and Hanjun Kim. 2024. DaCapo: Automatic Bootstrapping Management for Efficient Fully Homomorphic Encryption. In 33rd USENIX Security Symposium (USENIX Security. USENIX Association, Philadelphia, PA, 6993--7010. https: \/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/cheon"},{"key":"e_1_3_2_1_17_1","volume-title":"TFHE: Fast Fully Homomorphic Encryption Library. https:\/\/tfhe.github.io\/tfhe\/","author":"Chillotti Ilaria","year":"2016","unstructured":"Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabach\u00e8ne. August 2016. TFHE: Fast Fully Homomorphic Encryption Library. https:\/\/tfhe.github.io\/tfhe\/"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386023"},{"key":"e_1_3_2_1_19_1","volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. arXiv:1810.04805","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. arXiv:1810.04805"},{"key":"e_1_3_2_1_20_1","unstructured":"European Parliament and Council of the European Union. [n. d.]. Regulation (EU) 2016\/679 of the European Parliament and of the Council. https:\/\/data.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"e_1_3_2_1_21_1","unstructured":"EuroPracticeIC. 2024. EUROPRACTICE | Schedules 2024. https: \/\/europractice-ic.com\/schedules-prices-2024\/"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10071017"},{"key":"e_1_3_2_1_23_1","unstructured":"Federal Trade Commission. [n. d.]. Equifax Data Breach Settlement. https:\/\/www.ftc.gov\/enforcement\/refunds\/equifax-data-breachsettlement."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of The 33rd International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"210","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. In Proceedings of The 33rd International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 48). PMLR, New York, New York, USA, 201--210. https:\/\/proceedings.mlr.press\/v48\/giladbachrach16.html"},{"key":"e_1_3_2_1_26_1","volume-title":"An introduction to the california consumer privacy act (ccpa). Santa Clara Univ. Legal Studies Research Paper","author":"Goldman Eric","year":"2020","unstructured":"Eric Goldman. 2020. An introduction to the california consumer privacy act (ccpa). Santa Clara Univ. Legal Studies Research Paper (2020)."},{"key":"e_1_3_2_1_27_1","unstructured":"Google. [n. d.]. HEIR: Homomorphic Encryption Intermediate Representation. https:\/\/heir.dev\/"},{"key":"e_1_3_2_1_28_1","unstructured":"Shai Halevi and Victor Shoup. 2020. Design and implementation of HElib: a homomorphic encryption library. Cryptology ePrint Archive Paper 2020\/1481. https:\/\/eprint.iacr.org\/2020\/1481"},{"key":"e_1_3_2_1_29_1","volume-title":"Jung Hee Cheon, and Daejun Park","author":"Han Kyoohyung","year":"2018","unstructured":"Kyoohyung Han, Seungwan Hong, Jung Hee Cheon, and Daejun Park. 2018. Efficient Logistic Regression on Large Encrypted Data. Cryptology ePrint Archive, Paper 2018\/662. https:\/\/eprint.iacr.org\/2018\/662"},{"key":"e_1_3_2_1_30_1","unstructured":"Kyoohyung Han and Dohyeong Ki. 2019. Better Bootstrapping for Approximate Homomorphic Encryption. Cryptology ePrint Archive Paper 2019\/688. https:\/\/eprint.iacr.org\/2019\/688"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_32_1","volume-title":"Sangsoo Park, Won Lee, Shinyoung Lee, Soo-Min Lee, Kihwan Seong, Eunkyoung Ha, Eunsu Kim, Jihun Oh, Kyoung-Hoi Koo, Sanghune Park, and Jongshin Shin.","author":"Hwang Sangyun","year":"2024","unstructured":"Sangyun Hwang, Taekyung Yeo Kwanyeob Chae, Sangsoo Park, Won Lee, Shinyoung Lee, Soo-Min Lee, Kihwan Seong, Eunkyoung Ha, Eunsu Kim, Jihun Oh, Kyoung-Hoi Koo, Sanghune Park, and Jongshin Shin. 2024. A 3.2 Gbps\/pin HBM2E PHY with Low Power I\/O and Enhanced Training Scheme for 2.5D System-in-Package Solutions. In HotChips'33."},{"key":"e_1_3_2_1_33_1","volume-title":"Jung Hee Cheon, and Younho Lee.","author":"Jung Wonkyung","year":"2021","unstructured":"Wonkyung Jung, Sangpyo Kim, Jung Ho Ahn, Jung Hee Cheon, and Younho Lee. 2021. Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs. Cryptology ePrint Archive, Paper 2021\/508. https:\/\/eprint.iacr.org\/ 2021\/508"},{"key":"e_1_3_2_1_34_1","volume-title":"GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In 27th USENIX Security Symposium (USENIX Security . USENIX Association","author":"Juvekar Chiraag","year":"2018","unstructured":"Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In 27th USENIX Security Symposium (USENIX Security . USENIX Association, Baltimore, MD, 1651--1669. https:\/\/www. usenix.org\/conference\/usenixsecurity18\/presentation\/juvekar"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589053"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12920-020-"},{"key":"e_1_3_2_1_38_1","unstructured":"Sangpyo Kim Jongmin Kim Jaeyoung Choi and Jung Ho Ahn. 2024. CiFHER: A Chiplet-Based FHE Accelerator with a Resizable Structure. arXiv:2308.04890 [cs.AR]"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527415"},{"key":"e_1_3_2_1_40_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. In IEEE Symposium on Security and Privacy (S&P).","author":"Kocher Paul","year":"2019","unstructured":"Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_41_1","volume-title":"12th USENIX Workshop on Offensive Technologies, WOOT 2018","author":"Koruyeh Esmaeil Mohammadian","year":"2018","unstructured":"Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, and Nael B. Abu-Ghazaleh. 2018. Spectre Returns! Speculation Attacks using the Return Stack Buffer. In 12th USENIX Workshop on Offensive Technologies, WOOT 2018, Baltimore, MD, USA, August 13-14, 2018. USENIX Association."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33019466"},{"key":"e_1_3_2_1_43_1","volume-title":"Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network. CoRR abs\/2106.07229","author":"Lee Joon-Woo","year":"2021","unstructured":"Joon-Woo Lee, HyungChul Kang, Yongwoo Lee, Woosuk Choi, Jieun Eom, Maxim Deryabin, Eunsang Lee, Junghyun Lee, Donghoon Yoo, Young-Sik Kim, and Jong-Seon No. 2021. Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network. CoRR abs\/2106.07229 (2021). arXiv:2106.07229 https: \/\/arxiv.org\/abs\/2106.07229"},{"key":"e_1_3_2_1_44_1","volume-title":"Meltdown: Reading Kernel Memory from User Space. In USENIX Security'18.","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher,Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading Kernel Memory from User Space. In USENIX Security'18."},{"key":"e_1_3_2_1_45_1","unstructured":"Natasha Lomas. [n. d.]. Italy orders ChatGPT blocked citing data protection concerns. https:\/\/techcrunch.com\/2023\/03\/31\/chatgptblocked-italy\/. Last accessed: 05\/28\/2023."},{"key":"e_1_3_2_1_46_1","unstructured":"Cecily Mauran. [n. d.]. Whoops Samsung workers accidentally leaked trade secrets via ChatGPT. https:\/\/mashable.com\/article\/samsungchatgpt- leak-details. Last accessed: 05\/28\/2023."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2019.00045"},{"key":"e_1_3_2_1_48_1","unstructured":"MuseSemi. 2024. Muse Semiconductor TSMC University FinFET Program Service and Price. https:\/\/www.musesemi.com\/university-finfetprogram"},{"key":"e_1_3_2_1_49_1","unstructured":"NVIDIA. [n. d.]. NVIDIA Scalable Hierarchical Aggregation and Reduction Protocol (SHARP). https:\/\/docs.nvidia.com\/networking\/display\/ sharpv300"},{"key":"e_1_3_2_1_50_1","unstructured":"NVIDIA. [n. d.]. Nvlink. https:\/\/www.nvidia.com\/en-us\/data-center\/nvlink\/"},{"key":"e_1_3_2_1_51_1","unstructured":"NVIDIA. 2024. NVIDIA Blackwell Platform Arrives to Power a NewEra of Computing. https:\/\/nvidianews.nvidia.com\/news\/nvidia-blackwellplatform- arrives-to-power-a-new-era-of-computing"},{"key":"e_1_3_2_1_52_1","unstructured":"Kate Park. [n. d.]. Samsung bans use of generative AI tools like ChatGPT after April internal data leak. https:\/\/techcrunch.com\/2023\/05\/02\/samsung-bans-use-of-generativeai-tools-like-chatgpt-after-april-internal-data-leak. Last accessed: 05\/28\/2023."},{"key":"e_1_3_2_1_53_1","volume-title":"Cheetah: Optimizing and Accelerating Homomorphic Encryption for Private Inference. arXiv:2006.00505","author":"Reagen Brandon","year":"2020","unstructured":"Brandon Reagen, Wooseok Choi, Yeongil Ko, Vincent Lee, Gu-Yeon Wei, Hsien-Hsin S. Lee, and David Brooks. 2020. Cheetah: Optimizing and Accelerating Homomorphic Encryption for Private Inference. arXiv:2006.00505"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.14778\/3574245.3574248"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480070"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527393"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3620665.3640397"},{"key":"e_1_3_2_1_58_1","volume-title":"https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research","author":"SEAL","unstructured":"SEAL 2023. Microsoft SEAL (release 4.1). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research, Redmond, WA.."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS57527.2023.00034"},{"key":"e_1_3_2_1_60_1","volume-title":"Proceedings of the 36th International Conference on Computer-Aided Design","author":"Stow Dylan","unstructured":"Dylan Stow, Yuan Xie, Taniya Siddiqua, and Gabriel H. Loh. 2017. Costeffective design of scalable high-performance systems using active and passive interposers. In Proceedings of the 36th International Conference on Computer-Aided Design (Irvine, California) (ICCAD '17). IEEE Press, 728--735."},{"key":"e_1_3_2_1_61_1","unstructured":"The Verge. [n. d.]. T-Mobile discloses its second data breach so far this year. https:\/\/www.theverge.com\/2023\/5\/2\/23707894\/tmobile-databreach- april-personal-data-pin-hack-security."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507737"},{"key":"e_1_3_2_1_63_1","unstructured":"Wired. [n. d.]. The Snowflake Attack May Be Turning Into One of the Largest Data Breaches Ever. https:\/\/www.wired.com\/story\/snowflakebreach-advanced-auto-parts-lendingtree\/."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10070984"},{"key":"e_1_3_2_1_65_1","unstructured":"Jiawen Zhang Jian Liu Xinpeng Yang Yinghao Wang Kejia Chen Xiaoyang Hou Kui Ren and Xiaohu Yang. 2024. Secure Transformer Inference Made Non-interactive. Cryptology ePrint Archive Paper 2024\/136. https:\/\/eprint.iacr.org\/2024\/136"}],"event":{"name":"ASPLOS '25: 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Rotterdam Netherlands","acronym":"ASPLOS '25","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3669940.3707260","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3669940.3707260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T14:45:46Z","timestamp":1755787546000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3669940.3707260"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,30]]},"references-count":65,"alternative-id":["10.1145\/3669940.3707260","10.1145\/3669940"],"URL":"https:\/\/doi.org\/10.1145\/3669940.3707260","relation":{},"subject":[],"published":{"date-parts":[[2025,3,30]]},"assertion":[{"value":"2025-03-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}