{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:37:58Z","timestamp":1774366678054,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1145\/3691620.3695018","type":"proceedings-article","created":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T15:39:19Z","timestamp":1729265959000},"page":"455-467","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Efficient Detection of Toxic Prompts in Large Language Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4978-127X","authenticated-orcid":false,"given":"Yi","family":"Liu","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5370-6262","authenticated-orcid":false,"given":"Junzhe","family":"Yu","sequence":"additional","affiliation":[{"name":"ShanghaiTech University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8504-2733","authenticated-orcid":false,"given":"Huijia","family":"Sun","sequence":"additional","affiliation":[{"name":"ShanghaiTech University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2023-0247","authenticated-orcid":false,"given":"Ling","family":"Shi","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0046-6674","authenticated-orcid":false,"given":"Gelei","family":"Deng","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2988-6012","authenticated-orcid":false,"given":"Yuqi","family":"Chen","sequence":"additional","affiliation":[{"name":"ShanghaiTech University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7300-9215","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2024,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"About the api score. https:\/\/developers.perspectiveapi.com\/s\/about-the-api-score?language=en_US."},{"key":"e_1_3_2_1_2_1","unstructured":"allenai\/real-toxicity-prompts \u00b7 datasets at hugging face. https:\/\/huggingface.co\/datasets\/allenai\/real-toxicity-prompts. (Accessed on 08\/10\/2024)."},{"key":"e_1_3_2_1_3_1","unstructured":"cdn.openai.com\/papers\/gpt-4-system-card.pdf. https:\/\/cdn.openai.com\/papers\/gpt-4-system-card.pdf. (Accessed on 08\/13\/2024)."},{"key":"e_1_3_2_1_4_1","unstructured":"Fact sheet: Biden-harris administration secures voluntary commitments from leading artificial intelligence companies to manage the risks posed by ai | the white house. https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2023\/07\/21\/fact-sheet-biden-harris-administration-secures-voluntary-commitments-from-leading-artificial-intelligence-companies-to-manage-the-risks-posed-by-ai\/. (Accessed on 08\/13\/2024)."},{"key":"e_1_3_2_1_5_1","unstructured":"Meta llama 3. https:\/\/llama.meta.com\/llama3\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Number of chatgpt users (aug 2024). https:\/\/explodingtopics.com\/blog\/chatgpt-users. (Accessed on 08\/13\/2024)."},{"key":"e_1_3_2_1_7_1","unstructured":"Ryokoai\/sharegpt52k datasets at hugging face. https:\/\/huggingface.co\/datasets\/RyokoAI\/ShareGPT52K."},{"key":"e_1_3_2_1_8_1","unstructured":"Toxicdetector. https:\/\/sites.google.com\/view\/toxic-prompt-detector."},{"key":"e_1_3_2_1_9_1","unstructured":"Usage policies | openai. https:\/\/openai.com\/policies\/usage-policies\/. (Accessed on 08\/13\/2024)."},{"key":"e_1_3_2_1_10_1","volume-title":"Gpt-4 technical report. arXiv preprint arXiv:2303.08774","author":"Achiam J.","year":"2023","unstructured":"Achiam, J., Adler, S., Agarwal, S., Ahmad, L., Akkaya, I., Aleman, F. L., Almeida, D., Altenschmidt, J., Altman, S., Anadkat, S., et al. Gpt-4 technical report. arXiv preprint arXiv:2303.08774 (2023)."},{"key":"e_1_3_2_1_11_1","volume-title":"October","year":"2023","unstructured":"andyll7772. Run a chatgpt-like chatbot on a single gpu with rocm, October 2023."},{"key":"e_1_3_2_1_12_1","volume-title":"Safety-tuned llamas: Lessons from improving the safety of large language models that follow instructions","author":"Bianchi F.","year":"2024","unstructured":"Bianchi, F., Suzgun, M., Attanasio, G., R\u00f6ttger, P., Jurafsky, D., Hashimoto, T., and Zou, J. Safety-tuned llamas: Lessons from improving the safety of large language models that follow instructions, 2024."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_1_15_1","volume-title":"Play guessing game with llm: Indirect jailbreak attack with implicit clues","author":"Chang Z.","year":"2024","unstructured":"Chang, Z., Li, M., Liu, Y., Wang, J., Wang, Q., and Liu, Y. Play guessing game with llm: Indirect jailbreak attack with implicit clues, 2024."},{"key":"e_1_3_2_1_16_1","first-page":"29","volume-title":"Proceedings of the 10th ACM Workshop on Moving Target Defense (New York, NY, USA, 2023), MTD '23, Association for Computing Machinery","author":"Chen B.","unstructured":"Chen, B., Paliwal, A., and Yan, Q. Jailbreaker in jail: Moving target defense for large language models. In Proceedings of the 10th ACM Workshop on Moving Target Defense (New York, NY, USA, 2023), MTD '23, Association for Computing Machinery, p. 29--32."},{"key":"e_1_3_2_1_17_1","volume-title":"Bge m3-embedding: Multi-lingual, multi-functionality, multi-granularity text embeddings through self-knowledge distillation","author":"Chen J.","year":"2024","unstructured":"Chen, J., Xiao, S., Zhang, P., Luo, K., Lian, D., and Liu, Z. Bge m3-embedding: Multi-lingual, multi-functionality, multi-granularity text embeddings through self-knowledge distillation, 2024."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings 2024 Network and Distributed System Security Symposium (2024), NDSS 2024, Internet Society.","author":"Deng G.","unstructured":"Deng, G., Liu, Y., Li, Y., Wang, K., Zhang, Y., Li, Z., Wang, H., Zhang, T., and Liu, Y. Masterkey: Automated jailbreaking of large language model chatbots. In Proceedings 2024 Network and Distributed System Security Symposium (2024), NDSS 2024, Internet Society."},{"key":"e_1_3_2_1_19_1","volume-title":"Pandora: Jailbreak gpts by retrieval augmented generation poisoning","author":"Deng G.","year":"2024","unstructured":"Deng, G., Liu, Y., Wang, K., Li, Y., Zhang, T., and Liu, Y. Pandora: Jailbreak gpts by retrieval augmented generation poisoning, 2024."},{"key":"e_1_3_2_1_20_1","volume-title":"Realtoxicityprompts: Evaluating neural toxic degeneration in language models. arXiv preprint arXiv:2009.11462","author":"Gehman S.","year":"2020","unstructured":"Gehman, S., Gururangan, S., Sap, M., Choi, Y., and Smith, N. A. Realtoxicityprompts: Evaluating neural toxic degeneration in language models. arXiv preprint arXiv:2009.11462 (2020)."},{"key":"e_1_3_2_1_21_1","volume-title":"From chatgpt to threatgpt: Impact of generative ai in cybersecurity and privacy","author":"Gupta M.","year":"2023","unstructured":"Gupta, M., Akiri, C., Aryal, K., Parker, E., and Praharaj, L. From chatgpt to threatgpt: Impact of generative ai in cybersecurity and privacy. IEEE Access (2023)."},{"key":"e_1_3_2_1_22_1","volume-title":"The platonic representation hypothesis","author":"Huh M.","year":"2024","unstructured":"Huh, M., Cheung, B., Wang, T., and Isola, P. The platonic representation hypothesis, 2024."},{"key":"e_1_3_2_1_23_1","volume-title":"P., Goldblum, M., Saha, A., Geiping, J., and Goldstein, T.","author":"Jain N.","year":"2023","unstructured":"Jain, N., Schwarzschild, A., Wen, Y., Somepalli, G., Kirchenbauer, J., yeh Chiang, P., Goldblum, M., Saha, A., Geiping, J., and Goldstein, T. Baseline defenses for adversarial attacks against aligned language models, 2023."},{"key":"e_1_3_2_1_24_1","volume-title":"Transformers are short text classifiers: A study of inductive short text classifiers on benchmarks and real-world datasets. arXiv preprint arXiv:2211.16878","author":"Karl F.","year":"2022","unstructured":"Karl, F., and Scherp, A. Transformers are short text classifiers: A study of inductive short text classifiers on benchmarks and real-world datasets. arXiv preprint arXiv:2211.16878 (2022)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42227-1_5"},{"key":"e_1_3_2_1_26_1","volume-title":"Watch your language: Investigating content moderation with large language models","author":"Kumar D.","year":"2024","unstructured":"Kumar, D., AbuHashem, Y., and Durumeric, Z. Watch your language: Investigating content moderation with large language models, 2024."},{"key":"e_1_3_2_1_27_1","volume-title":"Feb.","author":"Lees A.","year":"2022","unstructured":"Lees, A., Tran, V. Q., Tay, Y., Sorensen, J., Gupta, J., Metzler, D., and Vasserman, L. A New Generation of Perspective API: Efficient Multilingual Character-level Transformers, Feb. 2022. arXiv:2202.11176 [cs]."},{"key":"e_1_3_2_1_28_1","volume-title":"A new generation of perspective api: Efficient multilingual character-level transformers","author":"Lees A.","year":"2022","unstructured":"Lees, A., Tran, V. Q., Tay, Y., Sorensen, J., Gupta, J., Metzler, D., and Vasserman, L. A new generation of perspective api: Efficient multilingual character-level transformers, 2022."},{"key":"e_1_3_2_1_29_1","volume-title":"Self and cross-model distillation for llms: Effective methods for refusal pattern alignment","author":"Li J.","year":"2024","unstructured":"Li, J., Liu, Y., Liu, C., Ren, X., Shi, L., Sun, W., and Xue, Y. Self and cross-model distillation for llms: Effective methods for refusal pattern alignment, 2024."},{"key":"e_1_3_2_1_30_1","volume-title":"Understanding neural networks through representation erasure. arXiv preprint arXiv:1612.08220","author":"Li J.","year":"2016","unstructured":"Li, J., Monroe, W., and Jurafsky, D. Understanding neural networks through representation erasure. arXiv preprint arXiv:1612.08220 (2016)."},{"key":"e_1_3_2_1_31_1","volume-title":"Lockpicking llms: A logit-based jailbreak using token-level manipulation","author":"Li Y.","year":"2024","unstructured":"Li, Y., Liu, Y., Li, Y., Shi, L., Deng, G., Chen, S., and Wang, K. Lockpicking llms: A logit-based jailbreak using token-level manipulation, 2024."},{"key":"e_1_3_2_1_32_1","volume-title":"Prompt injection attack against llm-integrated applications. arXiv preprint arXiv:2306.05499","author":"Liu Y.","year":"2023","unstructured":"Liu, Y., Deng, G., Li, Y., Wang, K., Zhang, T., Liu, Y., Wang, H., Zheng, Y., and Liu, Y. Prompt injection attack against llm-integrated applications. arXiv preprint arXiv:2306.05499 (2023)."},{"key":"e_1_3_2_1_33_1","volume-title":"Jailbreaking chatgpt via prompt engineering: An empirical study. arXiv preprint arXiv:2305.13860","author":"Liu Y.","year":"2023","unstructured":"Liu, Y., Deng, G., Xu, Z., Li, Y., Zheng, Y., Zhang, Y., Zhao, L., Zhang, T., and Liu, Y. Jailbreaking chatgpt via prompt engineering: An empirical study. arXiv preprint arXiv:2305.13860 (2023)."},{"key":"e_1_3_2_1_34_1","volume-title":"Groot: Adversarial testing for generative text-to-image models with tree-based semantic transformation","author":"Liu Y.","year":"2024","unstructured":"Liu, Y., Yang, G., Deng, G., Chen, F., Chen, Y., Shi, L., Zhang, T., and Liu, Y. Groot: Adversarial testing for generative text-to-image models with tree-based semantic transformation, 2024."},{"key":"e_1_3_2_1_35_1","volume-title":"A holistic approach to undesired content detection. arXiv preprint arXiv:2208.03274","author":"Markov T.","year":"2022","unstructured":"Markov, T., Zhang, C., Agarwal, S., Eloundou, T., Lee, T., Adler, S., Jiang, A., and Weng, L. A holistic approach to undesired content detection. arXiv preprint arXiv:2208.03274 (2022)."},{"key":"e_1_3_2_1_36_1","volume-title":"Harmbench: A standardized evaluation framework for automated red teaming and robust refusal","author":"Mazeika M.","year":"2024","unstructured":"Mazeika, M., Phan, L., Yin, X., Zou, A., Wang, Z., Mu, N., Sakhaee, E., Li, N., Basart, S., Li, B., Forsyth, D., and Hendrycks, D. Harmbench: A standardized evaluation framework for automated red teaming and robust refusal, 2024."},{"key":"e_1_3_2_1_37_1","volume-title":"Umap: Uniform manifold approximation and projection for dimension reduction","author":"McInnes L.","year":"2020","unstructured":"McInnes, L., Healy, J., and Melville, J. Umap: Uniform manifold approximation and projection for dimension reduction, 2020."},{"key":"e_1_3_2_1_38_1","volume-title":"Mann-whitney u test. The Corsini encyclopedia of psychology","author":"McKnight P. E.","year":"2010","unstructured":"McKnight, P. E., and Najab, J. Mann-whitney u test. The Corsini encyclopedia of psychology (2010), 1--1."},{"key":"e_1_3_2_1_39_1","unstructured":"Meta. \"llama-13b\". https:\/\/github.com\/facebookresearch\/llama\/tree\/llama_v1."},{"key":"e_1_3_2_1_40_1","unstructured":"Meta. \"llama2-13b\". https:\/\/github.com\/facebookresearch\/llama."},{"key":"e_1_3_2_1_41_1","volume-title":"Exploring the limits of transfer learning with a unified text-to-text transformer. Journal of machine learning research 21, 140","author":"Raffel C.","year":"2020","unstructured":"Raffel, C., Shazeer, N., Roberts, A., Lee, K., Narang, S., Matena, M., Zhou, Y., Li, W., and Liu, P. J. Exploring the limits of transfer learning with a unified text-to-text transformer. Journal of machine learning research 21, 140 (2020), 1--67."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560599"},{"key":"e_1_3_2_1_43_1","volume-title":"A strongreject for empty jailbreaks","author":"Souly A.","year":"2024","unstructured":"Souly, A., Lu, Q., Bowen, D., Trinh, T., Hsieh, E., Pandey, S., Abbeel, P., Svegliato, J., Emmons, S., Watkins, O., and Toyer, S. A strongreject for empty jailbreaks, 2024."},{"key":"e_1_3_2_1_44_1","volume-title":"Gemini: a family of highly capable multimodal models. arXiv preprint arXiv:2312.11805","author":"Team G.","year":"2023","unstructured":"Team, G., Anil, R., Borgeaud, S., Wu, Y., Alayrac, J.-B., Yu, J., Soricut, R., Schalkwyk, J., Dai, A. M., Hauth, A., et al. Gemini: a family of highly capable multimodal models. arXiv preprint arXiv:2312.11805 (2023)."},{"key":"e_1_3_2_1_45_1","unstructured":"Team G. Riviere M. Pathak S. Sessa P. G. Hardin C. Bhupatiraju S. Hussenot L. Mesnard T. Shahriari B. Ram\u00e9 A. Ferret J. Liu P. Tafti P. Friesen A. Casbon M. Ramos S. Kumar R. Lan C. L. Jerome S. Tsitsulin A. Vieillard N. Stanczyk P. Girgin S. Momchev N. Hoffman M. Thakoor S. Grill J.-B. Neyshabur B. Bachem O. Walton A. Severyn A. Parrish A. Ahmad A. Hutchison A. Abdagic A. Carl A. Shen A. Brock A. Coenen A. Laforge A. Paterson A. Bastian B. Piot B. Wu B. Royal B. Chen C. Kumar C. Perry C. Welty C. Choqette-Choo C. A. Sinopalnikov D. Weinberger D. Vijaykumar D. Rogozi\u0144ska D. Herbison D. Bandy E. Wang E. Noland E. Moreira E. Senter E. Eltyshev E. Visin F. Rasskin G. Wei G. Cameron G. Martins G. Hashemi H. Klimczak-Pluci\u0144ska H. Batra H. Dhand H. Nardini I. Mein J. Zhou J. Svensson J. Stanway J. Chan J. Zhou J. P. Carrasqeira J. Iljazi J. Becker J. Fernandez J. van Amersfoort J. Gordon J. Lipschultz J. Newlan J. yeong Ji J. Mohamed K. Badola K. Black K. Millican K. McDonell K. Nguyen K. Sodhia K. Greene K. Sjoesund L. L. Usui L. Sifre L. Heuermann L. Lago L. McNealus L. Soares L. B. Kilpatrick L. Dixon L. Martins L. Reid M. Singh M. Iverson M. G\u00f6rner M. Velloso M. Wirth M. Davidow M. Miller M. Rahtz M. Watson M. Risdal M. Kazemi M. Moynihan M. Zhang M. Kahng M. Park M. Rahman M. Khatwani M. Dao N. Bardoliwalla N. Devanathan N. Dumai N. Chauhan N. Wahltinez O. Botarda P. Barnes P. Barham P. Michel P. Jin P. Georgiev P. Culliton P. Kuppala P. Comanescu R. Merhej R. Jana R. Rokni R. A. Agarwal R. Mullins R. Saadat S. Carthy S. M. Perrin S. Arnold S. M. R. Krause S. Dai S. Garg S. Sheth S. Ronstrom S. Chan S. Jordan T. Yu T. Eccles T. Hennigan T. Kocisky T. Doshi T. Jain V. Yadav V. Meshram V. Dharmadhikari V. Barkley W. Wei W. Ye W. Han W. Kwon W. Xu X. Shen Z. Gong Z. Wei Z. Cotruta V. Kirk P. Rao A. Giang M. Peran L. Warkentin T. Collins E. Barral J. Ghahramani Z. Hadsell R. Sculley D. Banks J. Dragan A. Petrov S. Vinyals O. Dean J. Hassabis D. Kavukcuoglu K. Farabet C. Buchatskaya E. Borgeaud S. Fiedel N. Joulin A. Kenealy K. Dadashi R. and Andreev A. Gemma 2: Improving open language models at a practical size 2024."},{"key":"e_1_3_2_1_46_1","unstructured":"Team T. V. \"vicuna-13b\". https:\/\/github.com\/lm-sys\/FastChat."},{"key":"e_1_3_2_1_47_1","volume-title":"Decodingtrust: A comprehensive assessment of trustworthiness in gpt models","author":"Wang B.","year":"2024","unstructured":"Wang, B., Chen, W., Pei, H., Xie, C., Kang, M., Zhang, C., Xu, C., Xiong, Z., Dutta, R., Schaeffer, R., Truong, S. T., Arora, S., Mazeika, M., Hendrycks, D., Lin, Z., Cheng, Y., Koyejo, S., Song, D., and Li, B. Decodingtrust: A comprehensive assessment of trustworthiness in gpt models, 2024."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-acl.443"},{"key":"e_1_3_2_1_49_1","volume-title":"Autodefense: Multi-agent llm defense against jailbreak attacks","author":"Zeng Y.","year":"2024","unstructured":"Zeng, Y., Wu, Y., Zhang, X., Wang, H., and Wu, Q. Autodefense: Multi-agent llm defense against jailbreak attacks, 2024."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i19.30178"},{"key":"e_1_3_2_1_51_1","volume-title":"Defending jailbreak prompts via in-context adversarial game","author":"Zhou Y.","year":"2024","unstructured":"Zhou, Y., Han, Y., Zhuang, H., Guo, T., Guo, K., Liang, Z., Bao, H., and Zhang, X. Defending jailbreak prompts via in-context adversarial game, 2024."},{"key":"e_1_3_2_1_52_1","volume-title":"Red teaming chatgpt via jail-breaking: Bias, robustness, reliability and toxicity. arXiv preprint arXiv:2301.12867","author":"Zhuo T. Y.","year":"2023","unstructured":"Zhuo, T. Y., Huang, Y., Chen, C., and Xing, Z. Red teaming chatgpt via jail-breaking: Bias, robustness, reliability and toxicity. arXiv preprint arXiv:2301.12867 (2023)."},{"key":"e_1_3_2_1_53_1","volume-title":"Representation engineering: A top-down approach to ai transparency","author":"Zou A.","year":"2023","unstructured":"Zou, A., Phan, L., Chen, S., Campbell, J., Guo, P., Ren, R., Pan, A., Yin, X., Mazeika, M., Dombrowski, A.-K., Goel, S., Li, N., Byun, M. J., Wang, Z., Mallen, A., Basart, S., Koyejo, S., Song, D., Fredrikson, M., Kolter, J. Z., and Hendrycks, D. Representation engineering: A top-down approach to ai transparency, 2023."},{"key":"e_1_3_2_1_54_1","volume-title":"Universal and transferable adversarial attacks on aligned language models. arXiv preprint arXiv:2307.15043","author":"Zou A.","year":"2023","unstructured":"Zou, A., Wang, Z., Kolter, J. Z., and Fredrikson, M. Universal and transferable adversarial attacks on aligned language models. arXiv preprint arXiv:2307.15043 (2023)."}],"event":{"name":"ASE '24: 39th IEEE\/ACM International Conference on Automated Software Engineering","location":"Sacramento CA USA","acronym":"ASE '24","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695018","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3691620.3695018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:06Z","timestamp":1750291446000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695018"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":54,"alternative-id":["10.1145\/3691620.3695018","10.1145\/3691620"],"URL":"https:\/\/doi.org\/10.1145\/3691620.3695018","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]},"assertion":[{"value":"2024-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}