{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T05:04:38Z","timestamp":1769749478879,"version":"3.49.0"},"reference-count":121,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:00:00Z","timestamp":1731283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2025,3,31]]},"abstract":"<jats:p>Smart-home systems represent the future of modern building infrastructure as they integrate numerous devices and applications to improve the overall quality of life. These systems establish connectivity among smart devices, leveraging network technologies and algorithmic controls to monitor and manage physical environments. However, ensuring robust security in smart homes, along with securing smart devices, presents a formidable challenge. A substantial number of security solutions for smart homes rely on data-driven approaches (e.g., machine\/deep learning) to identify and mitigate potential threats. These approaches involve training models on extensive datasets, which distinguishes them from knowledge-driven methods. In this review, we examine the role of knowledge within smart homes, focusing on understanding and reasoning regarding various events and their utility toward securing smart homes. We propose a taxonomy to characterize the categorization of decision-making approaches. By specifying the most common vulnerabilities, attacks, and threats, we can analyze and assess the countermeasures against them. We also examine how smart homes have been evaluated in the reviewed literature. Furthermore, we explore the challenges inherent in smart homes and investigate existing solutions that aim at overcoming these limitations. Finally, we examine the key gaps in smart-home-security research and define future research directions for knowledge-driven schemes.<\/jats:p>","DOI":"10.1145\/3698768","type":"journal-article","created":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T10:53:55Z","timestamp":1727952835000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Knowledge-based Cyber Physical Security at Smart Home: A Review"],"prefix":"10.1145","volume":"57","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-7082-8769","authenticated-orcid":false,"given":"Azhar","family":"Alsufyani","sequence":"first","affiliation":[{"name":"School of Computer Science and Informatics, Cardiff University, Cardiff, United Kingdom of Great Britain and Northern Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3597-2646","authenticated-orcid":false,"given":"Omer","family":"Rana","sequence":"additional","affiliation":[{"name":"School of Computer Science &amp; Informatics, Cardiff University, Cardiff, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0190-3346","authenticated-orcid":false,"given":"Charith","family":"Perera","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, United Kingdom of Great Britain and Northern Ireland"}]}],"member":"320","published-online":{"date-parts":[[2024,11,11]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.5555\/647985.743843"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21227714"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.10.012"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2018.00131"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.08.017"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00013"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2017.8000099"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-024-09803-1"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2017.7946657"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.04.005"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2878681"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/2993422.2993577"},{"key":"e_1_3_2_14_2","first-page":"89","article-title":"MQTT version 3.1. 1","volume":"29","author":"Banks Andrew","year":"2014","unstructured":"Andrew Banks and Rahul Gupta. 2014. MQTT version 3.1. 1. OASIS Standard 29 (2014), 89.","journal-title":"OASIS Standard"},{"key":"e_1_3_2_15_2","article-title":"Iot-lite ontology","author":"Bermudez-Edo Maria","year":"2015","unstructured":"Maria Bermudez-Edo, Tarek Elsaleh, Payam Barnaghi, and Kerry Taylor. 2015. Iot-lite ontology. W3C Member Submission, W3C, November (2015).","journal-title":"W3C Member Submission, W3C, November"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02161-9_3"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2023.107770"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23326"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642958"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2008.02.001"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2024.103118"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00056"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3524844.3528054"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3618001"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2012.05.003"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2011.10.001"},{"key":"e_1_3_2_27_2","unstructured":"NDN Specification Contributors. 2022. NDN Packet Format Specification version 0.3. (2022). Retrieved 2022 August 2022 from https:\/\/named-data.net\/doc\/NDN-packet-spec\/current\/changelog.html#version-0-3"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.3414\/ME0592"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-017-0035-0"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2024.10412036"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/4236.877487"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098251"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243865"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3229565.3229570"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00018"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.03.034"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"e_1_3_2_38_2","unstructured":"Gabe Fierro. 2024. Brick. (2024). Retrieved from https:\/\/brickschema.org\/"},{"key":"e_1_3_2_39_2","unstructured":"Brian Frank. 2023. Haystaack. (2023). Retrieved from https:\/\/brickschema.org\/"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3349022"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3004294"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3664200"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11708-021-0792-6"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323413"},{"key":"e_1_3_2_45_2","unstructured":"Rachel Gunter. 2017. Making Sense of Samsung\u2019s SmartThings Initiative. (2017). Retrieved from https:\/\/marketrealist.com\/2017\/12\/making-sense-samsungs-smartthingsinitiative"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108818"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2019.101660"},{"key":"e_1_3_2_48_2","doi-asserted-by":"crossref","unstructured":"Dick Hardt. 2012. The OAuth 2.0 authorization framework. (2012). Retrieved 3 August 2022 from https:\/\/tools.ietf.org\/html\/rfc6749","DOI":"10.17487\/rfc6749"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100549"},{"key":"e_1_3_2_50_2","first-page":"255","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"He Weijia","year":"2018","unstructured":"Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus D\u00fcrmuth, Earlence Fernandes, and Blase Ur. 2018. Rethinking access control and authentication for the home internet of things (IoT). In 27th USENIX Security Symposium (USENIX Security 18). 255\u2013272."},{"key":"e_1_3_2_51_2","unstructured":"Cristian Hesselman. 2017. SPIN: A user-centric security extension for inhome networks. (2017). Retrieved from https:\/\/www.sidnlabs.nl\/en\/newsand-blogs\/spin-a-user-centric-security-extension-for-in-home-networks"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642687"},{"key":"e_1_3_2_53_2","doi-asserted-by":"crossref","unstructured":"Hang Hu Limin Yang Shihan Lin and Gang Wang. 2020. A case study of security vetting process of smart-home assistant applications. (2020) 76\u201381.","DOI":"10.1109\/SPW50608.2020.00029"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.10.026"},{"key":"e_1_3_2_55_2","article-title":"IoT network intrusion dataset","author":"Hyunjae K","year":"2019","unstructured":"K Hyunjae, Dong Hyun Ahn, Gyung Min Lee, Jeong Do Yoo, Kyung Ho Park, and HK Kim. 2019. IoT network intrusion dataset. IEEE Dataport 10 (2019), q70p\u2013q449.","journal-title":"IEEE Dataport"},{"key":"e_1_3_2_56_2","unstructured":"IFTTT. 2022. Every thing works better together. (2022). Retrieved from https:\/\/ifttt.com\/"},{"key":"e_1_3_2_57_2","first-page":"2","volume-title":"NDSS","author":"Jia Yunhan Jack","year":"2017","unstructured":"Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang, Amir Rahmati, Earlence Fernandes, Zhuoqing Morley Mao, Atul Prakash, and SJ Unviersity. 2017. ContexloT: Towards providing contextual integrity to appified IoT platforms. In NDSS, Vol. 2. San Diego, 2\u20132."},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2705045"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-017-0087-4"},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3635030"},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2018.8355214"},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.269"},{"issue":"6","key":"e_1_3_2_63_2","first-page":"1361","article-title":"A survey on cyber physical system security for IoT: Issues, challenges, threats, solutions","volume":"14","author":"Kim Nam Yong","year":"2018","unstructured":"Nam Yong Kim, Shailendra Rathore, Jung Hyun Ryu, Jin Ho Park, and Jong Hyuk Park. 2018. A survey on cyber physical system security for IoT: Issues, challenges, threats, solutions. Journal of Information Processing Systems 14, 6 (2018), 1361\u20131384.","journal-title":"Journal of Information Processing Systems"},{"key":"e_1_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.09.009"},{"key":"e_1_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.03.006"},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.155"},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3993"},{"key":"e_1_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1007\/s42486-020-00046-y"},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110419"},{"key":"e_1_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"e_1_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2023.02.004"},{"key":"e_1_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/3466696"},{"key":"e_1_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/585597.585616"},{"key":"e_1_3_2_75_2","article-title":"Scrutinizing implementations of smart home integrations","author":"Mahadewa Kulani","year":"2019","unstructured":"Kulani Mahadewa, Kailong Wang, Guangdong Bai, Ling Shi, Yan Liu, Jin Song Dong, and Zhenkai Liang. 2019. Scrutinizing implementations of smart home integrations. IEEE Transactions on Software Engineering (2019).","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS2018.2018.00011"},{"key":"e_1_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/IE.2012.53"},{"key":"e_1_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01572-z"},{"key":"e_1_3_2_79_2","unstructured":"Eric Sesterhenn Michael Frey Cenk G\u00fcndogan. 2018. CNN LITE. (2018). Retrieved 3 August 2022 from https:\/\/github.com\/cn-uofbasel\/ccn-lite"},{"key":"e_1_3_2_80_2","unstructured":"Microsoft. 2018. The OAuth 2.0 authorization protocol. (2018). Retrieved 3 August 2022 from https:\/\/oauth.net\/2\/"},{"issue":"3","key":"e_1_3_2_81_2","first-page":"699","article-title":"Emerging technologies and design aspects of next generation cyber physical system with a smart city application perspective","volume":"14","author":"Mishra Ayaskanta","year":"2023","unstructured":"Ayaskanta Mishra, Amitkumar V Jha, Bhargav Appasani, Arun Kumar Ray, Deepak Kumar Gupta, and Abu Nasar Ghazali. 2023. Emerging technologies and design aspects of next generation cyber physical system with a smart city application perspective. International Journal of System Assurance Engineering and Management 14, Suppl 3 (2023), 699\u2013721.","journal-title":"International Journal of System Assurance Engineering and Management"},{"key":"e_1_3_2_82_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2014.6843717"},{"key":"e_1_3_2_83_2","article-title":"Smart surveillance system with anomaly detection at home","author":"Ntezicyimanikora Gervais","year":"2024","unstructured":"Gervais Ntezicyimanikora. 2024. Smart surveillance system with anomaly detection at home. Available at SSRN 4714486 (2024).","journal-title":"Available at SSRN 4714486"},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2875544"},{"key":"e_1_3_2_85_2","unstructured":"openHAB. 2022. openHAB empowering the smart home. (2022). Retrieved from https:\/\/www.openhab.org"},{"key":"e_1_3_2_86_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCO48375.2019.9043207"},{"key":"e_1_3_2_87_2","unstructured":"Collins Patel Michael. 2022. IoT value set to accelerate through 2030: Where and how to capture it. (2022). Retrieved 1 November 2022 from https:\/\/www.mckinsey.com\/business-functions\/mckinsey-digital\/our-insights\/iotvalue-set-to-accelerate-through-2030-where-and-how-to-capture-it"},{"key":"e_1_3_2_88_2","unstructured":"Ada Diaconescu Philippe Lalanda Julie McCann. 2020. Pervasive Computing in Practice. (2020). Retrieved from https:\/\/self-star.imag.fr"},{"key":"e_1_3_2_89_2","doi-asserted-by":"publisher","DOI":"10.1109\/AFRICON51333.2021.9570969"},{"key":"e_1_3_2_90_2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00127"},{"key":"e_1_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.1145\/3009972"},{"key":"e_1_3_2_92_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3269297"},{"key":"e_1_3_2_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOT.2018.00016"},{"key":"e_1_3_2_94_2","doi-asserted-by":"publisher","DOI":"10.3390\/fi16040139"},{"key":"e_1_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2018.00012"},{"key":"e_1_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.3233\/SW-200385"},{"key":"e_1_3_2_97_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSE.2016.7581588"},{"key":"e_1_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-021-00956-0"},{"key":"e_1_3_2_99_2","doi-asserted-by":"publisher","DOI":"10.1109\/98.943998"},{"key":"e_1_3_2_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3359297"},{"key":"e_1_3_2_101_2","unstructured":"Nicholas Shields. 2022. THE US SMARTHOMEMARKET REPORT: Systems apps and devices leading to home automation. (2022). Retrieved July 28 2022 from https:\/\/www.businessinsider.com\/the-us-smart-home-market-report-systems-apps-and-devices-leading-to-home-automation-2018-3-19?r=US&IR=T"},{"key":"e_1_3_2_102_2","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399358"},{"key":"e_1_3_2_103_2","doi-asserted-by":"publisher","DOI":"10.1145\/3428026"},{"key":"e_1_3_2_104_2","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939925"},{"key":"e_1_3_2_105_2","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2015.7347956"},{"key":"e_1_3_2_106_2","unstructured":"SmartThings. 2018. SmartThings Public GitHub Repo. (2018). Retrieved from https:\/\/github.com\/SmartThingsCommunity\/SmartThingsPublic"},{"key":"e_1_3_2_107_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2016.10.006"},{"key":"e_1_3_2_108_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.011"},{"key":"e_1_3_2_109_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2814539"},{"key":"e_1_3_2_110_2","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427235"},{"key":"e_1_3_2_111_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iotcps.2021.12.002"},{"key":"e_1_3_2_112_2","doi-asserted-by":"publisher","DOI":"10.1145\/3638051"},{"key":"e_1_3_2_113_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103201"},{"key":"e_1_3_2_114_2","doi-asserted-by":"publisher","DOI":"10.1145\/3322431.3325107"},{"key":"e_1_3_2_115_2","doi-asserted-by":"crossref","unstructured":"Moosa Yahyazadeh Proyash Podder Endadul Hoque and Omar Chowdhury. 2019. Expat Github Repository. (2019). Retrieved from https:\/\/github.com\/expat-paper\/expat.git","DOI":"10.1145\/3322431.3325107"},{"key":"e_1_3_2_116_2","doi-asserted-by":"publisher","DOI":"10.1109\/EUROCON.2015.7313766"},{"key":"e_1_3_2_117_2","first-page":"65","volume-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017)","author":"Zeng Eric","year":"2017","unstructured":"Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End user security and privacy concerns with smart homes. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). 65\u201380."},{"key":"e_1_3_2_118_2","first-page":"159","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Zeng Eric","year":"2019","unstructured":"Eric Zeng and Franziska Roesner. 2019. Understanding and improving security and privacy in multi-user smart homes: A design exploration and in-home user study. In 28th USENIX Security Symposium (USENIX Security 19). 159\u2013176."},{"key":"e_1_3_2_119_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7565185"},{"key":"e_1_3_2_120_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243820"},{"key":"e_1_3_2_121_2","article-title":"Sovereign: Self-contained smart home with data-centric network and security","author":"Zhang Zhiyi","year":"2022","unstructured":"Zhiyi Zhang, Tianyuan Yu, Xinyu Ma, Yu Guan, Philipp Moll, and Lixia Zhang. 2022. Sovereign: Self-contained smart home with data-centric network and security. IEEE Internet of Things Journal (2022).","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_122_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3054575"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3698768","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3698768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:44Z","timestamp":1750295384000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3698768"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,11]]},"references-count":121,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,3,31]]}},"alternative-id":["10.1145\/3698768"],"URL":"https:\/\/doi.org\/10.1145\/3698768","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,11]]},"assertion":[{"value":"2023-09-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-29","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}