{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T00:46:24Z","timestamp":1776127584854,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T00:00:00Z","timestamp":1742774400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"name":"A Google Research Scholar Award"},{"name":"A Notre Dame-IBM Technology Ethics Lab Award"},{"name":"A Google PSS Faculty Award"},{"name":"NSF (National Science Foundation) IIS","award":["2321504, 2334193, 2217239"],"award-info":[{"award-number":["2321504, 2334193, 2217239"]}]},{"name":"NSF (National Science Foundation) CNS","award":["2426395, 2426397, 2232653, 2426514, 2203261"],"award-info":[{"award-number":["2426395, 2426397, 2232653, 2426514, 2203261"]}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation) CMMI","doi-asserted-by":"publisher","award":["2146076"],"award-info":[{"award-number":["2146076"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,24]]},"DOI":"10.1145\/3708359.3712156","type":"proceedings-article","created":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:50:34Z","timestamp":1742388634000},"page":"277-297","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["CLEAR: Towards Contextual LLM-Empowered Privacy Policy Analysis and Risk Generation for Large Language Model Applications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9161-4088","authenticated-orcid":false,"given":"Chaoran","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, Indiana, USA,"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6029-6222","authenticated-orcid":false,"given":"Daodao","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Virginia Tech, Blacksburg, Virginia, USA,"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6038-2173","authenticated-orcid":false,"given":"Yanfang","family":"Ye","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, Indiana, USA,"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7902-7625","authenticated-orcid":false,"given":"Toby Jia-Jun","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, Indiana, USA,"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7900-9265","authenticated-orcid":false,"given":"Yaxing","family":"Yao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Virginia Tech, Blacksburg, Virginia, USA,"}]}],"member":"320","published-online":{"date-parts":[[2025,3,24]]},"reference":[{"key":"e_1_3_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702210"},{"key":"e_1_3_3_3_3_2","unstructured":"Aaron Bangor Philip Kortum and James Miller. 2009. Determining what individual SUS scores mean: Adding an adjective rating scale. Journal of usability studies 4 3 (2009) 114\u2013123."},{"key":"e_1_3_3_3_4_2","first-page":"237","volume-title":"IFIP Summer School on the Future of Identity in the Information Society","author":"Bergmann Mike","year":"2008","unstructured":"Mike Bergmann. 2008. Testing privacy awareness. In IFIP Summer School on the Future of Identity in the Information Society. Springer, 237\u2013253."},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"crossref","unstructured":"Meryl Brod Laura\u00a0E Tesler and Torsten\u00a0L Christensen. 2009. Qualitative research and content validity: developing best practices based on science and experience. Quality of life research 18 (2009) 1263\u20131278.","DOI":"10.1007\/s11136-009-9540-9"},{"key":"e_1_3_3_3_6_2","unstructured":"Tom Brown Benjamin Mann Nick Ryder Melanie Subbiah Jared\u00a0D Kaplan Prafulla Dhariwal Arvind Neelakantan Pranav Shyam Girish Sastry Amanda Askell et\u00a0al. 2020. Language models are few-shot learners. Advances in neural information processing systems 33 (2020) 1877\u20131901."},{"key":"e_1_3_3_3_7_2","first-page":"2633","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Carlini Nicholas","year":"2021","unstructured":"Nicholas Carlini, Florian Tramer, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom Brown, Dawn Song, Ulfar Erlingsson, et\u00a0al. 2021. Extracting training data from large language models. In 30th USENIX Security Symposium (USENIX Security 21). 2633\u20132650."},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642363"},{"key":"e_1_3_3_3_9_2","volume-title":"4.2% of Workers Have Pasted Company Data into ChatGPT","author":"Coles Cameron","year":"2023","unstructured":"Cameron Coles. 2023. 4.2% of Workers Have Pasted Company Data into ChatGPT. https:\/\/www.cyberhaven.com\/blog\/4-2-of-workers-have-pasted-company-data-into-chatgpt Accessed: 2024-05-26."},{"key":"e_1_3_3_3_10_2","unstructured":"Tianyu Cui Yanling Wang Chuanpu Fu Yong Xiao Sijia Li Xinhao Deng Yunpeng Liu Qinglin Zhang Ziyi Qiu Peiyang Li et\u00a0al. 2024. Risk taxonomy mitigation and assessment benchmarks of large language model systems. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2401.05778 (2024)."},{"key":"e_1_3_3_3_11_2","unstructured":"Shih-Chieh Dai Aiping Xiong and Lun-Wei Ku. 2023. LLM-in-the-loop: Leveraging large language model for thematic analysis. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2310.15100 (2023)."},{"key":"e_1_3_3_3_12_2","doi-asserted-by":"crossref","unstructured":"Anupam Das Martin Degeling Daniel Smullen and Norman Sadeh. 2018. Personalized privacy assistants for the internet of things: Providing users with notice and choice. IEEE Pervasive Computing 17 3 (2018) 35\u201346.","DOI":"10.1109\/MPRV.2018.03367733"},{"key":"e_1_3_3_3_13_2","unstructured":"Badhan\u00a0Chandra Das M\u00a0Hadi Amini and Yanzhao Wu. 2024. Security and privacy challenges of large language models: A survey. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2402.00888 (2024)."},{"key":"e_1_3_3_3_14_2","unstructured":"Yao Dou Isadora Krsek Tarek Naous Anubha Kabra Sauvik Das Alan Ritter and Wei Xu. 2023. Reducing Privacy Risks in Online Self-Disclosures with Language Models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2311.09538 (2023)."},{"key":"e_1_3_3_3_15_2","unstructured":"CM Downey Wei Dai Huseyin\u00a0A Inan Kim Laine Saurabh Naik and Tomasz Religa. 2022. Planting and mitigating memorized content in Predictive-Text language models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2212.08619 (2022)."},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Frank McSherry Kobbi Nissim and Adam Smith. 2016. Calibrating noise to sensitivity in private data analysis. Journal of Privacy and Confidentiality 7 3 (2016) 17\u201351.","DOI":"10.29012\/jpc.v7i3.405"},{"key":"e_1_3_3_3_17_2","unstructured":"Kennedy Edemacu and Xintao Wu. 2024. Privacy preserving prompt engineering: A survey. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2404.06001 (2024)."},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"crossref","unstructured":"Pardis Emami-Naeini Janarth Dheenadhayalan Yuvraj Agarwal and Lorrie\u00a0Faith Cranor. 2021. An informative security and privacy \u201cnutrition\u201d label for internet of things devices. IEEE Security & Privacy 20 2 (2021) 31\u201339.","DOI":"10.1109\/MSEC.2021.3132398"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.18420\/muc2017-ws05-0406"},{"key":"e_1_3_3_3_20_2","unstructured":"Ece Gumusel Kyrie\u00a0Zhixuan Zhou and Madelyn\u00a0Rose Sanfilippo. 2024. User Privacy Harms and Risks in Conversational AI: A Proposed Framework. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2402.09716 (2024)."},{"key":"e_1_3_3_3_21_2","unstructured":"Huseyin\u00a0A Inan Osman Ramadan Lukas Wutschitz Daniel Jones Victor R\u00fchle James Withers and Robert Sim. 2021. Training data leakage analysis in language models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2101.05405 (2021)."},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"crossref","unstructured":"Shotaro Ishihara. 2023. Training data extraction from pre-trained language models: A survey. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2305.16157 (2023).","DOI":"10.18653\/v1\/2023.trustnlp-1.23"},{"key":"e_1_3_3_3_23_2","unstructured":"Joel Jang Dongkeun Yoon Sohee Yang Sungmin Cha Moontae Lee Lajanugen Logeswaran and Minjoon Seo. 2022. Knowledge unlearning for mitigating privacy risks in language models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2210.01504 (2022)."},{"key":"e_1_3_3_3_24_2","unstructured":"Shivani Kapania Ruiyi Wang Toby Jia-Jun Li Tianshi Li and Hong Shen. 2024. \" I\u2019m categorizing LLM as a productivity tool\": Examining ethics of LLM use in HCI research practices. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2403.19876 (2024)."},{"key":"e_1_3_3_3_25_2","unstructured":"Siwon Kim Sangdoo Yun Hwaran Lee Martin Gubri Sungroh Yoon and Seong\u00a0Joon Oh. 2024. Propile: Probing privacy leakage in large language models. Advances in Neural Information Processing Systems 36 (2024)."},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"crossref","unstructured":"Youjeong Kim and S\u00a0Shyam Sundar. 2012. Anthropomorphism of computers: Is it mindful or mindless? Computers in Human Behavior 28 1 (2012) 241\u2013250.","DOI":"10.1016\/j.chb.2011.09.006"},{"key":"e_1_3_3_3_27_2","doi-asserted-by":"crossref","unstructured":"Nir Kshetri. 2023. Cybercrime and privacy threats of large language models. IT Professional 25 3 (2023) 9\u201313.","DOI":"10.1109\/MITP.2023.3275489"},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642116"},{"key":"e_1_3_3_3_29_2","unstructured":"Haoran Li Dadi Guo Wei Fan Mingshi Xu Jie Huang Fanpu Meng and Yangqiu Song. 2023. Multi-step jailbreaking privacy attacks on chatgpt. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2304.05197 (2023)."},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"crossref","unstructured":"Qiyu Li Jinhe Wen and Haojian Jin. 2024. Governing Open Vocabulary Data Leaks Using an Edge LLM through Programming by Example. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 8 4 (2024) 1\u201331.","DOI":"10.1145\/3699760"},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3643983"},{"key":"e_1_3_3_3_32_2","unstructured":"Xuechen Li Florian Tramer Percy Liang and Tatsunori Hashimoto. 2021. Large language models can be strong differentially private learners. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2110.05679 (2021)."},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.323"},{"key":"e_1_3_3_3_34_2","first-page":"27","volume-title":"Twelfth symposium on usable privacy and security (SOUPS 2016)","author":"Liu Bin","year":"2016","unstructured":"Bin Liu, Mads\u00a0Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun\u00a0Aerin Zhang, Norman Sadeh, Yuvraj Agarwal, and Alessandro Acquisti. 2016. Follow my recommendations: A personalized privacy assistant for mobile app permissions. In Twelfth symposium on usable privacy and security (SOUPS 2016). 27\u201341."},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"publisher","unstructured":"Yuwen Lu Chao Zhang Yuewen Yang Yaxing Yao and Toby Jia-Jun Li. 2024. From Awareness to Action: Exploring End-User Empowerment Interventions for Dark Patterns in UX. Proc. ACM Hum.-Comput. Interact. 8 CSCW1 Article 59 (April 2024) 41\u00a0pages. 10.1145\/3637336","DOI":"10.1145\/3637336"},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179300"},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-demo.31"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"crossref","unstructured":"Nora McDonald Sarita Schoenebeck and Andrea Forte. 2019. Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice. Proceedings of the ACM on human-computer interaction 3 CSCW (2019) 1\u201323.","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_3_39_2","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79 (2004) 119."},{"key":"e_1_3_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395549"},{"key":"e_1_3_3_3_41_2","unstructured":"Shidong Pan Zhen Tao Thong Hoang Dawen Zhang Tianshi Li Zhenchang Xing Sherry Xu Mark Staples Thierry Rakotoarivelo and David Lo. 2024. { A New Hope} : Contextual Privacy Policies for Mobile Applications and An Approach Toward Automated Generation. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2402.14544 (2024)."},{"key":"e_1_3_3_3_42_2","doi-asserted-by":"crossref","unstructured":"Ethan Perez Saffron Huang Francis Song Trevor Cai Roman Ring John Aslanides Amelia Glaese Nat McAleese and Geoffrey Irving. 2022. Red teaming language models with language models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2202.03286 (2022).","DOI":"10.18653\/v1\/2022.emnlp-main.225"},{"key":"e_1_3_3_3_43_2","doi-asserted-by":"crossref","unstructured":"Natalia Ponomareva Hussein Hazimeh Alex Kurakin Zheng Xu Carson Denison H\u00a0Brendan McMahan Sergei Vassilvitskii Steve Chien and Abhradeep\u00a0Guha Thakurta. 2023. How to dp-fy ml: A practical guide to machine learning with differential privacy. Journal of Artificial Intelligence Research 77 (2023) 1113\u20131201.","DOI":"10.1613\/jair.1.14649"},{"key":"e_1_3_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-37108-0_10"},{"key":"e_1_3_3_3_45_2","doi-asserted-by":"crossref","unstructured":"Abhilasha Ravichander Alan\u00a0W Black Shomir Wilson Thomas Norton and Norman Sadeh. 2019. Question answering for privacy policies: Combining computational and legal perspectives. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1911.00841 (2019).","DOI":"10.18653\/v1\/D19-1500"},{"key":"e_1_3_3_3_46_2","unstructured":"Maximilian Schmidhuber and Udo Kruschwitz. 2024. Llm-based synthetic datasets: Applications and limitations in toxicity detection. LREC-COLING 2024 (2024) 37."},{"key":"e_1_3_3_3_47_2","unstructured":"Victoria Smith Ali\u00a0Shahin Shamsabadi Carolyn Ashurst and Adrian Weller. 2023. Identifying and mitigating privacy risks stemming from language models: A survey. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2310.01424 (2023)."},{"key":"e_1_3_3_3_48_2","unstructured":"Robin Staab Mark Vero Mislav Balunovi\u0107 and Martin Vechev. 2023. Beyond memorization: Violating privacy via inference with large language models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2310.07298 (2023)."},{"key":"e_1_3_3_3_49_2","doi-asserted-by":"crossref","unstructured":"Peter Story Daniel Smullen Rex Chen Yaxing Yao Alessandro Acquisti Lorrie\u00a0Faith Cranor Norman Sadeh and Florian Schaub. 2022. Increasing adoption of tor browser using informational and planning nudges. Proceedings on Privacy Enhancing Technologies (2022).","DOI":"10.2478\/popets-2022-0040"},{"key":"e_1_3_3_3_50_2","doi-asserted-by":"crossref","unstructured":"Peter Story Daniel Smullen Yaxing Yao Alessandro Acquisti Lorrie\u00a0Faith Cranor Norman Sadeh and Florian Schaub. 2021. Awareness adoption and misconceptions of web privacy tools. Proceedings on Privacy Enhancing Technologies (2021).","DOI":"10.2478\/popets-2021-0049"},{"key":"e_1_3_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-47240-4_19"},{"key":"e_1_3_3_3_52_2","first-page":"4245","volume-title":"Proceedings of the Thirteenth Language Resources and Evaluation Conference","author":"Vakili Thomas","year":"2022","unstructured":"Thomas Vakili, Anastasios Lamproudis, Aron Henriksson, and Hercules Dalianis. 2022. Downstream task performance of bert models pre-trained using automatically de-identified clinical data. In Proceedings of the Thirteenth Language Resources and Evaluation Conference. 4245\u20134252."},{"key":"e_1_3_3_3_53_2","unstructured":"Froukje\u00a0Sleeswijk Visser. 2005. Contextmapping: experiences from practice. CoDesign (2005)."},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"crossref","unstructured":"Xingyi Wang Xiaozheng Wang Sunyup Park and Yaxing Yao. 2025. Mental Models of Generative AI Chatbot Ecosystems. 30th International Conference on Intelligent User Interfaces (IUI\u201925 (2025).","DOI":"10.1145\/3708359.3712125"},{"key":"e_1_3_3_3_55_2","unstructured":"Jason Wei Xuezhi Wang Dale Schuurmans Maarten Bosma Fei Xia Ed Chi Quoc\u00a0V Le Denny Zhou et\u00a0al. 2022. Chain-of-thought prompting elicits reasoning in large language models. Advances in neural information processing systems 35 (2022) 24824\u201324837."},{"key":"e_1_3_3_3_56_2","unstructured":"Chris Westfall. 2023. New Research Shows ChatGPT Reigns Supreme in AI Tool Sector. Forbes (2023). https:\/\/www.forbes.com\/sites\/chriswestfall\/2023\/11\/16\/new-research-shows-chatgpt-reigns-supreme-in-ai-tool-sector\/?sh=52ff59c050e9"},{"key":"e_1_3_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517688"},{"key":"e_1_3_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300428"},{"key":"e_1_3_3_3_59_2","doi-asserted-by":"crossref","unstructured":"Yaxing Yao Justin\u00a0Reed Basdeo Oriana\u00a0Rosata Mcdonough and Yang Wang. 2019. Privacy perceptions and designs of bystanders in smart homes. Proceedings of the ACM on Human-Computer Interaction 3 CSCW (2019) 1\u201324.","DOI":"10.1145\/3359161"},{"key":"e_1_3_3_3_60_2","doi-asserted-by":"crossref","unstructured":"Yifan Yao Jinhao Duan Kaidi Xu Yuanfang Cai Zhibo Sun and Yue Zhang. 2024. A survey on large language model (llm) security and privacy: The good the bad and the ugly. High-Confidence Computing (2024) 100211.","DOI":"10.1016\/j.hcc.2024.100211"},{"key":"e_1_3_3_3_61_2","first-page":"1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Zhang Zhiping","year":"2024","unstructured":"Zhiping Zhang, Michelle Jia, Hao-Ping Lee, Bingsheng Yao, Sauvik Das, Ada Lerner, Dakuo Wang, and Tianshi Li. 2024. \u201cIt\u2019s a Fair Game\u201d, or Is It? Examining How Users Navigate Disclosure Risks and Benefits When Using LLM-Based Conversational Agents. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1\u201326."},{"key":"e_1_3_3_3_62_2","unstructured":"Jijie Zhou Eryue Xu Yaoyao Wu and Tianshi Li. 2024. Rescriber: Smaller-LLM-Powered User-Led Data Minimization for Navigating Privacy Trade-offs in LLM-Based Conversational Agent. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2410.11876 (2024)."},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"crossref","unstructured":"Jakub Z\u0142otowski Diane Proudfoot Kumar Yogeeswaran and Christoph Bartneck. 2015. Anthropomorphism: opportunities and challenges in human\u2013robot interaction. International journal of social robotics 7 (2015) 347\u2013360.","DOI":"10.1007\/s12369-014-0267-6"}],"event":{"name":"IUI '25: 30th International Conference on Intelligent User Interfaces","location":"Cagliari Italy","acronym":"IUI '25","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 30th International Conference on Intelligent User Interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708359.3712156","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708359.3712156","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708359.3712156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:06Z","timestamp":1750298226000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708359.3712156"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,24]]},"references-count":62,"alternative-id":["10.1145\/3708359.3712156","10.1145\/3708359"],"URL":"https:\/\/doi.org\/10.1145\/3708359.3712156","relation":{},"subject":[],"published":{"date-parts":[[2025,3,24]]},"assertion":[{"value":"2025-03-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}