{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:27:34Z","timestamp":1766442454054,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":81,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T00:00:00Z","timestamp":1763769600000},"content-version":"vor","delay-in-days":3,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2247954"],"award-info":[{"award-number":["2247954"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Department of Defence"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765055","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:37:25Z","timestamp":1763854645000},"page":"2504-2518","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Qualitative Analysis of Fuzzer Usability and Challenges"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-5750-3116","authenticated-orcid":false,"given":"Yunze","family":"Zhao","sequence":"first","affiliation":[{"name":"University of Maryland, College Park, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2273-7308","authenticated-orcid":false,"given":"Wentao","family":"Guo","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9631-1169","authenticated-orcid":false,"given":"Harrison","family":"Goldstein","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9985-250X","authenticated-orcid":false,"given":"Daniel","family":"Votipka","sequence":"additional","affiliation":[{"name":"Tufts University, Medford, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5832-5329","authenticated-orcid":false,"given":"Kelsey R.","family":"Fulton","sequence":"additional","affiliation":[{"name":"Colorado School of Mines, Golden, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4151-6428","authenticated-orcid":false,"given":"Michelle L.","family":"Mazurek","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Google 2025. Google\/Fuzzbench. Google. https:\/\/github.com\/google\/fuzzbench"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.25"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Paul E Black Barbara Guttman and Vadim Okun. 2021. Guidelines on Minimum Standards for Developer Verification of Software. arXiv:2107.12850","DOI":"10.6028\/NIST.IR.8397"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.3016773"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.3016773"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.50"},{"key":"e_1_3_2_1_8_1","first-page":"332","article-title":"What Developers Want and Need From Program Analysis: An Empirical Study","volume":"2016","author":"Christakis Maria","year":"2016","unstructured":"Maria Christakis and Christian Bird. 2016. What Developers Want and Need From Program Analysis: An Empirical Study. In ASE 2016. 332--343. doi:10.1145\/ 2970276.2970347","journal-title":"ASE"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/17439760.2016.1262613"},{"key":"e_1_3_2_1_10_1","volume-title":"Chenyuan Yang, Shizhuo Dylan Zhang, Shujing Yang, and Lingming Zhang.","author":"Deng Yinlin","year":"2023","unstructured":"Yinlin Deng, Chunqiu Steven Xia, Chenyuan Yang, Shizhuo Dylan Zhang, Shujing Yang, and Lingming Zhang. 2023. Large language Models are Edge-Case Fuzzers: Testing Deep Learning Libraries via Fuzzgpt. arXiv:2304.02014"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3004525"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-022-00123-y"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2015.11.003"},{"key":"e_1_3_2_1_14_1","volume-title":"AFL: Combining Incremental Steps of Fuzzing Research. In WOOT","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi, Dominik Maier, Heiko Ei\u00dffeldt, and Marc Heuse. 2020. AFL: Combining Incremental Steps of Fuzzing Research. In WOOT 2020. https: \/\/www.usenix.org\/conference\/woot20\/presentation\/fioraldi"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560602"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375607"},{"key":"e_1_3_2_1_17_1","unstructured":"Google. [n.d.]. Google FuzzTest. https:\/\/github.com\/google\/fuzztest"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3329667"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428334"},{"key":"e_1_3_2_1_20_1","volume-title":"Seed Selection for Successful Fuzzing. In ISSTA","author":"Herrera Adrian","year":"2021","unstructured":"Adrian Herrera, Hendra Gunadi, Shane Magrath, Michael Norrish, Mathias Payer, and Antony L Hosking. 2021. Seed Selection for Successful Fuzzing. In ISSTA 2021. 230--243. https:\/\/hexhive.epfl.ch\/publications\/files\/21ISSTA2.pdf"},{"key":"e_1_3_2_1_21_1","first-page":"2271","article-title":"FuzzGen","volume":"2020","author":"Ispoglou Kyriakos","year":"2020","unstructured":"Kyriakos Ispoglou, Daniel Austin, Vishwath Mohan, and Mathias Payer. 2020. FuzzGen: Automatic Fuzzer Generation. In USENIX Security 2020. 2271--2287.","journal-title":"Automatic Fuzzer Generation. In USENIX Security"},{"key":"e_1_3_2_1_22_1","volume-title":"Utopia: Automatic Generation of Fuzz Driver Using Unit Tests. In S&P","author":"Jeong Bokdeuk","year":"2023","unstructured":"Bokdeuk Jeong, Joonun Jang, Hayoon Yi, Jiin Moon, Junsik Kim, Intae Jeon, Taesoo Kim, WooChul Shim, and Yong Ho Hwang. 2023. Utopia: Automatic Generation of Fuzz Driver Using Unit Tests. In S&P 2023. IEEE, 2676--2692. doi:10. 1109\/SP46215.2023.10179394"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606613"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713630"},{"key":"e_1_3_2_1_25_1","unstructured":"Natalia Kazankova. 2024. From DAST to Dawn: Why Fuzzing is the Better Solution. https:\/\/www.code-intelligence.com\/blog\/from-dast-to-dawn-why-fuzzingis-the-better-solution"},{"key":"e_1_3_2_1_26_1","volume-title":"Yeongjin Jang, Insik Shin, and Byoungyoung Lee.","author":"Kim Kyungtae","year":"2020","unstructured":"Kyungtae Kim, Dae R Jeong, Chung Hwan Kim, Yeongjin Jang, Insik Shin, and Byoungyoung Lee. 2020. HFL: Hybrid Fuzzing on the Linux Kernel.. In NDSS. https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2020\/02\/24018-paper.pdf"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_1_29_1","unstructured":"Jinfeng Li. 2020. Vulnerabilities Mapping Based on OWASP-SANS: A Survey for Static Application Security Testing (SAST). arXiv:2004.03216"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2834476"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","unstructured":"Bingchang Liu Liang Shi Zhuhua Cai and Min Li. 2012. Software Vulnerability Discovery Techniques: A Survey. In 2012 Fourth Int'l Conf. on Multimedia Information Networking and Security (2012--11). 152--156. doi:10.1109\/MINES.2012.202","DOI":"10.1109\/MINES.2012.202"},{"key":"e_1_3_2_1_32_1","first-page":"568","article-title":"Instruguard","volume":"2021","author":"Liu Yuwei","year":"2021","unstructured":"Yuwei Liu, Yanhao Wang, Purui Su, Yuanping Yu, and Xiangkun Jia. 2021. Instruguard: Find and Fix Instrumentation Errors for Coverage-Based Greybox Fuzzing. In ASE 2021. 568--580. https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber= 9678671","journal-title":"In ASE"},{"key":"e_1_3_2_1_33_1","unstructured":"LLVM Project. [n.d.]. LibFuzzer -- A Library for Coverage-Guided Fuzz Testing. \u2014 LLVM 21.0.0git Documentation. https:\/\/llvm.org\/docs\/LibFuzzer.html"},{"key":"e_1_3_2_1_34_1","volume-title":"Smartseed: Smart Seed Generation for Efficient Fuzzing. arXiv:1807.02606","author":"Lyu Chenyang","year":"2018","unstructured":"Chenyang Lyu, Shouling Ji, Yuwei Li, Junfeng Zhou, Jianhai Chen, and Jing Chen. 2018. Smartseed: Smart Seed Generation for Efficient Fuzzing. arXiv:1807.02606"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/3361338.3361473"},{"key":"e_1_3_2_1_36_1","volume-title":"EMS: History-Driven Mutation for Coverage-Based Fuzzing. In NDSS. https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2022- 162-paper.pdf","author":"Lyu Chenyang","year":"2022","unstructured":"Chenyang Lyu, Shouling Ji, Xuhong Zhang, Hong Liang, Binbin Zhao, Kangjie Lu, and Raheem Beyah. 2022. EMS: History-Driven Mutation for Coverage-Based Fuzzing. In NDSS. https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2022- 162-paper.pdf"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2312.17677"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.00139"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3623375"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3567993"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_3_2_1_42_1","volume-title":"Fuzzing: The State of the Art. Technical Report DSTO--TN--1043. Australian Government, Department of Defence, Defence Science and Technology Organisation.","author":"McNally Richard","year":"2012","unstructured":"Richard McNally, Ken Yiu, Duncan Grove, and Damien Gerhardy. 2012. Fuzzing: The State of the Art. Technical Report DSTO--TN--1043. Australian Government, Department of Defence, Defence Science and Technology Organisation."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534374"},{"key":"e_1_3_2_1_44_1","volume-title":"USENIX Security","author":"Nosco Timothy","year":"2020","unstructured":"Timothy Nosco, Jared Ziegler, Zechariah Clark, Davy Marrero, Todd Finkler, Andrew Barbarello, and W. Michael Petullo. 2020. The Industrial Age of Hacking. In USENIX Security 2020. 1129--1146. https:\/\/www.usenix.org\/conference\/ usenixsecurity20\/presentation\/nosco"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611668"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589951"},{"key":"e_1_3_2_1_47_1","unstructured":"OpenAI. 2025. OpenAI\/Whisper. https:\/\/github.com\/openai\/whisper. https: \/\/github.com\/openai\/whisper"},{"key":"e_1_3_2_1_48_1","unstructured":"OSS-Fuzz. [n.d.]. Fuzzing Introspection of OSS-Fuzz Projects. https:\/\/introspector. oss-fuzz.com\/"},{"key":"e_1_3_2_1_49_1","volume-title":"SOUPS 2021","author":"Pl\u00f6ger Stephan","year":"2021","unstructured":"Stephan Pl\u00f6ger, Mischa Meier, and Matthew Smith. 2021. A Qualitative Usability Evaluation of the Clang Static Analyzer and libFuzzer with CS Students and CTF Players. In SOUPS 2021. 553--572. https:\/\/www.usenix.org\/conference\/soups2021\/ presentation\/ploger"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581178"},{"key":"e_1_3_2_1_51_1","volume-title":"An Empirical Analysis of Practitioners' Perspectives on Security Tool Integration Into DevOps. In ESEM","author":"Rajapakse Roshan Namal","year":"2021","unstructured":"Roshan Namal Rajapakse, Mansooreh Zahedi, and Muhammad Ali Babar. 2021. An Empirical Analysis of Practitioners' Perspectives on Security Tool Integration Into DevOps. In ESEM 2021. 1--12."},{"key":"e_1_3_2_1_52_1","volume-title":"Continuous Security Testing: A Case Study on Integrating Dynamic Security Testing Tools in CI\/CD Pipelines. In EDOC 2020","author":"Rangnau Thorsten","year":"2020","unstructured":"Thorsten Rangnau, Remco v. Buijtenen, Frank Fransen, and Fatih Turkmen. 2020. Continuous Security Testing: A Case Study on Integrating Dynamic Security Testing Tools in CI\/CD Pipelines. In EDOC 2020. IEEE, 145--154. doi:10.1109\/ EDOC49727.2020.00026"},{"key":"e_1_3_2_1_53_1","volume-title":"Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley.","author":"Rebert Alexandre","year":"2014","unstructured":"Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley. 2014. Optimizing Seed Selection for Fuzzing. In USENIX Security 2014. 861--875."},{"key":"e_1_3_2_1_54_1","unstructured":"Irving Seidman. 2006. Interviewing as Qualitative Research: A Guide for Researchers in Education and the Social Sciences. Teachers college press."},{"key":"e_1_3_2_1_55_1","volume-title":"USENIX security","author":"Serebryany Kostya","year":"2017","unstructured":"Kostya Serebryany. 2017. OSS-Fuzz - Google's Continuous Fuzzing Service for Open Source Software. In USENIX security 2017. USENIX Association, Vancouver, BC."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833761"},{"key":"e_1_3_2_1_57_1","volume-title":"No Problem: Oracle- Guided Harnessing for Auto-generating C API Fuzzing Harnesses. In ICSE","author":"Sherman Gabriel","year":"2025","unstructured":"Gabriel Sherman and Stefan Nagy. 2025. No Harness, No Problem: Oracle- Guided Harnessing for Auto-generating C API Fuzzing Harnesses. In ICSE 2025. IEEE Computer Society, 775--775. https:\/\/www-old.cs.utah.edu\/~snagy\/papers\/ 25ICSE-b.pdf"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5555\/3488905.3488918"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786812"},{"key":"e_1_3_2_1_60_1","first-page":"800","article-title":"Secure Software Development Framework","volume":"800","author":"Souppaya Murugiah","year":"2022","unstructured":"Murugiah Souppaya, Karen Scarfone, and Donna Dodson. 2022. Secure Software Development Framework. NIST Special Publication 800, 218 (2022), 800--218.","journal-title":"NIST Special Publication"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2301.06534"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445616"},{"key":"e_1_3_2_1_63_1","volume-title":"SOUPS 2016","author":"Thomas Tyler W","year":"2016","unstructured":"Tyler W Thomas, Heather Lipford, Bill Chu, Justin Smith, and Emerson Murphy-Hill. 2016. What Questions Remain? An Examination of How Developers Understand an Interactive Static Analysis Tool. In SOUPS 2016. https:\/\/www.usenix.org\/system\/files\/conference\/soups2015\/wsiw16_paper_thomas.pdf"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660339"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09750-5"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER"},{"key":"e_1_3_2_1_67_1","volume-title":"Testers: A Comparison of Software Vulnerability Discovery Processes. In 2018 IEEE Symp. on Security and Privacy (SP). 374--391","author":"Votipka Daniel","year":"2018","unstructured":"Daniel Votipka, Rock Stevens, Elissa Redmiles, Jeremy Hu, and Michelle Mazurek. 2018. Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes. In 2018 IEEE Symp. on Security and Privacy (SP). 374--391. doi:10.1109\/ SP.2018.00003"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.23"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00081"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24422"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639121"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.18"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSC55868.2022.00058"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.042361"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277260"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"crossref","unstructured":"Cen Zhang Mingqiang Bai Yaowen Zheng Yeting Li Wei Ma Xiaofei Xie Yuekang Li Limin Sun and Yang Liu. 2023. Understanding Large Language Model Based Fuzz Driver Generation. arXiv:2307.12469","DOI":"10.1145\/3650212.3680355"},{"key":"e_1_3_2_1_77_1","first-page":"2811","article-title":"APICraft","volume":"2021","author":"Zhang Cen","year":"2021","unstructured":"Cen Zhang, Xingwei Lin, Yuekang Li, Yinxing Xue, Jundong Xie, Hongxu Chen, Xinlei Ying, Jiashui Wang, and Yang Liu. 2021. APICraft: Fuzz Driver Generation for Closed-Source SDK Libraries. In USENIX Security 2021. 2811--2828. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/zhang-cen","journal-title":"Fuzz Driver Generation for Closed-Source SDK Libraries. In USENIX Security"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2312.17677"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00041"},{"key":"e_1_3_2_1_80_1","first-page":"205","article-title":"Moofuzz","volume":"9","author":"Zhao Xiaoqi","year":"2021","unstructured":"Xiaoqi Zhao, Haipeng Qu, Wenjie Lv, Shuo Li, and Jianliang Xu. 2021. Moofuzz: Many-Objective Optimization Seed Schedule for Fuzzer. Mathematics 9, 3 (2021), 205.","journal-title":"Many-Objective Optimization Seed Schedule for Fuzzer. Mathematics"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3512345"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765055","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:25:34Z","timestamp":1766442334000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765055"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":81,"alternative-id":["10.1145\/3719027.3765055","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765055","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}