{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:48:23Z","timestamp":1776113303862,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":74,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T00:00:00Z","timestamp":1758931200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2217239, 2321504, 2334193, 2341187, 2426395, 2426396, 2426397, 2426514"],"award-info":[{"award-number":["2217239, 2321504, 2334193, 2341187, 2426395, 2426396, 2426397, 2426514"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CMMI","award":["2146076, 2326378"],"award-info":[{"award-number":["2146076, 2326378"]}]},{"name":"a Google Research Scholar Award","award":[""],"award-info":[{"award-number":[""]}]},{"name":"a Gift from Adobe","award":[""],"award-info":[{"award-number":[""]}]},{"name":"a Notre Dame-IBM Technology Ethics Lab Award","award":[""],"award-info":[{"award-number":[""]}]},{"name":"ND-IBM Tech Ethics Lab Program and Notre Dame Strategic Framework and Poverty Initiative Research Grants (2025)","award":[""],"award-info":[{"award-number":[""]}]},{"name":"a Google PSS Faculty Award","award":[""],"award-info":[{"award-number":[""]}]},{"name":"a Meta Research Award","award":[""],"award-info":[{"award-number":[""]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,9,28]]},"DOI":"10.1145\/3746059.3747798","type":"proceedings-article","created":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T07:49:12Z","timestamp":1758959352000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Why am I seeing this: Democratizing End User Auditing for Online Content Recommendations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9161-4088","authenticated-orcid":false,"given":"Chaoran","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3800-5769","authenticated-orcid":false,"given":"Leyang","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7526-7395","authenticated-orcid":false,"given":"Luke","family":"Cao","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6038-2173","authenticated-orcid":false,"given":"Yanfang","family":"Ye","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0877-5727","authenticated-orcid":false,"given":"Tianshi","family":"Li","sequence":"additional","affiliation":[{"name":"Khoury College of Computer Sciences, Northeastern University, Boston, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7900-9265","authenticated-orcid":false,"given":"Yaxing","family":"Yao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Johns Hopkins University, Baltimore, Maryland, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7902-7625","authenticated-orcid":false,"given":"Toby Jia-Jun","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, Indiana, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,9,27]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"crossref","unstructured":"Gediminas Adomavicius and Alexander Tuzhilin. 2005. Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE transactions on knowledge and data engineering 17 6 (2005) 734\u2013749.","DOI":"10.1109\/TKDE.2005.99"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29659-3"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","unstructured":"Muhammad Ali Piotr Sapiezynski Miranda Bogen Aleksandra Korolova Alan Mislove and Aaron Rieke. 2019. Discrimination through optimization: How Facebook\u2019s Ad delivery can lead to biased outcomes. Proceedings of the ACM on human-computer interaction 3 CSCW (2019) 1\u201330.","DOI":"10.1145\/3359301"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"crossref","unstructured":"Jack Bandy. 2021. Problematic machine behavior: A systematic literature review of algorithm audits. Proceedings of the acm on human-computer interaction 5 CSCW1 (2021) 1\u201334.","DOI":"10.1145\/3449148"},{"key":"e_1_3_3_2_6_2","unstructured":"Aaron Bangor Philip Kortum and James Miller. 2009. Determining what individual SUS scores mean: Adding an adjective rating scale. Journal of usability studies 4 3 (2009) 114\u2013123."},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"crossref","unstructured":"Sophie\u00a0C Boerman Sanne Kruikemeier and Frederik\u00a0J Zuiderveen\u00a0Borgesius. 2017. Online behavioral advertising: A literature review and research agenda. Journal of advertising 46 3 (2017) 363\u2013376.","DOI":"10.1080\/00913367.2017.1339368"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"crossref","unstructured":"Meryl Brod Laura\u00a0E Tesler and Torsten\u00a0L Christensen. 2009. Qualitative research and content validity: developing best practices based on science and experience. Quality of life research 18 (2009) 1263\u20131278.","DOI":"10.1007\/s11136-009-9540-9"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Maryam Abdulaziz\u00a0Saad Bubukayr and Mounir Frikha. 2022. Web Tracking Domain and Possible Privacy Defending Tools: A Literature Review. Journal of Cybersecurity 4 2 (2022) 79.","DOI":"10.32604\/jcs.2022.029020"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642363"},{"key":"e_1_3_3_2_11_2","volume-title":"Forty-first International Conference on Machine Learning","author":"Chen Dongping","year":"2024","unstructured":"Dongping Chen, Ruoxi Chen, Shilin Zhang, Yaochen Wang, Yinuo Liu, Huichi Zhou, Qihui Zhang, Yao Wan, Pan Zhou, and Lichao Sun. 2024. Mllm-as-a-judge: Assessing multimodal llm-as-a-judge with vision-language benchmark. In Forty-first International Conference on Machine Learning."},{"key":"e_1_3_3_2_12_2","first-page":"1597","volume-title":"International conference on machine learning","author":"Chen Ting","year":"2020","unstructured":"Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey Hinton. 2020. A simple framework for contrastive learning of visual representations. In International conference on machine learning. PMLR, 1597\u20131607."},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.acl-long.84"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3714034"},{"key":"e_1_3_3_2_15_2","unstructured":"Cary Coglianese and David Lehr. 2019. Transparency and algorithmic governance. Administrative law review 71 1 (2019) 1\u201356."},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"crossref","unstructured":"Sasha Courville Christine Parker and Helen Watchirs. 2003. Auditing in Regulatory Perspective. Law & Pol\u2019y 25 (2003) 179.","DOI":"10.1111\/j.1467-9930.2003.00146.x"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/169891.169968"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","unstructured":"Amit Datta Michael\u00a0Carl Tschantz and Anupam Datta. 2015. Automated Experiments on Ad Privacy Settings. Proc. Priv. Enhancing Technol. 2015 1 (2015) 92\u2013112. 10.1515\/POPETS-2015-0007","DOI":"10.1515\/POPETS-2015-0007"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3606261"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517441"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"Alexis Dinno. 2015. Nonparametric pairwise multiple comparisons in independent groups using Dunn\u2019s test. The Stata Journal 15 1 (2015) 292\u2013300.","DOI":"10.1177\/1536867X1501500117"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Nora\u00a0A Draper. 2017. From privacy pragmatist to privacy resigned: Challenging narratives of rational choice in digital privacy debates. Policy & Internet 9 2 (2017) 232\u2013251.","DOI":"10.1002\/poi3.142"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445188"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT55865.2022.00115"},{"key":"e_1_3_3_2_25_2","unstructured":"James\u00a0W Gentry. 1990. What is experiential learning. Guide to business gaming and experiential learning 9 1 (1990) 20\u201332."},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371824"},{"key":"e_1_3_3_2_27_2","unstructured":"Joshua Gomez Travis Pinnick and Ashkan Soltani. 2009. KnowPrivacy. (2009)."},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963312"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"crossref","unstructured":"Muhammad Haroon Magdalena Wojcieszak Anshuman Chhabra Xin Liu Prasant Mohapatra and Zubair Shafiq. 2023. Auditing YouTube\u2019s recommendation system for ideologically congenial extreme and problematic recommendations. Proceedings of the national academy of sciences 120 50 (2023) e2213020120.","DOI":"10.1073\/pnas.2213020120"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"crossref","unstructured":"Eslam Hussein Prerna Juneja and Tanushree Mitra. 2020. Measuring misinformation in video search platforms: An audit study on YouTube. Proceedings of the ACM on human-computer interaction 4 CSCW1 (2020) 1\u201327.","DOI":"10.1145\/3392854"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3630106.3659041"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"crossref","unstructured":"Riitta J\u00e4\u00e4skel\u00e4inen. 2010. Think-aloud protocol. Handbook of translation studies 1 (2010) 371\u2013374.","DOI":"10.1075\/hts.1.thi1"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3539618.3591753"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"crossref","unstructured":"Rahul Katarya and Om\u00a0Prakash Verma. 2017. An effective web page recommender system with fuzzy c-mean clustering. Multimedia Tools and Applications 76 (2017) 21481\u201321496.","DOI":"10.1007\/s11042-016-4078-7"},{"key":"e_1_3_3_2_35_2","unstructured":"KirkpatrickPrice. 2024. Privacy Assessment Audit Services. https:\/\/kirkpatrickprice.com\/audit\/privacy-assessment\/. Accessed: 2024-09-13."},{"key":"e_1_3_3_2_36_2","volume-title":"Experiential learning: Experience as the source of learning and development","author":"Kolb David\u00a0A","year":"2014","unstructured":"David\u00a0A Kolb. 2014. Experiential learning: Experience as the source of learning and development. FT press."},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","unstructured":"Michelle\u00a0S. Lam Mitchell\u00a0L. Gordon Dana\u00eb Metaxa Jeffrey\u00a0T. Hancock James\u00a0A. Landay and Michael\u00a0S. Bernstein. 2022. End-User Audits: A System Empowering Communities to Lead Large-Scale Investigations of Harmful Algorithmic Behavior. Proc. ACM Hum.-Comput. Interact. 6 CSCW2 Article 512 (nov 2022) 34\u00a0pages. 10.1145\/3555625","DOI":"10.1145\/3555625"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","unstructured":"Michelle\u00a0S. Lam Ayush Pandit Colin\u00a0H. Kalicki Rachit Gupta Poonam Sahoo and Dana\u00eb Metaxa. 2023. Sociotechnical Audits: Broadening the Algorithm Auditing Lens to Investigate Targeted Advertising. Proc. ACM Hum.-Comput. Interact. 7 CSCW2 Article 360 (oct 2023) 37\u00a0pages. 10.1145\/3610209","DOI":"10.1145\/3610209"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813614"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179452"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3533406.3533418"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"crossref","unstructured":"Yang Li Tong Chen and Zi Huang. 2021. Attribute-aware explainable complementary clothing recommendation. World Wide Web 24 (2021) 1885\u20131901.","DOI":"10.1007\/s11280-021-00913-3"},{"key":"e_1_3_3_2_43_2","volume-title":"Variation theory and the improvement of teaching and learning","author":"Ling\u00a0Lo Mun","year":"2012","unstructured":"Mun Ling\u00a0Lo. 2012. Variation theory and the improvement of teaching and learning. G\u00f6teborg: Acta Universitatis Gothoburgensis."},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"crossref","unstructured":"Yuwen Lu Chao Zhang Yuewen Yang Yaxing Yao and Toby Jia-Jun Li. 2024. From awareness to action: Exploring end-user empowerment interventions for dark patterns in ux. Proceedings of the ACM on Human-Computer Interaction 8 CSCW1 (2024) 1\u201341.","DOI":"10.1145\/3637336"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.4324\/9781315816876"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"crossref","unstructured":"Patrick\u00a0E McKight and Julius Najab. 2010. Kruskal-wallis test. The corsini encyclopedia of psychology (2010) 1\u20131.","DOI":"10.1002\/9780470479216.corpsy0491"},{"key":"e_1_3_3_2_47_2","unstructured":"Peter Menzies and Helen Beebee. 2001. Counterfactual theories of causation. (2001)."},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"crossref","unstructured":"Dana\u00eb Metaxa Joon\u00a0Sung Park Ronald\u00a0E Robertson Karrie Karahalios Christo Wilson Jeff Hancock Christian Sandvig et\u00a0al. 2021. Auditing algorithms: Understanding algorithmic systems from the outside in. Foundations and Trends\u00ae in Human\u2013Computer Interaction 14 4 (2021) 272\u2013344.","DOI":"10.1561\/1100000083"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-main.741"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITCE.2019.8646645"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"crossref","unstructured":"Ziad Obermeyer Brian Powers Christine Vogeli and Sendhil Mullainathan. 2019. Dissecting racial bias in an algorithm used to manage the health of populations. Science 366 6464 (2019) 447\u2013453.","DOI":"10.1126\/science.aax2342"},{"key":"e_1_3_3_2_52_2","unstructured":"Protection Regulation. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council. Regulation (eu) 679 (2016) 2016."},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91238-7_45"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642036"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"crossref","unstructured":"Joni Salminen Joao\u00a0M Santos Haewoon Kwak Jisun An Soon-gyo Jung and Bernard\u00a0J Jansen. 2020. Persona perception scale: development and exploratory validation of an instrument for evaluating individuals\u2019 perceptions of personas. International Journal of Human-Computer Studies 141 (2020) 102437.","DOI":"10.1016\/j.ijhcs.2020.102437"},{"key":"e_1_3_3_2_56_2","unstructured":"Christian Sandvig Kevin Hamilton Karrie Karahalios and Cedric Langbort. 2014. Auditing algorithms: Research methods for detecting discrimination on internet platforms. Data and discrimination: converting critical concerns into productive inquiry 22 2014 (2014) 4349\u20134357."},{"key":"e_1_3_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3593994"},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3650860"},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3450613.3456835"},{"key":"e_1_3_3_2_60_2","first-page":"5","volume-title":"Conference on fairness, accountability and transparency","author":"Speicher Till","year":"2018","unstructured":"Till Speicher, Muhammad Ali, Giridhari Venkatadri, Filipe\u00a0Nunes Ribeiro, George Arvanitakis, Fabr\u00edcio Benevenuto, Krishna\u00a0P Gummadi, Patrick Loiseau, and Alan Mislove. 2018. Potential for discrimination in online targeted advertising. In Conference on fairness, accountability and transparency. PMLR, 5\u201319."},{"key":"e_1_3_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462847"},{"key":"e_1_3_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3463005"},{"key":"e_1_3_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335362"},{"key":"e_1_3_3_2_64_2","doi-asserted-by":"crossref","unstructured":"Aleksandra Urman Ivan Smirnov and Jana Lasser. 2024. The right to audit and power asymmetries in algorithm auditing. EPJ Data Science 13 1 (2024) 19.","DOI":"10.1140\/epjds\/s13688-024-00454-5"},{"key":"e_1_3_3_2_65_2","doi-asserted-by":"crossref","unstructured":"Guda Van\u00a0Noort Edith\u00a0G Smit and Hilde\u00a0AM Voorveld. 2013. The online behavioural advertising icon: two user studies. Advances in Advertising Research (Vol. IV) The Changing Roles of Advertising (2013) 365\u2013378.","DOI":"10.1007\/978-3-658-02365-2_28"},{"key":"e_1_3_3_2_66_2","doi-asserted-by":"crossref","unstructured":"Kaan Varnali. 2021. Online behavioral advertising: An integrative review. Journal of Marketing Communications 27 1 (2021) 93\u2013114.","DOI":"10.1080\/13527266.2019.1630664"},{"key":"e_1_3_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313742"},{"key":"e_1_3_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445885"},{"key":"e_1_3_3_2_69_2","volume-title":"The Thirty-eighth Annual Conference on Neural Information Processing Systems","author":"Wei Jerry","year":"2024","unstructured":"Jerry Wei, Chengrun Yang, Xinying Song, Yifeng Lu, Nathan\u00a0Zixia Hu, Jie Huang, Dustin Tran, Daiyi Peng, Ruibo Liu, Da Huang, Cosmo Du, and Quoc\u00a0V Le. 2024. Long-form factuality in large language models. In The Thirty-eighth Annual Conference on Neural Information Processing Systems. https:\/\/openreview.net\/forum?id=4M9f8VMt2C"},{"key":"e_1_3_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372833"},{"key":"e_1_3_3_2_71_2","volume-title":"The 1st International Workshop on Causality in Search and Recommendation","author":"Xu Shuyuan","year":"2021","unstructured":"Shuyuan Xu, Yunqi Li, Shuchang Liu, Zuohui Fu, Yingqiang Ge, Xu Chen, and Yongfeng Zhang. 2021. Learning causal explanations for recommendation. In The 1st International Workshop on Causality in Search and Recommendation."},{"key":"e_1_3_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998316"},{"key":"e_1_3_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561460"},{"key":"e_1_3_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512042"},{"key":"e_1_3_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2609579"}],"event":{"name":"UIST '25: The 38th Annual ACM Symposium on User Interface Software and Technology","location":"Busan Republic of Korea","acronym":"UIST '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques"]},"container-title":["Proceedings of the 38th Annual ACM Symposium on User Interface Software and Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746059.3747798","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746059.3747798","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T22:10:00Z","timestamp":1759011000000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746059.3747798"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,27]]},"references-count":74,"alternative-id":["10.1145\/3746059.3747798","10.1145\/3746059"],"URL":"https:\/\/doi.org\/10.1145\/3746059.3747798","relation":{},"subject":[],"published":{"date-parts":[[2025,9,27]]},"assertion":[{"value":"2025-09-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}