{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T07:13:31Z","timestamp":1773818011510,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":85,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,12]]},"DOI":"10.1145\/3756884.3765978","type":"proceedings-article","created":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T07:47:22Z","timestamp":1764920842000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["User Identification in Virtual Reality through Behavioral Biometrics and the Influence of Colocated Interactions"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6923-9066","authenticated-orcid":false,"given":"Jonathan","family":"Liebers","sequence":"first","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Essen, NRW, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3841-7977","authenticated-orcid":false,"given":"Frieder","family":"Sykora","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Essen, NRW, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7290-3469","authenticated-orcid":false,"given":"Niklas","family":"Pf\u00fctzenreuter","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Essen, NRW, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5671-1640","authenticated-orcid":false,"given":"Uwe","family":"Gruenefeld","sequence":"additional","affiliation":[{"name":"GenerIO, Essen, NRW, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4837-893X","authenticated-orcid":false,"given":"David","family":"Goedicke","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Essen, NRW, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0132-4934","authenticated-orcid":false,"given":"Stefan","family":"Schneegass","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Essen, NRW, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,12,4]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/AIVR46125.2019.00012"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3603555.3603574"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","unstructured":"Reem AlHusain and Ali Alkhalifah. 2021. Evaluating fallback authentication research: A systematic literature review. Computers & Security 111 (2021) 102487. 10.1016\/j.cose.2021.102487","DOI":"10.1016\/j.cose.2021.102487"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","unstructured":"Florian Alt and Stefan Schneegass. 2022. Beyond Passwords\u2014Challenges and Opportunities of Future Authentication. IEEE Security & Privacy 20 1 (2022) 82\u201386. 10.1109\/MSEC.2021.3127459","DOI":"10.1109\/MSEC.2021.3127459"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"Sarker\u00a0Monojit Asish Arun\u00a0K. Kulshreshth and Christoph\u00a0W. Borst. 2022. User Identification Utilizing Minimal Eye-Gaze Features in Virtual Reality Applications. Virtual Worlds 1 1 (2022) 42\u201361. 10.3390\/virtualworlds1010004","DOI":"10.3390\/virtualworlds1010004"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","unstructured":"Joseph Bonneau Cormac Herley Paul\u00a0C. van Oorschot and Frank Stajano. 2015. Passwords and the evolution of imperfect authentication. Communications of the ACM 58 7 (2015) 78\u201387. 10.1145\/2699390","DOI":"10.1145\/2699390"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","unstructured":"Bruce Potter. 2005. Are passwords dead? Network Security 2005 9 (2005) 7\u20138. 10.1016\/S1353-4858(05)70280-4","DOI":"10.1016\/S1353-4858(05)70280-4"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511720314"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2017.23028"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","unstructured":"Davide Chicco. 2017. Ten quick tips for machine learning in computational biology. BioData mining 10 (2017) 35. 10.1186\/s13040-017-0155-3","DOI":"10.1186\/s13040-017-0155-3"},{"key":"e_1_3_3_1_12_2","unstructured":"Zhicheng Cui Wenlin Chen and Yixin Chen. 2016. Multi-Scale Convolutional Neural Networks for Time Series Classification. arxiv:https:\/\/arXiv.org\/abs\/1603.06995\u00a0[cs.CV]"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","unstructured":"David Ferbrache. 2016. Passwords are broken \u2013 the future shape of biometrics. Biometric Technology Today 2016 3 (2016) 5\u20137. 10.1016\/S0969-4765(16)30049-2","DOI":"10.1016\/S0969-4765(16)30049-2"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511609787"},{"key":"e_1_3_3_1_15_2","unstructured":"Alberto Giaretta. 2022. Security and Privacy in Virtual Reality \u2013 A Literature Survey. http:\/\/arxiv.org\/pdf\/2205.00208v2"},{"key":"e_1_3_3_1_16_2","unstructured":"Paul Hagen Harley Manning and Randy Souza. 1999. Smart Personalization. Forrester Research Cambridge MA (1999)."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","unstructured":"Louisa Hallal Jason Rhinelander and Ramesh Venkat. 2024. Recent Trends of Authentication Methods in Extended Reality: A Survey. Applied System Innovation 7 3 (2024) 45. 10.3390\/asi7030045","DOI":"10.3390\/asi7030045"},{"key":"e_1_3_3_1_18_2","unstructured":"International Organization for Standardization (ISO). 2023. ISO\/IEC 19092:2023 Financial services \u2013 Biometrics \u2013 Security framework."},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","unstructured":"Hassan Ismail\u00a0Fawaz Germain Forestier Jonathan Weber Lhassane Idoumghar and Pierre-Alain Muller. 2019. Deep learning for time series classification: a review. Data Mining and Knowledge Discovery 33 4 (2019) 917\u2013963. 10.1007\/s10618-019-00619-1","DOI":"10.1007\/s10618-019-00619-1"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","unstructured":"Hassan Ismail\u00a0Fawaz Benjamin Lucas Germain Forestier Charlotte Pelletier Daniel\u00a0F. Schmidt Jonathan Weber Geoffrey\u00a0I. Webb Lhassane Idoumghar Pierre-Alain Muller and Fran\u00e7ois Petitjean. 2020. InceptionTime: Finding AlexNet for time series classification. Data Mining and Knowledge Discovery 34 6 (01 11 2020) 1936\u20131962. 10.1007\/s10618-020-00710-y","DOI":"10.1007\/s10618-020-00710-y"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-61675-4"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.5555\/1855628.1855637"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376840"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05710-75"},{"key":"e_1_3_3_1_26_2","volume-title":"ECML\/PKDD Workshop on Advanced Analytics and Learning on Temporal Data","author":"Le\u00a0Guennec Arthur","year":"2016","unstructured":"Arthur Le\u00a0Guennec, Simon Malinowski, and Romain Tavenard. 2016. Data Augmentation for Time Series Classification using Convolutional Neural Networks. In ECML\/PKDD Workshop on Advanced Analytics and Learning on Temporal Data. Riva Del Garda, Italy, 8\u00a0pages. https:\/\/halshs.archives-ouvertes.fr\/halshs-01357973"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/AIxVR59861.2024.00012"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/AIxVR63409.2025.00043"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445528"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","unstructured":"Jonathan Liebers Sascha Brockel Uwe Gruenefeld and Stefan Schneegass. 2022. Identifying Users by Their Hand Tracking Data in Augmented and Virtual Reality. International Journal of Human\u2013Computer Interaction (2022) 28\u00a0pages. 10.1080\/10447318.2022.2120845","DOI":"10.1080\/10447318.2022.2120845"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3611659.3615696"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3489849.3489880"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB62174.2024.10744488"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642471"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3379157.3391421"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-39940-9"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES48766.2020.9137914"},{"key":"e_1_3_3_1_38_2","first-page":"189","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)","author":"Mare Shrirang","year":"2016","unstructured":"Shrirang Mare, Mary Baker, and Jeremy Gummeson. 2016. A Study of Authentication in Daily Life. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver, CO, 189\u2013206. https:\/\/www.usenix.org\/conference\/soups2016\/technical-sessions\/presentation\/mare"},{"key":"e_1_3_3_1_39_2","first-page":"213","volume-title":"10th Symposium On Usable Privacy and Security (SOUPS 2014)","author":"Harbach Marian","year":"2014","unstructured":"Marian Harbach, Emanuel von Zezschwitz, Andreas Fichtner, Alexander De Luca, and Matthew Smith. 2014. It\u2019s a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. In 10th Symposium On Usable Privacy and Security (SOUPS 2014). USENIX Association, Menlo Park, CA, 213\u2013230. https:\/\/www.usenix.org\/conference\/soups2014\/proceedings\/presentation\/harbach"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"publisher","unstructured":"Patrick\u00a0M. Markey David\u00a0C. Funder and Daniel\u00a0J. Ozer. 2003. Complementarity of Interpersonal Behaviors in Dyadic Interactions. Personality and Social Psychology Bulletin 29 9 (2003) 1082\u20131090. 10.1177\/0146167203253474 arXiv:10.1177\/0146167203253474 PMID: 15189605.","DOI":"10.1177\/0146167203253474"},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382827"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"publisher","unstructured":"Oded Mayo and Ilanit Gordon. 2020. In and out of synchrony\u2014Behavioral and physiological dynamics of dyadic interpersonal coordination. Psychophysiology 57 6 (2020) e13574. 10.1111\/psyp.13574 arXiv:https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/psyp.13574","DOI":"10.1111\/psyp.13574"},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"publisher","unstructured":"Mark\u00a0Roman Miller Eugy Han Cyan DeVeaux Eliot Jones Ryan Chen and Jeremy\u00a0N. Bailenson. 2023. A Large-Scale Study of Personal Identifiability of Virtual Reality Motion Over Time. 10.48550\/arXiv.2303.01430","DOI":"10.48550\/arXiv.2303.01430"},{"key":"e_1_3_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR50410.2021.00035"},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR51125.2022.00060"},{"key":"e_1_3_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR51125.2022.00076"},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR59233.2023.00054"},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR52148.2021.00037"},{"key":"e_1_3_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/VRW52623.2021.00160"},{"key":"e_1_3_3_1_50_2","doi-asserted-by":"publisher","unstructured":"Gonzalo Munilla Garrido Vivek Nair and Dawn Song. 2024. SoK: Data Privacy in Virtual Reality. Proceedings on Privacy Enhancing Technologies 2024 1 (2024) 21\u201340. 10.56553\/popets-2024-0003","DOI":"10.56553\/popets-2024-0003"},{"key":"e_1_3_3_1_51_2","volume-title":"Science of Sport","author":"Murray Stafford","year":"2016","unstructured":"Stafford Murray. 2016. Science of Sport. Crowood, Marlborough. https:\/\/ebookcentral.proquest.com\/lib\/kxp\/detail.action?docID=5286167"},{"key":"e_1_3_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/3180445.3180450"},{"key":"e_1_3_3_1_53_2","unstructured":"Vivek Nair Wenbo Guo Justus Mattern Rui Wang James\u00a0F. O\u2019Brien Louis Rosenberg and Dawn Song. 2023. Unique Identification of 50 000+ Virtual Reality Users from Head & Hand Motion Data. http:\/\/arxiv.org\/pdf\/2302.08927v1"},{"key":"e_1_3_3_1_54_2","doi-asserted-by":"publisher","unstructured":"Vivek Nair Wenbo Guo Rui Wang James\u00a0F. O\u2019Brien Louis Rosenberg and Dawn Song. 2023. Berkeley Open Extended Reality Recordings 2023 (BOXRR-23): 4.7 Million Motion Capture Recordings from 105 852 Extended Reality Device Users. 10.48550\/arXiv.2310.00430","DOI":"10.48550\/arXiv.2310.00430"},{"key":"e_1_3_3_1_55_2","doi-asserted-by":"publisher","unstructured":"Ilesanmi Olade Charles Fleming and Hai-Ning Liang. 2020. BioMove: Biometric User Identification from Human Kinesiological Movements for Virtual Reality Systems. Sensors 20 10 (2020) 2944. 10.3390\/s20102944","DOI":"10.3390\/s20102944"},{"key":"e_1_3_3_1_56_2","doi-asserted-by":"publisher","unstructured":"Paul A Grassi Michael E Garcia and James L Fenton. 2017. Digital Identity Guidelines: revision 3. 10.6028\/nist.sp.800-63-3","DOI":"10.6028\/nist.sp.800-63-3"},{"key":"e_1_3_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300340"},{"key":"e_1_3_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/VRW50115.2020.00070"},{"key":"e_1_3_3_1_59_2","doi-asserted-by":"publisher","unstructured":"Christian Rack Tamara Fernando Murat Yalcin Andreas Hotho and Marc\u00a0Erich Latoschik. 2023. Who is Alyx? A new behavioral biometric dataset for user identification in XR. Frontiers in Virtual Reality 4 (2023) 11\u00a0pages. 10.3389\/frvir.2023.1272234","DOI":"10.3389\/frvir.2023.1272234"},{"key":"e_1_3_3_1_60_2","unstructured":"Christian Rack Konstantin Kobs Tamara Fernando Andreas Hotho and Marc\u00a0Erich Latoschik. 2023. Extensible Motion-based Identification of XR Users using Non-Specific Motion Data. http:\/\/arxiv.org\/pdf\/2302.07517v4"},{"key":"e_1_3_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972788.54"},{"key":"e_1_3_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642864"},{"key":"e_1_3_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581259"},{"key":"e_1_3_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-39940-9565"},{"key":"e_1_3_3_1_65_2","first-page":"175","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)","author":"Wash Rick","year":"2016","unstructured":"Rick Wash, Emilee Rader, Ruthie Berman, and Zac Wellmer. 2016. Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver, CO, 175\u2013188. https:\/\/www.usenix.org\/conference\/soups2016\/technical-sessions\/presentation\/wash"},{"key":"e_1_3_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB54206.2022.10007994"},{"key":"e_1_3_3_1_67_2","doi-asserted-by":"publisher","unstructured":"Sandra G. Hart. 2006. Nasa-Task Load Index (NASA-TLX); 20 Years Later. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 50 9 (2006) 904\u2013908. 10.1177\/154193120605000909","DOI":"10.1177\/154193120605000909"},{"key":"e_1_3_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1016\/s0166-4115(08)62386-9"},{"key":"e_1_3_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1515\/9783110552485-002"},{"key":"e_1_3_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07308-823"},{"key":"e_1_3_3_1_71_2","doi-asserted-by":"publisher","unstructured":"Albrecht Schmidt. 2000. Implicit human computer interaction through context. Personal Technologies 4 2-3 (2000) 191\u2013199. 10.1007\/BF01324126","DOI":"10.1007\/BF01324126"},{"key":"e_1_3_3_1_72_2","unstructured":"Joan Serr\u00e0 Santiago Pascual and Alexandros Karatzoglou. 2018. Towards a universal neural network encoder for time series. arxiv:https:\/\/arXiv.org\/abs\/1805.03908\u00a0[cs.LG] https:\/\/arxiv.org\/pdf\/1805.03908.pdf"},{"key":"e_1_3_3_1_73_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-49071-2"},{"key":"e_1_3_3_1_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833742"},{"key":"e_1_3_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2014.6859779"},{"key":"e_1_3_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0149"},{"key":"e_1_3_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61350-129-0.ch001"},{"key":"e_1_3_3_1_78_2","doi-asserted-by":"publisher","unstructured":"Kim-Phuong\u00a0L. Vu Robert\u00a0W. Proctor Abhilasha Bhargav-Spantzel Bik-Lam Tai Joshua Cook and E. Eugene Schultz. 2007. Improving password security and memorability to protect personal and organizational information. International Journal of Human-Computer Studies 65 8 (2007) 744\u2013757. 10.1016\/j.ijhcs.2007.03.007","DOI":"10.1016\/j.ijhcs.2007.03.007"},{"key":"e_1_3_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966039"},{"key":"e_1_3_3_1_80_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-72315-5_33"},{"key":"e_1_3_3_1_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/VRW52623.2021.00073"},{"key":"e_1_3_3_1_82_2","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1978963"},{"key":"e_1_3_3_1_83_2","doi-asserted-by":"publisher","unstructured":"Jacob\u00a0O. Wobbrock and Julie\u00a0A. Kientz. 2016. Research contributions in human-computer interaction. Interactions 23 3 (2016) 38\u201344. 10.1145\/2907069","DOI":"10.1145\/2907069"},{"key":"e_1_3_3_1_84_2","doi-asserted-by":"publisher","unstructured":"Zhaojun Yang Angeliki Metallinou and Shrikanth Narayanan. 2014. Analysis and Predictive Modeling of Body Language Behavior in Dyadic Interactions From Multimodal Interlocutor Cues. IEEE Transactions on Multimedia 16 6 (2014) 1766\u20131778. 10.1109\/TMM.2014.2328311","DOI":"10.1109\/TMM.2014.2328311"},{"key":"e_1_3_3_1_85_2","doi-asserted-by":"publisher","unstructured":"Bendong Zhao Huanzhang Lu Shangfeng Chen Junliang Liu and Dongya Wu. 2017. Convolutional neural networks for time series classification. Journal of Systems Engineering and Electronics 28 1 (2017) 162\u2013169. 10.21629\/JSEE.2017.01.18","DOI":"10.21629\/JSEE.2017.01.18"},{"key":"e_1_3_3_1_86_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08010-9_33"}],"event":{"name":"VRST '25: 31st ACM Symposium on Virtual Reality Software and Technology","location":"Montreal QC Canada","acronym":"VRST '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques"]},"container-title":["Proceedings of the 2025 31st ACM Symposium on Virtual Reality Software and Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3756884.3765978","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T09:11:59Z","timestamp":1764925919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3756884.3765978"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":85,"alternative-id":["10.1145\/3756884.3765978","10.1145\/3756884"],"URL":"https:\/\/doi.org\/10.1145\/3756884.3765978","relation":{},"subject":[],"published":{"date-parts":[[2025,11,12]]},"assertion":[{"value":"2025-12-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}