{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T20:55:16Z","timestamp":1777064116269,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,27]]},"DOI":"10.1145\/3767295.3803614","type":"proceedings-article","created":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T20:20:04Z","timestamp":1777062004000},"page":"1565-1580","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Proactive Change Risk Detection in Production Cloud Systems: ByteDance\u2019s Experience"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0037-1912","authenticated-orcid":false,"given":"Jinyang","family":"Liu","sequence":"first","affiliation":[{"name":"ByteDance, San Jose, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8370-644X","authenticated-orcid":false,"given":"Yichen","family":"Li","sequence":"additional","affiliation":[{"name":"ByteDance, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2250-5528","authenticated-orcid":false,"given":"Tieying","family":"Zhang","sequence":"additional","affiliation":[{"name":"ByteDance, San Jose, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8598-2442","authenticated-orcid":false,"given":"Binbin","family":"Chen","sequence":"additional","affiliation":[{"name":"ByteDance, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7959-2157","authenticated-orcid":false,"given":"Xiao","family":"He","sequence":"additional","affiliation":[{"name":"ByteDance, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1988-6219","authenticated-orcid":false,"given":"Zhihan","family":"Jiang","sequence":"additional","affiliation":[{"name":"ByteDance, San Jose, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4153-984X","authenticated-orcid":false,"given":"Haipeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"ByteDance, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4048-7949","authenticated-orcid":false,"given":"Gang","family":"Wu","sequence":"additional","affiliation":[{"name":"ByteDance, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3069-9948","authenticated-orcid":false,"given":"Yi","family":"Li","sequence":"additional","affiliation":[{"name":"ByteDance, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2026,4,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2024. A Quick Guide on SaaS Change Management. https:\/\/www.cloudeagle.ai\/blogs\/saas-change-management"},{"key":"e_1_3_2_1_2_1","unstructured":"2025. AWS Cloud. https:\/\/aws.amazon.com\/"},{"key":"e_1_3_2_1_3_1","unstructured":"2025. Azure Cloud. https:\/\/azure.microsoft.com\/en-us\/"},{"key":"e_1_3_2_1_4_1","unstructured":"2025. Google Cloud. https:\/\/cloud.google.com\/"},{"key":"e_1_3_2_1_5_1","volume-title":"Principal component analysis","author":"Abdi Herv\u00e9","year":"2010","unstructured":"Herv\u00e9 Abdi and Lynne J Williams. 2010. Principal component analysis. Wiley interdisciplinary reviews: computational statistics 2, 4 (2010), 433\u2013459."},{"key":"e_1_3_2_1_6_1","volume-title":"Moving Faster and Reducing Risk: Using LLMs in Release Deployment. In 2025 IEEE\/ACM 47th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). IEEE, 448\u2013457","author":"Abreu Rui","year":"2025","unstructured":"Rui Abreu, Vijayaraghavan Murali, Peter C Rigby, Chandra Maddila, Weiyan Sun, Jun Ge, Kaavya Chinniah, Audris Mockus, Megh Mehta, and Nachiappan Nagappan. 2025. Moving Faster and Reducing Risk: Using LLMs in Release Deployment. In 2025 IEEE\/ACM 47th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). IEEE, 448\u2013457."},{"key":"e_1_3_2_1_7_1","unstructured":"Amazon Web Services. 2024. Change Management Categories and Priorities. https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/establishing-your-cloud-foundation-on-aws\/change-management-categories-priorities.html. Accessed: 2026-02-27."},{"key":"e_1_3_2_1_8_1","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Ambati Pradeep","year":"2020","unstructured":"Pradeep Ambati, \u00cd\u00f1igo Goiri, Felipe Frujeri, Alper Gun, Ke Wang, Brian Dolan, Brian Corell, Sekhar Pasupuleti, Thomas Moscibroda, Sameh Elnikety, et al. 2020. Providing {SLOs} for {Resource-Harvesting}{VMs} in cloud platforms. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20). 735\u2013751."},{"key":"e_1_3_2_1_9_1","volume-title":"10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12)","author":"Attariyan Mona","year":"2012","unstructured":"Mona Attariyan, Michael Chow, and Jason Flinn. 2012. X-ray: Automating {Root-Cause} diagnosis of performance anomalies in production software. In 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12). 307\u2013320."},{"key":"e_1_3_2_1_10_1","volume-title":"2021 IEEE 14th International Conference on Cloud Computing (CLOUD). IEEE, 112\u2013123","author":"Batta Raghav","year":"2021","unstructured":"Raghav Batta, Larisa Shwartz, Michael Nidd, Amar Prakash Azad, and Harshit Kumar. 2021. A system for proactive risk assessment of application changes in cloud operations. In 2021 IEEE 14th International Conference on Cloud Computing (CLOUD). IEEE, 112\u2013123."},{"key":"e_1_3_2_1_11_1","unstructured":"ByteDance Seed. 2025. Technical Introduction to the Seed1.6 Model Series. https:\/\/seed.bytedance.com\/en\/blog\/introduction-to-techniques-used-in-seed1-6. Accessed: 2026-02-27."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 2006 ACM symposium on Applied computing. 1767\u20131772","author":"Canfora Gerardo","year":"2006","unstructured":"Gerardo Canfora and Luigi Cerulo. 2006. Supporting change request assignment in open source development. In Proceedings of the 2006 ACM symposium on Applied computing. 1767\u20131772."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 362\u2013374","author":"Chen Qingrong","year":"2020","unstructured":"Qingrong Chen, Teng Wang, Owolabi Legunsen, Shanshan Li, and Tianyin Xu. 2020. Understanding and discovering software configuration dependencies in cloud and datacenter systems. In Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 362\u2013374."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 22nd acm sigkdd international conference on knowledge discovery and data mining. 785\u2013794","author":"Chen Tianqi","year":"2016","unstructured":"Tianqi Chen and Carlos Guestrin. 2016. Xgboost: A scalable tree boosting system. In Proceedings of the 22nd acm sigkdd international conference on knowledge discovery and data mining. 785\u2013794."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the Nineteenth European Conference on Computer Systems. 674\u2013688","author":"Chen Yinfang","year":"2024","unstructured":"Yinfang Chen, Huaibing Xie, Minghua Ma, Yu Kang, Xin Gao, Liu Shi, Yunjie Cao, Xuedong Gao, Hao Fan, Ming Wen, et al. 2024. Automatic root cause analysis via large language models for cloud incidents. In Proceedings of the Nineteenth European Conference on Computer Systems. 674\u2013688."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 1487\u20131497","author":"Chen Zhuangbin","year":"2020","unstructured":"Zhuangbin Chen, Yu Kang, Liqun Li, Xu Zhang, Hongyu Zhang, Hui Xu, Yangfan Zhou, Li Yang, Jeffrey Sun, Zhangwei Xu, et al. 2020. Towards intelligent incident management: why we need it and how we make it. In Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 1487\u20131497."},{"key":"e_1_3_2_1_17_1","volume-title":"2015 IEEE International Conference on Software Quality, Reliability and Security-Companion. IEEE, 115\u2013120","author":"Chih Chi-An","year":"2015","unstructured":"Chi-An Chih and Yu-Lun Huang. 2015. An adjustable risk assessment method for a cloud system. In 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion. IEEE, 115\u2013120."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1145\/1323293.1294283","article-title":"Staged deployment in mirage, an integrated software upgrade testing and distribution system","volume":"41","author":"Crameri Olivier","year":"2007","unstructured":"Olivier Crameri, Nikola Knezevic, Dejan Kostic, Ricardo Bianchini, and Willy Zwaenepoel. 2007. Staged deployment in mirage, an integrated software upgrade testing and distribution system. ACM SIGOPS Operating Systems Review 41, 6 (2007), 221\u2013236.","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"e_1_3_2_1_19_1","volume-title":"2012 IEEE Eighth World Congress on Services. IEEE, 377\u2013384","author":"Doelitzscher Frank","year":"2012","unstructured":"Frank Doelitzscher, Christian Fischer, Denis Moskal, Christoph Reich, Martin Knahl, and Nathan Clarke. 2012. Validating cloud infrastructure changes by cloud audits. In 2012 IEEE Eighth World Congress on Services. IEEE, 377\u2013384."},{"key":"e_1_3_2_1_20_1","unstructured":"Qingxiu Dong Lei Li Damai Dai Ce Zheng Jingyuan Ma Rui Li Heming Xia Jingjing Xu Zhiyong Wu Tianyu Liu et al. 2022. A survey on in-context learning. arXiv preprint arXiv:2301.00234 (2022)."},{"key":"e_1_3_2_1_21_1","unstructured":"Google Cloud. 2024. Google Cloud's Approach to Change. https:\/\/cloud.google.com\/docs\/cloud-approach-to-change. Accessed: 2026-02-27."},{"key":"e_1_3_2_1_22_1","volume-title":"17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23)","author":"Grubic Boris","year":"2023","unstructured":"Boris Grubic, Yang Wang, Tyler Petrochko, Ran Yaniv, Brad Jones, David Callies, Matt Clarke-Lauer, Dan Kelley, Soteris Demetriou, Kenny Yu, et al. 2023. Conveyor:{One-Tool-Fits-All} Continuous Software Deployment at Meta. In 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23). 325\u2013342."},{"key":"e_1_3_2_1_23_1","volume-title":"2016 12th International Conference on Network and Service Management (CNSM). IEEE, 268\u2013271","author":"G\u00fcven Sinem","year":"2016","unstructured":"Sinem G\u00fcven and Karin Murthy. 2016. Understanding the role of change in incident prevention. In 2016 12th International Conference on Network and Service Management (CNSM). IEEE, 268\u2013271."},{"key":"e_1_3_2_1_24_1","volume-title":"LoRA: Low-Rank Adaptation of Large Language Models. In International Conference on Learning Representations (ICLR).","author":"Hu Edward J","year":"2022","unstructured":"Edward J Hu, Yelong Shen, Phillip Wallis, Zeyuan Allen-Zhu, Yuanzhi Li, Shean Wang, Lu Wang, and Weizhu Chen. 2022. LoRA: Low-Rank Adaptation of Large Language Models. In International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 46th International Conference on Software Engineering: Software Engineering in Practice. 392\u2013404","author":"Huang Junjie","year":"2024","unstructured":"Junjie Huang, Jinyang Liu, Zhuangbin Chen, Zhihan Jiang, Yichen Li, Jiazhen Gu, Cong Feng, Zengyin Yang, Yongqiang Yang, and Michael R Lyu. 2024. Faultprofit: Hierarchical fault profiling of incident tickets in large-scale cloud systems. In Proceedings of the 46th International Conference on Software Engineering: Software Engineering in Practice. 392\u2013404."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 6th European SOFTWARE ENGINEERING conference held jointly with the 5th ACM SIGSOFT international symposium on Foundations of software engineering. 125\u2013141","author":"Joeris Gregor","year":"1997","unstructured":"Gregor Joeris. 1997. Change management needs integrated process and configuration management. In Proceedings of the 6th European SOFTWARE ENGINEERING conference held jointly with the 5th ACM SIGSOFT international symposium on Foundations of software engineering. 125\u2013141."},{"key":"e_1_3_2_1_27_1","volume-title":"Cloud computing risk assessment: a systematic literature review. Future information technology","author":"Latif Rabia","year":"2014","unstructured":"Rabia Latif, Haider Abbas, Sa\u00efd Assar, and Qasim Ali. 2014. Cloud computing risk assessment: a systematic literature review. Future information technology (2014), 285\u2013295."},{"key":"e_1_3_2_1_28_1","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Levy Sebastien","year":"2020","unstructured":"Sebastien Levy, Randolph Yao, Youjiang Wu, Yingnong Dang, Peng Huang, Zheng Mu, Pu Zhao, Tarun Ramani, Naga Govindaraju, Xukun Li, et al. 2020. Predictive and adaptive failure mitigation to avert production cloud {VM} interruptions. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20). 1155\u20131170."},{"key":"e_1_3_2_1_29_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Li Ze","year":"2020","unstructured":"Ze Li, Qian Cheng, Ken Hsieh, Yingnong Dang, Peng Huang, Pankaj Singh, Xinsheng Yang, Qingwei Lin, Youjiang Wu, Sebastien Levy, et al. 2020. Gandalf: An intelligent,{End-To-End} analytics service for safe deployment in {Large-Scale} cloud infrastructure. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). 389\u2013402."},{"key":"e_1_3_2_1_30_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Lou Chang","year":"2020","unstructured":"Chang Lou, Peng Huang, and Scott Smith. 2020. Understanding, detecting and localizing partial failures in large system software. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). 559\u2013574."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","first-page":"205","DOI":"10.21105\/joss.00205","article-title":"hdbscan: Hierarchical density based clustering","volume":"2","author":"McInnes Leland","year":"2017","unstructured":"Leland McInnes, John Healy, Steve Astels, et al. 2017. hdbscan: Hierarchical density based clustering. J. Open Source Softw. 2, 11 (2017), 205.","journal-title":"J. Open Source Softw."},{"key":"e_1_3_2_1_32_1","unstructured":"Microsoft Azure. 2025. Administer Your Azure Cloud Estate - Manage Change. https:\/\/learn.microsoft.com\/en-us\/azure\/cloud-adoption-framework\/manage\/administer. Accessed: 2026-02-28."},{"key":"e_1_3_2_1_33_1","first-page":"1","article-title":"Multimodal detection framework for financial fraud integrating LLMs and interpretable machine learning","volume":"10","author":"Nie H","year":"2025","unstructured":"H Nie, ZH Long, ZJ Fang, and LQ Gao. 2025. Multimodal detection framework for financial fraud integrating LLMs and interpretable machine learning. Journal of Data and Information Science 10, 4 (2025), 1\u201325.","journal-title":"Journal of Data and Information Science"},{"key":"e_1_3_2_1_34_1","volume-title":"A survey of hallucination in large foundation models. arXiv preprint arXiv:2309.05922","author":"Rawte Vipula","year":"2023","unstructured":"Vipula Rawte, Amit Sheth, and Amitava Das. 2023. A survey of hallucination in large foundation models. arXiv preprint arXiv:2309.05922 (2023)."},{"key":"e_1_3_2_1_35_1","volume-title":"Machine Learning: Multi Layer Perceptrons. Machine Learning Lab","author":"Riedmiller Martin","year":"2014","unstructured":"Martin Riedmiller. 2014. Machine Learning: Multi Layer Perceptrons. Machine Learning Lab, University of Freiburg."},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 38th International Conference on software engineering companion. 21\u201330","author":"Savor Tony","year":"2016","unstructured":"Tony Savor, Mitchell Douglas, Michael Gentili, Laurie Williams, Kent Beck, and Michael Stumm. 2016. Continuous deployment at Facebook and OANDA. In Proceedings of the 38th International Conference on software engineering companion. 21\u201330."},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering. 1\u201311","author":"Shihab Emad","year":"2012","unstructured":"Emad Shihab, Ahmed E Hassan, Bram Adams, and Zhen Ming Jiang. 2012. An industrial study on the risk of software changes. In Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering. 1\u201311."},{"key":"e_1_3_2_1_38_1","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Sun Xudong","year":"2020","unstructured":"Xudong Sun, Runxiang Cheng, Jianyan Chen, Elaine Ang, Owolabi Legunsen, and Tianyin Xu. 2020. Testing configuration changes in context to prevent production failures. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20). 735\u2013751."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining. 17\u201326","author":"Tang Diane","year":"2010","unstructured":"Diane Tang, Ashish Agarwal, Deirdre O'Brien, and Mike Meyer. 2010. Overlapping experiment infrastructure: More, better, faster experimentation. In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining. 17\u201326."},{"key":"e_1_3_2_1_40_1","volume-title":"21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24)","author":"Wang Haopei","year":"2024","unstructured":"Haopei Wang, Anubhavnidhi Abhashkumar, Changyu Lin, Tianrong Zhang, Xiaoming Gu, Ning Ma, Chang Wu, Songlin Liu, Wei Zhou, Yongbin Dong, et al. 2024. {NetAssistant}: Dialogue based network diagnosis in data center networks. In 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). 2011\u20132024."},{"key":"e_1_3_2_1_41_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Xu Tianyin","year":"2016","unstructured":"Tianyin Xu, Xinxin Jin, Peng Huang, Yuanyuan Zhou, Shan Lu, Long Jin, and Shankar Pasupathy. 2016. Early detection of configuration errors to reduce failure damage. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). 619\u2013634."},{"key":"e_1_3_2_1_42_1","first-page":"1","article-title":"Systems approaches to tackling configuration errors: A survey","volume":"47","author":"Xu Tianyin","year":"2015","unstructured":"Tianyin Xu and Yuanyuan Zhou. 2015. Systems approaches to tackling configuration errors: A survey. ACM Computing Surveys (CSUR) 47, 4 (2015), 1\u201341.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","volume":"2","author":"Yang Chenyuan","year":"2025","unstructured":"Chenyuan Yang, Zijie Zhao, and Lingming Zhang. 2025. Kernelgpt: Enhanced kernel fuzzing via large language models. In Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2. 560\u2013573."},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the 18th ACM conference on Information and knowledge management. 2061\u20132064","author":"Ye Jerry","year":"2009","unstructured":"Jerry Ye, Jyh-Herng Chow, Jiang Chen, and Zhaohui Zheng. 2009. Stochastic gradient boosted distributed decision trees. In Proceedings of the 18th ACM conference on Information and knowledge management. 2061\u20132064."},{"key":"e_1_3_2_1_45_1","volume-title":"10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12)","author":"Yuan Ding","year":"2012","unstructured":"Ding Yuan, Soyeon Park, Peng Huang, Yang Liu, Michael M Lee, Xiaoming Tang, Yuanyuan Zhou, and Stefan Savage. 2012. Be conservative: Enhancing failure diagnosis with proactive logging. In 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12). 293\u2013306."},{"key":"e_1_3_2_1_46_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Zhai Ennan","year":"2020","unstructured":"Ennan Zhai, Ang Chen, Ruzica Piskac, Mahesh Balakrishnan, Bingchuan Tian, Bo Song, and Haoliang Zhang. 2020. Check before you change: Preventing correlated failures in service updates. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). 575\u2013589."}],"event":{"name":"EUROSYS '26: 21st European Conference on Computer Systems","location":"McEwan Hall\/The University of Edinburgh Edinburgh Scotland UK","acronym":"EUROSYS '26","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 21st European Conference on Computer Systems"],"original-title":[],"deposited":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T20:31:20Z","timestamp":1777062680000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3767295.3803614"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,26]]},"references-count":46,"alternative-id":["10.1145\/3767295.3803614","10.1145\/3767295"],"URL":"https:\/\/doi.org\/10.1145\/3767295.3803614","relation":{},"subject":[],"published":{"date-parts":[[2026,4,26]]},"assertion":[{"value":"2026-04-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}