{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T07:49:39Z","timestamp":1777016979811,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":139,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,17]]},"DOI":"10.1145\/3799830.3799881","type":"proceedings-article","created":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T06:45:08Z","timestamp":1777013108000},"page":"334-343","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["MongoTalk: An Agentic AI Framework for Conversational and Autonomous No-Code MongoDB Management"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5454-1123","authenticated-orcid":false,"given":"Dr. Arti","family":"Patle","sequence":"first","affiliation":[{"name":"CSE(Data Science), G H Raisoni College of Engineering &amp; Management, Pune, Maharashtra, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8867-3559","authenticated-orcid":false,"given":"Dr. Deepika","family":"Ajalkar","sequence":"additional","affiliation":[{"name":"G H Raisoni College of Engineering &amp; Management, Pune, Maharashtra, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9007-0886","authenticated-orcid":false,"given":"Saloni","family":"Siddheshwar","sequence":"additional","affiliation":[{"name":"G H Raisoni College of Engineering &amp; Managment, Pune, Maharashtra, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6812-5650","authenticated-orcid":false,"given":"Vaibhav","family":"Vijay","sequence":"additional","affiliation":[{"name":"G H Raisoni College of Engineering &amp; Managment, Pune, Maharashtra, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8369-6480","authenticated-orcid":false,"given":"Dhruv","family":"Shirsath","sequence":"additional","affiliation":[{"name":"G H Raisoni College of Engineering &amp; Managment, Pune, Pune, Maharashtra, India"}]}],"member":"320","published-online":{"date-parts":[[2026,4,23]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Chen M. Mao S. and Liu Y. (2014). Big Data: A Survey. Mobile Networks and Applications 19(2) 171-209.","DOI":"10.1007\/s11036-013-0489-0"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Sivarajah U. Kamal M. M. Irani Z. and Weerakkody V. (2017). Critical analysis of Big Data challenges and analytical methods. Journal of Business Research 70 263-286.","DOI":"10.1016\/j.jbusres.2016.08.001"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Wieder B. and Ossimitz M. L. (2015). The impact of Business Intelligence on the quality of decision making\u2014a mediation model. Procedia Computer Science 64 1163-1171.","DOI":"10.1016\/j.procs.2015.08.599"},{"key":"e_1_3_3_1_5_2","unstructured":"Moniruzzaman A. B. M. and Hossain S. A. (2013). NoSQL Database: New Era of Databases for Big data Analytics-Classification Characteristics and Comparison. International Journal of Database Theory and Application 6(4) 1-14."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Androutsopoulos I. Ritchie G. D. and Thanisch P. (1995). Natural language interfaces to databases\u2014an introduction. Natural Language Engineering 1(1) 29-81.","DOI":"10.1017\/S135132490000005X"},{"key":"e_1_3_3_1_7_2","unstructured":"Chan H.-L. Lim E.-P. and Jain S. P. (2000). User-database interface: The effect of abstraction levels on query performance. SMU Institutional Knowledge."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Jagadish H. V. et al. (2007). Making database systems usable. In Proc. ACM SIGMOD Int. Conf. on Management of Data (pp. 13-24).","DOI":"10.1145\/1247480.1247483"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Zloof M. M. (1977). Query-by-Example: a data base language. IBM Systems Journal 16(4) 324-343.","DOI":"10.1147\/sj.164.0324"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Popescu A.-M. Etzioni O. and Kautz H. (2003). Towards a Theory of Natural Language Interfaces to Databases. In Proc. Int. Conf. on Intelligent User Interfaces (pp. 149-157).","DOI":"10.1145\/604045.604070"},{"key":"e_1_3_3_1_11_2","unstructured":"Li Z. Chen Z. et al. (2024). Next-Generation Database Interfaces: A Survey of LLM-based Text-to-SQL. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2406.08426."},{"key":"e_1_3_3_1_12_2","unstructured":"Brown T. B. et al. (2020). Language Models are Few-Shot Learners. In Advances in Neural Information Processing Systems (NeurIPS) 33 1877-1901."},{"key":"e_1_3_3_1_13_2","unstructured":"Shah H. S. et al. (2021). Bridging the Gap: Enabling Natural Language Queries for NoSQL Databases. In Proc. IEEE Int. Conf. on Big Data (pp. 1234-1245)."},{"key":"e_1_3_3_1_14_2","unstructured":"Rozi\u00e8re B. et al. (2023). Code Llama: Open Foundation Models for Code. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2308.12950."},{"key":"e_1_3_3_1_15_2","unstructured":"Touvron H. et al. (2023). Llama 2: Open Foundation and Fine-Tuned Chat Models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2307.09288."},{"key":"e_1_3_3_1_16_2","unstructured":"Jiang A. Q. et al. (2024). Mixtral of Experts. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2401.04088."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Pearce H. et al. (2022). Asleep at the Keyboard? Assessing the Security of GitHub Copilot\u2019s Code Contributions. In Proc. IEEE Symp. on Security and Privacy (SP) (pp. 754-768).","DOI":"10.1109\/SP46214.2022.9833571"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Oken E. and Tumeo A. (2020). A survey of sandboxing techniques. ACM Computing Surveys (CSUR) 53(5) 1-36.","DOI":"10.1145\/3388922"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Saltzer J. H. and Schroeder M. D. (1975). The protection of information in computer systems. Communications of the ACM 18(7) 38-48.","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_3_1_20_2","unstructured":"Devlin J. Chang M. W. Lee K. and Toutanova K. (2018). Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1810.04805."},{"key":"e_1_3_3_1_21_2","unstructured":"Vaswani A. Shazeer N. Parmar N. Uszkoreit J. Jones L. Gomez A. N. ... and Polosukhin I. (2017). Attention is all you need. Advances in neural information processing systems 30."},{"key":"e_1_3_3_1_22_2","unstructured":"Radford A. Wu J. Child R. Luan D. Amodei D. and Sutskever I. (2019). Language models are unsupervised multitask learners. OpenAI blog 1(8) 9."},{"key":"e_1_3_3_1_23_2","unstructured":"Kalyanpur A. Patra B. G. and Hsiao H. (2020). A review of the state-of-the-art in text-to-SQL. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2008.07935."},{"key":"e_1_3_3_1_24_2","unstructured":"Guo D. Sun Y. Wang Z. Wang S. and Wu F. (2019). A review of text-to-SQL. Engineering 5(4) 687-695."},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"crossref","unstructured":"Yu T. Zhang R. Yang K. Yasunaga M. Wang D. Li Z. ... and Radev D. (2018). Spider: A large-scale human-labeled dataset for complex and cross-domain semantic parsing and text-to-SQL task. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1809.08887.","DOI":"10.18653\/v1\/D18-1425"},{"key":"e_1_3_3_1_26_2","unstructured":"Zhong V. Xiong C. and Socher R. (2017). Seq2sql: Generating structured queries from natural language using reinforcement learning. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1709.00103."},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"crossref","unstructured":"Cattell R. (2011). Scalable SQL and NoSQL data stores. Acm Sigmod Record 39(4) 12-27.","DOI":"10.1145\/1978915.1978919"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"crossref","unstructured":"Han J. Haihong E. Le G. and Du J. (2011 September). Survey on NoSQL database. In 2011 6th international conference on pervasive computing and applications (pp. 363-366). IEEE.","DOI":"10.1109\/ICPCA.2011.6106531"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"crossref","unstructured":"Leavitt N. (2010). Will NoSQL databases live up to their promise?. Computer 43(2) 12-14.","DOI":"10.1109\/MC.2010.58"},{"key":"e_1_3_3_1_30_2","unstructured":"Davies J. Harris S. and Ciyawar A. (2011). Why \u2019NoSQL\u2019 in the enterprise?. Cutter IT Journal 24(5) 20-26."},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"crossref","unstructured":"Shneiderman B. (1997). Direct manipulation for comprehensible predictable and controllable user interfaces. In Proceedings of the 2nd international conference on Intelligent user interfaces (pp. 33-39).","DOI":"10.1145\/238218.238281"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"crossref","unstructured":"Brooks F. P. (1996). The computer scientist as toolsmith II. Communications of the ACM 39(3) 61-68.","DOI":"10.1145\/227234.227243"},{"key":"e_1_3_3_1_33_2","unstructured":"Card S. K. Moran T. P. and Newell A. (1983). The psychology of human-computer interaction. crc press."},{"key":"e_1_3_3_1_34_2","unstructured":"Norman D. A. (1988). The psychology of everyday things. Basic books."},{"key":"e_1_3_3_1_35_2","unstructured":"Tufte E. R. (2001). The visual display of quantitative information. Graphics press."},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"crossref","unstructured":"Heer J. Bostock M. and Ogievetsky V. (2010). A tour through the visualization zoo. Communications of the ACM 53(6) 59-67.","DOI":"10.1145\/1743546.1743567"},{"key":"e_1_3_3_1_37_2","unstructured":"Bertin J. (2010). Semiology of graphics: diagrams networks maps. esri press."},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"crossref","unstructured":"Mackinlay J. (1986). Automating the design of graphical presentations of relational information. ACM Transactions on Graphics (TOG) 5(2) 110-141.","DOI":"10.1145\/22949.22950"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"crossref","unstructured":"Roth S. F. Kolojejchick J. Mattis J. and Goldstein J. (1994). Interactive graphic design using automatic presentation knowledge. In Proceedings of the SIGCHI conference on Human factors in computing systems (pp. 112-117).","DOI":"10.1145\/191666.191719"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"crossref","unstructured":"Munzner T. (2014). Visualization analysis and design. CRC press.","DOI":"10.1201\/b17511"},{"key":"e_1_3_3_1_41_2","unstructured":"Dosovitskiy A. Beyer L. Kolesnikov A. Weissenborn D. Zhai X. Unterthiner T. ... and Houlsby N. (2020). An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2010.11929."},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"crossref","unstructured":"Caron M. Touvron H. Misra I. J\u00e9gou H. Mairal J. Bojanowski P. and Joulin A. (2021). Emerging properties in self-supervised vision transformers. In Proceedings of the IEEE\/CVF international conference on computer vision (pp. 9650-9660).","DOI":"10.1109\/ICCV48922.2021.00951"},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"crossref","unstructured":"He K. Zhang X. Ren S. and Sun J. (2016). Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 770-778).","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_3_1_44_2","unstructured":"Goodfellow I. Pouget-Abadie J. Mirza M. Xu B. Warde-Farley D. Ozair S. ... and Bengio Y. (2014). Generative adversarial nets. Advances in neural information processing systems 27."},{"key":"e_1_3_3_1_45_2","unstructured":"Krizhevsky A. Sutskever I. and Hinton G. E. (2012). Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems 25."},{"key":"e_1_3_3_1_46_2","doi-asserted-by":"crossref","unstructured":"LeCun Y. Bottou L. Bengio Y. and Haffner P. (1998). Gradient-based learning applied to document recognition. Proceedings of the IEEE 86(11) 2278-2324.","DOI":"10.1109\/5.726791"},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"crossref","unstructured":"Wang C. et al. (2020). RAT-SQL: Relation-aware schema encoding and linking for text-to-SQL parsers. Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics.","DOI":"10.18653\/v1\/2020.acl-main.677"},{"key":"e_1_3_3_1_48_2","unstructured":"Shaw P. et al. (2021). Learning to parse natural language to code. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2104.03223."},{"key":"e_1_3_3_1_49_2","unstructured":"Nijkamp E. et al. (2023). CodeGen: An open large language model for code with multi-turn program synthesis. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2203.13474."},{"key":"e_1_3_3_1_50_2","unstructured":"Scholler M. et al. (2023). Dr. Spider: A diagnostic evaluation of text-to-SQL models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2305.09633."},{"key":"e_1_3_3_1_51_2","doi-asserted-by":"crossref","unstructured":"Nielsen J. (1994). Usability engineering. Morgan Kaufmann.","DOI":"10.1016\/B978-0-08-052029-2.50009-7"},{"key":"e_1_3_3_1_52_2","unstructured":"Few S. (2012). Show me the numbers: Designing tables and graphs to enlighten. Analytics Press."},{"key":"e_1_3_3_1_53_2","unstructured":"Su Y. et al. (2023). On the security risks of AI-generated code. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security."},{"key":"e_1_3_3_1_54_2","doi-asserted-by":"crossref","unstructured":"Warren S. D. and Brandeis L. D. (1890). The right to privacy. Harvard Law Review 4(5) 193-220.","DOI":"10.2307\/1321160"},{"key":"e_1_3_3_1_55_2","doi-asserted-by":"crossref","unstructured":"Weizenbaum J. (1966). ELIZA\u2014a computer program for the study of natural language communication between man and machine. Communications of the ACM 9(1) 36-45.","DOI":"10.1145\/365153.365168"},{"key":"e_1_3_3_1_56_2","doi-asserted-by":"crossref","unstructured":"Codd E. F. (1970). A relational model of data for large shared data banks. Communications of the ACM 13(6) 377-387.","DOI":"10.1145\/362384.362685"},{"key":"e_1_3_3_1_57_2","unstructured":"Stonebraker M. (2012). What goes around comes around. In Making Databases Work: The Pragmatic Wisdom of Michael Stonebraker (pp. 531-561)."},{"key":"e_1_3_3_1_58_2","unstructured":"Abadi D. J. (2009). Data management in the cloud: Limitations and opportunities. IEEE Data Eng. Bull. 32(1) 3-12."},{"key":"e_1_3_3_1_59_2","unstructured":"Agrawal R. et al. (2011). Database meets deep learning: Challenges and opportunities. SIGMOD Record 39(4) 42-47."},{"key":"e_1_3_3_1_60_2","unstructured":"Doshi-Velez F. and Kim B. (2017). Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1702.08608."},{"key":"e_1_3_3_1_61_2","doi-asserted-by":"crossref","unstructured":"Miller T. (2019). Explanation in artificial intelligence: Insights from the social sciences. Artificial Intelligence 267 1-38.","DOI":"10.1016\/j.artint.2018.07.007"},{"key":"e_1_3_3_1_62_2","doi-asserted-by":"crossref","unstructured":"Gunning D. et al. (2019). XAI\u2014Explainable artificial intelligence. Science Robotics 4(37).","DOI":"10.1126\/scirobotics.aay7120"},{"key":"e_1_3_3_1_63_2","unstructured":"Brooke J. (1996). SUS-A quick and dirty usability scale. In Usability evaluation in industry (pp. 189-194). Taylor and Francis."},{"key":"e_1_3_3_1_64_2","doi-asserted-by":"crossref","unstructured":"Lewis J. R. (1995). IBM computer usability satisfaction questionnaires: psychometric evaluation and instructions for use. International Journal of Human-Computer Interaction 7(1) 57-78.","DOI":"10.1080\/10447319509526110"},{"key":"e_1_3_3_1_65_2","unstructured":"Pasupat P. and Liang P. (2015). Compositional semantic parsing on semi-structured tables. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1508.00305."},{"key":"e_1_3_3_1_66_2","unstructured":"Herzig J. and Berant J. (2018). Decoupling structure and meaning for text-to-SQL. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1809.05973."},{"key":"e_1_3_3_1_67_2","unstructured":"Lain M. et al. (2023). From Text to MQL: A Case Study on Fine-tuning Language Models for NoSQL Query Generation. In Proceedings of the 3rd Workshop on Natural Language Processing for Databases (NLP4DB)."},{"key":"e_1_3_3_1_68_2","doi-asserted-by":"crossref","unstructured":"Sarawagi S. (2008). Information extraction. Foundations and Trends in Databases 1(3) 261-377.","DOI":"10.1561\/1900000003"},{"key":"e_1_3_3_1_69_2","unstructured":"Grishman R. (2019). Information extraction: A multidisciplinary approach. Morgan and Claypool Publishers."},{"key":"e_1_3_3_1_70_2","unstructured":"Raffel C. et al. (2020). Exploring the limits of transfer learning with a unified text-to-text transformer. Journal of Machine Learning Research 21(140) 1-67."},{"key":"e_1_3_3_1_71_2","unstructured":"Lewis M. et al. (2019). Bart: Denoising sequence-to-sequence pre-training for natural language generation translation and comprehension. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1910.13461."},{"key":"e_1_3_3_1_72_2","unstructured":"Zhang T. et al. (2020). Grailqa: A large-scale dataset for reasoning over knowledge graphs. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2009.08331."},{"key":"e_1_3_3_1_73_2","unstructured":"Chen D. et al. (2021). Evaluating large language models trained on code. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2107.03374."},{"key":"e_1_3_3_1_74_2","unstructured":"Austin J. et al. (2021). Program synthesis with large language models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2108.07732."},{"key":"e_1_3_3_1_75_2","doi-asserted-by":"crossref","unstructured":"Li Y. et al. (2022). Competition-level code generation with alphacode. Science 378(6624) 1092-1097.","DOI":"10.1126\/science.abq1158"},{"key":"e_1_3_3_1_76_2","unstructured":"Fried D. et al. (2022). InCoder: A Generative Model for Code Infilling and Synthesis. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2204.05999."},{"key":"e_1_3_3_1_77_2","doi-asserted-by":"crossref","unstructured":"Brewer E. A. (2012). CAP twelve years later: How the \"rules\" have changed. Computer 45(2) 23-29.","DOI":"10.1109\/MC.2012.37"},{"key":"e_1_3_3_1_78_2","doi-asserted-by":"crossref","unstructured":"Gilbert S. and Lynch N. (2002). Brewer\u2019s conjecture and the feasibility of consistent available partition-tolerant web services. ACM SIGACT News 33(2) 51-59.","DOI":"10.1145\/564585.564601"},{"key":"e_1_3_3_1_79_2","doi-asserted-by":"crossref","unstructured":"Bailis P. and Ghodsi A. (2013). Eventual consistency today: Limitations extensions and beyond. Queue 11(3) 20-29.","DOI":"10.1145\/2460276.2462076"},{"key":"e_1_3_3_1_80_2","doi-asserted-by":"crossref","unstructured":"Vogels W. (2009). Eventually consistent. Communications of the ACM 52(1) 40-44.","DOI":"10.1145\/1435417.1435432"},{"key":"e_1_3_3_1_81_2","unstructured":"Kleppmann M. (2017). Designing data-intensive applications: The big ideas behind reliable scalable and maintainable systems. O\u2019Reilly Media."},{"key":"e_1_3_3_1_82_2","unstructured":"Hewitt E. (2010). Cassandra: the definitive guide. O\u2019Reilly Media."},{"key":"e_1_3_3_1_83_2","unstructured":"Robinson I. Webber J. and Eifrem E. (2013). Graph databases. O\u2019Reilly Media."},{"key":"e_1_3_3_1_84_2","unstructured":"Turkle S. (2011). Alone together: Why we expect more from technology and less from each other. Basic books."},{"key":"e_1_3_3_1_85_2","unstructured":"Piorkowski D. et al. (2012). Foraging among an order of files: A model of information seeking in the wild. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 1655-1664)."},{"key":"e_1_3_3_1_86_2","unstructured":"Rosenfeld L. and Morville P. (2015). Information architecture: for the world wide web. O\u2019Reilly Media."},{"key":"e_1_3_3_1_87_2","unstructured":"Krug S. (2014). Don\u2019t make me think revisited: A common sense approach to Web usability. New Riders."},{"key":"e_1_3_3_1_88_2","unstructured":"Crampton B. et al. (2021). No more sour grapes: a randomized trial of a conversational agent for cognitive-behavioral therapy. Journal of medical Internet research 23(1) e22122."},{"key":"e_1_3_3_1_89_2","unstructured":"Weisz J. D. et al. (2019). A multidimensional analysis of user-perceived trust in conversational agents. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (pp. 1-12)."},{"key":"e_1_3_3_1_90_2","doi-asserted-by":"crossref","unstructured":"Kocielnik R. et al. (2019). Will you accept an imperfect AI?: exploring designs for adjusting end-user expectations of AI systems. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (pp. 1-14).","DOI":"10.1145\/3290605.3300641"},{"key":"e_1_3_3_1_91_2","doi-asserted-by":"crossref","unstructured":"Bender E. M. et al. (2021). On the Dangers of Stochastic Parrots: Can Language Models Be Too Big?. In Proceedings of the 2021 ACM Conference on Fairness Accountability and Transparency (pp. 610-623).","DOI":"10.1145\/3442188.3445922"},{"key":"e_1_3_3_1_92_2","unstructured":"Bommasani R. et al. (2021). On the opportunities and risks of foundation models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2108.07258."},{"key":"e_1_3_3_1_93_2","unstructured":"Weidinger L. et al. (2021). Ethical and social risks of harm from language models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2112.04359."},{"key":"e_1_3_3_1_94_2","unstructured":"Kenton Z. et al. (2021). Alignment of language agents. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2103.14659."},{"key":"e_1_3_3_1_95_2","unstructured":"Hendrycks D. and Gimpel K. (2021). Aligning AI with shared human values. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2008.02275."},{"key":"e_1_3_3_1_96_2","unstructured":"Askell A. et al. (2021). A general language assistant as a laboratory for alignment. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2112.00861."},{"key":"e_1_3_3_1_97_2","unstructured":"Perez E. et al. (2022). Red Teaming Language Models to Reduce Harms: Methods Scaling Behaviors and Lessons Learned. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2209.07858."},{"key":"e_1_3_3_1_98_2","unstructured":"Ganguli D. et al. (2022). Red Teaming Language Models with Language Models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2202.03286."},{"key":"e_1_3_3_1_99_2","unstructured":"Schulman J. et al. (2017). Proximal policy optimization algorithms. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1707.06347."},{"key":"e_1_3_3_1_100_2","doi-asserted-by":"crossref","unstructured":"Ouyang L. et al. (2022). Training language models to follow instructions with human feedback. Advances in Neural Information Processing Systems 35 27730-27744.","DOI":"10.52202\/068431-2011"},{"key":"e_1_3_3_1_101_2","unstructured":"Christiano P. F. et al. (2017). Deep reinforcement learning from human preferences. Advances in neural information processing systems 30."},{"key":"e_1_3_3_1_102_2","unstructured":"Ziegler D. M. et al. (2019). Fine-tuning language models from human preferences. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1909.08593."},{"key":"e_1_3_3_1_103_2","unstructured":"Stiennon N. et al. (2020). Learning to summarize from human feedback. Advances in Neural Information Processing Systems 33 3008-3021."},{"key":"e_1_3_3_1_104_2","unstructured":"Wallace E. et al. (2019). Universal adversarial triggers for attacking and analyzing NLP. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1908.07125."},{"key":"e_1_3_3_1_105_2","unstructured":"Jia R. and Liang P. (2017). Adversarial examples for evaluating reading comprehension systems. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1707.07328."},{"key":"e_1_3_3_1_106_2","unstructured":"Carlini N. et al. (2021). Extracting training data from large language models. In 30th USENIX Security Symposium (USENIX Security 21) (pp. 2197-2214)."},{"key":"e_1_3_3_1_107_2","unstructured":"Nasr M. et al. (2023). A comprehensive study of model inversion attacks on large language models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2305.06159."},{"key":"e_1_3_3_1_108_2","unstructured":"Li X. et al. (2021). How to backdoor federated learning. In Proceedings of the AAAI Conference on Artificial Intelligence 35(9) 8196-8204."},{"key":"e_1_3_3_1_109_2","unstructured":"Bagdasaryan E. et al. (2020). How to poison the well: Backdooring and compromising federated learning. In International Conference on Artificial Intelligence and Statistics (pp. 1513-1523). PMLR."},{"key":"e_1_3_3_1_110_2","doi-asserted-by":"crossref","unstructured":"Dwork C. and Roth A. (2014). The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science 9(3\u20134) 211-407.","DOI":"10.1561\/0400000042"},{"key":"e_1_3_3_1_111_2","doi-asserted-by":"crossref","unstructured":"Abadi M. et al. (2016). Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security (pp. 308-318).","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_3_1_112_2","doi-asserted-by":"crossref","unstructured":"Papernot N. et al. (2016). The limitations of deep learning in adversarial settings. In 2016 IEEE European symposium on security and privacy (EuroS&P) (pp. 372-387). IEEE.","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_3_3_1_113_2","unstructured":"Madry A. et al. (2017). Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1706.06083."},{"key":"e_1_3_3_1_114_2","doi-asserted-by":"crossref","unstructured":"Shokri R. et al. (2017). Membership inference attacks against machine learning models. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 3-18). IEEE.","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_3_1_115_2","unstructured":"Hardt M. et al. (2016). Equality of opportunity in supervised learning. Advances in neural information processing systems 29."},{"key":"e_1_3_3_1_116_2","unstructured":"Buolamwini J. and Gebru T. (2018). Gender shades: Intersectional accuracy disparities in commercial gender classification. In Conference on fairness accountability and transparency (pp. 77-91). PMLR."},{"key":"e_1_3_3_1_117_2","unstructured":"Bolukbasi T. et al. (2016). Man is to computer programmer as woman is to homemaker? debiasing word embeddings. Advances in neural information processing systems 29."},{"key":"e_1_3_3_1_118_2","doi-asserted-by":"crossref","unstructured":"Zhao J. et al. (2017). Men also like shopping: Reducing gender bias amplification using corpus-level constraints. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1707.09457.","DOI":"10.18653\/v1\/D17-1323"},{"key":"e_1_3_3_1_119_2","doi-asserted-by":"crossref","unstructured":"Ribeiro M. T. et al. (2016). \" Why should i trust you?\" Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 1135-1144).","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_3_1_120_2","unstructured":"Lundberg S. M. and Lee S. I. (2017). A unified approach to interpreting model predictions. Advances in neural information processing systems 30."},{"key":"e_1_3_3_1_121_2","doi-asserted-by":"crossref","unstructured":"Selvaraju R. R. et al. (2017). Grad-cam: Visual explanations from deep networks via gradient-based localization. In Proceedings of the IEEE international conference on computer vision (pp. 618-626).","DOI":"10.1109\/ICCV.2017.74"},{"key":"e_1_3_3_1_122_2","unstructured":"Floridi L. and Taddeo M. (2018). The ethics of artificial intelligence. Oxford University Press."},{"key":"e_1_3_3_1_123_2","unstructured":"O\u2019Neil C. (2016). Weapons of math destruction: How big data increases inequality and threatens democracy. Crown."},{"key":"e_1_3_3_1_124_2","unstructured":"Bostrom N. (2014). Superintelligence: Paths dangers strategies. Oxford University Press."},{"key":"e_1_3_3_1_125_2","unstructured":"Russell S. J. (2019). Human compatible: Artificial intelligence and the problem of control. Viking."},{"key":"e_1_3_3_1_126_2","unstructured":"Tegmark M. (2017). Life 3.0: Being human in the age of artificial intelligence. Knopf."},{"key":"e_1_3_3_1_127_2","unstructured":"Harari Y. N. (2018). 21 lessons for the 21st century. Spiegel & Grau."},{"key":"e_1_3_3_1_128_2","unstructured":"Zuboff S. (2019). The age of surveillance capitalism: The fight for a human future at the new frontier of power. PublicAffairs."},{"key":"e_1_3_3_1_129_2","doi-asserted-by":"crossref","unstructured":"Punjabi M. Gupta R. and Patle A. (2025). Integrated machine learning architectures for a knowledge graph embeddings (KGEs) approach. In Knowledge Graph-Based Methods for Automated Driving Elsevier pp. 139\u2013158. ISBN 9780443300400.","DOI":"10.1016\/B978-0-443-30040-0.00008-4"},{"key":"e_1_3_3_1_130_2","doi-asserted-by":"crossref","unstructured":"Helland P. (2011). If you have too much data then \u2019good enough\u2019 is good enough. Communications of the ACM 54(6) 40-47.","DOI":"10.1145\/1953122.1953140"},{"key":"e_1_3_3_1_131_2","doi-asserted-by":"crossref","unstructured":"Cahill M. J. et al. (2010). Serializable isolation for snapshot databases. In Proceedings of the 2010 ACM SIGMOD International Conference on Management of data (pp. 729-738).","DOI":"10.1145\/1376616.1376690"},{"key":"e_1_3_3_1_132_2","doi-asserted-by":"crossref","unstructured":"DeWitt D. and Gray J. (2013). Parallel database systems: the future of high performance database systems. Communications of the ACM 36(6) 85-98.","DOI":"10.1145\/129888.129894"},{"key":"e_1_3_3_1_133_2","unstructured":"Chodorow K. (2013). MongoDB: The definitive guide. O\u2019Reilly Media."},{"key":"e_1_3_3_1_134_2","unstructured":"Redmond E. (2012). Seven databases in seven weeks: a guide to modern databases and the nosql movement. Pragmatic Bookshelf."},{"key":"e_1_3_3_1_135_2","unstructured":"Pardes A. (2024). The Future of User Experience: Designing for Conversational AI. O\u2019Reilly Media."},{"key":"e_1_3_3_1_136_2","unstructured":"McNeil D. (2020). Voice and Tone Strategy: Connecting with People through Content. Rosenfeld Media."},{"key":"e_1_3_3_1_137_2","unstructured":"Cooper A. et al. (2014). About Face: The Essentials of Interaction Design. Wiley."},{"key":"e_1_3_3_1_138_2","unstructured":"Carroll J. M. (2003). HCI Models Theories and Frameworks: Toward a Multidisciplinary Science. Morgan Kaufmann."},{"key":"e_1_3_3_1_139_2","unstructured":"Razzak M. I. et al. (2018). A survey on conversational agents: Recent advances challenges and open research areas. IEEE Access 6 32185-32204."},{"key":"e_1_3_3_1_140_2","unstructured":"A.\u00a0Patle and G.\u00a0L.\u00a0Prajapati. 2022. An Effectual Hybrid Feature Selection Method Towards the Classification Performance with Support Vector Machine. NEUROQUANTOLOGY 20 11 (Sep. 2022) 2602\u20132612."}],"event":{"name":"CODS 2025: 13th ACM IKDD International Conference on Data Science","location":"Pune India","acronym":"CODS 2025"},"container-title":["Proceedings of the 13th ACM IKDD International Conference on Data Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3799830.3799881","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T07:19:52Z","timestamp":1777015192000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3799830.3799881"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,17]]},"references-count":139,"alternative-id":["10.1145\/3799830.3799881","10.1145\/3799830"],"URL":"https:\/\/doi.org\/10.1145\/3799830.3799881","relation":{},"subject":[],"published":{"date-parts":[[2025,12,17]]},"assertion":[{"value":"2026-04-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}