iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3543507.3583198
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:07:45Z","timestamp":1730326065009,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","funder":[{"name":"Beijing Outstanding Young Scientist Program","award":["BJJWZYJH01201910003011"]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2021ZD0110502"],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100017052","name":"National Natural Science Foundation of China-Liaoning Joint Fund","doi-asserted-by":"publisher","award":["62132011,61825204"],"id":[{"id":"10.13039\/100017052","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ant Group"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,30]]},"DOI":"10.1145\/3543507.3583198","type":"proceedings-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T19:30:51Z","timestamp":1682537451000},"page":"1980-1990","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Provenance of Training without Training Data: Towards Privacy-Preserving DNN Model Ownership Verification"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-3395-2772","authenticated-orcid":false,"given":"Yunpeng","family":"Liu","sequence":"first","affiliation":[{"name":"Tsinghua University, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7911-3731","authenticated-orcid":false,"given":"Kexin","family":"Li","sequence":"additional","affiliation":[{"name":"University of Toronto, Canada"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7532-0434","authenticated-orcid":false,"given":"Zhuotao","family":"Liu","sequence":"additional","affiliation":[{"name":"Tsinghua University, China and Zhongguancun Laboratory, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6874-6453","authenticated-orcid":false,"given":"Bihan","family":"Wen","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2587-8517","authenticated-orcid":false,"given":"Ke","family":"Xu","sequence":"additional","affiliation":[{"name":"Tsinghua University, China and Zhongguancun Laboratory, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6159-619X","authenticated-orcid":false,"given":"Weiqiang","family":"Wang","sequence":"additional","affiliation":[{"name":"Ant Group, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2438-979X","authenticated-orcid":false,"given":"Wenbiao","family":"Zhao","sequence":"additional","affiliation":[{"name":"Ant Group, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8776-8730","authenticated-orcid":false,"given":"Qi","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, China and Zhongguancun Laboratory, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"volume-title":"12th USENIX symposium on operating systems design and implementation (OSDI 16)","year":"2016","author":"Abadi Mart\u00edn","key":"e_1_3_2_1_1_1","unstructured":"Mart\u00edn Abadi , Paul Barham , Jianmin Chen , Zhifeng Chen , Andy Davis , Jeffrey Dean , Matthieu Devin , Sanjay Ghemawat , Geoffrey Irving , Michael Isard , 2016 . Tensorflow: A system for large-scale machine learning . In 12th USENIX symposium on operating systems design and implementation (OSDI 16) . 265\u2013283. Mart\u00edn Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, 2016. Tensorflow: A system for large-scale machine learning. In 12th USENIX symposium on operating systems design and implementation (OSDI 16). 265\u2013283."},{"volume-title":"27th USENIX Security Symposium, USENIX Security","year":"2018","author":"Adi Yossi","key":"e_1_3_2_1_2_1","unstructured":"Yossi Adi , Carsten Baum , Moustapha Ciss\u00e9 , Benny Pinkas , and Joseph Keshet . 2018 . Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring . In 27th USENIX Security Symposium, USENIX Security 2018. 1615\u20131631. Yossi Adi, Carsten Baum, Moustapha Ciss\u00e9, Benny Pinkas, and Joseph Keshet. 2018. Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring. In 27th USENIX Security Symposium, USENIX Security 2018. 1615\u20131631."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102277"},{"key":"e_1_3_2_1_4_1","unstructured":"Yoshua Bengio. 2012. Practical recommendations for gradient-based training of deep architectures. arxiv:1206.5533\u00a0[cs.LG] Yoshua Bengio. 2012. Practical recommendations for gradient-based training of deep architectures. arxiv:1206.5533\u00a0[cs.LG]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3437526"},{"volume-title":"Attend and Spell: A Neural Network for Large Vocabulary Conversational Speech Recognition. In 2016 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016","year":"2016","author":"Chan William","key":"e_1_3_2_1_6_1","unstructured":"William Chan , Navdeep Jaitly , Quoc\u00a0 V. Le , and Oriol Vinyals . 2016 . Listen , Attend and Spell: A Neural Network for Large Vocabulary Conversational Speech Recognition. In 2016 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016 (2016). IEEE, 4960\u20134964. William Chan, Navdeep Jaitly, Quoc\u00a0V. Le, and Oriol Vinyals. 2016. Listen, Attend and Spell: A Neural Network for Large Vocabulary Conversational Speech Recognition. In 2016 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016 (2016). IEEE, 4960\u20134964."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3323873.3325042"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453079"},{"volume-title":"Proceedings of the Eighteenth International Conference on Artificial Intelligence and Statistics, AISTATS 2015","year":"2015","author":"Choromanska Anna","key":"e_1_3_2_1_9_1","unstructured":"Anna Choromanska , Mikael Henaff , Micha\u00ebl Mathieu , G\u00e9rard\u00a0Ben Arous , and Yann LeCun . 2015 . The Loss Surfaces of Multilayer Networks . In Proceedings of the Eighteenth International Conference on Artificial Intelligence and Statistics, AISTATS 2015 (2015), Vol.\u00a038. Anna Choromanska, Mikael Henaff, Micha\u00ebl Mathieu, G\u00e9rard\u00a0Ben Arous, and Yann LeCun. 2015. The Loss Surfaces of Multilayer Networks. In Proceedings of the Eighteenth International Conference on Artificial Intelligence and Statistics, AISTATS 2015 (2015), Vol.\u00a038."},{"volume-title":"The Concise Encyclopedia of Statistics. New York : Springer. 502\u2013503 pages","author":"Dodge Yadolah","key":"e_1_3_2_1_10_1","unstructured":"Yadolah Dodge . 2010. The Concise Encyclopedia of Statistics. New York : Springer. 502\u2013503 pages . Yadolah Dodge. 2010. The Concise Encyclopedia of Statistics. New York : Springer. 502\u2013503 pages."},{"volume-title":"NeurIPS","year":"2019","author":"Fan Lixin","key":"e_1_3_2_1_11_1","unstructured":"Lixin Fan , KamWoh Ng , and Chee\u00a0Seng Chan . 2019. Rethinking Deep Neural Network Ownership Verification: Embedding Passports to Defeat Ambiguity Attacks . In NeurIPS 2019 . 4716\u20134725. Lixin Fan, KamWoh Ng, and Chee\u00a0Seng Chan. 2019. Rethinking Deep Neural Network Ownership Verification: Embedding Passports to Defeat Ambiguity Attacks. In NeurIPS 2019. 4716\u20134725."},{"edition":"3","volume-title":"Digital Image Processing","author":"Gonzalez C.","key":"e_1_3_2_1_12_1","unstructured":"Rafael\u00a0 C. Gonzalez and Richard\u00a0 E. Woods . 2006. Digital Image Processing ( 3 rd Edition). Prentice-Hall, Inc. , USA. 150\u2013160 pages. Rafael\u00a0C. Gonzalez and Richard\u00a0E. Woods. 2006. Digital Image Processing (3rd Edition). Prentice-Hall, Inc., USA. 150\u2013160 pages."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"volume-title":"Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016","year":"2016","author":"He Kaiming","key":"e_1_3_2_1_14_1","unstructured":"Kaiming He , Xiangyu Zhang , Shaoqing Ren , and Jian Sun . 2016 . Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016 (2016). 770\u2013778. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016 (2016). 770\u2013778."},{"volume-title":"Distilling the Knowledge in a Neural Network. CoRR abs\/1503.02531","year":"2015","author":"Hinton E.","key":"e_1_3_2_1_15_1","unstructured":"Geoffrey\u00a0 E. Hinton , Oriol Vinyals , and Jeffrey Dean . 2015. Distilling the Knowledge in a Neural Network. CoRR abs\/1503.02531 ( 2015 ). Geoffrey\u00a0E. Hinton, Oriol Vinyals, and Jeffrey Dean. 2015. Distilling the Knowledge in a Neural Network. CoRR abs\/1503.02531 (2015)."},{"volume-title":"30th USENIX Security Symposium (USENIX Security 21)","year":"2021","author":"Jia Hengrui","key":"e_1_3_2_1_16_1","unstructured":"Hengrui Jia , Christopher\u00a0 A. Choquette-Choo , Varun Chandrasekaran , and Nicolas Papernot . 2021 . Entangled Watermarks as a Defense against Model Extraction . In 30th USENIX Security Symposium (USENIX Security 21) . 1937\u20131954. Hengrui Jia, Christopher\u00a0A. Choquette-Choo, Varun Chandrasekaran, and Nicolas Papernot. 2021. Entangled Watermarks as a Defense against Model Extraction. In 30th USENIX Security Symposium (USENIX Security 21). 1937\u20131954."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00106"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04434-z"},{"volume-title":"Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks. CoRR abs\/2106.10147","year":"2021","author":"Lee Suyoung","key":"e_1_3_2_1_19_1","unstructured":"Suyoung Lee , Wonho Song , Suman Jana , Meeyoung Cha , and Sooel Son . 2021. Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks. CoRR abs\/2106.10147 ( 2021 ). arxiv:2106.10147 Suyoung Lee, Wonho Song, Suman Jana, Meeyoung Cha, and Sooel Son. 2021. Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks. CoRR abs\/2106.10147 (2021). arxiv:2106.10147"},{"volume-title":"TrustCom","author":"Li Meng","key":"e_1_3_2_1_20_1","unstructured":"Meng Li , Qi Zhong , Leo\u00a0Yu Zhang , Yajuan Du , Jun Zhang , and Yong Xiangt . 2020. Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach . In TrustCom . IEEE , 402\u2013409. Meng Li, Qi Zhong, Leo\u00a0Yu Zhang, Yajuan Du, Jun Zhang, and Yong Xiangt. 2020. Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach. In TrustCom. IEEE, 402\u2013409."},{"volume-title":"Model Extraction and Adversarial Attacks on Neural Networks using Switching Power Information. CoRR abs\/2106.08299","year":"2021","author":"Li Tommy","key":"e_1_3_2_1_21_1","unstructured":"Tommy Li and Cory\u00a0 E. Merkel . 2021. Model Extraction and Adversarial Attacks on Neural Networks using Switching Power Information. CoRR abs\/2106.08299 ( 2021 ). arxiv:2106.08299 Tommy Li and Cory\u00a0E. Merkel. 2021. Model Extraction and Adversarial Attacks on Neural Networks using Switching Power Information. CoRR abs\/2106.08299 (2021). arxiv:2106.08299"},{"key":"e_1_3_2_1_22_1","unstructured":"Zheng Li Chengyu Hu Yang Zhang and Shanqing Guo. 2019. How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN. In ACSAC. ACM 126\u2013137. Zheng Li Chengyu Hu Yang Zhang and Shanqing Guo. 2019. How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN. In ACSAC. ACM 126\u2013137."},{"volume-title":"Removing Backdoor-Based Watermarks in Neural Networks with Limited Data. In 2020 25th International Conference on Pattern Recognition (ICPR). 10149\u201310156","year":"2021","author":"Liu Xuankai","key":"e_1_3_2_1_23_1","unstructured":"Xuankai Liu , Fengting Li , Bihan Wen , and Qi Li . 2021 . Removing Backdoor-Based Watermarks in Neural Networks with Limited Data. In 2020 25th International Conference on Pattern Recognition (ICPR). 10149\u201310156 . Xuankai Liu, Fengting Li, Bihan Wen, and Qi Li. 2021. Removing Backdoor-Based Watermarks in Neural Networks with Limited Data. In 2020 25th International Conference on Pattern Recognition (ICPR). 10149\u201310156."},{"volume-title":"2022 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 52\u201369","author":"Lukas N.","key":"e_1_3_2_1_24_1","unstructured":"N. Lukas , E. Jiang , X. Li , and F. Kerschbaum . 2022. SoK: How Robust is Image Classification Deep Neural Network Watermarking? . In 2022 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 52\u201369 . N. Lukas, E. Jiang, X. Li, and F. Kerschbaum. 2022. SoK: How Robust is Image Classification Deep Neural Network Watermarking?. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 52\u201369."},{"volume-title":"9th International Conference on Learning Representations, ICLR","year":"2021","author":"Lukas Nils","key":"e_1_3_2_1_25_1","unstructured":"Nils Lukas , Yuxuan Zhang , and Florian Kerschbaum . 2021 . Deep Neural Network Fingerprinting by Conferrable Adversarial Examples . In 9th International Conference on Learning Representations, ICLR 2021, Virtual Event. OpenReview.net. Nils Lukas, Yuxuan Zhang, and Florian Kerschbaum. 2021. Deep Neural Network Fingerprinting by Conferrable Adversarial Examples. In 9th International Conference on Learning Representations, ICLR 2021, Virtual Event. OpenReview.net."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3118815"},{"volume-title":"Machine learning - a probabilistic perspective","author":"Murphy P.","key":"e_1_3_2_1_27_1","unstructured":"Kevin\u00a0 P. Murphy . 2012. Machine learning - a probabilistic perspective . MIT Press . Kevin\u00a0P. Murphy. 2012. Machine learning - a probabilistic perspective. MIT Press."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329808"},{"volume-title":"Proceedings of the 34th International Conference on Machine Learning (2017-08-06\/2017-08-11)","year":"2017","author":"Nguyen Quynh","key":"e_1_3_2_1_29_1","unstructured":"Quynh Nguyen and Matthias Hein . 2017 . The Loss Surface of Deep and Wide Neural Networks . In Proceedings of the 34th International Conference on Machine Learning (2017-08-06\/2017-08-11) , Vol.\u00a070. PMLR, 2603\u20132612. Quynh Nguyen and Matthias Hein. 2017. The Loss Surface of Deep and Wide Neural Networks. In Proceedings of the 34th International Conference on Machine Learning (2017-08-06\/2017-08-11), Vol.\u00a070. PMLR, 2603\u20132612."},{"volume-title":"Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems 32","year":"2019","author":"Paszke Adam","key":"e_1_3_2_1_30_1","unstructured":"Adam Paszke , Sam Gross , Francisco Massa , Adam Lerer , James Bradbury , Gregory Chanan , Trevor Killeen , Zeming Lin , Natalia Gimelshein , Luca Antiga , 2019 . Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems 32 (2019), 8026\u20138037. Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, 2019. Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems 32 (2019), 8026\u20138037."},{"key":"e_1_3_2_1_31_1","first-page":"485","article-title":"DeepSigns","volume":"2019","author":"Rouhani Bita\u00a0Darvish","year":"2019","unstructured":"Bita\u00a0Darvish Rouhani , Huili Chen , and Farinaz Koushanfar . 2019 . DeepSigns : An End-to-End Watermarking Framework for Ownership Protection of Deep Neural Networks. In ASPLOS 2019. 485 \u2013 497 . Bita\u00a0Darvish Rouhani, Huili Chen, and Farinaz Koushanfar. 2019. DeepSigns: An End-to-End Watermarking Framework for Ownership Protection of Deep Neural Networks. In ASPLOS 2019. 485\u2013497.","journal-title":"In ASPLOS"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587662"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i09.7123"},{"volume-title":"25th USENIX Security Symposium, USENIX Security 16","year":"2016","author":"Tram\u00e8r Florian","key":"e_1_3_2_1_34_1","unstructured":"Florian Tram\u00e8r , Fan Zhang , Ari Juels , Michael\u00a0 K. Reiter , and Thomas Ristenpart . 2016 . Stealing Machine Learning Models via Prediction APIs . In 25th USENIX Security Symposium, USENIX Security 16 . USENIX Association, 601\u2013618. Florian Tram\u00e8r, Fan Zhang, Ari Juels, Michael\u00a0K. Reiter, and Thomas Ristenpart. 2016. Stealing Machine Learning Models via Prediction APIs. In 25th USENIX Security Symposium, USENIX Security 16. USENIX Association, 601\u2013618."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078974"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS51556.2021.9401119"},{"volume-title":"Attacks on Digital Watermarks for Deep Neural Networks","author":"Wang Tianhao","key":"e_1_3_2_1_37_1","unstructured":"Tianhao Wang and Florian Kerschbaum . 2019. Attacks on Digital Watermarks for Deep Neural Networks . In ICASSP. IEEE , 2622\u20132626. Tianhao Wang and Florian Kerschbaum. 2019. Attacks on Digital Watermarks for Deep Neural Networks. In ICASSP. IEEE, 2622\u20132626."},{"volume-title":"Model Watermarking for Image Processing Networks","author":"Zhang Jie","key":"e_1_3_2_1_38_1","unstructured":"Jie Zhang , Dongdong Chen , Jing Liao , Han Fang , Weiming Zhang , Wenbo Zhou , Hao Cui , and Nenghai Yu. 2020. Model Watermarking for Image Processing Networks . In AAAI. AAAI Press , 12805\u201312812. Jie Zhang, Dongdong Chen, Jing Liao, Han Fang, Weiming Zhang, Wenbo Zhou, Hao Cui, and Nenghai Yu. 2020. Model Watermarking for Image Processing Networks. In AAAI. AAAI Press, 12805\u201312812."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196550"},{"volume-title":"CoRR abs\/2108.09454","year":"2021","author":"Zhang Rui","key":"e_1_3_2_1_40_1","unstructured":"Rui Zhang , Jian Liu , Yuan Ding , Qingbiao Wu , and Kui Ren . 2021. \" Adversarial Examples\" for Proof-of- Learning . CoRR abs\/2108.09454 ( 2021 ). Rui Zhang, Jian Liu, Yuan Ding, Qingbiao Wu, and Kui Ren. 2021. \"Adversarial Examples\" for Proof-of-Learning. CoRR abs\/2108.09454 (2021)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316481"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.12.016"},{"volume-title":"Hermes Attack: Steal DNN Models with Lossless Inference Accuracy. In 30th USENIX Security Symposium (USENIX Security 21)","year":"2021","author":"Zhu Yuankun","key":"e_1_3_2_1_43_1","unstructured":"Yuankun Zhu , Yueqiang Cheng , Husheng Zhou , and Yantao Lu . 2021 . Hermes Attack: Steal DNN Models with Lossless Inference Accuracy. In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association , 1973\u20131988. Yuankun Zhu, Yueqiang Cheng, Husheng Zhou, and Yantao Lu. 2021. Hermes Attack: Steal DNN Models with Lossless Inference Accuracy. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 1973\u20131988."}],"event":{"name":"WWW '23: The ACM Web Conference 2023","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Austin TX USA","acronym":"WWW '23"},"container-title":["Proceedings of the ACM Web Conference 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543507.3583198","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,30]],"date-time":"2023-08-30T17:02:35Z","timestamp":1693414955000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583198"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":43,"alternative-id":["10.1145\/3543507.3583198","10.1145\/3543507"],"URL":"http:\/\/dx.doi.org\/10.1145\/3543507.3583198","relation":{},"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"2023-04-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}