{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:31:49Z","timestamp":1773246709969,"version":"3.50.1"},"reference-count":55,"publisher":"Association for Computing Machinery (ACM)","issue":"6","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Des. Autom. Electron. Syst."],"published-print":{"date-parts":[[2025,11,30]]},"abstract":"<jats:p>The growing complexity of modern computing frameworks has led to an increase in cybersecurity vulnerabilities reported to the National Vulnerability Database (NVD). Extracting meaningful trends from this vast amount of unstructured data is challenging without proper tools and methodologies. Existing approaches lack a holistic strategy for vulnerability mitigation and prediction and effective knowledge extraction from the Common Weakness Enumeration (CWE), Common Vulnerability Exposure (CVE), and Common Attack Pattern Enumeration and Classification (CAPEC) databases. We introduce the AI-enabled Hardware Weakness and Risk Exploration and Storytelling Framework with LLM-assisted Mitigation Suggestion (HWREx), designed to address hardware vulnerabilities and IoT security. Our architecture features an Ontology-driven Storytelling capability that automates ontology updates to track vulnerability patterns and evolution over time, while offering mitigation strategies. It also clarifies the complex interrelations among CVEs, CWEs, and CAPECs through interactive visual knowledge graphs. Our framework achieved accuracy rates of 62% for CWE-CWE, 83% for CWE-CVE, and 77% for CWE-CAPEC linkage predictions. These graphs are instrumental for in-depth hardware weakness analysis and enable HWREx to deliver comprehensive assessments and actionable mitigation strategies. Additionally, HWREx utilizes Generative Pre-trained Transformers (GPT) to offer tailored mitigation suggestions.<\/jats:p>","DOI":"10.1145\/3737459","type":"journal-article","created":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T07:32:17Z","timestamp":1748676737000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["HWREx: AI-enabled Hardware Weakness and Risk Exploration and Storytelling Framework with LLM-assisted Mitigation Suggestion"],"prefix":"10.1145","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-1331-0706","authenticated-orcid":false,"given":"Sujan","family":"Ghimire","sequence":"first","affiliation":[{"name":"The University of Arizona","place":["Tucson, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7975-3694","authenticated-orcid":false,"given":"Yu-Zheng","family":"Lin","sequence":"additional","affiliation":[{"name":"The University of Arizona","place":["Tucson, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9802-2627","authenticated-orcid":false,"given":"Muntasir","family":"Mamun","sequence":"additional","affiliation":[{"name":"The University of Arizona","place":["Tucson, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2160-5689","authenticated-orcid":false,"given":"Muhtasim Alam","family":"Chowdhury","sequence":"additional","affiliation":[{"name":"The University of Arizona","place":["Tucson, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2501-9886","authenticated-orcid":false,"given":"Farhad","family":"Alemi","sequence":"additional","affiliation":[{"name":"University of California Davis","place":["Davis, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2701-2695","authenticated-orcid":false,"given":"Shuyu","family":"Cai","sequence":"additional","affiliation":[{"name":"University of California Davis","place":["Davis, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3513-0863","authenticated-orcid":false,"given":"Jinduo","family":"Guo","sequence":"additional","affiliation":[{"name":"University of California Davis","place":["Davis, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3416-6937","authenticated-orcid":false,"given":"Mingyu","family":"Zhu","sequence":"additional","affiliation":[{"name":"University of California Davis","place":["Davis, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8473-9917","authenticated-orcid":false,"given":"Honghui","family":"Li","sequence":"additional","affiliation":[{"name":"University of California Davis","place":["Davis, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3735-9191","authenticated-orcid":false,"given":"Banafsheh","family":"Saber Latibari","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, The University of Arizona","place":["Tucson, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2035-8512","authenticated-orcid":false,"given":"Setareh","family":"Rafatirad","sequence":"additional","affiliation":[{"name":"University of California Davis","place":["Davis, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3139-8333","authenticated-orcid":false,"given":"Pratik","family":"Satam","sequence":"additional","affiliation":[{"name":"The University of Arizona","place":["Tucson, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5998-8795","authenticated-orcid":false,"given":"Soheil","family":"Salehi","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, The University of Arizona","place":["Tucson, United States"]}]}],"member":"320","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"e_1_3_3_2_2","unstructured":"[n. d.]. CAPEC - About CAPEC \u2014 capec.mitre.org. Retrieved July 31 2024 from https:\/\/capec.mitre.org\/about\/index.html"},{"key":"e_1_3_3_3_2","unstructured":"2021. Software Assurance Reference Dataset (SARD) Manual \u2014 nist.gov. Retrieved December 4 2023 from https:\/\/www.nist.gov\/itl\/ssd\/software-quality-group\/software-assurance-reference-dataset-sard-manual"},{"key":"e_1_3_3_4_2","unstructured":"2023. GPT-4 \u2014 openai.com. Retrieved December 6 2023 from https:\/\/openai.com\/gpt-4"},{"key":"e_1_3_3_5_2","unstructured":"2023. Introducing LLaMA: A Foundational 65-billion-parameter Language Model \u2014 ai.meta.com. Retrieved December 6 2023 from https:\/\/ai.meta.com\/blog\/large-language-model-llama-meta-ai\/"},{"key":"e_1_3_3_6_2","unstructured":"2023. Introducing PaLM 2 \u2014 blog.google. Retrieved December 6 2023 from https:\/\/blog.google\/technology\/ai\/google-palm-2-ai-large-language-model\/"},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-023-04124-5"},{"key":"e_1_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3125270"},{"key":"e_1_3_3_9_2","volume-title":"Natural Language Processing with Python: Analyzing Text with the Natural Language Toolkit","author":"Bird Steven","year":"2009","unstructured":"Steven Bird, Ewan Klein, and Edward Loper. 2009. Natural Language Processing with Python: Analyzing Text with the Natural Language Toolkit. \u201cO\u2019Reilly Media, Inc.\u201d."},{"key":"e_1_3_3_10_2","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/978-3-030-48256-5_9","volume-title":"Theory and Applications of Dependable Computer Systems: Proceedings of the 15th International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, June 29\u2013July 3, 2020, Brun\u00f3w, Poland 15","author":"Blinowski Grzegorz J.","year":"2020","unstructured":"Grzegorz J. Blinowski and Pawe\u0142 Piotrowski. 2020. CVE based classification of vulnerable IoT systems. In Theory and Applications of Dependable Computer Systems: Proceedings of the 15th International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, June 29\u2013July 3, 2020, Brun\u00f3w, Poland 15. Springer, 82\u201393."},{"key":"e_1_3_3_11_2","unstructured":"The MITRE Corporation. 2023. MITRE: Common Weakness Exposure (CWE) Database. Retrieved December 6 2023 from https:\/\/cwe.mitre.org\/index.html"},{"key":"e_1_3_3_12_2","doi-asserted-by":"publisher","unstructured":"Dat Duong and Benjamin D. Solomon. 2023. Analysis of large-language model versus human performance for genetics questions. European Journal of Human Genetics 32 4 (2024) 466\u2013468. 10.1038\/s41431-023-01396-8","DOI":"10.1038\/s41431-023-01396-8"},{"key":"e_1_3_3_13_2","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/978-3-319-40667-1_14","volume-title":"Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebasti\u00e1n, Spain, July 7\u20138, 2016, Proceedings 13","author":"Gruss Daniel","year":"2016","unstructured":"Daniel Gruss, Cl\u00e9mentine Maurice, Klaus Wagner, and Stefan Mangard. 2016. Flush+ flush: A fast and stealthy cache attack. In Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebasti\u00e1n, Spain, July 7\u20138, 2016, Proceedings 13. Springer, 279\u2013299."},{"key":"e_1_3_3_14_2","first-page":"1020","volume-title":"Proceedings of the 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC\u201921)","author":"Guo Hao","year":"2021","unstructured":"Hao Guo, Zhenchang Xing, Sen Chen, Xiaohong Li, Yude Bai, and Hu Zhang. 2021. Key aspects augmentation of vulnerability description based on multiple security databases. In Proceedings of the 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC\u201921). IEEE, 1020\u20131025."},{"key":"e_1_3_3_15_2","first-page":"456","volume-title":"Proceedings of the 25th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER\u201918)","author":"Han Zhuobing","year":"2018","unstructured":"Zhuobing Han, Xiaohong Li, Hongtao Liu, Zhenchang Xing, and Zhiyong Feng. 2018. DeepWeak: Reasoning common software weaknesses via knowledge graph embedding. In Proceedings of the 25th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER\u201918). IEEE, 456\u2013466."},{"key":"e_1_3_3_16_2","first-page":"1","volume-title":"Proceedings of the 2023 24th International Symposium on Quality Electronic Design (ISQED\u201923)","author":"Hassan Rakibul","year":"2023","unstructured":"Rakibul Hassan, Charan Bandi, Meng-Tien Tsai, Shahriar Golchin, Sai Manoj PD, Setareh Rafatirad, and Soheil Salehi. 2023. Automated supervised topic modeling framework for hardware weaknesses. In Proceedings of the 2023 24th International Symposium on Quality Electronic Design (ISQED\u201923). IEEE, 1\u20138."},{"key":"e_1_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2023.3234440"},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3124546"},{"issue":"1","key":"e_1_3_3_19_2","first-page":"411","article-title":"spaCy 2: Natural language understanding with Bloom embeddings, convolutional neural networks and incremental parsing","volume":"7","author":"Honnibal Matthew","year":"2017","unstructured":"Matthew Honnibal and Ines Montani. 2017. spaCy 2: Natural language understanding with Bloom embeddings, convolutional neural networks and incremental parsing. To Appear 7, 1 (2017), 411\u2013420.","journal-title":"To Appear"},{"key":"e_1_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocad259"},{"key":"e_1_3_3_21_2","unstructured":"Will Huang. 2023. Using ChatGPT to Learn Git. Retrieved December 6 2023 from https:\/\/blog.miniasp.com\/post\/2023\/10\/26\/Learn-Git-by-ChatGPT"},{"key":"e_1_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1039\/D3DD00113J"},{"issue":"13","key":"e_1_3_3_23_2","doi-asserted-by":"crossref","first-page":"4359","DOI":"10.3390\/s21134359","article-title":"Automatic actionable information processing and trust management towards safer internet of things","volume":"21","author":"Janiszewski Marek","year":"2021","unstructured":"Marek Janiszewski, Anna Felkner, Piotr Lewandowski, Marcin Rytel, and Hubert Romanowski. 2021. Automatic actionable information processing and trust management towards safer internet of things. Sensors 21, 13 (2021), 4359.","journal-title":"Sensors"},{"key":"e_1_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665726"},{"issue":"7","key":"e_1_3_3_25_2","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/3399742","article-title":"Spectre attacks: Exploiting speculative execution","volume":"63","author":"Kocher Paul","year":"2020","unstructured":"Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2020. Spectre attacks: Exploiting speculative execution. Communications ACM 63, 7 (2020), 93\u2013101.","journal-title":"Communications ACM"},{"key":"e_1_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586242"},{"key":"e_1_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530414"},{"key":"e_1_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3465744"},{"key":"e_1_3_3_29_2","unstructured":"McAfee Labs. 2020. McAfee Labs 2020 Threats Predictions Report. Retrieved from https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2020-threats-predictions-report\/"},{"key":"e_1_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111679"},{"key":"e_1_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930578"},{"key":"e_1_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i4.25651"},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_3_34_2","unstructured":"MITRE. 2021. 2021 CWE Most Important Hardware Weaknesses. Retrieved March 21 2024 from https:\/\/cwe.mitre.org\/scoring\/lists\/2021_CWE_MIHW.html"},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.02.048"},{"key":"e_1_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.53"},{"key":"e_1_3_3_37_2","unstructured":"National Institute of Standards and Technology. 2023. NIST: National Vulnerability Database (NVD). Retrieved December 6 2023 from https:\/\/nvd.nist.gov\/"},{"key":"e_1_3_3_38_2","first-page":"133","volume-title":"Proceedings of the International Conference on Data Management, Analytics & Innovation","author":"Pan Zhengtong","year":"2022","unstructured":"Zhengtong Pan, Patrick Soong, and Setareh Rafatirad. 2022. Ontology-driven scientific literature classification using clustering and self-supervised learning. In Proceedings of the International Conference on Data Management, Analytics & Innovation. Springer, 133\u2013155."},{"key":"e_1_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179324"},{"key":"e_1_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3571726"},{"key":"e_1_3_3_41_2","article-title":"Beautiful soup documentation","author":"Richardson Leonard","year":"2007","unstructured":"Leonard Richardson. 2007. Beautiful soup documentation. April (2007). https:\/\/www.crummy.com\/software\/BeautifulSoup\/bs4\/doc\/","journal-title":"April"},{"key":"e_1_3_3_42_2","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/NEWCAS52662.2022.9842256","volume-title":"Proceedings of the 2022 20th IEEE Interregional NEWCAS Conference (NEWCAS\u201922)","author":"Salehi Soheil","year":"2022","unstructured":"Soheil Salehi, Tyler Sheaves, Kevin Immanuel Gubbi, Sayed Arash Beheshti, Sai Manoj PD, Setareh Rafatirad, Avesta Sasan, Tinoosh Mohsenin, and Houman Homayoun. 2022. Neuromorphic-enabled security for IoT. In Proceedings of the 2022 20th IEEE Interregional NEWCAS Conference (NEWCAS\u201922). IEEE, 153\u2013157."},{"key":"e_1_3_3_43_2","first-page":"406","volume-title":"Proceedings of the 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA\u201919)","author":"Shukla Sanket","year":"2019","unstructured":"Sanket Shukla, Gaurav Kolhe, Sai Manoj PD, and Setareh Rafatirad. 2019. Rnn-based classifier to detect stealthy malware using localized features and complex symbolic sequence. In Proceedings of the 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA\u201919). IEEE, 406\u2013409."},{"key":"e_1_3_3_44_2","first-page":"590","volume-title":"Proceedings of the 2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI\u201919)","author":"Shukla Sanket","year":"2019","unstructured":"Sanket Shukla, Gaurav Kolhe, Sai Manoj PD, and Setareh Rafatirad. 2019. Stealthy malware detection using rnn-based automated localized feature extraction and classifier. In Proceedings of the 2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI\u201919). IEEE, 590\u2013597."},{"key":"e_1_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-023-01860-3"},{"key":"e_1_3_3_46_2","volume-title":"Proceedings of the Network and Distributed Systems Security Symposium (NDSS\u201922)","author":"Tsang Ryan","year":"2022","unstructured":"Ryan Tsang, Doreen Joseph, A. Asmita, S. Salehi, N. Carreon, P. Mohapatra, and H. Homayoun. 2022. Fandemic: Firmware attack construction and deployment on power management integrated circuit and impacts on iot applications. In Proceedings of the Network and Distributed Systems Security Symposium (NDSS\u201922)."},{"key":"e_1_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11845-023-03377-8"},{"key":"e_1_3_3_48_2","unstructured":"Jason Wei Yi Tay Rishi Bommasani Colin Raffel Barret Zoph Sebastian Borgeaud Dani Yogatama Maarten Bosma Denny Zhou Donald Metzler et\u00a0al. 2022. Emergent abilities of large language models. arXiv preprint arXiv:2206.07682 (2022). arXiv:2206.07682 [cs.CL]. https:\/\/arxiv.org\/abs\/2206.07682"},{"key":"e_1_3_3_49_2","doi-asserted-by":"publisher","unstructured":"Jules White Quchen Fu Sam Hays Michael Sandborn Carlos Olea Henry Gilbert Ashraf Elnashar Jesse Spencer-Smith and Douglas Schmidt. 2023. A prompt pattern catalog to enhance prompt engineering with ChatGPT. arXiv preprint arXiv:2302.11382 (02 2023). 10.48550\/arXiv.2302.11382","DOI":"10.48550\/arXiv.2302.11382"},{"key":"e_1_3_3_50_2","first-page":"3011","volume-title":"Proceedings of the 2018 IEEE International Conference on Big Data (Big Data\u201918)","author":"Williams Mark A.","year":"2018","unstructured":"Mark A. Williams, Sumi Dey, Roberto Camacho Barranco, Sheikh Motahar Naim, M. Shahriar Hossain, and Monika Akbar. 2018. Analyzing evolving trends of vulnerabilities in national vulnerability database. In Proceedings of the 2018 IEEE International Conference on Big Data (Big Data\u201918). IEEE, 3011\u20133020."},{"key":"e_1_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0114-2"},{"key":"e_1_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2017.4241357"},{"key":"e_1_3_3_53_2","first-page":"719","volume-title":"Proceedings of the 23rd USENIX Security Symposium (USENIX Security\u201914)","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner. 2014. [FLUSH+ RELOAD]: A high resolution, low noise, l3 cache [Side-Channel] attack. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security\u201914). 719\u2013732."},{"key":"e_1_3_3_54_2","doi-asserted-by":"crossref","unstructured":"Xiaodan Zhang Nabasmita Talukdar Sandeep Vemulapalli Sumyeong Ahn Jiankun Wang Han Meng Sardar Mehtab Bin Murtaza Dmitry Leshchiner Aakash Ajay Dave Dimitri F. Joseph Martin Witteveen-Lane Dave Chesla Jiayu Zhou and Bin Chen2024. Comparison of prompt engineering and fine-tuning strategies in large language models in the classification of clinical notes. AMIA Joint Summits on Translational Science Proceedings 2024 (2024) 478\u2013487. https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC11141826\/","DOI":"10.1101\/2024.02.07.24302444"},{"key":"e_1_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847733"},{"key":"e_1_3_3_56_2","first-page":"1","volume-title":"Proceedings of the IEEE INFOCOM 2021-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS\u201921)","author":"Ziems Noah","year":"2021","unstructured":"Noah Ziems and Shaoen Wu. 2021. Security vulnerability detection using deep learning natural language processing. In Proceedings of the IEEE INFOCOM 2021-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS\u201921). IEEE, 1\u20136."}],"container-title":["ACM Transactions on Design Automation of Electronic Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3737459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:02:35Z","timestamp":1760709755000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3737459"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"references-count":55,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,11,30]]}},"alternative-id":["10.1145\/3737459"],"URL":"https:\/\/doi.org\/10.1145\/3737459","relation":{},"ISSN":["1084-4309","1557-7309"],"issn-type":[{"value":"1084-4309","type":"print"},{"value":"1557-7309","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"2024-08-02","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-05","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}