{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:22Z","timestamp":1763507722736,"version":"3.44.0"},"publisher-location":"Cham","reference-count":65,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030015534"},{"type":"electronic","value":"9783030015541"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01554-1_4","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T11:47:56Z","timestamp":1537876076000},"page":"59-79","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Training Set Camouflage"],"prefix":"10.1007","author":[{"given":"Ayon","family":"Sen","sequence":"first","affiliation":[]},{"given":"Scott","family":"Alfeld","sequence":"additional","affiliation":[]},{"given":"Xuezhou","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ara","family":"Vartanian","sequence":"additional","affiliation":[]},{"given":"Yuzhe","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Xiaojin","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Alfeld, S., Zhu, X., Barford, P.: Explicit defense actions against test-set attacks. In: AAAI, pp. 1274\u20131280 (2017)","DOI":"10.1609\/aaai.v31i1.10767"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/11776420_19","volume-title":"Learning Theory","author":"FJ Balbach","year":"2006","unstructured":"Balbach, F.J., Zeugmann, T.: Teaching randomized learners. In: Lugosi, G., Simon, H.U. (eds.) COLT 2006. LNCS (LNAI), vol. 4005, pp. 229\u2013243. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11776420_19"},{"issue":"2","key":"4_CR3","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s10994-010-5188-5","volume":"81","author":"M Barreno","year":"2010","unstructured":"Barreno, M., Nelson, B., Joseph, A.D., Tygar, J.: The security of machine learning. Mach. Learn. 81(2), 121\u2013148 (2010)","journal-title":"Mach. Learn."},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security (2006)","DOI":"10.1145\/1128817.1128824"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Biggio, B., Roli, F.: Wild patterns: ten years after the rise of adversarial machine learning. arXiv preprint arXiv:1712.03141 (2017)","DOI":"10.1145\/3243734.3264418"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1007\/978-3-642-32009-5_50","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"Z Brakerski","year":"2012","unstructured":"Brakerski, Z.: Fully homomorphic encryption without modulus switching from classical GapSVP. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 868\u2013886. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_50"},{"issue":"3","key":"4_CR7","first-page":"13","volume":"6","author":"Z Brakerski","year":"2014","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. ACM Trans. Comput. Theory (TOCT) 6(3), 13 (2014)","journal-title":"ACM Trans. Comput. Theory (TOCT)"},{"key":"4_CR8","first-page":"2617","volume":"13","author":"M Br\u00fcckner","year":"2012","unstructured":"Br\u00fcckner, M., Kanzow, C., Scheffer, T.: Static prediction games for adversarial learning problems. J. Mach. Learn. Res. 13, 2617\u20132654 (2012)","journal-title":"J. Mach. Learn. Res."},{"key":"4_CR9","unstructured":"Br\u00fcckner, M., Scheffer, T.: Nash equilibria of static prediction games. In: Advances in Neural Information Processing Systems (2009)"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Br\u00fcckner, M., Scheffer, T.: Stackelberg games for adversarial prediction problems. In: ACM SIGKDD (2011)","DOI":"10.1145\/2020408.2020495"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"2466","DOI":"10.1109\/TNNLS.2016.2593488","volume":"28","author":"SR Bul\u00f2","year":"2016","unstructured":"Bul\u00f2, S.R., Biggio, B., Pillai, I., Pelillo, M., Roli, F.: Randomized prediction games for adversarial machine learning. IEEE Trans. Neural Netw. Learn. Syst. 28, 2466\u20132478 (2016)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"1","key":"4_CR12","first-page":"19","volume":"14","author":"MR Bussieck","year":"2003","unstructured":"Bussieck, M.R., Pruessner, A.: Mixed-integer nonlinear programming. SIAG\/OPT Newsl. Views News 14(1), 19\u201322 (2003)","journal-title":"SIAG\/OPT Newsl. Views News"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/3-540-49380-8_21","volume-title":"Information Hiding","author":"C Cachin","year":"1998","unstructured":"Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306\u2013318. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/3-540-49380-8_21"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Chandramouli, R.: A mathematical approach to steganalysis. In: Proceedings SPIE, vol. 4675, pp. 4\u201325 (2002)","DOI":"10.1117\/12.465273"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/11551492_2","volume-title":"Digital Watermarking","author":"IJ Cox","year":"2005","unstructured":"Cox, I.J., Kalker, T., Pakura, G., Scheel, M.: Information transmission and steganography. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 15\u201329. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11551492_2"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Dalvi, N., Domingos, P., Sanghai, S., Verma, D., et al.: Adversarial classification. In: ACM SIGKDD (2004)","DOI":"10.1145\/1014052.1014066"},{"key":"4_CR17","unstructured":"Dziugaite, G.K., Roy, D.M., Ghahramani, Z.: Training generative neural networks via maximum mean discrepancy optimization. arXiv preprint arXiv:1505.03906 (2015)"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-540-30114-1_6","volume-title":"Information Hiding","author":"J Fridrich","year":"2004","unstructured":"Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67\u201381. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30114-1_6"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-642-40041-4_5","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"C Gentry","year":"2013","unstructured":"Gentry, C., Sahai, A., Waters, B.: Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 75\u201392. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40041-4_5"},{"issue":"Mar","key":"4_CR20","first-page":"723","volume":"13","author":"A Gretton","year":"2012","unstructured":"Gretton, A., Borgwardt, K.M., Rasch, M.J., Sch\u00f6lkopf, B., Smola, A.: A kernel two-sample test. J. Mach. Learn. Res. 13(Mar), 723\u2013773 (2012)","journal-title":"J. Mach. Learn. Res."},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Hardt, M., Megiddo, N., Papadimitriou, C., Wootters, M.: Strategic classification. In: ACM ITCS (2016)","DOI":"10.1145\/2840728.2840730"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: IEEE CVPR, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"issue":"4","key":"4_CR23","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/5254.708428","volume":"13","author":"MA Hearst","year":"1998","unstructured":"Hearst, M.A., Dumais, S.T., Osuna, E., Platt, J., Scholkopf, B.: Support vector machines. IEEE Intell. Syst. Appl. 13(4), 18\u201328 (1998)","journal-title":"IEEE Intell. Syst. Appl."},{"issue":"1","key":"4_CR24","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1080\/00401706.1970.10488634","volume":"12","author":"AE Hoerl","year":"1970","unstructured":"Hoerl, A.E., Kennard, R.W.: Ridge regression: biased estimation for nonorthogonal problems. Technometrics 12(1), 55\u201367 (1970)","journal-title":"Technometrics"},{"key":"4_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/3-540-45708-9_6","volume-title":"Advances in Cryptology \u2014 CRYPTO 2002","author":"NJ Hopper","year":"2002","unstructured":"Hopper, N.J., Langford, J., von Ahn, L.: Provably secure steganography. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 77\u201392. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45708-9_6"},{"key":"4_CR26","doi-asserted-by":"publisher","DOI":"10.1002\/9781118548387","volume-title":"Applied Logistic Regression","author":"DW Hosmer Jr","year":"2013","unstructured":"Hosmer Jr., D.W., Lemeshow, S., Sturdivant, R.X.: Applied Logistic Regression, vol. 398. Wiley, Hoboken (2013)"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Huang, L., Joseph, A.D., Nelson, B., Rubinstein, B.I., Tygar, J.: Adversarial machine learning. In: AISEC (2011)","DOI":"10.1145\/2046684.2046692"},{"key":"4_CR28","unstructured":"Joachims, T.: A probabilistic analysis of the Rocchio algorithm with TFIDF for text categorization. Technical report, Carnegie-Mellon University Pittsburgh PA, Department of Computer Science (1996)"},{"issue":"2","key":"4_CR29","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MC.1998.4655281","volume":"31","author":"NF Johnson","year":"1998","unstructured":"Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. Computer 31(2), 26\u201334 (1998)","journal-title":"Computer"},{"key":"4_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-642-55220-5_17","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2014","author":"A Juels","year":"2014","unstructured":"Juels, A., Ristenpart, T.: Honey encryption: security beyond the brute-force bound. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 293\u2013310. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55220-5_17"},{"key":"4_CR31","volume-title":"Handbook of Applied Cryptography","author":"J Katz","year":"1996","unstructured":"Katz, J., Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"issue":"6","key":"4_CR32","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1109\/LSP.2005.847889","volume":"12","author":"AD Ker","year":"2005","unstructured":"Ker, A.D.: Steganalysis of LSB matching in grayscale images. IEEE Signal Process. Lett. 12(6), 441\u2013444 (2005)","journal-title":"IEEE Signal Process. Lett."},{"key":"4_CR33","unstructured":"Kerckhoffs, A.: La Cryptographie Militaire (Part I), vol. 9, pp. 5\u201338 (1883)"},{"key":"4_CR34","unstructured":"Kerckhoffs, A.: La Cryptographie Militaire (Part II), vol. 9, pp. 161\u2013191 (1883)"},{"key":"4_CR35","unstructured":"Kloft, M., Laskov, P.: A poisoning attack against online anomaly detection. In: NIPS Workshop on Machine Learning in Adversarial Environments for Computer Security. Citeseer (2007)"},{"key":"4_CR36","unstructured":"Kloft, M., Laskov, P.: Online anomaly detection under adversarial impact. In: AISTATS, pp. 405\u2013412 (2010)"},{"key":"4_CR37","unstructured":"Kloft, M., Laskov, P.: Online anomaly detection under adversarial impact (2011)"},{"key":"4_CR38","unstructured":"Kohavi, R., et al.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: IJCAI, vol. 14(2), pp. 1137\u20131145. Montreal, Canada (1995)"},{"key":"4_CR39","unstructured":"Krasin, I., et al.: Openimages: a public dataset for large-scale multi-label and multi-class image classification. Dataset (2017). https:\/\/github.com\/openimages"},{"key":"4_CR40","unstructured":"Krenn, R.: Steganography and steganalysis (2004)"},{"key":"4_CR41","unstructured":"Krizhevsky, A., Hinton, G.: Learning multiple layers of features from tiny images (2009)"},{"key":"4_CR42","doi-asserted-by":"crossref","unstructured":"Laskov, P., Kloft, M.: A framework for quantitative security analysis of machine learning. In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence (2009)","DOI":"10.1145\/1654988.1654990"},{"key":"4_CR43","unstructured":"Letchford, J., Vorobeychik, Y.: Optimal interdiction of attack plans. In: AAMAS (2013)"},{"issue":"162","key":"4_CR44","first-page":"1","volume":"17","author":"J Liu","year":"2016","unstructured":"Liu, J., Zhu, X.: The teaching dimension of linear learners. J. Mach. Learn. Res. 17(162), 1\u201325 (2016)","journal-title":"J. Mach. Learn. Res."},{"key":"4_CR45","doi-asserted-by":"crossref","unstructured":"Liu, W., Chawla, S.: A game theoretical model for adversarial learning. In: IEEE International Conference on Data Mining Workshops 2009. ICDMW 2009 (2009)","DOI":"10.1109\/ICDMW.2009.9"},{"key":"4_CR46","doi-asserted-by":"crossref","unstructured":"L\u00f3pez-Alt, A., Tromer, E., Vaikuntanathan, V.: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing, pp. 1219\u20131234. ACM (2012)","DOI":"10.1145\/2213977.2214086"},{"key":"4_CR47","doi-asserted-by":"crossref","unstructured":"Lowd, D., Meek, C.: Adversarial learning. In: ACM SIGKDD, pp. 641\u2013647. ACM (2005)","DOI":"10.1145\/1081870.1081950"},{"key":"4_CR48","first-page":"685","volume":"6","author":"PAK Maganbhai","year":"2015","unstructured":"Maganbhai, P.A.K., Chouhan, K.: A study and literature review on image steganography. Int. J. Comput. Sci. Inf. Technol. 6, 685\u2013688 (2015)","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"4_CR49","doi-asserted-by":"crossref","unstructured":"Mei, S., Zhu, X.: Using machine teaching to identify optimal training-set attacks on machine learners. In: Twenty-Ninth AAAI Conference on Artificial Intelligence (2015)","DOI":"10.1609\/aaai.v29i1.9569"},{"key":"4_CR50","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)"},{"key":"4_CR51","unstructured":"Queirolo, F.: Steganography in images. Final Communications Report 3 (2011)"},{"key":"4_CR52","unstructured":"Reyzin, L., Russell, S.: More efficient provably secure steganography. Department of Computer Science, Boston University (2003)"},{"key":"4_CR53","volume-title":"Artificial Intelligence","author":"E Rich","year":"1991","unstructured":"Rich, E., Knight, K.: Artificial Intelligence. McGraw-Hill, New York (1991)"},{"issue":"11","key":"4_CR54","first-page":"169","volume":"4","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. Found. Secur. Comput. 4(11), 169\u2013180 (1978)","journal-title":"Found. Secur. Comput."},{"key":"4_CR55","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-1-4684-4730-9_5","volume-title":"Advances in Cryptology","author":"GJ Simmons","year":"1984","unstructured":"Simmons, G.J.: The prisoners\u2019 problem and the subliminal channel. In: Chaum, D. (ed.) Advances in Cryptology, pp. 51\u201367. Springer, Heidelberg (1984). https:\/\/doi.org\/10.1007\/978-1-4684-4730-9_5"},{"key":"4_CR56","doi-asserted-by":"crossref","unstructured":"Singh, K.U.: A survey on image steganography techniques. Int. J. Comput. Appl. 97(18) (2014)","DOI":"10.5120\/17105-7746"},{"key":"4_CR57","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/978-3-642-13013-7_25","volume-title":"Public Key Cryptography \u2013 PKC 2010","author":"NP Smart","year":"2010","unstructured":"Smart, N.P., Vercauteren, F.: Fully homomorphic encryption with relatively small key and ciphertext sizes. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 420\u2013443. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13013-7_25"},{"issue":"Nov","key":"4_CR58","first-page":"67","volume":"2","author":"I Steinwart","year":"2001","unstructured":"Steinwart, I.: On the influence of the kernel on the consistency of support vector machines. J. Mach. Learn. Res. 2(Nov), 67\u201393 (2001)","journal-title":"J. Mach. Learn. Res."},{"key":"4_CR59","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-36084-0_4","volume-title":"Recent Advances in Intrusion Detection","author":"KMC Tan","year":"2002","unstructured":"Tan, K.M.C., Killourhy, K.S., Maxion, R.A.: Undermining an anomaly-based intrusion detection system using common exploits. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol. 2516, pp. 54\u201373. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-36084-0_4"},{"key":"4_CR60","unstructured":"Thompson, A.: All the news (2017). https:\/\/www.kaggle.com\/snapcrack\/all-the-news"},{"key":"4_CR61","unstructured":"Van Tilborg, H.C., Jajodia, S.: Encyclopedia of Cryptography and Security. Springer, Heidelberg (2014)"},{"key":"4_CR62","unstructured":"Vorobeychik, Y., Li, B.: Optimal randomized classification in adversarial settings. In: AAMAS (2014)"},{"issue":"1","key":"4_CR63","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.ejor.2005.09.007","volume":"176","author":"HC Wu","year":"2007","unstructured":"Wu, H.C.: The Karush-Kuhn-Tucker optimality conditions in an optimization problem with interval-valued objective function. Eur. J. Oper. Res. 176(1), 46\u201359 (2007)","journal-title":"Eur. J. Oper. Res."},{"key":"4_CR64","doi-asserted-by":"crossref","unstructured":"Zhang, L., Wu, J., Zhou, N.: Image encryption with discrete fractional cosine transform and chaos. In: Fifth International Conference on Information Assurance and Security 2009. IAS 2009, vol. 2, pp. 61\u201364. IEEE (2009)","DOI":"10.1109\/IAS.2009.89"},{"key":"4_CR65","doi-asserted-by":"crossref","unstructured":"Zhang, X., Zhu, X., Wright, S.: Training set debugging using trusted items. In: AAAI (2018)","DOI":"10.1609\/aaai.v32i1.11610"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01554-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T00:10:23Z","timestamp":1755648623000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-01554-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030015534","9783030015541"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01554-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"26 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GameSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Decision and Game Theory for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seattle, WA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamesec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.gamesec-conf.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Three of the full papers and two of the short papers were submitted to a special track on Adversarial AI.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}