{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:48:26Z","timestamp":1775746106790,"version":"3.50.1"},"publisher-location":"Cham","reference-count":73,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030215675","type":"print"},{"value":"9783030215682","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-21568-2_11","type":"book-chapter","created":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T22:13:31Z","timestamp":1559081611000},"page":"217-237","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":198,"title":["PassGAN: A Deep Learning Approach for Password Guessing"],"prefix":"10.1007","author":[{"given":"Briland","family":"Hitaj","sequence":"first","affiliation":[]},{"given":"Paolo","family":"Gasti","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Ateniese","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Perez-Cruz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,29]]},"reference":[{"key":"11_CR1","unstructured":"Abadi, M., et al.: TensorFlow: a system for large-scale machine learning. In: OSDI, vol. 16, pp. 265\u2013283 (2016)"},{"key":"11_CR2","unstructured":"Arjovsky, M., Chintala, S., Bottou, L.: Wasserstein GAN. CoRR abs\/1701.07875 (2017). http:\/\/arxiv.org\/abs\/1701.07875"},{"key":"11_CR3","unstructured":"Berthelot, D., Schumm, T., Metz, L.: BEGAN: boundary equilibrium generative adversarial networks. arXiv preprint arXiv:1703.10717 (2017)"},{"key":"11_CR4","unstructured":"Binkowski, M., Sutherland, D., Arbel, M., Gretton, A.: Demystifying MMD GANs. In: International Conference on Learning Representations (ICLR) (2018)"},{"key":"11_CR5","unstructured":"Cao, Y., Ding, G.W., Lui, Y.C., Huang, R.: Improving GAN training via binarized representation entropy (BRE) regularization. In: International Conference on Learning Representations (ICLR) (2018)"},{"key":"11_CR6","unstructured":"Castelluccia, C., D\u00fcrmuth, M., Perito, D.: Adaptive password-strength meters from Markov models. In: NDSS (2012)"},{"key":"11_CR7","unstructured":"Chen, X., Duan, Y., Houthooft, R., Schulman, J., Sutskever, I., Abbeel, P.: InfoGAN: interpretable representation learning by information maximizing generative adversarial nets. In: Advances in Neural Information Processing Systems, pp. 2172\u20132180 (2016)"},{"issue":"4","key":"11_CR8","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1109\/TDSC.2006.53","volume":"3","author":"A Ciaramella","year":"2006","unstructured":"Ciaramella, A., D\u2019Arco, P., De Santis, A., Galdi, C., Tagliaferri, R.: Neural network techniques for proactive password checking. IEEE Trans. Dependable Secure Comput. 3(4), 327\u2013339 (2006)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"11_CR9","unstructured":"Daskalakis, C., Ilyas, A., Syrgkanis, V., Zeng, H.: Training GANs with optimism. In: International Conference on Learning Representations (ICLR) (2018)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Dell\u2019Amico, M., Michiardi, P., Roudier, Y.: Password strength: an empirical analysis. In: Proceedings IEEE INFOCOM, pp. 1\u20139. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5461951"},{"key":"11_CR11","unstructured":"Denton, E.L., Chintala, S., Fergus, R., et al.: Deep generative image models using a Laplacian pyramid of adversarial networks. In: Advances in Neural Information Processing Systems, pp. 1486\u20131494 (2015)"},{"key":"11_CR12","unstructured":"Dorsey, B.: Markov-chain password generator (2017). https:\/\/github.com\/brannondorsey\/markov-passwords"},{"issue":"4","key":"11_CR13","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1109\/83.753738","volume":"8","author":"B Duc","year":"1999","unstructured":"Duc, B., Fischer, S., Bigun, J.: Face authentication with Gabor information on deformable graphs. IEEE Trans. Image Process. 8(4), 504\u2013516 (1999)","journal-title":"IEEE Trans. Image Process."},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-319-15618-7_10","volume-title":"Engineering Secure Software and Systems","author":"M D\u00fcrmuth","year":"2015","unstructured":"D\u00fcrmuth, M., Angelstorf, F., Castelluccia, C., Perito, D., Chaabane, A.: OMEN: faster password guessing using an ordered Markov enumerator. In: Piessens, F., Caballero, J., Bielova, N. (eds.) ESSoS 2015. LNCS, vol. 8978, pp. 119\u2013132. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-15618-7_10"},{"key":"11_CR15","unstructured":"Fiegerman, S.: Yahoo says 500 million accounts stolen (2017). http:\/\/money.cnn.com\/2016\/09\/22\/technology\/yahoo-data-breach\/index.html"},{"issue":"1","key":"11_CR16","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","volume":"8","author":"M Frank","year":"2013","unstructured":"Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8(1), 136\u2013148 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR17","unstructured":"Golla, M.: Password guessing using recurrent neural networks - the missing manual (2017). https:\/\/www.password-guessing.org\/blog\/post\/cupslab-neural-network-cracking-manual\/"},{"key":"11_CR18","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, pp. 2672\u20132680 (2014)"},{"key":"11_CR19","unstructured":"Graves, A.: Generating sequences with recurrent neural networks. arXiv preprint arXiv:1308.0850 (2013)"},{"key":"11_CR20","unstructured":"Gulrajani, I., Ahmed, F., Arjovsky, M., Dumoulin, V., Courville, A.C.: Improved training of Wasserstein GANs. In: Advances in Neural Information Processing Systems, pp. 5767\u20135777 (2017)"},{"key":"11_CR21","unstructured":"Gulrajani, I., Ahmed, F., Arjovsky, M., Dumoulin, V., Courville, A.C.: Improved training of Wasserstein GANs - code (2017). https:\/\/github.com\/igul222\/improved_wgan_training"},{"key":"11_CR22","unstructured":"HashCat (2017). https:\/\/hashcat.net"},{"key":"11_CR23","unstructured":"HashCat: HashCat v5.0.0, advanced password recovery (2018). https:\/\/hashcat.net\/forum\/showthread.php?mode=linear&tid=7903&pid=42585"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Hitaj, B., Ateniese, G., P\u00e9rez-Cruz, F.: Deep models under the GAN: information leakage from collaborative deep learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 603\u2013618. ACM (2017)","DOI":"10.1145\/3133956.3134012"},{"key":"11_CR25","unstructured":"Hitaj, B., Gasti, P., Ateniese, G., P\u00e9rez-Cruz, F.: PassGAN: a deep learning approach for password guessing. In: NeurIPS 2018 Workshop on Security in Machine Learning, SECML 2018, Montreal, CANADA (Co-located with NeurIPS 2018) (2018)"},{"key":"11_CR26","unstructured":"Hjelm, R.D., Jacob, A.P., Trischler, A., Che, T., Cho, K., Bengio, Y.: Boundary seeking GANs. In: International Conference on Learning Representations (ICLR) (2018)"},{"key":"11_CR27","unstructured":"Hoang, Q., Nguyen, T.D., Le, T., Phung, D.: MGAN: training generative adversarial nets with multiple generators. In: International Conference on Learning Representations (ICLR) (2018)"},{"key":"11_CR28","unstructured":"Hunt, T.: Here\u2019s why [insert thing here] is not a password killer (2018). https:\/\/www.troyhunt.com\/heres-why-insert-thing-here-is-not-a-password-killer\/"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Juels, A., Rivest, R.L.: Honeywords: making password-cracking detectable. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 145\u2013160. ACM (2013)","DOI":"10.1145\/2508859.2516671"},{"key":"11_CR30","unstructured":"Kim, T., Cha, M., Kim, H., Lee, J., Kim, J.: Learning to discover cross-domain relations with generative adversarial networks. arXiv preprint arXiv:1703.05192 (2017)"},{"key":"11_CR31","unstructured":"Kingma, D., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"11_CR32","unstructured":"Lab, C.: Fast, lean, and accurate: modeling password guessability using neural networks (source code) (2016). https:\/\/github.com\/cupslab\/neural_network_cracking"},{"issue":"4","key":"11_CR33","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1162\/neco.1989.1.4.541","volume":"1","author":"Y LeCun","year":"1989","unstructured":"LeCun, Y., et al.: Backpropagation applied to handwritten zip code recognition. Neural Comput. 1(4), 541\u2013551 (1989)","journal-title":"Neural Comput."},{"key":"11_CR34","unstructured":"LeCun, Y., et al.: Handwritten digit recognition with a back-propagation network. In: Advances in Neural Information Processing Systems, pp. 396\u2013404 (1990)"},{"key":"11_CR35","unstructured":"Li, Y., Swersky, K., Zemel, R.: Generative moment matching networks. In: International Conference on Machine Learning, pp. 1718\u20131727 (2015)"},{"key":"11_CR36","unstructured":"LinkedIn: Linkedin. https:\/\/hashes.org\/public.php"},{"key":"11_CR37","doi-asserted-by":"crossref","unstructured":"Ma, J., Yang, W., Luo, M., Li, N.: A study of probabilistic password models. In: IEEE Symposium on Security and Privacy (SP), pp. 689\u2013704. IEEE (2014)","DOI":"10.1109\/SP.2014.50"},{"key":"11_CR38","unstructured":"Hashcat Per Position Markov Chains (2017). https:\/\/www.trustwave.com\/Resources\/SpiderLabs-Blog\/Hashcat-Per-Position-Markov-Chains\/"},{"key":"11_CR39","unstructured":"Melicher, W., et al.: Fast, lean, and accurate: modeling password guessability using neural networks. In: USENIX Security Symposium, pp. 175\u2013191 (2016)"},{"key":"11_CR40","unstructured":"Mirza, M., Osindero, S.: Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784 (2014)"},{"key":"11_CR41","unstructured":"Miyato, T., Koyama, M.: cGANs with projection discriminator. In: International Conference on Learning Representations (ICLR) (2018)"},{"issue":"11","key":"11_CR42","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1145\/359168.359172","volume":"22","author":"R Morris","year":"1979","unstructured":"Morris, R., Thompson, K.: Password security: a case history. Commun. ACM 22(11), 594\u2013597 (1979)","journal-title":"Commun. ACM"},{"key":"11_CR43","unstructured":"Mroueh, Y., Li, C.L., Sercu, T., Raj, A., Cheng, Y.: Sobolev GAN. In: International Conference on Learning Representations (ICLR) (2018)"},{"key":"11_CR44","unstructured":"Mroueh, Y., Sercu, T., Goel, V.: McGan: mean and covariance feature matching GAN. In: Proceedings of the 34th International Conference on Machine Learning, ICML 2017, Sydney, NSW, Australia, 6\u201311 August 2017, pp. 2527\u20132535 (2017). http:\/\/proceedings.mlr.press\/v70\/mroueh17a.html"},{"key":"11_CR45","volume-title":"Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations","author":"KP Murphy","year":"2006","unstructured":"Murphy, K.P.: Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations. Wiley, Hoboken (2006)"},{"key":"11_CR46","volume-title":"Machine Learning: A Probabilistic Perspective","author":"KP Murphy","year":"2012","unstructured":"Murphy, K.P.: Machine Learning: A Probabilistic Perspective. MIT Press, Cambridge (2012)"},{"key":"11_CR47","unstructured":"Nagarajan, V., Kolter, J.Z.: Gradient descent GAN optimization is locally stable. In: Advances in Neural Information Processing Systems, pp. 5585\u20135595 (2017)"},{"key":"11_CR48","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Fast dictionary attacks on passwords using time-space tradeoff. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, pp. 364\u2013372. ACM (2005)","DOI":"10.1145\/1102120.1102168"},{"key":"11_CR49","unstructured":"Nowozin, S., Cseke, B., Tomioka, R.: f-GAN: training generative neural samplers using variational divergence minimization. In: Advances in Neural Information Processing Systems, pp. 271\u2013279 (2016)"},{"key":"11_CR50","doi-asserted-by":"crossref","unstructured":"Percival, C., Josefsson, S.: The scrypt password-based key derivation function. Technical report (2016)","DOI":"10.17487\/RFC7914"},{"key":"11_CR51","unstructured":"Perez, S.: Google plans to bring password-free logins to Android apps by year-end (2017). https:\/\/techcrunch.com\/2016\/05\/23\/google-plans-to-bring-password-free-logins-to-android-apps-by-year-end\/"},{"key":"11_CR52","unstructured":"Petzka, H., Fischer, A., Lukovnikov, D.: On the regularization of Wasserstein GANs. In: International Conference on Learning Representations (ICLR) (2018)"},{"key":"11_CR53","unstructured":"The Password Project (2017). http:\/\/thepasswordproject.com\/leaked_password_lists_and_dictionaries"},{"key":"11_CR54","unstructured":"Provos, N., Mazieres, D.: Bcrypt algorithm. In: USENIX (1999)"},{"key":"11_CR55","unstructured":"Radford, A., Metz, L., Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. In: 4th International Conference on Learning Representations (2016)"},{"key":"11_CR56","unstructured":"John the Ripper (2017). http:\/\/www.openwall.com\/john\/"},{"key":"11_CR57","unstructured":"John the Ripper Markov Generator (2017). http:\/\/openwall.info\/wiki\/john\/markov"},{"key":"11_CR58","unstructured":"RockYou: Rockyou (2010). http:\/\/downloads.skullsecurity.org\/passwords\/rockyou.txt.bz2"},{"key":"11_CR59","unstructured":"Roth, K., Lucchi, A., Nowozin, S., Hofmann, T.: Stabilizing training of generative adversarial networks through regularization. In: Advances in Neural Information Processing Systems, pp. 2018\u20132028 (2017)"},{"key":"11_CR60","unstructured":"Hashcat Rules (2017). https:\/\/github.com\/hashcat\/hashcat\/tree\/master\/rules"},{"key":"11_CR61","unstructured":"John the Ripper KoreLogic Rules (2017). http:\/\/contest-2010.korelogic.com\/rules.html"},{"issue":"6088","key":"11_CR62","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/323533a0","volume":"323","author":"DE Rumelhart","year":"1986","unstructured":"Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning representations by back-propagating errors. Nature 323(6088), 533 (1986)","journal-title":"Nature"},{"key":"11_CR63","unstructured":"Salimans, T., Goodfellow, I., Zaremba, W., Cheung, V., Radford, A., Chen, X.: Improved techniques for training GANs. In: Advances in Neural Information Processing Systems, pp. 2234\u20132242 (2016)"},{"issue":"5","key":"11_CR64","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1109\/TIFS.2015.2506542","volume":"11","author":"Z Sitov\u00e1","year":"2016","unstructured":"Sitov\u00e1, Z., et al.: HMOG: new behavioral biometric features for continuous authentication of smartphone users. IEEE Trans. Inf. Forensics Secur. 11(5), 877\u2013892 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR65","unstructured":"Sutskever, I., Martens, J., Hinton, G.E.: Generating text with recurrent neural networks. In: Proceedings of the 28th International Conference on Machine Learning (ICML 2011), pp. 1017\u20131024 (2011)"},{"key":"11_CR66","doi-asserted-by":"crossref","unstructured":"Wang, D., Cheng, H., Wang, P., Yan, J., Huang, X.: A security analysis of honeywords. In: NDSS (2018)","DOI":"10.14722\/ndss.2018.23142"},{"key":"11_CR67","unstructured":"Wei, X., Gong, B., Liu, Z., Lu, W., Wang, L.: Improving the improved training of Wasserstein GANs: a consistency term and its dual effect. In: International Conference on Learning Representations (ICLR) (2018)"},{"key":"11_CR68","unstructured":"Weir, M.: Probabilistic password cracker (2009). https:\/\/sites.google.com\/site\/reusablesec\/Home\/password-cracking-tools\/probablistic_cracker"},{"key":"11_CR69","doi-asserted-by":"crossref","unstructured":"Weir, M., Aggarwal, S., De Medeiros, B., Glodek, B.: Password cracking using probabilistic context-free grammars. In: 30th IEEE Symposium on Security and Privacy, pp. 391\u2013405. IEEE (2009)","DOI":"10.1109\/SP.2009.8"},{"key":"11_CR70","unstructured":"Wu, Y., Burda, Y., Salakhutdinov, R., Grosse, R.: On the quantitative analysis of decoder-based generative models. arXiv preprint arXiv:1611.04273 (2016)"},{"key":"11_CR71","doi-asserted-by":"crossref","unstructured":"Zhang, H., et al.: StackGAN: text to photo-realistic image synthesis with stacked generative adversarial networks. arXiv preprint arXiv:1612.03242 (2016)","DOI":"10.1109\/ICCV.2017.629"},{"key":"11_CR72","doi-asserted-by":"crossref","unstructured":"Zhong, Y., Deng, Y., Jain, A.K.: Keystroke dynamics for user authentication. In: 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 117\u2013123. IEEE (2012)","DOI":"10.1109\/CVPRW.2012.6239225"},{"key":"11_CR73","unstructured":"Zhou, Z., et al.: Activation maximization generative adversarial nets. In: International Conference on Learning Representations (ICLR) (2018)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-21568-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T00:04:30Z","timestamp":1716941070000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-21568-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030215675","9783030215682"],"references-count":73,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-21568-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bogota","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Colombia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.acns19.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"111","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"From the ACNS 2019 associated workshops, 10 out of 30 submitted papers were accepted for publication","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}