{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:20:36Z","timestamp":1761402036445,"version":"3.40.3"},"publisher-location":"Cham","reference-count":55,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030299583"},{"type":"electronic","value":"9783030299590"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-29959-0_27","type":"book-chapter","created":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T23:04:10Z","timestamp":1568502250000},"page":"556-576","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["ProCSA: Protecting Privacy in Crowdsourced Spectrum Allocation"],"prefix":"10.1007","author":[{"given":"Max","family":"Curran","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Himanshu","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Omkant","family":"Pandey","sequence":"additional","affiliation":[]},{"given":"Samir R.","family":"Das","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,15]]},"reference":[{"key":"27_CR1","unstructured":"https:\/\/www.qsl.net\/kd2bd\/splat.html"},{"key":"27_CR2","unstructured":"https:\/\/cloud.google.com\/compute\/docs\/cpu-platforms"},{"key":"27_CR3","unstructured":"FlightFeeder for Android, FlightAware. http:\/\/flightaware.com\/adsb\/android"},{"key":"27_CR4","unstructured":"Full version. https:\/\/www.cs.stonybrook.edu\/~hgupta\/procsa.pdf"},{"key":"27_CR5","first-page":"1065","volume":"32","author":"J Andrews","year":"2014","unstructured":"Andrews, J., et al.: What will 5G be? IEEE JSAC 32, 1065\u20131082 (2014)","journal-title":"IEEE JSAC"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: a system for secure multi-party computation. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 257\u2013266. ACM (2008)","DOI":"10.1145\/1455770.1455804"},{"key":"27_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-319-98989-1_21","volume-title":"Computer Security","author":"N Buescher","year":"2018","unstructured":"Buescher, N., Weber, A., Katzenbeisser, S.: Towards practical RAM based secure computation. In: Lopez, J., Zhou, J., Soriano, M. (eds.) ESORICS 2018. LNCS, vol. 11099, pp. 416\u2013437. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98989-1_21"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Calvo-Palomino, R. Giustiniano, D., Lenders, V., Fakhreddine, A.: Crowdsourcing spectrum data decoding. In: IEEE INFOCOM 2017 - IEEE Conference on Computer Communications (2017)","DOI":"10.1109\/INFOCOM.2017.8057078"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Chakraborty, A., Rahman, M.S., Gupta, H., Das, S.R.: SpecSense: crowdsensing for efficient querying of spectrum occupancy. In IEEE INFOCOM 2017 - IEEE Conference on Computer Communications (2017)","DOI":"10.1109\/INFOCOM.2017.8057113"},{"key":"27_CR10","unstructured":"Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of 36th Annual Symposium on Foundations of Computer Science, pp. 41\u201350. IEEE (1995)"},{"key":"27_CR11","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1109\/TNET.2017.2778260","volume":"26","author":"MA Clark","year":"2017","unstructured":"Clark, M.A., Psounis, K.: Trading utility for privacy in shared spectrum access systems. IEEE\/ACM Trans. Netw. 26, 259\u2013273 (2017)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"27_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/978-3-642-32009-5_38","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"I Damg\u00e5rd","year":"2012","unstructured":"Damg\u00e5rd, I., Pastro, V., Smart, N., Zakarias, S.: Multiparty computation from somewhat homomorphic encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 643\u2013662. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_38"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Demmler, D., Schneider, T., Zohner, M.: ABY-a framework for efficient mixed-protocol secure two-party computation. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23113"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Ding, G., Song, F., Wu, Q., Zou, Y., Zhang, L., Feng, S., Wang, J.: Robust spectrum sensing with crowd sensors. In: IEEE VTC (2014)","DOI":"10.1109\/TCOMM.2014.2346775"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Doerner, J., Shelat, A.: Scaling ORAM for secure computation. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 523\u2013535. ACM (2017)","DOI":"10.1145\/3133956.3133967"},{"issue":"1","key":"27_CR16","first-page":"173","volume":"35","author":"Y Dou","year":"2017","unstructured":"Dou, Y., Zeng, K.C., Li, H., Yang, Y., Gao, B., Ren, K., Li, S.: P2-SAS: privacy-preserving centralized dynamic spectrum access system. IEEE J. Sel. Areas Commun. 35(1), 173\u2013187 (2017)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"27_CR17","unstructured":"Drocella, E., Richards, J., Sole, R., Najmy, F., Lundy, A., McKenna, P.: 3.5 GHz exclusion zone analyses and methodology. Technical report (2015)"},{"issue":"6","key":"27_CR18","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1145\/3812.3818","volume":"28","author":"S Even","year":"1985","unstructured":"Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637\u2013647 (1985)","journal-title":"Commun. ACM"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Fan, B., Andersen, D.G, Kaminsky, M., Mitzenmacher, M.D.: Cuckoo filter: practically better than bloom. In: Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, pp. 75\u201388. ACM (2014)","DOI":"10.1145\/2674005.2674994"},{"key":"27_CR20","unstructured":"U. FCC: Longley-rice methodology for evaluating TV coverage and interference. OET Bulletin, 69 (2004)"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Gao, Z., Zhu, H., Liu, Y., Li, M., Cao, Z.: Location privacy in database-driven cognitive radio networks: attacks and countermeasures. In: 2013 Proceedings of IEEE INFOCOM, pp. 2751\u20132759. IEEE (2013)","DOI":"10.1109\/INFCOM.2013.6567084"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, pp. 169\u2013178. ACM (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"27_CR23","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, pp. 218\u2013229. ACM (1987)","DOI":"10.1145\/28395.28420"},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"Gordon, S.D., et al.: Secure two-party computation in sublinear (amortized) time. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 513\u2013524. ACM (2012)","DOI":"10.1145\/2382196.2382251"},{"key":"27_CR25","doi-asserted-by":"publisher","first-page":"1726","DOI":"10.1109\/COMST.2017.2693965","volume":"19","author":"M Grissa","year":"2017","unstructured":"Grissa, M., Hamdaoui, B., Yavuza, A.A.: Location privacy in cognitive radio networks: a survey. IEEE Commun. Surv. Tutor. 19, 1726\u20131760 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"27_CR26","doi-asserted-by":"crossref","unstructured":"Grissa, M., Yavuz, A., Hamdaoui, B.: LPOS: location privacy for optimal sensing in cognitive radio networks. In: 2015 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/GLOCOM.2015.7417611"},{"key":"27_CR27","doi-asserted-by":"crossref","unstructured":"Grissa, M., Yavuz, A., Hamdaoui, B.: An efficient technique for protecting location privacy of cooperative spectrum sensing users. In: 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 915\u2013920. IEEE (2016)","DOI":"10.1109\/INFCOMW.2016.7562209"},{"issue":"2","key":"27_CR28","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1109\/TIFS.2016.2622000","volume":"12","author":"M Grissa","year":"2017","unstructured":"Grissa, M., Yavuz, A.A., Hamdaoui, B.: Preserving the location privacy of secondary users in cooperative spectrum sensing. IEEE Trans. Inf. Forensics Secur. 12(2), 418\u2013431 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"27_CR29","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1109\/TMC.2009.136","volume":"9","author":"AT Hoang","year":"2010","unstructured":"Hoang, A.T., Liang, Y., Islam, M.H.: Power control and channel allocation in cognitive radio networks with primary users\u2019 cooperation. IEEE Trans. Mob. Comput. 9, 348\u2013360 (2010)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"27_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/3-540-36978-3_2","volume-title":"Information Processing in Sensor Networks","author":"P Ishwar","year":"2003","unstructured":"Ishwar, P., Kumar, A., Ramchandran, K.: Distributed sampling for dense sensor networks: a \u201cBit-Conservation Principle\u201d. In: Zhao, F., Guibas, L. (eds.) IPSN 2003. LNCS, vol. 2634, pp. 17\u201331. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36978-3_2"},{"key":"27_CR31","doi-asserted-by":"crossref","unstructured":"Jin, X., Zhang, R., Chen, Y., Li, T., Zhang, Y.: DPSense: differentially private crowdsourced spectrum sensing. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 296\u2013307. ACM (2016)","DOI":"10.1145\/2976749.2978426"},{"key":"27_CR32","doi-asserted-by":"crossref","unstructured":"Kasiri, B., Lambadaris, I., Yu, F.R., Tang, H.: Privacy-preserving distributed cooperative spectrum sensing in multi-channel cognitive radio MANETs. In: 2015 IEEE International Conference on Communications (ICC), pp. 7316\u20137321. IEEE (2015)","DOI":"10.1109\/ICC.2015.7249495"},{"key":"27_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/978-3-540-70583-3_40","volume-title":"Automata, Languages and Programming","author":"V Kolesnikov","year":"2008","unstructured":"Kolesnikov, V., Schneider, T.: Improved garbled circuit: free XOR gates and applications. In: Aceto, L., Damg\u00e5rd, I., Goldberg, L.A., Halld\u00f3rsson, M.M., Ing\u00f3lfsd\u00f3ttir, A., Walukiewicz, I. (eds.) ICALP 2008. LNCS, vol. 5126, pp. 486\u2013498. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-70583-3_40"},{"key":"27_CR34","unstructured":"Kreuter, B., Shelat, A., Shen, C.-H.: Billion-gate secure computation with malicious adversaries. In: USENIX Security Symposium, vol. 12, pp. 285\u2013300 (2012)"},{"issue":"7","key":"27_CR35","doi-asserted-by":"publisher","first-page":"3794582","DOI":"10.1177\/155014773794582","volume":"12","author":"H Li","year":"2016","unstructured":"Li, H., Pei, Q., Zhang, W.: Location privacy-preserving channel allocation scheme in cognitive radio networks. Int. J. Distrib. Sens. Netw. 12(7), 3794582 (2016)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"27_CR36","doi-asserted-by":"crossref","unstructured":"Li, S., Zhu, H., Gao, Z., Guan, X., Xing, K., Shen, X.: Location privacy preservation in collaborative spectrum sensing. In: 2012 Proceedings of IEEE INFOCOM, pp. 729\u2013737. IEEE (2012)","DOI":"10.1109\/INFCOM.2012.6195818"},{"key":"27_CR37","doi-asserted-by":"crossref","unstructured":"Mao, Y., Chen, T., Zhang, Y., Wang, T., Zhong, S.: Protecting location information in collaborative sensing of cognitive radio networks. In: Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 219\u2013226. ACM (2015)","DOI":"10.1145\/2811587.2811594"},{"key":"27_CR38","doi-asserted-by":"crossref","unstructured":"Medeisis, A., Kajackas, A.: On the use of the universal Okumura-Hata propagation prediction model in rural areas. In: 2000 IEEE 51st Vehicular Technology Conference Proceedings, VTC 2000-Spring Tokyo, vol. 3, pp. 1815\u20131818. IEEE (2000)","DOI":"10.1109\/VETECS.2000.851585"},{"key":"27_CR39","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Shoup, V.: Private information storage. In: STOC, vol. 97, pp. 294\u2013303. Citeseer (1997)","DOI":"10.1145\/258533.258606"},{"key":"27_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48910-X_16"},{"key":"27_CR41","unstructured":"Rabin, M.O.: How to exchange secrets with oblivious transfer. IACR Cryptology ePrint Archive 2005, 187 (2005)"},{"key":"27_CR42","doi-asserted-by":"crossref","unstructured":"Rajkarnikar, N., Peha, J.M., Aguiar, A.: Location privacy from dummy devices in database-coordinated spectrum sharing. In: 2017 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), pp. 1\u201310. IEEE (2017)","DOI":"10.1109\/DySPAN.2017.7920796"},{"key":"27_CR43","unstructured":"Rindal, P.: Ivory (2018). https:\/\/github.com\/ladnir\/Ivory-Runtime"},{"key":"27_CR44","doi-asserted-by":"publisher","DOI":"10.1002\/0471743690","volume-title":"Introduction to RF Propagation","author":"J Seybold","year":"2005","unstructured":"Seybold, J.: Introduction to RF Propagation. Wiley, New York (2005)"},{"key":"27_CR45","doi-asserted-by":"crossref","unstructured":"Stefanov, E., et al.: Path ORAM: an extremely simple oblivious ram protocol. In: Proceedings of the 2013 ACM SIGSAC conference on Computer and Communications Security, pp. 299\u2013310. ACM (2013)","DOI":"10.1145\/2508859.2516660"},{"issue":"05","key":"27_CR46","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"issue":"3","key":"27_CR47","doi-asserted-by":"publisher","first-page":"1108","DOI":"10.1109\/SURV.2012.121112.00047","volume":"15","author":"EZ Tragos","year":"2013","unstructured":"Tragos, E.Z., Zeadally, S., Fragkiadakis, A.G., Siris, V.A.: Spectrum assignment in cognitive radio networks: a comprehensive survey. IEEE Commun. Surv. Tutor. 15(3), 1108\u20131135 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"27_CR48","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.1109\/TWC.2014.2363357","volume":"14","author":"W Wang","year":"2015","unstructured":"Wang, W., Zhang, Q.: Privacy-preserving collaborative spectrum sensing with multiple service providers. IEEE Trans. Wirel. Commun. 14(2), 1011\u20131019 (2015)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"27_CR49","doi-asserted-by":"crossref","unstructured":"Wang, X., Chan, H., Shi, E.: Circuit ORAM: on tightness of the Goldreich-Ostrovsky lower bound. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 850\u2013861. ACM (2015)","DOI":"10.1145\/2810103.2813634"},{"key":"27_CR50","doi-asserted-by":"crossref","unstructured":"Wang, X.S., Huang, Y., Chan, T.H., Shelat, A., Shi, E.: SCORAM: oblivious ram for secure computation. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 191\u2013202. ACM (2014)","DOI":"10.1145\/2660267.2660365"},{"key":"27_CR51","doi-asserted-by":"crossref","unstructured":"Yao, A.C.-C.: How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science, pp. 162\u2013167. IEEE (1986)","DOI":"10.1109\/SFCS.1986.25"},{"key":"27_CR52","unstructured":"Ying, X., Kim, C.W., Roy, S.: Revisiting TV coverage estimation with measurement-based statistical interpolation (2015)"},{"key":"27_CR53","doi-asserted-by":"crossref","unstructured":"Zahur, S., et al.: Revisiting square-root ORAM: efficient random access in multi-party computation. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 218\u2013234. IEEE (2016)","DOI":"10.1109\/SP.2016.21"},{"key":"27_CR54","doi-asserted-by":"crossref","unstructured":"Zhang, L., Fang, C., Li, Y., Zhu, H., Dong, M.: Optimal strategies for defending location inference attack in database-driven CRNs. In: 2015 IEEE International Conference on Communications (ICC), pp. 7640\u20137645. IEEE (2015)","DOI":"10.1109\/ICC.2015.7249548"},{"key":"27_CR55","doi-asserted-by":"crossref","unstructured":"Zhang, T., Leng, N., Banerjee, S.: A vehicle-based measurement framework for enhancing whitespace spectrum databases. In: Proceedings of ACM Mobicom (2014)","DOI":"10.1145\/2639108.2639114"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29959-0_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T00:07:23Z","timestamp":1726358843000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-29959-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030299583","9783030299590"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29959-0_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conf.laas.fr\/esorics\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"344","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}