{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T13:12:30Z","timestamp":1767964350472,"version":"3.49.0"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030436865","type":"print"},{"value":"9783030436872","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-43687-2_68","type":"book-chapter","created":{"date-parts":[[2020,3,19]],"date-time":"2020-03-19T00:03:53Z","timestamp":1584576233000},"page":"816-827","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Detecting Machine-Obfuscated Plagiarism"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8412-5553","authenticated-orcid":false,"given":"Tom\u00e1\u0161","family":"Folt\u00fdnek","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9440-780X","authenticated-orcid":false,"given":"Terry","family":"Ruas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4212-0508","authenticated-orcid":false,"given":"Philipp","family":"Scharpf","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4648-8198","authenticated-orcid":false,"given":"Norman","family":"Meuschke","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7141-4997","authenticated-orcid":false,"given":"Moritz","family":"Schubotz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2775-2806","authenticated-orcid":false,"given":"William","family":"Grosky","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6522-3019","authenticated-orcid":false,"given":"Bela","family":"Gipp","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,19]]},"reference":[{"issue":"1","key":"68_CR1","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/BF00153759","volume":"6","author":"DW Aha","year":"1991","unstructured":"Aha, D.W., Kibler, D., Albert, M.K.: Instance-based learning algorithms. Mach. Learn. 6(1), 37\u201366 (1991). \nhttps:\/\/doi.org\/10.1007\/BF00153759","journal-title":"Mach. Learn."},{"key":"68_CR2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001420530043","author":"A Altheneyan","year":"2019","unstructured":"Altheneyan, A., Menai, M.E.B.: Evaluation of state-of-the-art paraphrase identification and its application to automatic plagiarism detection. Int. J. Pattern Recogn. Artif Intell. (2019). \nhttps:\/\/doi.org\/10.1142\/S0218001420530043","journal-title":"Int. J. Pattern Recogn. Artif Intell."},{"key":"68_CR3","doi-asserted-by":"publisher","unstructured":"Altszyler, E., Sigman, M., Fernandez Slezak, D.: Corpus specificity in LSA and word2vec: the role of out-of-domain documents. In: Proceedings 3rd Workshop on Representation Learning for NLP, pp. 1\u201310 (2018). \nhttps:\/\/doi.org\/10.18653\/v1\/W18-3001","DOI":"10.18653\/v1\/W18-3001"},{"key":"68_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1007\/978-3-319-56608-5_64","volume-title":"Advances in Information Retrieval","author":"F Alvi","year":"2017","unstructured":"Alvi, F., Stevenson, M., Clough, P.: Plagiarism detection in texts obfuscated with homoglyphs. In: Jose, J.M., et al. (eds.) ECIR 2017. LNCS, vol. 10193, pp. 669\u2013675. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-56608-5_64"},{"key":"68_CR5","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1162\/tacl_a_00051","volume":"5","author":"P Bojanowski","year":"2017","unstructured":"Bojanowski, P., Grave, E., Joulin, A., Mikolov, T.: Enriching wordvectors withsubword information. Trans. Assoc. Comput. Linguist. 5, 135\u2013146 (2017). \nhttps:\/\/doi.org\/10.1162\/tacl_a_00051","journal-title":"Trans. Assoc. Comput. Linguist."},{"issue":"1","key":"68_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001). \nhttps:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach. Learn."},{"key":"68_CR7","doi-asserted-by":"publisher","unstructured":"Cer, D., et al.: Universal sentence encoder for English. In: Proceedings Conference on Empirical Methods in Natural Language Processing: System Demonstrations, pp. 169\u2013174 (2018). \nhttps:\/\/doi.org\/10.18653\/v1\/D18-2029","DOI":"10.18653\/v1\/D18-2029"},{"issue":"3","key":"68_CR8","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1023\/A:1022627411411","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995). \nhttps:\/\/doi.org\/10.1023\/A:1022627411411","journal-title":"Mach. Learn."},{"issue":"6","key":"68_CR9","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)","volume":"41","author":"S Deerwester","year":"1990","unstructured":"Deerwester, S., Dumais, S.T., Furnas, G.W., Landauer, T.K., Harshman, R.: Indexing by latent semantic analysis. J. Am. Soc. Inform. Sci. 41(6), 391\u2013407 (1990). \nhttps:\/\/doi.org\/10.1002\/(SICI)1097-4571(199009)","journal-title":"J. Am. Soc. Inform. Sci."},{"key":"68_CR10","unstructured":"Dey, K., Shrivastava, R., Kaushik, S.: A paraphrase and semantic similarity detection system for user generated short-text content on microblogs. In: Proceedings International Conference on Computational Linguistics (Coling), vol. 42, pp. 2880\u20132890 (2016)"},{"key":"68_CR11","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-981-10-3779-5_3","volume-title":"Recent Developments in Intelligent Computing, Communication and Devices","author":"T Eisa","year":"2017","unstructured":"Eisa, T., Salim, N., Alzahrani, S.: Figure plagiarism detection using content-based features. In: Patnaik, S., Popentiu-Vladicescu, F. (eds.) Recent Developments in Intelligent Computing, Communication and Devices. AISC, vol. 555, pp. 17\u201320. Springer, Singapore (2017). \nhttps:\/\/doi.org\/10.1007\/978-981-10-3779-5_3"},{"key":"68_CR12","doi-asserted-by":"crossref","unstructured":"Ferrero, J., Agnes, F., Besacier, L., Schwab, D.: Using word embedding for cross-language plagiarism detection. In: Proceedings Conference of the European Chapter of the Association for Computational Linguistics (EACL), vol. 2, pp. 415\u2013421 (2017)","DOI":"10.18653\/v1\/E17-2066"},{"issue":"6","key":"68_CR13","doi-asserted-by":"publisher","first-page":"112:1","DOI":"10.1145\/3345317","volume":"52","author":"T Folt\u00fdnek","year":"2019","unstructured":"Folt\u00fdnek, T., Meuschke, N., Gipp, B.: Academic plagiarism detection: a systematic literature review. ACM Comput. Surv. 52(6), 112:1\u2013112:42 (2019). \nhttps:\/\/doi.org\/10.1145\/3345317","journal-title":"ACM Comput. Surv."},{"key":"68_CR14","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.knosys.2016.08.004","volume":"111","author":"M Franco-Salvador","year":"2016","unstructured":"Franco-Salvador, M., Gupta, P., Rosso, P., Banchs, R.E.: Cross-language plagiarism detection over continuous-space- and knowledge graph-based representations of language. Knowl.-Based Syst. 111, 87\u201399 (2016). \nhttps:\/\/doi.org\/10.1016\/j.knosys.2016.08.004","journal-title":"Knowl.-Based Syst."},{"key":"68_CR15","unstructured":"Gabrilovich, E., Markovitch, S.: Computing semantic relatedness using wikipedia-based explicit semantic analysis. In: Proceedings International Joint Conference on Artificial Intelligence (IJCAI), pp. 1606\u20131611 (2007)"},{"key":"68_CR16","doi-asserted-by":"publisher","unstructured":"Gipp, B., Meuschke, N., Breitinger, C., Pitman, J., N\u00fcrnberger, A.: Web-based demonstration of semantic similarity detection using citation pattern visualization for a cross language plagiarism case. In: Proceedings International Conference on Enterprise Information Systems (ICEIS), vol. 2, pp. 677\u2013683 (2014). \nhttps:\/\/doi.org\/10.5220\/0004985406770683","DOI":"10.5220\/0004985406770683"},{"key":"68_CR17","doi-asserted-by":"publisher","DOI":"10.2200\/S00762ED1V01Y201703HLT037","volume-title":"Neural Network Methods in Natural Language Processing","author":"Y Goldberg","year":"2017","unstructured":"Goldberg, Y., Hirst, G.: Neural Network Methods in Natural Language Processing. Morgan & Claypool Publishers, San Rafael (2017). \nhttps:\/\/doi.org\/10.2200\/S00762ED1V01Y201703HLT037"},{"key":"68_CR18","doi-asserted-by":"publisher","unstructured":"Kanjirangat, V., Gupta, D.: Investigating the impact of combined similarity metrics and POS tagging in extrinsic text plagiarism detection system. In: Proceedings International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1578\u20131584 (2015). \nhttps:\/\/doi.org\/10.1109\/ICACCI.2015.7275838","DOI":"10.1109\/ICACCI.2015.7275838"},{"issue":"5","key":"68_CR19","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/ICACCI.2015.7275838","volume":"9","author":"V Kanjirangat","year":"2016","unstructured":"Kanjirangat, V., Gupta, D.: Study on extrinsic text plagiarism detection techniques and tools. J. Eng. Sci. Technol. Rev. 9(5), 9\u201323 (2016). \nhttps:\/\/doi.org\/10.1109\/ICACCI.2015.7275838","journal-title":"J. Eng. Sci. Technol. Rev."},{"key":"68_CR20","doi-asserted-by":"publisher","unstructured":"Lau, J.H., Baldwin, T.: An empirical evaluation of doc2vec with practical insights into document embedding generation. In: Proceedings Workshop on Representation Learning for NLP (2016). \nhttps:\/\/doi.org\/10.18653\/v1\/w16-1609","DOI":"10.18653\/v1\/w16-1609"},{"key":"68_CR21","unstructured":"Le, Q., Mikolov, T.: Distributed representations of sentences and documents. In: Proceedings 31st International Confernce on Machine Learning, vol. 32, pp. 1188\u20131196 (2014)"},{"key":"68_CR22","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1007\/978-3-319-05170-3_47","volume-title":"Recent Advances on Hybrid Approaches for Designing Intelligent Systems","author":"Q Madera","year":"2014","unstructured":"Madera, Q., Garc\u00eda-Valdez, M., Mancilla, A.: Ad text optimization using interactive evolutionary computation techniques. In: Castillo, O., Melin, P., Pedrycz, W., Kacprzyk, J. (eds.) Recent Advances on Hybrid Approaches for Designing Intelligent Systems. SCI, vol. 547, pp. 671\u2013680. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-05170-3_47"},{"key":"68_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-3242-6","volume-title":"Generalized Linear Models","author":"P McCullagh","year":"1989","unstructured":"McCullagh, P., Nelder, J.: Generalized Linear Models, 2nd edn. Chapman & Hall, Boca Raton (1989)","edition":"2"},{"issue":"1","key":"68_CR24","doi-asserted-by":"publisher","first-page":"50","DOI":"10.5281\/zenodo.3482941","volume":"9","author":"N Meuschke","year":"2013","unstructured":"Meuschke, N., Gipp, B.: State of the art in detecting academic plagiarism. Int. J. Educ. Integr. 9(1), 50\u201371 (2013). \nhttps:\/\/doi.org\/10.5281\/zenodo.3482941","journal-title":"Int. J. Educ. Integr."},{"key":"68_CR25","doi-asserted-by":"publisher","unstructured":"Meuschke, N., Gondek, C., Seebacher, D., Breitinger, C., Keim, D., Gipp, B.: An adaptive image-based plagiarism detection approach. In: Proceedings 18th ACM\/IEEE Joint Conference on Digital Libraries (JCDL), pp. 131\u2013140 (2018). \nhttps:\/\/doi.org\/10.1145\/3197026.3197042","DOI":"10.1145\/3197026.3197042"},{"key":"68_CR26","doi-asserted-by":"publisher","unstructured":"Meuschke, N., Schubotz, M., Hamborg, F., Skopal, T., Gipp, B.: Analyzing mathematical content to detect academic plagiarism. In: Proceedings ACM Conference on Information and Knowledge Management (CIKM), pp. 2211\u20132214 (2017). \nhttps:\/\/doi.org\/10.1145\/3132847.3133144","DOI":"10.1145\/3132847.3133144"},{"key":"68_CR27","doi-asserted-by":"publisher","unstructured":"Meuschke, N., Siebeck, N., Schubotz, M., Gipp, B.: Analyzing semantic concept patterns to detect academic plagiarism. In: Proceedings International Workshop on Mining Scientific Publications (WOSP) at the 17th ACM\/IEEE Joint Conference on Digital Libraries (JCDL), pp. 46\u201353 (2017). \nhttps:\/\/doi.org\/10.1145\/3127526.3127535","DOI":"10.1145\/3127526.3127535"},{"key":"68_CR28","doi-asserted-by":"publisher","unstructured":"Meuschke, N., Stange, V., Schubotz, M., Gipp, B.: HyPlag: a hybrid approach to academic plagiarism detection. In: Proceedings 41st International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 1321\u20131324 (2018). \nhttps:\/\/doi.org\/10.1145\/3209978.3210177","DOI":"10.1145\/3209978.3210177"},{"key":"68_CR29","doi-asserted-by":"publisher","unstructured":"Meuschke, N., Stange, V., Schubotz, M., Kramer, M., Gipp, B.: Improving academic plagiarism detection for stem documents by analyzing mathematical content and citations. In: Proceedings ACM\/IEEE Joint Conference on Digital Libraries (JCDL), pp. 120\u2013129 (2019). \nhttps:\/\/doi.org\/10.1109\/JCDL.2019.00026","DOI":"10.1109\/JCDL.2019.00026"},{"key":"68_CR30","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. In: Proceedings Workshop Track 1st International Conference on Learning Representations (ICLR) (2013)"},{"key":"68_CR31","unstructured":"Mikolov, T., Sutskever, I., Chen, K., Corrado, G.S., Dean, J.: Distributed representations of words and phrases and their compositionality. In: Proceedings 27th Conference on Neural Information Processing Systems (NIPS), pp. 3111\u20133119 (2013)"},{"key":"68_CR32","unstructured":"Mitchell, T.M.: Machine learning. International Edition. McGraw-Hill, New York (1997)"},{"issue":"2","key":"68_CR33","first-page":"246","volume":"13","author":"M Mohebbi","year":"2016","unstructured":"Mohebbi, M., Talebpour, A.: Texts semantic similarity detection based graph approach. Int. Arab. J. Inf. Technol. 13(2), 246\u2013251 (2016)","journal-title":"Int. Arab. J. Inf. Technol."},{"key":"68_CR34","doi-asserted-by":"publisher","unstructured":"Pennington, J., Socher, R., Manning, C.D.: GloVe: global vectors for word representation. In: Proceedings Conference on Empirical Methods in Natural Language Processing (EMNLP), vol. 14, pp. 1532\u20131543 (2014). \nhttps:\/\/doi.org\/10.3115\/v1\/D14-1162","DOI":"10.3115\/v1\/D14-1162"},{"key":"68_CR35","unstructured":"Perone, C.S., Silveira, R., Paula, T.S.: Evaluation of sentence embeddings in downstream and linguistic probing tasks. arXiv abs\/1806.06259 (2018)"},{"key":"68_CR36","doi-asserted-by":"publisher","unstructured":"Peters, M., et al.: Deep contextualized word representations. In: Proceedings Conference of the North American Chapter of the Association for Computational Linguistics (2018). \nhttps:\/\/doi.org\/10.18653\/v1\/n18-1202","DOI":"10.18653\/v1\/n18-1202"},{"issue":"1","key":"68_CR37","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s40979-018-0036-7","volume":"14","author":"FM Prentice","year":"2018","unstructured":"Prentice, F.M., Kinden, C.E.: Paraphrasing tools, language translation tools and plagiarism: an exploratory study. Int. J. Educ. Integr. 14(1), 11 (2018). \nhttps:\/\/doi.org\/10.1007\/s40979-018-0036-7","journal-title":"Int. J. Educ. Integr."},{"key":"68_CR38","unstructured":"Roberts, K.: Assessing the corpus size vs. similarity trade-off for word embeddings in clinical NLP. In: Proceedings Workshop on Clinical NLP, pp. 54\u201363 (2016)"},{"issue":"1","key":"68_CR39","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s40979-016-0013-y","volume":"13","author":"AM Rogerson","year":"2017","unstructured":"Rogerson, A.M., McCarthy, G.: Using Internet based paraphrasing tools: original work, patchwriting or facilitated plagiarism? Int. J. Educ. Integr. 13(1), 2 (2017). \nhttps:\/\/doi.org\/10.1007\/s40979-016-0013-y","journal-title":"Int. J. Educ. Integr."},{"key":"68_CR40","unstructured":"Shaoul, C., Westbury, C.: The Westbury Lab Wikipedia Corpus (2010). \nhttp:\/\/www.psych.ualberta.ca\/~westburylab\/downloads\/westburylab.wikicorp.download.html"},{"key":"68_CR41","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.inffus.2015.05.006","volume":"27","author":"JD Vel\u00e1squez","year":"2016","unstructured":"Vel\u00e1squez, J.D., Covacevich, Y., Molina, F., Marrese-Taylor, E., Rodr\u00edguez, C., Bravo-Marquez, F.: DOCODE 3.0 (DOcument COpy DEtector): a system for plagiarism detection by applying an information fusion process from multiple documental data sources. Inform. Fusion 27, 64\u201375 (2016). \nhttps:\/\/doi.org\/10.1016\/j.inffus.2015.05.006","journal-title":"Inform. Fusion"},{"key":"68_CR42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39961-9","volume-title":"False Feathers","author":"D Weber-Wulff","year":"2014","unstructured":"Weber-Wulff, D.: False Feathers. Springer, Berlin Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-642-39961-9"},{"key":"68_CR43","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1038\/d41586-019-00893-5","volume":"567","author":"D Weber-Wulff","year":"2019","unstructured":"Weber-Wulff, D.: Plagiarism detectors are a crutch, and a problem. Nature 567, 435 (2019). \nhttps:\/\/doi.org\/10.1038\/d41586-019-00893-5","journal-title":"Nature"},{"key":"68_CR44","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-319-17530-0_21","volume-title":"Intelligent Software Methodologies, Tools and Techniques","author":"T Yokoi","year":"2015","unstructured":"Yokoi, T.: Sentence-based plagiarism detection for Japanese document based on common nouns and part-of-speech structure. In: Fujita, H., Selamat, A. (eds.) SoMeT 2014. CCIS, vol. 513, pp. 297\u2013308. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-17530-0_21"},{"key":"68_CR45","doi-asserted-by":"publisher","unstructured":"Zhang, Q., Wang, D.Y., Voelker, G.M.: DSpin: detecting automatically spun content on the web. In: Proceedings Network and Distributed System Security (NDSS) Symposium, pp. 23\u201326 (2014). \nhttps:\/\/doi.org\/10.14722\/ndss.2014.23004","DOI":"10.14722\/ndss.2014.23004"}],"container-title":["Lecture Notes in Computer Science","Sustainable Digital Communities"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-43687-2_68","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,19]],"date-time":"2020-03-19T00:19:36Z","timestamp":1584577176000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-43687-2_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030436865","9783030436872"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-43687-2_68","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"19 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"iConference","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Boras","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 March 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 March 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconference2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ischools.org\/iConference\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfTool","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"178","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.8","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}