{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T21:05:15Z","timestamp":1762376715518,"version":"3.40.3"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030457778"},{"type":"electronic","value":"9783030457785"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-45778-5_8","type":"book-chapter","created":{"date-parts":[[2020,4,19]],"date-time":"2020-04-19T17:02:34Z","timestamp":1587315754000},"page":"99-116","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Denoising Adversarial Autoencoder for Obfuscated Traffic Detection and Recovery"],"prefix":"10.1007","author":[{"given":"Ola","family":"Salman","sequence":"first","affiliation":[]},{"given":"Imad H.","family":"Elhajj","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Kayssi","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"key":"8_CR1","unstructured":"dpkt. https:\/\/dpkt.readthedocs.io\/en\/latest\/. Accessed 2019"},{"key":"8_CR2","unstructured":"tensorflow. https:\/\/www.tensorflow.org\/. Accessed 2019"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Alom, M.Z., Taha, T.M.: Network intrusion detection for cyber security using unsupervised deep learning approaches. In: 2017 IEEE National Aerospace and Electronics Conference (NAECON), pp. 63\u201369. IEEE (2017)","DOI":"10.1109\/NAECON.2017.8268746"},{"issue":"1","key":"8_CR4","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MSEC.2019.2894917","volume":"17","author":"SAH Baddar","year":"2019","unstructured":"Baddar, S.A.H., Merlo, A., Migliardi, M.: Behavioral-anomaly detection in forensics analysis. IEEE Secur. Privacy 17(1), 55\u201362 (2019)","journal-title":"IEEE Secur. Privacy"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Beggel, L., Pfeiffer, M., Bischl, B.: Robust anomaly detection in images using adversarial autoencoders. arXiv preprint arXiv:1901.06355 (2019)","DOI":"10.1007\/978-3-030-46150-8_13"},{"issue":"2","key":"8_CR6","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2015","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutorials 18(2), 1153\u20131176 (2015)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"8_CR7","doi-asserted-by":"publisher","unstructured":"Qu, B., Zhang, Z., Guo, L., Zhu, X., Guo, L., Meng, D.: An empirical study of morphing on network traffic classification. In: 7th International Conference on Communications and Networking in China, pp. 227\u2013232, August 2012. https:\/\/doi.org\/10.1109\/ChinaCom.2012.6417481","DOI":"10.1109\/ChinaCom.2012.6417481"},{"issue":"3","key":"8_CR8","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/SURV.2009.090304","volume":"11","author":"AC Callado","year":"2009","unstructured":"Callado, A.C., et al.: A survey on internet traffic identification. IEEE Commun. Surv. Tutorials 11(3), 37\u201352 (2009)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"8_CR9","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-662-45670-5_8","volume-title":"Applications and Techniques in Information Security","author":"Z Cao","year":"2014","unstructured":"Cao, Z., Xiong, G., Zhao, Y., Li, Z., Guo, L.: A survey on encrypted traffic classification. In: Batten, L., Li, G., Niu, W., Warren, M. (eds.) ATIS 2014. CCIS, vol. 490, pp. 73\u201381. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45670-5_8"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Faruki, P.: Network intrusion detection for IoT security based on learning techniques. IEEE Commun. Surv. Tutorials 21, 2671\u20132701 (2019)","DOI":"10.1109\/COMST.2019.2896380"},{"key":"8_CR11","doi-asserted-by":"publisher","unstructured":"Chaddad, L., Chehab, A., Elhajj, I.H., Kayssi, A.: App traffic mutation: toward defending against mobile statistical traffic analysis. In: IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 27\u201332, April 2018. https:\/\/doi.org\/10.1109\/INFCOMW.2018.8406899","DOI":"10.1109\/INFCOMW.2018.8406899"},{"key":"8_CR12","doi-asserted-by":"publisher","unstructured":"Chaddad, L., Chehab, A., Elhajj, I.H., Kayssi, A.: Mobile traffic anonymization through probabilistic distribution. In: 2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), pp. 242\u2013248, February 2019. https:\/\/doi.org\/10.1109\/ICIN.2019.8685871","DOI":"10.1109\/ICIN.2019.8685871"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Chalapathy, R., Chawla, S.: Deep learning for anomaly detection: A survey. arXiv preprint arXiv:1901.03407 (2019)","DOI":"10.1145\/3394486.3406704"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Chen, Z., He, K., Li, J., Geng, Y.: Seq2Img: a sequence-to-image based approach towards IP traffic classification using convolutional neural networks. In: 2017 IEEE International Conference on Big Data (Big Data), pp. 1271\u20131276. IEEE (2017)","DOI":"10.1109\/BigData.2017.8258054"},{"key":"8_CR15","doi-asserted-by":"publisher","unstructured":"Cheng, T., Lin, Y., Lai, Y., Lin, P.: Evasion techniques: sneaking through your intrusion detection\/prevention systems. IEEE Commun. Surv. Tutorials 14(4), 1011\u20131020 (2012). https:\/\/doi.org\/10.1109\/SURV.2011.092311.00082","DOI":"10.1109\/SURV.2011.092311.00082"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.comnet.2019.01.023","volume":"151","author":"KA da Costa","year":"2019","unstructured":"da Costa, K.A., Papa, J.P., Lisboa, C.O., Munoz, R., de Albuquerque, V.H.C.: Internet of things: a survey on machine learning-based intrusion detection approaches. Comput. Netw. 151, 147\u2013157 (2019)","journal-title":"Comput. Netw."},{"issue":"4","key":"8_CR17","doi-asserted-by":"publisher","first-page":"968","DOI":"10.1109\/TNNLS.2018.2852738","volume":"30","author":"A Creswell","year":"2018","unstructured":"Creswell, A., Bharath, A.A.: Denoising adversarial autoencoders. IEEE Trans. Neural Netw. Learn. Syst. 30(4), 968\u2013984 (2018)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"1","key":"8_CR18","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MNET.2012.6135854","volume":"26","author":"A Dainotti","year":"2012","unstructured":"Dainotti, A., Pescape, A., Claffy, K.C.: Issues and future directions in traffic classification. IEEE Netw. 26(1), 35\u201340 (2012)","journal-title":"IEEE Netw."},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-10925-7_1","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"L Deecke","year":"2019","unstructured":"Deecke, L., Vandermeulen, R., Ruff, L., Mandt, S., Kloft, M.: Image anomaly detection with generative adversarial networks. In: Berlingerio, M., Bonchi, F., G\u00e4rtner, T., Hurley, N., Ifrim, G. (eds.) ECML PKDD 2018. LNCS (LNAI), vol. 11051, pp. 3\u201317. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-10925-7_1"},{"key":"8_CR20","doi-asserted-by":"publisher","unstructured":"Dyer, K.P., Coull, S.E., Ristenpart, T., Shrimpton, T.: Peek-a-boo, i still see you: why efficient traffic analysis countermeasures fail. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP 2012, pp. 332\u2013346. IEEE Computer Society, Washington, DC (2012). https:\/\/doi.org\/10.1109\/SP.2012.28","DOI":"10.1109\/SP.2012.28"},{"issue":"4","key":"8_CR21","doi-asserted-by":"publisher","first-page":"2432","DOI":"10.1109\/COMST.2017.2707140","volume":"19","author":"ZM Fadlullah","year":"2017","unstructured":"Fadlullah, Z.M., et al.: State-of-the-art deep learning: evolving machine intelligence toward tomorrow\u2019s intelligent network traffic control systems. IEEE Commun. Surv. Tutorials 19(4), 2432\u20132455 (2017)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"2","key":"8_CR22","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1109\/SURV.2013.100613.00161","volume":"16","author":"M Finsterbusch","year":"2013","unstructured":"Finsterbusch, M., Richter, C., Rocha, E., Muller, J.A., Hanssgen, K.: A survey of payload-based traffic classification approaches. IEEE Commun. Surv. Tutorials 16(2), 1135\u20131156 (2013)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"8_CR23","unstructured":"Ger, S., Klabjan, D.: Autoencoders and generative adversarial networks for anomaly detection for sequences. arXiv preprint arXiv:1901.02514 (2019)"},{"key":"8_CR24","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, pp. 2672\u20132680 (2014)"},{"key":"8_CR25","doi-asserted-by":"publisher","unstructured":"Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1), 20 (2019). https:\/\/doi.org\/10.1186\/s42400-019-0038-7","DOI":"10.1186\/s42400-019-0038-7"},{"key":"8_CR26","doi-asserted-by":"publisher","unstructured":"Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Future Gen. Comput. Syst. 100, 779\u2013796 (2019). https:\/\/doi.org\/10.1016\/j.future.2019.05.041, http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X18327687","DOI":"10.1016\/j.future.2019.05.041"},{"key":"8_CR27","unstructured":"Li, D., Chen, D., Goh, J., Ng, S.K.: Anomaly detection with generative adversarial networks for multivariate time series. arXiv preprint arXiv:1809.04758 (2018)"},{"key":"8_CR28","unstructured":"Lin, Z., Shi, Y., Xue, Z.: IDSGAN: generative adversarial networks for attack generation against intrusion detection. CoRR abs\/1809.02077 (2018). http:\/\/arxiv.org\/abs\/1809.02077"},{"key":"8_CR29","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1016\/j.knosys.2018.08.036","volume":"163","author":"H Liu","year":"2019","unstructured":"Liu, H., Lang, B., Liu, M., Yan, H.: CNN and RNN based payload classification methods for attack detection. Knowl.-Based Syst. 163, 332\u2013341 (2019)","journal-title":"Knowl.-Based Syst."},{"key":"8_CR30","unstructured":"Makhzani, A., Shlens, J., Jaitly, N., Goodfellow, I., Frey, B.: Adversarial autoencoders. arXiv preprint arXiv:1511.05644 (2015)"},{"key":"8_CR31","doi-asserted-by":"publisher","first-page":"1991","DOI":"10.1109\/ACCESS.2018.2886457","volume":"7","author":"M Munir","year":"2018","unstructured":"Munir, M., Siddiqui, S.A., Dengel, A., Ahmed, S.: DeepAnT: a deep learning approach for unsupervised anomaly detection in time series. IEEE Access 7, 1991\u20132005 (2018)","journal-title":"IEEE Access"},{"issue":"4","key":"8_CR32","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"TT Nguyen","year":"2008","unstructured":"Nguyen, T.T., Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Commun. Surv. Tutorials 10(4), 56\u201376 (2008)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"2","key":"8_CR33","doi-asserted-by":"publisher","first-page":"1988","DOI":"10.1109\/COMST.2018.2883147","volume":"21","author":"F Pacheco","year":"2018","unstructured":"Pacheco, F., Exposito, E., Gineste, M., Baudoin, C., Aguilar, J.: Towards the deployment of machine learning solutions in network traffic classification: a systematic survey. IEEE Commun. Surv. Tutorials 21(2), 1988\u20132014 (2018)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"8_CR34","doi-asserted-by":"crossref","unstructured":"Perrone, G., Vecchio, M., Pecori, R., Giaffreda, R.: The day after mirai: a survey on MQTT security solutions after the largest cyber-attack carried out through an army of IoT devices. In: IoTBDS, pp. 246\u2013253 (2017)","DOI":"10.5220\/0006287302460253"},{"key":"8_CR35","doi-asserted-by":"publisher","unstructured":"Qu, B., Zhang, Z., Zhu, X., Meng, D.: An empirical study of morphing on behavior-based network traffic classification. Secur. Commun. Netw. 8(1), 68\u201379 (2015). https:\/\/doi.org\/10.1002\/sec.755","DOI":"10.1002\/sec.755"},{"issue":"5","key":"8_CR36","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MCOM.2019.1800819","volume":"57","author":"S Rezaei","year":"2019","unstructured":"Rezaei, S., Liu, X.: Deep learning for encrypted traffic classification: an overview. IEEE Commun. Mag. 57(5), 76\u201381 (2019)","journal-title":"IEEE Commun. Mag."},{"key":"8_CR37","doi-asserted-by":"publisher","unstructured":"Rigaki, M., Garcia, S.: Bringing a GAN to a knife-fight: adapting malware communication to avoid detection. In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 70\u201375, May 2018. https:\/\/doi.org\/10.1109\/SPW.2018.00019","DOI":"10.1109\/SPW.2018.00019"},{"key":"8_CR38","doi-asserted-by":"publisher","unstructured":"Salman, O., Elhajj, I.H., Chehab, A., Kayssi, A.: A multi-level internet traffic classifier using deep learning. In: 2018 9th International Conference on the Network of the Future (NOF), pp. 68\u201375, November 2018. https:\/\/doi.org\/10.1109\/NOF.2018.8598055","DOI":"10.1109\/NOF.2018.8598055"},{"key":"8_CR39","unstructured":"Smit, D., Millar, K., Page, C., Cheng, A., Chew, H.G., Lim, C.C.: Looking deeper: using deep learning to identify internet communications traffic. In: 2017 Australasian Conference of Undergraduate Research (ACUR) (2017)"},{"key":"8_CR40","unstructured":"Tripathi, S., Lipton, Z.C., Nguyen, T.Q.: Correction by projection: denoising images with generative adversarial networks. arXiv preprint arXiv:1803.04477 (2018)"},{"issue":"1","key":"8_CR41","doi-asserted-by":"publisher","first-page":"e0180945","DOI":"10.1371\/journal.pone.0180945","volume":"13","author":"MF Umer","year":"2018","unstructured":"Umer, M.F., Sher, M., Bi, Y.: A two-stage flow-based intrusion detection model for next-generation networks. PLoS One 13(1), e0180945 (2018)","journal-title":"PLoS One"},{"key":"8_CR42","doi-asserted-by":"publisher","unstructured":"Verma, G., Ciftcioglu, E., Sheatsley, R., Chan, K., Scott, L.: Network traffic obfuscation: an adversarial machine learning approach. In: MILCOM 2018\u20132018 IEEE Military Communications Conference (MILCOM), pp. 1\u20136, October 2018. https:\/\/doi.org\/10.1109\/MILCOM.2018.8599680","DOI":"10.1109\/MILCOM.2018.8599680"},{"key":"8_CR43","doi-asserted-by":"publisher","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar, R., Alazab, M., Soman, K., Poornachandran, P., Al-Nemrat, A., Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access 7, 41525\u201341550 (2019)","journal-title":"IEEE Access"},{"key":"8_CR44","unstructured":"Vu, H.S., Ueta, D., Hashimoto, K., Maeno, K., Pranata, S., Shen, S.M.: Anomaly detection with adversarial dual autoencoders. arXiv preprint arXiv:1902.06924 (2019)"},{"key":"8_CR45","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhu, M., Wang, J., Zeng, X., Yang, Z.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 43\u201348. IEEE (2017)","DOI":"10.1109\/ISI.2017.8004872"},{"key":"8_CR46","doi-asserted-by":"crossref","unstructured":"Wang, X., Du, Y., Lin, S., Cui, P., Yang, Y.: Self-adversarial variational autoencoder with Gaussian anomaly prior distribution for anomaly detection. arXiv preprint arXiv:1903.00904 (2019)","DOI":"10.1016\/j.knosys.2019.105187"},{"key":"8_CR47","unstructured":"Warde-Farley, D., Bengio, Y.: Improving generative adversarial networks with denoising feature matching (2016)"},{"key":"8_CR48","doi-asserted-by":"publisher","first-page":"42210","DOI":"10.1109\/ACCESS.2019.2904620","volume":"7","author":"Y Xiao","year":"2019","unstructured":"Xiao, Y., Xing, C., Zhang, T., Zhao, Z.: An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7, 42210\u201342219 (2019)","journal-title":"IEEE Access"},{"key":"8_CR49","doi-asserted-by":"publisher","unstructured":"Fu, X., Graham, B., Bettati, R., Zhao, W.: On effectiveness of link padding for statistical traffic analysis attacks. In: 2003 Proceedings of 23rd International Conference on Distributed Computing Systems, pp. 340\u2013347, May 2003. https:\/\/doi.org\/10.1109\/ICDCS.2003.1203483","DOI":"10.1109\/ICDCS.2003.1203483"},{"key":"8_CR50","unstructured":"Zenati, H., Foo, C.S., Lecouat, B., Manek, G., Chandrasekhar, V.R.: Efficient GAN-based anomaly detection. arXiv preprint arXiv:1802.06222 (2018)"},{"key":"8_CR51","unstructured":"Zhang, H., Yu, X., Ren, P., Luo, C., Min, G.: Deep adversarial learning in intrusion detection: A data augmentation enhanced framework. CoRR abs\/1901.07949 (2019). http:\/\/arxiv.org\/abs\/1901.07949"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-45778-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T01:03:09Z","timestamp":1709427789000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-45778-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030457778","9783030457785"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-45778-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"20 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MLN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mln2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.adda-association.org\/mln\/Home.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"75","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}