{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T06:24:14Z","timestamp":1761805454915,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030582005"},{"type":"electronic","value":"9783030582012"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58201-2_6","type":"book-chapter","created":{"date-parts":[[2020,9,13]],"date-time":"2020-09-13T23:02:29Z","timestamp":1600038149000},"page":"78-91","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Improving Big Data Clustering for Jamming Detection in Smart Mobility"],"prefix":"10.1007","author":[{"given":"Hind","family":"Bangui","sequence":"first","affiliation":[]},{"given":"Mouzhi","family":"Ge","sequence":"additional","affiliation":[]},{"given":"Barbora","family":"Buhnova","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,14]]},"reference":[{"issue":"1","key":"6_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/10630732.2014.942092","volume":"22","author":"V Albino","year":"2015","unstructured":"Albino, V., Berardi, U., Dangelico, R.M.: Smart cities: definitions, dimensions, performance, and initiatives. J. Urban Technol. 22(1), 3\u201321 (2015)","journal-title":"J. Urban Technol."},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Bangui, H., Ge, M., Buhnova, B.: Exploring big data clustering algorithms for Internet of Things applications. In: IoTBDS, pp. 269\u2013276 (2018)","DOI":"10.5220\/0006773402690276"},{"issue":"2","key":"6_CR3","doi-asserted-by":"publisher","first-page":"16","DOI":"10.4018\/IJOCI.2019040102","volume":"9","author":"H Bangui","year":"2019","unstructured":"Bangui, H., Ge, M., Buhnova, B.: A research roadmap of big data clustering algorithms for future internet of things. Int. J. Organ. Collective Intell. 9(2), 16\u201330 (2019)","journal-title":"Int. J. Organ. Collective Intell."},{"issue":"1","key":"6_CR4","doi-asserted-by":"publisher","first-page":"19","DOI":"10.3233\/ICA-130445","volume":"21","author":"T Cheng","year":"2014","unstructured":"Cheng, T., Li, P., Zhu, S., Torrieri, D.: M-cluster and x-ray: two methods for multi-jammer localization in wireless sensor networks. Integr. Comput.-Aided Eng. 21(1), 19\u201334 (2014)","journal-title":"Integr. Comput.-Aided Eng."},{"issue":"1","key":"6_CR5","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1109\/COMST.2016.2611524","volume":"19","author":"C Cooper","year":"2016","unstructured":"Cooper, C., Franklin, D., Ros, M., Safaei, F., Abolhasan, M.: A comparative survey of VANET clustering techniques. IEEE Commun. Surv. Tutor. 19(1), 657\u2013681 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"3","key":"6_CR6","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1007\/s11277-015-2817-0","volume":"85","author":"CV Cordero","year":"2015","unstructured":"Cordero, C.V., Lisser, A.: Jamming attacks reliable prevention in a clustered wireless sensor network. Wirel. Pers. Commun. 85(3), 925\u2013936 (2015)","journal-title":"Wirel. Pers. Commun."},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"15679","DOI":"10.1109\/ACCESS.2018.2815989","volume":"6","author":"TS Darwish","year":"2018","unstructured":"Darwish, T.S., Bakar, K.A.: Fog based intelligent transportation big data analytics in the internet of vehicles environment: motivations, architecture, challenges, and critical issues. IEEE Access 6, 15679\u201315701 (2018)","journal-title":"IEEE Access"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"119771","DOI":"10.1016\/j.techfore.2019.119771","volume":"149","author":"P Del Vecchio","year":"2019","unstructured":"Del Vecchio, P., Secundo, G., Maruccia, Y., Passiante, G.: A system dynamic approach for the smart mobility of people: implications in the age of big data. Technol. Forecast. Soc. Change 149, 119771 (2019)","journal-title":"Technol. Forecast. Soc. Change"},{"key":"6_CR9","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-030-24513-9_6","volume-title":"Toward Social Internet of Things (SIoT): Enabling Technologies, Architectures and Applications","author":"DM El-Din","year":"2020","unstructured":"El-Din, D.M., Hassanien, A.E., Hassanien, E.E.: Information integrity for multi-sensors data fusion in smart mobility. In: Hassanien, A.E., Bhatnagar, R., Khalifa, N.E.M., Taha, M.H.N. (eds.) Toward Social Internet of Things (SIoT): Enabling Technologies, Architectures and Applications. SCI, vol. 846, pp. 99\u2013121. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-24513-9_6"},{"key":"6_CR10","series-title":"Studies in Systems, Decision and Control","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-030-22773-9_1","volume-title":"Emerging Technologies for Connected Internet of Vehicles and Intelligent Transportation System Networks","author":"M Elhoseny","year":"2020","unstructured":"Elhoseny, M., Shankar, K.: Energy efficient optimal routing for communication in VANETs via clustering model. In: Elhoseny, M., Hassanien, A.E. (eds.) Emerging Technologies for Connected Internet of Vehicles and Intelligent Transportation System Networks. SSDC, vol. 242, pp. 1\u201314. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-22773-9_1"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Feldman, D., Schmidt, M., Sohler, C.: Turning big data into tiny data: constant-size coresets for k-means, PCA and projective clustering. In: Proceedings of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 1434\u20131453. Society for Industrial and Applied Mathematics (2013)","DOI":"10.1137\/1.9781611973105.103"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Feldman, D., Sugaya, A., Rus, D.: An effective coreset compression algorithm for large scale sensor networks. In: 2012 ACM\/IEEE 11th International Conference on Information Processing in Sensor Networks (IPSN), pp. 257\u2013268. IEEE (2012)","DOI":"10.1109\/IPSN.2012.6920941"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Feldman, D., Sung, C., Rus, D.: The single pixel GPS: learning big data signals from tiny coresets. In: Proceedings of the 20th International Conference on Advances in Geographic Information Systems, pp. 23\u201332. ACM (2012)","DOI":"10.1145\/2424321.2424325"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Feldman, D., Xiang, C., Zhu, R., Rus, D.: Coresets for differentially private k-means clustering and applications to privacy in mobile sensor networks. In: 2017 16th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN), pp. 3\u201316. IEEE (2017)","DOI":"10.1145\/3055031.3055090"},{"issue":"1","key":"6_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-016-0528-1","volume":"2016","author":"P Ganeshkumar","year":"2016","unstructured":"Ganeshkumar, P., Vijayakumar, K.P., Anandaraj, M.: A novel jammer detection framework for cluster-based wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2016(1), 1\u201325 (2016). https:\/\/doi.org\/10.1186\/s13638-016-0528-1","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1016\/j.future.2018.04.053","volume":"87","author":"M Ge","year":"2018","unstructured":"Ge, M., Bangui, H., Buhnova, B.: Big data for Internet of Things: a survey. Future Gener. Comput. Syst. 87, 601\u2013614 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Han, J.H., Shin, Y.S., Lee, S.H.: Smart mobility creating smart space: 3D smart aquarium bus. In: 2019 IEEE Transportation Electrification Conference and Expo, pp. 1\u20135. IEEE (2019)","DOI":"10.1109\/ITEC-AP.2019.8903632"},{"key":"6_CR18","doi-asserted-by":"publisher","unstructured":"Har-Peled, S., Mazumdar, S.: On coresets for k-means and k-median clustering. In: Proceedings of the Thirty-sixth Annual ACM Symposium on Theory of Computing, pp. 291\u2013300. STOC 2004. ACM, New York (2004). https:\/\/doi.org\/10.1145\/1007352.1007400. http:\/\/doi.acm.org\/10.1145\/1007352.1007400","DOI":"10.1145\/1007352.1007400"},{"key":"6_CR19","first-page":"7","volume":"7","author":"H Hasrouny","year":"2017","unstructured":"Hasrouny, H., Samhat, A.E., Bassil, C., Laouiti, A.: VANet security challenges and solutions: a survey. Veh. Commun. 7, 7\u201320 (2017)","journal-title":"Veh. Commun."},{"issue":"2","key":"6_CR20","first-page":"35","volume":"2","author":"Y Hernafi","year":"2019","unstructured":"Hernafi, Y., Ahmed, M.B., Bouhorma, M.: Smart mobility and driver behavior correlated with vehicular networks under a social perception in smart cities. Int. J. Inf. Sci. Technol. 2(2), 35\u201347 (2019)","journal-title":"Int. J. Inf. Sci. Technol."},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Ikem, C.: Users as programmers: developing a vehicular interface notation for older users of smart vehicles. In: Proceedings of the 1st ACM Workshop on Emerging Smart Technologies and Infrastructures for Smart Mobility and Sustainability, pp. 15\u201319. ACM (2019)","DOI":"10.1145\/3349622.3355454"},{"issue":"1","key":"6_CR22","doi-asserted-by":"publisher","first-page":"30","DOI":"10.21467\/ias.8.1.30-37","volume":"8","author":"RU Kalkundri","year":"2020","unstructured":"Kalkundri, R.U., Khanai, R., Praveen, K.: Survey on security for WSN based VANET using ECC. Int. Ann. Sci. 8(1), 30\u201337 (2020)","journal-title":"Int. Ann. Sci."},{"key":"6_CR23","first-page":"56","volume":"13","author":"D Karagiannis","year":"2018","unstructured":"Karagiannis, D., Argyriou, A.: Jamming attack detection in a pair of RF communicating vehicles using unsupervised machine learning. Veh. Commun. 13, 56\u201363 (2018)","journal-title":"Veh. Commun."},{"issue":"1","key":"6_CR24","doi-asserted-by":"publisher","first-page":"3053","DOI":"10.1038\/s41598-019-39459-w","volume":"9","author":"B Karmakar","year":"2019","unstructured":"Karmakar, B., Das, S., Bhattacharya, S., Sarkar, R., Mukhopadhyay, I.: Tight clustering for large datasets with an application to gene expression data. Sci. Rep. 9(1), 3053 (2019)","journal-title":"Sci. Rep."},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Katto, J., Takeuchi, M., Kanai, K., Sun, H.: Road infrastructure monitoring system using e-bikes and its extensions for smart community. In: Proceedings of the 1st ACM Workshop on Emerging Smart Technologies and Infrastructures for Smart Mobility and Sustainability, pp. 43\u201344. ACM (2019)","DOI":"10.1145\/3349622.3355455"},{"key":"6_CR26","unstructured":"Kosmanos, D., Karagiannis, D., Argyriou, A., Lalis, S., Maglaras, L.: RF jamming classification using relative speed estimation in vehicular wireless networks. arXiv preprint (2018). arXiv:1812.11886"},{"key":"6_CR27","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1016\/j.asoc.2018.12.001","volume":"75","author":"J Liang","year":"2019","unstructured":"Liang, J., Chen, J., Zhu, Y., Yu, R.: A novel intrusion detection system for vehicular ad hoc networks (VANETs) based on differences of traffic flow and position. Appl. Soft Comput. 75, 712\u2013727 (2019)","journal-title":"Appl. Soft Comput."},{"issue":"5","key":"6_CR28","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1109\/LCOMM.2018.2815018","volume":"22","author":"X Liu","year":"2018","unstructured":"Liu, X., Xu, Y., Jia, L., Wu, Q., Anpalagan, A.: Anti-jamming communications using spectrum waterfall: a deep reinforcement learning approach. IEEE Commun. Lett. 22(5), 998\u20131001 (2018)","journal-title":"IEEE Commun. Lett."},{"key":"6_CR29","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-030-16187-3_35","volume-title":"New Knowledge in Information Systems and Technologies","author":"A Matos","year":"2019","unstructured":"Matos, A., Pinto, B., Barros, F., Martins, S., Martins, J., Au-Yong-Oliveira, M.: Smart cities and smart tourism: what future do they bring? In: Rocha, \u00c1., Adeli, H., Reis, L.P., Costanzo, S. (eds.) WorldCIST\u201919 2019. AISC, vol. 932, pp. 358\u2013370. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-16187-3_35"},{"key":"6_CR30","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.peva.2015.01.003","volume":"87","author":"L Mokdad","year":"2015","unstructured":"Mokdad, L., Ben-Othman, J., Nguyen, A.T.: DJAVAN: detecting jamming attacks in vehicle ad hoc networks. Perform. Eval. 87, 47\u201359 (2015)","journal-title":"Perform. Eval."},{"issue":"5","key":"6_CR31","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MCOM.2017.1600263","volume":"55","author":"Z Ning","year":"2017","unstructured":"Ning, Z., Xia, F., Ullah, N., Kong, X., Hu, X.: Vehicular social networks: enabling smart mobility. IEEE Commun. Mag. 55(5), 16\u201355 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"6","key":"6_CR32","doi-asserted-by":"publisher","first-page":"1691","DOI":"10.3390\/s18061691","volume":"18","author":"O Osanaiye","year":"2018","unstructured":"Osanaiye, O., Alfa, A., Hancke, G.: A statistical approach to detect jamming attacks in wireless sensor networks. Sensors 18(6), 1691 (2018)","journal-title":"Sensors"},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"Pang, L., Chen, X., Shi, Y., Xue, Z., Khatoun, R.: Localization of multiple jamming attackers in vehicular ad hoc network. Int. J. Distrib. Sens. Netw. 13(8) (2017)","DOI":"10.1177\/1550147717725698"},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"Pang, L., Guo, P., Chen, X., Li, J., Xue, Z.: Estimating the number of multiple jamming attackers in vehicular ad hoc network. In: 2017 6th International Conference on Computer Science and Network Technology (ICCSNT), pp. 366\u2013370. IEEE (2017)","DOI":"10.1109\/ICCSNT.2017.8343720"},{"key":"6_CR35","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.future.2018.11.043","volume":"94","author":"J Pereira","year":"2019","unstructured":"Pereira, J., Ricardo, L., Lu\u00eds, M., Senna, C., Sargento, S.: Assessing the reliability of fog computing for smart mobility applications in VANETs. Future Gener. Comput. Syst. 94, 317\u2013332 (2019)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"6_CR36","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1109\/TVT.2014.2325831","volume":"64","author":"O Punal","year":"2014","unstructured":"Punal, O., Pereira, C., Aguiar, A., Gross, J.: Experimental characterization and modeling of RF jamming attacks on VANETs. IEEE Trans. Veh. Technol. 64(2), 524\u2013540 (2014)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"6_CR37","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.eswa.2018.03.052","volume":"105","author":"F Ros","year":"2018","unstructured":"Ros, F., Guillaume, S.: ProTras: a probabilistic traversing sampling algorithm. Exp. Syst. Appl. 105, 65\u201376 (2018). https:\/\/doi.org\/10.1016\/j.eswa.2018.03.052","journal-title":"Exp. Syst. Appl."},{"key":"6_CR38","doi-asserted-by":"crossref","unstructured":"\u0160emanjski, I., Mand\u017euka, S., Gautama, S.: Smart mobility. In: 2018 International Symposium ELMAR, pp. 63\u201366. IEEE (2018)","DOI":"10.23919\/ELMAR.2018.8534693"},{"key":"6_CR39","series-title":"Internet of Things","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-030-18732-3_3","volume-title":"Digital Twin Technologies and Smart Cities","author":"P Seuwou","year":"2020","unstructured":"Seuwou, P., Banissi, E., Ubakanma, G.: The future of mobility with connected and autonomous vehicles in smart cities. In: Farsi, M., Daneshkhah, A., Hosseinian-Far, A., Jahankhani, H. (eds.) Digital Twin Technologies and Smart Cities. IT, pp. 37\u201352. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-18732-3_3"},{"key":"6_CR40","doi-asserted-by":"crossref","unstructured":"Solmaz, G., et al.: Learn from IoT: pedestrian detection and intention prediction for autonomous driving. In: Proceedings of the 1st ACM Workshop on Emerging Smart Technologies and Infrastructures for Smart Mobility and Sustainability, pp. 27\u201332. ACM (2019)","DOI":"10.1145\/3349622.3355446"},{"key":"6_CR41","doi-asserted-by":"crossref","unstructured":"Trang, L.H., Bangui, H., Ge, M., Buhnova, B.: Scaling big data applications in smart city with coresets. In: Proceedings of the 8th International Conference on Data Science, Technology and Applications. Prague, Czech Republic (2019)","DOI":"10.5220\/0007958803570363"},{"issue":"5","key":"6_CR42","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1177\/0042098013494427","volume":"51","author":"A Vanolo","year":"2014","unstructured":"Vanolo, A.: Smartmentality: the smart city as disciplinary strategy. Urban Stud. 51(5), 883\u2013898 (2014)","journal-title":"Urban Stud."},{"key":"6_CR43","doi-asserted-by":"crossref","unstructured":"Zaffiro, G., Marone, G.: Smart mobility: new roles for telcos in the emergence of electric and autonomous vehicles. In: 2019 AEIT International Conference of Electrical and Electronic Technologies for Automotive (AEIT AUTOMOTIVE), pp. 1\u20135. IEEE (2019)","DOI":"10.23919\/EETA.2019.8804575"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58201-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T00:05:58Z","timestamp":1726272358000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58201-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030582005","9783030582012"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58201-2_6","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sec2020.um.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.88","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.14","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}