{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:18:53Z","timestamp":1759335533707,"version":"3.40.3"},"publisher-location":"Cham","reference-count":57,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030584511"},{"type":"electronic","value":"9783030584528"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58452-8_20","type":"book-chapter","created":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T00:34:03Z","timestamp":1604363643000},"page":"333-350","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Privacy Preserving Structure-from-Motion"],"prefix":"10.1007","author":[{"given":"Marcel","family":"Geppert","sequence":"first","affiliation":[]},{"given":"Viktor","family":"Larsson","sequence":"additional","affiliation":[]},{"given":"Pablo","family":"Speciale","sequence":"additional","affiliation":[]},{"given":"Johannes L.","family":"Sch\u00f6nberger","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Pollefeys","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,3]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Conference on Computer and Communications Security (ACM CCS) (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"20_CR2","unstructured":"Agarwal, S., Mierle, K., et al.: Ceres solver. http:\/\/ceres-solver.org"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Andr\u00e9s, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: Conference on Computer & Communications Security (SIGSAC) (2013)","DOI":"10.1145\/2508859.2516735"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Aranda, M., L\u00f3pez-Nicol\u00e1s, G., Sag\u00fc\u00e9s, C.: Omnidirectional visual homing using the 1D trifocal tensor. In: International Conference on Robotics and Automation (ICRA) (2010)","DOI":"10.1109\/ROBOT.2010.5509132"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-540-73538-0_4","volume-title":"Data and Applications Security XXI","author":"CA Ardagna","year":"2007","unstructured":"Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location privacy protection through obfuscation-based techniques. In: Barker, S., Ahn, G.-J. (eds.) DBSec 2007. LNCS, vol. 4602, pp. 47\u201360. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73538-0_4"},{"key":"20_CR6","unstructured":"ARNav: Google AR Navigation (2019). https:\/\/ai.googleblog.com\/2019\/02\/using-global-localization-to-improve.html"},{"key":"20_CR7","unstructured":"ASA: Azure Spatial Anchors (2019). https:\/\/azure.microsoft.com\/en-us\/services\/spatial-anchors\/"},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1023\/A:1008362322190","volume":"12","author":"K \u00c5str\u00f6m","year":"2000","unstructured":"\u00c5str\u00f6m, K., Oskarsson, M.: Solutions and ambiguities of the structure and motion problem for 1D retinal vision. J. Math. Imaging Vis. 12, 121\u2013135 (2000)","journal-title":"J. Math. Imaging Vis."},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11744078_1","volume-title":"Computer Vision \u2013 ECCV 2006","author":"S Avidan","year":"2006","unstructured":"Avidan, S., Butman, M.: Blind vision. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) ECCV 2006, Part III. LNCS, vol. 3953, pp. 1\u201313. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11744078_1"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Avidan, S., Butman, M.: Efficient methods for privacy preserving face detection. In: Advances in Neural Information Processing Systems (2007)","DOI":"10.7551\/mitpress\/7503.003.0012"},{"key":"20_CR11","unstructured":"Dellaert, F., Stroupe, A.W.: Linear 2D localization and mapping for single and multiple robot scenarios. In: International Conference on Robotics and Automation (ICRA) (2002)"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: Symposium on Principles of Database Systems (2003)","DOI":"10.1145\/773153.773173"},{"key":"20_CR13","unstructured":"Dosovitskiy, A., Brox, T.: Generating images with perceptual similarity metrics based on deep networks. In: Advances in Neural Information Processing Systems (2016)"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Dosovitskiy, A., Brox, T.: Inverting visual representations with convolutional networks. In: Computer Vision and Pattern Recognition (CVPR) (2016)","DOI":"10.1109\/CVPR.2016.522"},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79228-4_1"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-642-03168-7_14","volume-title":"Privacy Enhancing Technologies","author":"Z Erkin","year":"2009","unstructured":"Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I., Toft, T.: Privacy-preserving face recognition. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 235\u2013253. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03168-7_14"},{"key":"20_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B Gedik","year":"2008","unstructured":"Gedik, B., Liu, L.: Protecting location privacy with personalized K-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7, 1\u201318 (2008)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"20_CR18","unstructured":"Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K., Naehrig, M., Wernsing, J.: Cryptonets: applying neural networks to encrypted data with high throughput and accuracy. In: International Conference on Machine Learning (2016)"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Kato, H., Harada, T.: Image reconstruction from bag-of-visual-words. In: Computer Vision and Pattern Recognition (CVPR) (2014)","DOI":"10.1109\/CVPR.2014.127"},{"key":"20_CR20","unstructured":"Kipman, A.: Azure Spatial Anchors approach to privacy and ethical design (2019). https:\/\/www.linkedin.com\/pulse\/azure-spatial-anchors-approach-privacy-ethical-design-alex-kipman\/"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Kukelova, Z., Heller, J., Fitzgibbon, A.W.: Efficient intersection of three quadrics and applications in computer vision. In: Computer Vision and Pattern Recognition (CVPR) (2016)","DOI":"10.1109\/CVPR.2016.199"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Lebeda, K., Matas, J., Chum, O.: Fixing the locally optimized RANSAC. In: British Machine Vision Conference (BMVC) (2012)","DOI":"10.5244\/C.26.95"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Mahendran, A., Vedaldi, A.: Understanding deep image representations by inverting them. In: Computer Vision and Pattern Recognition (CVPR) (2015)","DOI":"10.1109\/CVPR.2015.7299155"},{"key":"20_CR24","unstructured":"Nielsen, M.L.: Augmented Reality and its Impact on the Internet, Security, and Privacy (2015). https:\/\/beyondstandards.ieee.org\/augmented-reality\/augmented-reality-and-its-impact-on-the-internet-security-and-privacy\/"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Pittaluga, F., Koppal, S., Chakrabarti, A.: Learning privacy preserving encodings through adversarial training. In: Winter Conference on Applications of Computer Vision (WACV) (2019)","DOI":"10.1109\/WACV.2019.00089"},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"Pittaluga, F., Koppal, S., Kang, S.B., Sinha, S.N.: Revealing scenes by inverting structure from motion reconstructions. In: Computer Vision and Pattern Recognition (CVPR) (2019)","DOI":"10.1109\/CVPR.2019.00023"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Pittaluga, F., Koppal, S.J.: Privacy preserving optics for miniature vision sensors. In: Computer Vision and Pattern Recognition (CVPR) (2015)","DOI":"10.1109\/CVPR.2015.7298628"},{"key":"20_CR28","doi-asserted-by":"publisher","first-page":"2215","DOI":"10.1109\/TPAMI.2016.2637354","volume":"39","author":"F Pittaluga","year":"2017","unstructured":"Pittaluga, F., Koppal, S.J.: Pre-capture privacy for small vision sensors. Trans. Pattern Anal. Mach. Intell. (TPAMI) 39, 2215\u20132226 (2017)","journal-title":"Trans. Pattern Anal. Mach. Intell. (TPAMI)"},{"key":"20_CR29","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1109\/34.608285","volume":"19","author":"L Quan","year":"1997","unstructured":"Quan, L., Kanade, T.: Affine structure from line correspondences with uncalibrated affine cameras. Trans. Pattern Anal. Mach. Intell. (TPAMI) 19, 834\u2013845 (1997)","journal-title":"Trans. Pattern Anal. Mach. Intell. (TPAMI)"},{"key":"20_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/978-3-030-01246-5_38","volume-title":"Computer Vision \u2013 ECCV 2018","author":"Z Ren","year":"2018","unstructured":"Ren, Z., Lee, Y.J., Ryoo, M.S.: Learning to anonymize faces for privacy preserving action detection. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018, Part I. LNCS, vol. 11205, pp. 639\u2013655. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01246-5_38"},{"key":"20_CR31","unstructured":"Roesner, F.: Who Is Thinking About Security and Privacy for Augmented Reality? (2017). https:\/\/www.technologyreview.com\/s\/609143\/who-is-thinking-about-security-and-privacy-for-augmented-reality\/"},{"key":"20_CR32","doi-asserted-by":"crossref","unstructured":"Ryoo, M.S., Rothrock, B., Fleming, C., Yang, H.J.: Privacy-preserving human activity recognition from extreme low resolution. In: Proceedings of the Thirty-First Conference on Artificial Intelligence (AAAI) (2017)","DOI":"10.1609\/aaai.v31i1.11233"},{"key":"20_CR33","unstructured":"Sagues, C., Murillo, A., Guerrero, J.J., Goedem\u00e9, T., Tuytelaars, T., Gool, L.V.: Localization with omnidirectional images using the radial trifocal tensor. In: International Conference on Robotics and Automation (ICRA) (2006)"},{"key":"20_CR34","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13, 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"20_CR35","unstructured":"Scape: Scape Technologies (2019). https:\/\/scape.io\/"},{"key":"20_CR36","doi-asserted-by":"crossref","unstructured":"Sch\u00f6nberger, J.L., Frahm, J.M.: Structure-from-motion revisited. In: Computer Vision and Pattern Recognition (CVPR) (2016)","DOI":"10.1109\/CVPR.2016.445"},{"key":"20_CR37","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/LRA.2020.2967307","volume":"5","author":"A Shariati","year":"2020","unstructured":"Shariati, A., Holz, C., Sinha, S.: Towards privacy-preserving ego-motion estimation using an extremely low-resolution camera. IEEE Rob. Autom. Lett. (RAL) 5, 1223\u20131230 (2020)","journal-title":"IEEE Rob. Autom. Lett. (RAL)"},{"key":"20_CR38","doi-asserted-by":"crossref","unstructured":"Shashank, J., Kowshik, P., Srinathan, K., Jawahar, C.: Private content based image retrieval. In: Computer Vision and Pattern Recognition (CVPR) (2008)","DOI":"10.1109\/CVPR.2008.4587388"},{"key":"20_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1007\/3-540-45054-8_46","volume-title":"Computer Vision - ECCV 2000","author":"A Shashua","year":"2000","unstructured":"Shashua, A., Wolf, L.: On the structure and properties of the quadrifocal tensor. In: Vernon, D. (ed.) ECCV 2000, Part I. LNCS, vol. 1842, pp. 710\u2013724. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45054-8_46"},{"key":"20_CR40","unstructured":"Six.D AI: http:\/\/6d.ai\/ (2018)"},{"key":"20_CR41","doi-asserted-by":"crossref","unstructured":"Speciale, P., Sch\u00f6nberger, J.L., Kang, S.B., Sinha, S.N., Pollefeys, M.: Privacy preserving image-based localization. In: Computer Vision and Pattern Recognition (CVPR) (2019)","DOI":"10.1109\/CVPR.2019.00564"},{"key":"20_CR42","doi-asserted-by":"crossref","unstructured":"Speciale, P., Sch\u00f6nberger, J.L., Sinha, S.N., Pollefeys, M.: Privacy preserving image queries for camera localization. In: International Conference on Computer Vision (ICCV) (2019)","DOI":"10.1109\/ICCV.2019.00157"},{"key":"20_CR43","doi-asserted-by":"crossref","unstructured":"Strecha, C., von Hansen, W., Gool, L.V., Fua, P., Thoennessen, U.: On benchmarking camera calibration and multi-view stereo for high resolution imagery. In: Computer Vision and Pattern Recognition (CVPR) (2008)","DOI":"10.1109\/CVPR.2008.4587706"},{"key":"20_CR44","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty, Fuzziness Knowl. Based Syst. 10, 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty, Fuzziness Knowl. Based Syst."},{"key":"20_CR45","doi-asserted-by":"crossref","unstructured":"Upmanyu, M., Namboodiri, A.M., Srinathan, K., Jawahar, C.: Efficient privacy preserving video surveillance. In: International Conference on Computer Vision (ICCV) (2009)","DOI":"10.1109\/ICCV.2009.5459370"},{"key":"20_CR46","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/TIFS.2010.2043188","volume":"5","author":"M Upmanyu","year":"2010","unstructured":"Upmanyu, M., Namboodiri, A.M., Srinathan, K., Jawahar, C.: Blind authentication: a secure crypto-biometric verification protocol. IEEE Trans. Inf. Forensics Secur. 5, 255\u2013268 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"20_CR47","unstructured":"Vinje, J.E.: Privacy Manifesto for AR Cloud Solutions (2018). https:\/\/medium.com\/openarcloud\/privacy-manifesto-for-ar-cloud-solutions-9507543f50b6"},{"key":"20_CR48","doi-asserted-by":"crossref","unstructured":"Vondrick, C., Khosla, A., Malisiewicz, T., Torralba, A.: HOGgles: Visualizing object detection features. In: Computer Vision and Pattern Recognition (CVPR) (2013)","DOI":"10.1109\/ICCV.2013.8"},{"key":"20_CR49","unstructured":"VPS: Google Visual Positioning System (2018). https:\/\/www.engadget.com\/2018\/05\/08\/g\/"},{"key":"20_CR50","doi-asserted-by":"crossref","unstructured":"Wang, Z., Vineet, V., Pittaluga, F., Sinha, S., Cossairt, O., Kang, S.B.: Privacy-preserving action recognition using coded aperture videos. In: Computer Vision and Pattern Recognition (CVPR) Workshops (2019)","DOI":"10.1109\/CVPRW.2019.00007"},{"key":"20_CR51","doi-asserted-by":"crossref","unstructured":"Weinzaepfel, P., J\u00e9gou, H., P\u00e9rez, P.: Reconstructing an image from its local descriptors. In: Computer Vision and Pattern Recognition (CVPR) (2011)","DOI":"10.1109\/CVPR.2011.5995616"},{"key":"20_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-319-10578-9_5","volume-title":"Computer Vision \u2013 ECCV 2014","author":"K Wilson","year":"2014","unstructured":"Wilson, K., Snavely, N.: Robust global translations with 1DSfM. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014, Part III. LNCS, vol. 8691, pp. 61\u201375. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10578-9_5"},{"key":"20_CR53","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1007\/978-3-030-01270-0_37","volume-title":"Computer Vision \u2013 ECCV 2018","author":"Z Wu","year":"2018","unstructured":"Wu, Z., Wang, Z., Wang, Z., Jin, H.: Towards privacy-preserving visual recognition via adversarial training: a pilot study. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018, Part XVI. LNCS, vol. 11220, pp. 627\u2013645. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01270-0_37"},{"key":"20_CR54","doi-asserted-by":"crossref","unstructured":"Yonetani, R., Boddeti, V.N., Kitani, K.M., Sato, Y.: Privacy-preserving visual learning using doubly permuted homomorphic encryption. In: International Conference on Computer Vision (ICCV) (2017)","DOI":"10.1109\/ICCV.2017.225"},{"key":"20_CR55","unstructured":"Yosinski, J., Clune, J., Nguyen, A., Fuchs, T., Lipson, H.: Understanding neural networks through deep visualization. In: ICML Workshop on Deep Learning (2015)"},{"key":"20_CR56","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"818","DOI":"10.1007\/978-3-319-10590-1_53","volume-title":"Computer Vision \u2013 ECCV 2014","author":"MD Zeiler","year":"2014","unstructured":"Zeiler, M.D., Fergus, R.: Visualizing and understanding convolutional networks. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014, Part I. LNCS, vol. 8689, pp. 818\u2013833. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10590-1_53"},{"key":"20_CR57","doi-asserted-by":"crossref","unstructured":"Zhao, J., Frumkin, N., Konrad, J., Ishwar, P.: Privacy-preserving indoor localization via active scene illumination. In: Computer Vision and Pattern Recognition (CVPR) Workshops (2018)","DOI":"10.1109\/CVPRW.2018.00208"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58452-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,3]],"date-time":"2024-11-03T00:11:03Z","timestamp":1730592663000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58452-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030584511","9783030584528"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58452-8_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"3 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Glasgow","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2020.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OpenReview","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5025","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1360","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}