{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T14:05:36Z","timestamp":1774533936393,"version":"3.50.1"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030590154","type":"print"},{"value":"9783030590161","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-59016-1_58","type":"book-chapter","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T13:05:10Z","timestamp":1599743110000},"page":"704-715","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Trajectory-Privacy Protection Method Based on Location Similarity of Query Destinations in Continuous LBS Queries"],"prefix":"10.1007","author":[{"given":"Lu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Saide","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Fengyin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ruinian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,10]]},"reference":[{"key":"58_CR1","doi-asserted-by":"publisher","unstructured":"Yan, B., Yu, J., Yang, M., Jiang, H., Wan, Z., Ni, L.: A novel distributed social internet of things service recommendation scheme based on LSH forest. Pers. Ubiquit. Comput. 1\u201314 (2019). https:\/\/doi.org\/10.1007\/s00779-019-01283-4","DOI":"10.1007\/s00779-019-01283-4"},{"issue":"6","key":"58_CR2","doi-asserted-by":"publisher","first-page":"1844","DOI":"10.1109\/JIOT.2017.2707489","volume":"4","author":"T Song","year":"2017","unstructured":"Song, T., Li, R., Mei, B., Yu, J., Xing, X., Cheng, X.: A privacy preserving communication protocol for IoT applications in smart homes. IEEE Internet Things J. 4(6), 1844\u20131852 (2017)","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"58_CR3","doi-asserted-by":"crossref","first-page":"2066","DOI":"10.1109\/TII.2017.2695487","volume":"13","author":"K Xing","year":"2017","unstructured":"Xing, K., Hu, C., Yu, J., Cheng, X., Zhang, F.: Mutual privacy preserving $$k$$ -means clustering in social participatory sensing. IEEE Trans. Ind. Inform. 13(4), 2066\u20132076 (2017)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"58_CR4","doi-asserted-by":"crossref","unstructured":"Pu, Y., et al.: Two secure privacy-preserving data aggregation schemes for IoT. Wirel. Commun. Mob. Comput. 2019, 3 985 232:1\u20133 985 232:11 (2019)","DOI":"10.1155\/2019\/3985232"},{"key":"58_CR5","doi-asserted-by":"publisher","first-page":"21053","DOI":"10.1109\/ACCESS.2018.2824798","volume":"6","author":"L Ni","year":"2018","unstructured":"Ni, L., Li, C., Wang, X., Jiang, H., Yu, J.: DP-MCDBSCAN: differential privacy preserving multi-core DBSCAN clustering for network user data. IEEE Access 6, 21053\u201321063 (2018)","journal-title":"IEEE Access"},{"issue":"1","key":"58_CR6","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1109\/TVT.2017.2738018","volume":"67","author":"Z He","year":"2018","unstructured":"He, Z., Cai, Z., Yu, J.: Latent-data privacy preserving with customized data utility for social network data. IEEE Trans. Veh. Technol. 67(1), 665\u2013673 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"12","key":"58_CR7","doi-asserted-by":"publisher","first-page":"6492","DOI":"10.1109\/TII.2019.2911697","volume":"15","author":"Z Cai","year":"2019","unstructured":"Cai, Z., Zheng, X., Yu, J.: A differential-private framework for urban traffic flows estimation via taxi companies. IEEE Trans. Ind. Inform. 15(12), 6492\u20136499 (2019)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"2","key":"58_CR8","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1109\/TNSE.2018.2830307","volume":"7","author":"Z Cai","year":"2018","unstructured":"Cai, Z., Zheng, X.: A private and efficient mechanism for data uploading in smart cyber-physical systems. IEEE Trans. Netw. Sci. Eng. 7(2), 766\u2013775 (2018)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"58_CR9","doi-asserted-by":"publisher","first-page":"7 576 307:1","DOI":"10.1155\/2017\/7576307","volume":"2017","author":"Y Liang","year":"2017","unstructured":"Liang, Y., Cai, Z., Han, Q., Li, Y.: Location privacy leakage through sensory data. Secur. Commun. Netw. 2017, 7 576 307:1\u20137 576 307:12 (2017)","journal-title":"Secur. Commun. Netw."},{"issue":"6","key":"58_CR10","doi-asserted-by":"publisher","first-page":"4196","DOI":"10.1109\/TII.2019.2941735","volume":"16","author":"S Zhu","year":"2019","unstructured":"Zhu, S., Cai, Z., Hu, H., Li, Y., Li, W.: zkCrowd: a hybrid blockchain-based crowdsourcing platform. IEEE Trans. Ind. Inform. 16(6), 4196\u20134205 (2019)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"58_CR11","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.comnet.2018.11.036","volume":"150","author":"K Li","year":"2019","unstructured":"Li, K., Tian, L., Li, W., Luo, G., Cai, Z.: Incorporating social interaction into three-party game towards privacy protection in IoT. Comput. Netw. 150, 90\u2013101 (2019)","journal-title":"Comput. Netw."},{"issue":"5","key":"58_CR12","doi-asserted-by":"publisher","first-page":"968","DOI":"10.1109\/JSAC.2020.2980802","volume":"38","author":"X Zheng","year":"2020","unstructured":"Zheng, X., Cai, Z.: Privacy-preserved data sharing towards multiple parties in industrial IoTs. IEEE J. Sel. Areas Commun. 38(5), 968\u2013979 (2020)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"4","key":"58_CR13","first-page":"577","volume":"15","author":"Z Cai","year":"2018","unstructured":"Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Comput. 15(4), 577\u2013590 (2018)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"9","key":"58_CR14","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MCOM.2018.1701245","volume":"56","author":"X Zheng","year":"2018","unstructured":"Zheng, X., Cai, Z., Li, Y.: Data linkage in smart Internet of Things systems: a consideration from a privacy perspective. IEEE Commun. Mag. 56(9), 55\u201361 (2018)","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"58_CR15","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MNET.2018.1700349","volume":"32","author":"Y Liang","year":"2018","unstructured":"Liang, Y., Cai, Z., Yu, J., Han, Q., Li, Y.: Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw. 32(4), 8\u201314 (2018)","journal-title":"IEEE Netw."},{"key":"58_CR16","doi-asserted-by":"crossref","unstructured":"Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: 2017 IEEE Conference on Computer Communications, INFOCOM 2017, Atlanta, GA, USA, 1\u20134 May 2017, pp. 1\u20139 (2017)","DOI":"10.1109\/INFOCOM.2017.8056976"},{"issue":"6","key":"58_CR17","doi-asserted-by":"publisher","first-page":"1868","DOI":"10.1109\/JIOT.2017.2679483","volume":"4","author":"X Zheng","year":"2017","unstructured":"Zheng, X., Cai, Z., Yu, J., Wang, C., Li, Y.: Follow but no track: privacy preserved profile publishing in cyber-physical social systems. IEEE Internet Things J. 4(6), 1868\u20131878 (2017)","journal-title":"IEEE Internet Things J."},{"key":"58_CR18","doi-asserted-by":"crossref","unstructured":"Li, W., Hu, C., Song, T., Yu, J., Xing, X., Cai, Z.: Privacy-preserving data collection in context-aware applications. In: 2018 IEEE Symposium on Privacy-Aware Computing, PAC 2018, Washington, DC, USA, 26\u201328 September 2018, pp. 75\u201385 (2018)","DOI":"10.1109\/PAC.2018.00014"},{"key":"58_CR19","doi-asserted-by":"crossref","unstructured":"Li, W., Song, T., Li, Y., Ma, L., Yu, J., Cheng, X.: A hierarchical game framework for data privacy preservation in context-aware IoT applications. In: IEEE Symposium on Privacy-Aware Computing, PAC 2017, Washington, DC, USA, 1\u20134 August 2017, pp. 176\u2013177 (2017)","DOI":"10.1109\/PAC.2017.26"},{"key":"58_CR20","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.jnca.2015.01.004","volume":"53","author":"Y Wang","year":"2015","unstructured":"Wang, Y., Xia, Y., Hou, J., Gao, S., Nie, X., Wang, Q.: A fast privacy-preserving framework for continuous location-based queries in road networks. J. Netw. Comput. Appl. 53, 57\u201373 (2015)","journal-title":"J. Netw. Comput. Appl."},{"issue":"6","key":"58_CR21","doi-asserted-by":"publisher","first-page":"1546","DOI":"10.1109\/TKDE.2016.2520473","volume":"28","author":"X Yi","year":"2016","unstructured":"Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans. Knowl. Data Eng. 28(6), 1546\u20131559 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"58_CR22","first-page":"6 829 326:1","volume":"2018","author":"J Zhang","year":"2018","unstructured":"Zhang, J., Yuan, Y., Wang, X., Ni, L., Yu, J., Zhang, M.: RPAR: location privacy preserving via repartitioning anonymous region in mobile social network. Secur. Commun. Netw. 2018, 6 829 326:1\u20136 829 326:10 (2018)","journal-title":"Secur. Commun. Netw."},{"key":"58_CR23","doi-asserted-by":"crossref","unstructured":"Cai, Z., He, Z.: Trading private range counting over big IoT data. In: 39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019, Dallas, TX, USA, 7\u201310 July 2019, pp. 144\u2013153 (2019)","DOI":"10.1109\/ICDCS.2019.00023"},{"key":"58_CR24","doi-asserted-by":"crossref","first-page":"90 476","DOI":"10.1109\/ACCESS.2019.2927140","volume":"7","author":"J Zhang","year":"2019","unstructured":"Zhang, J., Wang, X., Yuan, Y., Ni, L.: RcDT: privacy preservation based on r-constrained dummy trajectory in mobile social networks. IEEE Access 7, 90 476\u201390 486 (2019)","journal-title":"IEEE Access"},{"issue":"18","key":"58_CR25","doi-asserted-by":"publisher","first-page":"6121","DOI":"10.1007\/s00500-017-2676-6","volume":"22","author":"S Zhang","year":"2017","unstructured":"Zhang, S., Wang, G., Liu, Q., Abawajy, J.H.: A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Comput. 22(18), 6121\u20136133 (2017). https:\/\/doi.org\/10.1007\/s00500-017-2676-6","journal-title":"Soft Comput."},{"issue":"9","key":"58_CR26","doi-asserted-by":"publisher","first-page":"2190","DOI":"10.3390\/s19092190","volume":"19","author":"L Zhang","year":"2019","unstructured":"Zhang, L., Jin, C., Huang, H., Fu, X., Wang, R.: A trajectory privacy preserving scheme in the CANNQ service for IoT. Sensors 19(9), 2190 (2019)","journal-title":"Sensors"},{"issue":"3","key":"58_CR27","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1109\/TMC.2014.2321747","volume":"14","author":"B Palanisamy","year":"2015","unstructured":"Palanisamy, B., Liu, L.: Attack-resilient mix-zones over road networks: architecture and algorithms. IEEE Trans. Mob. Comput. 14(3), 495\u2013508 (2015)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"58_CR28","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1007\/978-981-13-6508-9_126","volume-title":"Communications, Signal Processing, and Systems","author":"Z Yang","year":"2020","unstructured":"Yang, Z., Yang, M., Ning, B.: User relationship privacy protection on trajectory data. In: Liang, Q., Liu, X., Na, Z., Wang, W., Mu, J., Zhang, B. (eds.) CSPS 2018. LNEE, vol. 517, pp. 1038\u20131045. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-13-6508-9_126"},{"issue":"1","key":"58_CR29","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/2031331.2031335","volume":"13","author":"C Chow","year":"2011","unstructured":"Chow, C., Mokbel, M.F.: Trajectory privacy in location-based services and data publication. SIGKDD Explor. 13(1), 19\u201329 (2011)","journal-title":"SIGKDD Explor."},{"key":"58_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-540-73540-3_15","volume-title":"Advances in Spatial and Temporal Databases","author":"C-Y Chow","year":"2007","unstructured":"Chow, C.-Y., Mokbel, M.F.: Enabling private continuous queries for revealed user locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 258\u2013275. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73540-3_15"},{"key":"58_CR31","unstructured":"Pan, X., Meng, X., Xu, J.: Distortion-based anonymity for continuous queries in location-based mobile services. In: 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, ACM-GIS 2009, Seattle, Washington, USA, Proceedings, November, vol. 2009, pp. 256\u2013265 (2009). pp. 4\u20136"},{"key":"58_CR32","doi-asserted-by":"crossref","unstructured":"Wang, Y., He, L.P., Peng, J., Zhang, T.T., Li, H.Z.: Privacy preserving for continuous query in location based services. In: 18th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2012, Singapore, 17\u201319 December 2012, pp. 213\u2013220 (2012)","DOI":"10.1109\/ICPADS.2012.38"},{"key":"58_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2016.06.005","volume":"98","author":"A Ye","year":"2017","unstructured":"Ye, A., Li, Y., Xu, L.: A novel location privacy-preserving scheme based on l-queries for continuous LBS. Comput. Commun. 98, 1\u201310 (2017)","journal-title":"Comput. Commun."},{"key":"58_CR34","doi-asserted-by":"crossref","unstructured":"Shin, H., Vaidya, J., Atluri, V., Choi, S.: Ensuring privacy and security for LBS through trajectory partitioning. In: Eleventh International Conference on Mobile Data Management, MDM 2010, Kanas City, Missouri, USA, 23\u201326 May 2010, pp. 224\u2013226 (2010)","DOI":"10.1109\/MDM.2010.29"},{"key":"58_CR35","doi-asserted-by":"crossref","unstructured":"Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, Phoenix, AZ, USA, 13\u201318 April 2008, pp. 547\u2013555 (2008)","DOI":"10.1109\/INFOCOM.2007.103"},{"issue":"2","key":"58_CR36","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TSC.2013.55","volume":"7","author":"R Hwang","year":"2014","unstructured":"Hwang, R., Hsueh, Y., Chung, H.: A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Trans. Serv. Comput. 7(2), 126\u2013139 (2014)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"1","key":"58_CR37","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.cose.2009.07.006","volume":"29","author":"H Shin","year":"2010","unstructured":"Shin, H., Vaidya, J., Atluri, V.: Anonymization models for directional location based service environments. Comput. Secur. 29(1), 59\u201373 (2010)","journal-title":"Comput. Secur."},{"key":"58_CR38","doi-asserted-by":"crossref","unstructured":"Gustav, Y.H., Wang, Y., Domenic, M.K., Zhang, F., Memon, I.: Velocity similarity anonymization for continuous query location based services. In: 2013 International conference on Computational Problem-Solving (ICCP), pp. 433\u2013436. IEEE (2013)","DOI":"10.1109\/ICCPS.2013.6893578"},{"key":"58_CR39","first-page":"326 953:1","volume":"11","author":"C Ma","year":"2015","unstructured":"Ma, C., Zhou, C., Yang, S.: A voronoi-based location privacy-preserving method for continuous query in LBS. IJDSN 11, 326 953:1\u2013326 953:17 (2015)","journal-title":"IJDSN"},{"issue":"8","key":"58_CR40","doi-asserted-by":"publisher","first-page":"3221","DOI":"10.1007\/s11276-017-1534-x","volume":"24","author":"R Al-Dhubhani","year":"2018","unstructured":"Al-Dhubhani, R., Cazalas, J.M.: An adaptive geo-indistinguishability mechanism for continuous LBSqueries. Wirel. Netw. 24(8), 3221\u20133239 (2018)","journal-title":"Wirel. Netw."},{"issue":"2","key":"58_CR41","first-page":"153","volume":"6","author":"T Brinkhoff","year":"2002","unstructured":"Brinkhoff, T.: A framework for generating network-based moving objects. Geo Inform. 6(2), 153\u2013180 (2002)","journal-title":"Geo Inform."},{"key":"58_CR42","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.datak.2014.09.004","volume":"94","author":"K Al-Hussaeni","year":"2014","unstructured":"Al-Hussaeni, K., Fung, B.C.M., Cheung, W.K.: Privacy-preserving trajectory stream publishing. Data Knowl. Eng. 94, 89\u2013109 (2014)","journal-title":"Data Knowl. Eng."}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-59016-1_58","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T18:47:46Z","timestamp":1668710866000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-59016-1_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030590154","9783030590161"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-59016-1_58","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Algorithms, Systems, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qingdao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"216","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6-7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}