{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:11:56Z","timestamp":1742911916267,"version":"3.40.3"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030616373"},{"type":"electronic","value":"9783030616380"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-61638-0_7","type":"book-chapter","created":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T23:08:28Z","timestamp":1602630508000},"page":"106-125","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Controlling the Deep Learning-Based Side-Channel Analysis: A Way to\u00a0Leverage from Heuristics"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4665-7457","authenticated-orcid":false,"given":"Servio","family":"Paguada","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0892-3611","authenticated-orcid":false,"given":"Unai","family":"Rioja","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5055-455X","authenticated-orcid":false,"given":"Igor","family":"Armendariz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,14]]},"reference":[{"key":"7_CR1","unstructured":"Federal Office for Information Security (BSI) - Common Criteria for examination and evaluation of it security. https:\/\/www.bsi.bund.de\/EN\/Topics\/CommonCriteria\/commoncriteria.html . Accessed 17 June 2020"},{"key":"7_CR2","unstructured":"FIPS 197: Announcing the Advanced Encryption Standard (AES), November 2001. https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.197.pdf"},{"key":"7_CR3","unstructured":"Agence Nationale de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019information - Certified products (2019). https:\/\/www.ssi.gouv.fr\/en\/products\/certified-products\/ . Accessed 17 June 2020"},{"issue":"2","key":"7_CR4","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s00145-010-9084-8","volume":"24","author":"L Batina","year":"2011","unstructured":"Batina, L., Gierlichs, B., Prouff, E., Rivain, M., Standaert, F.X., Veyrat-Charvillon, N.: Mutual information analysis: a comprehensive study. J. Cryptology 24(2), 269\u2013291 (2011)","journal-title":"J. Cryptology"},{"key":"7_CR5","unstructured":"Becker, G., et al.: Test vector leakage assessment (TVLA) methodology in practice (extended abstract) (2013)"},{"key":"7_CR6","unstructured":"Bergstra, J., Bengio, Y.: Random search for hyper-parameter optimization. J. Mach. Learn. Res. 13, 281\u2013305 (2012)"},{"issue":"1","key":"7_CR7","doi-asserted-by":"publisher","first-page":"014008","DOI":"10.1088\/1749-4699\/8\/1\/014008","volume":"8","author":"J Bergstra","year":"2015","unstructured":"Bergstra, J., Komer, B., Eliasmith, C., Yamins, D., Cox, D.D.: Hyperopt: a python library for model selection and hyperparameter optimization. Comput. Sci. Discov. 8(1), 014008 (2015)","journal-title":"Comput. Sci. Discov."},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16\u201329. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-319-66787-4_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"E Cagli","year":"2017","unstructured":"Cagli, E., Dumas, C., Prouff, E.: Convolutional neural networks with data augmentation against jitter-based countermeasures. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 45\u201368. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_3"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13\u201328. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_3"},{"key":"7_CR11","unstructured":"Cheng, C.S., Lee, S.C., Chen, P.W., Huang, K.K.: The application of design for Six Sigma on high level smart phone development. J. Q. 19, 117\u2013136 (2012)"},{"issue":"2","key":"7_CR12","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1109\/TIFS.2017.2757440","volume":"13","author":"MO Choudary","year":"2018","unstructured":"Choudary, M.O., Kuhn, M.G.: Efficient, portable template attacks. IEEE Trans. Inf. Forensics Secur. 13(2), 490\u2013501 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR13","unstructured":"Common Criteria: Common Criteria v3.1. Release 5, April 2017. https:\/\/www.commoncriteriaportal.org\/cc\/index.cfm? . Accessed 17 June 2020"},{"key":"7_CR14","unstructured":"EMVCo: EMV specifications (2001). https:\/\/www.emvco.com\/ . Accessed 17 June 2020"},{"key":"7_CR15","unstructured":"Fisher, R.A.: The Design of Experiments, 9th edn. Macmillan (1935)"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-540-85053-3_27","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"B Gierlichs","year":"2008","unstructured":"Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual information analysis. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 426\u2013442. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85053-3_27"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Gilmore, R., Hanley, N., O\u2019Neill, M.: Neural network based attack on a masked implementation of AES. In: Proceedings of the 2015 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2015, pp. 106\u2013111, June 2015","DOI":"10.1109\/HST.2015.7140247"},{"key":"7_CR18","volume-title":"Deep Learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. The MIT Press, New York (2016)"},{"key":"7_CR19","unstructured":"Gordon, J. (ed.): Six Sigma Quality for Business and Manufacture. Elsevier Science, October 2002, hardcover ISBN: 9780444510471"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Hettwer, B., Gehrer, S., G\u00fcneysu, T.: Profiled power analysis attacks using convolutional neural networks with domain knowledge. In: Selected Areas in Cryptography - SAC 2018\u201325th International Conference, Calgary, AB, Canada, 15\u201317 August 2018, pp. 479\u2013498 (2018)","DOI":"10.1007\/978-3-030-10970-7_22"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-642-29912-4_18","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"A Heuser","year":"2012","unstructured":"Heuser, A., Zohner, M.: Intelligent machine homicide. In: Schindler, W., Huss, S.A. (eds.) COSADE 2012. LNCS, vol. 7275, pp. 249\u2013264. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29912-4_18"},{"key":"7_CR22","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s13389-011-0023-x","volume":"1","author":"G Hospodar","year":"2011","unstructured":"Hospodar, G., Gierlichs, B., De Mulder, E., Verbauwhede, I., Vandewalle, J.: Machine learning in side-channel analysis: a first study. J. Cryptographic Eng. 1, 293\u2013302 (2011)","journal-title":"J. Cryptographic Eng."},{"key":"7_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"key":"7_CR24","unstructured":"Lerman, L., Bontempi, G., Markowitch, O.: Side channel attack : an approach based on machine learning. In: Constructive Side-Channel Analysis and Secure Design, COSADE (2011)"},{"issue":"2","key":"7_CR25","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s13389-014-0089-3","volume":"5","author":"L Lerman","year":"2015","unstructured":"Lerman, L., Bontempi, G., Markowitch, O.: A machine learning approach against a masked aes. J. Cryptograph. Eng. 5(2), 123\u2013139 (2015)","journal-title":"J. Cryptograph. Eng."},{"issue":"4","key":"7_CR26","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s13389-017-0162-9","volume":"8","author":"L Lerman","year":"2018","unstructured":"Lerman, L., Poussier, R., Markowitch, O., Standaert, F.X.: Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version. J. Cryptograph. Eng. 8(4), 301\u2013313 (2018)","journal-title":"J. Cryptograph. Eng."},{"key":"7_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-49445-6_1","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"H Maghrebi","year":"2016","unstructured":"Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: Carlet, C., Hasan, M.A., Saraswat, V. (eds.) SPACE 2016. LNCS, vol. 10076, pp. 3\u201326. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49445-6_1"},{"key":"7_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-38162-6","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, Boston (2007). https:\/\/doi.org\/10.1007\/978-0-387-38162-6"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Martinasek, Z., Malina, L.: Comparison of profiling power analysis attacks using templates and multi-layer perceptron network, January 2014","DOI":"10.1007\/978-3-319-15765-8_18"},{"key":"7_CR30","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-319-15765-8_18","volume-title":"Computational Problems in Science and Engineering","author":"Z Martinasek","year":"2015","unstructured":"Martinasek, Z., Malina, L., Trasy, K.: Profiling power analysis attack based on multi-layer perceptron network. In: Mastorakis, N., Bulucea, A., Tsekouras, G. (eds.) Computational Problems in Science and Engineering. LNEE, vol. 343, pp. 317\u2013339. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-15765-8_18"},{"key":"7_CR31","doi-asserted-by":"crossref","first-page":"348","DOI":"10.46586\/tches.v2020.i1.348-375","volume":"2020","author":"L Masure","year":"2019","unstructured":"Masure, L., Dumas, C., Prouff, E.: A comprehensive study of deep learning for side-channel analysis. Trans. Cryptographic Hardware Embed. Syst. 2020, 348\u2013375 (2019)","journal-title":"Trans. Cryptographic Hardware Embed. Syst."},{"key":"7_CR32","volume-title":"Design & Analysis of Experiments","author":"DC Montgomery","year":"2019","unstructured":"Montgomery, D.C.: Design & Analysis of Experiments. Wiley, USA (2019)"},{"issue":"1","key":"7_CR33","doi-asserted-by":"crossref","first-page":"209","DOI":"10.46586\/tches.v2018.i1.209-237","volume":"2018","author":"A Moradi","year":"2018","unstructured":"Moradi, A., Richter, B., Schneider, T., Standaert, F.X.: Leakage detection with the $$\\cal{X}^2$$-test. IACR Trans. Cryptographic Hardware Embed. Syst. 2018(1), 209\u2013237 (2018)","journal-title":"IACR Trans. Cryptographic Hardware Embed. Syst."},{"key":"7_CR34","first-page":"58","volume":"2020","author":"G Perin","year":"2020","unstructured":"Perin, G., Buhan, I., Picek, S.: Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis. IACR Cryptol. ePrint Arch. 2020, 58 (2020)","journal-title":"IACR Cryptol. ePrint Arch."},{"issue":"1","key":"7_CR35","doi-asserted-by":"crossref","first-page":"209","DOI":"10.46586\/tches.v2019.i1.209-237","volume":"2019","author":"S Picek","year":"2018","unstructured":"Picek, S., Heuser, A., Jovic, A., Bhasin, S., Regazzoni, F.: The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. IACR Trans. Cryptographic Hardware Embed. Syst. 2019(1), 209\u2013237 (2018)","journal-title":"IACR Trans. Cryptographic Hardware Embed. Syst."},{"key":"7_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-030-05072-6_10","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"S Picek","year":"2018","unstructured":"Picek, S., Samiotis, I.P., Kim, J., Heuser, A., Bhasin, S., Legay, A.: On the performance of convolutional neural networks for side-channel analysis. In: Chattopadhyay, A., Rebeiro, C., Yarom, Y. (eds.) SPACE 2018. LNCS, vol. 11348, pp. 157\u2013176. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05072-6_10"},{"key":"7_CR37","first-page":"53","volume":"2018","author":"E Prouff","year":"2018","unstructured":"Prouff, E., Strullu, R., Benadjila, R., Cagli, E., Canovas, C.: Study of deep learning techniques for side-channel analysis and introduction to ascad database. IACR Cryptol. ePrint Arch. 2018, 53 (2018)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"7_CR38","unstructured":"Rioja, U., Paguada, S., Batina, L., Armendariz, I.: The uncertainty of side-channel analysis: a way to leverage from heuristics. Cryptology ePrint Archive, Report 2020\/766 (2020). https:\/\/eprint.iacr.org\/2020\/766"},{"key":"7_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/11545262_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"W Schindler","year":"2005","unstructured":"Schindler, W., Lemke, K., Paar, C.: A stochastic model for differential side channel cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 30\u201346. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11545262_3"},{"key":"7_CR40","doi-asserted-by":"crossref","unstructured":"Smith, L.N.: Cyclical learning rates for training neural networks. In: IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 464\u2013472 (2017)","DOI":"10.1109\/WACV.2017.58"},{"key":"7_CR41","unstructured":"Smith, L.: A disciplined approach to neural network hyper-parameters: Part 1 - learning rate, batch size, momentum, and weight decay, March 2018"},{"key":"7_CR42","unstructured":"Smith, L.N., Topin, N.: Super-convergence: very fast training of residual networks using large learning rates. CoRR abs\/1708.07120 (2017)"},{"issue":"3","key":"7_CR43","first-page":"359","volume":"29","author":"SS Srinivas","year":"2018","unstructured":"Srinivas, S.S., Sreedharan, V.R.: Failure analysis of automobile spares in a manufacturing supply chain distribution centre using Six Sigma DMAIC framework. Int. J. Serv. Oper. Manage. 29(3), 359\u2013372 (2018)","journal-title":"Int. J. Serv. Oper. Manage."},{"key":"7_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-01001-9_26","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"F-X Standaert","year":"2009","unstructured":"Standaert, F.-X., Malkin, T.G., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443\u2013461. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01001-9_26"},{"key":"7_CR45","unstructured":"Tubbing, R.: An analysis of deep learning based profiled side-channel attacks: custom deep learning layer, CNN hyperparameters for countermeasures, and portability settings (2019)"},{"key":"7_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-030-15462-2_1","volume-title":"Smart Card Research and Advanced Applications","author":"G Yang","year":"2019","unstructured":"Yang, G., Li, H., Ming, J., Zhou, Y.: Convolutional neural network based side-channel attacks in time-frequency representations. In: Bilgin, B., Fischer, J.-B. (eds.) CARDIS 2018. LNCS, vol. 11389, pp. 1\u201317. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-15462-2_1"},{"key":"7_CR47","doi-asserted-by":"crossref","unstructured":"Yang, S., Zhou, Y., Liu, J., Chen, D.: Back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations, pp. 169\u2013185, November 2011","DOI":"10.1007\/978-3-642-31912-9_12"},{"issue":"1","key":"7_CR48","first-page":"1","volume":"2020","author":"G Zaid","year":"2019","unstructured":"Zaid, G., Bossuet, L., Habrard, A., Venelli, A.: Methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptographic Hardware Embed. Syst. 2020(1), 1\u201336 (2019)","journal-title":"IACR Trans. Cryptographic Hardware Embed. Syst."},{"key":"7_CR49","doi-asserted-by":"crossref","unstructured":"Zhang, J., Zheng, M., Nan, J., Hu, H., Yu, N.: A novel evaluation metric for deep learning-based side channel analysis and its extended application to imbalanced data. In: CHES 2020, pp. 73\u201396 (2020)","DOI":"10.46586\/tches.v2020.i3.73-96"},{"key":"7_CR50","first-page":"1213","volume":"2018","author":"Y Zotkin","year":"2018","unstructured":"Zotkin, Y., Olivier, F., Bourbao, E.: Deep learning vs template attacks in front of fundamental targets: experimental study. IACR Cryptol. ePrint Arch. 2018, 1213 (2018)","journal-title":"IACR Cryptol. ePrint Arch."}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-61638-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,8]],"date-time":"2021-04-08T16:46:43Z","timestamp":1617900403000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-61638-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030616373","9783030616380"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-61638-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/di.uniroma1.it\/ACNS2020","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"214","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.7","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic the conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}