{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T10:50:37Z","timestamp":1770720637552,"version":"3.49.0"},"publisher-location":"Cham","reference-count":55,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030622220","type":"print"},{"value":"9783030622237","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62223-7_10","type":"book-chapter","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T10:03:00Z","timestamp":1605002580000},"page":"111-124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Malware Detection Based on Static and Dynamic Features Analysis"],"prefix":"10.1007","author":[{"given":"Budong","family":"Xu","sequence":"first","affiliation":[]},{"given":"Yongqin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaomei","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,11]]},"reference":[{"key":"10_CR1","unstructured":"Schultz, M.G., Eskin, E., Zadok, F., Stolfo, S.J.: Data mining methods for detection of new malicious executables. In: Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp. 38\u201349. IEEE (2000)"},{"key":"10_CR2","first-page":"2721","volume":"7","author":"JZ Kolter","year":"2006","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res. 7, 2721\u20132744 (2006)","journal-title":"J. Mach. Learn. Res."},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"151","DOI":"10.3233\/JCS-980109","volume":"6","author":"S Hofmeyr","year":"1998","unstructured":"Hofmeyr, S., Forrest, S., Somayaji, A.: Itrusion detection using sequences of system calls. J. Comput. Secur. 6, 151\u2013180 (1998)","journal-title":"J. Comput. Secur."},{"key":"10_CR4","first-page":"79","volume":"2001","author":"J Bergeron","year":"2001","unstructured":"Bergeron, J., Debbabi, M., Desharnais, J.M., Erhioui, M., Tawbi, N.: Static detection of malicious code in executable programs. Int. J. Req. Eng. 2001, 79 (2001)","journal-title":"Int. J. Req. Eng."},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1007\/11538059_103","volume-title":"Advances in Intelligent Computing","author":"X Xu","year":"2005","unstructured":"Xu, X., Xie, T.: A reinforcement learning approach for host-based intrusion detection using sequences of system calls. In: Huang, D.-S., Zhang, X.-P., Huang, G.-B. (eds.) ICIC 2005. LNCS, vol. 3644, pp. 995\u20131003. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11538059_103"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Geng, L.Z., Jia, H.B.: A low-cost method to intrusion detection system using sequences of system calls. In: Second International Conference on Information & Computing Science. IEEE Computer Society (2009)","DOI":"10.1109\/ICIC.2009.43"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Ye, Y., Wang, D., Li, T., Ye, D.: IMDS: intelligent malware detection system. In: Proceedings ACM International Conference Knowledge Discovery Data Mining, pp. 1043\u20131047 (2007)","DOI":"10.1145\/1281192.1281308"},{"issue":"1","key":"10_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10844-009-0086-7","volume":"35","author":"Y Ye","year":"2010","unstructured":"Ye, Y., Li, T., Huang, K., Jiang, Q., Chen, Y.: Hierarchical associative classifier (HAC) for malware detection from the large and imbalanced gray list. J. Intell. Inf. Syst. 35(1), 1\u201320 (2010). https:\/\/doi.org\/10.1007\/s10844-009-0086-7","journal-title":"J. Intell. Inf. Syst."},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Lee, J., Jeong, K., Lee, H.: Detecting metamorphic malwares using code graphs. In: Proceedings of the ACM Symposium on Applied Computing, ser. New York, NY, USA, pp. 1970\u20131977. ACM (2010)","DOI":"10.1145\/1774088.1774505"},{"issue":"1","key":"10_CR10","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1080\/19361610.2018.1387734","volume":"13","author":"MA Jerlin","year":"2018","unstructured":"Jerlin, M.A., Marimuthu, K.: A new malware detection system using machine learning techniques for API call sequences. J. Appl. Secur. Res. 13(1), 45\u201362 (2018)","journal-title":"J. Appl. Secur. Res."},{"issue":"2","key":"10_CR11","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1504\/IJESDF.2007.016865","volume":"1","author":"D Bilar","year":"2007","unstructured":"Bilar, D.: OpCodes as predictor for malware. Int. J. Electron. Secur. Digit. Forensics 1(2), 156 (2007)","journal-title":"Int. J. Electron. Secur. Digit. Forensics"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-11747-3_3","volume-title":"Engineering Secure Software and Systems","author":"I Santos","year":"2010","unstructured":"Santos, I., et al.: Idea: Opcode-sequence-based malware detection. In: Massacci, F., Wallach, D., Zannone, N. (eds.) ESSoS 2010. LNCS, vol. 5965, pp. 35\u201343. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-11747-3_3"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.ins.2011.08.020","volume":"231","author":"I Santos","year":"2013","unstructured":"Santos, I., Brezo, F., Ugarte-Pedrero, X., Bringas, P.G.: OpCode sequences as representation of executables for data-mining-based unknown malware detection. Inf. Sci. 231, 203\u2013216 (2013)","journal-title":"Inf. Sci."},{"issue":"1\u20132","key":"10_CR14","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s11416-012-0160-5","volume":"8","author":"N Runwal","year":"2012","unstructured":"Runwal, N., Low, R.M., Stamp, M.: OpCode graph similarity and metamorphic detection. J. Comput. Virol. 8(1\u20132), 37\u201352 (2012). https:\/\/doi.org\/10.1007\/s11416-012-0160-5","journal-title":"J. Comput. Virol."},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.cose.2014.04.003","volume":"44","author":"Y Ding","year":"2014","unstructured":"Ding, Y., Dai, W., Yan, S., Zhang, Y.: Control flow-based OpCode behavior analysis for malware detection. Comput. Secur. 44, 65\u201374 (2014)","journal-title":"Comput. Secur."},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Yuxin, D., Wei, D. Yibin, Z., Chenglong, X.: Malicious code detection using OpCode running tree representation. In: 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Guangdong, pp. 616\u2013621 (2014)","DOI":"10.1109\/3PGCIC.2014.140"},{"key":"10_CR17","unstructured":"Lu, R.: Malware detection with LSTM using OpCode language (2019)"},{"key":"10_CR18","unstructured":"Kephart, J.O., Sorkin, G.B., Arnold, W.C., Chess, D.M. Tesauro, G.J., White, S.R.: Biologically inspired defenses against computer viruses. In: Proceedings of the 14th International Joint Conference on Artificial Intelligence, vol. 1, pp. 985\u2013996. Morgan Kaufmann (1995)"},{"key":"10_CR19","unstructured":"Schultz, M., Eskin, E., Zadok, F., Stolfo, S.: Data mining methods for detection of new malicious executables. In: Proceedings IEEE Symposium on Security and Privacy, pp. 38\u201349 (2001)"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Abou-Assaleh, T., Cercone, N., Keselj, V., Sweidan, R.: N-gram-based detection of new malicious code. In: Proceedings of the 28th Annual International Computer Software and Applications Conference. IEEE (2004)","DOI":"10.1109\/CMPSAC.2004.1342667"},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-540-70542-0_5","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"MZ Shafiq","year":"2008","unstructured":"Shafiq, M.Z., Khayam, S.A., Farooq, M.: Embedded malware detection using markov n-grams. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 88\u2013107. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-70542-0_5"},{"key":"10_CR22","unstructured":"Fang, L., Qingyu, O., Guoheng, W.: Research on N-gram-based malicious code feature extraction algorithm. In: International Conference on Computer Application & System Modeling. IEEE (2010)"},{"key":"10_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-20267-4_11","volume-title":"Adaptive and Natural Computing Algorithms","author":"H Parvin","year":"2011","unstructured":"Parvin, H., Minaei, B., Karshenas, H., Beigi, A.: A new N-gram feature extraction-selection method for malicious code. In: Dobnikar, A., Lotri\u010d, U., \u0160ter, B. (eds.) ICANNGA 2011. LNCS, vol. 6594, pp. 98\u2013107. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20267-4_11"},{"issue":"1","key":"10_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11416-016-0283-1","volume":"14","author":"E Raff","year":"2016","unstructured":"Raff, E., et al.: An investigation of byte n-gram features for malware classification. J. Comput. Virol. Hacking Tech. 14(1), 1\u201320 (2016). https:\/\/doi.org\/10.1007\/s11416-016-0283-1","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Zak, R., Raff, E., Nicholas, C.: What can N-gram learn for malware detection? In: 2017 12th International Conference on Malicious and Unwanted Software. IEEE (2018)","DOI":"10.1109\/MALWARE.2017.8323963"},{"key":"10_CR26","unstructured":"Lo, R.W., Levitt, K.N., Olsson, R.A.: MCF: a malicious code filter. Comput. Secur. 14(6), 541\u2013566 (1995)"},{"key":"10_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/11790754_8","volume-title":"Detection of Intrusions and Malware & Vulnerability Assessment","author":"D Bruschi","year":"2006","unstructured":"Bruschi, D., Martignoni, L., Monga, M.: Detecting self-mutating malware using control-flow graph matching. In: B\u00fcschkes, R., Laskov, P. (eds.) DIMVA 2006. LNCS, vol. 4064, pp. 129\u2013143. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11790754_8"},{"key":"10_CR28","unstructured":"Bonfante, G., Kaczmarek, M., Marion, J.Y.: Control flow graphs as malware signatures. WTCV, May 2007"},{"key":"10_CR29","unstructured":"Zhao, Z.: A virus detection scheme based on features of control flow graph. In: 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), pp. 943\u2013947 (2011)"},{"issue":"10","key":"10_CR30","doi-asserted-by":"publisher","first-page":"2608","DOI":"10.1093\/comjnl\/bxu148","volume":"58","author":"S Alam","year":"2015","unstructured":"Alam, S., Traore, I., Sogukpinar, I.: Annotated control flow graph for metamorphic malware detection. Comput. J. 58(10), 2608\u20132621 (2015)","journal-title":"Comput. J."},{"key":"10_CR31","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.cose.2018.02.006","volume":"76","author":"MH Nguyen","year":"2018","unstructured":"Nguyen, M.H., Le, N.D., Nguyen, X.M., Quan, T.T.: Auto-detection of sophisticated malware using lazy-binding control flow graph and deep learning. Comput. Secur. 76, 128\u2013155 (2018)","journal-title":"Comput. Secur."},{"key":"10_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ACCESS.2018.2876146","volume":"7","author":"Z Ma","year":"2019","unstructured":"Ma, Z., Ge, H., Liu, Y., Zhao, M., Ma, J.: A combination method for android malware detection based on control flow graphs and machine learning algorithms. IEEE Access 7, 1 (2019)","journal-title":"IEEE Access"},{"key":"10_CR33","unstructured":"Schultz, M.G., Eskin, E., Zadok, F., Stolfo, S.J.: Data mining methods for detection of new malicious executables. In: Proceedings of the IEEE Symposium on Security and Privacy (2001)"},{"issue":"1","key":"10_CR34","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10796-007-9054-3","volume":"10","author":"MM Masud","year":"2007","unstructured":"Masud, M.M., Khan, L., Thuraisingham, B.: A scalable multi-level feature extraction technique to detect malicious executables. Inf. Syst. Frontiers 10(1), 33\u201345 (2007). https:\/\/doi.org\/10.1007\/s10796-007-9054-3","journal-title":"Inf. Syst. Frontiers"},{"key":"10_CR35","first-page":"1","volume":"11","author":"M Eskandari","year":"2011","unstructured":"Eskandari, M., Hashemi, S.: Metamorphic malware detection using control flow graph mining. Int. J. Compute Sci. Netw. Secur. 11, 1\u20136 (2011)","journal-title":"Int. J. Compute Sci. Netw. Secur."},{"issue":"3","key":"10_CR36","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.jvlc.2012.02.002","volume":"23","author":"M Eskandari","year":"2012","unstructured":"Eskandari, M., Hashemi, S.: A graph mining approach for detecting unknown malwares. J. Visual Lang. Comput. 23(3), 154\u2013162 (2012)","journal-title":"J. Visual Lang. Comput."},{"key":"10_CR37","unstructured":"Yan, J., Yong, Q., Qifan, R.: Detecting malware with an ensemble method based on deep neural network. Secur. Commun. Netw. 2018, 1\u201316 (2018)"},{"key":"10_CR38","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S., Seshia, S.A., Semantics-aware malware detection. IEEE Computer Society (2005)","DOI":"10.1109\/SP.2005.20"},{"key":"10_CR39","doi-asserted-by":"crossref","unstructured":"Kim, K., Moon, B.R.: Malware detection based on dependency graph using hybrid genetic algorithm. In: Proceedings of the 12th Annual Conference on Genetic and Evolutionary Computation, 07\u201311 July (2010)","DOI":"10.1145\/1830483.1830703"},{"key":"10_CR40","doi-asserted-by":"crossref","unstructured":"Ye, Y., et al.: Combinig file content and file relations for cloud based malware detection. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2011)","DOI":"10.1145\/2020408.2020448"},{"key":"10_CR41","unstructured":"Duen, H.C., Carey, N., Jeffrey, W., Adam, W., Christos, F.: Polonium: tera-scale graph mining for malware detection. In: Proceedings of the SIAM International Conference on Data Mining (SDM) (2011)"},{"key":"10_CR42","unstructured":"Acar, T., Kevin, R., Duen, H.C.: Guilt by association: large scale malware detection by mining file-relation graphs. In: Proceedings of ACM International Conference on Knowledge Discovery and Data Mining (ACM SIGKDD) (2014)"},{"key":"10_CR43","unstructured":"Yan, J., Qi, Y., Roa, Q.: Detecting malware with an ensemble method based on deep neural network. Secur. Commun. Netw. 2018, 1\u201316 (2018)"},{"key":"10_CR44","doi-asserted-by":"crossref","unstructured":"Tian, R., Islam, R., Batten, L. and Versteeg, S.: Differentiating malware from cleanwares using behavioral analysis. In: Proceedings of 5th International Conference on Malicious and Unwanted Software (2010)","DOI":"10.1109\/MALWARE.2010.5665796"},{"key":"10_CR45","doi-asserted-by":"crossref","unstructured":"Firdausi, I., Erwin, A., Nugroho, A.S.: Analysis of machine learning techniques used in behavior based malware detection. In: Proceedings of 2nd International Conference on Advances in Computing, Control and Telecommunication Technologies (2010)","DOI":"10.1109\/ACT.2010.33"},{"key":"10_CR46","doi-asserted-by":"crossref","unstructured":"Ferrante, A., Medvet, E., Mercaldo, F., Milosevic, J., Visaggio, C.A.: Spotting the malicious moment: characterizing malware behavior using dynamic features. In: 11th International Conference on Availability, Reliability and Security. IEEE (2016)","DOI":"10.1109\/ARES.2016.70"},{"issue":"004","key":"10_CR47","first-page":"362","volume":"022","author":"D Donggao","year":"2016","unstructured":"Donggao, D., Gaochao, L., Yan, M.: Variable-length sequential dynamic features-based malware detection. High tech Commun. English Version 022(004), 362\u2013367 (2016)","journal-title":"High tech Commun. English Version"},{"key":"10_CR48","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-030-12942-2_19","volume-title":"Innovative Security Solutions for Information Technology and Communications","author":"AG Kakisim","year":"2019","unstructured":"Kakisim, A.G., Nar, M., Carkaci, N., Sogukpinar, I.: Analysis and evaluation of dynamic feature-based malware detection methods. In: Lanet, J.-L., Toma, C. (eds.) SECITC 2018. LNCS, vol. 11359, pp. 247\u2013258. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-12942-2_19"},{"issue":"2","key":"10_CR49","first-page":"57","volume":"39","author":"Y Lu","year":"2010","unstructured":"Lu, Y., Din, S., Zheng, C., Gao, B.: Using multi-feature and classifier ensembles to improve malware detection. J. CCIT 39(2), 57\u201372 (2010)","journal-title":"J. CCIT"},{"key":"10_CR50","doi-asserted-by":"crossref","unstructured":"Lee, J., Jeong, K., Lee, H.: Detecting metamorphic malwares using code graphs. In: Proceedings of the ACM Symposium on Applied Computing, USA, pp. 1970\u20131977. ACM (2010)","DOI":"10.1145\/1774088.1774505"},{"key":"10_CR51","unstructured":"Guo, H., Pang, J., Zhang, Y., Yue, F., Zhao, R.: HERO: a novel malware detection framework based on binary translation. In: Proceedings of the IEEE International Conference on Intelligent Computing and Intelligent Systems, pp. 411\u2013415. IEEE Xplore Press, Xiamen (2010)"},{"key":"10_CR52","unstructured":"Elhadi, A., Maarof, M., Osman, A.H.: Malware detection based on hybrid signature behaviour application programming interface call graph. Am. J. Appl. Sci. 9, 283\u2013288 (2012)"},{"key":"10_CR53","doi-asserted-by":"crossref","unstructured":"Santos, I., Devesa, J., Brezo, F., Nieves, J., Bringas, P.G.: OPEM: a static-dynamic approach for machine-learningbased malware detection. In: Proceedings of the International Joint Conference CISIS 2012-ICEUTE12-SOCO12 Special Sessions, vol. 189, pp. 271\u2013280 (2013)","DOI":"10.1007\/978-3-642-33018-6_28"},{"key":"10_CR54","unstructured":"Bai, J., Wang, J.: Improving malware detection using multi-view ensemble learning. Secur. Commun. Netw. 9, 4227\u20134241 (2016)"},{"key":"10_CR55","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.cose.2019.04.005","volume":"84","author":"J Zhang","year":"2019","unstructured":"Zhang, J., Qin, Z., Hui, Y., Lu, O., Zhang, K.: A feature-hybrid malware variants detection using CNN based OpCode embedding and BPNN based API embedding. Comput. Secur. 84, 376\u2013392 (2019)","journal-title":"Comput. Secur."}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62223-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T10:09:20Z","timestamp":1605002960000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62223-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030622220","9783030622237"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62223-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"11 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ml4cs2020\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"360","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"118","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}