{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T16:55:46Z","timestamp":1773939346668,"version":"3.50.1"},"publisher-location":"Cham","reference-count":56,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030884277","type":"print"},{"value":"9783030884284","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-88428-4_28","type":"book-chapter","created":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T06:03:11Z","timestamp":1633068191000},"page":"563-583","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Locality Sensitive Hashing with Extended Differential Privacy"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9212-7839","authenticated-orcid":false,"given":"Natasha","family":"Fernandes","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2151-9560","authenticated-orcid":false,"given":"Yusuke","family":"Kawamoto","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5110-1261","authenticated-orcid":false,"given":"Takao","family":"Murakami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,2]]},"reference":[{"key":"28_CR1","unstructured":"Acharya, J., Sun, Z., Zhang, H.: Hadamard response: Estimating distributions privately, efficiently, and with little communication. In: AISTATS, pp. 1120\u20131129 (2019)"},{"key":"28_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29659-3","volume-title":"Recommender Systems","author":"CC Aggarwal","year":"2016","unstructured":"Aggarwal, C.C.: Recommender Systems. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-319-29659-3"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Aghasaryan, A., Bouzid, M., Kostadinov, D., Kothari, M., Nandi, A.: On the use of LSH for privacy preserving personalization. In: TrustCom, pp. 362\u2013371 (2013)","DOI":"10.1109\/TrustCom.2013.46"},{"key":"28_CR4","doi-asserted-by":"publisher","unstructured":"Alvim, M.S., Chatzikokolakis, K., Palamidessi, C., Pazii, A.: Invited paper: local differential privacy on metric spaces: optimizing the trade-off with utility. In: CSF, pp. 262\u2013267 (2018). https:\/\/doi.org\/10.1109\/CSF.2018.00026","DOI":"10.1109\/CSF.2018.00026"},{"key":"28_CR5","unstructured":"Andoni, A., Indyk, P., Laarhoven, T., Razenshteyn, I., Schmidt, L.: Practical and optimal LSH for angular distance. In: NIPS, pp. 1\u20139 (2015)"},{"key":"28_CR6","unstructured":"Andoni, A., Indyk, P., Razenshteyn, I.: Approximate nearest neighbor search in high dimensions. In: ICM, pp. 3287\u20133318. World Scientific (2018)"},{"key":"28_CR7","doi-asserted-by":"publisher","unstructured":"Andr\u00e9s, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: CCS, pp. 901\u2013914. ACM (2013). https:\/\/doi.org\/10.1145\/2508859.2516735","DOI":"10.1145\/2508859.2516735"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Aum\u00fcller, M., Bourgeat, A., Schmurr, J.: Differentially private sketches for Jaccard similarity estimation. CoRR abs\/2008.08134 (2020)","DOI":"10.1007\/978-3-030-60936-8_2"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Optimal geo-indistinguishable mechanisms for location privacy. In: CCS, pp. 251\u2013262 (2014)","DOI":"10.1145\/2660267.2660345"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Brendel, W., Han, F., Marujo, L., Jie, L., Korolova, A.: Practical privacy-preserving friend recommendations on social networks. In: WWW, pp. 111\u2013112 (2018)","DOI":"10.1145\/3184558.3186954"},{"key":"28_CR11","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1006\/jcss.1999.1690","volume":"60","author":"AZ Broder","year":"2000","unstructured":"Broder, A.Z., Charikar, M., Frieze, A.M., Mitzenmacher, M.: Min-wise independent permutations. J. Comput. Syst. Sci. 60, 630\u2013659 (2000)","journal-title":"J. Comput. Syst. Sci."},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Charikar, M.S.: Similarity estimation techniques from rounding algorithms. In: STOC, pp. 380\u2013388 (2002)","DOI":"10.1145\/509907.509965"},{"key":"28_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-39077-7_5","volume-title":"Privacy Enhancing Technologies","author":"K Chatzikokolakis","year":"2013","unstructured":"Chatzikokolakis, K., Andr\u00e9s, M.E., Bordenabe, N.E., Palamidessi, C.: Broadening the scope of differential privacy using metrics. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 82\u2013102. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39077-7_5"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Chen, L., Zhu, P.: Preserving the privacy of social recommendation with a differentially private approach. In: SmartCity, pp. 780\u2013785. IEEE (2015)","DOI":"10.1109\/SmartCity.2015.162"},{"issue":"1","key":"28_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-019-1478-1","volume":"2019","author":"X Chen","year":"2019","unstructured":"Chen, X., Liu, H., Yang, D.: Improved LSH for privacy-aware and robust recommender system with sparse data in edge environment. EURASIP J. Wirel. Commun. Netw. 2019(1), 1\u201311 (2019). https:\/\/doi.org\/10.1186\/s13638-019-1478-1","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"28_CR16","doi-asserted-by":"publisher","first-page":"56018","DOI":"10.1109\/ACCESS.2018.2872494","volume":"6","author":"H Cheng","year":"2018","unstructured":"Cheng, H., Qian, M., Li, Q., Zhou, Y., Chen, T.: An efficient privacy-preserving friend recommendation scheme for social network. IEEE Access 6, 56018\u201356028 (2018)","journal-title":"IEEE Access"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Chow, R., Pathak, M.A., Wang, C.: A practical system for privacy-preserving collaborative filtering. In: ICDM Workshops, pp. 547\u2013554 (2012)","DOI":"10.1109\/ICDMW.2012.84"},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Datar, M., Immorlica, N., Indyk, P., Mirrokni, V.S.: Locality-sensitive hashing scheme based on p-stable distributions. In: SCG, pp. 253\u2013262 (2004)","DOI":"10.1145\/997817.997857"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Duchi, J.C., Jordan, M.I., Wainwright, M.J.: Local privacy and statistical minimax rates. In: FOCS, pp. 429\u2013438 (2013)","DOI":"10.1109\/FOCS.2013.53"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy. In: ICALP, pp. 1\u201312 (2006)","DOI":"10.1007\/11787006_1"},{"key":"28_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"key":"28_CR22","unstructured":"Dwork, C., Rothblum, G.N.: Concentrated differential privacy. CoRR abs\/1603.01887 (2016)"},{"key":"28_CR23","doi-asserted-by":"crossref","unstructured":"\u00dalfar Erlingsson, Pihur, V., Korolova, A.: RAPPOR: randomized aggregatable privacy-preserving ordinal response. In: CCS, pp. 1054\u20131067 (2014)","DOI":"10.1145\/2660267.2660348"},{"key":"28_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-95582-7_1","volume-title":"Formal Methods","author":"N Fernandes","year":"2018","unstructured":"Fernandes, N., Dras, M., McIver, A.: Processing text for privacy: an information flow perspective. In: Havelund, K., Peleska, J., Roscoe, B., de Vink, E. (eds.) FM 2018. LNCS, vol. 10951, pp. 3\u201321. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-95582-7_1"},{"key":"28_CR25","doi-asserted-by":"crossref","unstructured":"Fernandes, N., Dras, M., McIver, A.: Generalised differential privacy for text document processing. In: POST, pp. 123\u2013148 (2019)","DOI":"10.1007\/978-3-030-17138-4_6"},{"key":"28_CR26","unstructured":"Fernandes, N., Kawamoto, Y., Murakami, T.: Locality sensitive hashing with extended differential privacy. CoRR abs\/2010.09393 (2020). https:\/\/arxiv.org\/abs\/2010.09393"},{"key":"28_CR27","doi-asserted-by":"crossref","unstructured":"Ganta, S.R., Kasiviswanathan, S.P., Smith, A.: Composition attacks and auxiliary information in data privacy. In: KDD, pp. 265\u2013273. ACM (2008)","DOI":"10.1145\/1401890.1401926"},{"key":"28_CR28","unstructured":"Gionis, A., Indyk, P., Motwani, R.: Similarity search in high dimensions via hashing. In: VLDB, pp. 518\u2013529 (1999)"},{"key":"28_CR29","doi-asserted-by":"crossref","unstructured":"Hu, H., Dobbie, G., Salcic, Z., Liu, M., Zhang, J., Lyu, L., Zhang, X.: Differentially private locality sensitive hashing based federated recommender system. Concurr. Comput. Pract. Exp. 1\u201316 (2020)","DOI":"10.1002\/cpe.6233"},{"key":"28_CR30","doi-asserted-by":"crossref","unstructured":"Indyk, P., Motwani, R.: Approximate nearest neighbors: towards removing the curse of dimensionality. In: STOC, pp. 604\u2013613 (1998)","DOI":"10.1145\/276698.276876"},{"key":"28_CR31","unstructured":"Kairouz, P., Bonawitz, K., Ramage, D.: Discrete distribution estimation under local privacy. In: ICML, pp. 2436\u20132444 (2016)"},{"key":"28_CR32","doi-asserted-by":"crossref","unstructured":"Kamalaruban, P., Perrier, V., Asghar, H.J., Kaafar, M.A.: Not all attributes are created equal: $$d_x$$-private mechanisms for linear queries. In: Proceedings on Privacy Enhancing Technologies (PoPETs), vol. 2020, no. 1, pp. 103\u2013125 (2020)","DOI":"10.2478\/popets-2020-0007"},{"key":"28_CR33","doi-asserted-by":"crossref","unstructured":"Kawamoto, Y., Murakami, T.: On the anonymization of differentially private location obfuscation. In: ISITA, pp. 159\u2013163. IEEE (2018)","DOI":"10.23919\/ISITA.2018.8664351"},{"key":"28_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-030-29959-0_7","volume-title":"Computer Security \u2013 ESORICS 2019","author":"Y Kawamoto","year":"2019","unstructured":"Kawamoto, Y., Murakami, T.: Local obfuscation mechanisms for hiding probability distributions. In: Sako, K., Schneider, S., Ryan, P.Y.A. (eds.) ESORICS 2019. LNCS, vol. 11735, pp. 128\u2013148. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29959-0_7"},{"issue":"2","key":"28_CR35","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1109\/JIOT.2016.2582780","volume":"4","author":"M Li","year":"2017","unstructured":"Li, M., Ruan, N., Qian, Q., Zhu, H., Liang, X., Yu, L.: SPFM: scalable and privacy-preserving friend matching in mobile clouds. IEEE Internet Things J. 4(2), 583\u2013591 (2017)","journal-title":"IEEE Internet Things J."},{"key":"28_CR36","doi-asserted-by":"crossref","unstructured":"Liu, C., Mittal, P.: LinkMirage: enabling privacy-preserving analytics on social relationships. In: NDSS (2016)","DOI":"10.14722\/ndss.2016.23277"},{"key":"28_CR37","doi-asserted-by":"crossref","unstructured":"Liu, Z., Wang, Y.X., Smola, A.J.: Fast differentially private matrix factorization. In: RecSys, pp. 171\u2013178 (2015)","DOI":"10.1145\/2792838.2800191"},{"key":"28_CR38","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.future.2017.09.060","volume":"79","author":"X Ma","year":"2018","unstructured":"Ma, X., Ma, J., Li, H., Jiang, Q., Gao, S.: ARMOR: a trust-based privacy-preserving framework for decentralized friend recommendation in online social networks. Futur. Gener. Comput. Syst. 79, 82\u201394 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"28_CR39","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Abowd, J.M., Gehrke, J., Vilhuber, L.: Privacy: theory meets practice on the map. In: ICDE, pp. 277\u2013286. IEEE (2008)","DOI":"10.1109\/ICDE.2008.4497436"},{"issue":"7","key":"28_CR40","first-page":"440","volume":"4","author":"A Machanavajjhala","year":"2020","unstructured":"Machanavajjhala, A., Korolova, A., Sarma, A.D.: Personalized social recommendations - accurate or private? VLDB 4(7), 440\u2013450 (2020)","journal-title":"VLDB"},{"key":"28_CR41","unstructured":"MovieLens 25m Dataset. https:\/\/grouplens.org\/datasets\/movielens\/25m\/. Accessed 2020"},{"issue":"2","key":"28_CR42","doi-asserted-by":"publisher","first-page":"5","DOI":"10.2478\/popets-2021-0015","volume":"2021","author":"T Murakami","year":"2021","unstructured":"Murakami, T., Hamada, K., Kawamoto, Y., Hatano, T.: Privacy-preserving multiple tensor factorization for synthesizing large-scale location traces with cluster-specific features. Proc. Priv. Enhancing Technol. 2021(2), 5\u201326 (2021)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"28_CR43","unstructured":"Murakami, T., Kawamoto, Y.: Utility-optimized local differential privacy mechanisms for distribution estimation. In: USENIX Security, pp. 1877\u20131894 (2019)"},{"key":"28_CR44","unstructured":"Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D., et al.: Location privacy via private proximity testing. In: NDSS, vol. 11 (2011)"},{"key":"28_CR45","unstructured":"Nissim, K., Stemmer, U.: Clustering algorithms for the centralized and local models. In: Algorithmic Learning Theory, pp. 619\u2013653 (2019)"},{"issue":"11","key":"28_CR46","doi-asserted-by":"publisher","first-page":"2616","DOI":"10.1109\/JSAC.2017.2760458","volume":"35","author":"L Qi","year":"2017","unstructured":"Qi, L., Zhang, X., Dou, W., Ni, Q.: A distributed locality-sensitive hashing-based approach for cloud service recommendation from multi-source data. IEEE J. Sel. Areas Commun. 35(11), 2616\u20132624 (2017)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"2","key":"28_CR47","first-page":"141","volume":"8","author":"BK Samanthula","year":"2015","unstructured":"Samanthula, B.K., Cen, L., Jiang, W., Si, L.: Privacy-preserving and efficient friend recommendation in online social networks. Trans. Data Priv. 8(2), 141\u2013171 (2015)","journal-title":"Trans. Data Priv."},{"issue":"9","key":"28_CR48","doi-asserted-by":"publisher","first-page":"1770","DOI":"10.1109\/TKDE.2018.2805356","volume":"30","author":"H Shin","year":"2018","unstructured":"Shin, H., Kim, S., Shin, J., Xiao, X.: Privacy enhanced matrix factorization for recommendation with local differential privacy. IEEE Trans. Knowl. Data Eng. 30(9), 1770\u20131782 (2018)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"28_CR49","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/JPROC.2015.2487976","volume":"104","author":"J Wang","year":"2016","unstructured":"Wang, J., Liu, W., Kumar, S., Chang, S.F.: Learning to hash for indexing big data - a survey. Proc. IEEE 104(1), 34\u201357 (2016)","journal-title":"Proc. IEEE"},{"key":"28_CR50","unstructured":"Wang, S., et al.: Mutual information optimally local private discrete distribution estimation. CoRR abs\/1607.08025 (2016). https:\/\/arxiv.org\/abs\/1607.08025"},{"key":"28_CR51","unstructured":"Wang, T., Blocki, J., Li, N., Jha, S.: Locally differentially private protocols for frequency estimation. In: USENIX Security, pp. 729\u2013745 (2017)"},{"issue":"309","key":"28_CR52","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1080\/01621459.1965.10480775","volume":"60","author":"SL Warner","year":"1965","unstructured":"Warner, S.L.: Randomized response: a survey technique for eliminating evasive answer bias. J. Am. Stat. Assoc. 60(309), 63\u201369 (1965)","journal-title":"J. Am. Stat. Assoc."},{"key":"28_CR53","doi-asserted-by":"crossref","unstructured":"Xiang, Z., Ding, B., He, X., Zhou, J.: Linear and range counting under metric-based local differential privacy. In: ISIT, pp. 908\u2013913 (2020)","DOI":"10.1109\/ISIT44484.2020.9173952"},{"key":"28_CR54","doi-asserted-by":"crossref","unstructured":"Yang, D., Qu, B., Yang, J., Cudre-Mauroux, P.: Revisiting user mobility and social relationships in LBSNs: a hypergraph embedding approach. In: WWW, pp. 2147\u20132157 (2019)","DOI":"10.1145\/3308558.3313635"},{"key":"28_CR55","doi-asserted-by":"crossref","unstructured":"Ye, M., Barga, A.: Optimal schemes for discrete distribution estimation under local differential privacy. In: ISIT, pp. 759\u2013763 (2017)","DOI":"10.1109\/ISIT.2017.8006630"},{"key":"28_CR56","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-030-63820-7_13","volume-title":"Neural Information Processing","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y., Gao, N., Chen, J., Tu, C., Wang, J.: PrivRec: user-centric differentially private collaborative filtering using LSH and KD. In: Yang, H., Pasupa, K., Leung, A.C.-S., Kwok, J.T., Chan, J.H., King, I. (eds.) ICONIP 2020. CCIS, vol. 1332, pp. 113\u2013121. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-63820-7_13"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-88428-4_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T06:23:29Z","timestamp":1633069409000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-88428-4_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030884277","9783030884284"],"references-count":56,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-88428-4_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"2 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Darmstadt","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2021.athene-center.de\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"351","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.07","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.06","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}