{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:10:56Z","timestamp":1743088256350,"version":"3.40.3"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031141782"},{"type":"electronic","value":"9783031141799"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-14179-9_18","type":"book-chapter","created":{"date-parts":[[2022,9,4]],"date-time":"2022-09-04T23:02:47Z","timestamp":1662332567000},"page":"266-280","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Understanding Black-Box Attacks Against Object Detectors from\u00a0a\u00a0User\u2019s Perspective"],"prefix":"10.1007","author":[{"given":"Kim Andr\u00e9","family":"Midtlid","sequence":"first","affiliation":[]},{"given":"Johannes","family":"\u00c5sheim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7958-391X","authenticated-orcid":false,"given":"Jingyue","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,5]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","volume":"6","author":"N Akhtar","year":"2018","unstructured":"Akhtar, N., Mian, A.: Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access 6, 14410\u201314430 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2807385","journal-title":"IEEE Access"},{"key":"18_CR2","doi-asserted-by":"publisher","unstructured":"Alzantot, M., Sharma, Y., Chakraborty, S., Zhang, H., Hsieh, C.J., Srivastava, M.: GenAttack: practical black-box attacks with gradient-free optimization (2018). https:\/\/doi.org\/10.48550\/ARXIV.1805.11090. https:\/\/arxiv.org\/abs\/1805.11090","DOI":"10.48550\/ARXIV.1805.11090"},{"key":"18_CR3","unstructured":"Amazon: AWS machine learning (2021). https:\/\/aws.amazon.com\/machine-learning"},{"key":"18_CR4","unstructured":"Amazon: AWS Rekognition (2021). https:\/\/aws.amazon.com\/rekognition\/"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-030-01258-8_10","volume-title":"Computer Vision \u2013 ECCV 2018","author":"AN Bhagoji","year":"2018","unstructured":"Bhagoji, A.N., He, W., Li, B., Song, D.: Practical black-box attacks on deep neural networks using efficient query mechanisms. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11216, pp. 158\u2013174. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01258-8_10"},{"key":"18_CR6","doi-asserted-by":"publisher","unstructured":"Bhambri, S., Muku, S., Tulasi, A., Buduru, A.B.: A survey of black-box adversarial attacks on computer vision models (2019). https:\/\/doi.org\/10.48550\/ARXIV.1912.01667. https:\/\/arxiv.org\/abs\/1912.01667","DOI":"10.48550\/ARXIV.1912.01667"},{"key":"18_CR7","doi-asserted-by":"publisher","unstructured":"Borkar, J., Chen, P.Y.: Simple transparent adversarial examples (2021). https:\/\/doi.org\/10.48550\/ARXIV.2105.09685. https:\/\/arxiv.org\/abs\/2105.09685","DOI":"10.48550\/ARXIV.2105.09685"},{"key":"18_CR8","doi-asserted-by":"publisher","unstructured":"Brendel, W., Rauber, J., Bethge, M.: Decision-based adversarial attacks: reliable attacks against black-box machine learning models (2017). https:\/\/doi.org\/10.48550\/ARXIV.1712.04248. https:\/\/arxiv.org\/abs\/1712.04248","DOI":"10.48550\/ARXIV.1712.04248"},{"key":"18_CR9","doi-asserted-by":"publisher","unstructured":"Chen, J., Jordan, M.I., Wainwright, M.J.: HopSkipJumpAttack: a query-efficient decision-based attack. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 1277\u20131294 (2020). https:\/\/doi.org\/10.1109\/SP40000.2020.00045","DOI":"10.1109\/SP40000.2020.00045"},{"key":"18_CR10","doi-asserted-by":"publisher","unstructured":"Chen, P.Y., Zhang, H., Sharma, Y., Yi, J., Hsieh, C.J.: ZOO: zeroth order optimization based black-box attacks to deep neural networks without training substitute models. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security. ACM, November 2017. https:\/\/doi.org\/10.1145\/3128572.3140448","DOI":"10.1145\/3128572.3140448"},{"key":"18_CR11","doi-asserted-by":"publisher","unstructured":"Cheng, M., Le, T., Chen, P.Y., Yi, J., Zhang, H., Hsieh, C.J.: Query-efficient hard-label black-box attack: an optimization-based approach (2018). https:\/\/doi.org\/10.48550\/ARXIV.1807.04457. https:\/\/arxiv.org\/abs\/1807.04457","DOI":"10.48550\/ARXIV.1807.04457"},{"key":"18_CR12","unstructured":"Clarifai: The world\u2019s AI (2021). https:\/\/www.clarifai.com\/"},{"key":"18_CR13","doi-asserted-by":"publisher","unstructured":"Dong, Y., et al.: Efficient decision-based black-box adversarial attacks on face recognition (2019). https:\/\/doi.org\/10.48550\/ARXIV.1904.04433. https:\/\/arxiv.org\/abs\/1904.04433","DOI":"10.48550\/ARXIV.1904.04433"},{"key":"18_CR14","doi-asserted-by":"publisher","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples (2014). https:\/\/doi.org\/10.48550\/ARXIV.1412.6572. https:\/\/arxiv.org\/abs\/1412.6572","DOI":"10.48550\/ARXIV.1412.6572"},{"key":"18_CR15","unstructured":"Google: AutoML (2021). https:\/\/cloud.google.com\/automl"},{"key":"18_CR16","unstructured":"Google: Vision AI (2021). https:\/\/cloud.google.com\/vision"},{"key":"18_CR17","doi-asserted-by":"publisher","unstructured":"Grosse, K., Manoharan, P., Papernot, N., Backes, M., McDaniel, P.: On the (statistical) detection of adversarial examples (2017). https:\/\/doi.org\/10.48550\/ARXIV.1702.06280. https:\/\/arxiv.org\/abs\/1702.06280","DOI":"10.48550\/ARXIV.1702.06280"},{"key":"18_CR18","doi-asserted-by":"publisher","unstructured":"Guo, C., Rana, M., Cisse, M., van der Maaten, L.: Countering adversarial images using input transformations (2017). https:\/\/doi.org\/10.48550\/ARXIV.1711.00117. https:\/\/arxiv.org\/abs\/1711.00117","DOI":"10.48550\/ARXIV.1711.00117"},{"key":"18_CR19","doi-asserted-by":"publisher","unstructured":"Haoran, L., Yu\u2019an, T., Yuan, X., Yajie, W., Jingfeng, X.: A CMA-ES-Based adversarial attack against black-box object detectors. Chin. J. Electron. 30(3), 406\u2013412 (2021). https:\/\/doi.org\/10.1049\/cje.2021.03.003. https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/abs\/10.1049\/cje.2021.03.003","DOI":"10.1049\/cje.2021.03.003"},{"key":"18_CR20","doi-asserted-by":"publisher","unstructured":"Ilyas, A., Engstrom, L., Athalye, A., Lin, J.: Black-box adversarial attacks with limited queries and information (2018). https:\/\/doi.org\/10.48550\/ARXIV.1804.08598. https:\/\/arxiv.org\/abs\/1804.08598","DOI":"10.48550\/ARXIV.1804.08598"},{"key":"18_CR21","doi-asserted-by":"publisher","unstructured":"Ilyas, A., Engstrom, L., Madry, A.: Prior convictions: black-box adversarial attacks with bandits and priors (2018). https:\/\/doi.org\/10.48550\/ARXIV.1807.07978. https:\/\/arxiv.org\/abs\/1807.07978","DOI":"10.48550\/ARXIV.1807.07978"},{"key":"18_CR22","doi-asserted-by":"publisher","unstructured":"Jere, M., Rossi, L., Hitaj, B., Ciocarlie, G., Boracchi, G., Koushanfar, F.: Scratch that! An evolution-based adversarial attack against neural networks (2019). https:\/\/doi.org\/10.48550\/ARXIV.1912.02316. https:\/\/arxiv.org\/abs\/1912.02316","DOI":"10.48550\/ARXIV.1912.02316"},{"key":"18_CR23","doi-asserted-by":"publisher","unstructured":"Jia, X., Wei, X., Cao, X., Han, X.: Adv-watermark: a novel watermark perturbation for adversarial examples (2020). https:\/\/doi.org\/10.48550\/ARXIV.2008.01919. https:\/\/arxiv.org\/abs\/2008.01919","DOI":"10.48550\/ARXIV.2008.01919"},{"key":"18_CR24","unstructured":"Kitchenham, B., Charters, S.: Guidelines for performing systematic literature reviews in software engineering 2 (2007)"},{"key":"18_CR25","doi-asserted-by":"publisher","unstructured":"Kong, Z., et al.: A survey on adversarial attack in the age of artificial intelligence. Wirel. Commun. Mob. Comput. 2021 (2021). https:\/\/doi.org\/10.1155\/2021\/4907754","DOI":"10.1155\/2021\/4907754"},{"key":"18_CR26","doi-asserted-by":"publisher","unstructured":"Kuang, X., Gao, X., Wang, L., Zhao, G., Ke, L., Zhang, Q.: A discrete cosine transform-based query efficient attack on black-box object detectors. Inf. Sci. 546, 596\u2013607 (2021). https:\/\/doi.org\/10.1016\/j.ins.2020.05.089. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020025520305077","DOI":"10.1016\/j.ins.2020.05.089"},{"key":"18_CR27","doi-asserted-by":"publisher","unstructured":"Li, G., Zhu, P., Li, J., Yang, Z., Cao, N., Chen, Z.: Security matters: a survey on adversarial machine learning (2018). https:\/\/doi.org\/10.48550\/ARXIV.1810.07339. https:\/\/arxiv.org\/abs\/1810.07339","DOI":"10.48550\/ARXIV.1810.07339"},{"key":"18_CR28","doi-asserted-by":"publisher","unstructured":"Li, Y., Tian, D., Chang, M.C., Bian, X., Lyu, S.: Robust adversarial perturbation on deep proposal-based models (2018). https:\/\/doi.org\/10.48550\/ARXIV.1809.05962. https:\/\/arxiv.org\/abs\/1809.05962","DOI":"10.48550\/ARXIV.1809.05962"},{"key":"18_CR29","doi-asserted-by":"publisher","unstructured":"Lin, J., Xu, L., Liu, Y., Zhang, X.: Black-box adversarial sample generation based on differential evolution (2020). https:\/\/doi.org\/10.48550\/ARXIV.2007.15310. https:\/\/arxiv.org\/abs\/2007.15310","DOI":"10.48550\/ARXIV.2007.15310"},{"key":"18_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-319-46448-0_2","volume-title":"Computer Vision \u2013 ECCV 2016","author":"W Liu","year":"2016","unstructured":"Liu, W., et al.: SSD: single shot MultiBox detector. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9905, pp. 21\u201337. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46448-0_2"},{"key":"18_CR31","doi-asserted-by":"publisher","unstructured":"Meng, D., Chen, H.: MagNet: a two-pronged defense against adversarial examples (2017). https:\/\/doi.org\/10.48550\/ARXIV.1705.09064. https:\/\/arxiv.org\/abs\/1705.09064","DOI":"10.48550\/ARXIV.1705.09064"},{"key":"18_CR32","doi-asserted-by":"publisher","unstructured":"Narodytska, N., Kasiviswanathan, S.: Simple black-box adversarial attacks on deep neural networks. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1310\u20131318 (2017). https:\/\/doi.org\/10.1109\/CVPRW.2017.172","DOI":"10.1109\/CVPRW.2017.172"},{"key":"18_CR33","doi-asserted-by":"publisher","unstructured":"Naseer, M., Khan, S.H., Rahman, S., Porikli, F.: Task-generalizable adversarial attack based on perceptual metric (2018). https:\/\/doi.org\/10.48550\/ARXIV.1811.09020. https:\/\/arxiv.org\/abs\/1811.09020","DOI":"10.48550\/ARXIV.1811.09020"},{"key":"18_CR34","doi-asserted-by":"publisher","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z.B., Swami, A.: Practical black-box attacks against machine learning (2016). https:\/\/doi.org\/10.48550\/ARXIV.1602.02697. https:\/\/arxiv.org\/abs\/1602.02697","DOI":"10.48550\/ARXIV.1602.02697"},{"key":"18_CR35","doi-asserted-by":"publisher","unstructured":"Papernot, N., McDaniel, P., Wu, X., Jha, S., Swami, A.: Distillation as a defense to adversarial perturbations against deep neural networks (2015). https:\/\/doi.org\/10.48550\/ARXIV.1511.04508. https:\/\/arxiv.org\/abs\/1511.04508","DOI":"10.48550\/ARXIV.1511.04508"},{"issue":"20","key":"18_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/app10207168","volume":"10","author":"H Park","year":"2020","unstructured":"Park, H., Ryu, G., Choi, D.: Partial retraining substitute model for query-limited black-box attacks. Appl. Sci. 10(20), 1\u201319 (2020). https:\/\/doi.org\/10.3390\/app10207168","journal-title":"Appl. Sci."},{"issue":"5","key":"18_CR37","doi-asserted-by":"publisher","first-page":"909","DOI":"10.3390\/app9050909","volume":"9","author":"S Qiu","year":"2019","unstructured":"Qiu, S., Liu, Q., Zhou, S., Wu, C.: Review of artificial intelligence adversarial attack and defense technologies. Appl. Sci. 9(5), 909 (2019). https:\/\/doi.org\/10.3390\/app9050909","journal-title":"Appl. Sci."},{"key":"18_CR38","doi-asserted-by":"publisher","unstructured":"Redmon, J., Farhadi, A.: YOLOv3: an incremental improvement (2018). https:\/\/doi.org\/10.48550\/ARXIV.1804.02767. https:\/\/arxiv.org\/abs\/1804.02767","DOI":"10.48550\/ARXIV.1804.02767"},{"issue":"5","key":"18_CR39","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","volume":"23","author":"J Su","year":"2019","unstructured":"Su, J., Vargas, D.V., Sakurai, K.: One pixel attack for fooling deep neural networks. IEEE Trans. Evol. Comput. 23(5), 828\u2013841 (2019). https:\/\/doi.org\/10.1109\/TEVC.2019.2890858","journal-title":"IEEE Trans. Evol. Comput."},{"key":"18_CR40","doi-asserted-by":"publisher","unstructured":"Tram\u00e8r, F., Kurakin, A., Papernot, N., Goodfellow, I., Boneh, D., McDaniel, P.: Ensemble adversarial training: attacks and defenses (2017). https:\/\/doi.org\/10.48550\/ARXIV.1705.07204. https:\/\/arxiv.org\/abs\/1705.07204","DOI":"10.48550\/ARXIV.1705.07204"},{"key":"18_CR41","doi-asserted-by":"publisher","unstructured":"Wang, D., et al.: Daedalus: breaking nonmaximum suppression in object detection via adversarial examples. IEEE Trans. Cybern., 1\u201314 (2021). https:\/\/doi.org\/10.1109\/TCYB.2020.3041481","DOI":"10.1109\/TCYB.2020.3041481"},{"key":"18_CR42","doi-asserted-by":"publisher","unstructured":"Wang, S., Su, Z.: Metamorphic testing for object detection systems (2019). https:\/\/doi.org\/10.48550\/ARXIV.1912.12162. https:\/\/arxiv.org\/abs\/1912.12162","DOI":"10.48550\/ARXIV.1912.12162"},{"key":"18_CR43","doi-asserted-by":"publisher","unstructured":"Wang, Y., Tan, Y.A., Zhang, W., Zhao, Y., Kuang, X.: An adversarial attack on DNN-based black-box object detectors. J. Netw. Comput. Appl. 161, 102634 (2020). https:\/\/doi.org\/10.1016\/j.jnca.2020.102634","DOI":"10.1016\/j.jnca.2020.102634"},{"key":"18_CR44","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.ins.2020.10.028","volume":"550","author":"X Wei","year":"2021","unstructured":"Wei, X., Guo, Y., Li, B.: Black-box adversarial attacks by manipulating image attributes. Inf. Sci. 550, 285\u2013296 (2021). https:\/\/doi.org\/10.1016\/j.ins.2020.10.028","journal-title":"Inf. Sci."},{"key":"18_CR45","doi-asserted-by":"publisher","unstructured":"Wohlin, C.: Guidelines for snowballing in systematic literature studies and a replication in software engineering. In: Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering - EASE 2014. ACM Press (2014). https:\/\/doi.org\/10.1145\/2601248.2601268","DOI":"10.1145\/2601248.2601268"},{"key":"18_CR46","doi-asserted-by":"publisher","unstructured":"Xu, H., et al.: Adversarial attacks and defenses in images, graphs and text: a review. Int. J. Autom. Comput. 17(2), 151\u2013178 (2020). https:\/\/doi.org\/10.1007\/s11633-019-1211-x","DOI":"10.1007\/s11633-019-1211-x"},{"key":"18_CR47","doi-asserted-by":"publisher","unstructured":"Xu, W., Evans, D., Qi, Y.: Feature squeezing: Detecting adversarial examples in deep neural networks. In: Proceedings 2018 Network and Distributed System Security Symposium (2018). https:\/\/doi.org\/10.14722\/ndss.2018.23198","DOI":"10.14722\/ndss.2018.23198"},{"issue":"7","key":"18_CR48","doi-asserted-by":"publisher","first-page":"2578","DOI":"10.1109\/TNNLS.2019.2933524","volume":"31","author":"J Zhang","year":"2020","unstructured":"Zhang, J., Li, C.: Adversarial examples: opportunities and challenges. IEEE Trans. Neural Netw. Learn. Syst. 31(7), 2578\u20132593 (2020). https:\/\/doi.org\/10.1109\/TNNLS.2019.2933524","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"18_CR49","doi-asserted-by":"publisher","unstructured":"Zhang, Q., Zhao, Y., Wang, Y., Baker, T., Zhang, J., Hu, J.: Towards cross-task universal perturbation against black-box object detectors in autonomous driving. Comput. Netw. 180, 107388 (2020). https:\/\/doi.org\/10.1016\/j.comnet.2020.107388. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S138912862030606X","DOI":"10.1016\/j.comnet.2020.107388"},{"key":"18_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-030-34139-8_7","volume-title":"Smart Computing and Communication","author":"Y Zhao","year":"2019","unstructured":"Zhao, Y., Wang, K., Xue, Y., Zhang, Q., Zhang, X.: An universal perturbation generator for\u00a0black-box attacks against object detectors. In: Qiu, M. (ed.) SmartCom 2019. LNCS, vol. 11910, pp. 63\u201372. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-34139-8_7"},{"key":"18_CR51","doi-asserted-by":"publisher","unstructured":"Zhou, M., Wu, J., Liu, Y., Liu, S., Zhu, C.: DaST: data-free substitute training for adversarial attacks (2020). https:\/\/doi.org\/10.48550\/ARXIV.2003.12703. https:\/\/arxiv.org\/abs\/2003.12703","DOI":"10.48550\/ARXIV.2003.12703"}],"container-title":["Communications in Computer and Information Science","Quality of Information and Communications Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-14179-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,4]],"date-time":"2022-09-04T23:19:34Z","timestamp":1662333574000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-14179-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031141782","9783031141799"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-14179-9_18","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"5 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"QUATIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Quality of Information and Communications Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Talavera de la Reina","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"quatic2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.quatic.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}