{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:25:08Z","timestamp":1755926708431,"version":"3.40.3"},"publisher-location":"Cham","reference-count":67,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031197710"},{"type":"electronic","value":"9783031197727"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-19772-7_38","type":"book-chapter","created":{"date-parts":[[2022,10,27]],"date-time":"2022-10-27T22:09:58Z","timestamp":1666908598000},"page":"654-671","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Spectral View of\u00a0Randomized Smoothing Under Common Corruptions: Benchmarking and\u00a0Improving Certified Robustness"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1170-4735","authenticated-orcid":false,"given":"Jiachen","family":"Sun","sequence":"first","affiliation":[]},{"given":"Akshay","family":"Mehra","sequence":"additional","affiliation":[]},{"given":"Bhavya","family":"Kailkhura","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1039-8369","authenticated-orcid":false,"given":"Pin-Yu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Hendrycks","sequence":"additional","affiliation":[]},{"given":"Jihun","family":"Hamm","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9844-2055","authenticated-orcid":false,"given":"Z. Morley","family":"Mao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,28]]},"reference":[{"key":"38_CR1","unstructured":"1\/f noise (2021). http:\/\/www.scholarpedia.org\/article\/1\/f_noise"},{"key":"38_CR2","doi-asserted-by":"publisher","unstructured":"Alfarra, M., Bibi, A., Khan, N., Torr, P.H., Ghanem, B.: DeformRS: certifying input deformations with randomized smoothing. Proc. AAAI Conf. Artif. Intell. 36(6), 6001\u20136009 (2022). https:\/\/doi.org\/10.1609\/aaai.v36i6.20546, https:\/\/ojs.aaai.org\/index.php\/AAAI\/article\/view\/20546","DOI":"10.1609\/aaai.v36i6.20546"},{"key":"38_CR3","unstructured":"Athalye, A., Carlini, N., Wagner, D.: Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. In: International Conference on Machine Learning, pp. 274\u2013283. PMLR (2018)"},{"key":"38_CR4","doi-asserted-by":"publisher","first-page":"132330","DOI":"10.1109\/ACCESS.2020.3010274","volume":"8","author":"S Bulusu","year":"2020","unstructured":"Bulusu, S., Kailkhura, B., Li, B., Varshney, P.K., Song, D.: Anomalous example detection in deep learning: a survey. IEEE Access 8, 132330\u2013132347 (2020)","journal-title":"IEEE Access"},{"issue":"1","key":"38_CR5","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1364\/AO.26.000157","volume":"26","author":"GJ Burton","year":"1987","unstructured":"Burton, G.J., Moorhead, I.R.: Color and spatial structure in natural scenes. Appl. Opt. 26(1), 157\u2013170 (1987)","journal-title":"Appl. Opt."},{"key":"38_CR6","doi-asserted-by":"publisher","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 39\u201357 (2017). https:\/\/doi.org\/10.1109\/SP.2017.49","DOI":"10.1109\/SP.2017.49"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Chen, P.Y., Sharma, Y., Zhang, H., Yi, J., Hsieh, C.J.: EAD: elastic-net attacks to deep neural networks via adversarial examples. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 10\u201317 (2018)","DOI":"10.1609\/aaai.v32i1.11302"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Chen, P.Y., Zhang, H., Sharma, Y., Yi, J., Hsieh, C.J.: ZOO: zeroth order optimization based black-box attacks to deep neural networks without training substitute models. In: ACM Workshop on Artificial Intelligence and Security, pp. 15\u201326 (2017)","DOI":"10.1145\/3128572.3140448"},{"key":"38_CR9","unstructured":"Cohen, J., Rosenfeld, E., Kolter, Z.: Certified adversarial robustness via randomized smoothing. In: International Conference on Machine Learning, pp. 1310\u20131320. PMLR (2019)"},{"key":"38_CR10","unstructured":"Croce, F., et al.: Robustbench: a standardized adversarial robustness benchmark. arXiv preprint arXiv:2010.09670 (2020)"},{"key":"38_CR11","doi-asserted-by":"crossref","unstructured":"Cubuk, E.D., Zoph, B., Mane, D., Vasudevan, V., Le, Q.V.: AutoAugment: learning augmentation strategies from data. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 113\u2013123 (2019)","DOI":"10.1109\/CVPR.2019.00020"},{"key":"38_CR12","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 248\u2013255. IEEE (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"38_CR13","doi-asserted-by":"crossref","unstructured":"Dodge, S., Karam, L.: Understanding how image quality affects deep neural networks. In: 2016 Eighth International Conference on Quality of Multimedia Experience (QoMEX), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/QoMEX.2016.7498955"},{"key":"38_CR14","unstructured":"Fischer, M., Baader, M., Vechev, M.: Certified defense to image transformations via randomized smoothing. arXiv preprint arXiv:2002.12463 (2020)"},{"key":"38_CR15","unstructured":"Fuglede, B., Topsoe, F.: Jensen-shannon divergence and HilBERT space embedding. In: International Symposium on Information Theory, 2004. ISIT 2004. Proceedings, p. 31. IEEE (2004)"},{"key":"38_CR16","doi-asserted-by":"crossref","unstructured":"Gokhale, T., Anirudh, R., Kailkhura, B., Thiagarajan, J.J., Baral, C., Yang, Y.: Attribute-guided adversarial training for robustness to natural perturbations. arXiv preprint arXiv:2012.01806 (2020)","DOI":"10.1609\/aaai.v35i9.16927"},{"key":"38_CR17","unstructured":"Gowal, S., et al.: On the effectiveness of interval bound propagation for training verifiably robust models. arXiv preprint arXiv:1810.12715 (2018)"},{"key":"38_CR18","doi-asserted-by":"publisher","unstructured":"Hammersley, J.: Monte Carlo methods. Springer, Singapore (2013). https:\/\/doi.org\/10.1007\/978-981-13-2971-5","DOI":"10.1007\/978-981-13-2971-5"},{"key":"38_CR19","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"38_CR20","doi-asserted-by":"crossref","unstructured":"Hendrycks, D., et al.: The many faces of robustness: A critical analysis of out-of-distribution generalization. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 8340\u20138349 (2021)","DOI":"10.1109\/ICCV48922.2021.00823"},{"key":"38_CR21","unstructured":"Hendrycks, D., Carlini, N., Schulman, J., Steinhardt, J.: Unsolved problems in ml safety. ArXiv abs\/2109.13916 (2021)"},{"key":"38_CR22","unstructured":"Hendrycks, D., Dietterich, T.: Benchmarking neural network robustness to common corruptions and perturbations. arXiv preprint arXiv:1903.12261 (2019)"},{"key":"38_CR23","unstructured":"Hendrycks, D., Mu, N., Cubuk, E.D., Zoph, B., Gilmer, J., Lakshminarayanan, B.: AugMix: a simple data processing method to improve robustness and uncertainty. arXiv preprint arXiv:1912.02781 (2019)"},{"key":"38_CR24","unstructured":"Ilyas, A., Engstrom, L., Athalye, A., Lin, J.: Black-box adversarial attacks with limited queries and information. In: International Conference on Machine Learning, pp. 2137\u20132146. PMLR (2018)"},{"key":"38_CR25","unstructured":"Jeong, J., Shin, J.: Consistency regularization for certified robustness of smoothed classifiers. arXiv preprint arXiv:2006.04062 (2020)"},{"issue":"1","key":"38_CR26","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1103\/PhysRev.26.71","volume":"26","author":"JB Johnson","year":"1925","unstructured":"Johnson, J.B.: The schottky effect in low frequency circuits. Phys. Rev. 26(1), 71 (1925)","journal-title":"Phys. Rev."},{"issue":"1","key":"38_CR27","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1167\/9.1.2","volume":"9","author":"OR Joubert","year":"2009","unstructured":"Joubert, O.R., Rousselet, G.A., Fabre-Thorpe, M., Fize, D.: Rapid visual categorization of natural scene contexts with equalized amplitude spectrum and increasing phase noise. J. Vis. 9(1), 2\u20132 (2009)","journal-title":"J. Vis."},{"key":"38_CR28","doi-asserted-by":"publisher","unstructured":"Joyce, J.M.: Kullback-Leibler Divergence. In: Lovric, M. (eds.) International Encyclopedia of Statistical Science, pp. 720\u2013722. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-04898-2_327","DOI":"10.1007\/978-3-642-04898-2_327"},{"issue":"1","key":"38_CR29","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1364\/JOSA.60.000015","volume":"60","author":"D Kermisch","year":"1970","unstructured":"Kermisch, D.: Image reconstruction from phase information only. J. Opt. Soc. Am. 60(1), 15\u201317 (1970)","journal-title":"J. Opt. Soc. Am."},{"key":"38_CR30","unstructured":"Kireev, K., Andriushchenko, M., Flammarion, N.: On the effectiveness of adversarial training against common corruptions. arXiv preprint arXiv:2103.02325 (2021)"},{"key":"38_CR31","unstructured":"Krizhevsky, A., Hinton, G., et al.: Learning multiple layers of features from tiny images. Technical Report 0, University of Toronto (2009)"},{"key":"38_CR32","doi-asserted-by":"crossref","unstructured":"Lecuyer, M., Atlidakis, V., Geambasu, R., Hsu, D., Jana, S.: Certified robustness to adversarial examples with differential privacy. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 656\u2013672. IEEE (2019)","DOI":"10.1109\/SP.2019.00044"},{"key":"38_CR33","unstructured":"Li, B., Chen, C., Wang, W., Carin, L.: Second-order adversarial attack and certifiable robustness (2018)"},{"key":"38_CR34","unstructured":"Li, L., Qi, X., Xie, T., Li, B.: SoK: certified robustness for deep neural networks. arXiv abs\/2009.04131 (2020)"},{"key":"38_CR35","doi-asserted-by":"crossref","unstructured":"Li, L., et al.: TSS: transformation-specific smoothing for robustness certification. In: ACM CCS (2021)","DOI":"10.1145\/3460120.3485258"},{"key":"38_CR36","unstructured":"Lim, J.S.: Two-Dimensional Signal and Image Processing. Prentice-Hall, Englewood Cliffs (1990)"},{"key":"38_CR37","doi-asserted-by":"crossref","unstructured":"Mehra, A., Kailkhura, B., Chen, P.Y., Hamm, J.: How robust are randomized smoothing based defenses to data poisoning? In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 13244\u201313253 (2021)","DOI":"10.1109\/CVPR46437.2021.01304"},{"key":"38_CR38","unstructured":"Mintun, E., Kirillov, A., Xie, S.: On interaction between augmentations and corruptions in natural corruption robustness. arXiv preprint arXiv:2102.11273 (2021)"},{"key":"38_CR39","doi-asserted-by":"crossref","unstructured":"Mishra, S., Arunkumar, A.: How robust are model rankings: A leaderboard customization approach for equitable evaluation. arXiv preprint arXiv:2106.05532 (2021)","DOI":"10.1609\/aaai.v35i15.17599"},{"key":"38_CR40","unstructured":"Mohapatra, J., Ko, C.Y., Weng, T.W., Chen, P.Y., Liu, S., Daniel, L.: Higher-order certification for randomized smoothing. In: Proceedings of the 34th International Conference on Neural Information Processing Systems (2020)"},{"key":"38_CR41","doi-asserted-by":"crossref","unstructured":"Mohapatra, J., Weng, T.W., Chen, P.Y., Liu, S., Daniel, L.: Towards verifying robustness of neural networks against a family of semantic perturbations. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 244\u2013252 (2020)","DOI":"10.1109\/CVPR42600.2020.00032"},{"key":"38_CR42","unstructured":"Raghunathan, A., Steinhardt, J., Liang, P.: Certified defenses against adversarial examples. arXiv preprint arXiv:1801.09344 (2018)"},{"key":"38_CR43","unstructured":"Raji, I.D., Bender, E.M., Paullada, A., Denton, E., Hanna, A.: Ai and the everything in the whole wide world benchmark. arXiv preprint arXiv:2111.15366 (2021)"},{"key":"38_CR44","unstructured":"Rebuffi, S.A., Gowal, S., Calian, D.A., Stimberg, F., Wiles, O., Mann, T.: Fixing data augmentation to improve adversarial robustness. arXiv preprint arXiv:2103.01946 (2021)"},{"key":"38_CR45","unstructured":"Ruder, S.: An overview of gradient descent optimization algorithms. arXiv preprint arXiv:1609.04747 (2016)"},{"key":"38_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-642-15561-1_16","volume-title":"Computer Vision \u2013 ECCV 2010","author":"K Saenko","year":"2010","unstructured":"Saenko, K., Kulis, B., Fritz, M., Darrell, T.: Adapting visual category models to new domains. In: Daniilidis, K., Maragos, P., Paragios, N. (eds.) ECCV 2010. LNCS, vol. 6314, pp. 213\u2013226. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15561-1_16"},{"key":"38_CR47","unstructured":"Salman, H., et al.: Provably robust deep learning via adversarially trained smoothed classifiers. arXiv preprint arXiv:1906.04584 (2019)"},{"key":"38_CR48","unstructured":"Schneider, S., Rusak, E., Eck, L., Bringmann, O., Brendel, W., Bethge, M.: Improving robustness against common corruptions by covariate shift adaptation. In: 34th Conference on Neural Information Processing Systems (NeurIPS 2020), Vancouver, Canada (2020)"},{"key":"38_CR49","unstructured":"Sun, J., Cao, Y., Chen, Q.A., Mao, Z.M.: Towards robust LiDAR-based perception in autonomous driving: General black-box adversarial sensor attack and countermeasures. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 877\u2013894. USENIX Association, August 2020. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/sun"},{"key":"38_CR50","first-page":"15498","volume":"34","author":"J Sun","year":"2021","unstructured":"Sun, J., Cao, Y., Choy, C.B., Yu, Z., Anandkumar, A., Mao, Z.M., Xiao, C.: Adversarially robust 3d point cloud recognition using self-supervisions. Adv. Neural. Inf. Process. Syst. 34, 15498\u201315512 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"38_CR51","unstructured":"Sun, J., Koenig, K., Cao, Y., Chen, Q.A., Mao, Z.M.: On adversarial robustness of 3d point cloud classification under adaptive attacks. arXiv preprint arXiv:2011.11922 (2020)"},{"key":"38_CR52","unstructured":"Sun, J., Zhang, Q., Kailkhura, B., Yu, Z., Xiao, C., Mao, Z.M.: Benchmarking robustness of 3d point cloud recognition against common corruptions. arXiv preprint arXiv:2201.12296 (2022)"},{"key":"38_CR53","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)"},{"issue":"2","key":"38_CR54","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1111\/j.1475-1313.1992.tb00296.x","volume":"12","author":"D Tolhurst","year":"1992","unstructured":"Tolhurst, D., Tadmor, Y., Chao, T.: Amplitude spectra of natural images. Ophthalmic Physiol. Opt. 12(2), 229\u2013232 (1992)","journal-title":"Ophthalmic Physiol. Opt."},{"key":"38_CR55","unstructured":"Tramer, F., Carlini, N., Brendel, W., Madry, A.: On adaptive attacks to adversarial example defenses. arXiv preprint arXiv:2002.08347 (2020)"},{"key":"38_CR56","unstructured":"Wang, D., Shelhamer, E., Liu, S., Olshausen, B., Darrell, T.: Tent: fully test-time adaptation by entropy minimization. In: International Conference on Learning Representations (2021). https:\/\/openreview.net\/forum?id=uXl3bZLkr3c"},{"key":"38_CR57","unstructured":"Wong, E., Kolter, Z.: Provable defenses against adversarial examples via the convex outer adversarial polytope. In: International Conference on Machine Learning, pp. 5286\u20135295. PMLR (2018)"},{"key":"38_CR58","doi-asserted-by":"crossref","unstructured":"Xiao, C., Li, B., Zhu, J.Y., He, W., Liu, M., Song, D.: Generating adversarial examples with adversarial networks. arXiv preprint arXiv:1801.02610 (2018)","DOI":"10.24963\/ijcai.2018\/543"},{"key":"38_CR59","unstructured":"Xu, K., et al.: Provable, scalable and automatic perturbation analysis on general computational graphs. arXiv e-prints pp. arXiv-2002 (2020)"},{"key":"38_CR60","unstructured":"Xu, K., Wang, C., Cheng, H., Kailkhura, B., Lin, X., Goldhahn, R.: Mixture of robust experts (MORE): a robust denoising method towards multiple perturbations. arXiv preprint arXiv:2104.10586 (2021)"},{"key":"38_CR61","doi-asserted-by":"crossref","unstructured":"Xu, Q., Zhang, R., Zhang, Y., Wang, Y., Tian, Q.: A Fourier-based framework for domain generalization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14383\u201314392 (2021)","DOI":"10.1109\/CVPR46437.2021.01415"},{"key":"38_CR62","doi-asserted-by":"crossref","unstructured":"Xu, Q., Zhang, R., Zhang, Y., Wang, Y., Tian, Q.: A Fourier-based framework for domain generalization. In: IEEE\/CVF CVPR, pp. 14383\u20134392, June 2021","DOI":"10.1109\/CVPR46437.2021.01415"},{"key":"38_CR63","doi-asserted-by":"crossref","unstructured":"Yang, G., Duan, T., Hu, J.E., Salman, H., Razenshteyn, I., Li, J.: Randomized smoothing of all shapes and sizes. In: International Conference on Machine Learning, pp. 10693\u201310705. PMLR (2020)","DOI":"10.1109\/JIOT.2020.3048253"},{"key":"38_CR64","doi-asserted-by":"crossref","unstructured":"Yang, Y., Lao, D., Sundaramoorthi, G., Soatto, S.: Phase consistent ecological domain adaptation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9011\u20139020 (2020)","DOI":"10.1109\/CVPR42600.2020.00903"},{"key":"38_CR65","unstructured":"Yin, D., Lopes, R.G., Shlens, J., Cubuk, E.D., Gilmer, J.: A fourier perspective on model robustness in computer vision. arXiv preprint arXiv:1906.08988 (2019)"},{"key":"38_CR66","unstructured":"Zhai, R., et al.: MACER: attack-free and scalable robust training via maximizing certified radius. In: International Conference on Learning Representations (2020). https:\/\/openreview.net\/forum?id=rJx1Na4Fwr"},{"key":"38_CR67","unstructured":"Zhang, H., Weng, T.W., Chen, P.Y., Hsieh, C.J., Daniel, L.: Efficient neural network robustness certification with general activation functions. In: Advances in Neural Information Processing Systems, pp. 4944\u20134953 (2018)"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-19772-7_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T16:58:05Z","timestamp":1710262685000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-19772-7_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031197710","9783031197727"],"references-count":67,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-19772-7_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"28 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tel Aviv","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Israel","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2022.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5804","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1645","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.21","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.91","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}