{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:51:18Z","timestamp":1772905878412,"version":"3.50.1"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031200434","type":"print"},{"value":"9783031200441","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-20044-1_37","type":"book-chapter","created":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T23:12:10Z","timestamp":1666221130000},"page":"651-667","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["CPrune: Compiler-Informed Model Pruning for\u00a0Efficient Target-Aware DNN Execution"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7787-3035","authenticated-orcid":false,"given":"Taeho","family":"Kim","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2973-246X","authenticated-orcid":false,"given":"Yongin","family":"Kwon","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9332-3508","authenticated-orcid":false,"given":"Jemin","family":"Lee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5061-206X","authenticated-orcid":false,"given":"Taeho","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5983-5430","authenticated-orcid":false,"given":"Sangtae","family":"Ha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,20]]},"reference":[{"key":"37_CR1","unstructured":"Apache tvm. https:\/\/github.com\/apache\/tvm. Accessed 03 July 2022"},{"key":"37_CR2","unstructured":"Microsoft nni. https:\/\/github.com\/microsoft\/nni. Accessed 03 July 2022"},{"key":"37_CR3","unstructured":"Torchvision models. https:\/\/pytorch.org\/vision\/stable\/models.html. Accessed 03 July 2022"},{"key":"37_CR4","unstructured":"Chen, T., et al.: TVM: an automated end-to-end optimizing compiler for deep learning. In: 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18), pp. 578\u2013594 (2018)"},{"key":"37_CR5","unstructured":"Chen, T., et al.: Learning to optimize tensor programs. arXiv preprint arXiv:1805.08166 (2018)"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Chen, Y., et al.: Renas: reinforced evolutionary neural architecture search. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4787\u20134796 (2019)","DOI":"10.1109\/CVPR.2019.00492"},{"issue":"1","key":"37_CR7","first-page":"1997","volume":"20","author":"T Elsken","year":"2019","unstructured":"Elsken, T., Metzen, J.H., Hutter, F.: Neural architecture search: a survey. J. Mach. Learn. Res. 20(1), 1997\u20132017 (2019)","journal-title":"J. Mach. Learn. Res."},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Fang, B., Zeng, X., Zhang, M.: Nestdnn: Resource-aware multi-tenant on-device deep learning for continuous mobile vision. In: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, pp. 115\u2013127 (2018)","DOI":"10.1145\/3241539.3241559"},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Gale, T., Zaharia, M., Young, C., Elsen, E.: Sparse gpu kernels for deep learning. IEEE Press (2020)","DOI":"10.1109\/SC41405.2020.00021"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Gong, Z., Ji, H., Fletcher, C.W., Hughes, C.J., Baghsorkhi, S., Torrellas, J.: Save: sparsity-aware vector engine for accelerating DNN training and inference on CPUs. In: 2020 53rd Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO), pp. 796\u2013810 (2020)","DOI":"10.1109\/MICRO50266.2020.00070"},{"key":"37_CR11","unstructured":"Guo, Y., Yao, A., Chen, Y.: Dynamic network surgery for efficient DNNs. In: Proceedings of the 30th International Conference on Neural Information Processing Systems, pp. 1387\u20131395 (2016)"},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"He, Y., Liu, P., Wang, Z., Hu, Z., Yang, Y.: Filter pruning via geometric median for deep convolutional neural networks acceleration. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4340\u20134349 (2019)","DOI":"10.1109\/CVPR.2019.00447"},{"key":"37_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1007\/978-3-030-01234-2_48","volume-title":"Computer Vision \u2013 ECCV 2018","author":"Y He","year":"2018","unstructured":"He, Y., Lin, J., Liu, Z., Wang, H., Li, L.-J., Han, S.: AMC: AutoML for model compression and acceleration on mobile devices. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11211, pp. 815\u2013832. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01234-2_48"},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"He, Y., Zhang, X., Sun, J.: Channel pruning for accelerating very deep neural networks. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 1389\u20131397 (2017)","DOI":"10.1109\/ICCV.2017.155"},{"key":"37_CR16","doi-asserted-by":"publisher","first-page":"701","DOI":"10.3389\/fneur.2020.00701","volume":"11","author":"T Kim","year":"2020","unstructured":"Kim, T., et al.: Epileptic seizure detection and experimental treatment: a review. Front. Neurol. 11, 701 (2020)","journal-title":"Front. Neurol."},{"key":"37_CR17","unstructured":"Krizhevsky, A., Hinton, G., et al.: Learning multiple layers of features from tiny images (2009)"},{"key":"37_CR18","first-page":"1097","volume":"25","author":"A Krizhevsky","year":"2012","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. Adv. Neural. Inf. Process. Syst. 25, 1097\u20131105 (2012)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"37_CR19","unstructured":"Kyriakides, G., Margaritis, K.: An introduction to neural architecture search for convolutional networks. arXiv preprint arXiv:2005.11074 (2020)"},{"key":"37_CR20","doi-asserted-by":"crossref","unstructured":"Lattner, C., et al.: Mlir: scaling compiler infrastructure for domain specific computation. In: 2021 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO), pp. 2\u201314. IEEE (2021)","DOI":"10.1109\/CGO51591.2021.9370308"},{"key":"37_CR21","unstructured":"Li, H., Kadav, A., Durdanovic, I., Samet, H., Graf, H.P.: Pruning filters for efficient convnets. arXiv preprint arXiv:1608.08710 (2016)"},{"key":"37_CR22","doi-asserted-by":"crossref","unstructured":"Li, Z., et al.: Npas: a compiler-aware framework of unified network pruning and architecture search for beyond real-time mobile acceleration. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14255\u201314266 (2021)","DOI":"10.1109\/CVPR46437.2021.01403"},{"key":"37_CR23","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.neucom.2021.07.045","volume":"461","author":"T Liang","year":"2021","unstructured":"Liang, T., Glossner, J., Wang, L., Shi, S., Zhang, X.: Pruning and quantization for deep neural network acceleration: a survey. Neurocomputing 461, 370\u2013403 (2021)","journal-title":"Neurocomputing"},{"key":"37_CR24","doi-asserted-by":"crossref","unstructured":"Liu, H., He, Y., Yu, F.R., James, J.: Flexi-compression: a flexible model compression method for autonomous driving. In: Proceedings of the 11th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, pp. 19\u201326 (2021)","DOI":"10.1145\/3479243.3487300"},{"key":"37_CR25","unstructured":"Liu, H., Simonyan, K., Yang, Y.: Darts: Differentiable architecture search. arXiv preprint arXiv:1806.09055 (2018)"},{"key":"37_CR26","unstructured":"Liu, J., Tripathi, S., Kurup, U., Shah, M.: Pruning algorithms to accelerate convolutional neural networks for edge applications: a survey. arXiv preprint arXiv:2005.04275 (2020)"},{"issue":"1","key":"37_CR27","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1109\/TNET.2019.2891733","volume":"27","author":"L Lu","year":"2019","unstructured":"Lu, L., Yu, J., Chen, Y., Liu, H., Zhu, Y., Kong, L., Li, M.: Lip reading-based user authentication through acoustic sensing on smartphones. IEEE\/ACM Trans. Networking 27(1), 447\u2013460 (2019)","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"37_CR28","doi-asserted-by":"crossref","unstructured":"Ma, X., et al.: Pconv: the missing but desirable sparsity in DNN weight pruning for real-time execution on mobile devices. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 5117\u20135124 (2020)","DOI":"10.1609\/aaai.v34i04.5954"},{"key":"37_CR29","doi-asserted-by":"crossref","unstructured":"Martinez, J., Shewakramani, J., Liu, T.W., B\u00e2rsan, I.A., Zeng, W., Urtasun, R.: Permute, quantize, and fine-tune: Efficient compression of neural networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 15699\u201315708 (2021)","DOI":"10.1109\/CVPR46437.2021.01544"},{"key":"37_CR30","doi-asserted-by":"crossref","unstructured":"Periaux, J., Gonzalez, F., Lee, D.S.C.: Evolutionary methods. In: Evolutionary Optimization and Game Strategies for Advanced Multi-Disciplinary Design, pp. 9\u201320. Springer (2015)","DOI":"10.1007\/978-94-017-9520-3_2"},{"key":"37_CR31","doi-asserted-by":"crossref","unstructured":"Robbins, H., Monro, S.: A stochastic approximation method. In: The Annals of Mathematical Statistics, pp. 400\u2013407 (1951)","DOI":"10.1214\/aoms\/1177729586"},{"key":"37_CR32","doi-asserted-by":"crossref","unstructured":"Roesch, J., et al.: Relay: a new IR for machine learning frameworks. In: Proceedings of the 2nd ACM SIGPLAN International Workshop on Machine Learning and Programming Languages, pp. 58\u201368 (2018)","DOI":"10.1145\/3211346.3211348"},{"key":"37_CR33","unstructured":"Rotem, N., et al.: Glow: graph lowering compiler techniques for neural networks. arXiv preprint arXiv:1805.00907 (2018)"},{"key":"37_CR34","doi-asserted-by":"crossref","unstructured":"Sandler, M., Howard, A., Zhu, M., Zhmoginov, A., Chen, L.C.: Mobilenetv 2: Inverted residuals and linear bottlenecks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4510\u20134520 (2018)","DOI":"10.1109\/CVPR.2018.00474"},{"issue":"1","key":"37_CR35","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/JPROC.2015.2494218","volume":"104","author":"B Shahriari","year":"2015","unstructured":"Shahriari, B., Swersky, K., Wang, Z., Adams, R.P., De Freitas, N.: Taking the human out of the loop: a review of bayesian optimization. Proc. IEEE 104(1), 148\u2013175 (2015)","journal-title":"Proc. IEEE"},{"key":"37_CR36","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)"},{"key":"37_CR37","doi-asserted-by":"crossref","unstructured":"Tan, M., et al.: Mnasnet: platform-aware neural architecture search for mobile. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2820\u20132828 (2019)","DOI":"10.1109\/CVPR.2019.00293"},{"key":"37_CR38","first-page":"21","volume":"3","author":"X Tang","year":"2021","unstructured":"Tang, X., Han, S., Zhang, L.L., Cao, T., Liu, Y.: To bridge neural network design and real-world performance: a behaviour study for neural networks. Proc. Mach. Learn. Syst. 3, 21\u201337 (2021)","journal-title":"Proc. Mach. Learn. Syst."},{"key":"37_CR39","doi-asserted-by":"crossref","unstructured":"Wang, Z., Li, C., Wang, X.: Convolutional neural network pruning with structural redundancy reduction. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14913\u201314922 (2021)","DOI":"10.1109\/CVPR46437.2021.01467"},{"key":"37_CR40","doi-asserted-by":"publisher","first-page":"25591","DOI":"10.1109\/ACCESS.2017.2771470","volume":"5","author":"L Wei","year":"2017","unstructured":"Wei, L., Luo, W., Weng, J., Zhong, Y., Zhang, X., Yan, Z.: Machine learning-based malicious application detection of android. IEEE Access 5, 25591\u201325601 (2017)","journal-title":"IEEE Access"},{"key":"37_CR41","unstructured":"White, C., Neiswanger, W., Savani, Y.: Bananas: Bayesian optimization with neural architectures for neural architecture search. arXiv preprint arXiv:1910.11858 1(2) (2019)"},{"key":"37_CR42","doi-asserted-by":"crossref","unstructured":"Wu, B., et al.: Fbnet: Hardware-aware efficient convnet design via differentiable neural architecture search. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10734\u201310742 (2019)","DOI":"10.1109\/CVPR.2019.01099"},{"key":"37_CR43","doi-asserted-by":"crossref","unstructured":"Yang, T.J., Chen, Y.H., Sze, V.: Designing energy-efficient convolutional neural networks using energy-aware pruning. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 5687\u20135695 (2017)","DOI":"10.1109\/CVPR.2017.643"},{"key":"37_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-030-01249-6_18","volume-title":"Computer Vision \u2013 ECCV 2018","author":"T-J Yang","year":"2018","unstructured":"Yang, T.-J., et al.: NetAdapt: platform-aware neural network adaptation for mobile applications. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11214, pp. 289\u2013304. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01249-6_18"},{"key":"37_CR45","doi-asserted-by":"crossref","unstructured":"Yang, T.J., Liao, Y.L., Sze, V.: Netadaptv2: efficient neural architecture search with fast super-network training and architecture optimization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2402\u20132411 (2021)","DOI":"10.1109\/CVPR46437.2021.00243"},{"issue":"2","key":"37_CR46","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1145\/3140659.3080215","volume":"45","author":"J Yu","year":"2017","unstructured":"Yu, J., Lukefahr, A., Palframan, D., Dasika, G., Das, R., Mahlke, S.: Scalpel: customizing DNN pruning to the underlying hardware parallelism. ACM SIGARCH Comput. Architecture News 45(2), 548\u2013560 (2017)","journal-title":"ACM SIGARCH Comput. Architecture News"},{"key":"37_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-030-01237-3_12","volume-title":"Computer Vision \u2013 ECCV 2018","author":"T Zhang","year":"2018","unstructured":"Zhang, T., Ye, S., Zhang, K., Tang, J., Wen, W., Fardad, M., Wang, Y.: A systematic DNN weight pruning framework using alternating direction method of multipliers. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11212, pp. 191\u2013207. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01237-3_12"},{"key":"37_CR48","doi-asserted-by":"crossref","unstructured":"Zhao, C., Ni, B., Zhang, J., Zhao, Q., Zhang, W., Tian, Q.: Variational convolutional neural network pruning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2780\u20132789 (2019)","DOI":"10.1109\/CVPR.2019.00289"},{"key":"37_CR49","unstructured":"Zheng, L., et al.: Ansor: generating high-performance tensor programs for deep learning. In: 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2020), pp. 863\u2013879 (2020)"},{"key":"37_CR50","doi-asserted-by":"crossref","unstructured":"Zhou, B., Lohokare, J., Gao, R., Ye, F.: Echoprint: two-factor authentication using acoustics and vision on smartphones. In: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, pp. 321\u2013336 (2018)","DOI":"10.1145\/3241539.3241575"},{"key":"37_CR51","unstructured":"Zoph, B., Le, Q.V.: Neural architecture search with reinforcement learning. arXiv preprint arXiv:1611.01578 (2016)"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20044-1_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T19:58:46Z","timestamp":1710359926000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20044-1_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031200434","9783031200441"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20044-1_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"20 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tel Aviv","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Israel","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2022.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5804","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1645","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.21","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.91","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}