{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:58:01Z","timestamp":1774450681074,"version":"3.50.1"},"publisher-location":"Cham","reference-count":65,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031200649","type":"print"},{"value":"9783031200656","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-20065-6_10","type":"book-chapter","created":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T20:24:03Z","timestamp":1667420643000},"page":"156-174","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["Triangle Attack: A Query-Efficient Decision-Based Adversarial Attack"],"prefix":"10.1007","author":[{"given":"Xiaosen","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zeliang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Kangheng","family":"Tong","sequence":"additional","affiliation":[]},{"given":"Dihong","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Kun","family":"He","sequence":"additional","affiliation":[]},{"given":"Zhifeng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,3]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/T-C.1974.223784","volume":"100","author":"N Ahmed","year":"1974","unstructured":"Ahmed, N., Natarajan, T., Rao, K.R.: Discrete cosine transform. IEEE Trans. Comput. 100, 90\u201393 (1974)","journal-title":"IEEE Trans. Comput."},{"key":"10_CR2","unstructured":"Al-Dujaili, A., O\u2019Reilly, U.M.: Sign bits are all you need for black-box attacks. In: International Conference on Learning Representations (2020)"},{"key":"10_CR3","unstructured":"Athalye, A., Carlini, N., Wagner, D.A.: Obfuscated gradients give a false sense of security: circumventing defenses to adversarial examples. In: International Conference on Machine Learning (2018)"},{"key":"10_CR4","unstructured":"Bojarski, M., et al.: End to end learning for self-driving cars. arXiv preprint arXiv:1604.07316 (2016)"},{"key":"10_CR5","unstructured":"Brendel, W., Rauber, J., Bethge, M.: Decision-based adversarial attacks: reliable attacks against black-box machine learning models. In: International Conference on Learning Representations (2018)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: IEEE Symposium on Security and Privacy (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Chen, C., Seff, A., Kornhauser, A., Xiao, J.: DeepDriving: learning affordance for direct perception in autonomous driving. In: International Conference on Computer Vision, pp. 2722\u20132730 (2015)","DOI":"10.1109\/ICCV.2015.312"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Chen, J., Jordan, M.I., Wainwright, M.J.: HopSkipJumpAttack: a query-efficient decision-based attack. In: IEEE Symposium on Security and Privacy (2020)","DOI":"10.1109\/SP40000.2020.00045"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Chen, P.Y., Zhang, H., Sharma, Y., Yi, J., Hsieh, C.J., ZOO: zeroth order optimization based black-box attacks to deep neural networks without training substitute models. In: ACM Workshop on Artificial Intelligence and Security (2017)","DOI":"10.1145\/3128572.3140448"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/978-3-030-58555-6_17","volume-title":"Computer Vision \u2013 ECCV 2020","author":"W Chen","year":"2020","unstructured":"Chen, W., Zhang, Z., Hu, X., Wu, B.: Boosting decision-based black-box adversarial attacks with random sign flip. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12360, pp. 276\u2013293. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58555-6_17"},{"key":"10_CR11","unstructured":"M., Cheng, Thong Le, Pin-Yu Chen, Huan Zhang, Yi, J., Hsieh, C.J.: Query-efficient hard-label black-box attack: An optimization-based approach. In: International Conference on Learning Representations (2019)"},{"key":"10_CR12","unstructured":"Cheng, M., Singh, S., Chen, P.H., Chen, P.Y., Liu, S., Hsieh, C.J.: Sign-OPT: a query-efficient hard-label adversarial attack. In: International Conference on Learning Representations (2020)"},{"key":"10_CR13","unstructured":"Cohen, J.M., Rosenfeld, E., Kolter, J.Z.: Certified adversarial robustness via randomized smoothing. In: International Conference on Machine Learning (2019)"},{"key":"10_CR14","unstructured":"Croce, F., Hein, M.: Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In: International Conference on Machine Learning (2020)"},{"issue":"6","key":"10_CR15","doi-asserted-by":"publisher","first-page":"3102","DOI":"10.1109\/TIP.2019.2894272","volume":"28","author":"Z Deng","year":"2019","unstructured":"Deng, Z., Peng, X., Li, Z., Qiao, Yu.: Mutual component convolutional neural networks for heterogeneous face recognition. IEEE Trans. Image Process. 28(6), 3102\u20133114 (2019)","journal-title":"IEEE Trans. Image Process."},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Dong, Y., et al.: Benchmarking adversarial robustness on image classification. In: Conference on Computer Vision and Pattern Recognition (2020)","DOI":"10.1109\/CVPR42600.2020.00040"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Dong, Y., et al.: Boosting adversarial attacks with momentum. In: Conference on Computer Vision and Pattern Recognition (2018)","DOI":"10.1109\/CVPR.2018.00957"},{"key":"10_CR18","unstructured":"Du, J., Zhang, H., Zhou, J.T., Yang, Y., Feng, J.: Query-efficient meta attack to deep neural networks. In: International Conference on Learning Representations (2020)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Eykholt, K., et al.: Robust physical-world attacks on deep learning visual classification. In: Conference on Computer Vision and Pattern Recognition (2018)","DOI":"10.1109\/CVPR.2018.00175"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Gong, D., Li, Z., Liu, J., Qiao, Y.: Multi-feature canonical correlation analysis for face photo-sketch image retrieval. In: Proceedings of the 21st ACM International Conference on Multimedia, pp. 617\u2013620 (2013)","DOI":"10.1145\/2502081.2502162"},{"key":"10_CR21","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: International Conference on Learning Representations (2015)"},{"key":"10_CR22","unstructured":"Guo, C., Frank, J.S., Weinberger, K.Q.: Low frequency adversarial perturbation. Uncertain. Artif. Intell. (2019)"},{"key":"10_CR23","unstructured":"Guo, C., Rana, M., Ciss\u00e9, M., van der Maaten, L.: Countering adversarial images using input transformations. In: International Conference on Learning Representations (2018)"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Conference on Computer Vision and Pattern Recognition (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., van der Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: Conference on Computer Vision and Pattern Recognition (2017)","DOI":"10.1109\/CVPR.2017.243"},{"key":"10_CR26","unstructured":"Ilyas, A., Engstrom, L., Athalye, A., Lin, J.: Black-box adversarial attacks with limited queries and information. In: International Conference on Machine Learning (2018)"},{"key":"10_CR27","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems (2012)"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I., Bengio, S.: Adversarial examples in the physical world. In: International Conference on Learning Representations, Workshop (2017)","DOI":"10.1201\/9781351251389-8"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Li, H., Xu, X., Zhang, X., Yang, S., Li, B.: QEBA: query-efficient boundary-based blackbox attack. In: Conference on Computer Vision and Pattern Recognition (2020)","DOI":"10.1109\/CVPR42600.2020.00130"},{"issue":"6","key":"10_CR30","doi-asserted-by":"publisher","first-page":"2436","DOI":"10.1109\/TIP.2014.2315920","volume":"23","author":"Z Li","year":"2014","unstructured":"Li, Z., Gong, D., Qiao, Y., Tao, D.: Common feature discriminant analysis for matching infrared face images to optical face images. IEEE Trans. Image Process. 23(6), 2436\u20132445 (2014)","journal-title":"IEEE Trans. Image Process."},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Liang, S., Wu, B., Fan, Y., Wei, X., Cao, X.: Parallel rectangle flip attack: a query-based black-box attack against object detection. arXiv preprint arXiv:2201.08970 (2022)","DOI":"10.1109\/ICCV48922.2021.00760"},{"key":"10_CR32","unstructured":"Liu, Y., Chen, X., Liu, C., Song, D.: Delving into transferable adversarial examples and black-box attacks. In: International Conference on Learning Representations (2017)"},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Liu, Y., Moosavi-Dezfooli, S.-M., Frossard, P.: A geometry-inspired decision-based attack. In: International Conference on Computer Vision, pp. 4890\u20134898 (2019)","DOI":"10.1109\/ICCV.2019.00499"},{"key":"10_CR34","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: International Conference on Learning Representations (2018)"},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"Maho, T., Furon, T., Merrer, E.L.: SurFree: a fast surrogate-free black-box attack. In: Conference on Computer Vision and Pattern Recognition (2021)","DOI":"10.1109\/CVPR46437.2021.01029"},{"key":"10_CR36","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.-M., Fawzi, A., Frossard, P.: DeepFool: a simple and accurate method to fool deep neural networks. In: Conference on Computer Vision and Pattern Recognition (2016)","DOI":"10.1109\/CVPR.2016.282"},{"key":"10_CR37","doi-asserted-by":"crossref","unstructured":"Qiu, H., Gong, D., Li, Z., Liu, W., Tao, D.: End2End occluded face recognition by masking corrupted features. IEEE Trans. Pattern Anal. Mach. Intell. (2021)","DOI":"10.1109\/TPAMI.2021.3098962"},{"key":"10_CR38","doi-asserted-by":"crossref","unstructured":"Rahmati, A., Moosavi-Dezfooli, S.-M., Frossard, P., Dai, H.: GeoDA: a geometric framework for black-box adversarial attacks. In: Computer Vision and Pattern Recognition, pp. 8446\u20138455 (2020)","DOI":"10.1109\/CVPR42600.2020.00847"},{"key":"10_CR39","doi-asserted-by":"crossref","unstructured":"Russakovsky, O., et al.: ImageNet large scale visual recognition challenge. In: International Booktitle of Computer Vision (2015)","DOI":"10.1007\/s11263-015-0816-y"},{"issue":"19","key":"10_CR40","doi-asserted-by":"publisher","first-page":"70","DOI":"10.2352\/ISSN.2470-1173.2017.19.AVM-023","volume":"2017","author":"AEL Sallab","year":"2017","unstructured":"Sallab, A.E.L., Abdou, M., Perot, E., Yogamani, S.: Deep reinforcement learning framework for autonomous driving. Electron. Imaging 2017(19), 70\u201376 (2017)","journal-title":"Electron. Imaging"},{"key":"10_CR41","unstructured":"Shafahi, A., et al.: Adversarial training for free! In: Advances in Neural Information Processing Systems (2019)"},{"key":"10_CR42","doi-asserted-by":"crossref","unstructured":"Sharif, M., Bhagavatula, S., Bauer, L., Reiter, M.K.: Accessorize to a crime: real and stealthy attacks on state-of-the-art face recognition. In: ACM SIGSAC conference on Computer and Communications Security (2016)","DOI":"10.1145\/2976749.2978392"},{"key":"10_CR43","doi-asserted-by":"crossref","unstructured":"Shukla, S.N., Sahu, A.K., Willmott, D., Kolter, Z.: Simple and efficient hard label black-box adversarial attacks in low query budget regimes. In: Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, pp. 1461\u20131469 (2021)","DOI":"10.1145\/3447548.3467386"},{"key":"10_CR44","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: International Conference on Learning Representations (2015)"},{"key":"10_CR45","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. In: Conference on Computer Vision and Pattern Recognition (2016)","DOI":"10.1109\/CVPR.2016.308"},{"key":"10_CR46","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: International Conference on Learning Representations (2014)"},{"key":"10_CR47","unstructured":"Tang, X., Li, Z.: Video based face recognition using multiple classifiers. In: IEEE International Conference on Automatic Face and Gesture Recognition, pp. 345\u2013349. IEEE (2004)"},{"key":"10_CR48","doi-asserted-by":"crossref","unstructured":"Tu, C.-C., et al.: AutoZOOM: autoencoder-based zeroth order optimization method for attacking black-box neural networks. In: AAAI Conference on Artificial Intelligence (2019)","DOI":"10.1609\/aaai.v33i01.3301742"},{"key":"10_CR49","doi-asserted-by":"crossref","unstructured":"Wang, H., et al.: CosFace: large margin cosine loss for deep face recognition. In: Conference on Computer Vision and Pattern Recognition (2018)","DOI":"10.1109\/CVPR.2018.00552"},{"key":"10_CR50","doi-asserted-by":"crossref","unstructured":"Wang, X., He, K.: Enhancing the transferability of adversarial attacks through variance tuning. In: Conference on Computer Vision and Pattern Recognition (2021)","DOI":"10.1109\/CVPR46437.2021.00196"},{"key":"10_CR51","doi-asserted-by":"crossref","unstructured":"Wang, X., He, X., Wang, J., He, K.: Admix: Enhancing the transferability of adversarial attacks. In: International Conference on Computer Vision (2021)","DOI":"10.1109\/ICCV48922.2021.01585"},{"key":"10_CR52","unstructured":"Wang, X., Jin, H., Yang, Y., He, K.: Natural language adversarial defense through synonym encoding. In: Conference on Uncertainty in Artificial Intelligence (2021)"},{"key":"10_CR53","unstructured":"Wang, X., Lin, J., Hu, H., Wang, J., He, K.: Boosting adversarial transferability through enhanced momentum. In: British Machine Vision Conference (2021)"},{"key":"10_CR54","doi-asserted-by":"crossref","unstructured":"Wei, X., Liang, S., Chen, N., Cao, X.: Transferable adversarial attacks for image and video object detection. arXiv preprint arXiv:1811.12641 (2018)","DOI":"10.24963\/ijcai.2019\/134"},{"key":"10_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/978-3-319-46478-7_31","volume-title":"Computer Vision \u2013 ECCV 2016","author":"Y Wen","year":"2016","unstructured":"Wen, Y., Zhang, K., Li, Z., Qiao, Yu.: A discriminative feature learning approach for deep face recognition. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9911, pp. 499\u2013515. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46478-7_31"},{"key":"10_CR56","unstructured":"Wong, E., Rice, L., Zico Kolter, J.: Fast is better than free: Revisiting adversarial training. In: International Conference on Learning Representations (2020)"},{"key":"10_CR57","unstructured":"Wu, B., et al.: Attacking adversarial attacks as a defense. arXiv preprint arXiv:2106.04938 (2021)"},{"key":"10_CR58","doi-asserted-by":"crossref","unstructured":"Wu, W., Su, Y., Lyu, M.R., King, I.: Improving the transferability of adversarial samples with adversarial transformations. In: Conference on Computer Vision and Pattern Recognition (2021)","DOI":"10.1109\/CVPR46437.2021.00891"},{"key":"10_CR59","doi-asserted-by":"crossref","unstructured":"Xie, C., et al.: Improving transferability of adversarial examples with input diversity. In: Conference on Computer Vision and Pattern Recognition (2019)","DOI":"10.1109\/CVPR.2019.00284"},{"key":"10_CR60","doi-asserted-by":"crossref","unstructured":"Xiong, Y., Lin, J., Zhang, M., Hopcroft, J.E., He, K.: Stochastic variance reduced ensemble adversarial attack for boosting the adversarial transferability. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2022)","DOI":"10.1109\/CVPR52688.2022.01456"},{"key":"10_CR61","doi-asserted-by":"crossref","unstructured":"Xu, H., Gao, Y., Yu, F., Darrell, T.: End-to-end learning of driving models from large-scale video datasets. In: Conference on Computer Vision and Pattern Recognition, pp. 2174\u20132182 (2017)","DOI":"10.1109\/CVPR.2017.376"},{"key":"10_CR62","unstructured":"Yang, X., Jia, X., Gong, D., Yan, D.-M., Li, Z., Liu, W.: LARNet: lie algebra residual network for face recognition. In: International Conference on Machine Learning, pp. 11738\u201311750. PMLR (2021)"},{"key":"10_CR63","doi-asserted-by":"crossref","unstructured":"Yao, Z., Gholami, A., Xu, P., Keutzer, K., Mahoney, M.W.: Trust region based adversarial attack on neural networks. In: Conference on Computer Vision and Pattern Recognition (2019)","DOI":"10.1109\/CVPR.2019.01161"},{"key":"10_CR64","unstructured":"Zhang, H., Yu, Y., Jiao, J., Xing, E.P., El Ghaoui, L., Jordan, M.I.: Theoretically principled trade-off between robustness and accuracy. In: International Conference on Machine Learning (2019)"},{"key":"10_CR65","doi-asserted-by":"crossref","unstructured":"Zhao, P., Chen, P.-Y., Wang, S., Lin, X.: Towards query-efficient black-box adversary with zeroth-order natural gradient descent. In: AAAI Conference on Artificial Intelligence (2020)","DOI":"10.1609\/aaai.v34i04.6173"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20065-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:05:27Z","timestamp":1667779527000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20065-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031200649","9783031200656"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20065-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"3 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tel Aviv","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Israel","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2022.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5804","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1645","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.21","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.91","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}