{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T17:05:57Z","timestamp":1771952757635,"version":"3.50.1"},"publisher-location":"Cham","reference-count":59,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031243363","type":"print"},{"value":"9783031243370","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-24337-0_2","type":"book-chapter","created":{"date-parts":[[2023,2,25]],"date-time":"2023-02-25T12:02:40Z","timestamp":1677326560000},"page":"17-33","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Knowledge-Based Techniques for\u00a0Document Fraud Detection: A Comprehensive Study"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7820-640X","authenticated-orcid":false,"given":"Beatriz Mart\u00ednez","family":"Torn\u00e9s","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6299-9452","authenticated-orcid":false,"given":"Emanuela","family":"Boros","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6160-3356","authenticated-orcid":false,"given":"Antoine","family":"Doucet","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5515-7828","authenticated-orcid":false,"given":"Petra","family":"Gomez-Kr\u00e4mer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5666-475X","authenticated-orcid":false,"given":"Jean-Marc","family":"Ogier","sequence":"additional","affiliation":[]},{"given":"Vincent Poulain","family":"d\u2019Andecy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,26]]},"reference":[{"key":"2_CR1","unstructured":"Abiteboul, S.: Semistructured data: from practice to theory. In: Proceedings 16th Annual IEEE Symposium on Logic in Computer Science. IEEE (2001)"},{"key":"2_CR2","unstructured":"Ali, M., Berrendorf, M., Hoyt, C.T., Vermue, L., Sharifzadeh, S., Tresp, V., Lehmann, J.: Pykeen 1.0: a python library for training and evaluating knowledge graph emebddings (2020)"},{"key":"2_CR3","unstructured":"Artaud, C., Doucet, A., Ogier, J.M., d\u2019Andecy, V.P.: Receipt dataset for fraud detection. In: First International Workshop on Computational Document Forensics (2017)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Artaud, C., Sid\u00e8re, N., Doucet, A., Ogier, J.M., Yooz, V.P.D.: Find it! fraud detection contest report. In: 2018 24th International Conference on Pattern Recognition (ICPR). IEEE (2018)","DOI":"10.1109\/ICPR.2018.8545428"},{"key":"2_CR5","unstructured":"Artaud, C.: D\u00e9tection des fraudes : de l\u2019image \u00e1 la s\u00e9mantique du contenu : application \u00e1 la v\u00e9rification des informations extraites d\u2019un corpus de tickets de caisse. Ph.D. thesis (2019)"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1007\/978-3-540-76298-0_52","volume-title":"The Semantic Web","author":"S Auer","year":"2007","unstructured":"Auer, S., Bizer, C., Kobilarov, G., Lehmann, J., Cyganiak, R., Ives, Z.: DBpedia: a nucleus for a web of open data. In: Aberer, K., et al. (eds.) ASWC\/ISWC -2007. LNCS, vol. 4825, pp. 722\u2013735. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-76298-0_52"},{"key":"2_CR7","unstructured":"Balazevic, I., Allen, C., Hospedales, T.: Multi-relational poincar\u00e9 graph embeddings. In: Advances in Neural Information Processing Systems, vol. 32 (2019)"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Bala\u017eevi\u0107, I., Allen, C., Hospedales, T.M.: Tucker: tensor factorization for knowledge graph completion (2019)","DOI":"10.18653\/v1\/D19-1522"},{"issue":"1","key":"2_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1162\/coli.2008.34.1.1","volume":"34","author":"R Barzilay","year":"2008","unstructured":"Barzilay, R., Lapata, M.: Modeling local coherence: an entity-based approach. Comput. Linguist. 34(1), 1\u201334 (2008)","journal-title":"Comput. Linguist."},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Behera, T.K., Panigrahi, S.: Credit card fraud detection: a hybrid approach using fuzzy clustering & neural network. In: 2015 2nd International Conference on Advances in Computing and Communication Engineering. IEEE (2015)","DOI":"10.1109\/ICACCE.2015.33"},{"issue":"3","key":"2_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-031-01855-8","volume":"7","author":"L Berti-\u00c9quille","year":"2015","unstructured":"Berti-\u00c9quille, L., Borge-Holthoefer, J.: Veracity of data: from truth discovery computation algorithms to models of misinformation dynamics. Synth. Lect. Data Manag. 7(3), 1\u2013155 (2015)","journal-title":"Synth. Lect. Data Manag."},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Bertrand, R., Gomez-Kramer, P., Terrades, O.R., Franco, P., Ogier, J.M.: A system based on intrinsic features for fraudulent document detection. In: 2013 12th International Conference on Document Analysis and Recognition, pp. 106\u2013110. IEEE, Washington, DC, USA (2013)","DOI":"10.1109\/ICDAR.2013.29"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Bertrand, R., Terrades, O.R., Gomez-Kr\u00e4mer, P., Franco, P., Ogier, J.M.: A conditional random field model for font forgery detection. In: 2015 13th International Conference on Document Analysis and Recognition (ICDAR). IEEE (2015)","DOI":"10.1109\/ICDAR.2015.7333827"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Bollacker, K., Evans, C., Paritosh, P., Sturge, T., Taylor, J.: Freebase: A collaboratively created graph database for structuring human knowledge. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, pp. 1247\u20131250. SIGMOD\u201908, Association for Computing Machinery, New York, NY, USA (2008)","DOI":"10.1145\/1376616.1376746"},{"key":"2_CR15","unstructured":"Bordes, A., Usunier, N., Garcia-Dur\u00e1n, A., Weston, J., Yakhnenko, O.: Translating embeddings for modeling multi-relational data. In: Proceedings of the 26th International Conference on Neural Information Processing Systems, NIPS\u201913, Lake Tahoe, Nevada, vol. 2, pp. 2787\u20132795. Curran Associates Inc., Red Hook, NY, USA (2013)"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Bordes, A., Weston, J., Collobert, R., Bengio, Y.: Learning structured embeddings of knowledge bases. In: Proceedings of the 25th AAAI Conference on Artificial Intelligence, AAAI\u201911, San Francisco, California, pp. 301\u2013306. AAAI Press (2011)","DOI":"10.1609\/aaai.v25i1.7917"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Gragnaniello, D., Verdoliva, L.: Image forgery detection through residual-based local descriptors and block-matching. In: 2014 IEEE International Conference on Image Processing (ICIP). IEEE (2014)","DOI":"10.1109\/ICIP.2014.7026072"},{"issue":"11","key":"2_CR18","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"Cozzolino, D., Poggi, G., Verdoliva, L.: Efficient dense-field copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 10(11), 2284\u20132297 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Verdoliva, L.: Camera-based image forgery localization using convolutional neural networks. In: 2018 26th European Signal Processing Conference (EUSIPCO). IEEE (2018)","DOI":"10.23919\/EUSIPCO.2018.8553581"},{"key":"2_CR20","unstructured":"Cozzolino, D., Verdoliva, L.: Noiseprint: a CNN-based camera model fingerprint (2018)"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Cruz, F., Sidere, N., Coustaty, M., d\u2019Andecy, V.P., Ogier, J.M.: Local binary patterns for document forgery detection. In: 2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR), vol. 1. IEEE (2017)","DOI":"10.1109\/ICDAR.2017.202"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Dettmers, T., Minervini, P., Stenetorp, P., Riedel, S.: Convolutional 2d knowledge graph embeddings (2018)","DOI":"10.1609\/aaai.v32i1.11573"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Dong, X., et al.: Knowledge vault: a web-scale approach to probabilistic knowledge fusion. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD\u201914, New York, New York, USA, pp. 601\u2013610. Association for Computing Machinery, New York, NY, USA (2014)","DOI":"10.1145\/2623330.2623623"},{"key":"2_CR24","unstructured":"EulerHermes-DFCG: Plus de 7 entreprises sur 10 ont subi au moins une tentative de fraude cette annye. https:\/\/www.eulerhermes.fr\/actualites\/etude-fraude-2020.html"},{"issue":"3","key":"2_CR25","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"2_CR26","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1007\/s00778-015-0394-1","volume":"24","author":"L Gal\u00e1rraga","year":"2015","unstructured":"Gal\u00e1rraga, L., Teflioudi, C., Hose, K., Suchanek, F.M.: Fast rule mining in ontological knowledge bases with AMIE$$+$$. VLDB J. 24(6), 707\u2013730 (2015). https:\/\/doi.org\/10.1007\/s00778-015-0394-1","journal-title":"VLDB J."},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Gesese, G.A., Biswas, R., Alam, M., Sack, H.: A survey on knowledge graph embeddings with literals: which model links better literal-ly? (2020)","DOI":"10.3233\/SW-200404"},{"key":"2_CR28","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1007\/978-3-030-82147-0_50","volume-title":"Knowledge Science, Engineering and Management","author":"N Goyal","year":"2021","unstructured":"Goyal, N., Sachdeva, N., Kumaraguru, P.: Spy the lie: fraudulent jobs detection in recruitment domain using knowledge graphs. In: Qiu, H., Zhang, C., Fei, Z., Qiu, M., Kung, S.-Y. (eds.) KSEM 2021. LNCS (LNAI), vol. 12816, pp. 612\u2013623. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-82147-0_50"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"He, S., Liu, K., Ji, G., Zhao, J.: Learning to represent knowledge graphs with gaussian embedding. In: Proceedings of the 24th ACM International on Conference on Information and Knowledge Management (2015)","DOI":"10.1145\/2806416.2806502"},{"key":"2_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/sapm192761164","volume":"6","author":"FL Hitchcock","year":"1927","unstructured":"Hitchcock, F.L.: The expression of a tensor or a polyadic as a sum of products. J. Math. Phys. 6, 1\u20134 (1927)","journal-title":"J. Math. Phys."},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Huynh, V.P., Papotti, P.: A benchmark for fact checking algorithms built on knowledge bases. In: 28th ACM International Conference on Information and Knowledge Management, CIKM\u201919, 3rd-7th November 2019, Beijing, China (2019)","DOI":"10.1145\/3357384.3358036"},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Ji, G., He, S., Xu, L., Liu, K., Zhao, J.: Knowledge graph embedding via dynamic mapping matrix. In: Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (volume 1: Long papers) (2015)","DOI":"10.3115\/v1\/P15-1067"},{"key":"2_CR33","unstructured":"Ji, S., Pan, S., Cambria, E., Marttinen, P., Yu, P.S.: A survey on knowledge graphs: representation, acquisition and applications (2020)"},{"key":"2_CR34","unstructured":"Kazemi, S.M., Poole, D.: Simple embedding for link prediction in knowledge graphs (2018)"},{"issue":"8","key":"2_CR35","doi-asserted-by":"publisher","first-page":"2842","DOI":"10.1007\/s10489-019-01419-2","volume":"49","author":"J Kim","year":"2019","unstructured":"Kim, J., Kim, H.-J., Kim, H.: Fraud detection for job placement using hierarchical clusters-based deep neural networks. Appl. Intell. 49(8), 2842\u20132861 (2019). https:\/\/doi.org\/10.1007\/s10489-019-01419-2","journal-title":"Appl. Intell."},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"Kowshalya, G., Nandhini, M.: Predicting fraudulent claims in automobile insurance. In: 2018 2nd International Conference on Inventive Communication and Computational Technologies (ICICCT). IEEE (2018)","DOI":"10.1109\/ICICCT.2018.8473034"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Li, Y., Yan, C., Liu, W., Li, M.: Research and application of random forest model in mining automobile insurance fraud. In: 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD). IEEE (2016)","DOI":"10.1109\/FSKD.2016.7603443"},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Lin, Y., Liu, Z., Sun, M., Liu, Y., Zhu, X.: Learning entity and relation embeddings for knowledge graph completion. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 29 (2015)","DOI":"10.1609\/aaai.v29i1.9491"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Mishra, A., Ghorpade, C.: Credit card fraud detection on the skewed data using various classification and ensemble techniques. In: 2018 IEEE International Students\u2019 Conference on Electrical, Electronics and Computer Science (SCEECS). IEEE (2018)","DOI":"10.1109\/SCEECS.2018.8546939"},{"key":"2_CR40","doi-asserted-by":"crossref","unstructured":"Nickel, M., Rosasco, L., Poggio, T.: Holographic embeddings of knowledge graphs. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 30 (2016)","DOI":"10.1609\/aaai.v30i1.10314"},{"key":"2_CR41","unstructured":"Nickel, M., Tresp, V., Kriegel, H.P.: A three-way model for collective learning on multi-relational data. In: Proceedings of the 28th International Conference on Machine Learning, ICML\u201911, pp. 809\u2013816 (2011)"},{"key":"2_CR42","doi-asserted-by":"crossref","unstructured":"Rabah, C.B., Coatrieux, G., Abdelfattah, R.: The supatlantique scanned documents database for digital image forensics purposes. In: 2020 IEEE International Conference on Image Processing (ICIP). IEEE (2020)","DOI":"10.1109\/ICIP40778.2020.9190665"},{"key":"2_CR43","doi-asserted-by":"crossref","unstructured":"Rizki, A.A., Surjandari, I., Wayasti, R.A.: Data mining application to detect financial fraud in indonesia\u2019s public companies. In: 2017 3rd International Conference on Science in Information Technology (ICSITech). IEEE (2017)","DOI":"10.1109\/ICSITech.2017.8257111"},{"key":"2_CR44","doi-asserted-by":"crossref","unstructured":"Rossi, A., Firmani, D., Matinata, A., Merialdo, P., Barbosa, D.: Knowledge graph embedding for link prediction: a comparative analysis (2020)","DOI":"10.1145\/3424672"},{"key":"2_CR45","unstructured":"Rossi, A., Matinata, A.: Knowledge graph embeddings: are relation-learning models learning relations? In: EDBT\/ICDT Workshops (2020)"},{"key":"2_CR46","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1162\/tacl_a_00388","volume":"9","author":"A Shen","year":"2021","unstructured":"Shen, A., Mistica, M., Salehi, B., Li, H., Baldwin, T., Qi, J.: Evaluating document coherence modeling. Trans. Assoc. Comput. Linguist. 9, 621\u2013640 (2021)","journal-title":"Trans. Assoc. Comput. Linguist."},{"key":"2_CR47","doi-asserted-by":"crossref","unstructured":"Shi, B., Weninger, T.: Proje: Embedding projection for knowledge graph completion. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 31 (2017)","DOI":"10.1609\/aaai.v31i1.10677"},{"key":"2_CR48","doi-asserted-by":"crossref","unstructured":"Sidere, N., Cruz, F., Coustaty, M., Ogier, J.M.: A dataset for forgery detection and spotting in document images. In: 2017 7th International Conference on Emerging Security Technologies (EST). IEEE (2017)","DOI":"10.1109\/EST.2017.8090394"},{"key":"2_CR49","doi-asserted-by":"crossref","unstructured":"Suchanek, F.M., Kasneci, G., Weikum, G.: Yago: a core of semantic knowledge. In: Proceedings of the 16th International Conference on World Wide Web, WWW\u201907, pp. 697\u2013706. Association for Computing Machinery, New York, NY, USA (2007)","DOI":"10.1145\/1242572.1242667"},{"key":"2_CR50","unstructured":"Sun, Z., Deng, Z.H., Nie, J.Y., Tang, J.: Rotate: knowledge graph embedding by relational rotation in complex space (2019)"},{"key":"2_CR51","unstructured":"Thorne, J., Vlachos, A.: Automated Fact Checking: task formulations, methods and future directions. CoRR (2018)"},{"key":"2_CR52","unstructured":"Trouillon, T., Welbl, J., Riedel, S., \u00c9ric Gaussier, Bouchard, G.: Complex embeddings for simple link prediction (2016)"},{"issue":"1","key":"2_CR53","first-page":"3221","volume":"15","author":"L Van Der Maaten","year":"2014","unstructured":"Van Der Maaten, L.: Accelerating t-SNE using tree-based algorithms. J. Mach. Learn. Res. 15(1), 3221\u20133245 (2014)","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"2_CR54","doi-asserted-by":"publisher","first-page":"6","DOI":"10.3390\/fi9010006","volume":"9","author":"S Vidros","year":"2017","unstructured":"Vidros, S., Kolias, C., Kambourakis, G., Akoglu, L.: Automatic detection of online recruitment frauds: characteristics, methods, and a public dataset. Future Internet 9(1), 6 (2017)","journal-title":"Future Internet"},{"issue":"12","key":"2_CR55","doi-asserted-by":"publisher","first-page":"2724","DOI":"10.1109\/TKDE.2017.2754499","volume":"29","author":"Q Wang","year":"2017","unstructured":"Wang, Q., Mao, Z., Wang, B., Guo, L.: Knowledge graph embedding: a survey of approaches and applications. IEEE Trans. Knowl. Data Eng. 29(12), 2724\u20132743 (2017)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"2_CR56","doi-asserted-by":"crossref","unstructured":"Wang, Z., Zhang, J., Feng, J., Chen, Z.: Knowledge graph embedding by translating on hyperplanes. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 28 (2014)","DOI":"10.1609\/aaai.v28i1.8870"},{"key":"2_CR57","unstructured":"Yang, B., tau Yih, W., He, X., Gao, J., Deng, L.: Embedding entities and relations for learning and inference in knowledge bases (2015)"},{"key":"2_CR58","unstructured":"Zhang, S., Tay, Y., Yao, L., Liu, Q.: Quaternion knowledge graph embeddings (2019)"},{"key":"2_CR59","doi-asserted-by":"crossref","unstructured":"Zhang, W., Paudel, B., Zhang, W., Bernstein, A., Chen, H.: Interaction embeddings for prediction and explanation in knowledge graphs. In: Proceedings of the 12th ACM International Conference on Web Search and Data Mining (2019)","DOI":"10.1145\/3289600.3291014"}],"container-title":["Lecture Notes in Computer Science","Computational Linguistics and Intelligent Text Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-24337-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,25]],"date-time":"2023-02-25T12:07:22Z","timestamp":1677326842000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-24337-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031243363","9783031243370"],"references-count":59,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-24337-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"26 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CICLing","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Linguistics and Intelligent Text Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"La Rochelle","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cicling2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cicling.org\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"335","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"95","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}