{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:17:25Z","timestamp":1742912245542,"version":"3.40.3"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"electronic","value":"9783031248016"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-24801-6_25","type":"book-chapter","created":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T18:07:14Z","timestamp":1675274834000},"page":"347-359","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Identifying Colluding Actors in\u00a0Social Communities by\u00a0Reputation Measures"],"prefix":"10.1007","author":[{"given":"Mariantonia","family":"Cotronei","sequence":"first","affiliation":[]},{"given":"Sofia","family":"Giuffr\u00e8","sequence":"additional","affiliation":[]},{"given":"Attilio","family":"Marcian\u00f2","sequence":"additional","affiliation":[]},{"given":"Domenico","family":"Rosaci","sequence":"additional","affiliation":[]},{"given":"Giuseppe M. L.","family":"Sarn\u00e8","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/978-3-319-45234-0_39","volume-title":"Social Media: The Good, the Bad, and the Ugly","author":"W Abdelghani","year":"2016","unstructured":"Abdelghani, W., Zayani, C.A., Amous, I., S\u00e8des, F.: Trust management in social internet of things: a survey. In: Dwivedi, Y.K., et al. (eds.) I3E 2016. LNCS, vol. 9844, pp. 430\u2013441. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45234-0_39"},{"issue":"5","key":"25_CR2","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.elerap.2014.07.001","volume":"13","author":"AA Adamopoulou","year":"2014","unstructured":"Adamopoulou, A.A., Symeonidis, A.L.: A simulation testbed for analyzing trust and reputation mechanisms in unreliable online markets. Electron. Commer. Res. Appl. 13(5), 368\u2013386 (2014)","journal-title":"Electron. Commer. Res. Appl."},{"issue":"2","key":"25_CR3","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/s11704-014-4212-5","volume":"9","author":"A Ahmed","year":"2015","unstructured":"Ahmed, A., Abu Bakar, K., Channa, M.I., Haseeb, K., Khan, A.W.: A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks. Front. Comput. Sci. 9(2), 280\u2013296 (2015)","journal-title":"Front. Comput. Sci."},{"key":"25_CR4","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.jnca.2019.02.024","volume":"137","author":"A Altaf","year":"2019","unstructured":"Altaf, A., Abbas, H., Iqbal, F., Derhab, A.: Trust models of internet of smart things: a survey, open issues, and future directions. J. Netw. Comput. Appl. 137, 93\u2013111 (2019)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"25_CR5","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1080\/15427951.2005.10129098","volume":"2","author":"P Berkhin","year":"2005","unstructured":"Berkhin, P.: A survey on pagerank computing. Internet Math. 2(1), 73\u2013120 (2005)","journal-title":"Internet Math."},{"issue":"10","key":"25_CR6","doi-asserted-by":"publisher","first-page":"2567","DOI":"10.1093\/comjnl\/bxu130","volume":"58","author":"AJ Bidgoly","year":"2015","unstructured":"Bidgoly, A.J., Ladani, B.T.: Modelling and quantitative verification of reputation systems against malicious attackers. Comput. J. 58(10), 2567\u20132582 (2015)","journal-title":"Comput. J."},{"key":"25_CR7","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.chb.2015.12.024","volume":"57","author":"AJ Bidgoly","year":"2016","unstructured":"Bidgoly, A.J., Ladani, B.T.: Benchmarking reputation systems: a quantitative verification approach. Comput. Hum. Behav. 57, 274\u2013291 (2016)","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"25_CR8","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1111\/j.1467-6451.2010.00405.x","volume":"58","author":"L Cabral","year":"2010","unstructured":"Cabral, L., Hortacsu, A.: The dynamics of seller reputation: evidence from Ebay. J. Ind. Econ. 58(1), 54\u201378 (2010)","journal-title":"J. Ind. Econ."},{"issue":"2","key":"25_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2815595","volume":"48","author":"J-H Cho","year":"2015","unstructured":"Cho, J.-H., Chan, K., Adali, S.: A survey on trust modeling. ACM Comput. Surv. (CSUR) 48(2), 1\u201340 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"De Meo, P., Fotia, L., Messina, F., Rosaci, D., Sarn\u00e9, G.M.L.: Providing recommendations in social networks by integrating local and global reputation. Inf. Syst. 78, 58\u201367 (2018)","DOI":"10.1016\/j.is.2018.07.002"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"De Meo, P., Messina, F., Postorino, M.N., Rosaci, D., Sarn\u00e9, G.M.L.: A reputation framework to share resources into IoT-based environments. In: IEEE 14th International Conference on Networking, Sensing and Control, pp. 513\u2013518. IEEE (2017)","DOI":"10.1109\/ICNSC.2017.8000145"},{"key":"25_CR12","doi-asserted-by":"publisher","first-page":"29763","DOI":"10.1109\/ACCESS.2018.2880838","volume":"7","author":"IU Din","year":"2018","unstructured":"Din, I.U., Guizani, M., Kim, B.S., Hassan, S., Khan, M.K.: Trust management techniques for the internet of things: a survey. IEEE Access 7, 29763\u201329787 (2018)","journal-title":"IEEE Access"},{"key":"25_CR13","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/2643546","volume":"2020","author":"W Fang","year":"2020","unstructured":"Fang, W., Zhang, W., Chen, W., Pan, T., Ni, Y., Yang, Y.: Trust-based attack and defense in wireless sensor networks: a survey. Wirel. Commun. Mob. Comput. 2020, 2643546 (2020)","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"25_CR14","doi-asserted-by":"publisher","first-page":"60117","DOI":"10.1109\/ACCESS.2020.2982318","volume":"8","author":"G Fortino","year":"2020","unstructured":"Fortino, G., Fotia, L., Messina, F., Rosaci, D., Sarn\u00e9, G.M.L.: State-of-the-art and research challenges: trust and reputation in the internet of things. IEEE Access 8, 60117\u201360125 (2020)","journal-title":"IEEE Access"},{"issue":"5","key":"25_CR15","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1109\/JAS.2020.1003330","volume":"7","author":"G Fortino","year":"2020","unstructured":"Fortino, G., Messina, F., Rosaci, D., Sarn\u00e9, G.M.L.: ResIoT: an IoT social framework resilient to malicious activities. IEEE\/CAA J. Autom. Sinica 7(5), 1263\u20131278 (2020)","journal-title":"IEEE\/CAA J. Autom. Sinica"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Fullam, K. K.: A specification of the agent reputation and trust (art) testbed: experimentation and competition for trust in agent societies. In: Proceedings of the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 512\u2013518 (2005)","DOI":"10.1145\/1082473.1082551"},{"key":"25_CR17","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/j.future.2019.05.017","volume":"99","author":"SA Ghasempouri","year":"2019","unstructured":"Ghasempouri, S.A., Ladani, B.T.: Modeling trust and reputation systems in hostile environments. Futur. Gener. Comput. Syst. 99, 571\u2013592 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"6","key":"25_CR18","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.1111\/deci.12156","volume":"46","author":"SC Hayne","year":"2015","unstructured":"Hayne, S.C., Wang, H., Wang, L.: Modeling reputation as a time-series: evaluating the risk of purchase decisions on eBay. Decis. Sci. 46(6), 1077\u20131107 (2015)","journal-title":"Decis. Sci."},{"issue":"1","key":"25_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1592451.1592452","volume":"42","author":"K Hoffman","year":"2009","unstructured":"Hoffman, K., Zage, D., Nita-Rotaru, C.: A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. (CSUR) 42(1), 1\u201331 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"2","key":"25_CR20","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s10458-005-6825-4","volume":"13","author":"TD Huynh","year":"2006","unstructured":"Huynh, T.D., Jennings, N.R., Shadbolt, N.R.: An integrated trust and reputation model for open multi-agent systems. Auton. Agent. Multi-Agent Syst. 13(2), 119\u2013154 (2006)","journal-title":"Auton. Agent. Multi-Agent Syst."},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Jnanamurthy, H.K., Singh, S.: Detection and filtering of collaborative malicious users in reputation system using quality repository approach. In: 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 466\u2013471. IEEE (2013)","DOI":"10.1109\/ICACCI.2013.6637216"},{"key":"25_CR22","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-642-29852-3_21","volume-title":"Trust Management VI","author":"A J\u00f8sang","year":"2012","unstructured":"J\u00f8sang, A.: Robustness of trust and reputation systems: does it matter? In: Dimitrakos, T., Moona, R., Patel, D., McKnight, D.H. (eds.) IFIPTM 2012. IAICT, vol. 374, pp. 253\u2013262. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29852-3_21"},{"key":"25_CR23","unstructured":"J\u00f8sang, A., Golbeck, J.: Challenges for robust trust and reputation systems. In: Proceedings of the 5th International Workshop on Security and Trust Management (SMT 2009), Saint Malo, France, vol. 5. Citeseer (2009)"},{"issue":"2","key":"25_CR24","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618\u2013644 (2007)","journal-title":"Decis. Support Syst."},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640\u2013651. ACM (2003)","DOI":"10.1145\/775152.775242"},{"issue":"3","key":"25_CR26","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s10660-010-9056-y","volume":"10","author":"R Kerr","year":"2010","unstructured":"Kerr, R., Cohen, R.: Treet: the trust and reputation experimentation and evaluation testbed. Electron. Commer. Res. 10(3), 271\u2013290 (2010)","journal-title":"Electron. Commer. Res."},{"issue":"4","key":"25_CR27","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s10660-008-9019-8","volume":"8","author":"G Lax","year":"2006","unstructured":"Lax, G., Sarn\u00e9, G.M.L.: Cell Trust: a reputation model for C2C commerce. Electron. Commer. Res. 8(4), 193\u2013216 (2006)","journal-title":"Electron. Commer. Res."},{"key":"25_CR28","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1016\/j.future.2019.07.021","volume":"101","author":"L Liu","year":"2019","unstructured":"Liu, L., Ma, Z., Meng, W.: Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks. Futur. Gener. Comput. Syst. 101, 865\u2013879 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"05","key":"25_CR29","doi-asserted-by":"publisher","first-page":"164","DOI":"10.4236\/jcc.2015.35021","volume":"3","author":"S Madakam","year":"2015","unstructured":"Madakam, S., Lake, V., Lake, V., Lake, V., et al.: Internet of things (IoT): a literature review. J. Comput. Commun. 3(05), 164 (2015)","journal-title":"J. Comput. Commun."},{"key":"25_CR30","doi-asserted-by":"publisher","first-page":"3297","DOI":"10.1109\/TNSM.2020.3046906","volume":"18","author":"C Marche","year":"2020","unstructured":"Marche, C., Nitti, M.: Trust-related attacks and their detection: a trust management model for the social IoT. IEEE Trans. Netw. Serv. Manage. 18, 3297\u20133308 (2020)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"7","key":"25_CR31","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1016\/j.cose.2009.05.005","volume":"28","author":"FG M\u00e1rmol","year":"2009","unstructured":"M\u00e1rmol, F.G., P\u00e9rez, G.M.: Security threats scenarios in trust and reputation models for distributed systems. Comput. Secur. 28(7), 545\u2013556 (2009)","journal-title":"Comput. Secur."},{"key":"25_CR32","doi-asserted-by":"crossref","unstructured":"M\u00e1rmol., F.G., P\u00e9rez, G.M.: TRMSim-WSN, trust and reputation models simulator for wireless sensor networks. In: 2009 IEEE International Conference on Communications, pp. 1\u20135. IEEE (2009)","DOI":"10.1109\/ICC.2009.5199545"},{"key":"25_CR33","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.future.2015.07.013","volume":"56","author":"F Messina","year":"2015","unstructured":"Messina, F., Pappalardo, G., Rosaci, D., Santoro, C., Sarn\u00e9, G.M.L.: A trust-aware, self-organizing system for large-scale federations of utility computing infrastructures. Future Gener. Comput. Syst. 56, 77\u201394 (2015)","journal-title":"Future Gener. Comput. Syst."},{"key":"25_CR34","unstructured":"Brin, M.W.P.: The pagerank citation ranking: Bringing order to the web. Stanford Digital Library working paper SIDL-WP (1999)"},{"issue":"6","key":"25_CR35","doi-asserted-by":"publisher","first-page":"9326","DOI":"10.1109\/JIOT.2019.2933518","volume":"6","author":"B Pourghebleh","year":"2019","unstructured":"Pourghebleh, B., Wakil, K., Navimipour, N.J.: A comprehensive study on the trust management techniques in the internet of things. IEEE Internet Things J. 6(6), 9326\u20139337 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"12","key":"25_CR36","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/355112.355122","volume":"43","author":"P Resnick","year":"2000","unstructured":"Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Commun. ACM 43(12), 45\u201348 (2000)","journal-title":"Commun. ACM"},{"key":"25_CR37","unstructured":"Resnick, P., Zeckhauser, R.: Trust among strangers in internet transactions: empirical analysis of eBay\u2019s reputation system. In: The Economics of the Internet and E-commerce. Emerald Group Publishing Limited (2002)"},{"issue":"1","key":"25_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/int.20513","volume":"27","author":"D Rosaci","year":"2012","unstructured":"Rosaci, D., Sarn\u00e8, G.M.L., Garruzzo, S.: Integrating trust measures in multiagent systems. Int. J. Intell. Syst. 27(1), 1\u201315 (2012)","journal-title":"Int. J. Intell. Syst."},{"issue":"1","key":"25_CR39","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10462-004-0041-5","volume":"24","author":"J Sabater","year":"2005","unstructured":"Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artif. Intell. Rev. 24(1), 33\u201360 (2005)","journal-title":"Artif. Intell. Rev."},{"key":"25_CR40","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.procs.2015.08.331","volume":"63","author":"SM Sajjad","year":"2015","unstructured":"Sajjad, S.M., Bouk, S.H., Yousaf, M.: Neighbor node trust based intrusion detection system for WSN. Procedia Comput. Sci. 63, 183\u2013188 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"25_CR41","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.comcom.2020.06.030","volume":"160","author":"A Sharma","year":"2020","unstructured":"Sharma, A., Pilli, E.S., Mazumdar, A.P., Gera, P.: Towards trustworthy internet of things: a survey on trust management applications and schemes. Comput. Commun. 160, 475\u2013493 (2020)","journal-title":"Comput. Commun."},{"key":"25_CR42","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.dss.2014.02.002","volume":"61","author":"S Vavilis","year":"2014","unstructured":"Vavilis, S., Petkovi\u0107, M., Zannone, N.: A reference model for reputation systems. Decis. Support Syst. 61, 147\u2013154 (2014)","journal-title":"Decis. Support Syst."},{"issue":"1","key":"25_CR43","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s11390-008-9118-y","volume":"23","author":"Y-F Wang","year":"2008","unstructured":"Wang, Y.-F., Hori, Y., Sakurai, K.: Characterizing economic and social properties of trust and reputation systems in P2P environment. J. Comput. Sci. Technol. 23(1), 129\u2013140 (2008)","journal-title":"J. Comput. Sci. Technol."},{"issue":"7","key":"25_CR44","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L Xiong","year":"2004","unstructured":"Xiong, L., Liu, L.: Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16(7), 843\u2013857 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Communications in Computer and Information Science","Applied Intelligence and Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-24801-6_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,8]],"date-time":"2023-05-08T14:06:28Z","timestamp":1683554788000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-24801-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031248016"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-24801-6_25","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"2 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Intelligence and Informatics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Reggio Calabria","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apii2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aii2022.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Proconf (https:\/\/proconf.org\/)","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"108","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}