{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:21:53Z","timestamp":1742912513437,"version":"3.40.3"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031250552"},{"type":"electronic","value":"9783031250569"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-25056-9_23","type":"book-chapter","created":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T12:09:56Z","timestamp":1676376596000},"page":"342-359","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Benchmarking Robustness Beyond $$l_p$$ Norm Adversaries"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7362-4752","authenticated-orcid":false,"given":"Akshay","family":"Agarwal","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7913-5722","authenticated-orcid":false,"given":"Nalini","family":"Ratha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5952-2274","authenticated-orcid":false,"given":"Mayank","family":"Vatsa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4060-4573","authenticated-orcid":false,"given":"Richa","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,15]]},"reference":[{"key":"23_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TNNLS.2021.3051529","volume":"33","author":"A Agarwal","year":"2021","unstructured":"Agarwal, A., Goswami, G., Vatsa, M., Singh, R., Ratha, N.K.: Damad: database, attack, and model agnostic adversarial perturbation detector. IEEE Trans. Neural Netw. Learn. Syst. 33, 1\u201313 (2021). https:\/\/doi.org\/10.1109\/TNNLS.2021.3051529","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Agarwal, A., Ratha, N., Vatsa, M., Singh, R.: Exploring robustness connection between artificial and natural adversarial examples. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 179\u2013186 (2022)","DOI":"10.1109\/CVPRW56347.2022.00030"},{"key":"23_CR3","unstructured":"Agarwal, A., Ratha, N.K.: Black-box adversarial entry in finance through credit card fraud detection. In: CIKM Workshops (2021)"},{"key":"23_CR4","unstructured":"Agarwal, A., Ratha, N.K.: On the robustness of stock market regressors. In: ECML-PKDD Workshops (2022)"},{"issue":"5","key":"23_CR5","doi-asserted-by":"publisher","first-page":"2106","DOI":"10.1109\/TDSC.2020.3027183","volume":"18","author":"A Agarwal","year":"2021","unstructured":"Agarwal, A., Singh, R., Vatsa, M., Ratha, N.: Image transformation-based defense against adversarial perturbation on deep learning models. IEEE Trans. Depend. Secure Comput. 18(5), 2106\u20132121 (2021). https:\/\/doi.org\/10.1109\/TDSC.2020.3027183","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"23_CR6","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.patrec.2021.01.032","volume":"146","author":"A Agarwal","year":"2021","unstructured":"Agarwal, A., Vatsa, M., Singh, R., Ratha, N.: Cognitive data augmentation for adversarial defense via pixel masking. Pattern Recogn. Lett. 146, 244\u2013251 (2021)","journal-title":"Pattern Recogn. Lett."},{"key":"23_CR7","doi-asserted-by":"publisher","unstructured":"Agarwal, A., Vatsa, M., Singh, R., Ratha, N.: Intelligent and adaptive mixup technique for adversarial robustness. In: 2021 IEEE International Conference on Image Processing (ICIP), pp. 824\u2013828 (2021). https:\/\/doi.org\/10.1109\/ICIP42928.2021.9506180","DOI":"10.1109\/ICIP42928.2021.9506180"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Agarwal, A., Vatsa, M., Singh, R., Ratha, N.K.: Noise is inside me! generating adversarial perturbations with noise derived from natural filters. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, pp. 3354\u20133363 (2020)","DOI":"10.1109\/CVPRW50498.2020.00395"},{"key":"23_CR9","first-page":"16048","volume":"33","author":"M Andriushchenko","year":"2020","unstructured":"Andriushchenko, M., Flammarion, N.: Understanding and improving fast adversarial training. Adv. Neural Inf. Process. Syst. 33, 16048\u201316059 (2020)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"23_CR10","doi-asserted-by":"publisher","unstructured":"Chhabra, S., Agarwal, A., Singh, R., Vatsa, M.: Attack agnostic adversarial defense via visual imperceptible bound. In: 2020 25th International Conference on Pattern Recognition (ICPR), pp. 5302\u20135309 (2021). https:\/\/doi.org\/10.1109\/ICPR48806.2021.9412663","DOI":"10.1109\/ICPR48806.2021.9412663"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Chollet, F.: Xception: deep learning with depthwise separable convolutions. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 1251\u20131258 (2017)","DOI":"10.1109\/CVPR.2017.195"},{"key":"23_CR12","unstructured":"Chun, S., Oh, S.J., Yun, S., Han, D., Choe, J., Yoo, Y.: An empirical evaluation on robustness and uncertainty of regularization methods. arXiv preprint arXiv:2003.03879 (2020)"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: Imagenet: a large-scale hierarchical image database. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 248\u2013255. IEEE (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"23_CR14","unstructured":"Dodge, S., Karam, L.: Quality resilient deep neural networks. arXiv preprint arXiv:1703.08119 (2017)"},{"key":"23_CR15","doi-asserted-by":"publisher","first-page":"1769","DOI":"10.1109\/LSP.2021.3106239","volume":"28","author":"M Esmaeilpour","year":"2021","unstructured":"Esmaeilpour, M., Cardinal, P., Koerich, A.L.: Cyclic defense gan against speech adversarial attacks. IEEE Signal Process. Lett. 28, 1769\u20131773 (2021)","journal-title":"IEEE Signal Process. Lett."},{"key":"23_CR16","unstructured":"Geirhos, R., Rubisch, P., Michaelis, C., Bethge, M., Wichmann, F.A., Brendel, W.: Imagenet-trained cnns are biased towards texture; increasing shape bias improves accuracy and robustness. arXiv preprint arXiv:1811.12231 (2019)"},{"key":"23_CR17","first-page":"1","volume":"31","author":"R Geirhos","year":"2018","unstructured":"Geirhos, R., Temme, C.R., Rauber, J., Sch\u00fctt, H.H., Bethge, M., Wichmann, F.A.: Generalisation in humans and deep neural networks. Adv. Neural Inf. Process. Syst. 31, 1\u201313 (2018)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Goel, A., Singh, A., Agarwal, A., Vatsa, M., Singh, R.: Smartbox: benchmarking adversarial detection and mitigation algorithms for face recognition. In: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/BTAS.2018.8698567"},{"key":"23_CR19","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"issue":"6","key":"23_CR20","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1007\/s11263-019-01160-w","volume":"127","author":"G Goswami","year":"2019","unstructured":"Goswami, G., Agarwal, A., Ratha, N., Singh, R., Vatsa, M.: Detecting and mitigating adversarial perturbations for robust face recognition. Int. J. Comput. Vision 127(6), 719\u2013742 (2019)","journal-title":"Int. J. Comput. Vision"},{"key":"23_CR21","unstructured":"Hendrycks, D., Dietterich, T.: Benchmarking neural network robustness to common corruptions and perturbations. arXiv preprint arXiv:1903.12261 (2019)"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Hendrycks, D., Zhao, K., Basart, S., Steinhardt, J., Song, D.: Natural adversarial examples. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 15262\u201315271 (2021)","DOI":"10.1109\/CVPR46437.2021.01501"},{"key":"23_CR23","first-page":"19000","volume":"33","author":"K Hermann","year":"2020","unstructured":"Hermann, K., Chen, T., Kornblith, S.: The origins and prevalence of texture bias in convolutional neural networks. Adv. Neural Inf. Process. Syst. 33, 19000\u201319015 (2020)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Hosseini, H., Poovendran, R.: Semantic adversarial examples. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 1614\u20131619 (2018)","DOI":"10.1109\/CVPRW.2018.00212"},{"key":"23_CR25","unstructured":"Howard, A.G., et al.: Mobilenets: efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861 (2017)"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Van Der Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 4700\u20134708 (2017)","DOI":"10.1109\/CVPR.2017.243"},{"issue":"2","key":"23_CR27","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1007\/s11263-020-01383-2","volume":"129","author":"C Kamann","year":"2021","unstructured":"Kamann, C., Rother, C.: Benchmarking the robustness of semantic segmentation models with respect to common corruptions. Int. J. Comput. Vision 129(2), 462\u2013483 (2021)","journal-title":"Int. J. Comput. Vision"},{"key":"23_CR28","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial examples in the physical world. In: Artificial Intelligence Safety and Security, pp. 99\u2013112. Chapman and Hall\/CRC (2018)","DOI":"10.1201\/9781351251389-8"},{"issue":"3","key":"23_CR29","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/0885-2014(88)90014-7","volume":"3","author":"B Landau","year":"1988","unstructured":"Landau, B., Smith, L.B., Jones, S.S.: The importance of shape in early lexical learning. Cogn. Dev. 3(3), 299\u2013321 (1988)","journal-title":"Cogn. Dev."},{"key":"23_CR30","doi-asserted-by":"crossref","unstructured":"Li, F., Liu, X., Zhang, X., Li, Q., Sun, K., Li, K.: Detecting localized adversarial examples: a generic approach using critical region analysis. In: IEEE INFOCOM 2021-IEEE Conference on Computer Communications, pp. 1\u201310. IEEE (2021)","DOI":"10.1109\/INFOCOM42981.2021.9488754"},{"key":"23_CR31","unstructured":"Li, X., Li, J., Dai, T., Shi, J., Zhu, J., Hu, X.: Rethinking natural adversarial examples for classification models. arXiv preprint arXiv:2102.11731 (2021)"},{"key":"23_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107332","volume":"110","author":"X Ma","year":"2021","unstructured":"Ma, X., et al.: Understanding adversarial attacks on deep learning based medical image analysis systems. Pattern Recogn. 110, 107332 (2021)","journal-title":"Pattern Recogn."},{"key":"23_CR33","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)"},{"key":"23_CR34","doi-asserted-by":"crossref","unstructured":"Miko\u0142ajczyk, A., Grochowski, M.: Data augmentation for improving deep learning in image classification problem. In: 2018 International Interdisciplinary PhD Workshop (IIPhDW), pp. 117\u2013122. IEEE (2018)","DOI":"10.1109\/IIPHDW.2018.8388338"},{"key":"23_CR35","first-page":"1","volume":"34","author":"E Mintun","year":"2021","unstructured":"Mintun, E., Kirillov, A., Xie, S.: On interaction between augmentations and corruptions in natural corruption robustness. Adv. Neural Inf. Process. Syst. 34, 1\u201313 (2021)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"23_CR36","doi-asserted-by":"crossref","unstructured":"Modas, A., Rade, R., Ortiz-Jim\u00e9nez, G., Moosavi-Dezfooli, S.M., Frossard, P.: Prime: a few primitives can boost robustness to common corruptions. arXiv preprint arXiv:2112.13547 (2021)","DOI":"10.1007\/978-3-031-19806-9_36"},{"key":"23_CR37","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Fawzi, O., Frossard, P.: Universal adversarial perturbations. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1765\u20131773 (2017)","DOI":"10.1109\/CVPR.2017.17"},{"key":"23_CR38","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Frossard, P.: Deepfool: a simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2574\u20132582 (2016)","DOI":"10.1109\/CVPR.2016.282"},{"key":"23_CR39","unstructured":"Morrison, K., Gilby, B., Lipchak, C., Mattioli, A., Kovashka, A.: Exploring corruption robustness: inductive biases in vision transformers and mlp-mixers. arXiv preprint arXiv:2106.13122 (2021)"},{"key":"23_CR40","first-page":"1","volume":"13","author":"A Pedraza","year":"2021","unstructured":"Pedraza, A., Deniz, O., Bueno, G.: Really natural adversarial examples. Int. J. Mach. Learn. Cybern. 13, 1\u201313 (2021)","journal-title":"Int. J. Mach. Learn. Cybern."},{"issue":"4","key":"23_CR41","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.1109\/TPAMI.2019.2950923","volume":"43","author":"Y Pei","year":"2019","unstructured":"Pei, Y., Huang, Y., Zou, Q., Zhang, X., Wang, S.: Effects of image degradation and degradation removal to cnn-based image classification. IEEE Trans. Pattern Anal. Mach. Intell. 43(4), 1239\u20131253 (2019)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"23_CR42","unstructured":"Raghunathan, A., Xie, S.M., Yang, F., Duchi, J.C., Liang, P.: Adversarial training can hurt generalization. arXiv preprint arXiv:1906.06032 (2019)"},{"key":"23_CR43","doi-asserted-by":"crossref","unstructured":"Saikia, T., Schmid, C., Brox, T.: Improving robustness against common corruptions with frequency biased models. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 10211\u201310220 (2021)","DOI":"10.1109\/ICCV48922.2021.01005"},{"key":"23_CR44","unstructured":"Samangouei, P., Kabkab, M., Chellappa, R.: Defense-gan: protecting classifiers against adversarial attacks using generative models. arXiv preprint arXiv:1805.06605 (2018)"},{"key":"23_CR45","first-page":"11539","volume":"33","author":"S Schneider","year":"2020","unstructured":"Schneider, S., Rusak, E., Eck, L., Bringmann, O., Brendel, W., Bethge, M.: Improving robustness against common corruptions by covariate shift adaptation. Adv. Neural Inf. Process. Syst. 33, 11539\u201311551 (2020)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"23_CR46","unstructured":"Shafahi, A., et al.: Adversarial training for free! Adv. Neural Inf. Process. Syst. 32 (2019)"},{"key":"23_CR47","doi-asserted-by":"crossref","unstructured":"Shafahi, A., Najibi, M., Xu, Z., Dickerson, J., Davis, L.S., Goldstein, T.: Universal adversarial training. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 5636\u20135643 (2020)","DOI":"10.1609\/aaai.v34i04.6017"},{"key":"23_CR48","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)"},{"key":"23_CR49","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 2818\u20132826 (2016)","DOI":"10.1109\/CVPR.2016.308"},{"key":"23_CR50","unstructured":"Taheri, H., Pedarsani, R., Thrampoulidis, C.: Asymptotic behavior of adversarial training in binary classification. arXiv preprint arXiv:2010.13275 (2020)"},{"key":"23_CR51","unstructured":"Tramer, F.: Detecting adversarial examples is (nearly) as hard as classifying them. arXiv preprint arXiv:2107.11630 (2021)"},{"key":"23_CR52","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1109\/TMM.2021.3050057","volume":"24","author":"J Wang","year":"2021","unstructured":"Wang, J., et al.: Smsnet: a new deep convolutional neural network model for adversarial example detection. IEEE Trans. Multimedia 24, 230\u2013244 (2021)","journal-title":"IEEE Trans. Multimedia"},{"key":"23_CR53","volume":"57","author":"M Xue","year":"2021","unstructured":"Xue, M., Yuan, C., He, C., Wang, J., Liu, W.: Naturalae: natural and robust physical adversarial examples for object detectors. J. Inf. Secur. Appl. 57, 102694 (2021)","journal-title":"J. Inf. Secur. Appl."},{"key":"23_CR54","unstructured":"Zhang, H., Chen, H., Song, Z., Boning, D., Dhillon, I.S., Hsieh, C.J.: The limitations of adversarial training and the blind-spot attack. arXiv preprint arXiv:1901.04684 (2019)"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2022 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-25056-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:32:32Z","timestamp":1710268352000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-25056-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031250552","9783031250569"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-25056-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"15 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tel Aviv","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Israel","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2022.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5804","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1645","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.21","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.91","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"From the workshops, 367 reviewed full papers have been selected for publication","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}