{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:14:01Z","timestamp":1743016441106,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031302572"},{"type":"electronic","value":"9783031302589"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-30258-9_23","type":"book-chapter","created":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T07:09:12Z","timestamp":1681888152000},"page":"269-289","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Energy Efficient and\u00a0Secure Scheme Based Compressive Sensing Method for\u00a0Internet of\u00a0Vehicles"],"prefix":"10.1007","author":[{"given":"Ahmed","family":"Aziz","sequence":"first","affiliation":[]},{"given":"Maha","family":"Ibrahim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,20]]},"reference":[{"key":"23_CR1","doi-asserted-by":"publisher","first-page":"3994","DOI":"10.1109\/JIOT.2018.2881295","volume":"6","author":"X Liu","year":"2018","unstructured":"Liu, X., Yang, Q., Luo, J., Ding, B., Zhang, S.: An energy-aware offloading framework for edge-augmented mobile RFID systems. IEEE Internet Things J. 6, 3994\u20134004 (2018)","journal-title":"IEEE Internet Things J."},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MCOM.2011.6069706","volume":"49","author":"J Zheng","year":"2011","unstructured":"Zheng, J., Simplot-Ryl, D., Bisdikian, C., Mouftah, H.T.: The internet of things. IEEE Commun. Mag. 49, 30\u201331 (2011)","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"23_CR3","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1109\/TII.2011.2123904","volume":"7","author":"L Palopoli","year":"2011","unstructured":"Palopoli, L., Passerone, R., Rizano, T.: Scalable offline optimization of industrial wireless sensor networks. IEEE Trans. Ind. Inf. 7(2), 328\u2013329 (2011)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"1","key":"23_CR4","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/JETCAS.2013.2243032","volume":"3","author":"MT Lazarescu","year":"2013","unstructured":"Lazarescu, M.T.: Design of a WSN platform for long-term environmental monitoring for IoT applications. IEEE J. Emerg. Sel. Top. Circuits Syst. 3(1), 45\u201354 (2013)","journal-title":"IEEE J. Emerg. Sel. Top. Circuits Syst."},{"issue":"4","key":"23_CR5","doi-asserted-by":"publisher","first-page":"7619","DOI":"10.3390\/s150407619","volume":"15","author":"C Del-Valle-Soto","year":"2015","unstructured":"Del-Valle-Soto, C., Mex-Perera, C., Monroy, R., Nolazco-Flores, J.: On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks. Sensors 15(4), 7619\u20137649 (2015)","journal-title":"Sensors"},{"key":"23_CR6","doi-asserted-by":"publisher","DOI":"10.1201\/9781420011241","volume-title":"An Introduction to Cryptography","author":"RA Mollin","year":"2006","unstructured":"Mollin, R.A.: An Introduction to Cryptography. CRC Press, Boca Raton (2006)"},{"key":"23_CR7","volume-title":"Handbook of Applied Cryptography","author":"SA Vanstone","year":"1999","unstructured":"Vanstone, S.A., Menezes, A.J., Orschot, P.C.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1999)"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Fragkiadakis, A., Tragos, E., Traganitis, A.: Lightweight and secure encryption using channel measurements. In: 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace, Aalborg, pp. 1\u20135 (2014)","DOI":"10.1109\/VITAE.2014.6934411"},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.1109\/COMST.2018.2878943","volume":"21","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Xiang, Y., Zhang, L.Y., Rong, Y., Guo, S.: Secure wireless communications based on compressive sensing: a survey. IEEE Commun. Surv. Tutor. 21, 1093\u20131111 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"23_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-2523-6","volume-title":"In Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT","author":"Y Zhang","year":"2019","unstructured":"Zhang, Y., Xiang, Y., Zhang, L.Y.: In Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT. Springer, Singapore (2019)"},{"key":"23_CR11","unstructured":"Zhang, L., Wong, K., Li, C., Zhang, Y.: Towards secure compressive sampling scheme. CoRR (2014)"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Fragkiadakis, A., Kovacevic, L., Tragos, E.: Enhancing compressive sensing encryption in constrained devices using chaotic sequences. In: Proceedings of the 2nd Workshop on Experiences in the Design and Implementation of Smart Objects, pp. 17\u201322 (2016)","DOI":"10.1145\/2980147.2980155"},{"issue":"2","key":"23_CR13","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/s11277-018-6035-4","volume":"104","author":"A Aziz","year":"2019","unstructured":"Aziz, A., Singh, K.: Lightweight security scheme for internet of things. Wirel. Pers. Commun. 104(2), 577\u2013593 (2019)","journal-title":"Wirel. Pers. Commun."},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Tragos, E., et al.: Enabling reliable and secure IoT-based smart city applications. In: Proceedings of PERCOM, pp. 111\u2013116 (2014)","DOI":"10.1109\/PerComW.2014.6815175"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Abdallah, W., Boudriga, N., Kim, D.: An efficient and scalable key management mechanism for wireless sensor networks. In: 17th International Conference on ICACT, India. IEEE (2015)","DOI":"10.1109\/ICACT.2015.7224913"},{"key":"23_CR16","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1007\/s11277-014-2061-z","volume":"80","author":"SB Othman","year":"2015","unstructured":"Othman, S.B., Bahattab, A.A., Trad, A., Youssef, H.: Confidentiality and integrity for data aggregation in WSN using homomorphic encryption. Wirel. Pers. Commun. 80, 867\u2013889 (2015)","journal-title":"Wirel. Pers. Commun."},{"key":"23_CR17","doi-asserted-by":"publisher","first-page":"71","DOI":"10.15837\/ijccc.2014.1.235","volume":"9","author":"N Suganthi","year":"2014","unstructured":"Suganthi, N., Vembu, S.: Energy efficient key management scheme for wireless sensor networks. Int. J. Comput. Commun. Control 9, 71\u201378 (2014)","journal-title":"Int. J. Comput. Commun. Control"},{"key":"23_CR18","first-page":"149","volume":"16","author":"B Kadri","year":"2014","unstructured":"Kadri, B., Feham, M., Mhammed, A.: Efficient and secured ant routing algorithm for wireless sensor networks. Int. J. Netw. Secur. 16, 149\u2013156 (2014)","journal-title":"Int. J. Netw. Secur."},{"key":"23_CR19","doi-asserted-by":"publisher","first-page":"654","DOI":"10.17485\/ijst\/2015\/v8i15\/57603","volume":"8","author":"R Geetha","year":"2015","unstructured":"Geetha, R., Kannan, E.: A hybrid key management approach for secure communication in wireless sensor networks. Indian J. Sci. Technol. 8, 654\u2013659 (2015)","journal-title":"Indian J. Sci. Technol."},{"key":"23_CR20","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1109\/LCOMM.2015.2409057","volume":"19","author":"DE Boubiche","year":"2015","unstructured":"Boubiche, D.E., Boubiche, S., Bilami, A.: A cross-layer watermarking-based mechanism for data aggregation integrity in heterogeneous WSNs. IEEE Commun. Lett. 19, 823\u2013826 (2015)","journal-title":"IEEE Commun. Lett."},{"key":"23_CR21","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1016\/j.procs.2016.02.082","volume":"78","author":"S Roy","year":"2016","unstructured":"Roy, S., Karjeea, J., Rawata, U.S., Pratik, D., Deyb, N.: Symmetric key encryption technique: a cellular automata based approach in wireless sensor networks. Procedia Comput. Sci. 78, 408\u2013414 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Luo, C., Wu, F., Sun, J., Chen, C.: Compressive data gathering for large-scale wireless sensor networks, pp. 145\u2013156. ACM (2009)","DOI":"10.1145\/1614320.1614337"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Hu, P., Xing, K., Cheng, X., Wei, H., Zhu, H.: Information leaks out: attacks and countermeasures on compressive data gathering in wireless sensor networks, pp. 1258\u20131266. IEEE (2014)","DOI":"10.1109\/INFOCOM.2014.6848058"},{"issue":"12","key":"23_CR24","doi-asserted-by":"publisher","first-page":"5406","DOI":"10.1109\/TIT.2006.885507","volume":"52","author":"EJ Candes","year":"2006","unstructured":"Candes, E.J., Tao, T.: Near-optimal signal recovery from random projections: universal encoding strategies. IEEE Trans. Inf. Theory 52(12), 5406\u20135425 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"23_CR25","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1109\/TMM.2010.2041105","volume":"12","author":"M Cossalter","year":"2010","unstructured":"Cossalter, M., Valenzise, G., Tagliasacchi, M., Tubaro, S.: Joint compressive video coding and analysis. IEEE Trans. Multimed. 12(3), 168\u2013183 (2010)","journal-title":"IEEE Trans. Multimed."},{"issue":"5","key":"23_CR26","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1109\/TMC.2012.63","volume":"12","author":"S Premnath","year":"2013","unstructured":"Premnath, S., et al.: Secret key extraction from wireless signal strength in real environments. IEEE Trans. Mob. Comput. 12(5), 917\u2013930 (2013)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Li, Z., Xu, W., Miller, R., Trappe, W.: Securing wireless systems via lower layer enforcements. In: Proceedings of WiSe, pp. 33\u201342 (2006)","DOI":"10.1145\/1161289.1161297"},{"key":"23_CR28","doi-asserted-by":"crossref","unstructured":"Dautov, R., Tsouri, G.: Establishing secure measurement matrix for compressed sensing using wireless physical layer security. In: Proceedings of ICNC, pp. 354\u2013358 (2013)","DOI":"10.1109\/ICCNC.2013.6504108"},{"key":"23_CR29","series-title":"Modeling and Optimization in Science and Technologies","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/978-3-319-30913-2_18","volume-title":"Internet of Things (IoT) in 5G Mobile Technologies","author":"A Fragkiadakis","year":"2016","unstructured":"Fragkiadakis, A., Tragos, E., Makrogiannakis, A., Papadakis, S., Charalampidis, P., Surligas, M.: Signal processing techniques for energy efficiency, security, and reliability in the IoT domain. In: Mavromoustakis, C.X., Mastorakis, G., Batalla, J.M. (eds.) Internet of Things (IoT) in 5G Mobile Technologies. MOST, vol. 8, pp. 419\u2013447. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-30913-2_18"},{"key":"23_CR30","doi-asserted-by":"crossref","unstructured":"Rachlin, Y., Baron, D.: The secrecy of compressed sensing measurements. In: Proceedings of Allerton Conference on Communication, Control, and Computing, pp. 813\u2013817 (2008)","DOI":"10.1109\/ALLERTON.2008.4797641"},{"key":"23_CR31","first-page":"2183","volume":"63","author":"V Cambareri","year":"2015","unstructured":"Cambareri, V., Mangia, M., Pareschi, F., Rovatti, R., Setti, G.: Low-complexity multiclass encryption by compressed sensing. IEEE Trans. Signal Process. 63, 2183\u20132195 (2015)","journal-title":"IEEE Trans. Signal Process."},{"key":"23_CR32","doi-asserted-by":"crossref","unstructured":"Rachlin, Y., Baron, D.: The secrecy of compressed sensing measurements. In: Proceedings of 46th Annual Allerton Conference on Communication, Control, and Computing, pp. 813\u2013817 (2008)","DOI":"10.1109\/ALLERTON.2008.4797641"},{"key":"23_CR33","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1109\/JIOT.2017.2781737","volume":"5","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y., et al.: Low-cost and confidentiality-preserving data acquisition for internet of multimedia things. IEEE Internet Things J. 5, 3442\u20133451 (2017)","journal-title":"IEEE Internet Things J."},{"key":"23_CR34","doi-asserted-by":"crossref","unstructured":"Xue, W., Luo, C., Lan, G., Rana, R.K., Hu, W., Seneviratne, A.: Kryptein: a compressive-sensing-based encryption scheme for the internet of things. In: Proceedings of the 16th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN), pp. 169\u2013180 (2017)","DOI":"10.1145\/3055031.3055079"},{"issue":"3","key":"23_CR35","first-page":"371","volume":"65","author":"V Pudi","year":"2018","unstructured":"Pudi, V., Chattopadhyay, A., Lam, K.-Y.: Secure and lightweight compressive sensing using stream cipher. IEEE Trans. Circuits Syst. II Express Briefs 65(3), 371\u2013375 (2018)","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"issue":"1","key":"23_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11220-014-0085-9","volume":"15","author":"SN George","year":"2014","unstructured":"George, S.N., Pattathil, D.P.: A secure LFSR based random measurement matrix for compressive sensing. Sens. Imaging 15(1), 1\u201329 (2014)","journal-title":"Sens. Imaging"},{"key":"23_CR37","doi-asserted-by":"crossref","unstructured":"Dautov, R., Tsouri, G.R.: Establishing secure measurement matrix for compressed sensing using wireless physical layer security. In: International Conference on Computing, Networking and Communications (ICNC), pp. 354\u2013358. IEEE (2013)","DOI":"10.1109\/ICCNC.2013.6504108"},{"key":"23_CR38","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.sigpro.2016.11.016","volume":"134","author":"X Chai","year":"2017","unstructured":"Chai, X., Gan, Z., Chen, Y., Zhang, Y.: A visually secure image encryption scheme based on compressive sensing. Signal Process. 134, 35\u201351 (2017)","journal-title":"Signal Process."},{"key":"23_CR39","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.adhoc.2017.11.011","volume":"70","author":"P Zhang","year":"2018","unstructured":"Zhang, P., Wang, S., Guo, K., Wang, J.: A secure data collection scheme based on compressive sensing in wireless sensor networks. Ad Hoc Netw. 70, 73\u201384 (2018)","journal-title":"Ad Hoc Netw."},{"key":"23_CR40","volume-title":"A Wavelet Tour of Signal Processing","author":"S Mallat","year":"1999","unstructured":"Mallat, S.: A Wavelet Tour of Signal Processing. Academic Press, Cambridge (1999)"},{"issue":"14","key":"23_CR41","doi-asserted-by":"publisher","first-page":"4655","DOI":"10.1109\/TIT.2007.909108","volume":"53","author":"J Tropp","year":"2007","unstructured":"Tropp, J., Gilber, A.: Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans. Inf. Theory 53(14), 4655\u20134666 (2007)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"23_CR42","doi-asserted-by":"crossref","unstructured":"Abo-Zahhad, M., Farrag, M., Ali, A., Amin, O.: An energy consumption model for wireless sensor networks. In: International Conference on Energy Aware Computing Systems & Applications (ICEAC), pp. 1\u20134. IEEE (2015)","DOI":"10.1109\/ICEAC.2015.7352200"},{"key":"23_CR43","doi-asserted-by":"crossref","unstructured":"Liu, H., Zhu, Z., Jiang, H., Wang, B.: A novel image encryption algorithm based on improved 3D chaotic cat map. In: The 9th International Conference for Young Computer Scientists (2008)","DOI":"10.1109\/ICYCS.2008.449"},{"key":"23_CR44","unstructured":"Intel Berkeley Research Lab Data Set (2018). http:\/\/db.csail.mit.edu\/labdata\/labdata.html. Accessed 9 Apr"},{"key":"23_CR45","doi-asserted-by":"publisher","first-page":"1905","DOI":"10.1007\/s11277-020-07454-4","volume":"114","author":"A Aziz","year":"2020","unstructured":"Aziz, A., Singh, K., Osamy, W., et al.: An efficient compressive sensing routing scheme for internet of things based wireless sensor networks. Wirel. Pers. Commun. 114, 1905\u20131925 (2020). https:\/\/doi.org\/10.1007\/s11277-020-07454-4","journal-title":"Wirel. Pers. Commun."},{"key":"23_CR46","doi-asserted-by":"crossref","unstructured":"Aziz, A., Salim, A., Osamy, W.: Adaptive and efficient compressive sensing based technique for routing in wireless sensor networks. In: Proceedings of INTHITEN (IoT and its Enablers) Conference, pp. 3\u20134 (2014)","DOI":"10.1007\/s11276-014-0852-5"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-30258-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T07:16:58Z","timestamp":1681888618000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-30258-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031302572","9783031302589"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-30258-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"20 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NEW2AN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Next Generation Wired\/Wireless Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tashkent","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Uzbekistan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"new2an2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/new2an.info\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"282","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}