{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:29:16Z","timestamp":1742912956827,"version":"3.40.3"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031398278"},{"type":"electronic","value":"9783031398285"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-39828-5_1","type":"book-chapter","created":{"date-parts":[[2023,8,12]],"date-time":"2023-08-12T16:01:57Z","timestamp":1691856117000},"page":"3-22","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Evaluating Rule-Based Global XAI Malware Detection Methods"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3729-3153","authenticated-orcid":false,"given":"Rui","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3760-9165","authenticated-orcid":false,"given":"Olga","family":"Gadyatskaya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,7]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","first-page":"73214","DOI":"10.1109\/ACCESS.2022.3189645","volume":"10","author":"M Alani","year":"2022","unstructured":"Alani, M., Awad, A.: PAIRED: an explainable lightweight Android malware detection system. IEEE Access 10, 73214\u201373228 (2022)","journal-title":"IEEE Access"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., H\u00fcbner, M., Gascon, H., Rieck, K.: DREBIN: effective and explainable detection of android malware in your pocket. In: Symposium on Network and Distributed System Security (NDSS) (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Backes, M., Nauman, M.: LUNA: quantifying and leveraging uncertainty in Android malware analysis through Bayesian machine learning. In: 2017 IEEE European Symposium on Security and Privacy, Los Alamitos, CA, USA, pp. 204\u2013217. IEEE (2017)","DOI":"10.1109\/EuroSP.2017.24"},{"issue":"1","key":"1_CR4","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1214\/20-EJS1792","volume":"15","author":"C B\u00e9nard","year":"2021","unstructured":"B\u00e9nard, C., Biau, G., Da Veiga, S., Scornet, E.: SIRUS: stable and interpretable rule set for classification. Electron. J. Stat. 15(1), 427\u2013505 (2021)","journal-title":"Electron. J. Stat."},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1613\/jair.1.12228","volume":"70","author":"N Burkart","year":"2021","unstructured":"Burkart, N., Huber, M.F.: A survey on the explainability of supervised machine learning. J. Artif. Intell. Res. 70, 245\u2013317 (2021)","journal-title":"J. Artif. Intell. Res."},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.eswa.2017.11.032","volume":"95","author":"A Calleja","year":"2018","unstructured":"Calleja, A., Mart\u00edn, A., Men\u00e9ndez, H.D., Tapiador, J., Clark, D.: Picking on the family: disrupting Android malware triage by forcing misclassification. Expert Syst. Appl. 95, 113\u2013126 (2018)","journal-title":"Expert Syst. Appl."},{"key":"1_CR7","doi-asserted-by":"publisher","first-page":"93575","DOI":"10.1109\/ACCESS.2022.3204171","volume":"10","author":"N Capuano","year":"2022","unstructured":"Capuano, N., Fenza, G., Loia, V., Stanzione, C.: Explainable artificial intelligence in cybersecurity: a survey. IEEE Access 10, 93575\u201393600 (2022)","journal-title":"IEEE Access"},{"key":"1_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12243-022-00926-7","volume":"77","author":"F Charmet","year":"2022","unstructured":"Charmet, F., et al.: Explainable artificial intelligence for cybersecurity: a literature survey. Ann. Telecommun. 77, 1\u201324 (2022)","journal-title":"Ann. Telecommun."},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Dashevskyi, S., Zhauniarovich, Y., Gadyatskaya, O., Pilgun, A., Ouhssain, H.: Dissecting Android cryptocurrency miners. In: Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, pp. 191\u2013202 (2020)","DOI":"10.1145\/3374664.3375724"},{"issue":"4","key":"1_CR10","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/TDSC.2017.2700270","volume":"16","author":"A Demontis","year":"2017","unstructured":"Demontis, A., et al.: Yes, machine learning can be more secure! a case study on android malware detection. IEEE Trans. Dependable Secure Comput. 16(4), 711\u2013724 (2017)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"4","key":"1_CR11","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s41060-018-0144-8","volume":"7","author":"H Deng","year":"2019","unstructured":"Deng, H.: Interpreting tree ensembles with intrees. Int. J. Data Sci. Anal. 7(4), 277\u2013287 (2019)","journal-title":"Int. J. Data Sci. Anal."},{"issue":"2","key":"1_CR12","doi-asserted-by":"publisher","first-page":"225","DOI":"10.2174\/1872212114999200710143847","volume":"15","author":"M Dhalaria","year":"2021","unstructured":"Dhalaria, M., Gandotra, E.: Android malware detection techniques: a literature review. Recent Patents Eng. 15(2), 225\u2013245 (2021)","journal-title":"Recent Patents Eng."},{"key":"1_CR13","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1109\/TIFS.2020.3021924","volume":"16","author":"M Fan","year":"2020","unstructured":"Fan, M., Wei, W., Xie, X., Liu, Y., Guan, X., Liu, T.: Can we trust your explanations? Sanity checks for interpreters in Android malware analysis. IEEE Trans. Inf. Forensics Secur. 16, 838\u2013853 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1_CR14","unstructured":"Guidotti, R., Monreale, A., Ruggieri, S., Pedreschi, D., Turini, F., Giannotti, F.: Local rule-based explanations of black box decision systems. arXiv preprint arXiv:1805.10820 (2018)"},{"issue":"5","key":"1_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3236009","volume":"51","author":"R Guidotti","year":"2018","unstructured":"Guidotti, R., Monreale, A., Ruggieri, S., Turini, F., Giannotti, F., Pedreschi, D.: A survey of methods for explaining black box models. ACM Comput. Surv. (CSUR) 51(5), 1\u201342 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Guo, W., Mu, D., Xu, J., Su, P., Wang, G., Xing, X.: LEMNA: explaining deep learning based security applications. In: proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 364\u2013379 (2018)","DOI":"10.1145\/3243734.3243792"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Jerbi, M., Chelly Dagdia, Z., Bechikh, S., Ben Said, L.: Android malware detection as a bi-level problem. Comput. Secur. 121, 102825 (2022)","DOI":"10.1016\/j.cose.2022.102825"},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1016\/j.procs.2021.03.118","volume":"184","author":"M Kinkead","year":"2021","unstructured":"Kinkead, M., Millar, S., McLaughlin, N., O\u2019Kane, P.: Towards explainable CNNs for Android malware detection. Procedia Comput. Sci. 184, 959\u2013965 (2021)","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"1_CR19","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/TR.2018.2865733","volume":"68","author":"P Kong","year":"2018","unstructured":"Kong, P., Li, L., Gao, J., Liu, K., Bissyand\u00e9, T.F., Klein, J.: Automated testing of Android apps: a systematic literature review. IEEE Trans. Reliab. 68(1), 45\u201366 (2018)","journal-title":"IEEE Trans. Reliab."},{"key":"1_CR20","first-page":"271","volume":"101","author":"MB Kursa","year":"2010","unstructured":"Kursa, M.B., Jankowski, A., Rudnicki, W.R.: Boruta - a system for feature selection. Fund. Inform. 101, 271\u2013285 (2010)","journal-title":"Fund. Inform."},{"issue":"3","key":"1_CR21","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/3236386.3241340","volume":"16","author":"ZC Lipton","year":"2018","unstructured":"Lipton, Z.C.: The mythos of model interpretability: in machine learning, the concept of interpretability is both important and slippery. Queue 16(3), 31\u201357 (2018)","journal-title":"Queue"},{"key":"1_CR22","doi-asserted-by":"publisher","first-page":"124579","DOI":"10.1109\/ACCESS.2020.3006143","volume":"8","author":"K Liu","year":"2020","unstructured":"Liu, K., Xu, S., Xu, G., Zhang, M., Sun, D., Liu, H.: A review of Android malware detection approaches based on machine learning. IEEE Access 8, 124579\u2013124607 (2020)","journal-title":"IEEE Access"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Lu, Z., Thing, V.L.: PhilaeX: explaining the failure and success of AI models in malware detection. arXiv preprint arXiv:2207.00740 (2022)","DOI":"10.5220\/0010986700003194"},{"key":"1_CR24","unstructured":"Lundberg, S.M., Lee, S.I.: A unified approach to interpreting model predictions. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"1_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10922-021-09634-4","volume":"30","author":"S Mahdavifar","year":"2022","unstructured":"Mahdavifar, S., Alhadidi, D., Ghorbani, A.A.: Effective and efficient hybrid Android malware classification using pseudo-label stacked auto-encoder. J. Netw. Syst. Manage. 30, 1\u201334 (2022)","journal-title":"J. Netw. Syst. Manage."},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Mahdavifar, S., Kadir, A.F.A., Fatemi, R., Alhadidi, D., Ghorbani, A.A.: Dynamic Android malware category classification using semi-supervised deep learning. In: 2020 IEEE International Conference on Dependable, Autonomic and Secure Computing(DASC\/PiCom\/CBDCom\/CyberSciTech), pp. 515\u2013522. IEEE (2020)","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00094"},{"issue":"1","key":"1_CR27","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/s11036-019-01248-0","volume":"25","author":"A Mehtab","year":"2020","unstructured":"Mehtab, A., et al.: AdDroid: rule-based machine learning framework for Android malware analysis. Mob. Netw. Appl. 25(1), 180\u2013192 (2020)","journal-title":"Mob. Netw. Appl."},{"key":"1_CR28","doi-asserted-by":"publisher","unstructured":"Melis, M., Maiorca, D., Biggio, B., Giacinto, G., Roli, F.: Explaining black-box Android malware detection. In: 2018 26th European Signal Processing Conference (EUSIPCO), pp. 524\u2013528 (2018). https:\/\/doi.org\/10.23919\/EUSIPCO.2018.8553598","DOI":"10.23919\/EUSIPCO.2018.8553598"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Morcos, M., Al Hamadi, H., Damiani, E., Nandyala, S., McGillion, B.: A surrogate-based technique for Android malware detectors\u2019 explainability. In: 2022 18th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 112\u2013117. IEEE (2022)","DOI":"10.1109\/WiMob55322.2022.9941515"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Nadeem, A., et al.: SoK: explainable machine learning for computer security applications. arXiv preprint arXiv:2208.10605 (2022)","DOI":"10.1109\/EuroSP57164.2023.00022"},{"issue":"3","key":"1_CR31","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/TETCI.2017.2699220","volume":"1","author":"A Narayanan","year":"2017","unstructured":"Narayanan, A., Chandramohan, M., Chen, L., Liu, Y.: Context-aware, adaptive, and scalable Android malware detection through online learning. IEEE Trans. Emerg. Top. Comput. Intell. 1(3), 157\u2013175 (2017)","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"1_CR32","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/978-3-030-01535-0_19","volume-title":"Applied Informatics","author":"M Odusami","year":"2018","unstructured":"Odusami, M., Abayomi-Alli, O., Misra, S., Shobayo, O., Damasevicius, R., Maskeliunas, R.: Android malware detection: a survey. In: Florez, H., Diaz, C., Chavarriaga, J. (eds.) ICAI 2018. CCIS, vol. 942, pp. 255\u2013266. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01535-0_19"},{"issue":"6","key":"1_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3417978","volume":"53","author":"J Qiu","year":"2020","unstructured":"Qiu, J., Zhang, J., Luo, W., Pan, L., Nepal, S., Xiang, Y.: A survey of Android malware detection with deep neural models. ACM Comput. Surv. (CSUR) 53(6), 1\u201336 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: \u201cWhy should I trust you?\u201d Explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1135\u20131144 (2016)","DOI":"10.1145\/2939672.2939778"},{"key":"1_CR35","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: Anchors: high-precision model-agnostic explanations. In: Proceedings of the AAAI Conference on Artificial Intelligence (2018)","DOI":"10.1609\/aaai.v32i1.11491"},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"Shams, Z., et al.: REM: an integrative rule extraction methodology for explainable data analysis in healthcare. medRxiv (2021)","DOI":"10.1101\/2021.01.25.21250459"},{"key":"1_CR37","unstructured":"Srivastava, G., et al.: XAI for cybersecurity: state of the art, challenges, open issues and future directions. arXiv preprint arXiv:2206.03585 (2022)"},{"key":"1_CR38","doi-asserted-by":"crossref","unstructured":"Tam, K., Fattori, A., Khan, S., Cavallaro, L.: CopperDroid: automatic reconstruction of android malware behaviors. In: NDSS Symposium 2015, pp. 1\u201315 (2015)","DOI":"10.14722\/ndss.2015.23145"},{"issue":"4","key":"1_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3017427","volume":"49","author":"K Tam","year":"2017","unstructured":"Tam, K., Feizollah, A., Anuar, N.B., Salleh, R., Cavallaro, L.: The evolution of Android malware and Android analysis techniques. ACM Comput. Surv. (CSUR) 49(4), 1\u201341 (2017)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"1_CR40","unstructured":"Wang, S., et al.: TrafficAV: an effective and explainable detection of mobile malware behavior using network traffic. In: Proceedings of 24th International Symposium on Quality of Service (IWQoS) (2016)"},{"key":"1_CR41","doi-asserted-by":"crossref","unstructured":"Warnecke, A., Arp, D., Wressnegger, C., Rieck, K.: Evaluating explanation methods for deep learning in security. In: Proceedings of European Symposium on Security and Privacy (EuroS&P), pp. 158\u2013174. IEEE (2020)","DOI":"10.1109\/EuroSP48549.2020.00018"},{"issue":"2","key":"1_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3423096","volume":"30","author":"B Wu","year":"2021","unstructured":"Wu, B., Chen, S., Gao, C., Fan, L., Liu, Y., Wen, W., Lyu, M.R.: Why an Android app is classified as malware: toward malware classification interpretation. ACM Trans. Softw. Eng. Methodol. (TOSEM) 30(2), 1\u201329 (2021)","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"1_CR43","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1007\/978-3-030-32236-6_51","volume-title":"Natural Language Processing and Chinese Computing","author":"F Xu","year":"2019","unstructured":"Xu, F., Uszkoreit, H., Du, Y., Fan, W., Zhao, D., Zhu, J.: Explainable AI: a brief survey on history, research areas, approaches and challenges. In: Tang, J., Kan, M.-Y., Zhao, D., Li, S., Zan, H. (eds.) NLPCC 2019. LNCS (LNAI), vol. 11839, pp. 563\u2013574. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32236-6_51"},{"issue":"12","key":"1_CR44","doi-asserted-by":"publisher","first-page":"12305","DOI":"10.1002\/int.23088","volume":"37","author":"F Yan","year":"2022","unstructured":"Yan, F., Wen, S., Nepal, S., Paris, C., Xiang, Y.: Explainable machine learning in cybersecurity: a survey. Int. J. Intell. Syst. 37(12), 12305\u201312334 (2022)","journal-title":"Int. J. Intell. Syst."},{"key":"1_CR45","unstructured":"Zarlenga, M.E., Shams, Z., Jamnik, M.: Efficient decompositional rule extraction for deep neural networks. arXiv preprint arXiv:2111.12628 (2021)"},{"key":"1_CR46","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Hamadi, H.A., Damiani, E., Yeun, C.Y., Taher, F.: Explainable artificial intelligence applications in cyber security: state-of-the-art in research. arXiv preprint arXiv:2208.14937 (2022)","DOI":"10.1109\/ACCESS.2022.3204051"},{"key":"1_CR47","doi-asserted-by":"publisher","unstructured":"Zhu, D., Xi, T., Jing, P., Wu, D., Xia, Q., Zhang, Y.: A transparent and multimodal malware detection method for Android apps. In: Proceedings of the 22nd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM), New York, NY, USA, pp. 51\u201360. ACM (2019). https:\/\/doi.org\/10.1145\/3345768.3355915","DOI":"10.1145\/3345768.3355915"},{"key":"1_CR48","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-319-46307-0_29","volume-title":"Discovery Science","author":"JR Zilke","year":"2016","unstructured":"Zilke, J.R., Loza Menc\u00eda, E., Janssen, F.: DeepRED \u2013 rule extraction from deep neural networks. In: Calders, T., Ceci, M., Malerba, D. (eds.) DS 2016. LNCS (LNAI), vol. 9956, pp. 457\u2013473. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46307-0_29"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-39828-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,12]],"date-time":"2023-08-12T16:02:10Z","timestamp":1691856130000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-39828-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031398278","9783031398285"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-39828-5_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"7 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canterbury","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nss-socialsec2023.cyber.kent.ac.uk\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}