{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:50:03Z","timestamp":1749703803042,"version":"3.40.3"},"publisher-location":"Cham","reference-count":47,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031459320"},{"type":"electronic","value":"9783031459337"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-45933-7_6","type":"book-chapter","created":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T09:02:37Z","timestamp":1700470957000},"page":"97-114","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Graphical Password Scheme Based on\u00a0Rounded Image Selection"],"prefix":"10.1007","author":[{"given":"Xinyuan","family":"Qin","sequence":"first","affiliation":[]},{"given":"Wenjuan","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"6_CR1","unstructured":"Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. In: Proceedings of the 4th USENIX Conference on Offensive Technologies, pp. 1\u20137, USENIX Association (2010)"},{"issue":"4","key":"6_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2333112.2333114","volume":"44","author":"R Biddle","year":"2012","unstructured":"Biddle, R., Chiasson, S., Van Oorschot, P.: Graphical passwords: learning from the first twelve years. ACM Comput. Surv. 44(4), 1\u201341 (2012)","journal-title":"ACM Comput. Surv."},{"issue":"2","key":"6_CR3","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TDSC.2011.55","volume":"9","author":"S Chiasson","year":"2012","unstructured":"Chiasson, S., Stobert, E., Forget, A., Biddle, R.: Persuasive cued click-points: design, implementation, and evaluation of a knowledge-based authentication mechanism. IEEE Trans. Dependable Secure Comput. 9(2), 222\u2013235 (2012)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.cose.2019.03.019","volume":"84","author":"N Chakraborty","year":"2019","unstructured":"Chakraborty, N., Anand, S.V., Mondal, S.: Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services. Comput. Secur. 84, 193\u2013205 (2019)","journal-title":"Comput. Secur."},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Dirik, A.E., Memon, N., Birget, J.C.: Modeling user choice in the passpoints graphical password scheme. In: Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS), New York, NY, USA, pp. 20\u201328. ACM (2007)","DOI":"10.1145\/1280680.1280684"},{"key":"6_CR6","unstructured":"Dhamija, R., Perrig, A.: Deja Vu: a user study using images for authentication. In: Proceedings of the 9th USENIX Security Symposium (2000)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Dunphy, P., Yan, J.: Do background images improve \u201cdraw a secret\u201d graphical passwords? In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), pp. 36\u201347 (2007)","DOI":"10.1145\/1315245.1315252"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-540-74835-9_23","volume-title":"Computer Security \u2013 ESORICS 2007","author":"K Go\u0142ofit","year":"2007","unstructured":"Go\u0142ofit, K.: Click passwords under investigation. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 343\u2013358. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74835-9_23"},{"key":"6_CR9","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The design and analysis of graphical passwords. In: Proceedings of the 8th Conference on USENIX Security Symposium, pp. 1\u201314. USENIX Association, Berkeley (1999)"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-030-30619-9_11","volume-title":"Machine Learning for Cyber Security","author":"W Li","year":"2019","unstructured":"Li, W., Tan, J., Meng, W., Wang, Yu., Li, J.: SwipeVLock: a supervised unlocking mechanism based on swipe behavior on smartphones. In: Chen, X., Huang, X., Zhang, J. (eds.) ML4CS 2019. LNCS, vol. 11806, pp. 140\u2013153. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30619-9_11"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"102687","DOI":"10.1016\/j.jnca.2020.102687","volume":"165","author":"W Li","year":"2020","unstructured":"Li, W., Tan, J., Meng, W., Wang, Y.: A swipe-based unlocking mechanism with supervised learning on smartphones: design and evaluation. J. Netw. Comput. Appl. 165, 102687 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.patrec.2021.01.019","volume":"144","author":"W Li","year":"2021","unstructured":"Li, W., Meng, W., Furnell, S.: Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities. Pattern Recognit. Lett. 144, 35\u201341 (2021)","journal-title":"Pattern Recognit. Lett."},{"issue":"1","key":"6_CR13","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/s11036-021-01842-1","volume":"27","author":"W Li","year":"2022","unstructured":"Li, W., Wang, Y., Tan, J., Zhu, N.: DCUS: evaluating double-click-based unlocking scheme on smartphones. Mob. Netw. Appl. 27(1), 382\u2013391 (2022)","journal-title":"Mob. Netw. Appl."},{"key":"6_CR14","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/978-3-031-06975-8_24","volume-title":"ICT Systems Security and Privacy Protection","author":"W Li","year":"2022","unstructured":"Li, W., Tan, J., Zhu, N.: Double-X: towards double-cross-based unlock mechanism on smartphones. In: Meng, W., Fischer-H\u00fcbner, S., Jensen, C.D. (eds.) SEC 2022. IFIP Advances in Information and Communication Technology, vol. 648, pp. 412-C428. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-06975-8_24"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Li, W., Gleerup, T., Tan, J., Wang, Y.: A security enhanced android unlock scheme based on pinch-to-zoom for smart devices. IEEE Trans. Consum. Electron. (2023)","DOI":"10.1109\/TCE.2023.3280064"},{"key":"6_CR16","doi-asserted-by":"publisher","unstructured":"Meng, W.: Graphical authentication. In: Jajodia, S., Samarati, P., Yung, M. (eds.) Encyclopedia of Cryptography, Security and Privacy, pp. 1\u20134. Springer, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-642-27739-9_1581-1","DOI":"10.1007\/978-3-642-27739-9_1581-1"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Meng, Y.: Designing click-draw based graphical password scheme for better authentication. In: Proceedings of the 7th IEEE International Conference on Networking, Architecture, and Storage (NAS), pp. 39\u201348 (2012)","DOI":"10.1109\/NAS.2012.9"},{"key":"6_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-642-34129-8_32","volume-title":"Information and Communications Security","author":"Y Meng","year":"2012","unstructured":"Meng, Y., Li, W.: Evaluating the effect of tolerance on click-draw based graphical password scheme. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 349\u2013356. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34129-8_32"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Meng, Y., Li, W.: Evaluating the effect of user guidelines on creating click-draw based graphical passwords. In: Proceedings of the 2012 ACM Research in Applied Computation Symposium (RACS), pp. 322\u2013327 (2012)","DOI":"10.1145\/2401603.2401673"},{"key":"6_CR20","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-39218-4_5","volume-title":"Security and Privacy Protection in Information Processing Systems","author":"Y Meng","year":"2013","unstructured":"Meng, Y., Li, W., Kwok, L.-F.: Enhancing click-draw based graphical passwords using multi-touch on mobile phones. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.) SEC 2013. IAICT, vol. 405, pp. 55\u201368. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39218-4_5"},{"issue":"3","key":"6_CR21","doi-asserted-by":"publisher","first-page":"1268","DOI":"10.1109\/COMST.2014.2386915","volume":"17","author":"W Meng","year":"2015","unstructured":"Meng, W., Wong, D.S., Furnell, S., Zhou, J.: Surveying the development of biometric user authentication on mobile phones. IEEE Commun. Surv. Tutor. 17(3), 1268\u20131293 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"6_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-319-25645-0_10","volume-title":"Network and System Security","author":"W Meng","year":"2015","unstructured":"Meng, W.: RouteMap: a route and map based graphical password scheme for better multiple password memory. In: NSS 2015. LNCS, vol. 9408, pp. 147\u2013161. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-25645-0_10"},{"issue":"3","key":"6_CR23","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1108\/ICS-12-2014-0078","volume":"24","author":"W Meng","year":"2016","unstructured":"Meng, W.: Evaluating the effect of multi-touch behaviours on android unlock patterns. Inf. Comput. Secur. 24(3), 277\u2013287 (2016)","journal-title":"Inf. Comput. Secur."},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Meng, W., Li, W., Jiang, L., Meng, L.: On multiple password interference of touch screen patterns and text passwords. In: ACM Conference on Human Factors in Computing Systems (CHI 2016), pp. 4818\u20134822 (2016)","DOI":"10.1145\/2858036.2858547"},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1007\/978-3-319-39555-5_34","volume-title":"Applied Cryptography and Network Security","author":"W Meng","year":"2016","unstructured":"Meng, W., Li, W., Wong, D.S., Zhou, J.: TMGuard: a touch movement-based security mechanism for screen unlock patterns on smartphones. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 629\u2013647. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39555-5_34"},{"key":"6_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-319-78556-1_18","volume-title":"Information Security and Cryptology \u2013 ICISC 2017","author":"W Meng","year":"2018","unstructured":"Meng, W., Lee, W.H., Liu, Z., Su, C., Li, Y.: Evaluating the impact of juice filming charging attack in practical environments. In: Kim, H., Kim, D.-C. (eds.) ICISC 2017. LNCS, vol. 10779, pp. 327\u2013338. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78556-1_18"},{"key":"6_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-319-69659-1_16","volume-title":"Information Security","author":"W Meng","year":"2017","unstructured":"Meng, W., Fei, F., Li, W., Au, M.H.: Harvesting smartphone privacy through enhanced juice filming charging attacks. In: Nguyen, P., Zhou, J. (eds.) ISC 2017. LNCS, vol. 10599, pp. 291\u2013308. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69659-1_16"},{"key":"6_CR28","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.cose.2016.11.010","volume":"65","author":"W Meng","year":"2017","unstructured":"Meng, W., Li, W., Kwok, L.-F., Choo, K.-K.R.: Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones. Comput. Secur. 65, 213\u2013229 (2017)","journal-title":"Comput. Secur."},{"key":"6_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-319-61204-1_8","volume-title":"Applied Cryptography and Network Security","author":"W Meng","year":"2017","unstructured":"Meng, W., Li, W., Lee, W.H., Jiang, L., Zhou, J.: A pilot study of multiple password interference between text and map-based passwords. In: Gollmann, D., Miyaji, A., Kikuchi, H. (eds.) ACNS 2017. LNCS, vol. 10355, pp. 145\u2013162. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-61204-1_8"},{"key":"6_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-319-59870-3_17","volume-title":"Information Security and Privacy","author":"W Meng","year":"2017","unstructured":"Meng, W., Lee, W.H., Au, M.H., Liu, Z.: Exploring effect of location number on map-based graphical password authentication. In: Pieprzyk, J., Suriadi, S. (eds.) ACISP 2017. LNCS, vol. 10343, pp. 301\u2013313. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59870-3_17"},{"key":"6_CR31","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.cose.2017.11.012","volume":"76","author":"W Meng","year":"2018","unstructured":"Meng, W., Jiang, L., Wang, Y., Li, J., Zhang, J., Xiang, Y.: JFCGuard: detecting juice filming charging attack via processor usage analysis on smartphones. Comput. Secur. 76, 252\u2013264 (2018)","journal-title":"Comput. Secur."},{"key":"6_CR32","doi-asserted-by":"publisher","first-page":"1018","DOI":"10.1016\/j.future.2019.07.038","volume":"101","author":"W Meng","year":"2019","unstructured":"Meng, W., Zhu, L., Li, W., Han, J., Li, Y.: Enhancing the security of fintech applications with map-based graphical password authentication. Futur. Gener. Comput. Syst. 101, 1018\u20131027 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"6_CR33","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.compeleceng.2019.07.008","volume":"78","author":"W Meng","year":"2019","unstructured":"Meng, W., Jiang, L., Choo, K.K.R., Wang, Y., Jiang, C.: Towards detection of juice filming charging attacks via supervised CPU usage analysis on smartphones. Comput. Electr. Eng. 78, 230\u2013241 (2019)","journal-title":"Comput. Electr. Eng."},{"issue":"5","key":"6_CR34","first-page":"523","volume":"2","author":"DL Nelson","year":"1976","unstructured":"Nelson, D.L., Reed, V.S., Walling, J.R.: Pictorial superiority effect. J. Exp. Psychol.: Hum. Learn. Mem. 2(5), 523\u2013528 (1976)","journal-title":"J. Exp. Psychol.: Hum. Learn. Mem."},{"key":"6_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2018.05.012","volume":"78","author":"D Nyang","year":"2018","unstructured":"Nyang, D., et al.: Two-thumbs-up: physical protection for PIN entry secure against recording attacks. Comput. Secur. 78, 1\u201315 (2018)","journal-title":"Comput. Secur."},{"key":"6_CR36","unstructured":"Passfaces. http:\/\/www.realuser.com\/"},{"issue":"1","key":"6_CR37","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/S0022-5371(67)80067-7","volume":"6","author":"RN Shepard","year":"1967","unstructured":"Shepard, R.N.: Recognition memory for words, sentences, and pictures. J. Verbal Learn. Verbal Behav. 6(1), 156\u2013163 (1967)","journal-title":"J. Verbal Learn. Verbal Behav."},{"issue":"2","key":"6_CR38","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/TAFFC.2017.2705691","volume":"10","author":"R Setchi","year":"2019","unstructured":"Setchi, R., Asikhia, O.K.: Exploring user experience with image schemas, sentiments, and semantics. IEEE Trans. Affect. Comput. 10(2), 182\u2013195 (2019)","journal-title":"IEEE Trans. Affect. Comput."},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Sun, Y., Meng, W., Li, W.: Designing in-air hand gesture-based user authentication system via convex hull. In: Proceedings of The 19th Annual International Conference on Privacy, Security and Trust (PST), pp. 1\u20135. IEEE (2022)","DOI":"10.1109\/PST55820.2022.9851982"},{"key":"6_CR40","unstructured":"Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: a survey. In: Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC), pp. 463\u2013472. IEEE Computer Society, USA (2005)"},{"key":"6_CR41","doi-asserted-by":"crossref","unstructured":"Sun, H., Chen, Y., Fang, C., Chang, S.: PassMap: a map based graphical-password authentication system. In: Proceedings of AsiaCCS, pp. 99\u2013100 (2012)","DOI":"10.1145\/2414456.2414513"},{"issue":"7","key":"6_CR42","first-page":"273","volume":"2","author":"H Tao","year":"2008","unstructured":"Tao, H., Adams, C.: Pass-go: a proposal to improve the usability of graphical passwords. Int. J. Netw. Secur. 2(7), 273\u2013292 (2008)","journal-title":"Int. J. Netw. Secur."},{"key":"6_CR43","doi-asserted-by":"crossref","unstructured":"Wang, L., Meng, W., Li, W.: Towards DTW-based unlock scheme using handwritten graphics on smartphones. In: The 17th International Conference on Mobility, Sensing and Networking (IEEE MSN), pp. 486\u2013493 (2021)","DOI":"10.1109\/MSN53354.2021.00078"},{"issue":"1\u20132","key":"6_CR44","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ijhcs.2005.04.010","volume":"63","author":"S Wiedenbeck","year":"2005","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., Memon, N.: Passpoints: design and longitudinal evaluation of a graphical password system. Int. J. Hum Comput Stud. 63(1\u20132), 102\u2013127 (2005)","journal-title":"Int. J. Hum Comput Stud."},{"key":"6_CR45","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MSP.2004.81","volume":"2","author":"J Yan","year":"2004","unstructured":"Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: empirical results. IEEE Secur. Priv. 2, 25\u201331 (2004)","journal-title":"IEEE Secur. Priv."},{"key":"6_CR46","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.cose.2017.05.006","volume":"70","author":"X Yu","year":"2017","unstructured":"Yu, X., Wang, Z., Li, Y., Li, L., Zhu, W.T., Song, L.: EvoPass: evolvable graphical password against shoulder-surfing attacks. Comput. Secur. 70, 179\u2013198 (2017)","journal-title":"Comput. Secur."},{"key":"6_CR47","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-981-15-0758-8_19","volume-title":"Security and Privacy in Social Networks and Big Data","author":"T Zhou","year":"2019","unstructured":"Zhou, T., Liu, L., Wang, H., Li, W., Jiang, C.: PassGrid: towards graph-supplemented textual shoulder surfing resistant authentication. In: Meng, W., Furnell, S. (eds.) SocialSec 2019. CCIS, vol. 1095, pp. 251\u2013263. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-15-0758-8_19"}],"container-title":["Lecture Notes in Computer Science","Science of Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45933-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T09:03:18Z","timestamp":1700470998000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45933-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031459320","9783031459337"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45933-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"21 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SciSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Science of Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/scisec.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}