{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T00:48:26Z","timestamp":1775263706467,"version":"3.50.1"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031514784","type":"print"},{"value":"9783031514791","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-51479-1_10","type":"book-chapter","created":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T07:02:33Z","timestamp":1704956553000},"page":"183-202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Hiding Your Signals: A Security Analysis of\u00a0PPG-Based Biometric Authentication"],"prefix":"10.1007","author":[{"given":"Lin","family":"Li","sequence":"first","affiliation":[]},{"given":"Chao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Yonghang","family":"Tai","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,12]]},"reference":[{"issue":"6","key":"10_CR1","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/s10877-007-9097-5","volume":"21","author":"AA Awad","year":"2007","unstructured":"Awad, A.A., et al.: The relationship between the photoplethysmographic waveform and systemic vascular resistance. J. Clin. Monit. Comput. 21(6), 365\u2013372 (2007)","journal-title":"J. Clin. Monit. Comput."},{"key":"10_CR2","unstructured":"Bazarevsky, V., Kartynnik, Y., Vakunov, A., Raveendran, K., Grundmann, M.: Blazeface: sub-millisecond neural face detection on mobile gpus. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2019)"},{"issue":"2","key":"10_CR3","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1109\/TBCAS.2019.2892297","volume":"13","author":"D Biswas","year":"2019","unstructured":"Biswas, D., et al.: CorNET: deep learning framework for PPG-based heart rate estimation and biometric identification in ambulant environment. IEEE Trans. Biomed. Circuits Syst. 13(2), 282\u2013291 (2019)","journal-title":"IEEE Trans. Biomed. Circuits Syst."},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.patrec.2017.10.017","volume":"124","author":"S Bobbia","year":"2019","unstructured":"Bobbia, S., Macwan, R., Benezeth, Y., Mansouri, A., Dubois, J.: Unsupervised skin tissue segmentation for remote photoplethysmography. Pattern Recogn. Lett. 124, 82\u201390 (2019)","journal-title":"Pattern Recogn. Lett."},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"216083","DOI":"10.1109\/ACCESS.2020.3040936","volume":"8","author":"G Boccignone","year":"2020","unstructured":"Boccignone, G., Conte, D., Cuculo, V., D\u2019Amelio, A., Grossi, G., Lanzarotti, R.: An open framework for remote-PPG methods and their assessment. IEEE Access 8, 216083\u2013216103 (2020)","journal-title":"IEEE Access"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-319-24018-3_3","volume-title":"Information Security Theory and Practice","author":"A Calleja","year":"2015","unstructured":"Calleja, A., Peris-Lopez, P., Tapiador, J.E.: Electrical heart signals can be monitored from the moon: security implications for IPI-based protocols. In: Akram, R.N., Jajodia, S. (eds.) WISTP 2015. LNCS, vol. 9311, pp. 36\u201351. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24018-3_3"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/978-3-030-01216-8_22","volume-title":"Computer Vision \u2013 ECCV 2018","author":"W Chen","year":"2018","unstructured":"Chen, W., McDuff, D.: DeepPhys: video-based physiological measurement using convolutional attention networks. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11206, pp. 356\u2013373. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01216-8_22"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Chen, W., Picard, R.W.: Eliminating physiological information from facial videos. In: Proceedings of the IEEE International Conference on Automatic Face & Gesture Recognition, pp. 48\u201355 (2017)","DOI":"10.1109\/FG.2017.15"},{"issue":"2","key":"10_CR9","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1109\/TDSC.2019.2921773","volume":"18","author":"H Chizari","year":"2019","unstructured":"Chizari, H., Lupu, E.: Extracting randomness from the trend of IPI for cryptographic operations in implantable medical devices. IEEE Trans. Dependable Secure Comput. 18(2), 875\u2013888 (2019)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"10_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41746-020-00373-5","volume":"4","author":"A Dasari","year":"2021","unstructured":"Dasari, A., Prakash, S.K.A., Jeni, L.A., Tucker, C.S.: Evaluation of biases in remote photoplethysmography methods. NPJ Dig. Med. 4(1), 1\u201313 (2021)","journal-title":"NPJ Dig. Med."},{"issue":"10","key":"10_CR11","doi-asserted-by":"publisher","first-page":"2878","DOI":"10.1109\/TBME.2013.2266196","volume":"60","author":"G De Haan","year":"2013","unstructured":"De Haan, G., Jeanne, V.: Robust pulse rate from chrominance-based rPPG. IEEE Trans. Biomed. Eng. 60(10), 2878\u20132886 (2013)","journal-title":"IEEE Trans. Biomed. Eng."},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-030-68793-9_17","volume-title":"Pattern Recognition. ICPR International Workshops and Challenges","author":"R Donida Labati","year":"2021","unstructured":"Donida Labati, R., Piuri, V., Rundo, F., Scotti, F., Spampinato, C.: Biometric recognition of PPG cardiac signals using transformed spectrogram images. In: Del Bimbo, A., Cucchiara, R., Sclaroff, S., Farinella, G.M., Mei, T., Bertini, M., Escalante, H.J., Vezzani, R. (eds.) ICPR 2021. LNCS, vol. 12668, pp. 244\u2013257. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68793-9_17"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Gideon, J., Stent, S.: The way to my heart is through contrastive learning: Remote photoplethysmography from unlabelled video. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 3995\u20134004 (2021)","DOI":"10.1109\/ICCV48922.2021.00396"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Gu, Y., Zhang, Y., Zhang, Y.: A novel biometric approach in human verification by photoplethysmographic signals. In: Proceedings of the International IEEE EMBS Special Topic Conference on Information Technology Applications in Biomedicine, pp. 13\u201314 (2003)","DOI":"10.1109\/ITAB.2003.1222403"},{"key":"10_CR15","unstructured":"Heusch, G., Anjos, A., Marcel, S.: A reproducible study on remote heart rate measurement. arXiv preprint arXiv:1709.00962 (2017)"},{"key":"10_CR16","doi-asserted-by":"publisher","first-page":"101","DOI":"10.14326\/abe.10.101","volume":"10","author":"S Hinatsu","year":"2021","unstructured":"Hinatsu, S., Suzuki, D., Ishizuka, H., Ikeda, S., Oshiro, O.: Basic study on presentation attacks against biometric authentication using photoplethysmogram. Adv. Biomed. Eng. 10, 101\u2013112 (2021)","journal-title":"Adv. Biomed. Eng."},{"key":"10_CR17","first-page":"1","volume":"70","author":"M Hu","year":"2021","unstructured":"Hu, M., Qian, F., Guo, D., Wang, X., He, L., Ren, F.: ETA-rPPGNet: effective time-domain attention network for remote heart rate measurement. IEEE Trans. Instrum. Meas. 70, 1\u201312 (2021)","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1109\/TIFS.2020.3006384","volume":"16","author":"Y Huang","year":"2021","unstructured":"Huang, Y., Yang, G., Wang, K., Liu, H., Yin, Y.: Learning joint and specific patterns: a unified sparse representation for off-the-person ECG biometric recognition. IEEE Trans. Inf. Forensics Secur. 16, 147\u2013160 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"5124","DOI":"10.1109\/TIFS.2021.3122817","volume":"16","author":"DY Hwang","year":"2021","unstructured":"Hwang, D.Y., Taha, B., Hatzinakos, D.: PBGAN: learning PPG representations from GAN for time-stable and unique verification system. IEEE Trans. Inf. Forensics Secur. 16, 5124\u20135137 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR20","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/TIFS.2020.3006313","volume":"16","author":"DY Hwang","year":"2021","unstructured":"Hwang, D.Y., Taha, B., Lee, D.S., Hatzinakos, D.: Evaluation of the time stability and uniqueness in PPG-based biometric system. IEEE Trans. Inf. Forensics Secur. 16, 116\u2013130 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Karimian, N.: How to attack PPG biometric using adversarial machine learning. In: Proceedings of the Autonomous Systems: Sensors, Processing, and Security for Vehicles and Infrastructure. International Society for Optics and Photonics (2019)","DOI":"10.1117\/12.2518828"},{"key":"10_CR22","unstructured":"Kartynnik, Y., Ablavatski, A., Grishchenko, I., Grundmann, M.: Real-time facial surface geometry from monocular video on mobile GPUs. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2019)"},{"key":"10_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compbiomed.2014.03.005","volume":"49","author":"AR Kavsao\u011flu","year":"2014","unstructured":"Kavsao\u011flu, A.R., Polat, K., Bozkurt, M.R.: A novel feature ranking algorithm for biometric recognition with PPG signals. Comput. Biol. Med. 49, 1\u201314 (2014)","journal-title":"Comput. Biol. Med."},{"key":"10_CR24","unstructured":"Kolkur, S., Kalbande, D., Shimpi, P., Bapat, C., Jatakia, J.: Human skin detection using RGB, HSV and YCbCr color models. In: Proceedings of the International Conference on Communication and Signal Processing, pp. 324\u2013332. Atlantis Press (2016)"},{"key":"10_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/978-3-030-58583-9_24","volume-title":"Computer Vision \u2013 ECCV 2020","author":"E Lee","year":"2020","unstructured":"Lee, E., Chen, E., Lee, C.-Y.: Meta-rPPG: remote heart rate estimation using a transductive meta-learner. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12372, pp. 392\u2013409. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58583-9_24"},{"key":"10_CR26","unstructured":"Lewandowska, M., Rumi\u0144ski, J., Kocejko, T., Nowak, J.: Measuring pulse rate with a webcam \u2013 a non-contact method for evaluating cardiac activity. In: Proceedings of the Federated Conference on Computer Science and Information Systems, pp. 405\u2013410. IEEE (2011)"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Li, J., Fawaz, K., Kim, Y.: Velody: nonlinear vibration challenge-response for resilient user authentication. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1201\u20131213 (2019)","DOI":"10.1145\/3319535.3354242"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Li, L., Chen, C., Pan, L., Zhang, J., Xiang, Y.: Video is all you need: Attacking PPG-based biometric authentication. In: Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security. AISec 2022, pp. 57\u201366, New York, NY, USA. Association for Computing Machinery(2022)","DOI":"10.1145\/3560830.3563722"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Lin, Q., et al.: H2B: heartbeat-based secret key generation using piezo vibration sensors. In: Proceedings of the International Conference on Information Processing in Sensor Networks, pp. 265\u2013276 (2019)","DOI":"10.1145\/3302506.3310406"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Marin, E., Argones R\u00faa, E., Singel\u00e9e, D., Preneel, B.: On the difficulty of using patient\u2019s physiological signals in cryptographic protocols. In: Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, pp. 113\u2013122 (2019)","DOI":"10.1145\/3322431.3325099"},{"issue":"3","key":"10_CR31","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1109\/TBME.2003.808805","volume":"50","author":"PE McSharry","year":"2003","unstructured":"McSharry, P.E., Clifford, G.D., Tarassenko, L., Smith, L.A.: A dynamical model for generating synthetic electrocardiogram signals. IEEE Trans. Biomed. Eng. 50(3), 289\u2013294 (2003)","journal-title":"IEEE Trans. Biomed. Eng."},{"key":"10_CR32","first-page":"622","volume":"14","author":"R Meziatisabour","year":"2021","unstructured":"Meziatisabour, R., Benezeth, Y., De Oliveira, P., Chappe, J., Yang, F.: UBFC-Phys: a multimodal database for psychophysiological studies of social stress. IEEE Trans. Affect. Comput. 14, 622\u2013636 (2021)","journal-title":"IEEE Trans. Affect. Comput."},{"issue":"4","key":"10_CR33","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1042\/cs1030371","volume":"103","author":"SC Millasseau","year":"2002","unstructured":"Millasseau, S.C., Kelly, R., Ritter, J., Chowienczyk, P.: Determination of age-related increases in large artery stiffness by digital pulse contour analysis. Clin. Sci. 103(4), 371\u2013377 (2002)","journal-title":"Clin. Sci."},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Pilz, C.S., Zaunseder, S., Krajewski, J., Blazek, V.: Local group invariance for heart rate estimation from face videos in the wild. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1254\u20131262 (2018)","DOI":"10.1109\/CVPRW.2018.00172"},{"issue":"10","key":"10_CR35","doi-asserted-by":"publisher","first-page":"10762","DOI":"10.1364\/OE.18.010762","volume":"18","author":"MZ Poh","year":"2010","unstructured":"Poh, M.Z., McDuff, D.J., Picard, R.W.: Non-contact, automated cardiac pulse measurements using video imaging and blind source separation. Opt. Express 18(10), 10762\u201310774 (2010)","journal-title":"Opt. Express"},{"key":"10_CR36","doi-asserted-by":"crossref","unstructured":"Rostami, M., Juels, A., Koushanfar, F.: Heart-to-heart (H2H) authentication for implanted medical devices. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1099\u20131112 (2013)","DOI":"10.1145\/2508859.2516658"},{"issue":"3","key":"10_CR37","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/JBHI.2017.2691282","volume":"22","author":"RM Seepers","year":"2018","unstructured":"Seepers, R.M., Wang, W., de Haan, G., Sourdis, I., Strydis, C.: Attacks on heartbeat-based security using remote photoplethysmography. IEEE J. Biomed. Health Inform. 22(3), 714\u2013721 (2018)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"10_CR38","doi-asserted-by":"crossref","unstructured":"Stricker, R., M\u00fcller, S., Gross, H.M.: Non-contact video-based pulse rate measurement on a mobile service robot. In: Proceedings of the IEEE International Symposium on Robot and Human Interactive Communication, pp. 1056\u20131062. IEEE (2014)","DOI":"10.1109\/ROMAN.2014.6926392"},{"issue":"2","key":"10_CR39","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1161\/01.HYP.32.2.365","volume":"32","author":"K Takazawa","year":"1998","unstructured":"Takazawa, K., et al.: Assessment of vasoactive agents and vascular aging by the second derivative of photoplethysmogram waveform. Hypertension 32(2), 365\u2013370 (1998)","journal-title":"Hypertension"},{"issue":"2","key":"10_CR40","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1109\/10.979357","volume":"49","author":"MP Tarvainen","year":"2002","unstructured":"Tarvainen, M.P., Ranta-Aho, P.O., Karjalainen, P.A.: An advanced detrending method with application to HRV analysis. IEEE Trans. Biomed. Eng. 49(2), 172\u2013175 (2002)","journal-title":"IEEE Trans. Biomed. Eng."},{"issue":"26","key":"10_CR41","doi-asserted-by":"publisher","first-page":"21434","DOI":"10.1364\/OE.16.021434","volume":"16","author":"W Verkruysse","year":"2008","unstructured":"Verkruysse, W., Svaasand, L.O., Nelson, J.S.: Remote plethysmographic imaging using ambient light. Opt. Express 16(26), 21434\u201321445 (2008)","journal-title":"Opt. Express"},{"key":"10_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107381","volume":"105","author":"M Wang","year":"2020","unstructured":"Wang, M., Hu, J., Abbass, H.A.: BrainPrint: EEG biometric identification based on analyzing brain connectivity graphs. Pattern Recogn. 105, 107381 (2020)","journal-title":"Pattern Recogn."},{"issue":"7","key":"10_CR43","doi-asserted-by":"publisher","first-page":"1479","DOI":"10.1109\/TBME.2016.2609282","volume":"64","author":"W Wang","year":"2016","unstructured":"Wang, W., Den Brinker, A.C., Stuijk, S., De Haan, G.: Algorithmic principles of remote PPG. IEEE Trans. Biomed. Eng. 64(7), 1479\u20131491 (2016)","journal-title":"IEEE Trans. Biomed. Eng."},{"key":"10_CR44","doi-asserted-by":"crossref","unstructured":"Xu, F., Qin, Z., Tan, C.C., Wang, B., Li, Q.: Imdguard: Securing implantable medical devices with the external wearable guardian. In: Proceedings of the Annual IEEE International Conference on Computer Communications (INFOCOM), pp. 1862\u20131870. IEEE (2011)","DOI":"10.1109\/INFCOM.2011.5934987"},{"key":"10_CR45","doi-asserted-by":"crossref","unstructured":"Yadav, U., Abbas, S.N., Hatzinakos, D.: Evaluation of PPG biometrics for authentication in different states. In: Proceedings of the International Conference on Biometric, pp. 277\u2013282 (2018)","DOI":"10.1109\/ICB2018.2018.00049"},{"key":"10_CR46","doi-asserted-by":"crossref","unstructured":"Yu, Z., Peng, W., Li, X., Hong, X., Zhao, G.: Remote heart rate measurement from highly compressed facial videos: an end-to-end deep learning solution with video enhancement. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 151\u2013160 (2019)","DOI":"10.1109\/ICCV.2019.00024"},{"key":"10_CR47","unstructured":"Zhang, J., Zheng, Y., Xu, W., Chen, Y.: H2K: a heartbeat-based key generation framework for ECG and PPG signals. IEEE Trans. Mob. Comput. (2021)"},{"issue":"10","key":"10_CR48","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang, K., Zhang, Z., Li, Z., Qiao, Y.: Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process. Lett. 23(10), 1499\u20131503 (2016)","journal-title":"IEEE Signal Process. Lett."},{"key":"10_CR49","doi-asserted-by":"crossref","unstructured":"Zhao, T., Wang, Y., Liu, J., Chen, Y., Cheng, J., Yu, J.: Trueheart: continuous authentication on wrist-worn wearables using PPG-based biometrics. In: Proceedings of the Annual IEEE International Conference on Computer Communications (INFOCOM), pp. 30\u201339. IEEE (2020)","DOI":"10.1109\/INFOCOM41043.2020.9155526"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-51479-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T21:46:07Z","timestamp":1731015967000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-51479-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031514784","9783031514791"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-51479-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"12 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Hague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"478","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"93","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}