{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T22:52:09Z","timestamp":1770331929491,"version":"3.49.0"},"publisher-location":"Cham","reference-count":59,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031514784","type":"print"},{"value":"9783031514791","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-51479-1_9","type":"book-chapter","created":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T07:02:33Z","timestamp":1704956553000},"page":"162-182","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Attacking Logo-Based Phishing Website Detectors with\u00a0Adversarial Perturbations"],"prefix":"10.1007","author":[{"given":"Jehyun","family":"Lee","sequence":"first","affiliation":[]},{"given":"Zhe","family":"Xin","sequence":"additional","affiliation":[]},{"given":"Melanie Ng Pei","family":"See","sequence":"additional","affiliation":[]},{"given":"Kanav","family":"Sabharwal","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Apruzzese","sequence":"additional","affiliation":[]},{"given":"Dinil Mon","family":"Divakaran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,12]]},"reference":[{"key":"9_CR1","unstructured":"Adversarial logos against phishing detection systems: Code repository. https:\/\/github.com\/JehLeeKR\/Adversarial-phishing-logos"},{"key":"9_CR2","unstructured":"APWG: Phishing activity trends report, 4th quarter 2022. https:\/\/docs.apwg.org\/\/reports\/apwg_trends_report_q4_2022.pdf"},{"key":"9_CR3","unstructured":"Browser In The Browser (BITB) Attack. https:\/\/mrd0x.com\/browser-in-the-browser-phishing-attack\/ (2022)"},{"key":"9_CR4","unstructured":"COFENSE: Phishing URLs 4x more likely than attachments to reach users. https:\/\/cofense.com\/blog\/urls-4x-more-likely-than-phishing-attachments-to-reach-users\/ (2023)"},{"key":"9_CR5","unstructured":"Google Safe Browsing. https:\/\/developers.google.com\/safe-browsing\/ (2023)"},{"key":"9_CR6","unstructured":"Phishing attacks jump 61% in 2022. https:\/\/venturebeat.com\/security\/report-phishing-attacks-jump-61-in-2022-with-255m-attacks-detected\/ (2023)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Abdelnabi, S., Krombholz, K., Fritz, M.: VisualphishNet: zero-day phishing website detection by visual similarity. In: Proceedings ACM CCS, pp. 1681\u20131698 (2020)","DOI":"10.1145\/3372297.3417233"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Abu-Nimeh, S., Nappa, D., Wang, X., Nair, S.: A comparison of machine learning techniques for phishing detection. In: Proceedings of the Anti-Phishing Working Groups, 2nd Annual eCrime Researchers Summit. eCrime \u201907 (2007)","DOI":"10.1145\/1299015.1299021"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Afroz, S., Greenstadt, R.: Phishzoo: detecting phishing websites by looking at them. In: IEEE International Conference on Semantic Computing (2011)","DOI":"10.1109\/ICSC.2011.52"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.ijhcs.2015.05.005","volume":"82","author":"M Alsharnouby","year":"2015","unstructured":"Alsharnouby, M., Alaca, F., Chiasson, S.: Why phishing still works: user strategies for combating phishing attacks. Int. J. Hum Comput Stud. 82, 69\u201382 (2015)","journal-title":"Int. J. Hum Comput Stud."},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Apruzzese, G., Anderson, H., Dambra, S., Freeman, D., Pierazzi, F., Roundy, K.: Position:\u201cReal Attackers Don\u2019t Compute Gradients\u201d: Bridging the Gap Between Adversarial ML Research and Practice. In: IEEE Conference on Secure and Trustworthy Machine Learning (2023)","DOI":"10.1109\/SaTML54575.2023.00031"},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"1975","DOI":"10.1109\/TNSM.2020.3031843","volume":"17","author":"G Apruzzese","year":"2020","unstructured":"Apruzzese, G., Andreolini, M., Marchetti, M., Venturi, A., Colajanni, M.: Deep reinforcement adversarial learning against botnet evasion attacks. IEEE Trans. Netw. Serv. Manage. 17, 1975\u20131987 (2020)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Apruzzese, G., Conti, M., Yuan, Y.: SpacePhish: the evasion-space of adversarial attacks against phishing website detectors using machine learning. In: Proceedings ACSAC (2022)","DOI":"10.1145\/3564625.3567980"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Bailey, M., Dittrich, D., Kenneally, E., Maughan, D.: The Menlo Report. IEEE S &P (2012)","DOI":"10.1109\/MSP.2012.52"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-030-01258-8_10","volume-title":"Computer Vision \u2013 ECCV 2018","author":"AN Bhagoji","year":"2018","unstructured":"Bhagoji, A.N., He, W., Li, B., Song, D.: Practical black-box attacks on deep neural networks using efficient query mechanisms. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11216, pp. 158\u2013174. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01258-8_10"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Bhurtel, M., Siwakoti, Y.R., Rawat, D.B.: Phishing attack detection with ML-based siamese empowered ORB logo recognition and IP mapper. In: Proceedings IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (2022)","DOI":"10.1109\/INFOCOMWKSHPS54753.2022.9798203"},{"key":"9_CR17","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.patcog.2018.07.023","volume":"84","author":"B Biggio","year":"2018","unstructured":"Biggio, B., Roli, F.: Wild patterns: ten years after the rise of adversarial machine learning. Pattern Recogn. 84, 317\u2013331 (2018)","journal-title":"Pattern Recogn."},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Bitaab, M., et al.: Scam pandemic: how attackers exploit public fear through phishing. In: Proceedings APWG Symposium on Electronic Crime Research (eCrime), pp. 1\u201310. IEEE (2020)","DOI":"10.1109\/eCrime51433.2020.9493260"},{"key":"9_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101855","volume":"95","author":"AS Bozkir","year":"2020","unstructured":"Bozkir, A.S., Aydos, M.: LogoSENSE: a companion HOG based logo detection scheme for phishing web page and e-mail brand recognition. Comput. Secur. 95, 101855 (2020)","journal-title":"Comput. Secur."},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Corona, I., et al.: DeltaPhish: detecting phishing webpages in compromised websites. In: Proceedings ESORICS (2017)","DOI":"10.1007\/978-3-319-66402-6_22"},{"key":"9_CR21","unstructured":"Demontis, A., et al.: Why do adversarial attacks transfer? Explaining transferability of evasion and poisoning attacks. In: USENIX Security Symposium (2019)"},{"issue":"5","key":"9_CR22","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MSEC.2022.3175225","volume":"20","author":"DM Divakaran","year":"2022","unstructured":"Divakaran, D.M., Oest, A.: Phishing detection leveraging machine learning and deep learning: a review. IEEE Secur. Priv. 20(5), 86\u201395 (2022)","journal-title":"IEEE Secur. Priv."},{"key":"9_CR23","unstructured":"Dosovitskiy, A., et al.: An image is worth 16 $$\\times $$ 16 words: transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)"},{"issue":"4","key":"9_CR24","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/TDSC.2006.50","volume":"3","author":"AY Fu","year":"2006","unstructured":"Fu, A.Y., Wenyin, L., Deng, X.: Detecting phishing web pages with visual similarity assessment based on earth mover\u2019s distance (EMD). IEEE Trans. Dependable Secure Comput. 3(4), 301\u2013311 (2006)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. In: Proceedings ACM Workshop on Recurring Malcode (2007)","DOI":"10.1145\/1314389.1314391"},{"key":"9_CR26","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: International Conference on Learning Representations (Poster) (2015)"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings IEEE CVPR, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"9_CR28","unstructured":"Hout, T.v.d., Wabeke, T., Moura, G.C.M., Hesselman, C.: LogoMotive: detecting logos on websites to identify online scams - a TLD case study. In: Proceedings of PAM (2022)"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Kondracki, B., Azad, B.A., Starov, O., Nikiforakis, N.: Catching transparent phish: analyzing and detecting MITM phishing toolkits. In: Proceedings of ACM CCS (2021)","DOI":"10.1145\/3460120.3484765"},{"key":"9_CR30","unstructured":"Le, H., Pham, Q., Sahoo, D., Hoi, S.C.: URLNet: learning a URL representation with deep learning for malicious URL detection. arXiv preprint arXiv:1802.03162 (2018)"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Lee, J., Tang, F., Ye, P., Abbasi, F., Hay, P., Divakaran, D.M.: D-Fence: a flexible, efficient, and comprehensive phishing email detection system. In: Proceedings IEEE EuroS &P (2021)","DOI":"10.1109\/EuroSP51992.2021.00045"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Lee, J., Ye, P., Liu, R., Divakaran, D.M., Choon, C.M.: Building robust phishing detection system: an empirical analysis. In: Proceedings NDSS MADWeb (2020)","DOI":"10.14722\/madweb.2020.23007"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Liang, B., Su, M., You, W., Shi, W., Yang, G.: Cracking classifiers for evasion: a case study on the Google\u2019s phishing pages filter. In: Proceedings WWW (2016)","DOI":"10.1145\/2872427.2883060"},{"key":"9_CR34","unstructured":"Lin, Y., et al.: Phishpedia: a hybrid deep learning based approach to visually identify phishing webpages. In: Proceedings USENIX Security Symposium (2021)"},{"key":"9_CR35","unstructured":"Liu, R., Lin, Y., Yang, X., Ng, S.H., Divakaran, D.M., Dong, J.S.: Inferring phishing intention via webpage appearance and dynamics: a deep vision based approach. In: Proceedings USENIX Security Symposium (2022)"},{"key":"9_CR36","doi-asserted-by":"crossref","unstructured":"Liu, Z., et al.: Swin transformer: hierarchical vision transformer using shifted windows. In: Proceedings the IEEE\/CVF International Conference on Computer Vision, pp. 10012\u201310022 (2021)","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"9_CR37","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Identifying suspicious URLs: an application of large-scale online learning. In: Proceedings ICML (2009)","DOI":"10.1145\/1553374.1553462"},{"key":"9_CR38","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Fawzi, O., Frossard, P.: Universal adversarial perturbations. In: Proceedings IEEE CVPR, pp. 1765\u20131773 (2017)","DOI":"10.1109\/CVPR.2017.17"},{"key":"9_CR39","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Frossard, P.: DeepFool: a simple and accurate method to fool deep neural networks. In: Proceedings IEEE CVPR, pp. 2574\u20132582 (2016)","DOI":"10.1109\/CVPR.2016.282"},{"issue":"10","key":"9_CR40","doi-asserted-by":"publisher","first-page":"2452","DOI":"10.1109\/TPAMI.2018.2861800","volume":"41","author":"KR Mopuri","year":"2018","unstructured":"Mopuri, K.R., Ganeshan, A., Babu, R.V.: Generalizable data-free objective for crafting universal adversarial perturbations. IEEE Trans. Pattern Anal. Mach. Intell. 41(10), 2452\u20132465 (2018)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"9_CR41","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z.B., Swami, A.: Practical black-box attacks against machine learning. In: Proceedings ACM ASIACCS (2017)","DOI":"10.1145\/3052973.3053009"},{"key":"9_CR42","unstructured":"Pawar, R.: Logo images dataset. https:\/\/github.com\/revanks\/logo-images-dataset (2021), gitHub repository"},{"key":"9_CR43","doi-asserted-by":"crossref","unstructured":"Poursaeed, O., Katsman, I., Gao, B., Belongie, S.: Generative adversarial perturbations. In: Proceedings IEEE CVPR, pp. 4422\u20134431 (2018)","DOI":"10.1109\/CVPR.2018.00465"},{"key":"9_CR44","unstructured":"Quiring, E., et al.: Do\u2019s and don\u2019ts of machine learning in computer security. In: Proceedings USENIX Security Symposium (2022)"},{"key":"9_CR45","doi-asserted-by":"publisher","first-page":"1594","DOI":"10.1109\/TIFS.2020.3039691","volume":"16","author":"MS Rahman","year":"2020","unstructured":"Rahman, M.S., Imani, M., Mathews, N., Wright, M.: Mockingbird: defending against deep-learning-based website fingerprinting attacks with adversarial traces. IEEE Trans. Inf. Forensics Secur. 16, 1594\u20131609 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9_CR46","unstructured":"Shafahi, A., et al.: Adversarial training for free! In: Advances in Neural Information Processing Systems (2019)"},{"key":"9_CR47","doi-asserted-by":"crossref","unstructured":"Shafahi, A., Najibi, M., Xu, Z., Dickerson, J., Davis, L.S., Goldstein, T.: Universal adversarial training. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 5636\u20135643 (2020)","DOI":"10.1609\/aaai.v34i04.6017"},{"issue":"1","key":"9_CR48","first-page":"69","volume":"1","author":"K Sharma","year":"2021","unstructured":"Sharma, K., Zhan, X., Nah, F.F.H., Siau, K., Cheng, M.X.: Impact of digital nudging on information security behavior: an experimental study on framing and priming in cybersecurity. Organ. Cybersecur. J. Pract. Process People 1(1), 69\u201391 (2021)","journal-title":"Organ. Cybersecur. J. Pract. Process People"},{"key":"9_CR49","first-page":"206","volume":"2","author":"A Shenoi","year":"2023","unstructured":"Shenoi, A., Vairam, P.K., Sabharwal, K., Li, J., Divakaran, D.M.: iPET: privacy enhancing traffic perturbations for secure IoT communications. Proce. Priv. Enhan. Technol. 2, 206\u2013220 (2023)","journal-title":"Proce. Priv. Enhan. Technol."},{"key":"9_CR50","unstructured":"Szegedy, C., et al.: Intriguing Properties of Neural Networks. CoRR (2014)"},{"key":"9_CR51","doi-asserted-by":"crossref","unstructured":"Tian, K., Jan, S.T., Hu, H., Yao, D., Wang, G.: Needle in a haystack: tracking down elite phishing domains in the wild. In: Internet Measurement Conference (2018)","DOI":"10.1145\/3278532.3278569"},{"key":"9_CR52","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems 30 (2017)"},{"key":"9_CR53","doi-asserted-by":"crossref","unstructured":"Verma, R., Dyer, K.: On the character of phishing URLs: accurate and robust statistical learning classifiers. In: Proceedings ACM Conference Data Application Security Privacy (2015)","DOI":"10.1145\/2699026.2699115"},{"key":"9_CR54","unstructured":"Wang, G., et al.: Verilogo: Proactive phishing detection via logo recognition, Department of Computer Science and Engineering. University of California, San Diego (2011)"},{"key":"9_CR55","doi-asserted-by":"crossref","unstructured":"Wang, J., et al.: Logo-2K+: a large-scale logo dataset for scalable logo classification. In: Proceedings AAAI, pp. 6194\u20136201 (2020)","DOI":"10.1609\/aaai.v34i04.6085"},{"key":"9_CR56","unstructured":"Whittaker, C., Ryner, B., Nazif, M.: Large-scale automatic classification of phishing pages. In: Proceedings NDSS (2010)"},{"issue":"2","key":"9_CR57","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2019599.2019606","volume":"14","author":"G Xiang","year":"2011","unstructured":"Xiang, G., Hong, J., Rose, C.P., Cranor, L.: CANTINA+: a feature-rich machine learning framework for detecting phishing web sites. ACM Trans. Inform. Syst. Secur. 14(2), 1\u201328 (2011)","journal-title":"ACM Trans. Inform. Syst. Secur."},{"key":"9_CR58","doi-asserted-by":"crossref","unstructured":"Zhang, C., Benz, P., Imtiaz, T., Kweon, I.S.: CD-UAP: class discriminative universal adversarial perturbation. In: Proceedings AAAI Conference on Artificial Intelligence, vol. 34, pp. 6754\u20136761 (2020)","DOI":"10.1609\/aaai.v34i04.6154"},{"key":"9_CR59","doi-asserted-by":"crossref","unstructured":"Zhang, P., et al.: CrawlPhish: large-scale analysis of client-side cloaking techniques in phishing. In: Proceedings IEEE S &P (2021)","DOI":"10.1109\/SP40001.2021.00021"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-51479-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T07:05:45Z","timestamp":1704956745000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-51479-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031514784","9783031514791"],"references-count":59,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-51479-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"12 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Our institutions do not require any formal IRB approval to carry out the research discussed herein. We always followed the guidelines of the Menlo report\u00a0[]. For our user-studies, we never asked for sensitive data or PII. Finally, although we publicly release our code for the sake of science, as mentioned on the GitHub page\u00a0[], such code should not be used for any unethical or illegal purposes.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Statement"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Hague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"478","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"93","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}