{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T03:10:52Z","timestamp":1768533052286,"version":"3.49.0"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031578694","type":"print"},{"value":"9783031578700","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-57870-0_18","type":"book-chapter","created":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T04:01:52Z","timestamp":1712635312000},"page":"198-209","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["LLM-Based Agents Utilized in\u00a0a\u00a0Trustworthy Artificial Conscience Model for\u00a0Controlling AI in\u00a0Medical Applications"],"prefix":"10.1007","author":[{"given":"Davinder","family":"Kaur","sequence":"first","affiliation":[]},{"given":"Suleyman","family":"Uslu","sequence":"additional","affiliation":[]},{"given":"Mimoza","family":"Durresi","sequence":"additional","affiliation":[]},{"given":"Arjan","family":"Durresi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,10]]},"reference":[{"issue":"4","key":"18_CR1","first-page":"292","volume":"4","author":"BJ Baars","year":"1997","unstructured":"Baars, B.J.: In the theatre of consciousness. Global workspace theory, a rigorous scientific theory of consciousness. J. Conscious. Stud. 4(4), 292\u2013309 (1997)","journal-title":"J. Conscious. Stud."},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Blum, L., Blum, M.: A theory of consciousness from a theoretical computer science perspective: insights from the conscious turing machine. Proc. Natl. Acad. Sci. 119(21), e2115934,119 (2022)","DOI":"10.1073\/pnas.2115934119"},{"key":"18_CR3","first-page":"1877","volume":"33","author":"T Brown","year":"2020","unstructured":"Brown, T., et al.: Language models are few-shot learners. Adv. Neural. Inf. Process. Syst. 33, 1877\u20131901 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"18_CR4","unstructured":"Bubeck, S., et\u00a0al.: Sparks of artificial general intelligence: early experiments with GPT-4. arXiv preprint arXiv:2303.12712 (2023)"},{"key":"18_CR5","unstructured":"Chang, Y., et\u00a0al.: A survey on evaluation of large language models. ACM Trans. Intell. Syst. Technol. (2023)"},{"key":"18_CR6","unstructured":"Chella, A., Manzotti, R.: Artificial Consciousness. Andrews UK Limited (2013)"},{"key":"18_CR7","unstructured":"Dang, H., Mecke, L., Lehmann, F., Goller, S., Buschek, D.: How to prompt? Opportunities and challenges of zero-and few-shot learning for human-AI interaction in creative applications of generative models. arXiv preprint arXiv:2209.01390 (2022)"},{"key":"18_CR8","unstructured":"EC: Ethics guidelines for trustworthy AI (2018). https:\/\/ec.europa.eu\/digital-single-market\/en\/news\/ethics-guidelines-trustworthy-ai"},{"issue":"6","key":"18_CR9","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1038\/s42256-019-0055-y","volume":"1","author":"L Floridi","year":"2019","unstructured":"Floridi, L.: Establishing the rules for building trustworthy AI. Nat. Mach. Intell. 1(6), 261\u2013262 (2019)","journal-title":"Nat. Mach. Intell."},{"key":"18_CR10","unstructured":"Frank, A., Asuncion, A.: UCI machine learning repository, vol. 213, no. 2. University of California. School of information and computer science, Irvine (2010). http:\/\/archive.ics.uci.edu\/ml"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Hadi, M.U., et\u00a0al.: A survey on large language models: applications, challenges, limitations, and practical usage. Authorea Preprints (2023)","DOI":"10.36227\/techrxiv.23589741.v1"},{"key":"18_CR12","unstructured":"Information Technology \u2013 Artificial Intelligence \u2013 Overview of trustworthiness in artificial intelligence . Standard, International Organization for Standardization (2020)"},{"key":"18_CR13","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1007\/978-3-030-15035-8_62","volume-title":"Web, Artificial Intelligence and Network Applications","author":"D Kaur","year":"2019","unstructured":"Kaur, D., Uslu, S., Durresi, A.: Trust-based security mechanism for detecting clusters of fake users in social networks. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds.) WAINA 2019. AISC, vol. 927, pp. 641\u2013650. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-15035-8_62"},{"key":"18_CR14","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-030-57811-4_11","volume-title":"Advances in Networked-Based Information Systems","author":"D Kaur","year":"2021","unstructured":"Kaur, D., Uslu, S., Durresi, A.: Requirements for trustworthy artificial intelligence \u2013 a review. In: Barolli, L., Li, K.F., Enokido, T., Takizawa, M. (eds.) NBiS 2020. AISC, vol. 1264, pp. 105\u2013115. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-57811-4_11"},{"key":"18_CR15","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-031-14314-4_12","volume-title":"Advances in Network-Based Information Systems","author":"D Kaur","year":"2022","unstructured":"Kaur, D., Uslu, S., Durresi, A.: Trustworthy AI explanations as an interface in medical diagnostic systems. In: Barolli, L., Miwa, H., Enokido, T. (eds.) NBiS 2022. LNNS, vol. 526, pp. 119\u2013130. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-14314-4_12"},{"key":"18_CR16","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-031-28451-9_14","volume-title":"Advanced Information Networking and Applications","author":"D Kaur","year":"2023","unstructured":"Kaur, D., Uslu, S., Durresi, A.: A model for artificial conscience to control artificial intelligence. In: Barolli, L. (ed.) AINA 2023. LNNS, vol. 654, pp. 159\u2013170. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-28451-9_14"},{"key":"18_CR17","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-030-79725-6_4","volume-title":"Complex, Intelligent and Software Intensive Systems","author":"D Kaur","year":"2021","unstructured":"Kaur, D., Uslu, S., Durresi, A., Badve, S., Dundar, M.: Trustworthy explainability acceptance: a new metric to measure the trustworthiness of interpretable AI medical diagnostic systems. In: Barolli, L., Yim, K., Enokido, T. (eds.) CISIS 2021. LNNS, vol. 278, pp. 35\u201346. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-79725-6_4"},{"key":"18_CR18","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/978-3-030-44041-1_54","volume-title":"Advanced Information Networking and Applications","author":"D Kaur","year":"2020","unstructured":"Kaur, D., Uslu, S., Durresi, A., Mohler, G., Carter, J.G.: Trust-based human-machine collaboration mechanism for predicting crimes. In: Barolli, L., Amato, F., Moscato, F., Enokido, T., Takizawa, M. (eds.) AINA 2020. AISC, vol. 1151, pp. 603\u2013616. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44041-1_54"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Kaur, D., Uslu, S., Durresi, M., Durresi, A.: A geo-location and trust-based framework with community detection algorithms to filter attackers in 5G social networks. Wirel. Netw. 1\u20139 (2022)","DOI":"10.1007\/s11276-022-03073-y"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Kaur, D., Uslu, S., Durresi, M., Durresi, A.: Artificial intelligence control for trust-based detection of attackers in 5G social networks. Comput. Intell. (2023)","DOI":"10.1111\/coin.12618"},{"issue":"2","key":"18_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3491209","volume":"55","author":"D Kaur","year":"2022","unstructured":"Kaur, D., Uslu, S., Rittichier, K.J., Durresi, A.: Trustworthy artificial intelligence: a review. ACM Comput. Surv. (CSUR) 55(2), 1\u201338 (2022)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"2","key":"18_CR22","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1111\/ncmr.12147","volume":"12","author":"DT Kong","year":"2019","unstructured":"Kong, D.T., Yao, J.: Advancing the scientific understanding of trust and culture in negotiations. Negot. Confl. Manage. Res. 12(2), 117\u2013130 (2019)","journal-title":"Negot. Confl. Manage. Res."},{"key":"18_CR23","unstructured":"Liu, Y., et\u00a0al.: Summary of ChatGPT\/GPT-4 research and perspective towards the future of large language models. arXiv preprint arXiv:2304.01852 (2023)"},{"issue":"4","key":"18_CR24","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1287\/opre.43.4.570","volume":"43","author":"OL Mangasarian","year":"1995","unstructured":"Mangasarian, O.L., Street, W.N., Wolberg, W.H.: Breast cancer diagnosis and prognosis via linear programming. Oper. Res. 43(4), 570\u2013577 (1995)","journal-title":"Oper. Res."},{"key":"18_CR25","unstructured":"Naveed, H., et al.: A comprehensive overview of large language models. arXiv preprint arXiv:2307.06435 (2023)"},{"key":"18_CR26","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-030-84913-9_9","volume-title":"Advances in Networked-Based Information Systems","author":"KJ Rittichier","year":"2022","unstructured":"Rittichier, K.J., Kaur, D., Uslu, S., Durresi, A.: A trust-based tool for detecting potentially damaging users in social networks. In: Barolli, L., Chen, H.-C., Enokido, T. (eds.) NBiS 2021. LNNS, vol. 313, pp. 94\u2013104. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-84913-9_9"},{"issue":"6","key":"18_CR27","doi-asserted-by":"publisher","first-page":"192","DOI":"10.3390\/fi15060192","volume":"15","author":"KI Roumeliotis","year":"2023","unstructured":"Roumeliotis, K.I., Tselikas, N.D.: ChatGPT and open-AI models: a preliminary review. Future Internet 15(6), 192 (2023)","journal-title":"Future Internet"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Ruan, Y., Alfantoukh, L., Durresi, A.: Exploring stock market using twitter trust network. In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications (AINA), pp. 428\u2013433. IEEE (2015)","DOI":"10.1109\/AINA.2015.217"},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"Ruan, Y., Alfantoukh, L., Fang, A., Durresi, A.: Exploring trust propagation behaviors in online communities. In: 2014 17th International Conference on Network-Based Information Systems (NBiS), pp. 361\u2013367. IEEE (2014)","DOI":"10.1109\/NBiS.2014.91"},{"key":"18_CR30","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.knosys.2016.05.042","volume":"106","author":"Y Ruan","year":"2016","unstructured":"Ruan, Y., Durresi, A.: A survey of trust management systems for online social communities-trust modeling, trust inference and attacks. Knowl.-Based Syst. 106, 150\u2013163 (2016)","journal-title":"Knowl.-Based Syst."},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Ruan, Y., Durresi, A.: A trust management framework for cloud computing platforms. In: 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), pp. 1146\u20131153. IEEE (2017)","DOI":"10.1109\/AINA.2017.108"},{"key":"18_CR32","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.comcom.2019.05.018","volume":"144","author":"Y Ruan","year":"2019","unstructured":"Ruan, Y., Durresi, A.: A trust management framework for clouds. Comput. Commun. 144, 124\u2013131 (2019)","journal-title":"Comput. Commun."},{"key":"18_CR33","doi-asserted-by":"crossref","unstructured":"Ruan, Y., Durresi, A., Alfantoukh, L.: Trust management framework for internet of things. In: 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), pp. 1013\u20131019. IEEE (2016)","DOI":"10.1109\/AINA.2016.136"},{"key":"18_CR34","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/j.knosys.2018.01.016","volume":"145","author":"Y Ruan","year":"2018","unstructured":"Ruan, Y., Durresi, A., Alfantoukh, L.: Using twitter trust network for stock market analysis. Knowl.-Based Syst. 145, 207\u2013218 (2018)","journal-title":"Knowl.-Based Syst."},{"key":"18_CR35","doi-asserted-by":"crossref","unstructured":"Ruan, Y., Durresi, A., Uslu, S.: Trust assessment for internet of things in multi-access edge computing. In: 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), pp. 1155\u20131161. IEEE (2018)","DOI":"10.1109\/AINA.2018.00165"},{"issue":"2","key":"18_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3015771","volume":"17","author":"Y Ruan","year":"2017","unstructured":"Ruan, Y., Zhang, P., Alfantoukh, L., Durresi, A.: Measurement theory-based trust management framework for online social communities. ACM Trans. Internet Technol. (TOIT) 17(2), 1\u201324 (2017)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"issue":"1\u20132","key":"18_CR37","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/S0004-3702(97)00026-X","volume":"94","author":"SJ Russell","year":"1997","unstructured":"Russell, S.J.: Rationality and intelligence. Artif. Intell. 94(1\u20132), 57\u201377 (1997)","journal-title":"Artif. Intell."},{"key":"18_CR38","unstructured":"Schwartz, S., Yaeli, A., Shlomov, S.: Enhancing trust in LLM-based AI automation agents: new considerations and future challenges. arXiv preprint arXiv:2308.05391 (2023)"},{"key":"18_CR39","doi-asserted-by":"crossref","unstructured":"Street, W.N., Wolberg, W.H., Mangasarian, O.L.: Nuclear feature extraction for breast tumor diagnosis. In: Biomedical Image Processing and Biomedical Visualization, vol. 1905, pp. 861\u2013870. SPIE (1993)","DOI":"10.1117\/12.148698"},{"issue":"24","key":"18_CR40","doi-asserted-by":"publisher","first-page":"9905","DOI":"10.3390\/s22249905","volume":"22","author":"S Uslu","year":"2022","unstructured":"Uslu, S., Kaur, D., Durresi, M., Durresi, A.: Trustability for resilient internet of things services on 5G multiple access edge cloud computing. Sensors 22(24), 9905 (2022)","journal-title":"Sensors"},{"key":"18_CR41","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-030-33506-9_12","volume-title":"Advances on Broad-Band Wireless Computing, Communication and Applications","author":"S Uslu","year":"2020","unstructured":"Uslu, S., Kaur, D., Rivera, S.J., Durresi, A., Babbar-Sebens, M.: Trust-based game-theoretical decision making for food-energy-water management. In: Barolli, L., Hellinckx, P., Enokido, T. (eds.) BWCCA 2019. LNNS, vol. 97, pp. 125\u2013136. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-33506-9_12"},{"key":"18_CR42","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/978-3-030-44041-1_53","volume-title":"Advanced Information Networking and Applications","author":"S Uslu","year":"2020","unstructured":"Uslu, S., Kaur, D., Rivera, S.J., Durresi, A., Babbar-Sebens, M.: Trust-based decision making for food-energy-water actors. In: Barolli, L., Amato, F., Moscato, F., Enokido, T., Takizawa, M. (eds.) AINA 2020. AISC, vol. 1151, pp. 591\u2013602. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44041-1_53"},{"key":"18_CR43","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-030-50454-0_10","volume-title":"Complex, Intelligent and Software Intensive Systems","author":"S Uslu","year":"2021","unstructured":"Uslu, S., Kaur, D., Rivera, S.J., Durresi, A., Babbar-Sebens, M., Tilt, J.H.: Control theoretical modeling of trust-based decision making in food-energy-water management. In: Barolli, L., Poniszewska-Maranda, A., Enokido, T. (eds.) CISIS 2020. AISC, vol. 1194, pp. 97\u2013107. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-50454-0_10"},{"key":"18_CR44","doi-asserted-by":"crossref","unstructured":"Uslu, S., Kaur, D., Rivera, S.J., Durresi, A., Babbar-Sebens, M., Tilt, J.H.: A trustworthy human\u2013machine framework for collective decision making in food\u2013energy\u2013water management: the role of trust sensitivity. Knowl.-Based Syst. 213, 106,683 (2021)","DOI":"10.1016\/j.knosys.2020.106683"},{"key":"18_CR45","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-030-75100-5_19","volume-title":"Advanced Information Networking and Applications","author":"S Uslu","year":"2021","unstructured":"Uslu, S., Kaur, D., Rivera, S.J., Durresi, A., Durresi, M., Babbar-Sebens, M.: Trustworthy acceptance: a new metric for trustworthy artificial intelligence used in decision making in food\u2013energy\u2013water sectors. In: Barolli, L., Woungang, I., Enokido, T. (eds.) AINA 2021. LNNS, vol. 225, pp. 208\u2013219. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75100-5_19"},{"key":"18_CR46","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-030-99587-4_37","volume-title":"Advanced Information Networking and Applications","author":"S Uslu","year":"2022","unstructured":"Uslu, S., Kaur, D., Rivera, S.J., Durresi, A., Durresi, M., Babbar-Sebens, M.: Trustworthy fairness metric applied to\u00a0AI-based decisions in\u00a0food-energy-water. In: Barolli, L., Hussain, F., Enokido, T. (eds.) AINA 2022. LNNS, vol. 450, pp. 433\u2013445. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99587-4_37"},{"key":"18_CR47","unstructured":"Xi, Z., et\u00a0al.: The rise and potential of large language model based agents: a survey. arXiv preprint arXiv:2309.07864 (2023)"},{"key":"18_CR48","doi-asserted-by":"crossref","unstructured":"Zhang, P., Durresi, A.: Trust management framework for social networks. In: 2012 IEEE International Conference on Communications (ICC), pp. 1042\u20131047. IEEE (2012)","DOI":"10.1109\/ICC.2012.6364031"},{"key":"18_CR49","doi-asserted-by":"crossref","unstructured":"Zhang, P., Durresi, A., Barolli, L.: Survey of trust management on various networks. In: 2011 International Conference on Complex, Intelligent and Software Intensive Systems (CISIS), pp. 219\u2013226. IEEE (2011)","DOI":"10.1109\/CISIS.2011.122"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57870-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T04:09:56Z","timestamp":1712635796000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57870-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031578694","9783031578700"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57870-0_18","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"10 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kitakyushu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"38","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}