{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T13:32:02Z","timestamp":1770816722982,"version":"3.50.1"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031646256","type":"print"},{"value":"9783031646263","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-64626-3_22","type":"book-chapter","created":{"date-parts":[[2024,7,13]],"date-time":"2024-07-13T13:01:58Z","timestamp":1720875718000},"page":"374-391","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["CFStra: Enhancing Configurable Program Analysis Through LLM-Driven Strategy Selection Based on\u00a0Code Features"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5098-8040","authenticated-orcid":false,"given":"Jie","family":"Su","sequence":"first","affiliation":[]},{"given":"Liansai","family":"Deng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1826-6213","authenticated-orcid":false,"given":"Cheng","family":"Wen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3028-8191","authenticated-orcid":false,"given":"Shengchao","family":"Qin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5429-4580","authenticated-orcid":false,"given":"Cong","family":"Tian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,14]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Allen, J.R., Kennedy, K., Porterfield, C., Warren, J.: Conversion of control dependence to data dependence. In: Proceedings of the 10th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages, pp. 177\u2013189 (1983)","DOI":"10.1145\/567067.567085"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Bartocci, E., Falcone, Y., Francalanza, A., Reger, G.: Introduction to runtime verification. In: Lectures on Runtime Verification: Introductory and Advanced Topics, pp. 1\u201333 (2018)","DOI":"10.1007\/978-3-319-75632-5_1"},{"key":"22_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-030-03421-4_11","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Verification","author":"D Beyer","year":"2018","unstructured":"Beyer, D., Dangl, M.: Strategy selection for software verification based on boolean features. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11245, pp. 144\u2013159. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03421-4_11"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1007\/978-3-319-21690-4_42","volume-title":"Computer Aided Verification","author":"D Beyer","year":"2015","unstructured":"Beyer, D., Dangl, M., Wendler, P.: Boosting k-induction with continuously-refined invariants. In: Kroening, D., P\u0103s\u0103reanu, C.S. (eds.) CAV 2015. LNCS, vol. 9206, pp. 622\u2013640. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21690-4_42"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-642-22110-1_16","volume-title":"Computer Aided Verification","author":"D Beyer","year":"2011","unstructured":"Beyer, D., Keremoglu, M.E.: CPAchecker: a tool for configurable software verification. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 184\u2013190. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22110-1_16"},{"key":"22_CR6","unstructured":"Beyer, D., Keremoglu, M.E., Wendler, P.: Predicate abstraction with adjustable-block encoding. In: Formal Methods in Computer Aided Design, pp. 189\u2013197. IEEE (2010)"},{"key":"22_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-642-37057-1_11","volume-title":"Fundamental Approaches to Software Engineering","author":"D Beyer","year":"2013","unstructured":"Beyer, D., L\u00f6we, S.: Explicit-state software model checking based on CEGAR and interpolation. In: Cortellessa, V., Varr\u00f3, D. (eds.) FASE 2013. LNCS, vol. 7793, pp. 146\u2013162. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37057-1_11"},{"key":"22_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10009-017-0469-y","volume":"21","author":"D Beyer","year":"2019","unstructured":"Beyer, D., L\u00f6we, S., Wendler, P.: Reliable benchmarking: requirements and solutions. Int. J. Softw. Tools Technol. Transfer 21, 1\u201329 (2019)","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"22_CR9","unstructured":"Biere, A., Cimatti, A., Clarke, E.M., Strichman, O., Zhu, Y.: Bounded model checking. In: Handbook of Satisfiability, vol. 185, no. 99, pp. 457\u2013481 (2009)"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Chakraborty, S., et al.: Ranking LLM-generated loop invariants for program verification. arXiv preprint arXiv:2310.09342 (2023)","DOI":"10.18653\/v1\/2023.findings-emnlp.614"},{"key":"22_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-642-31759-0_19","volume-title":"Model Checking Software","author":"J Christ","year":"2012","unstructured":"Christ, J., Hoenicke, J., Nutz, A.: SMTInterpol: an interpolating SMT solver. In: Donaldson, A., Parker, D. (eds.) SPIN 2012. LNCS, vol. 7385, pp. 248\u2013254. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31759-0_19"},{"key":"22_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-642-36742-7_7","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A Cimatti","year":"2013","unstructured":"Cimatti, A., Griggio, A., Schaafsma, B.J., Sebastiani, R.: The MathSAT5 SMT solver. In: Piterman, N., Smolka, S.A. (eds.) TACAS 2013. LNCS, vol. 7795, pp. 93\u2013107. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36742-7_7"},{"key":"22_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/BFb0058022","volume-title":"Foundations of Software Technology and Theoretical Computer Science","author":"EM Clarke","year":"1997","unstructured":"Clarke, E.M.: Model checking. In: Ramesh, S., Sivakumar, G. (eds.) FSTTCS 1997. LNCS, vol. 1346, pp. 54\u201356. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0058022"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Czech, M., H\u00fcllermeier, E., Jakobs, M.C., Wehrheim, H.: Predicting rankings of software verification tools. In: Proceedings of the 3rd ACM SIGSOFT International Workshop on Software Analytics, pp. 23\u201326 (2017)","DOI":"10.1145\/3121257.3121262"},{"key":"22_CR15","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/s10703-016-0264-5","volume":"50","author":"Y Demyanova","year":"2017","unstructured":"Demyanova, Y., Pani, T., Veith, H., Zuleger, F.: Empirical software metrics for benchmarking of verification tools. Formal Methods Syst. Des. 50, 289\u2013316 (2017)","journal-title":"Formal Methods Syst. Des."},{"key":"22_CR16","unstructured":"Falcone, Y., Havelund, K., Reger, G.: A tutorial on runtime verification. Eng. Dependable Softw. Syst. 141\u2013175 (2013)"},{"key":"22_CR17","unstructured":"Fan, A., et al.: Large language models for software engineering: survey and open problems. arXiv preprint arXiv:2310.03533 (2023)"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Fan, Z., Gao, X., Mirchev, M., Roychoudhury, A., Tan, S.H.: Automated repair of programs from large language models. In: 45th IEEE\/ACM International Conference on Software Engineering, ICSE 2023, Melbourne, Australia, 14\u201320 May 2023, pp. 1469\u20131481. IEEE (2023)","DOI":"10.1109\/ICSE48619.2023.00128"},{"issue":"3","key":"22_CR19","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1145\/24039.24041","volume":"9","author":"J Ferrante","year":"1987","unstructured":"Ferrante, J., Ottenstein, K.J., Warren, J.D.: The program dependence graph and its use in optimization. ACM Trans. Program. Lang. Syst. 9(3), 319\u2013349 (1987). https:\/\/doi.org\/10.1145\/24039.24041","journal-title":"ACM Trans. Program. Lang. Syst."},{"issue":"9","key":"22_CR20","doi-asserted-by":"publisher","first-page":"1048","DOI":"10.1145\/48529.48530","volume":"31","author":"JH Fetzer","year":"1988","unstructured":"Fetzer, J.H.: Program verification: the very idea. Commun. ACM 31(9), 1048\u20131063 (1988)","journal-title":"Commun. ACM"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"First, E., Rabe, M., Ringer, T., Brun, Y.: Baldur: whole-proof generation and repair with large language models. In: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1229\u20131241 (2023)","DOI":"10.1145\/3611643.3616243"},{"key":"22_CR22","unstructured":"Hou, X., et al.: Large language models for software engineering: a systematic literature review. arXiv preprint arXiv:2308.10620 (2023)"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Kang, S., Yoon, J., Askarbekkyzy, N., Yoo, S.: Evaluating diverse large language models for automatic and general bug reproduction. arXiv preprint arXiv:2311.04532 (2023)","DOI":"10.1109\/TSE.2024.3450837"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Kang, S., Yoon, J., Yoo, S.: Large language models are few-shot testers: exploring LLM-based general bug reproduction. In: 45th IEEE\/ACM International Conference on Software Engineering, ICSE 2023, Melbourne, Australia, 14\u201320 May 2023, pp. 2312\u20132323. IEEE (2023)","DOI":"10.1109\/ICSE48619.2023.00194"},{"key":"22_CR25","doi-asserted-by":"crossref","unstructured":"Koco\u0144, J., et\u00a0al.: Chatgpt: jack of all trades, master of none. Inf. Fusion 101861 (2023)","DOI":"10.1016\/j.inffus.2023.101861"},{"key":"22_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-642-54862-8_26","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"D Kroening","year":"2014","unstructured":"Kroening, D., Tautschnig, M.: CBMC \u2013 C bounded model checker. In: \u00c1brah\u00e1m, E., Havelund, K. (eds.) TACAS 2014. LNCS, vol. 8413, pp. 389\u2013391. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54862-8_26"},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Lemieux, C., Inala, J.P., Lahiri, S.K., Sen, S.: Codamosa: escaping coverage plateaus in test generation with pre-trained large language models. In: 45th IEEE\/ACM International Conference on Software Engineering, ICSE 2023, Melbourne, Australia, 14\u201320 May 2023, pp. 919\u2013931. IEEE (2023)","DOI":"10.1109\/ICSE48619.2023.00085"},{"key":"22_CR28","doi-asserted-by":"crossref","unstructured":"Li, H., Hao, Y., Zhai, Y., Qian, Z.: Assisting static analysis with large language models: a chatgpt experiment. In: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 2107\u20132111 (2023)","DOI":"10.1145\/3611643.3613078"},{"issue":"6624","key":"22_CR29","doi-asserted-by":"publisher","first-page":"1092","DOI":"10.1126\/science.abq1158","volume":"378","author":"Y Li","year":"2022","unstructured":"Li, Y., et al.: Competition-level code generation with alphacode. Science 378(6624), 1092\u20131097 (2022)","journal-title":"Science"},{"key":"22_CR30","doi-asserted-by":"crossref","unstructured":"Liu, Y., et\u00a0al.: Summary of chatgpt-related research and perspective towards the future of large language models. Meta-Radiol. 100017 (2023)","DOI":"10.1016\/j.metrad.2023.100017"},{"key":"22_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/978-3-642-54862-8_27","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"S L\u00f6we","year":"2014","unstructured":"L\u00f6we, S., Mandrykin, M., Wendler, P.: CPAchecker with sequential combination of explicit-value analyses and predicate analyses. In: \u00c1brah\u00e1m, E., Havelund, K. (eds.) TACAS 2014. LNCS, vol. 8413, pp. 392\u2013394. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54862-8_27"},{"key":"22_CR32","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1007\/11916277_25","volume-title":"Logic for Programming, Artificial Intelligence, and Reasoning","author":"J Matthews","year":"2006","unstructured":"Matthews, J., Moore, J.S., Ray, S., Vroon, D.: Verification condition generation via theorem proving. In: Hermann, M., Voronkov, A. (eds.) LPAR 2006. LNCS (LNAI), vol. 4246, pp. 362\u2013376. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11916277_25"},{"key":"22_CR33","unstructured":"OpenAI: GPT-4 technical report. arxiv:2303.08774. View in Article, vol. 2, p. 13 (2023)"},{"key":"22_CR34","unstructured":"Ouimet, M., Lundqvist, K.: Formal software verification: model checking and theorem proving. Embedded Systems Laboratory Technical Report ESL-TIK-00214, Cambridge USA (2007)"},{"key":"22_CR35","unstructured":"Pei, K., Bieber, D., Shi, K., Sutton, C., Yin, P.: Can large language models reason about program invariants? In: International Conference on Machine Learning, pp. 27496\u201327520. PMLR (2023)"},{"key":"22_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-030-17502-3_19","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"C Richter","year":"2019","unstructured":"Richter, C., Wehrheim, H.: PeSCo: predicting sequential combinations of verifiers. In: Beyer, D., Huisman, M., Kordon, F., Steffen, B. (eds.) TACAS 2019. LNCS, vol. 11429, pp. 229\u2013233. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17502-3_19"},{"key":"22_CR37","unstructured":"Ruben: A code-understanding, code-browsing or code-search tool. This is a tool to index, then query or search C, C++, java, python, ruby, go and javascript source code. https:\/\/github.com\/ruben2020\/codequery. Accessed 04 Mar 2024"},{"key":"22_CR38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-322-96753-4","volume-title":"The Foundations of Program Verification","author":"K Sieber","year":"2013","unstructured":"Sieber, K.: The Foundations of Program Verification. Springer, Wiesbaden (2013). https:\/\/doi.org\/10.1007\/978-3-322-96753-4"},{"key":"22_CR39","doi-asserted-by":"crossref","unstructured":"Su, J., Tian, C., Duan, Z.: Conditional interpolation: making concurrent program verification more effective. In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 144\u2013154 (2021)","DOI":"10.1145\/3468264.3468602"},{"key":"22_CR40","doi-asserted-by":"crossref","unstructured":"Su, J., Tian, C., Yang, Z., Yang, J., Yu, B., Duan, Z.: Prioritized constraint-aided dynamic partial-order reduction. In: Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering, pp. 1\u201313 (2022)","DOI":"10.1145\/3551349.3561159"},{"key":"22_CR41","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/978-3-031-30820-8_38","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"J Su","year":"2023","unstructured":"Su, J., Yang, Z., Xing, H., Yang, J., Tian, C., Duan, Z.: PIChecker: a POR and interpolation based verifier for concurrent programs (competition contribution). In: Sankaranarayanan, S., Sharygina, N. (eds.) TACAS 2023. LNCS, vol. 13994, pp. 571\u2013576. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30820-8_38"},{"key":"22_CR42","doi-asserted-by":"crossref","unstructured":"Tsigkanos, C., Rani, P., M\u00fcller, S., Kehrer, T.: Large language models: the next frontier for variable discovery within metamorphic testing? In: 2023 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 678\u2013682. IEEE (2023)","DOI":"10.1109\/SANER56733.2023.00070"},{"key":"22_CR43","doi-asserted-by":"crossref","unstructured":"Wen, C., et al.: Automatically inspecting thousands of static bug warnings with large language model: How far are we? ACM Trans. Knowl. Discov. Data (2024)","DOI":"10.1145\/3653718"},{"key":"22_CR44","doi-asserted-by":"crossref","unstructured":"Wen, C., et al.: Enchanting program specification synthesis by large language models using static analysis and program verification. In: International Conference on Computer Aided Verification. Springer, Cham (2024)","DOI":"10.1007\/978-3-031-65630-9_16"},{"key":"22_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-642-34281-3_24","volume-title":"Formal Methods and Software Engineering","author":"D Wonisch","year":"2012","unstructured":"Wonisch, D., Wehrheim, H.: Predicate analysis with block-abstraction memoization. In: Aoki, T., Taguchi, K. (eds.) ICFEM 2012. LNCS, vol. 7635, pp. 332\u2013347. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34281-3_24"},{"key":"22_CR46","unstructured":"Wu, H., Barrett, C., Narodytska, N.: Lemur: integrating large language models in automated program verification. arXiv preprint arXiv:2310.04870 (2023)"},{"issue":"5","key":"22_CR47","doi-asserted-by":"publisher","first-page":"1122","DOI":"10.1109\/JAS.2023.123618","volume":"10","author":"T Wu","year":"2023","unstructured":"Wu, T., et al.: A brief overview of ChatGPT: the history, status quo and potential future development. IEEE\/CAA J. Automatica Sinica 10(5), 1122\u20131136 (2023)","journal-title":"IEEE\/CAA J. Automatica Sinica"},{"key":"22_CR48","doi-asserted-by":"crossref","unstructured":"Xia, C.S., Wei, Y., Zhang, L.: Automated program repair in the era of large pre-trained language models. In: 45th IEEE\/ACM International Conference on Software Engineering, ICSE 2023, Melbourne, Australia, 14\u201320 May 2023, pp. 1482\u20131494. IEEE (2023)","DOI":"10.1109\/ICSE48619.2023.00129"},{"key":"22_CR49","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.scico.2017.06.010","volume":"162","author":"Z Xu","year":"2018","unstructured":"Xu, Z., Wen, C., Qin, S.: State-taint analysis for detecting resource bugs. Sci. Comput. Program. 162, 93\u2013109 (2018)","journal-title":"Sci. Comput. Program."},{"key":"22_CR50","doi-asserted-by":"crossref","unstructured":"Yetistiren, B., Ozsoy, I., Tuzun, E.: Assessing the quality of github copilot\u2019s code generation. In: Proceedings of the 18th International Conference on Predictive Models and Data Analytics in Software Engineering, pp. 62\u201371 (2022)","DOI":"10.1145\/3558489.3559072"},{"key":"22_CR51","unstructured":"Zhao, W.X., et\u00a0al.: A survey of large language models. arXiv preprint arXiv:2303.18223 (2023)"}],"container-title":["Lecture Notes in Computer Science","Theoretical Aspects of Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-64626-3_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T16:17:35Z","timestamp":1741796255000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-64626-3_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031646256","9783031646263"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-64626-3_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"14 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TASE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Theoretical Aspects of Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guiyang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"tase2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/tase2024.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}