{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T05:43:53Z","timestamp":1773899033549,"version":"3.50.1"},"publisher-location":"Cham","reference-count":99,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031708787","type":"print"},{"value":"9783031708794","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-70879-4_16","type":"book-chapter","created":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T19:02:20Z","timestamp":1725476540000},"page":"311-331","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["The Adversarial AI-Art: Understanding, Generation, Detection, and\u00a0Benchmarking"],"prefix":"10.1007","author":[{"given":"Yuying","family":"Li","sequence":"first","affiliation":[]},{"given":"Zeyan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Junyi","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Liangqin","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Fengjun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jiebo","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,5]]},"reference":[{"key":"16_CR1","unstructured":"10 midjourney statistics demonstrating why its better than other AI art generators. Skim AI (2024)"},{"key":"16_CR2","unstructured":"Risk in focus: Generative A.I. and the 2024 election cycle. CISA (2024)"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Agarwal, A., Singh, R., Vatsa, M., Noore, A.: Swapped! digital face presentation attack detection via weighted local magnitude pattern. In: IEEE IJCB (2017)","DOI":"10.1109\/BTAS.2017.8272754"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Akhtar, Z., Dasgupta, D.: A comparative evaluation of local feature descriptors for deepfakes detection. In: IEEE HST (2019)","DOI":"10.1109\/HST47167.2019.9033005"},{"key":"16_CR5","unstructured":"billywzh717: N24news. https:\/\/github.com\/billywzh717\/N24News (2022)"},{"key":"16_CR6","doi-asserted-by":"publisher","first-page":"15642","DOI":"10.1109\/ACCESS.2024.3356122","volume":"12","author":"JJ Bird","year":"2024","unstructured":"Bird, J.J., Lotfi, A.: CIFAKE: image classification and explainable identification of AI-generated synthetic images. IEEE Access 12, 15642\u201315650 (2024)","journal-title":"IEEE Access"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Bray, S.D., Johnson, S.D., Kleinberg, B.: Testing human ability to detect \u2018deepfake\u2019 images of human faces. J. Cybersecur. 9(1), tyad011 (2023)","DOI":"10.1093\/cybsec\/tyad011"},{"key":"16_CR8","unstructured":"Chan, K., Swenson, A.: One Tech Tip: How to Spot AI-Generated Deepfake Images. The Associated Press, New York (2024)"},{"key":"16_CR9","unstructured":"Chen, M., Tworek, J., et\u00a0al.: Evaluating large language models trained on code. arXiv:2107.03374 (2021)"},{"key":"16_CR10","unstructured":"Cho, W.: AI companies take hit as judge says artists have \u2018public interest\u2019 in pursuing lawsuits. ARTnews (2024)"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Croitoru, F.A., Hondru, V., Ionescu, R.T., Shah, M.: Diffusion models in vision: a survey. In: IEEE TPAMI (2023)","DOI":"10.1109\/TPAMI.2023.3261988"},{"key":"16_CR12","unstructured":"Data, E.D.I.: Case 1739 AI-generated image showing accident between GMC hummer EV and tesla cybertruck has gone viral with false claims. D-Intent Data (2024)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: CVPR, IEEE (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"16_CR14","unstructured":"Dhariwal, P., Nichol, A.: Diffusion models beat GANs on image synthesis. In: NeurIPS (2021)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Draganovic, A., Dambra, S., Iuit, J.A., Roundy, K., Apruzzese, G.: \u201cDo users fall for real adversarial phishing?\u201d investigating the human response to evasive webpages. In: APWG eCrime (2023)","DOI":"10.1109\/eCrime61234.2023.10485552"},{"key":"16_CR16","unstructured":"Duffy, C.: Top AI photo generators produce misleading election-related images, study finds. In: CNN (2024)"},{"key":"16_CR17","unstructured":"Edwards, B.: Flooded with AI-generated images, some art communities ban them completely. In: arstechnica (2022)"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Epstein, Z., Levine, S., Rand, D.G., Rahwan, I.: Who gets credit for AI-generated art? Iscience 23(9), 101515 (2020)","DOI":"10.1016\/j.isci.2020.101515"},{"key":"16_CR19","unstructured":"Evan, S.: Pixiv top daily illustration 2018. Kaggle. https:\/\/www.kaggle.com\/datasets\/stevenevan99\/pixiv-top-daily-illustration-2018 (2019)"},{"key":"16_CR20","unstructured":"Fake image detector: fake image detector. https:\/\/www.fakeimagedetector.com\/contact-us\/ (2024)"},{"key":"16_CR21","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: NeurIPS (2014)"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Gragnaniello, D., Cozzolino, D., Marra, F., Poggi, G., Verdoliva, L.: Are GAN generated images easy to detect? a critical analysis of the state-of-the-art. In: IEEE ICME (2021)","DOI":"10.1109\/ICME51207.2021.9428429"},{"key":"16_CR23","unstructured":"Ha, A.Y.J., et al.: Organic or diffused: can we distinguish human art from AI-generated images? arXiv:2402.03214 (2024)"},{"key":"16_CR24","unstructured":"Hassan Hicham ElNahrawy: AI or not. https:\/\/huggingface.co\/Nahrawy\/AIorNot\/ (2023)"},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: CVPR (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"He, Y., Yu, N., Keuper, M., Fritz, M.: Beyond the spectrum: Detecting deepfakes via re-synthesis. arXiv:2105.14376 (2021)","DOI":"10.24963\/ijcai.2021\/349"},{"key":"16_CR27","unstructured":"Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. In: NeurIPS (2020)"},{"key":"16_CR28","unstructured":"Hong, Y., Zhang, J.: Wildfake: a large-scale challenging dataset for AI-generated images detection. arXiv:2402.11843 (2024)"},{"key":"16_CR29","unstructured":"Icaro: Best artworks of all time. Kaggle. https:\/\/www.kaggle.com\/datasets\/ikarus777\/best-artworks-of-all-time (2023)"},{"key":"16_CR30","unstructured":"isitai.com: Is it AI? https:\/\/isitai.com\/ (2024)"},{"key":"16_CR31","unstructured":"Karras, T., Aila, T., Laine, S., Lehtinen, J.: Progressive growing of GANs for improved quality, stability, and variation. In: ICLR (2018)"},{"key":"16_CR32","unstructured":"Katatikarn, J.: AI art statistics: the ultimate list in 2024. In: Academy Of Animated Art (2024)"},{"key":"16_CR33","unstructured":"Kavafian, H.: How to identify AI-generated images (2023)"},{"key":"16_CR34","unstructured":"KI-Tech Hertig: Illuminarty. https:\/\/illuminarty.ai\/ (2024)"},{"key":"16_CR35","unstructured":"Korshunov, P., Marcel, S.: Deepfakes: a new threat to face recognition? assessment and detection. arXiv:1812.08685 (2018)"},{"key":"16_CR36","unstructured":"koushikvikram: Multimodal image retrieval. Github. https:\/\/github.com\/koushikvikram\/multimodal-image-retrieval (2021)"},{"key":"16_CR37","unstructured":"Krizhevsky, A., Hinton, G., et\u00a0al.: Learning multiple layers of features from tiny images (2009)"},{"key":"16_CR38","doi-asserted-by":"crossref","unstructured":"Lei, J., Tang, J., Jia, K.: Rgbd2: Generative scene synthesis via incremental view inpainting using RGBD diffusion models. In: CVPR (2023)","DOI":"10.1109\/CVPR52729.2023.00814"},{"key":"16_CR39","unstructured":"Li, Y., Lyu, S.: Exposing deepfake videos by detecting face warping artifacts. arXiv:1811.00656 (2018)"},{"key":"16_CR40","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-DF: a large-scale challenging dataset for deepfake forensics. In: CVPR (2020)","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"16_CR41","doi-asserted-by":"crossref","unstructured":"Lin, T.Y., et al.: Microsoft coco: common objects in context. In: ECCV (2014)","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"16_CR42","unstructured":"Liu, Z., Yao, Z., Li, F., Luo, B.: On the detectability of chatgpt content: benchmarking, methodology, and evaluation through the lens of academic writing. arXiv:2306.05524 (2023)"},{"key":"16_CR43","doi-asserted-by":"crossref","unstructured":"Liu, Z., Mao, H., Wu, C.Y., Feichtenhofer, C., Darrell, T., Xie, S.: A convnet for the 2020s. In: CVPR (2022)","DOI":"10.1109\/CVPR52688.2022.01167"},{"key":"16_CR44","unstructured":"Lu, Z., et al.: Seeing is not always believing: Benchmarking human and model perception of AI-generated images. In: NeurIPS (2024)"},{"key":"16_CR45","unstructured":"Matthew Maybe: Ai image detector. https:\/\/huggingface.co\/umm-maybe\/AI-image-detector\/ (2022)"},{"key":"16_CR46","unstructured":"Matusevski, A.: Instagram images - 1,211,625 posts. Kaggle. https:\/\/www.kaggle.com\/datasets\/shmalex\/instagram-images (2022)"},{"key":"16_CR47","unstructured":"Midjourney: Can i use my images commercially? MidJourney. https:\/\/help.midjourney.com\/en\/articles\/8150363-can-i-use-my-images-commercially (2024)"},{"key":"16_CR48","unstructured":"Midjourney: Midjourney home. https:\/\/www.midjourney.com\/home (2024)"},{"key":"16_CR49","unstructured":"Mirza, R.: How AI deepfakes threaten the 2024 elections. J. Resour. (2023)"},{"key":"16_CR50","doi-asserted-by":"crossref","unstructured":"Mo, H., Chen, B., Luo, W.: Fake faces identification via convolutional neural network. In: ACM workshop on information hiding and multimedia security (2018)","DOI":"10.1145\/3206004.3206009"},{"key":"16_CR51","unstructured":"Nichol, A.Q., Dhariwal, P.: Improved denoising diffusion probabilistic models. In: ICML (2021)"},{"key":"16_CR52","unstructured":"Office, U.S.C.: Usco letter on AI and copyright initiative update (2024)"},{"key":"16_CR53","doi-asserted-by":"crossref","unstructured":"Ojha, U., Li, Y., Lee, Y.J.: Towards universal fake image detectors that generalize across generative models. In: CVPR (2023)","DOI":"10.1109\/CVPR52729.2023.02345"},{"key":"16_CR54","unstructured":"OpenAI: Can i sell images i create with dall$$\\cdot $$e? OpenAI Documentation (2024)"},{"key":"16_CR55","unstructured":"OpenAI: Dall$$\\cdot $$e: Creating images from text. https:\/\/openai.com\/research\/dall-e (2024)"},{"key":"16_CR56","unstructured":"Organika.ai: Sdxl detector. https:\/\/huggingface.co\/Organika\/sdxl-detector\/ (2024)"},{"key":"16_CR57","unstructured":"Pashankar, S.: Scammers litter dating apps with AI-generated profile pics. Bloomberg (2024)"},{"issue":"1","key":"16_CR58","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MASSP.1986.1165342","volume":"3","author":"L Rabiner","year":"1986","unstructured":"Rabiner, L., Juang, B.: An introduction to hidden markov models. IEEE ASSP Mag. 3(1), 4\u201316 (1986)","journal-title":"IEEE ASSP Mag."},{"key":"16_CR59","unstructured":"Radford, A., Kim, J.W., et\u00a0al.: Learning transferable visual models from natural language supervision. In: ICML (2021)"},{"key":"16_CR60","unstructured":"Rae, J.W., Borgeaud, S., et\u00a0al.: Scaling language models: methods, analysis & insights from training gopher. arXiv:2112.11446 (2021)"},{"key":"16_CR61","doi-asserted-by":"crossref","unstructured":"Rahman, M.A., Paul, B., Sarker, N.H., Hakim, Z.I.A., Fattah, S.A.: Artifact: a large-scale dataset with artificial and factual images for generalizable and robust synthetic image detection. In: IEEE ICIP (2023)","DOI":"10.1109\/ICIP49359.2023.10222083"},{"key":"16_CR62","unstructured":"Ramesh, A., Dhariwal, P., Nichol, A., Chu, C., Chen, M.: Hierarchical text-conditional image generation with clip latents. arXiv:2204.06125 (2022)"},{"key":"16_CR63","doi-asserted-by":"crossref","unstructured":"Reidy, M., Mallon, H., Luo, J.: Investigating the effectiveness of deep learning and CFA interpolation based classifiers on identifying AIGC. In: IEEE BigData (2023)","DOI":"10.1109\/BigData59044.2023.10386096"},{"key":"16_CR64","doi-asserted-by":"crossref","unstructured":"Reynolds, D.A., et\u00a0al.: Gaussian mixture models. Encyclopedia Biometrics 741(659-663) (2009)","DOI":"10.1007\/978-0-387-73003-5_196"},{"key":"16_CR65","unstructured":"Roose, K.: An AI-generated picture won an art prize. artists aren\u2019t happy (2022)"},{"key":"16_CR66","doi-asserted-by":"crossref","unstructured":"Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Nie\u00dfner, M.: Faceforensics++: learning to detect manipulated facial images. In: ICCV (2019)","DOI":"10.1109\/ICCV.2019.00009"},{"key":"16_CR67","unstructured":"Rudolf Kenechukwu Enyimba: Deepfake image detection (CNN). https:\/\/huggingface.co\/spaces\/Wvolf\/CNN_Deepfake_Image_Detection\/ (2024)"},{"key":"16_CR68","unstructured":"Sganga, N.: Is that Facebook account real? meta reports \u2018rapid rise\u2019 in AI-generated profile pictures. CBS News (2022)"},{"key":"16_CR69","doi-asserted-by":"crossref","unstructured":"Sha, Z., Li, Z., Yu, N., Zhang, Y.: De-fake: detection and attribution of fake images generated by text-to-image generation models. In: ACM CCS (2023)","DOI":"10.1145\/3576915.3616588"},{"key":"16_CR70","unstructured":"Sightengine: sightengine. https:\/\/sightengine.com\/ (2024)"},{"key":"16_CR71","unstructured":"Sohl-Dickstein, J., Weiss, E., Maheswaranathan, N., Ganguli, S.: Deep unsupervised learning using nonequilibrium thermodynamics. In: ICML (2015)"},{"key":"16_CR72","unstructured":"Song, Y., Durkan, C., Murray, I., Ermon, S.: Maximum likelihood training of score-based diffusion models. In: NeurIPS (2021)"},{"key":"16_CR73","unstructured":"Song, Y., Ermon, S.: Improved techniques for training score-based generative models. In: NeurIPS (2020)"},{"key":"16_CR74","unstructured":"Stability AI Ltd: Dreamstudio. https:\/\/dreamstudio.com\/about\/ (2024)"},{"key":"16_CR75","unstructured":"StarryAI: Starryai home. https:\/\/starryai.com\/ (2024)"},{"key":"16_CR76","unstructured":"Steele, C.: How to detect AI-generated images (2024)"},{"key":"16_CR77","doi-asserted-by":"crossref","unstructured":"Straub, J.: Using subject face brightness assessment to detect \u2018deep fakes\u2019 (conference presentation). In: Real-Time Image Processing and Deep Learning, vol. 10996, p. 109960H. SPIE (2019)","DOI":"10.1117\/12.2520546"},{"key":"16_CR78","unstructured":"Telperion: Diasterdatasetraw. Kaggle. https:\/\/www.kaggle.com\/datasets\/telperion\/diasterdatasetraw (2022)"},{"key":"16_CR79","unstructured":"Thompson, S.A.: We asked A.I. to create the joker. it generated a copyrighted image. (2024)"},{"key":"16_CR80","unstructured":"Vaswani, A., et al.: Attention is all you need. In: NeurIPS (2017)"},{"key":"16_CR81","unstructured":"Verma, P.: The rise of AI fake news is creating a \u2018misinformation superspreader\u2019. The Washington Post (2023)"},{"key":"16_CR82","doi-asserted-by":"crossref","unstructured":"Wang, S.Y., Wang, O., Zhang, R., Owens, A., Efros, A.A.: CNN-generated images are surprisingly easy to spot... for now. In: CVPR (2020)","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"16_CR83","unstructured":"Wang, Y., Huang, Z., Hong, X.: Benchmarking deepart detection. arXiv:2302.14475 (2023)"},{"key":"16_CR84","unstructured":"Wang, Z., Shan, X., Zhang, X., Yang, J.: N24news: a new dataset for multimodal news classification. In: LREC (2022)"},{"key":"16_CR85","doi-asserted-by":"crossref","unstructured":"Wang, Z., et al.: Dire for diffusion-generated image detection. In: ICCV (2023)","DOI":"10.1109\/ICCV51070.2023.02051"},{"key":"16_CR86","doi-asserted-by":"crossref","unstructured":"Wang, Z., Montoya, E., Munechka, D., Yang, H., Hoover, B., Chau, P.: Diffusiondb: a large-scale prompt gallery dataset for text-to-image generative models. In: ACL (2023)","DOI":"10.18653\/v1\/2023.acl-long.51"},{"key":"16_CR87","doi-asserted-by":"crossref","unstructured":"Wei, Y., Tyson, G.: Understanding the impact of AI generated content on social media: The pixiv case (2024)","DOI":"10.1145\/3664647.3680631"},{"key":"16_CR88","unstructured":"Wendling, M.: Ai can be easily used to make fake election photos. In: BBC (2024)"},{"key":"16_CR89","doi-asserted-by":"crossref","unstructured":"Wong, C.: Ai-generated images and video are here: how could they shape research? Nature (2024)","DOI":"10.1038\/d41586-024-00659-8"},{"key":"16_CR90","unstructured":"Workado LLC: Content at scale. https:\/\/contentatscale.ai\/ (2024)"},{"key":"16_CR91","unstructured":"World Economic Forum: Global risks report 2024 (2024)"},{"key":"16_CR92","unstructured":"Writer, A.R.: 9 simple ways to detect AI images (with examples) in 2024 (2024)"},{"key":"16_CR93","unstructured":"Wu, J., Gan, W., Chen, Z., Wan, S., Lin, H.: Ai-generated content (AIGC): a survey. arXiv:2304.06632 (2023)"},{"key":"16_CR94","doi-asserted-by":"crossref","unstructured":"Xi, Z., Huang, W., Wei, K., Luo, W., Zheng, P.: Ai-generated image detection using a cross-attention enhanced dual-stream network. In: APSIPA ASC (2023)","DOI":"10.1109\/APSIPAASC58517.2023.10317126"},{"issue":"4","key":"16_CR95","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3626235","volume":"56","author":"L Yang","year":"2023","unstructured":"Yang, L., Zhang, Z., Song, Y., Hong, S., Xu, R., Zhao, Y., Zhang, W., Cui, B., Yang, M.H.: Diffusion models: a comprehensive survey of methods and applications. ACM Comput. Surv. 56(4), 1\u201339 (2023)","journal-title":"ACM Comput. Surv."},{"key":"16_CR96","unstructured":"Yu, F., Seff, A., Zhang, Y., Song, S., Funkhouser, T., Xiao, J.: Lsun: construction of a large-scale image dataset using deep learning with humans in the loop. arXiv:1506.03365 (2015)"},{"key":"16_CR97","doi-asserted-by":"crossref","unstructured":"Yuan, Y., Hao, Q., Apruzzese, G., Conti, M., Wang, G.: Are adversarial phishing webpages a threat in reality? understanding the users\u2019 perception of adversarial webpages. In: Web Conference (2024)","DOI":"10.1145\/3589334.3645502"},{"key":"16_CR98","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Zheng, L., Thing, V.L.: Automated face swapping and its detection. In: IEEE ICSIP (2017)","DOI":"10.1109\/SIPROCESS.2017.8124497"},{"key":"16_CR99","unstructured":"Zhu, M., et al.: Genimage: a million-scale benchmark for detecting AI-generated image. In: NeurIPS (2024)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70879-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T19:46:12Z","timestamp":1732736772000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70879-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031708787","9783031708794"],"references-count":99,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70879-4_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"5 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}