{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:40:37Z","timestamp":1773841237064,"version":"3.50.1"},"publisher-location":"Cham","reference-count":57,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031781858","type":"print"},{"value":"9783031781865","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:00:00Z","timestamp":1732924800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:00:00Z","timestamp":1732924800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78186-5_28","type":"book-chapter","created":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T14:17:44Z","timestamp":1732889864000},"page":"424-438","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["What Makes Vision Transformers Robust Towards Bit-Flip Attack?"],"prefix":"10.1007","author":[{"given":"Xuan","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Souvik","family":"Kundu","sequence":"additional","affiliation":[]},{"given":"Dake","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Beerel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,30]]},"reference":[{"key":"28_CR1","unstructured":"Imagenet-100, 5(4), 1 (2009). https:\/\/www.kaggle.com\/datasets\/ambityga\/imagenet100"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Ando, A., Gidaris, S., Bursuc, A., Puy, G., Boulch, A., Marlet, R.: RangeViT: towards vision transformers for 3d semantic segmentation in autonomous driving. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5240\u20135250 (2023)","DOI":"10.1109\/CVPR52729.2023.00507"},{"key":"28_CR3","doi-asserted-by":"publisher","unstructured":"Cai, K., Chowdhuryy, M.H.I., Zhang, Z., Yao, F.: Seeds of seed: NMT-stroke: diverting neural machine translation through hardware-based faults. In: 2021 International Symposium on Secure and Private Execution Environment Design (SEED), pp. 76\u201382 (2021). https:\/\/doi.org\/10.1109\/SEED51797.2021.00019","DOI":"10.1109\/SEED51797.2021.00019"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Chen, D., Zhang, Y., Kundu, S., Li, C., Beerel, P.A.: RNA-ViT: reduced-dimension approximate normalized attention vision transformers for latency efficient private inference. In: 2023 IEEE\/ACM International Conference on Computer Aided Design (ICCAD), pp.\u00a01\u20139. IEEE (2023)","DOI":"10.1109\/ICCAD57390.2023.10323702"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Chen, H., Fu, C., Zhao, J., Koushanfar, F.: Proflip: targeted trojan attack with progressive bit flips. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 7718\u20137727 (2021)","DOI":"10.1109\/ICCV48922.2021.00762"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Chen, J., He, Y., Frey, E.C., Li, Y., Du, Y.: ViT-v-net: vision transformer for unsupervised volumetric medical image registration. arXiv preprint arXiv:2104.06468 (2021)","DOI":"10.1016\/j.media.2022.102615"},{"key":"28_CR7","unstructured":"Chen, Y., Liu, Z., Yuan, Y., Hu, S., Li, T., Wang, S.: Unveiling single-bit-flip attacks on DNN executables (2023)"},{"issue":"10","key":"28_CR8","doi-asserted-by":"publisher","first-page":"2598","DOI":"10.1109\/TMI.2022.3167808","volume":"41","author":"O Dalmaz","year":"2022","unstructured":"Dalmaz, O., Yurt, M., \u00c7ukur, T.: ResViT: residual vision transformers for multimodal medical image synthesis. IEEE Trans. Med. Imaging 41(10), 2598\u20132614 (2022)","journal-title":"IEEE Trans. Med. Imaging"},{"key":"28_CR9","unstructured":"Dosovitskiy, A., et\u00a0al.: An image is worth 16x16 words: transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)"},{"key":"28_CR10","doi-asserted-by":"publisher","unstructured":"Ghavami, B., Movi, S., Fang, Z., Shannon, L.: Stealthy attack on algorithmic-protected DNNs via smart bit flipping. In: 2022 23rd International Symposium on Quality Electronic Design (ISQED), pp.\u00a01\u20137 (2022). https:\/\/doi.org\/10.1109\/ISQED54688.2022.9806152","DOI":"10.1109\/ISQED54688.2022.9806152"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Ghavami, B., Sadati, M., Shahidzadeh, M., Fang, Z., Shannon, L.: BDFA: a blind data adversarial bit-flip attack on deep neural networks (2022)","DOI":"10.1109\/DSD57027.2022.00126"},{"key":"28_CR12","doi-asserted-by":"publisher","unstructured":"Gongye, C., Luo, Y., Xu, X., Fei, Y.: Hammerdodger: a lightweight defense framework against rowhammer attack on DNNs. In: 2023 60th ACM\/IEEE Design Automation Conference (DAC), pp.\u00a01\u20136 (2023).https:\/\/doi.org\/10.1109\/DAC56929.2023.10247671","DOI":"10.1109\/DAC56929.2023.10247671"},{"key":"28_CR13","doi-asserted-by":"publisher","unstructured":"Guo, Y., Liu, L., Cheng, Y., Zhang, Y., Yang, J.: Modelshield: a generic and portable framework extension for defending bit-flip based adversarial weight attacks. In: 2021 IEEE 39th International Conference on Computer Design (ICCD), pp. 559\u2013562 (2021). https:\/\/doi.org\/10.1109\/ICCD53106.2021.00090","DOI":"10.1109\/ICCD53106.2021.00090"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"He, Z., Rakin, A.S., Li, J., Chakrabarti, C., Fan, D.: Defending and harnessing the bit-flip based adversarial weight attack. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2020)","DOI":"10.1109\/CVPR42600.2020.01410"},{"issue":"1","key":"28_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3555808","volume":"19","author":"M Javaheripi","year":"2022","unstructured":"Javaheripi, M., Chang, J.W., Koushanfar, F.: Acchashtag: accelerated hashing for detecting fault-injection attacks on embedded neural networks. ACM J. Emerg. Technol. Comput. Syst. 19(1), 1\u201320 (2022)","journal-title":"ACM J. Emerg. Technol. Comput. Syst."},{"key":"28_CR16","unstructured":"Krizhevsky, A., Nair, V., Hinton, G.: Cifar-10 and cifar-100 (Canadian institute for advanced research), 5(4), 1 (2010). http:\/\/www.cs.toronto.edu\/~kriz\/cifar.html"},{"key":"28_CR17","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, vol. 25 (2012)"},{"issue":"5","key":"28_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3510833","volume":"21","author":"S Kundu","year":"2022","unstructured":"Kundu, S., Fu, Y., Ye, B., Beerel, P.A., Pedram, M.: Toward adversary-aware non-iterative model pruning through dynamic network rewiring of DNNs. ACM Trans. Embed. Comput. Syst. 21(5), 1\u201324 (2022)","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"28_CR19","unstructured":"Kundu, S., Lu, S., Zhang, Y., Liu, J., Beerel, P.A.: Learning to linearize deep neural networks for secure and efficient private inference. In: ICLR (2023)"},{"key":"28_CR20","unstructured":"Kundu, S., Nazemi, M., Beerel, P.A., Pedram, M.: DNR: a tunable robust pruning framework through dynamic network rewiring of DNNs. In: Proceedings of the 26th Asia and South Pacific Design Automation Conference, pp. 344\u2013350 (2021)"},{"issue":"7","key":"28_CR21","first-page":"1045","volume":"69","author":"S Kundu","year":"2020","unstructured":"Kundu, S., Nazemi, M., Pedram, M., Chugg, K.M., Beerel, P.A.: Pre-defined sparsity for low-complexity convolutional neural networks. IEEE Trans. Comput. 69(7), 1045\u20131058 (2020)","journal-title":"IEEE Trans. Comput."},{"key":"28_CR22","doi-asserted-by":"crossref","unstructured":"Kundu, S., Pedram, M., Beerel, P.A.: Hire-SNN: harnessing the inherent robustness of energy-efficient deep spiking neural networks by training with crafted input noise. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 5209\u20135218 (2021)","DOI":"10.1109\/ICCV48922.2021.00516"},{"key":"28_CR23","doi-asserted-by":"crossref","unstructured":"Kundu, S., Wang, S., Sun, Q., Beerel, P.A., Pedram, M.: BMPQ: bit-gradient sensitivity-driven mixed-precision quantization of DNNs from scratch. In: 2022 Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 588\u2013591. IEEE (2022)","DOI":"10.23919\/DATE54114.2022.9774740"},{"key":"28_CR24","doi-asserted-by":"publisher","unstructured":"Lee, K., Chandrakasan, A.P.: SparseBFA: attacking sparse deep neural networks with the worst-case bit flips on coordinates. In: ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4208\u20134212 (2022). https:\/\/doi.org\/10.1109\/ICASSP43922.2022.9747337","DOI":"10.1109\/ICASSP43922.2022.9747337"},{"key":"28_CR25","doi-asserted-by":"publisher","unstructured":"Li, J., Rakin, A.S., He, Z., Fan, D., Chakrabarti, C.: Radar: run-time adversarial weight attack detection and accuracy recovery. In: 2021 Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 790\u2013795 (2021). https:\/\/doi.org\/10.23919\/DATE51398.2021.9474113","DOI":"10.23919\/DATE51398.2021.9474113"},{"key":"28_CR26","doi-asserted-by":"publisher","unstructured":"Li, J., et al.: Defending bit-flip attack through DNN weight reconstruction. In: 2020 57th ACM\/IEEE Design Automation Conference (DAC), pp.\u00a01\u20136 (2020). https:\/\/doi.org\/10.1109\/DAC18072.2020.9218665","DOI":"10.1109\/DAC18072.2020.9218665"},{"issue":"2","key":"28_CR27","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TC.2022.3211411","volume":"72","author":"L Liu","year":"2023","unstructured":"Liu, L., Guo, Y., Cheng, Y., Zhang, Y., Yang, J.: Generating robust DNN with resistance to bit-flip based adversarial weight attack. IEEE Trans. Comput. 72(2), 401\u2013413 (2023). https:\/\/doi.org\/10.1109\/TC.2022.3211411","journal-title":"IEEE Trans. Comput."},{"key":"28_CR28","doi-asserted-by":"crossref","unstructured":"Liu, Q., Wen, W., Wang, Y.: Concurrent weight encoding-based detection for bit-flip attack on neural network accelerators. In: IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), 2020 (2020)","DOI":"10.1145\/3400302.3415726"},{"key":"28_CR29","unstructured":"Liu, Q., Yin, J., Wen, W., Yang, C., Sha, S.: Neuropots: realtime proactive defense against bit-flip attacks in neural networks (2023)"},{"key":"28_CR30","unstructured":"Liu, Y., Feng, B., Lou, Q.: Trojtext: test-time invisible textual trojan insertion. arXiv preprint arXiv:2303.02242 (2023)"},{"key":"28_CR31","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: Trojaning attack on neural networks. In: 25th Annual Network And Distributed System Security Symposium (NDSS 2018). Internet Soc (2018)","DOI":"10.14722\/ndss.2018.23291"},{"key":"28_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-030-58607-2_11","volume-title":"Computer Vision \u2013 ECCV 2020","author":"Y Liu","year":"2020","unstructured":"Liu, Y., Ma, X., Bailey, J., Lu, F.: Reflection backdoor: a natural backdoor attack on deep neural networks. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12355, pp. 182\u2013199. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58607-2_11"},{"key":"28_CR33","doi-asserted-by":"crossref","unstructured":"Liu, Z., et al.: Swin transformer: hierarchical vision transformer using shifted windows. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 10012\u201310022 (2021)","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"28_CR34","doi-asserted-by":"crossref","unstructured":"\u00d6zdenizci, O., Legenstein, R.: Improving robustness against stealthy weight bit-flip attacks by output code matching. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 13388\u201313397 (2022)","DOI":"10.1109\/CVPR52688.2022.01303"},{"key":"28_CR35","doi-asserted-by":"publisher","unstructured":"Papernot, N., McDaniel, P., Wu, X., Jha, S., Swami, A.: Distillation as a defense to adversarial perturbations against deep neural networks. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 582\u2013597 (2016). https:\/\/doi.org\/10.1109\/SP.2016.41","DOI":"10.1109\/SP.2016.41"},{"key":"28_CR36","doi-asserted-by":"crossref","unstructured":"Prakash, A., Chitta, K., Geiger, A.: Multi-modal fusion transformer for end-to-end autonomous driving. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7077\u20137087 (2021)","DOI":"10.1109\/CVPR46437.2021.00700"},{"key":"28_CR37","doi-asserted-by":"crossref","unstructured":"Rakin, A.S., He, Z., Fan, D.: Bit-flip attack: crushing neural network with progressive bit search. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV) (2019)","DOI":"10.1109\/ICCV.2019.00130"},{"key":"28_CR38","doi-asserted-by":"crossref","unstructured":"Rakin, A.S., He, Z., Fan, D.: TBT: targeted neural network attack with bit trojan. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 13198\u201313207 (2020)","DOI":"10.1109\/CVPR42600.2020.01321"},{"issue":"11","key":"28_CR39","doi-asserted-by":"publisher","first-page":"7928","DOI":"10.1109\/TPAMI.2021.3112932","volume":"44","author":"AS Rakin","year":"2022","unstructured":"Rakin, A.S., He, Z., Li, J., Yao, F., Chakrabarti, C., Fan, D.: T-BFA: targeted bit-flip adversarial weight attack. IEEE Trans. Pattern Anal. Mach. Intell. 44(11), 7928\u20137939 (2022). https:\/\/doi.org\/10.1109\/TPAMI.2021.3112932","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"28_CR40","unstructured":"Rakin, A.S., Luo, Y., Xu, X., Fan, D.: Deep-dup: an adversarial weight duplication attack framework to crush deep neural network in Multi-tenant FPGA. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 1919\u20131936. USENIX Association (2021). https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/rakin"},{"key":"28_CR41","doi-asserted-by":"publisher","unstructured":"Roohi, A., Angizi, S.: Efficient targeted bit-flip attack against the local binary pattern network. In: 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 89\u201392 (2022). https:\/\/doi.org\/10.1109\/HOST54066.2022.9839959","DOI":"10.1109\/HOST54066.2022.9839959"},{"key":"28_CR42","doi-asserted-by":"crossref","unstructured":"Shamshad, F., et al.: Transformers in medical imaging: a survey. Med. Image Anal. 102802 (2023)","DOI":"10.1016\/j.media.2023.102802"},{"key":"28_CR43","unstructured":"Siraj\u00a0Rakin, A., et al.: RA-BNN: constructing robust and accurate binary neural network to simultaneously defend adversarial bit-flip attack and improve accuracy. arXiv e-prints pp. arXiv\u20132103 (2021)"},{"issue":"3","key":"28_CR44","doi-asserted-by":"publisher","first-page":"3632","DOI":"10.1109\/TPAMI.2022.3181972","volume":"45","author":"D Stutz","year":"2023","unstructured":"Stutz, D., Chandramoorthy, N., Hein, M., Schiele, B.: Random and adversarial bit error robustness: energy-efficient and secure DNN accelerators. IEEE Trans. Pattern Anal. Mach. Intell. 45(3), 3632\u20133647 (2023). https:\/\/doi.org\/10.1109\/TPAMI.2022.3181972","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"5","key":"28_CR45","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","volume":"23","author":"J Su","year":"2019","unstructured":"Su, J., Vargas, D.V., Sakurai, K.: One pixel attack for fooling deep neural networks. IEEE Trans. Evol. Comput. 23(5), 828\u2013841 (2019)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"28_CR46","unstructured":"Tatar, A., Konoth, R.K., Athanasopoulos, E., Giuffrida, C., Bos, H., Razavi, K.: Throwhammer: Rowhammer attacks over the network and defenses. In: 2018 USENIX Annual Technical Conference (USENIX ATC 18), pp. 213\u2013226. USENIX Association, Boston, MA (2018). https:\/\/www.usenix.org\/conference\/atc18\/presentation\/tatar"},{"key":"28_CR47","unstructured":"Touvron, H., Cord, M., Douze, M., Massa, F., Sablayrolles, A., J\u00e9gou, H.: Training data-efficient image transformers & distillation through attention. In: International Conference on Machine Learning, pp. 10347\u201310357. PMLR (2021)"},{"key":"28_CR48","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"28_CR49","unstructured":"Waibel, A., Hanazawa, T., Hinton, G., Shikano, K., Lang, K.J.: Phoneme recognition using time-delay neural networks. In: Backpropagation, pp. 35\u201361. Psychology Press (2013)"},{"key":"28_CR50","unstructured":"Wang, J., et al.: Aegis: mitigating targeted bit-flip attacks against deep neural networks. arXiv preprint arXiv:2302.13520 (2023)"},{"key":"28_CR51","doi-asserted-by":"crossref","unstructured":"Wu, H., et al.: CVT: introducing convolutions to vision transformers. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 22\u201331 (2021)","DOI":"10.1109\/ICCV48922.2021.00009"},{"key":"28_CR52","doi-asserted-by":"publisher","unstructured":"Yang, L.H., Huang, S.S., Cheng, T.L., Kuo, Y.C., Kuo, J.J.: Socially-aware collaborative defense system against bit-flip attack in social internet of things and its online assignment optimization. In: 2022 International Conference on Computer Communications and Networks (ICCCN), pp. 1\u201310 (2022). https:\/\/doi.org\/10.1109\/ICCCN54977.2022.9868899","DOI":"10.1109\/ICCCN54977.2022.9868899"},{"key":"28_CR53","unstructured":"Yao, F., Rakin, A.S., Fan, D.: DeepHammer: depleting the intelligence of deep neural networks through targeted chain of bit flips. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 1463\u20131480. USENIX Association (2020). https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/yao"},{"key":"28_CR54","unstructured":"Zhang, W., Tanida, J., Itoh, K., Ichioka, Y.: Shift-invariant pattern recognition neural network and its optical architecture. In: Proceedings of Annual Conference of the Japan Society of Applied Physics, vol.\u00a0564. Montreal, CA (1988)"},{"key":"28_CR55","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Chen, D., Kundu, S., Li, C., Beerel, P.A.: Sal-ViT: towards latency efficient private inference on ViT using selective attention search with a learnable softmax approximation. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 5116\u20135125 (2023)","DOI":"10.1109\/ICCV51070.2023.00472"},{"key":"28_CR56","doi-asserted-by":"crossref","unstructured":"Zhou, R., Ahmed, S., Rakin, A.S., Angizi, S.: DNN-defender: an in-dram deep neural network defense mechanism for adversarial weight attack (2023)","DOI":"10.1145\/3649329.3656222"},{"key":"28_CR57","doi-asserted-by":"crossref","unstructured":"Z\u00fcgner, D., Akbarnejad, A., G\u00fcnnemann, S.: Adversarial attacks on neural networks for graph data. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. pp. 2847\u20132856 (2018)","DOI":"10.1145\/3219819.3220078"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78186-5_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T15:17:29Z","timestamp":1732893449000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78186-5_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,30]]},"ISBN":["9783031781858","9783031781865"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78186-5_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,30]]},"assertion":[{"value":"30 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icpr2024.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}