{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T04:02:17Z","timestamp":1747108937904,"version":"3.40.5"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031927430","type":"print"},{"value":"9783031927447","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92744-7_10","type":"book-chapter","created":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T11:52:01Z","timestamp":1747050721000},"page":"140-162","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Anomaly Detection Using Fuzzy Information Entropy for\u00a0Incomplete Data"],"prefix":"10.1007","author":[{"given":"Yuhao","family":"Tang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1486-1982","authenticated-orcid":false,"given":"Chang","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7456-4445","authenticated-orcid":false,"given":"Zhong","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Chun","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Shihao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,13]]},"reference":[{"issue":"9","key":"10_CR1","doi-asserted-by":"publisher","first-page":"4052","DOI":"10.1109\/TKDE.2020.3036524","volume":"34","author":"Y Almardeny","year":"2020","unstructured":"Almardeny, Y., Boujnah, N., Cleary, F.: A novel outlier detection method for multivariate data. IEEE Trans. Knowl. Data Eng. 34(9), 4052\u20134062 (2020)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10_CR2","unstructured":"Auth, H.D.M.: Identification of Outliers. Identification of Outliers (1980)"},{"issue":"4","key":"10_CR3","doi-asserted-by":"publisher","first-page":"968","DOI":"10.1111\/coin.12156","volume":"34","author":"TR Bandaragoda","year":"2018","unstructured":"Bandaragoda, T.R., Ting, K.M., Albrecht, D., Liu, F.T., Zhu, Y., Wells, J.R.: Isolation-based anomaly detection using nearest-neighbor ensembles. Comput. Intell. 34(4), 968\u2013998 (2018)","journal-title":"Comput. Intell."},{"issue":"7","key":"10_CR4","doi-asserted-by":"publisher","first-page":"5317","DOI":"10.1007\/s10489-024-05428-8","volume":"54","author":"X Cai","year":"2024","unstructured":"Cai, X., Li, Z.: Outlier detection for incomplete real-valued data via information entropy and class-consistent technology. Appl. Intell. 54(7), 5317\u20135335 (2024)","journal-title":"Appl. Intell."},{"issue":"3","key":"10_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 1\u201358 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Chen, A., et al.: Generate vector graphics of fine-grained pattern based on the xception edge detection. In: Fourth International Conference on Computer Vision, Application, and Algorithm (CVAA 2024). vol. 13486, pp. 255\u2013261 (2025)","DOI":"10.1117\/12.3055748"},{"issue":"12","key":"10_CR7","doi-asserted-by":"publisher","first-page":"8745","DOI":"10.1016\/j.eswa.2010.06.040","volume":"37","author":"Y Chen","year":"2010","unstructured":"Chen, Y., Miao, D., Zhang, H.: Neighborhood outlier detection. Expert Syst. Appl. 37(12), 8745\u20138749 (2010)","journal-title":"Expert Syst. Appl."},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.ins.2013.04.023","volume":"241","author":"J Dai","year":"2013","unstructured":"Dai, J.: Rough set approach to incomplete numerical data. Inf. Sci. 241, 43\u201357 (2013)","journal-title":"Inf. Sci."},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.ins.2012.02.032","volume":"198","author":"J Dai","year":"2012","unstructured":"Dai, J., Xu, Q.: Approximations and uncertainty measures in incomplete information systems. Inf. Sci. 198, 62\u201380 (2012)","journal-title":"Inf. Sci."},{"issue":"1\u20132","key":"10_CR10","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.prevetmed.2015.04.006","volume":"122","author":"IR Dohoo","year":"2015","unstructured":"Dohoo, I.R.: Dealing with deficient and missing data. Prev. Vet. Med. 122(1\u20132), 221\u2013228 (2015)","journal-title":"Prev. Vet. Med."},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Dubey, A., Rasool, A.: Data mining based handling missing data. In: 2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pp. 483\u2013489 (2019)","DOI":"10.1109\/I-SMAC47947.2019.9032631"},{"issue":"2\u20133","key":"10_CR12","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1080\/03081079008935107","volume":"17","author":"D Dubois","year":"1990","unstructured":"Dubois, D., Prade, H.: Rough fuzzy sets and fuzzy rough sets. Int. J. General Syst. 17(2\u20133), 191\u2013209 (1990)","journal-title":"Int. J. General Syst."},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Goodge, A., Hooi, B., Ng, S.K., Ng, W.S.: Lunar: unifying local outlier detection methods via graph neural networks. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a036, pp. 6737\u20136745 (2022)","DOI":"10.1609\/aaai.v36i6.20629"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Jiang, F., Sui, Y., Cao, C.: Outlier detection using rough set theory. In: International Workshop on Rough Sets, Fuzzy Sets, Data Mining, and Granular-Soft Computing, pp. 79\u201387 (2005)","DOI":"10.1007\/11548706_9"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"2483","DOI":"10.1007\/s13042-018-0884-8","volume":"10","author":"F Jiang","year":"2019","unstructured":"Jiang, F., Zhao, H., Du, J., Xue, Y., Peng, Y.: Outlier detection based on approximation accuracy entropy. Int. J. Mach. Learn. Cybern. 10, 2483\u20132499 (2019)","journal-title":"Int. J. Mach. Learn. Cybern."},{"issue":"8","key":"10_CR16","doi-asserted-by":"publisher","first-page":"2850","DOI":"10.1109\/TFUZZ.2021.3076265","volume":"30","author":"A Kiersztyn","year":"2021","unstructured":"Kiersztyn, A., Karczmarek, P., Kiersztyn, K., Pedrycz, W.: Detection and classification of anomalies in large datasets on the basis of information granules. IEEE Trans. Fuzzy Syst. 30(8), 2850\u20132860 (2021)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"1\u20134","key":"10_CR17","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/S0020-0255(98)10019-1","volume":"112","author":"M Kryszkiewicz","year":"1998","unstructured":"Kryszkiewicz, M.: Rough set approach to incomplete information systems. Inf. Sci. 112(1\u20134), 39\u201349 (1998)","journal-title":"Inf. Sci."},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Li, M., Hu, J., Wang, X., Chen, H., Wen, X., Chen, A.: The use of style transfer based on the faceblit for the digital interaction of cultural heritage. In: 2024 IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp.\u00a01\u20135 (2024)","DOI":"10.1109\/AVSS61716.2024.10672576"},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.ins.2023.03.037","volume":"633","author":"R Li","year":"2023","unstructured":"Li, R., Chen, H., Liu, S., Li, X., Li, Y., Wang, B.: Incomplete mixed data-driven outlier detection based on local-global neighborhood information. Inf. Sci. 633, 204\u2013225 (2023)","journal-title":"Inf. Sci."},{"issue":"4","key":"10_CR20","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1080\/0308107021000013635","volume":"31","author":"J Liang","year":"2002","unstructured":"Liang, J., Chin, K.S., Dang, C., Yam, R.C.: A new method for measuring uncertainty and fuzziness in rough set theory. Int. J. Gen Syst 31(4), 331\u2013342 (2002)","journal-title":"Int. J. Gen Syst"},{"issue":"4","key":"10_CR21","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1080\/03081079.2022.2132491","volume":"52","author":"H Lin","year":"2023","unstructured":"Lin, H., Li, Z.: Outlier detection for set-valued data based on rough set theory and granular computing. Int. J. Gen Syst 52(4), 385\u2013413 (2023)","journal-title":"Int. J. Gen Syst"},{"key":"10_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.108198","volume":"133","author":"C Liu","year":"2024","unstructured":"Liu, C., Peng, D., Chen, H., Yuan, Z.: Attribute granules-based object entropy for outlier detection in nominal data. Eng. Appl. Artif. Intell. 133, 108198 (2024)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119400","volume":"646","author":"C Liu","year":"2023","unstructured":"Liu, C., Yuan, Z., Chen, B., Chen, H., Peng, D.: Fuzzy granular anomaly detection using Markov random walk. Inf. Sci. 646, 119400 (2023)","journal-title":"Inf. Sci."},{"issue":"1","key":"10_CR24","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1002\/nur.10015","volume":"25","author":"PA Patrician","year":"2002","unstructured":"Patrician, P.A.: Multiple imputation for missing data. Res. Nurs. Health 25(1), 76\u201384 (2002)","journal-title":"Res. Nurs. Health"},{"issue":"3","key":"10_CR25","first-page":"38","volume":"15","author":"Z Pawlak","year":"2001","unstructured":"Pawlak, Z., Polkowski, L., Skowron, A.: Rough set theory. KI 15(3), 38\u201339 (2001)","journal-title":"Rough set theory. KI"},{"key":"10_CR26","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s10994-015-5521-0","volume":"102","author":"T Pevn\u1ef3","year":"2016","unstructured":"Pevn\u1ef3, T.: Loda: lightweight on-line detector of anomalies. Mach. Learn. 102, 275\u2013304 (2016)","journal-title":"Mach. Learn."},{"key":"10_CR27","unstructured":"Ruff, L., et al.: Deep one-class classification. In: International Conference on Machine Learning, pp. 4393\u20134402 (2018)"},{"issue":"S2","key":"10_CR28","first-page":"626","volume":"50","author":"Y Shen","year":"2023","unstructured":"Shen, Y., Ban, R., Chen, X., Hua, R., Wang, Y.: Anomaly detection algorithm for network device configuration based on configuration statement tree. Comput. Sci. 50(S2), 626\u2013635 (2023)","journal-title":"Comput. Sci."},{"issue":"6","key":"10_CR29","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1177\/0165551505057012","volume":"31","author":"D Shi-fei","year":"2005","unstructured":"Shi-fei, D., Zhong-zhi, S.: Studies on incidence pattern recognition based on information entropy. J. Inf. Sci. 31(6), 497\u2013502 (2005)","journal-title":"J. Inf. Sci."},{"key":"10_CR30","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-540-48061-7_11","volume-title":"New Directions in Rough Sets, Data Mining, and Granular-Soft Computing","author":"J Stefanowski","year":"1999","unstructured":"Stefanowski, J., Tsouki\u00e0s, A.: On the extension of rough sets under incomplete information. In: Zhong, N., Skowron, A., Ohsuga, S. (eds.) RSFDGrC 1999. LNCS (LNAI), vol. 1711, pp. 73\u201381. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/978-3-540-48061-7_11"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Su, X., Wang, X., Peng, D., Chen, H., Chen, Y., Yuan, Z.: Granular-ball computing guided anomaly detection for hybrid attribute data. International Journal of Machine Learning and Cybernetics, pp. 1\u201316 (2024)","DOI":"10.1007\/s13042-024-02425-8"},{"key":"10_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.121016","volume":"678","author":"X Su","year":"2024","unstructured":"Su, X., Yuan, Z., Chen, B., Peng, D., Chen, H., Chen, Y.: Detecting anomalies with granular-ball fuzzy rough sets. Inf. Sci. 678, 121016 (2024)","journal-title":"Inf. Sci."},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Sun, Y., Dai, J., Ren, Z., Chen, Y., Peng, D., Hu, P.: Dual self-paced cross-modal hashing. In: Proceedings of the AAAI Conference on Artificial Intelligence. vol.\u00a038, pp. 15184\u201315192 (2024)","DOI":"10.1609\/aaai.v38i14.29441"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Sun, Y., Qin, Y., Li, Y., Peng, D., Peng, X., Hu, P.: Robust multi-view clustering with noisy correspondence. IEEE Transactions on Knowledge and Data Engineering (2024)","DOI":"10.1109\/TKDE.2024.3423307"},{"key":"10_CR35","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1109\/TMM.2023.3272169","volume":"26","author":"Y Sun","year":"2023","unstructured":"Sun, Y., Ren, Z., Hu, P., Peng, D., Wang, X.: Hierarchical consensus hashing for cross-modal retrieval. IEEE Trans. Multimedia 26, 824\u2013836 (2023)","journal-title":"IEEE Trans. Multimedia"},{"issue":"10","key":"10_CR36","first-page":"3097","volume":"44","author":"Y Tang","year":"2024","unstructured":"Tang, Y., Peng, D., Yuan, Z.: Fuzzy multi-granularity anomaly detection for incomplete mixed data. J. Comput. Appl. 44(10), 3097\u20133104 (2024)","journal-title":"J. Comput. Appl."},{"key":"10_CR37","doi-asserted-by":"crossref","unstructured":"Timcenko, V., Gajin, S.: Machine learning enhanced entropy-based network anomaly detection. Adv. Electr. Comput. Eng. 21(4) (2021)","DOI":"10.4316\/AECE.2021.04006"},{"key":"10_CR38","doi-asserted-by":"crossref","unstructured":"Wang, J.: Uncertainty measures of roughness based on interval ordered information systems. In: International Conference on Intelligent Computing, pp. 122\u2013130. Springer (2011)","DOI":"10.1007\/978-3-642-24728-6_17"},{"issue":"2","key":"10_CR39","first-page":"87","volume":"51","author":"M Xu","year":"2024","unstructured":"Xu, M., Jiang, G., Wang, W.: Label noise filtering framework based on outlier detection. Comput. Sci. 51(2), 87\u201399 (2024)","journal-title":"Comput. Sci."},{"issue":"2","key":"10_CR40","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/j.knosys.2010.09.003","volume":"24","author":"P Yang","year":"2011","unstructured":"Yang, P., Zhu, Q.: Finding key attribute subset in dataset for outlier detection. Knowl.-Based Syst. 24(2), 269\u2013274 (2011)","journal-title":"Knowl.-Based Syst."},{"issue":"6","key":"10_CR41","doi-asserted-by":"publisher","first-page":"1977","DOI":"10.1109\/TSMCC.2012.2236648","volume":"43","author":"JT Yao","year":"2013","unstructured":"Yao, J.T., Vasilakos, A.V., Pedrycz, W.: Granular computing: perspectives and challenges. IEEE Trans. Cybern. 43(6), 1977\u20131989 (2013)","journal-title":"IEEE Trans. Cybern."},{"key":"10_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.109995","volume":"134","author":"Z Yuan","year":"2023","unstructured":"Yuan, Z., Chen, B., Liu, J., Chen, H., Peng, D., Li, P.: Anomaly detection based on weighted fuzzy-rough density. Appl. Soft Comput. 134, 109995 (2023)","journal-title":"Appl. Soft Comput."},{"key":"10_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.fss.2020.10.017","volume":"421","author":"Z Yuan","year":"2021","unstructured":"Yuan, Z., Chen, H., Li, T., Liu, J., Wang, S.: Fuzzy information entropy-based adaptive approach for hybrid feature outlier detection. Fuzzy Sets Syst. 421, 1\u201328 (2021)","journal-title":"Fuzzy Sets Syst."},{"issue":"8","key":"10_CR44","doi-asserted-by":"publisher","first-page":"8399","DOI":"10.1109\/TCYB.2021.3058780","volume":"52","author":"Z Yuan","year":"2021","unstructured":"Yuan, Z., Chen, H., Li, T., Sang, B., Wang, S.: Outlier detection based on fuzzy rough granules in mixed attribute data. IEEE Trans. Cybern. 52(8), 8399\u20138412 (2021)","journal-title":"IEEE Trans. Cybern."},{"issue":"8","key":"10_CR45","doi-asserted-by":"publisher","first-page":"5175","DOI":"10.1109\/TSMC.2021.3119119","volume":"52","author":"Z Yuan","year":"2021","unstructured":"Yuan, Z., Chen, H., Li, T., Zhang, X., Sang, B.: Multigranulation relative entropy-based mixed attribute outlier detection in neighborhood systems. IEEE Trans. Syst., Man, Cybern.: Syst. 52(8), 5175\u20135187 (2021)","journal-title":"IEEE Trans. Syst., Man, Cybern.: Syst."},{"key":"10_CR46","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.inffus.2023.02.007","volume":"95","author":"Z Yuan","year":"2023","unstructured":"Yuan, Z., Chen, H., Luo, C., Peng, D.: MFGAD: multi-fuzzy granules anomaly detection. Inform. Fusion 95, 17\u201325 (2023)","journal-title":"Inform. Fusion"},{"issue":"07","key":"10_CR47","first-page":"1905","volume":"38","author":"Z Yuan","year":"2018","unstructured":"Yuan, Z., Feng, S.: Outlier detection algorithm based on neighborhood value difference metric. J. Comput. Appl. 38(07), 1905\u20131909 (2018)","journal-title":"J. Comput. Appl."},{"key":"10_CR48","doi-asserted-by":"crossref","unstructured":"Zadeh, L.A.: Fuzzy sets and information granularity. In: Fuzzy sets, fuzzy logic, and fuzzy systems: selected papers by Lotfi A Zadeh, pp. 433\u2013448. World Scientific (1996)","DOI":"10.1142\/9789814261302_0022"},{"key":"10_CR49","doi-asserted-by":"crossref","unstructured":"Zenati, H., Romain, M., Foo, C.S., Lecouat, B., Chandrasekhar, V.: Adversarially learned anomaly detection. In: 2018 IEEE International conference on data mining (ICDM), pp. 727\u2013736 (2018)","DOI":"10.1109\/ICDM.2018.00088"},{"key":"10_CR50","first-page":"463","volume":"3","author":"Y Zhao","year":"2021","unstructured":"Zhao, Y., et al.: Suod: accelerating large-scale unsupervised heterogeneous outlier detection. Proc. Mach. Learn. Syst. 3, 463\u2013478 (2021)","journal-title":"Proc. Mach. Learn. Syst."},{"issue":"2","key":"10_CR51","doi-asserted-by":"publisher","first-page":"266","DOI":"10.3390\/e24020266","volume":"24","author":"B Zolfaghari","year":"2022","unstructured":"Zolfaghari, B., Bibak, K., Koshiba, T.: The odyssey of entropy: cryptography. Entropy 24(2), 266 (2022)","journal-title":"Entropy"}],"container-title":["Lecture Notes in Computer Science","Rough Sets"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92744-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T11:52:15Z","timestamp":1747050735000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92744-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031927430","9783031927447"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92744-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"IJCRS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Joint Conference on Rough Sets","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chongqing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ijcrs2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ijcrs2025.cqupt.edu.cn","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}