{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T05:40:23Z","timestamp":1761543623190,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031999901"},{"type":"electronic","value":"9783031999918"}],"license":[{"start":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:00:00Z","timestamp":1761609600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:00:00Z","timestamp":1761609600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-99991-8_8","type":"book-chapter","created":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T05:35:56Z","timestamp":1761543356000},"page":"156-179","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Certified Error Analysis of\u00a0Homomorphically Encrypted Neural Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7618-7401","authenticated-orcid":false,"given":"Philipp","family":"Kern","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0028-5440","authenticated-orcid":false,"given":"Edoardo","family":"Manino","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9718-1802","authenticated-orcid":false,"given":"Carsten","family":"Sinz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,10,28]]},"reference":[{"key":"8_CR1","unstructured":"Albrecht, M., et al.: Homomorphic encryption standard. Cryptology ePrint Archive, Paper 2019\/939 (2019). https:\/\/eprint.iacr.org\/2019\/939"},{"key":"8_CR2","unstructured":"Anguita, D., Ghio, A., Oneto, L., Parra, X., Reyes-Ortiz, J.L.: A public domain dataset for human activity recognition using smartphones. In: 21st European Symposium on Artificial Neural Networks, ESANN 2013, Bruges, Belgium, April 24\u201326, 2013 (2013). https:\/\/www.esann.org\/sites\/default\/files\/proceedings\/legacy\/es2013-84.pdf"},{"key":"8_CR3","unstructured":"Armknecht, F., et al.: A guide to fully homomorphic encryption. Cryptology ePrint Archive, Paper 2015\/1192 (2015). https:\/\/eprint.iacr.org\/2015\/1192"},{"key":"8_CR4","doi-asserted-by":"publisher","unstructured":"Arya, V., et al.: AI explainability 360: impact and design. In: Thirty-Sixth AAAI Conference on Artificial Intelligence, AAAI 2022, Thirty-Fourth Conference on Innovative Applications of Artificial Intelligence, IAAI 2022, The Twelveth Symposium on Educational Advances in Artificial Intelligence, EAAI 2022 Virtual Event, February 22\u2013March 1, 2022, pp. 12651\u201312657. AAAI Press (2022). https:\/\/doi.org\/10.1609\/AAAI.V36I11.21540","DOI":"10.1609\/AAAI.V36I11.21540"},{"key":"8_CR5","doi-asserted-by":"publisher","unstructured":"Bezanson, J., Edelman, A., Karpinski, S., Shah, V.B.: Julia: a fresh approach to numerical computing. SIAM Rev. 59(1), 65\u201398 (2017). https:\/\/doi.org\/10.1137\/141000671","DOI":"10.1137\/141000671"},{"key":"8_CR6","unstructured":"Bossuat, J.P., et al.: Security guidelines for implementing homomorphic encryption. Cryptology ePrint Archive, Paper 2024\/463 (2024). https:\/\/eprint.iacr.org\/2024\/463"},{"key":"8_CR7","doi-asserted-by":"publisher","unstructured":"Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: Ostrovsky, R. (ed.) IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011, Palm Springs, CA, USA, October 22\u201325, 2011, pp. 97\u2013106. IEEE Computer Society (2011). https:\/\/doi.org\/10.1109\/FOCS.2011.12","DOI":"10.1109\/FOCS.2011.12"},{"key":"8_CR8","doi-asserted-by":"publisher","unstructured":"Brakerski, Z., Vaikuntanathan, V.: Fully homomorphic encryption from ring-lwe and security for key dependent messages. In: Rogaway, P. (ed.) Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14\u201318, 2011. Proceedings. Lecture Notes in Computer Science, vol.\u00a06841, pp. 505\u2013524. Springer (2011). https:\/\/doi.org\/10.1007\/978-3-642-22792-9_29","DOI":"10.1007\/978-3-642-22792-9_29"},{"issue":"3","key":"8_CR9","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/s10009-023-00703-4","volume":"25","author":"C Brix","year":"2023","unstructured":"Brix, C., M\u00fcller, M.N., Bak, S., Johnson, T.T., Liu, C.: First three years of the international verification of neural networks competition (VNN-COMP). Int. J. Softw. Tools Technol. Transf. 25(3), 329\u2013339 (2023)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"8_CR10","unstructured":"Chabanne, H., de\u00a0Wargny, A., Milgram, J., Morel, C., Prouff, E.: Privacy-preserving classification on deep neural network. Cryptology ePrint Archive, Paper 2017\/035 (2017). https:\/\/eprint.iacr.org\/2017\/035"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-319-70694-8_15","volume-title":"Advances in Cryptology - ASIACRYPT 2017","author":"JH Cheon","year":"2017","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: Takagi, T., Peyrin, T. (eds.) Advances in Cryptology - ASIACRYPT 2017, pp. 409\u2013437. Springer International Publishing, Cham (2017)"},{"key":"8_CR12","first-page":"1","volume-title":"Cyber Security Cryptography and Machine Learning","author":"I Chillotti","year":"2021","unstructured":"Chillotti, I., Joye, M., Paillier, P.: Programmable bootstrapping enables efficient homomorphic inference of deep neural networks. In: Dolev, S., Margalit, O., Pinkas, B., Schwarzmann, A. (eds.) Cyber Security Cryptography and Machine Learning, pp. 1\u201319. Springer International Publishing, Cham (2021)"},{"key":"8_CR13","doi-asserted-by":"publisher","unstructured":"Clenshaw, C.W.: A note on the summation of chebyshev series. Math. Comput. 9, 118\u2013120 (1955). https:\/\/doi.org\/10.1090\/S0025-5718-1955-0071856-0","DOI":"10.1090\/S0025-5718-1955-0071856-0"},{"key":"8_CR14","unstructured":"Comba, J.L.D., Stolfi, J.: Affine arithmetic and its applications to computer graphics. In: SIBGRAPI 1993, Recife, PE (Brazil) (1993)"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-031-53368-6_16","volume-title":"Selected Areas in Cryptography - SAC 2023","author":"A Costache","year":"2024","unstructured":"Costache, A., Curtis, B.R., Hales, E., Murphy, S., Ogilvie, T., Player, R.: On the precision loss in approximate homomorphic encryption. In: Carlet, C., Mandal, K., Rijmen, V. (eds.) Selected Areas in Cryptography - SAC 2023, pp. 325\u2013345. Springer Nature Switzerland, Cham (2024)"},{"key":"8_CR16","unstructured":"Driscoll, T.A., Hale, N., Trefethen, L.N.: Chebfun Guide. Pafnuty Publications (2014). http:\/\/www.chebfun.org\/docs\/guide\/"},{"key":"8_CR17","doi-asserted-by":"publisher","unstructured":"Eleftheriadis, C., Kekatos, N., Katsaros, P., Tripakis, S.: On neural network equivalence checking using SMT solvers. In: Bogomolov, S., Parker, D. (eds.) Formal Modeling and Analysis of Timed Systems - 20th International Conference, FORMATS 2022, Warsaw, Poland, September 13\u201315, 2022, Proceedings. LNCS, vol. 13465, pp. 237\u2013257. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-15839-1_14","DOI":"10.1007\/978-3-031-15839-1_14"},{"key":"8_CR18","unstructured":"FICO: Fico explainable machine learning challenge (2018). https:\/\/community.fico.com\/s\/explainable-machinelearning-challenge"},{"key":"8_CR19","unstructured":"Garimella, K., Jha, N.K., Reagen, B.: Sisyphus: a cautionary tale of using low-degree polynomial activations in privacy-preserving deep learning. arXiv:2107.12342 (2021)"},{"key":"8_CR20","doi-asserted-by":"publisher","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Mitzenmacher, M. (ed.) Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31\u2013June 2, 2009, pp. 169\u2013178. ACM (2009). https:\/\/doi.org\/10.1145\/1536414.1536440","DOI":"10.1145\/1536414.1536440"},{"key":"8_CR21","doi-asserted-by":"publisher","unstructured":"Ghorbal, K., Goubault, E., Putot, S.: The zonotope abstract domain taylor1+. In: Bouajjani, A., Maler, O. (eds.) Computer Aided Verification, 21st International Conference, CAV 2009, Grenoble, France, June 26\u2013July 2, 2009. Proceedings. Lecture Notes in Computer Science, vol.\u00a05643, pp. 627\u2013633. Springer (2009). https:\/\/doi.org\/10.1007\/978-3-642-02658-4_47","DOI":"10.1007\/978-3-642-02658-4_47"},{"key":"8_CR22","unstructured":"Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K., Naehrig, M., Wernsing, J.: Cryptonets: applying neural networks to encrypted data with high throughput and accuracy. In: Balcan, M.F., Weinberger, K.Q. (eds.) Proceedings of The 33rd International Conference on Machine Learning. Proceedings of Machine Learning Research, vol.\u00a048, pp. 201\u2013210. PMLR, New York, New York, USA (2016). https:\/\/proceedings.mlr.press\/v48\/gilad-bachrach16.html"},{"key":"8_CR23","doi-asserted-by":"publisher","unstructured":"Kleine B\u00fcning, M., Kern, P., Sinz, C.: Verifying equivalence properties of neural networks with ReLU activation functions. In: Simonis, H. (ed.) Principles and Practice of Constraint Programming - 26th International Conference, CP 2020, Louvain-la-Neuve, Belgium, September 7\u201311, 2020, Proceedings. LNCS, vol. 12333, pp. 868\u2013884. Springer (2020). https:\/\/doi.org\/10.1007\/978-3-030-58475-7_50","DOI":"10.1007\/978-3-030-58475-7_50"},{"issue":"11","key":"8_CR24","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y Lecun","year":"1998","unstructured":"Lecun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998). https:\/\/doi.org\/10.1109\/5.726791","journal-title":"Proc. IEEE"},{"issue":"6","key":"8_CR25","doi-asserted-by":"publisher","first-page":"3711","DOI":"10.1109\/TDSC.2021.3105111","volume":"19","author":"E Lee","year":"2022","unstructured":"Lee, E., Lee, J.W., No, J.S., Kim, Y.S.: Minimax approximation of sign function by composite polynomial for homomorphic comparison. IEEE Trans. Dependable Secure Comput. 19(6), 3711\u20133727 (2022). https:\/\/doi.org\/10.1109\/TDSC.2021.3105111","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"8_CR26","doi-asserted-by":"publisher","unstructured":"Lee, J.W., et al.: Privacy-preserving machine learning with fully homomorphic encryption for deep neural network. IEEE Access 10, 30039\u201330054 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3159694","DOI":"10.1109\/ACCESS.2022.3159694"},{"key":"8_CR27","doi-asserted-by":"publisher","unstructured":"Lee, J., Lee, E., Lee, J.W., Kim, Y., Kim, Y.S., No, J.S.: Precise approximation of convolutional neural networks for homomorphically encrypted data. IEEE Access 11, 62062\u201362076 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3287564","DOI":"10.1109\/ACCESS.2023.3287564"},{"key":"8_CR28","doi-asserted-by":"publisher","unstructured":"Manino, E., Magri, B., Mustafa, M., Cordeiro, L.: Certified private inference on neural networks via Lipschitz-guided abstraction refinement. In: Narodytska, N., Amir, G., Katz, G., Isac, O. (eds.) Proceedings of the 6th Workshop on Formal Methods for ML-Enabled Autonomous Systems. Kalpa Publications in Computing, vol.\u00a016, pp. 35\u201346. EasyChair (2023). https:\/\/doi.org\/10.29007\/59w3","DOI":"10.29007\/59w3"},{"key":"8_CR29","unstructured":"Mishra, P., Lehmkuhl, R., Srinivasan, A., Zheng, W., Popa, R.A.: Delphi: a cryptographic inference service for neural networks. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 2505\u20132522. USENIX Association (2020). https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/mishra"},{"key":"8_CR30","doi-asserted-by":"publisher","unstructured":"Obla, S., Gong, X., Aloufi, A., Hu, P., Takabi, D.: Effective activation functions for homomorphic evaluation of deep neural networks. IEEE Access 8, 153098\u2013153112 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3017436","DOI":"10.1109\/ACCESS.2020.3017436"},{"key":"8_CR31","doi-asserted-by":"publisher","unstructured":"Pach\u00f3n, R., Trefethen, L.N.: Barycentric-remez algorithms for best polynomial approximation in the chebfun system. BIT Numer. Math. 49, 721\u2013741 (2009). https:\/\/doi.org\/10.1007\/s10543-009-0240-1","DOI":"10.1007\/s10543-009-0240-1"},{"key":"8_CR32","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2013 EUROCRYPT \u201999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) Advances in Cryptology \u2013 EUROCRYPT \u201999, pp. 223\u2013238. Springer, Berlin Heidelberg (1999)"},{"key":"8_CR33","doi-asserted-by":"publisher","unstructured":"Paulsen, B., Wang, J., Wang, C.: ReluDiff: differential verification of deep neural networks. In: Rothermel, G., Bae, D. (eds.) ICSE 2020: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June\u201319 July, 2020, pp. 714\u2013726. ACM (2020). https:\/\/doi.org\/10.1145\/3377811.3380337","DOI":"10.1145\/3377811.3380337"},{"key":"8_CR34","doi-asserted-by":"publisher","unstructured":"Paulsen, B., Wang, J., Wang, J., Wang, C.: NeuroDiff: scalable differential verification of neural networks using fine-grained approximation. In: 35th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2020, Melbourne, Australia, September 21\u201325, 2020, pp. 784\u2013796. IEEE (2020). https:\/\/doi.org\/10.1145\/3324884.3416560","DOI":"10.1145\/3324884.3416560"},{"issue":"3","key":"8_CR35","doi-asserted-by":"publisher","first-page":"1666","DOI":"10.1007\/s12083-021-01076-8","volume":"14","author":"B Pulido-Gaytan","year":"2021","unstructured":"Pulido-Gaytan, B., et al.: Privacy-preserving neural networks with homomorphic encryption: challenges and opportunities. Peer-to-Peer Networking Appl. 14(3), 1666\u20131691 (2021)","journal-title":"Peer-to-Peer Networking Appl."},{"key":"8_CR36","first-page":"2063","volume":"198","author":"E Remes","year":"1934","unstructured":"Remes, E.: Sur un proc\u00e9d\u00e9 convergent d\u2019approximations successives pour d\u00e9terminer les polyn\u00f4mes d\u2019approximation. CR Acad. Sci. Paris 198, 2063\u20132065 (1934)","journal-title":"CR Acad. Sci. Paris"},{"key":"8_CR37","doi-asserted-by":"publisher","unstructured":"Ribeiro, M., Grolinger, K., Capretz, M.A.: Mlaas: machine learning as a service. In: 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA), pp. 896\u2013902 (2015). https:\/\/doi.org\/10.1109\/ICMLA.2015.152","DOI":"10.1109\/ICMLA.2015.152"},{"key":"8_CR38","doi-asserted-by":"publisher","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978). https:\/\/doi.org\/10.1145\/359340.359342","DOI":"10.1145\/359340.359342"},{"issue":"5","key":"8_CR39","doi-asserted-by":"publisher","first-page":"2450025","DOI":"10.1142\/S0129065724500254","volume":"34","author":"L Rovida","year":"2024","unstructured":"Rovida, L., Leporati, A.: Encrypted image classification with low memory footprint using fully homomorphic encryption. Int. J. Neural Syst. 34(5), 2450025 (2024). https:\/\/doi.org\/10.1142\/S0129065724500254","journal-title":"Int. J. Neural Syst."},{"key":"8_CR40","unstructured":"Shi, Z., Wang, Y., Zhang, H., Kolter, J.Z., Hsieh, C.J.: Efficiently computing local lipschitz constants of neural networks via bound propagation. In: Koyejo, S., Mohamed, S., Agarwal, A., Belgrave, D., Cho, K., Oh, A. (eds.) Advances in Neural Information Processing Systems, vol.\u00a035, pp. 2350\u20132364. Curran Associates, Inc. (2022). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2022\/file\/0ff54b4ec4f70b3ae12c8621ca8a49f4-Paper-Conference.pdf"},{"key":"8_CR41","unstructured":"Singh, G., Gehr, T., Mirman, M., P\u00fcschel, M., Vechev, M.T.: Fast and effective robustness certification. In: Bengio, S., Wallach, H.M., Larochelle, H., Grauman, K., Cesa-Bianchi, N., Garnett, R. (eds.) Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, December 3\u20138, 2018, Montr\u00e9al, Canada, pp. 10825\u201310836 (2018). https:\/\/proceedings.neurips.cc\/paper\/2018\/hash\/f2f446980d8e971ef3da97af089481c3-Abstract.html"},{"key":"8_CR42","doi-asserted-by":"publisher","unstructured":"Teuber, S., B\u00fcning, M.K., Kern, P., Sinz, C.: Geometric path enumeration for equivalence verification of neural networks. In: 33rd IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2021, Washington, DC, USA, November 1\u20133, 2021, pp. 200\u2013208. IEEE (2021). https:\/\/doi.org\/10.1109\/ICTAI52525.2021.00035","DOI":"10.1109\/ICTAI52525.2021.00035"},{"key":"8_CR43","doi-asserted-by":"crossref","unstructured":"Teuber, S., Kern, P., Janzen, M., Beckert, B.: Revisiting differential verification: equivalence verification with confidence. CoRR arXiv:2410.20207 (2024)","DOI":"10.1007\/978-3-031-90653-4_13"},{"key":"8_CR44","doi-asserted-by":"crossref","unstructured":"Trefethen, L.N.: Approximation Theory and Approximation Practice, Extended Edition. SIAM (2019)","DOI":"10.1137\/1.9781611975949"},{"key":"8_CR45","unstructured":"Weng, L., et al.: Towards fast computation of certified robustness for ReLU networks. In: Dy, J., Krause, A. (eds.) Proceedings of the 35th International Conference on Machine Learning. Proceedings of Machine Learning Research, vol.\u00a080, pp. 5276\u20135285. PMLR (2018). https:\/\/proceedings.mlr.press\/v80\/weng18a.html"},{"key":"8_CR46","unstructured":"Xiao, K.Y., Tjeng, V., Shafiullah, N.M.M., Madry, A.: Training for faster adversarial robustness verification via inducing ReLu stability. In: 7th International Conference on Learning Representations, ICLR 2019, New Orleans, LA, USA, May 6\u20139, 2019. OpenReview.net (2019). https:\/\/openreview.net\/forum?id=BJfIVjAcKm"}],"container-title":["Lecture Notes in Computer Science","AI Verification"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-99991-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T05:36:02Z","timestamp":1761543362000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-99991-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,28]]},"ISBN":["9783031999901","9783031999918"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-99991-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,28]]},"assertion":[{"value":"28 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"SAIV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on AI Verification","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zagreb","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Croatia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"saiv2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aiverification.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}