{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T00:26:22Z","timestamp":1759883182917,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":52,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032060686","type":"print"},{"value":"9783032060693","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T00:00:00Z","timestamp":1759881600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T00:00:00Z","timestamp":1759881600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-06069-3_26","type":"book-chapter","created":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T15:54:55Z","timestamp":1759852495000},"page":"330-344","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Semi-supervised Subspace Learning for\u00a0Outlier Detection in\u00a0Big Data"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-7045-3998","authenticated-orcid":false,"given":"Muhammad","family":"Rajabinasab","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9228-2417","authenticated-orcid":false,"given":"Anton D.","family":"Lautrup","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4000-5570","authenticated-orcid":false,"given":"Peter","family":"Schneider-Kamp","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7713-4208","authenticated-orcid":false,"given":"Arthur","family":"Zimek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,8]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Akcay, S., Atapour-Abarghouei, A., Breckon, T.P.: GANomaly: semi-supervised anomaly detection via adversarial training. Asian Conf. Comput. Vis. 622\u2013637 (2018)","DOI":"10.1007\/978-3-030-20893-6_39"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Anderberg, A., et al.: Dimensionality-aware outlier detection. In: Proceedings of 2024 SIAM International Conference on Data Mining (SDM), pp. 652\u2013660. SIAM (2024)","DOI":"10.1137\/1.9781611978032.75"},{"key":"26_CR3","volume-title":"Outliers in Statistical Data","author":"V Barnett","year":"1994","unstructured":"Barnett, V., Lewis, T.: Outliers in Statistical Data, 3rd edn. John Wiley & Sons, Chichester (1994)","edition":"3"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Bhattacharya, A., Varambally, S., Bagchi, A., Bedathur, S.: Fast one-class classification using class boundary-preserving random projections. In: KDD (2021)","DOI":"10.1145\/3447548.3467440"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: Proceedings of 2000 ACM SIGMOD International Conference on Management of Data, pp. 93\u2013104 (2000)","DOI":"10.1145\/342009.335388"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Cabero, I., Epifanio, I., Pi\u00e9rola, A., Ballester, A.: Archetype analysis: a new subspace outlier detection approach. Knowl.-Based Syst. 217, 106830 (2021)","DOI":"10.1016\/j.knosys.2021.106830"},{"issue":"4","key":"26_CR7","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1007\/s10618-015-0444-8","volume":"30","author":"GO Campos","year":"2016","unstructured":"Campos, G.O., et al.: On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study. Data Min. Knowl. Disc. 30(4), 891\u2013927 (2016). https:\/\/doi.org\/10.1007\/s10618-015-0444-8","journal-title":"Data Min. Knowl. Disc."},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Caroline\u00a0Cynthia, P., Thomas\u00a0George, S.: An outlier detection approach on credit card fraud detection using machine learning: a comparative analysis on supervised and unsupervised learning. In: Intell. Big Data Technol.\u2014Beyond Hype: Proc. ICBDCC 2019, pp. 125\u2013135. Springer (2021)","DOI":"10.1007\/978-981-15-5285-4_12"},{"issue":"10","key":"26_CR9","doi-asserted-by":"publisher","first-page":"4915","DOI":"10.1016\/j.eswa.2014.02.026","volume":"41","author":"A Pozzolo","year":"2014","unstructured":"Pozzolo, A., Caelen, O., Borgne, Y.A., Waterschoot, S., Bontempi, G.: Learned lessons in credit card fraud detection from a practitioner perspective. Expert Syst. Appl. 41(10), 4915\u20134928 (2014)","journal-title":"Expert Syst. Appl."},{"key":"26_CR10","unstructured":"Deli\u0107, A., Grci\u0107, M., \u0160egvi\u0107, S.: Outlier detection by ensembling uncertainty with negative objectness. arXiv preprint arXiv:2402.15374 (2024)"},{"key":"26_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121161","volume":"236","author":"X Du","year":"2024","unstructured":"Du, X., Chen, J., Yu, J., Li, S., Tan, Q.: Generative adversarial nets for unsupervised outlier detection. Expert Syst. Appl. 236, 121161 (2024)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"26_CR12","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s10707-024-00522-y","volume":"29","author":"MM Garcez Duarte","year":"2025","unstructured":"Garcez Duarte, M.M., Sakr, M.: An experimental study of existing tools for outlier detection and cleaning in trajectories. GeoInformatica 29(1), 31\u201351 (2025)","journal-title":"GeoInformatica"},{"key":"26_CR13","volume-title":"Deep Learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press, Cambridge, MA, USA (2016)"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Grubov, V.V., et al.: Two-stage approach with combination of outlier detection method and deep learning enhances automatic epileptic seizure detection. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3453039"},{"key":"26_CR15","doi-asserted-by":"publisher","unstructured":"Hautamaki, V., Karkkainen, I., Franti, P.: Outlier detection using k-nearest neighbour graph. In: Proceedings of 17th International Conference on Pattern Recognition (ICPR 2004). vol.\u00a03, pp. 430\u2013433 (2004). https:\/\/doi.org\/10.1109\/ICPR.2004.1334558","DOI":"10.1109\/ICPR.2004.1334558"},{"key":"26_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4","volume-title":"Identification of Outliers","author":"DM Hawkins","year":"1980","unstructured":"Hawkins, D.M.: Identification of Outliers. Chapman and Hall, London (1980)"},{"key":"26_CR17","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1016\/j.ins.2021.08.010","volume":"579","author":"F Jin","year":"2021","unstructured":"Jin, F., Chen, M., Zhang, W., Yuan, Y., Wang, S.: Intrusion detection on internet of vehicles via combining log-ratio oversampling, outlier detection and metric learning. Inf. Sci. 579, 814\u2013831 (2021)","journal-title":"Inf. Sci."},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Keller, F., Muller, E., Bohm, K.: HiCS: high contrast subspaces for density-based outlier ranking. In: 2012 IEEE 28th International Conference on Data Engineering, pp. 1037\u20131048 (2012)","DOI":"10.1109\/ICDE.2012.88"},{"key":"26_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2024.110846","volume":"156","author":"D Kim","year":"2024","unstructured":"Kim, D., Park, J., Chung, H.C., Jeong, S.: Unsupervised outlier detection using random subspace and subsampling ensembles of dirichlet process mixtures. Pattern Recognit. 156, 110846 (2024). https:\/\/doi.org\/10.1016\/j.patcog.2024.110846","journal-title":"Pattern Recognit."},{"key":"26_CR20","doi-asserted-by":"publisher","unstructured":"Kirner, E., Schubert, E., Zimek, A.: Good and bad neighborhood approximations for outlier detection ensembles. In: International Conference on Similarity Search and Applications (SISAP), pp. 173\u2013187 (2017). https:\/\/doi.org\/10.1007\/978-3-319-68474-1_12","DOI":"10.1007\/978-3-319-68474-1_12"},{"key":"26_CR21","volume-title":"Uci machine learning repository: Adult data set","author":"R Kohavi","year":"1996","unstructured":"Kohavi, R., Becker, B.: Uci machine learning repository: Adult data set. UCI Mach. Learn, Repos (1996)"},{"key":"26_CR22","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1007\/978-3-642-01307-2_86","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"H-P Kriegel","year":"2009","unstructured":"Kriegel, H.-P., Kr\u00f6ger, P., Schubert, E., Zimek, A.: Outlier detection in axis-parallel subspaces of high dimensional data. In: Theeramunkong, T., Kijsirikul, B., Cercone, N., Ho, T.-B. (eds.) PAKDD 2009. LNCS (LNAI), vol. 5476, pp. 831\u2013838. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01307-2_86"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Kriegel, H.P., Kr\u00f6ger, P., Schubert, E., Zimek, A.: Outlier detection in arbitrarily oriented subspaces. In: 2012 IEEE 12th International Conference on Data Mining, pp. 379\u2013388. IEEE (2012)","DOI":"10.1109\/ICDM.2012.21"},{"key":"26_CR24","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: Pereira, F., Burges, C.J.C., Bottou, L., Weinberger, K.Q. (eds.) Advance Neural Information Processing System, vol. 25. Curran Associates, Inc. (2012)"},{"key":"26_CR25","doi-asserted-by":"crossref","unstructured":"Li, J., Li, J., Wang, C., Verbeek, F.J., Schultz, T., Liu, H.: MS2OD: outlier detection using minimum spanning tree and medoid selection. Mach. Learn.: Sci. Technol. 5(1), 015025 (2024)","DOI":"10.1088\/2632-2153\/ad2492"},{"issue":"15","key":"26_CR26","doi-asserted-by":"publisher","first-page":"12345","DOI":"10.1109\/JIOT.2022.3156789","volume":"9","author":"W Li","year":"2022","unstructured":"Li, W., Zhang, H., Wang, L.: Anomaly detection in industrial IoT with machine learning: a survey. IEEE Internet Things J. 9(15), 12345\u201312360 (2022). https:\/\/doi.org\/10.1109\/JIOT.2022.3156789","journal-title":"IEEE Internet Things J."},{"key":"26_CR27","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: 2008 International Conference on Data Mining, pp. 413\u2013422 (2008)","DOI":"10.1109\/ICDM.2008.17"},{"key":"26_CR28","doi-asserted-by":"crossref","unstructured":"Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: Proceedings of IEEE International Conference on Computer Vision, pp. 3730\u20133738 (2015)","DOI":"10.1109\/ICCV.2015.425"},{"issue":"4","key":"26_CR29","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1109\/TPAMI.2018.2889473","volume":"42","author":"YA Malkov","year":"2018","unstructured":"Malkov, Y.A., Yashunin, D.A.: Efficient and robust approximate nearest neighbor search using hierarchical navigable small world graphs. IEEE Trans. Pattern Anal. Mach. Intell. 42(4), 824\u2013836 (2018)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"26_CR30","doi-asserted-by":"crossref","unstructured":"Marques, H.O., Swersky, L., Sander, J., Campello, R.J.G.B., Zimek, A.: On the evaluation of outlier detection and one-class classification: a comparative study of algorithms, model selection, and ensembles. Data Min. Knowl. Disc. 37(4), 1473\u20131517 (2023)","DOI":"10.1007\/s10618-023-00931-x"},{"issue":"8","key":"26_CR31","doi-asserted-by":"publisher","first-page":"1549","DOI":"10.1002\/sim.10008","volume":"43","author":"Z Meng","year":"2024","unstructured":"Meng, Z., Wang, J., Lin, L., Wu, C.: Sensitivity analysis with iterative outlier detection for systematic reviews and meta-analyses. Stat. Med. 43(8), 1549\u20131563 (2024)","journal-title":"Stat. Med."},{"key":"26_CR32","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems. Mil. Commun. Inf. Syst. Conf. 1\u20136 (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"26_CR33","doi-asserted-by":"publisher","unstructured":"Okkels, C.B., Aum\u00fcller, M., Zimek, A.: On the design of scalable outlier detection methods using approximate nearest neighbor graphs. In: Similarity Search Application 17th International Conference (SISAP), pp. 170\u2013184 (2024). https:\/\/doi.org\/10.1007\/978-3-031-75823-2_14","DOI":"10.1007\/978-3-031-75823-2_14"},{"key":"26_CR34","doi-asserted-by":"publisher","unstructured":"Rajabinasab, M., Lautrup, A., Zimek, A.: Metrics for Inter-Dataset Similarity with Example Applications in Synthetic Data and Feature Selection Evaluation. In: Proceedings of the 2025 SIAM International Conference on Data Mining (SDM), pp. 527\u2013537 (2025). https:\/\/doi.org\/10.1137\/1.9781611978520.57","DOI":"10.1137\/1.9781611978520.57"},{"key":"26_CR35","doi-asserted-by":"publisher","unstructured":"Rajabinasab, M., Pakdaman, F., Zimek, A., Gabbouj, M.: Randomized PCA forest for approximate k-nearest neighbor search. Expert Syst. Appl. 126254 (2024). https:\/\/doi.org\/10.1016\/j.eswa.2024.126254","DOI":"10.1016\/j.eswa.2024.126254"},{"key":"26_CR36","doi-asserted-by":"crossref","unstructured":"Ramaswamy, S., Rastogi, R., Shim, K.: Efficient algorithms for mining outliers from large data sets. In: Proceedings of 2000 ACM SIGMOD International Conference on Management of Data, pp. 427\u2013438 (2000)","DOI":"10.1145\/342009.335437"},{"key":"26_CR37","unstructured":"Ruff, L., et al.: Deep one-class classification. In: International Conference on Machine Learning, pp. 4393\u20134402. PMLR (2018)"},{"key":"26_CR38","doi-asserted-by":"crossref","unstructured":"Schubert, E., Zimek, A., Kriegel, H.P.: Fast and scalable outlier detection with approximate nearest neighbor ensembles. In: Proceedings of DASFAA (2015)","DOI":"10.1007\/978-3-319-18123-3_2"},{"key":"26_CR39","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/s10618-012-0300-z","volume":"28","author":"E Schubert","year":"2014","unstructured":"Schubert, E., Zimek, A., Kriegel, H.P.: Local outlier detection reconsidered: a generalized view on locality with applications to spatial, video, and network outlier detection. Data Min. Knowl. Disc. 28, 190\u2013237 (2014)","journal-title":"Data Min. Knowl. Disc."},{"key":"26_CR40","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSP, pp. 108\u2013116 (2018)","DOI":"10.5220\/0006639801080116"},{"key":"26_CR41","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD cup 99 data set. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"1","key":"26_CR42","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s10115-011-0430-4","volume":"32","author":"T de Vries","year":"2012","unstructured":"de Vries, T., Chawla, S., Houle, M.E.: Density-preserving projections for large-scale local anomaly detection. Knowl. Inf. Syst. 32(1), 25\u201352 (2012)","journal-title":"Knowl. Inf. Syst."},{"issue":"1","key":"26_CR43","doi-asserted-by":"publisher","first-page":"2077","DOI":"10.1109\/TIV.2023.3312654","volume":"9","author":"W Wang","year":"2023","unstructured":"Wang, W., Shangguan, W., Liu, J., Chen, J.: Enhanced fault detection for GNSS\/INS integration using maximum correntropy filter and local outlier factor. IEEE Trans. Intell. Veh. 9(1), 2077\u20132093 (2023)","journal-title":"IEEE Trans. Intell. Veh."},{"key":"26_CR44","doi-asserted-by":"crossref","unstructured":"Wang, Y., Parthasarathy, S., Tatikonda, S.: Locality sensitive outlier detection: a ranking driven approach. In: Proceedings of ICDE (2011)","DOI":"10.1109\/ICDE.2011.5767852"},{"key":"26_CR45","doi-asserted-by":"crossref","unstructured":"Yan, Y., Cao, L., Kulhman, C., Rundensteiner, E.: Distributed local outlier detection in big data. In: Proc. 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1225\u20131234 (2017)","DOI":"10.1145\/3097983.3098179"},{"key":"26_CR46","doi-asserted-by":"crossref","unstructured":"Yan, Y., Cao, L., Rundensteiner, E.A.: Distributed top-n local outlier detection in big data. In: 2017 IEEE International Conference on Big Data, pp. 827\u2013836. IEEE (2017)","DOI":"10.1109\/BigData.2017.8257998"},{"issue":"9","key":"26_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3571224","volume":"55","author":"L Zhang","year":"2023","unstructured":"Zhang, L., Liu, Y., Wang, W.: Deep learning for anomaly detection: a review of recent advances. ACM Comput. Surv. 55(9), 1\u201338 (2023). https:\/\/doi.org\/10.1145\/3571224","journal-title":"ACM Comput. Surv."},{"key":"26_CR48","doi-asserted-by":"crossref","unstructured":"Zhang, X., et al.: LSHiForest: a generic framework for fast tree isolation based ensemble anomaly analysis. In: Proceedings of ICDE (2017)","DOI":"10.1109\/ICDE.2017.145"},{"key":"26_CR49","unstructured":"Zhao, Y., Nasrullah, Z., Hryniewicki, M.K., Li, Z.: SUOD: Accelerating large-scale unsupervised heterogeneous outlier detection. arXiv preprint arXiv:1908.10788 (2019)"},{"key":"26_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.120286","volume":"662","author":"Y Zhou","year":"2024","unstructured":"Zhou, Y., Xia, H., Yu, D., Cheng, J., Li, J.: Outlier detection method based on high-density iteration. Inf. Sci. 662, 120286 (2024)","journal-title":"Inf. Sci."},{"key":"26_CR51","doi-asserted-by":"publisher","unstructured":"Zimek, A., Filzmoser, P.: There and back again: outlier detection between statistical reasoning and data mining algorithms. WIREs Data Min. Knowl. Disc. 8(6) (2018). https:\/\/doi.org\/10.1002\/WIDM.1280","DOI":"10.1002\/WIDM.1280"},{"issue":"5","key":"26_CR52","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1002\/sam.11161","volume":"5","author":"A Zimek","year":"2012","unstructured":"Zimek, A., Schubert, E., Kriegel, H.P.: A survey on unsupervised outlier detection in high-dimensional numerical data. Stat. Anal. Data Min. 5(5), 363\u2013387 (2012)","journal-title":"Stat. Anal. Data Min."}],"container-title":["Lecture Notes in Computer Science","Similarity Search and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-06069-3_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T15:55:14Z","timestamp":1759852514000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-06069-3_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,8]]},"ISBN":["9783032060686","9783032060693"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-06069-3_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,8]]},"assertion":[{"value":"8 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors declare no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"SISAP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Similarity Search and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Reykjavik","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Iceland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sisap2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.sisap.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}