{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T09:58:16Z","timestamp":1776333496372,"version":"3.51.2"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032087065","type":"print"},{"value":"9783032087072","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08707-2_17","type":"book-chapter","created":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T22:33:25Z","timestamp":1761431605000},"page":"363-386","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Deriving Liveness Properties of\u00a0Hybrid Systems from\u00a0Reachable Sets and\u00a0Lyapunov-Like Certificates"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8197-2001","authenticated-orcid":false,"given":"Ludovico","family":"Battista","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9091-7899","authenticated-orcid":false,"given":"Stefano","family":"Tonetta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,26]]},"reference":[{"issue":"1","key":"17_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/0304-3975(94)00202-T","volume":"138","author":"R Alur","year":"1995","unstructured":"Alur, R., et al.: The algorithmic analysis of hybrid systems. Theor. Comput. Sci. 138(1), 3\u201334 (1995)","journal-title":"Theor. Comput. Sci."},{"issue":"2","key":"17_CR2","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.tcs.2005.11.026","volume":"354","author":"R Alur","year":"2006","unstructured":"Alur, R., Dang, T., Ivan\u010di\u0107, F.: Counterexample-guided predicate abstraction of hybrid systems. Theor. Comput. Sci. 354(2), 250\u2013271 (2006)","journal-title":"Theor. Comput. Sci."},{"issue":"1","key":"17_CR3","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1146\/annurev-control-071420-081941","volume":"4","author":"M Althoff","year":"2021","unstructured":"Althoff, M., Frehse, G., Girard, A.: Set propagation techniques for reachability analysis. Ann. Rev. Control Rob. Auton. Syst. 4(1), 369\u2013395 (2021)","journal-title":"Ann. Rev. Control Rob. Auton. Syst."},{"key":"17_CR4","doi-asserted-by":"publisher","unstructured":"Abate, A., Giacobbe, M., Roy, D., Schnitzer, Y.: Model checking and strategy synthesis with abstractions and certificates, pp. 360\u2013391. Springer, Cham (2025). https:\/\/doi.org\/10.1007\/978-3-031-75775-4_16","DOI":"10.1007\/978-3-031-75775-4_16"},{"issue":"7","key":"17_CR5","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/5.871304","volume":"88","author":"R Alur","year":"2000","unstructured":"Alur, R., Henzinger, T.A., Lafferriere, G., Pappas, G.J.: Discrete abstractions of hybrid systems. Proc. IEEE 88(7), 971\u2013984 (2000)","journal-title":"Proc. IEEE"},{"key":"17_CR6","unstructured":"Althoff, M.: Reachability Analysis and its Application to the Safety Assessment of Autonomous Cars. PhD thesis, Technische Universit\u00e4t M\u00fcnchen (2010)"},{"key":"17_CR7","unstructured":"Althoff, M.: An introduction to CORA 2015. In: Proceedings of the 1st and 2nd Workshop on Applied Verification for Continuous and Hybrid Systems, pp. 120\u2013151. EasyChair (2015)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Anand, M., Murali, V., Trivedi, A., Zamani, M.: Safety verification of dynamical systems via k-inductive barrier certificates. In: 2021 60th IEEE Conference on Decision and Control (CDC), pp. 1314\u20131320 (2021)","DOI":"10.1109\/CDC45484.2021.9682889"},{"key":"17_CR9","doi-asserted-by":"publisher","unstructured":"Ahmed, D., Peruffo, A., Abate, A.: Automated and Sound Synthesis of Lyapunov Functions with SMT Solvers (2020). https:\/\/doi.org\/10.1007\/978-3-030-45190-5_6","DOI":"10.1007\/978-3-030-45190-5_6"},{"issue":"16","key":"17_CR10","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.ifacol.2018.08.025","volume":"51","author":"S Bak","year":"2018","unstructured":"Bak, S.: t-barrier certificates: a continuous analogy to k-induction. IFAC-PapersOnLine 51(16), 145\u2013150 (2018)","journal-title":"IFAC-PapersOnLine"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/978-3-030-99524-9_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"H Barbosa","year":"2022","unstructured":"Barbosa, H., et al.: cvc5: a versatile and industrial-strength SMT solver. In: TACAS 2022. LNCS, vol. 13243, pp. 415\u2013442. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99524-9_24"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Bogomolov, S., Forets, M., Frehse, G., Potomkin, K., Schilling, C.: Juliareach: a toolbox for set-based reachability. In: Proceedings of the 22nd ACM International Conference on Hybrid Systems: Computation and Control, HSCC \u201919, pp. 39\u201344. Association for Computing Machinery, New York (2019)","DOI":"10.1145\/3302504.3311804"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Bu, L., Kundu, A., Ray, R., Shi, Y.: Arch-comp24 category report: hybrid systems with piecewise constant dynamics and bounded model checking. In: Frehse, G., Althoff, M. (eds.) Proceedings of the 11th Int. Workshop on Applied Verification for Continuous and Hybrid Systems, vol. 103 of EPiC Series in Computing, pp. 1\u201314. EasyChair (2024)","DOI":"10.29007\/nv67"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Branicky, M.S.: Stability of switched and hybrid systems. In: Proceedings of 1994 33rd IEEE Conference on Decision and Control, vol. 4, pp. 3498\u20133503 (1994)","DOI":"10.1109\/CDC.1994.411688"},{"key":"17_CR15","unstructured":"Battista, L., Tonetta, S.: Artifact evaluation link. https:\/\/zenodo.org\/records\/15846315"},{"key":"17_CR16","unstructured":"Battista, L., Tonetta, S.: Extended version. https:\/\/es-static.fbk.eu\/people\/lbattista\/pages\/hybrid_ltl.html"},{"issue":"11","key":"17_CR17","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.ifacol.2024.07.422","volume":"58","author":"L Battista","year":"2024","unstructured":"Battista, L., Tonetta, S.: Formal verification of stability for parametric affine switched systems. IFAC-PapersOnLine 58(11), 37\u201342 (2024). https:\/\/doi.org\/10.1016\/j.ifacol.2024.07.422","journal-title":"IFAC-PapersOnLine"},{"issue":"9","key":"17_CR18","doi-asserted-by":"publisher","first-page":"284","DOI":"10.3182\/20120606-3-NL-3011.00063","volume":"45","author":"P Collins","year":"2012","unstructured":"Collins, P., Bresolin, D., Geretti, L., Villa, T.: Computing the evolution of hybrid systems using rigorous function calculus*. IFAC Proc. Vol. 45(9), 284\u2013290 (2012)","journal-title":"IFAC Proc. Vol."},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/978-3-319-08867-9_22","volume-title":"Computer Aided Verification","author":"R Cavada","year":"2014","unstructured":"Cavada, R., et al.: The nuXmv symbolic model checker. In: Biere, A., Bloem, R. (eds.) CAV 2014. LNCS, vol. 8559, pp. 334\u2013342. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08867-9_22"},{"key":"17_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1007\/978-3-319-08867-9_28","volume-title":"Computer Aided Verification","author":"A Cimatti","year":"2014","unstructured":"Cimatti, A., Griggio, A., Mover, S., Tonetta, S.: Verifying LTL properties of hybrid systems with K-Liveness. In: Biere, A., Bloem, R. (eds.) CAV 2014. LNCS, vol. 8559, pp. 424\u2013440. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08867-9_28"},{"key":"17_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-642-33365-1_6","volume-title":"Formal Modeling and Analysis of Timed Systems","author":"R Carter","year":"2012","unstructured":"Carter, R., Navarro-L\u00f3pez, E.M.: Dynamically-driven timed automaton abstractions for proving liveness of continuous systems. In: Jurdzi\u0144ski, M., Ni\u010dkovi\u0107, D. (eds.) FORMATS 2012. LNCS, vol. 7595, pp. 59\u201374. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33365-1_6"},{"key":"17_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-642-02658-4_17","volume-title":"Computer Aided Verification","author":"A Cimatti","year":"2009","unstructured":"Cimatti, A., Roveri, M., Tonetta, S.: Requirements validation for hybrid systems. In: Bouajjani, A., Maler, O. (eds.) CAV 2009. LNCS, vol. 5643, pp. 188\u2013203. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-02658-4_17"},{"key":"17_CR23","unstructured":"Claessen, K., S\u00f6rensson, N.: A liveness checking algorithm that counts. In: FMCAD, pp. 52\u201359. IEEE (2012)"},{"key":"17_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-60043-4_60","volume-title":"Algebraic Methodology and Software Technology","author":"L de Alfaro","year":"1995","unstructured":"de Alfaro, L., Manna, Z.: Verification in continuous time by discrete reasoning. In: Alagar, V.S., Nivat, M. (eds.) AMAST 1995. LNCS, vol. 936, pp. 292\u2013306. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/3-540-60043-4_60"},{"issue":"7","key":"17_CR25","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.1109\/5.871309","volume":"88","author":"RA Decarlo","year":"2000","unstructured":"Decarlo, R.A., Branicky, M.S., Pettersson, S., Lennartson, B.: Perspectives and results on the stability and stabilizability of hybrid systems. Proc. IEEE 88(7), 1069\u20131082 (2000)","journal-title":"Proc. IEEE"},{"issue":"1","key":"17_CR26","first-page":"79","volume":"22","author":"JAD Sandretto","year":"2016","unstructured":"Sandretto, J.A.D., Chapoutot, A.: Validated explicit and implicit Runge-Kutta methods. Reliable Comput. 22(1), 79\u2013103 (2016)","journal-title":"Reliable Comput."},{"key":"17_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-540-78800-3_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"L Moura","year":"2008","unstructured":"Moura, L., Bj\u00f8rner, N.: Z3: an efficient SMT solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 337\u2013340. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78800-3_24"},{"key":"17_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-540-24743-2_22","volume-title":"Hybrid Systems: Computation and Control","author":"A Fehnker","year":"2004","unstructured":"Fehnker, A., Ivan\u010di\u0107, F.: Benchmarks for hybrid systems verification. In: Alur, R., Pappas, G.J. (eds.) HSCC 2004. LNCS, vol. 2993, pp. 326\u2013341. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24743-2_22"},{"key":"17_CR29","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/978-3-319-21401-6_36","volume-title":"Automated Deduction - CADE-25","author":"N Fulton","year":"2015","unstructured":"Fulton, N., Mitsch, S., Quesel, J.-D., V\u00f6lp, M., Platzer, A.: KeYmaera\u00a0X: an axiomatic tactical theorem prover for hybrid systems. In: Felty, A.P., Middeldorp, A. (eds.) CADE 2015. LNCS (LNAI), vol. 9195, pp. 527\u2013538. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21401-6_36"},{"issue":"2","key":"17_CR30","doi-asserted-by":"publisher","first-page":"8966","DOI":"10.3182\/20080706-5-KR-1001.01514","volume":"41","author":"A Girard","year":"2008","unstructured":"Girard, A., Guernic, C.: Efficient reachability analysis for linear systems using support functions. IFAC Proc. Vol. 41(2), 8966\u20138971 (2008)","journal-title":"IFAC Proc. Vol."},{"key":"17_CR31","unstructured":"Gario, M., Micheli, A.: Pysmt: a solver-agnostic library for fast prototyping of smt-based algorithms. In: SMT Workshop 2015 (2015)"},{"key":"17_CR32","doi-asserted-by":"publisher","DOI":"10.1515\/9781400842636","volume-title":"Hybrid Dynamical Systems: Modeling, Stability, and Robustness","author":"R Goebel","year":"2012","unstructured":"Goebel, R., Sanfelice, R.G., Teel, A.R.: Hybrid Dynamical Systems: Modeling, Stability, and Robustness. Princeton University Press, New Jersey (2012)"},{"key":"17_CR33","doi-asserted-by":"crossref","unstructured":"Henzinger, T.A.: The theory of hybrid automata. In: Proceedings 11th Annual IEEE Symposium on Logic in Computer Science, pp. 278\u2013292 (1996)","DOI":"10.1109\/LICS.1996.561342"},{"key":"17_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.nahs.2020.100865","volume":"36","author":"H Han","year":"2020","unstructured":"Han, H., Sanfelice, R.G.: Linear temporal logic for hybrid dynamical systems: characterizations and sufficient conditions. Nonlinear Anal. Hybrid Syst 36, 100865 (2020)","journal-title":"Nonlinear Anal. Hybrid Syst"},{"key":"17_CR35","unstructured":"The\u00a0MathWorks Inc. Matlab version: 9.13.0 (r2022b) (2022)"},{"issue":"3","key":"17_CR36","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/s00498-014-0128-8","volume":"26","author":"CM Kellett","year":"2014","unstructured":"Kellett, C.M.: A compendium of comparison function results. Math. Control Signals Syst. 26(3), 339\u2013374 (2014). https:\/\/doi.org\/10.1007\/s00498-014-0128-8","journal-title":"Math. Control Signals Syst."},{"key":"17_CR37","volume-title":"Nonlinear Systems","author":"HK Khalil","year":"2002","unstructured":"Khalil, H.K.: Nonlinear Systems, 3rd edn. Prentice-Hall, Upper Saddle River (2002)","edition":"3"},{"key":"17_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1007\/11817963_39","volume-title":"Computer Aided Verification","author":"SK Lahiri","year":"2006","unstructured":"Lahiri, S.K., Nieuwenhuis, R., Oliveras, A.: SMT techniques for fast predicate abstraction. In: Ball, T., Jones, R.B. (eds.) CAV 2006. LNCS, vol. 4144, pp. 424\u2013437. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11817963_39"},{"key":"17_CR39","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1109\/OJCSYS.2023.3305835","volume":"2","author":"SP Nayak","year":"2023","unstructured":"Nayak, S.P., Egidio, L.N., Rossa, M.D., Schmuck, A.-K., Jungers, R.M.: Context-triggered abstraction-based control design. IEEE Open J. Control Syst. 2, 277\u2013296 (2023)","journal-title":"IEEE Open J. Control Syst."},{"key":"17_CR40","unstructured":"Oehlerking, J.: Decomposition of stability proofs for hybrid systems. PhD thesis, Universit\u00e4t Oldenburg (2011)"},{"key":"17_CR41","doi-asserted-by":"crossref","unstructured":"Pek, C., Althoff, M.: Efficient computation of invariably safe states for motion planning of self-driving vehicles. In: 2018 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS), pp. 3523\u20133530 (2018)","DOI":"10.1109\/IROS.2018.8593597"},{"key":"17_CR42","unstructured":"Parrilo, P.: Structured semidenite programs and semialgebraic geometry methods in robustness and optimization. PhD thesis (2000)"},{"issue":"4","key":"17_CR43","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s10009-012-0233-2","volume":"15","author":"E Plaku","year":"2013","unstructured":"Plaku, E., Kavraki, L.E., Vardi, M.Y.: Falsification of LTL safety properties in hybrid systems. Int. J. Softw. Tools Technol. Transf. 15(4), 305\u2013320 (2013)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"17_CR44","doi-asserted-by":"crossref","unstructured":"Pnueli, A.: The temporal logic of programs. In: FOCS, pp. 46\u201357. IEEE Computer Society (1977)","DOI":"10.1109\/SFCS.1977.32"},{"key":"17_CR45","unstructured":"PyVmt: a python library to interact with transition systems (2022). https:\/\/github.com\/pyvmt\/pyvmt. [Github repository]"},{"issue":"1","key":"17_CR46","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s10009-023-00707-0","volume":"26","author":"S Schupp","year":"2024","unstructured":"Schupp, S., Erika \u00c1brah\u00e1m, Md., Waez, T.B., Rambow, T., Qiu, Z.: On the applicability of hybrid systems safety verification tools from the automotive perspective. Int. J. Softw. Tools Technol. Transf. 26(1), 49\u201378 (2024)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"issue":"3\u20134","key":"17_CR47","first-page":"141","volume":"3","author":"R Sebastiani","year":"2007","unstructured":"Sebastiani, R.: Lazy satisability modulo theories. J. Satisf. Boolean Model. Comput. 3(3\u20134), 141\u2013224 (2007)","journal-title":"J. Satisf. Boolean Model. Comput."},{"key":"17_CR48","unstructured":"VMT-LIB: Verification Modulo Theories (Language, Benchmarks and Tools) (2011). https:\/\/vmt-lib.fbk.eu\/"},{"issue":"2","key":"17_CR49","doi-asserted-by":"publisher","first-page":"79","DOI":"10.4173\/mic.2011.2.3","volume":"32","author":"R Wisniewski","year":"2011","unstructured":"Wisniewski, R., Sloth, C.: Abstraction of dynamical systems by timed automata. Model. Identificat. Control (Online Ed.) 32(2), 79\u201390 (2011)","journal-title":"Model. Identificat. Control (Online Ed.)"},{"key":"17_CR50","doi-asserted-by":"publisher","first-page":"3344","DOI":"10.1109\/TAC.2015.2511722","volume":"61","author":"T Wongpiromsarn","year":"2014","unstructured":"Wongpiromsarn, T., Topcu, U., Lamperski, A.G.: Automata theory meets barrier certificates: temporal logic verification of nonlinear systems. IEEE Trans. Autom. Control 61, 3344\u20133355 (2014)","journal-title":"IEEE Trans. Autom. Control"},{"key":"17_CR51","doi-asserted-by":"crossref","unstructured":"Zhao, H., Zeng, X., Chen, T., Liu, Z.: Synthesizing barrier certificates using neural networks. In: Proceedings of the 23rd International Conference on Hybrid Systems: Computation and Control, HSCC \u201920. Association for Computing Machinery, New York (2020)","DOI":"10.1145\/3365365.3382222"}],"container-title":["Lecture Notes in Computer Science","Automated Technology for Verification and Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08707-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T22:33:31Z","timestamp":1761431611000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08707-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,26]]},"ISBN":["9783032087065","9783032087072"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08707-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,26]]},"assertion":[{"value":"26 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ATVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Automated Technology for Verification and Analysis","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bengaluru","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"atva2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.researchr.org\/home\/atva-2025","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}