{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T14:13:08Z","timestamp":1771078388114,"version":"3.50.1"},"publisher-location":"Cham","reference-count":55,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032133762","type":"print"},{"value":"9783032133779","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-13377-9_2","type":"book-chapter","created":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T13:48:58Z","timestamp":1771076938000},"page":"23-47","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Rational Censorship Attack: Breaking Blockchain with\u00a0a\u00a0Blackboard"],"prefix":"10.1007","author":[{"given":"Michelle","family":"Yeo","sequence":"first","affiliation":[]},{"given":"Haoqian","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,15]]},"reference":[{"key":"2_CR1","unstructured":"Randao: A Dao working as RNG of Ethereum. https:\/\/github.com\/randao\/randao. Accessed 19 Jan 2021"},{"key":"2_CR2","unstructured":"51 https:\/\/www.investopedia.com\/terms\/1\/51-attack.asp. Accessed 14 May 2024"},{"key":"2_CR3","unstructured":"Total hashrate (2024). https:\/\/www.blockchain.com\/explorer\/charts\/hash-rate. Accessed 14 May 2024"},{"key":"2_CR4","unstructured":"Vitalik buterin suggests adjusting rewards to support decentralized staking (2024), https:\/\/www.binance.com\/en\/square\/post\/2024-03-27-vitalik-buterin-suggests-adjusting-rewards-to-support-decentralized-staking-5946943485169. Accessed 18 Sept 2024"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Abraham, I., Pinkas, B., Yanai, A.: Blinder - scalable, robust anonymous committed broadcast. In: CCS, pp. 1233\u20131252. ACM (2020)","DOI":"10.1145\/3372297.3417261"},{"key":"2_CR6","unstructured":"Alpos, O., Amores-Sesar, I., Cachin, C., Yeo, M.: Eating sandwiches: modular and lightweight elimination of transaction reordering attacks. In: OPODIS. LIPIcs, vol.\u00a0286, pp. 12:1\u201312:22. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2023)"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-540-70936-7_8","volume-title":"Theory of Cryptography","author":"Y Aumann","year":"2007","unstructured":"Aumann, Y., Lindell, Y.: Security against covert adversaries: efficient protocols for realistic adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137\u2013156. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-70936-7_8"},{"issue":"3","key":"2_CR8","first-page":"22","volume":"17","author":"LM Ausubel","year":"2006","unstructured":"Ausubel, L.M., Milgrom, P., et al.: The lovely but lonely vickrey auction. Combinat. Auct. 17(3), 22\u201326 (2006)","journal-title":"Combinat. Auct."},{"key":"2_CR9","unstructured":"Avarikioti, Z., Kedzior, P., Lizurej, T., Michalak, T.: Bribe & fork: cheap bribing attacks via forking threat. CoRR abs\/2402.01363 (2024)"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Babaioff, M., Dobzinski, S., Oren, S., Zohar, A.: On Bitcoin and red balloons. In: ACM Conference on Electronic Commerce, pp. 56\u201373. ACM (2012)","DOI":"10.1145\/2229012.2229022"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-84252-9_1","volume-title":"Advances in Cryptology \u2013 CRYPTO 2021","author":"C Badertscher","year":"2021","unstructured":"Badertscher, C., Lu, Y., Zikas, V.: A rational protocol treatment of 51% attacks. In: Malkin, T., Peikert, C. (eds.) CRYPTO 2021. LNCS, vol. 12827, pp. 3\u201332. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-84252-9_1"},{"key":"2_CR12","unstructured":"Bahrani, M., Weinberg, S.M.: Undetectable selfish mining. CoRR abs\/2309.06847 (2023)"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-030-78372-3_7","volume-title":"Applied Cryptography and Network Security","author":"C Baum","year":"2021","unstructured":"Baum, C., David, B., Frederiksen, T.K.: P2DEX: privacy-preserving decentralized cryptocurrency exchange. In: Sako, K., Tippenhauer, N.O. (eds.) ACNS 2021. LNCS, vol. 12726, pp. 163\u2013194. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-78372-3_7"},{"key":"2_CR14","doi-asserted-by":"publisher","unstructured":"Bhattacherjee, S., Sarkar, P.: Voting games to model protocol stability and security of proof-of-work cryptocurrencies. In: In: Fang, F., Xu, H., Hayel, Y. (eds.) GameSec 2022. LNCS, vol. 13727, pp. 297\u2013318. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-26369-9_15","DOI":"10.1007\/978-3-031-26369-9_15"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in bitcoin p2p network. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (2014). https:\/\/api.semanticscholar.org\/CorpusID:207217947","DOI":"10.1145\/2660267.2660379"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Pustogarov, I.: Bitcoin over tor isn\u2019t a good idea. In: IEEE Symposium on Security and Privacy, pp. 122\u2013134. IEEE Computer Society (2015)","DOI":"10.1109\/SP.2015.15"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-662-53357-4_2","volume-title":"Financial Cryptography and Data Security","author":"J Bonneau","year":"2016","unstructured":"Bonneau, J.: Why buy when you can rent? In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 19\u201326. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53357-4_2"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1007\/3-540-44647-8_31","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"C Cachin","year":"2001","unstructured":"Cachin, C., Kursawe, K., Petzold, F., Shoup, V.: Secure and efficient asynchronous broadcast protocols. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 524\u2013541. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44647-8_31"},{"key":"2_CR19","unstructured":"Cai, L., Liu, J., Weinberg, S.M., Zhou, C.: Profitable manipulations of cryptographic self-selection are statistically detectable. In: AFT. LIPIcs, vol.\u00a0316, pp. 30:1\u201330:23. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2024)"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Choi, K., Arun, A., Tyagi, N., Bonneau, J.: Bicorn: an optimistically efficient distributed randomness beacon. IACR Cryptol. ePrint Arch. p.\u00a0221 (2023). https:\/\/eprint.iacr.org\/2023\/221","DOI":"10.1007\/978-3-031-47754-6_14"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Cramer, R., Damg\u00e5rd, I., Nielsen, J.: Secure multiparty computation (2015). http:\/\/www.cambridge.org\/dk\/academic\/subjects\/computer-science\/cryptography-cryptology-and-coding\/secure-multiparty-computation-and-secret-sharing","DOI":"10.1017\/CBO9781107337756"},{"issue":"2","key":"2_CR22","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1145\/42282.42283","volume":"35","author":"C Dwork","year":"1988","unstructured":"Dwork, C., Lynch, N., Stockmeyer, L.: Consensus in the presence of partial synchrony. J. ACM (JACM) 35(2), 288\u2013323 (1988)","journal-title":"J. ACM (JACM)"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Eyal, I.: The miner\u2019s dilemma. In: IEEE Symposium on Security and Privacy (Oakland), pp. 89\u2013103. IEEE (2015)","DOI":"10.1109\/SP.2015.13"},{"issue":"7","key":"2_CR24","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/3212998","volume":"61","author":"I Eyal","year":"2018","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. Commun. ACM 61(7), 95\u2013102 (2018)","journal-title":"Commun. ACM"},{"key":"2_CR25","doi-asserted-by":"publisher","unstructured":"Faust, S., Hazay, C., Kretzler, D., Schlosser, B.: Financially backed covert security. In: Hanaoka, G., Shikata, J., Watanabe, Y. (eds.) LNCS, vol. 13178, pp. 99\u2013129. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-97131-1_4","DOI":"10.1007\/978-3-030-97131-1_4"},{"key":"2_CR26","unstructured":"Ford, B., B\u00f6hme, R.: Rationality is self-defeating in permissionless systems. arXiv preprint arXiv:1910.08820 (2019)"},{"key":"2_CR27","unstructured":"of\u00a0the Treasury\u2019s Office\u00a0of Foreign Assets\u00a0Control, U.D.: Sanctions compliance guidance for the virtual currency industry (2021). https:\/\/home.treasury.gov\/system\/files\/126\/virtual_currency_ guidance_brochure.pdf"},{"issue":"2","key":"2_CR28","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/564585.564601","volume":"33","author":"S Gilbert","year":"2002","unstructured":"Gilbert, S., Lynch, N.A.: Brewer\u2019s conjecture and the feasibility of consistent, available, partition-tolerant web services. SIGACT News 33(2), 51\u201359 (2002)","journal-title":"SIGACT News"},{"key":"2_CR29","unstructured":"Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin\u2019s peer-to-peer network. In: USENIX Security Symposium, pp. 129\u2013144. USENIX Association (2015)"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Houy, N.: The Bitcoin mining game (2014). SSRN: https:\/\/ssrn.com\/abstract=2407834","DOI":"10.2139\/ssrn.2407834"},{"key":"2_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/978-3-662-63958-0_38","volume-title":"Financial Cryptography and Data Security. FC 2021 International Workshops","author":"A Judmayer","year":"2021","unstructured":"Judmayer, A., et al.: SoK: algorithmic incentive manipulation attacks on permissionless PoW cryptocurrencies. In: Bernhard, M., et al. (eds.) FC 2021. LNCS, vol. 12676, pp. 507\u2013532. Springer, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-662-63958-0_38"},{"key":"2_CR32","unstructured":"Kelsey, J., Brand\u00e3o, L.T.A.N., Peralta, R., Booth, H.: Nistir 8213. a reference for randomness beacons: Format and protocol version 2. Technical report (2011)"},{"key":"2_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/978-3-662-45472-5_30","volume-title":"Financial Cryptography and Data Security","author":"P Koshy","year":"2014","unstructured":"Koshy, P., Koshy, D., McDaniel, P.: An analysis of anonymity in bitcoin using P2P network traffic. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 469\u2013485. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_30"},{"key":"2_CR34","unstructured":"Kostiainen, K., Gnap, S., Karame, G.: Censorship-resilient and confidential collateralized second-layer payments. IACR Cryptol. ePrint Arch. p.\u00a01520 (2022)"},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"Kwon, Y., Kim, D., Son, Y., Vasserman, E., Kim, Y.: Be selfish and avoid dilemmas: fork after withholding (FAW) attacks on Bitcoin. In: ACM Conference on Computer and Communications Security (CCS), pp. 195\u2013209. ACM (2017)","DOI":"10.1145\/3133956.3134019"},{"key":"2_CR36","unstructured":"Lenstra, A.K., Wesolowski, B.: A random zoo: sloth, unicorn, and trx. IACR Cryptol. ePrint Arch. p.\u00a0366 (2015). http:\/\/eprint.iacr.org\/2015\/366"},{"key":"2_CR37","unstructured":"Leshno, J., Pass, R., Shi, E.: Can open decentralized ledgers be economically secure? IACR Cryptol. ePrint Arch. p.\u00a01516 (2023)"},{"key":"2_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-319-70278-0_17","volume-title":"Financial Cryptography and Data Security","author":"K Liao","year":"2017","unstructured":"Liao, K., Katz, J.: Incentivizing blockchain forks via whale transactions. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 264\u2013279. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_17"},{"key":"2_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-58820-8_1","volume-title":"Financial Cryptography and Data Security","author":"P McCorry","year":"2019","unstructured":"McCorry, P., Hicks, A., Meiklejohn, S.: Smart contracts for bribing miners. In: Zohar, A., et al. (eds.) FC 2018. LNCS, vol. 10958, pp. 3\u201318. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-662-58820-8_1"},{"key":"2_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-58820-8_1","volume-title":"Financial Cryptography and Data Security","author":"P McCorry","year":"2019","unstructured":"McCorry, P., Hicks, A., Meiklejohn, S.: Smart contracts for bribing miners. In: Zohar, A., et al. (eds.) FC 2018. LNCS, vol. 10958, pp. 3\u201318. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-662-58820-8_1"},{"key":"2_CR41","unstructured":"Miller, A.: Feather-forks: enforcing a blacklist with sub50 (2013). https:\/\/web.archive.org\/web\/20221101152114\/, https:\/\/bitcointalk.org\/index.php?topic=312668.0"},{"key":"2_CR42","doi-asserted-by":"crossref","unstructured":"Miller, A., Xia, Y., Croman, K., Shi, E., Song, D.: The honey badger of BFT protocols. In: CCS, pp. 31\u201342. ACM (2016)","DOI":"10.1145\/2976749.2978399"},{"key":"2_CR43","doi-asserted-by":"crossref","unstructured":"Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 305\u2013320. IEEE (2016)","DOI":"10.1109\/EuroSP.2016.32"},{"key":"2_CR44","volume-title":"A Course in Game Theory","author":"MJ Osborne","year":"1994","unstructured":"Osborne, M.J., Rubinstein, A.: A Course in Game Theory. The MIT Press, Cambridge (1994)"},{"key":"2_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.socec.2024.102221","volume":"111","author":"A Rosato","year":"2024","unstructured":"Rosato, A., Tymula, A.A.: A novel experimental test of truthful bidding in second-price auctions with real objects. J. Behav. Exp. Econ. 111, 102221 (2024)","journal-title":"J. Behav. Exp. Econ."},{"key":"2_CR46","unstructured":"Rosenfeld, M.: Analysis of bitcoin pooled mining reward systems. CoRR abs\/1112.4980 (2011)"},{"key":"2_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-3-662-54970-4_28","volume-title":"Financial Cryptography and Data Security","author":"O Schrijvers","year":"2017","unstructured":"Schrijvers, O., Bonneau, J., Boneh, D., Roughgarden, T.: Incentive compatibility of bitcoin mining pool reward functions. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 477\u2013498. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54970-4_28"},{"key":"2_CR48","doi-asserted-by":"crossref","unstructured":"Tochner, S., Zohar, A.: How to pick your friends a game theoretic approach to P2P overlay construction. In: AFT, pp. 37\u201345. ACM (2020)","DOI":"10.1145\/3419614.3423252"},{"key":"2_CR49","unstructured":"U.D. of\u00a0the Treasury: U.s. treasury issues firstever sanctions on a virtual currency mixer, targets DPRK cyber threats (2022). https:\/\/web.archive.org\/web\/20221124112323\/, https:\/\/home.treasury.gov\/news\/press-releases\/jy0768"},{"key":"2_CR50","unstructured":"of\u00a0the Treasury, U.D.: U.s. treasury sanctions notorious virtual currency mixer tornado cash. (2022). https:\/\/web.archive.org\/web\/20221026104007\/, https:\/\/home.treasury.gov\/news\/press-releases\/jy0916"},{"key":"2_CR51","unstructured":"Wahrst\u00e4tter, A., et al.: Blockchain censorship. CoRR abs\/2305.18545 (2023)"},{"key":"2_CR52","doi-asserted-by":"crossref","unstructured":"Winzer, F., Herd, B., Faust, S.: Temporary censorship attacks in the presence of rational miners. IACR Cryptol. ePrint Arch. p.\u00a0748 (2019). https:\/\/eprint.iacr.org\/2019\/748","DOI":"10.1109\/EuroSPW.2019.00046"},{"key":"2_CR53","doi-asserted-by":"publisher","unstructured":"Zhang, H., Bastankhah, M., Merino, L.H., Estrada-Gali\u00f1anes, V., Ford, B.: Breaking blockchain rationality with out-of-band collusion. In: Essex, A., et al. (eds.) FC 2023. LNCS, vol. 13953, pp. 489\u2013501. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-48806-1_31","DOI":"10.1007\/978-3-031-48806-1_31"},{"key":"2_CR54","doi-asserted-by":"publisher","unstructured":"Zhang, H., Merino, L.H., Qu, Z., Bastankhah, M., Estrada-Gali\u00f1anes, V., Ford, B.: F3B: a low-overhead blockchain architecture with per-transaction front-running protection. In: Bonneau, J., Weinberg, S.M. (eds.) 5th Conference on Advances in Financial Technologies (AFT 2023). Leibniz International Proceedings in Informatics (LIPIcs), vol.\u00a0282, pp. 3:1\u20133:23. Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik, Dagstuhl, Germany (2023). https:\/\/doi.org\/10.4230\/LIPIcs.AFT.2023.3, https:\/\/drops.dagstuhl.de\/entities\/document\/10.4230\/LIPIcs.AFT.2023.3","DOI":"10.4230\/LIPIcs.AFT.2023.3"},{"key":"2_CR55","doi-asserted-by":"crossref","unstructured":"Zhang, H., Yeo, M., Estrada-Galinanes, V., Ford, B.: Zeroauction: Zero-deposit sealed-bid auction via delayed execution. Cryptology ePrint Archive (2024)","DOI":"10.1007\/978-3-031-69231-4_12"}],"container-title":["Lecture Notes in Operations Research","Mathematical Research for Blockchain Economy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-13377-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T13:49:04Z","timestamp":1771076944000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-13377-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032133762","9783032133779"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-13377-9_2","relation":{},"ISSN":["2731-040X","2731-0418"],"issn-type":[{"value":"2731-040X","type":"print"},{"value":"2731-0418","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"15 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MARBLE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Mathematical Research for Blockchain Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"marble2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.marble-conference.org\/call-for-papers-2025","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}