{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:52:53Z","timestamp":1743151973785,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":44,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811591280"},{"type":"electronic","value":"9789811591297"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9129-7_15","type":"book-chapter","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T23:07:29Z","timestamp":1603321649000},"page":"205-216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Survey of Game Theoretical Privacy Preservation for Data Sharing and Publishing"],"prefix":"10.1007","author":[{"given":"Datong","family":"Wu","sequence":"first","affiliation":[]},{"given":"Xiaotong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jiaquan","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Genlin","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Taotao","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xuyun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wanchun","family":"Dou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,22]]},"reference":[{"issue":"4","key":"15_CR1","doi-asserted-by":"publisher","first-page":"51:1","DOI":"10.1145\/3344722","volume":"15","author":"M Bun","year":"2019","unstructured":"Bun, M., Nelson, J., Stemmer, U.: Heavy hitters and the structure of local privacy. ACM Trans. Algorithms 15(4), 51:1\u201351:40 (2019)","journal-title":"ACM Trans. Algorithms"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-319-13129-0_30","volume-title":"Web and Internet Economics","author":"Y Chen","year":"2014","unstructured":"Chen, Y., Sheffet, O., Vadhan, S.: Privacy games. In: Liu, T.-Y., Qi, Q., Ye, Y. (eds.) WINE 2014. LNCS, vol. 8877, pp. 371\u2013385. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13129-0_30"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Chessa, M., Grossklags, J., Loiseau, P.: A game-theoretic study on non-monetary incentives in data analytics projects with privacy implications. In: Proceedings of 28th Computer Security Foundations Symposium, CSF, pp. 90\u2013104. IEEE (2015)","DOI":"10.1109\/CSF.2015.14"},{"issue":"2","key":"15_CR4","doi-asserted-by":"publisher","first-page":"30:1","DOI":"10.1145\/3057268","volume":"50","author":"CT Do","year":"2017","unstructured":"Do, C.T., et al.: Game theory for cyber security and privacy. ACM Comput. Surv. 50(2), 30:1\u201330:37 (2017)","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"15_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-010-0491-2","volume":"63","author":"W Dou","year":"2013","unstructured":"Dou, W., Qi, L., Zhang, X., Chen, J.: An evaluation method of outsourcing services for developing an elastic cloud platform. J. Supercomput. 63(1), 1\u201323 (2013). https:\/\/doi.org\/10.1007\/s11227-010-0491-2","journal-title":"J. Supercomput."},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Duchi, J.C., Jordan, M.I., Wainwright, M.J.: Local privacy and statistical minimax rates. In: Proceedings of 54th Annual Symposium on Foundations of Computer Science, FOCS, pp. 429\u2013438. IEEE (2013)","DOI":"10.1109\/FOCS.2013.53"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"issue":"3","key":"15_CR8","doi-asserted-by":"publisher","first-page":"17","DOI":"10.29012\/jpc.v7i3.405","volume":"7","author":"C Dwork","year":"2016","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.D.: Calibrating noise to sensitivity in private data analysis. J. Priv. Confidentiality 7(3), 17\u201351 (2016)","journal-title":"J. Priv. Confidentiality"},{"issue":"4","key":"15_CR9","doi-asserted-by":"publisher","first-page":"14:1","DOI":"10.1145\/1749603.1749605","volume":"42","author":"BCM Fung","year":"2010","unstructured":"Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 14:1\u201314:53 (2010)","journal-title":"ACM Comput. Surv."},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Jin, H., Su, L., Nahrstedt, K.: Theseus: Incentivizing truth discovery in mobile crowd sensing systems. In: Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Chennai, India, 10\u201314 July 2017, pp. 1:1\u20131:10. ACM (2017)","DOI":"10.1145\/3084041.3084063"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd International Conference on Data Engineering, ICDE, pp. 106\u2013115. IEEE (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Li, N., Ye, Q.: Mobile data collection and analysis with local differential privacy. In: Proceedings of IEEE 20th International Conference on Mobile Data Management (MDM), pp. 4\u20137 (2019)","DOI":"10.1109\/MDM.2019.00-80"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Liao, G., Chen, X., Huang, J.: Social-aware privacy-preserving correlated data collection. In: Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2018, Los Angeles, CA, USA, 26\u201329 June 2018, pp. 11\u201320. ACM (2018)","DOI":"10.1145\/3209582.3209584"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering, ICDE, p. 24. IEEE (2006)","DOI":"10.1109\/ICDE.2006.1"},{"issue":"3","key":"15_CR15","doi-asserted-by":"publisher","first-page":"25:1","DOI":"10.1145\/2480741.2480742","volume":"45","author":"MH Manshaei","year":"2013","unstructured":"Manshaei, M.H., Zhu, Q., Alpcan, T., Basar, T., Hubaux, J.: Game theory meets network security and privacy. ACM Comput. Surv. 45(3), 25:1\u201325:39 (2013)","journal-title":"ACM Comput. Surv."},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: Proceedings of 48th Annual Symposium on Foundations of Computer Science (FOCS), pp. 94\u2013103. IEEE (2007)","DOI":"10.1109\/FOCS.2007.4389483"},{"key":"15_CR17","volume-title":"A Course in Game Theory","author":"MJ Osborne","year":"1994","unstructured":"Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)"},{"issue":"4","key":"15_CR18","doi-asserted-by":"publisher","first-page":"82:1","DOI":"10.1145\/3337772","volume":"52","author":"J Pawlick","year":"2019","unstructured":"Pawlick, J., Colbert, E., Zhu, Q.: A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy. ACM Comput. Surv. 52(4), 82:1\u201382:28 (2019)","journal-title":"ACM Comput. Surv."},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Qi, L., Dai, P., Yu, J., Zhou, Z., Xu, Y.: \u201ctime-location-frequency\"-aware Internet of Things service selection based on historical records. IJDSN 13(1), 1\u20139 (2017)","DOI":"10.1177\/1550147716688696"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Qi, L., Xiang, H., Dou, W., Yang, C., Qin, Y., Zhang, X.: Privacy-preserving distributed service recommendation based on locality-sensitive hashing. In: Proceedings of International Conference on Web Services, ICWS, pp. 49\u201356. IEEE (2017)","DOI":"10.1109\/ICWS.2017.15"},{"key":"15_CR21","first-page":"4358536:1","volume":"2017","author":"L Qi","year":"2017","unstructured":"Qi, L., Yu, J., Zhou, Z.: An invocation cost optimization method for web services in cloud environment. Sci. Program. 2017, 4358536:1\u20134358536:9 (2017)","journal-title":"Sci. Program."},{"issue":"9","key":"15_CR22","doi-asserted-by":"publisher","first-page":"2092","DOI":"10.1587\/transinf.2016EDP7490","volume":"100\u2013D","author":"L Qi","year":"2017","unstructured":"Qi, L., Zhou, Z., Yu, J., Liu, Q.: Data-sparsity tolerant web service recommendation approach based on improved collaborative filtering. IEICE Trans. Inf. Syst. 100\u2013D(9), 2092\u20132099 (2017)","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"6","key":"15_CR23","doi-asserted-by":"publisher","first-page":"5171","DOI":"10.1109\/JIOT.2020.2977383","volume":"7","author":"Y Qu","year":"2020","unstructured":"Qu, Y., Gao, L., Luan, T.H., Xiang, Y., Yu, S., Li, B., Zheng, G.: Decentralized privacy using blockchain-enabled federated learning in fog computing. IEEE Internet Things J. 7(6), 5171\u20135183 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"15_CR24","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1109\/TCSS.2018.2861775","volume":"5","author":"Y Qu","year":"2018","unstructured":"Qu, Y., Yu, S., Gao, L., Zhou, W., Peng, S.: A hybrid privacy protection scheme in cyber-physical social networks. IEEE Trans. Comput. Soc. Syst. 5(3), 773\u2013784 (2018)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"6","key":"15_CR25","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MWC.2017.1800112","volume":"25","author":"Y Qu","year":"2018","unstructured":"Qu, Y., Yu, S., Zhou, W., Peng, S., Wang, G., Xiao, K.: Privacy of things: emerging challenges and opportunities in wireless Internet of Things. IEEE Wirel. Commun. 25(6), 91\u201397 (2018)","journal-title":"IEEE Wirel. Commun."},{"key":"15_CR26","doi-asserted-by":"publisher","unstructured":"Qu, Y., Yu, S., Zhou, W., Tian, Y.: Gan-driven personalized spatial-temporal private data sharing in cyber-physical social systems. IEEE Trans. Netw. Sci. Eng. 1 (2020). https:\/\/doi.org\/10.1109\/TNSE.2020.3001061","DOI":"10.1109\/TNSE.2020.3001061"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Rawat, D.B., Njilla, L., Kwiat, K.A., Kamhoua, C.A.: ishare: blockchain-based privacy-aware multi-agent information sharing games for cybersecurity. In: Proceedings of International Conference on Computing, Networking and Communications, ICNC, pp. 425\u2013431. IEEE Computer Society (2018)","DOI":"10.1109\/ICCNC.2018.8390264"},{"issue":"12","key":"15_CR28","doi-asserted-by":"publisher","first-page":"4405","DOI":"10.1109\/TITS.2018.2885054","volume":"20","author":"A Riahi","year":"2019","unstructured":"Riahi, A., Challal, Y., Moyal, P., Natalizio, E.: A game theoretic approach for privacy preserving model in IoT-based transportation. IEEE Trans. Intell. Transp. Syst. 20(12), 4405\u20134414 (2019)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"15_CR29","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1515\/popets-2015-0024","volume":"2015","author":"R Shokri","year":"2015","unstructured":"Shokri, R.: Privacy games: optimal user-centric data obfuscation. PoPETs 2015(2), 299\u2013315 (2015)","journal-title":"PoPETs"},{"key":"15_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/978-3-319-94268-1_35","volume-title":"Wireless Algorithms, Systems, and Applications","author":"K Sooksatra","year":"2018","unstructured":"Sooksatra, K., Li, W., Mei, B., Alrawais, A., Wang, S., Yu, J.: Solving data trading dilemma with asymmetric incomplete information using zero-determinant strategy. In: Chellappan, S., Cheng, W., Li, W. (eds.) WASA 2018. LNCS, vol. 10874, pp. 425\u2013437. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-94268-1_35"},{"issue":"5","key":"15_CR31","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Syst."},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"Vakilinia, I., Tosh, D.K., Sengupta, S.: 3-way game model for privacy-preserving cybersecurity information exchange framework. In: Proceedings of Military Communications Conference, MILCOM, pp. 829\u2013834. IEEE (2017)","DOI":"10.1109\/MILCOM.2017.8170842"},{"issue":"1","key":"15_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-016-0069-y","volume":"6","author":"V Kumari","year":"2016","unstructured":"Kumari, V., Chakravarthy, S.: Cooperative privacy game: a novel strategy for preserving privacy in data publishing. Hum. Centric Comput. Inf. Sci. 6(1), 1\u201320 (2016). https:\/\/doi.org\/10.1186\/s13673-016-0069-y","journal-title":"Hum. Centric Comput. Inf. Sci."},{"issue":"3","key":"15_CR34","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1109\/TMM.2019.2892561","volume":"21","author":"M Wang","year":"2019","unstructured":"Wang, M., Xu, C., Chen, X., Hao, H., Zhong, L., Yu, S.: Differential privacy oriented distributed online learning for mobile social video prefetching. IEEE Trans. Multimedia 21(3), 636\u2013651 (2019)","journal-title":"IEEE Trans. Multimedia"},{"key":"15_CR35","doi-asserted-by":"crossref","unstructured":"Wang, W., Ying, L., Zhang, J.: A game-theoretic approach to quality control for collecting privacy-preserving data. In: Proceedings of 53rd Annual Allerton Conference on Communication, Control, and Computing, pp. 474\u2013479. IEEE (2015)","DOI":"10.1109\/ALLERTON.2015.7447042"},{"key":"15_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-662-54110-4_7","volume-title":"Web and Internet Economics","author":"W Wang","year":"2016","unstructured":"Wang, W., Ying, L., Zhang, J.: Buying data from privacy-aware individuals: the effect of negative payments. In: Cai, Y., Vetta, A. (eds.) WINE 2016. LNCS, vol. 10123, pp. 87\u2013101. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-54110-4_7"},{"issue":"309","key":"15_CR37","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1080\/01621459.1965.10480775","volume":"60","author":"SL Warner","year":"1965","unstructured":"Warner, S.L.: Randomized response: a survey technique for eliminating evasive answer bias. J. Am. Stat. Assoc. 60(309), 63\u201369 (1965)","journal-title":"J. Am. Stat. Assoc."},{"key":"15_CR38","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.chb.2019.04.026","volume":"99","author":"M Williams","year":"2019","unstructured":"Williams, M., Nurse, J.R.C., Creese, S.: Smartwatch games: encouraging privacy-protective behaviour in a longitudinal study. Comput. Hum. Behav. 99, 38\u201354 (2019)","journal-title":"Comput. Hum. Behav."},{"issue":"7798","key":"15_CR39","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1038\/s41586-020-2008-3","volume":"579","author":"F Wu","year":"2020","unstructured":"Wu, F., et al.: A new coronavirus associated with human respiratory disease in China. Nature 579(7798), 265\u2013269 (2020)","journal-title":"Nature"},{"key":"15_CR40","doi-asserted-by":"crossref","unstructured":"Wu, X., Li, S., Yang, J., Dou, W.: A cost sharing mechanism for location privacy preservation in big trajectory data. In: Proceedings of International Conference on Communications, ICC, pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/ICC.2017.7997368"},{"key":"15_CR41","doi-asserted-by":"publisher","unstructured":"Wu, X., Wu, T., Khan, M., Ni, Q., Dou, W.: Game theory based correlated privacy preserving analysis in big data. IEEE Trans. Big Data (2017). https:\/\/doi.org\/10.1109\/TBDATA.2017.2701817","DOI":"10.1109\/TBDATA.2017.2701817"},{"key":"15_CR42","doi-asserted-by":"publisher","first-page":"2751","DOI":"10.1109\/ACCESS.2016.2577036","volume":"4","author":"S Yu","year":"2016","unstructured":"Yu, S.: Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4, 2751\u20132763 (2016)","journal-title":"IEEE Access"},{"issue":"1","key":"15_CR43","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1109\/COMST.2016.2610963","volume":"19","author":"S Yu","year":"2017","unstructured":"Yu, S., Liu, M., Dou, W., Liu, X., Zhou, S.: Networking for big data: a survey. IEEE Commun. Surv. Tutorials 19(1), 531\u2013549 (2017)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"15_CR44","doi-asserted-by":"publisher","unstructured":"Zhou, C., Fu, A., Yu, S., Yang, W., Wang, H., Zhang, Y.: Privacy-preserving federated learning in fog computing. IEEE Internet Things J. 1 (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.2987958","DOI":"10.1109\/JIOT.2020.2987958"}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Digital Economy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9129-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T05:46:39Z","timestamp":1669268799000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-9129-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811591280","9789811591297"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9129-7_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPDE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Digital Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spde2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spde2020.csp.escience.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}