{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T22:59:34Z","timestamp":1773269974942,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":46,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562022","type":"print"},{"value":"9789819562039","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6203-9_25","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:25:58Z","timestamp":1767320758000},"page":"467-486","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Multimodal Asynchronous Federated Learning Approach for\u00a0Encrypted Traffic Classification"],"prefix":"10.1007","author":[{"given":"Xiangbin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Qingjun","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Yongjuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Xiangyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chunxiang","family":"Gu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Akbari, I., Salahuddin, M.A., Ven, L., Limam, N., Tuffin, S.: A look behind the curtain: traffic classification in an increasingly encrypted web. In: Proceedings of the ACM on Measurement and Analysis of Computing Systems 5(1), pp. 1\u201326 (2021)","DOI":"10.1145\/3447382"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"2166","DOI":"10.1109\/TIFS.2022.3179955","volume":"17","author":"X Shiqian","year":"2022","unstructured":"Shiqian, X., Geng, G.-G., Jin, X., Liu, D., Weng, J.: Seeing traffic paths: encrypted traffic classification with path signature features. IEEE Trans. Inf. Forensics Secur. 17, 2166\u20132181 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"25_CR3","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1109\/TNSM.2024.3479150","volume":"22","author":"Q Meng","year":"2025","unstructured":"Meng, Q., et al.: IIT: accurate decentralized application identification through mining intra- and inter-flow relationships. IEEE Trans. Netw. Serv. Manage. 22(1), 394\u2013408 (2025)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"25_CR4","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1007\/s00500-019-04030-2","volume":"24","author":"M Lotfollahi","year":"2020","unstructured":"Lotfollahi, M., Zade, R.S.H., Siavoshani, M.J., Saberian, M.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft. Comput. 24, 1999\u20132012 (2020)","journal-title":"Soft. Comput."},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Lin, X., Xiong, G., Gou, G., Li, Z., Shi, J., Yu, J.: ET-BERT: a contextualized datagram representation with pre-training transformers for encrypted traffic classification. In: WWW: Proceedings of the ACM Web Conference, pp. 633\u2013642 (2022)","DOI":"10.1145\/3485447.3512217"},{"key":"25_CR6","doi-asserted-by":"publisher","first-page":"5758","DOI":"10.1109\/TIFS.2025.3574971","volume":"20","author":"X Lin","year":"2025","unstructured":"Lin, X., et al.: Respond to change with constancy: instruction-tuning with LLM for Non-IID network traffic classification. IEEE Trans. Inf. Foren. Security 20, 5758\u20135773 (2025)","journal-title":"IEEE Trans. Inf. Foren. Security"},{"key":"25_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109648","volume":"225","author":"N Malekghaini","year":"2023","unstructured":"Malekghaini, N., et al.: Deep learning for encrypted traffic classification in the face of data drift: an empirical study. Comput. Netw. 225, 109648 (2023)","journal-title":"Comput. Netw."},{"key":"25_CR8","doi-asserted-by":"publisher","unstructured":"Yuan, Q., et al.: Multi-agent for network security monitoring and warning: a generative AI solution. IEEE Network. https:\/\/doi.org\/10.1109\/MNET.2025.3579001","DOI":"10.1109\/MNET.2025.3579001"},{"key":"25_CR9","doi-asserted-by":"publisher","unstructured":"Zhang, J., Liang, S., Ye, F., Hu, Q., Qian, Y.: Towards detection of zero-day botnet attack in iot networks using federated learning. In: ICC-IEEE International Conference on Communications, pp. 7\u201312. IEEE, Rome (2023). https:\/\/doi.org\/10.1109\/ICC45041.2023.10279423","DOI":"10.1109\/ICC45041.2023.10279423"},{"key":"25_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.120217","volume":"662","author":"X Zhou","year":"2024","unstructured":"Zhou, X., et al.: Federated distillation and blockchain empowered secure knowledge sharing for Internet of medical Things. Inf. Sci. 662, 120217 (2024)","journal-title":"Inf. Sci."},{"key":"25_CR11","doi-asserted-by":"publisher","unstructured":"Wang, X., Chen, S., Su, J.: App-Net: a hybrid neural network for encrypted mobile traffic classification In: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 424\u2013429. IEEE, Rome (2020). https:\/\/doi.org\/10.1109\/INFOCOMWKSHPS50562.2020.9162891","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162891"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Aceto, G., Ciuonzo, D., Montieri, A., Pescap\u00e9, A.: MIMETIC: mobile encrypted traffic classification using multimodal deep learning. Comput. Networks 165, 106944.1\u2013106944.12 (2019)","DOI":"10.1016\/j.comnet.2019.106944"},{"key":"25_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.102985","volume":"183\u2013184","author":"G Aceto","year":"2021","unstructured":"Aceto, G., Ciuonzo, D., Montieri, A., Pescap\u00e9, A.: DISTILLER: encrypted traffic classification via multimodal multitask deep learning. J. Netw. Comput. Appl. 183\u2013184, 102985 (2021)","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"25_CR14","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1109\/TNET.2022.3215507","volume":"31","author":"P Lin","year":"2023","unstructured":"Lin, P., Ye, K., Yishen, H., Lin, Y., Chengzhong, X.: A novel multimodal deep learning framework for encrypted traffic classification. IEEE\/ACM Trans. Networking 31(3), 1369\u20131384 (2023)","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Wang, X., et al.: Entropy-regulated cross-modal generative fusion for multimodal network intrusion detection. Inf. Fusion 126, Part: A, 103581 (2026)","DOI":"10.1016\/j.inffus.2025.103581"},{"key":"25_CR16","first-page":"12113","volume":"45","author":"X Peng","year":"2022","unstructured":"Peng, X., Zhu, X., Clifton, D.A.: Multimodal learning with transformers: a survey. IEEE Trans. Pattern Anal. Mach. Intell. 45, 12113\u201312132 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"4","key":"25_CR17","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1145\/1090191.1080119","volume":"35","author":"T Karagiannis","year":"2005","unstructured":"Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: multilevel traffic classification in the dark. ACM SIGCOMM Comput. Commun. Rev. 35(4), 229\u2013240 (2005)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"25_CR18","doi-asserted-by":"publisher","unstructured":"Zejdl, P., Ubik, S., Macek, V., Oslebo, A.: Traffic classification for portable applications with hardware support. In: International Workshop on Intelligent Solutions in Embedded Systems, pp. 1\u20139. IEEE, Regensburg (2008). https:\/\/doi.org\/10.1109\/WISES.2008.4623292","DOI":"10.1109\/WISES.2008.4623292"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Yoon, S.-H., Park, J.-W., Park, J.-S., Oh, Y.-S., Kim, M.-S.: Internet application traffic classification using fixed IP-Port. In: Management Enabling the Future Internet for Changing Business and New Computing Services (APNOMS), pp. 21\u201330, Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-04492-2_3"},{"key":"25_CR20","unstructured":"Park, J.-S., Yoon, S.-H., Kim, M.-S.: Performance improvement of payload signature-based traffic classification system using application traffic temporal locality. In: 15th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 1\u20136, Hiroshima, Japan (2013)"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Moore, A.W., Zuev, D.: Internet traffic classification using bayesian analysis techniques. In: Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems (SIGMETRICS), pp. 50\u201360. ACM, Banff, Alberta, Canada (2005)","DOI":"10.1145\/1064212.1064220"},{"issue":"1","key":"25_CR22","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1198255.1198257","volume":"37","author":"M Crotti","year":"2007","unstructured":"Crotti, M., Dusi, M., Gringoli, F., Salgarelli, L.: Traffic classification through simple statistical fingerprinting. Acm Sigcomm Comput. Commun. Rev. 37(1), 5\u201316 (2007)","journal-title":"Acm Sigcomm Comput. Commun. Rev."},{"issue":"1","key":"25_CR23","first-page":"51","volume":"21","author":"G Bovenzi","year":"2024","unstructured":"Bovenzi, G., Nascita, A., Yang, L., Finamore, A., Aceto, G., Ciuonzo, D., Pescap\u00e9, A., Rossi, D.: Benchmarking class incremental learning in deep learning traffic classification. IEEE\/ACM Trans. Networking 21(1), 51\u201369 (2024)","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"25_CR24","doi-asserted-by":"publisher","unstructured":"Wang, W., Zhu, M., Wang, J., Zeng, X., Yang, Z.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 43-48. IEEE, Beijing (2017). https:\/\/doi.org\/10.1109\/ISI.2017.8004872","DOI":"10.1109\/ISI.2017.8004872"},{"key":"25_CR25","doi-asserted-by":"publisher","unstructured":"Wang, Z., Ma, B., Zeng, Y., Lin, X., Shi, K., Wang, Z.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: International Conference on Networking and Network Applications (NaNA), pp. 220\u2013225. IEEE, Beijing (2022). https:\/\/doi.org\/10.1109\/NaNA56854.2022.00044","DOI":"10.1109\/NaNA56854.2022.00044"},{"key":"25_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114363","volume":"167","author":"X Ren","year":"2021","unstructured":"Ren, X., Huaxi, G., Wei, W.: Tree-RNN: tree structural recurrent neural network for network traffic classification. Expert Syst. Appl. 167, 114363 (2021)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"25_CR27","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1109\/TBDATA.2019.2940675","volume":"8","author":"H Yao","year":"2022","unstructured":"Yao, H., Liu, C., Zhang, P., Wu, S., Jiang, C., Yu, S.: Identification of encrypted traffic through attention mechanism based long short term memory. IEEE Trans. Big Data 8(1), 241\u2013252 (2022)","journal-title":"IEEE Trans. Big Data"},{"issue":"3","key":"25_CR28","doi-asserted-by":"publisher","first-page":"3344","DOI":"10.1109\/TNSM.2024.3383218","volume":"21","author":"L Yang","year":"2024","unstructured":"Yang, L., Guo, S., Liu, D., Zeng, Y., Jiao, X., Zhou, Y.: ConViTML: a convolutional vision transformer-based meta-learning framework for real-time edge network traffic classification. IEEE Trans. Netw. Serv. Manage. 21(3), 3344\u20133357 (2024)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"3","key":"25_CR29","doi-asserted-by":"publisher","first-page":"3583","DOI":"10.1109\/TNSM.2024.3383851","volume":"21","author":"J Yang","year":"2024","unstructured":"Yang, J., Jiang, X., Lei, Y., Liang, W., Ma, Z., Li, S.: MTSecurity: privacy-preserving malicious traffic classification using graph neural network and transformer. IEEE Trans. Netw. Serv. Manage. 21(3), 3583\u20133597 (2024)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"25_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110372","volume":"245","author":"X Han","year":"2024","unstructured":"Han, X., et al.: DE-GNN: Dual embedding with graph neural network for fine-grained encrypted traffic classification. Comput. Netw. 245, 110372 (2024)","journal-title":"Comput. Netw."},{"key":"25_CR31","doi-asserted-by":"crossref","unstructured":"Hu, G., Xiao, X., Shen, M., Zhang, B., Yan, X., Liu, Y.: TCGNN: packet-grained network traffic classification via graph neural networks. Eng. Appl. Artif. Intell. 123, Part C, 106531 (2023)","DOI":"10.1016\/j.engappai.2023.106531"},{"issue":"1","key":"25_CR32","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1109\/TNSM.2021.3112283","volume":"19","author":"A Telikani","year":"2022","unstructured":"Telikani, A., Gandomi, A.H., Choo, K.-K.R., Shen, J.: A cost-sensitive deep learning-based approach for network traffic classification. IEEE Trans. Netw. Serv. Manage. 19(1), 661\u2013670 (2022)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"25_CR33","doi-asserted-by":"publisher","unstructured":"Deng, X., Wang, Y., Xue, Z.: AN-Net: an anti-noise network for anonymous traffic classification. In: Proceedings of the ACM Web Conference (WWW), pp. 4417\u20134428. ACM, Singapore (2024). https:\/\/doi.org\/10.1145\/3589334.3645691","DOI":"10.1145\/3589334.3645691"},{"key":"25_CR34","doi-asserted-by":"publisher","unstructured":"Zejdl, P., Ubik, S., Macek, V., Oslebo, A.: A distributed traffic classification model based on Federated Learning. In: 7th International Conference on Big Data Computing and Communications (BigCom), pp. 75-81. IEEE, Deqing (2021). https:\/\/doi.org\/10.1109\/BigCom53800.2021.00022","DOI":"10.1109\/BigCom53800.2021.00022"},{"issue":"2","key":"25_CR35","doi-asserted-by":"publisher","first-page":"1274","DOI":"10.1109\/JIOT.2022.3204975","volume":"10","author":"Y Guo","year":"2023","unstructured":"Guo, Y., Wang, D.: FEAT: a federated approach for privacy-preserving network traffic classification in heterogeneous environments. IEEE Internet Things J. 10(2), 1274\u20131285 (2023)","journal-title":"IEEE Internet Things J."},{"key":"25_CR36","doi-asserted-by":"publisher","unstructured":"Aouedi, O., Piamrat, K., Muller, G., Singh, K.: FLUIDS: federated learning with semi-supervised approach for intrusion detection system. In: IEEE 19th Annual Consumer Communications & Networking Conference, pp. 523-524. IEEE, Las Vegas, NV (2022). https:\/\/doi.org\/10.1109\/CCNC49033.2022.9700632","DOI":"10.1109\/CCNC49033.2022.9700632"},{"key":"25_CR37","first-page":"1","volume":"333","author":"Z Jin","year":"2023","unstructured":"Jin, Z., Liang, Z., He, M., Peng, Y., Xue, H., Wang, Yu.: A federated semi-supervised learning approach for network traffic classification. Int. J. Network Manage 333, 1\u201313 (2023)","journal-title":"Int. J. Network Manage"},{"key":"25_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2024.103091","volume":"149","author":"ZX Wang","year":"2024","unstructured":"Wang, Z.X., Li, Z.Y., MengYi, F., Ye, Y.C., Wang, P.: Network traffic classification based on federated semi-supervised learning. J. Syst. Architect. 149, 103091 (2024)","journal-title":"J. Syst. Architect."},{"issue":"2","key":"25_CR39","doi-asserted-by":"publisher","first-page":"1815","DOI":"10.1109\/TMC.2023.3240821","volume":"23","author":"Y Xiao","year":"2024","unstructured":"Xiao, Y., et al.: Distributed traffic synthesis and classification in edge networks: a federated self-supervised learning approach. IEEE Trans. Mob. Comput. 23(2), 1815\u20131829 (2024)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"25_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.107487","volume":"162","author":"J Xia","year":"2025","unstructured":"Xia, J., Meng, W., Li, P.: SFML: A personalized, efficient, and privacy-preserving collaborative traffic classification architecture based on split learning and mutual learning. Futur. Gener. Comput. Syst. 162, 107487 (2025)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"2","key":"25_CR41","doi-asserted-by":"publisher","first-page":"2455","DOI":"10.1109\/JSYST.2023.3236995","volume":"17","author":"J Li","year":"2023","unstructured":"Li, J., Tong, X., Liu, J., Cheng, L.: An efficient federated learning system for network intrusion detection. IEEE Syst. J. 17(2), 2455\u20132464 (2023)","journal-title":"IEEE Syst. J."},{"key":"25_CR42","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-023-3026-8","volume":"18","author":"N Sun","year":"2024","unstructured":"Sun, N., Wang, W., Tong, Y., Liu, K.: Blockchain based federated learning for intrusion detection for Internet of Things. Front. Comput. Sci. 18, 185328 (2024)","journal-title":"Front. Comput. Sci."},{"key":"25_CR43","doi-asserted-by":"crossref","unstructured":"Yuan, Q., et al.: BoAu: Malicious traffic detection with noise labels based on boundary augmentation. Comput. Secur. 131, 103300 (2023)","DOI":"10.1016\/j.cose.2023.103300"},{"key":"25_CR44","doi-asserted-by":"publisher","unstructured":"Diallo, A.F., Patras, P.: Adaptive clustering-based malicious traffic classification at the network edge. In: IEEE INFOCOM 2021 - IEEE Conference on Computer Communications, pp. 1\u201310. IEEE, Vancouver, BC (2021). https:\/\/doi.org\/10.1109\/INFOCOM42981.2021.9488690","DOI":"10.1109\/INFOCOM42981.2021.9488690"},{"key":"25_CR45","unstructured":"Geiping, J., Bauermeister, H., Dr\u00f6ge, H., Moeller, M.: Inverting Gradients \u2013 How easy is it to break privacy in federated learning? In: Advances in Neural Information Processing Systems (NeurIPS), pp. 16937\u201316947. Curran Associates, Inc., Virtual (2020)"},{"issue":"12","key":"25_CR46","doi-asserted-by":"publisher","first-page":"12195","DOI":"10.1109\/TMC.2024.3407709","volume":"23","author":"J Cui","year":"2024","unstructured":"Cui, J., Xiao, J., Zhong, H., Jing Zhang, L., Wei, I.B., He, D.: LH-IDS: lightweight hybrid intrusion detection system based on differential privacy in VANETs. IEEE Trans. Mob. Comput. 23(12), 12195\u201312210 (2024). https:\/\/doi.org\/10.1109\/TMC.2024.3407709","journal-title":"IEEE Trans. Mob. Comput."}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6203-9_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T07:36:57Z","timestamp":1773214617000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6203-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562022","9789819562039"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6203-9_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}