{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:46:13Z","timestamp":1742913973462,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":72,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819635306"},{"type":"electronic","value":"9789819635313"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-3531-3_16","type":"book-chapter","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:11:46Z","timestamp":1741867906000},"page":"319-346","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["VoIP Vanguard: A Practical Front Line Defense Against VoIP Identification Attacks in\u00a0Tor"],"prefix":"10.1007","author":[{"given":"S.","family":"Jithin","sequence":"first","affiliation":[]},{"given":"Richa","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Reeshabh Kumar","family":"Ranjan","sequence":"additional","affiliation":[]},{"given":"Shreyansh","family":"Nagpal","sequence":"additional","affiliation":[]},{"given":"Mukulika","family":"Maity","sequence":"additional","affiliation":[]},{"given":"Sambuddho","family":"Chakravarty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"issue":"2","key":"16_CR1","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1109\/TDSC.2019.2907240","volume":"18","author":"K Al-Naami","year":"2019","unstructured":"Al-Naami, K., El-Ghamry, A., et al.: BiMorphing: a Bi-directional bursting defense against website fingerprinting attacks. IEEE Trans. Dependable Secure Comput. 18(2), 505\u2013517 (2019)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"16_CR2","unstructured":"Vidhya, A.: ResNet \u2014 Understand and Implement from scratch. https:\/\/medium.com\/analytics-vidhya\/resnet-understand-and-implement-from-scratch-d0eb9725e0db (2011)"},{"key":"16_CR3","unstructured":"Apache Software Foundation. Apache Web Server. https:\/\/httpd.apache.org\/ (2023)"},{"key":"16_CR4","unstructured":"Ayyachamy, S., et\u00a0al.: Medical image retrieval using Resnet-18. In: Medical Imaging 2019: Imaging Informatics for Healthcare, Research, and Applications, vol. 10954, pp. 233\u2013241. SPIE (2019)"},{"key":"16_CR5","unstructured":"Bishop, C.M.: Pattern Recognition and Machine Learning (Information Science and Statistics). Springer-Verlag, Berlin, Heidelberg (2006) 0387310738"},{"key":"16_CR6","unstructured":"Bromberg, Y.-D., et\u00a0al.: Donar: anonymous $$\\{$$VoIP$$\\}$$ over tor. In: 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22), pp. 249\u2013265 (2022)"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Cai, C., et\u00a0al.: CS-BuFLO: a congestion sensitive website fingerprinting defense. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society, pp. 121\u2013130 (2014)","DOI":"10.1145\/2665943.2665949"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Cai, X., et\u00a0al.: A systematic approach to developing and evaluating website fingerprinting defenses. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201914, pp. 227\u2013238 (2014)","DOI":"10.1145\/2660267.2660362"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Cheng, J., et\u00a0al.: MATEC: a lightweight neural network for online encrypted traffic classification, vol. 199, p. 108472. Elsevier (2021)","DOI":"10.1016\/j.comnet.2021.108472"},{"key":"16_CR10","doi-asserted-by":"publisher","first-page":"107344","DOI":"10.1016\/j.asoc.2021.107344","volume":"106","author":"SH Choudhury","year":"2021","unstructured":"Choudhury, S.H., Kumar, A., et al.: Adaptive management of multimodal biometrics\u2013a deep learning and metaheuristic approach. Appl. Soft Comput. 106, 107344 (2021)","journal-title":"Appl. Soft Comput."},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"De la Cadena, W., et\u00a0al.: TrafficSliver: fighting website fingerprinting attacks with traffic splitting. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201920, pp. 1971\u20131985 (2020)","DOI":"10.1145\/3372297.3423351"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., et al.: Tor: the second-generation onion router. In USENIX Security Symposium, vol. 4, pp. 303\u2013320 (2004)","DOI":"10.21236\/ADA465464"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Dyer, K.P., et\u00a0al.: Peek-a-boo, i still see you: why efficient traffic analysis countermeasures fail. In: 2012 IEEE Symposium on Security and Privacy, pp. 332\u2013346. IEEE (2012)","DOI":"10.1109\/SP.2012.28"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Edman, M., Syverson, P.: As-awareness in tor path selection. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 380\u2013389 (2009)","DOI":"10.1145\/1653662.1653708"},{"key":"16_CR15","unstructured":"FreeSWITCH. FreeSWITCH. https:\/\/signalwire.com\/freeswitch (2023)"},{"key":"16_CR16","unstructured":"Gong, J., Wang, T.: Zero-delay lightweight defenses against website fingerprinting. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 717\u2013734 (2020)"},{"key":"16_CR17","unstructured":"Hayes, J., Danezis, G.: k-fingerprinting: a robust scalable website fingerprinting technique. In: 25th USENIX Security Symposium (USENIX Security 16), pp. 1187\u20131203 (2016)"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Henri, S., et\u00a0al.: Protecting against website fingerprinting with multihoming. In: Proceedings on Privacy Enhancing Technologies (2020)","DOI":"10.2478\/popets-2020-0019"},{"key":"16_CR19","unstructured":"Holland, J.K., Hopper, N.: Regulator: a straightforward website fingerprinting defense. arXiv preprintarXiv:2012.06609 (2020)"},{"issue":"2","key":"16_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1698750.1698753","volume":"13","author":"N Hopper","year":"2010","unstructured":"Hopper, N., Vasserman, E.Y., et al.: How much anonymity does network latency leak? ACM Trans. Info. Syst. Secur. (TISSEC) 13(2), 1\u201328 (2010)","journal-title":"ACM Trans. Info. Syst. Secur. (TISSEC)"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Hoque, M.A., et\u00a0al.: Context-driven encrypted multimedia traffic classification on mobile devices, vol.\u00a088, p. 101737. Elsevier (2023)","DOI":"10.1016\/j.pmcj.2022.101737"},{"key":"16_CR22","unstructured":"India Today Tech. Rising surveillance risk . https:\/\/www.indiatoday.in\/technology\/news\/story\/report-says-india-sniffing-internet-traffic-passing-through-undersea-cables-raises-surveillance-risk-2429311-2023-08-31 (2023)"},{"key":"16_CR23","unstructured":"ITU-T. POLQA: ITU-T Standard. http:\/\/www.polqa.info\/ (2008)"},{"key":"16_CR24","unstructured":"ITU T. E-model: ITU-T Standard. https:\/\/www.itu.int\/ITU-T\/2005-2008\/com12\/emodelv1\/tut.htm (2010)"},{"key":"16_CR25","unstructured":"ITU-T. ITU-T Standards Interpretation. https:\/\/www.itu.int\/rec\/dologin_pub.asp?lang=f&id=T-REC-P.863.1-201906-I!!PDF-E &type=items (2019)"},{"key":"16_CR26","unstructured":"Lynch, J.: VoIP surveillance. https:\/\/ecfr.eu\/publication\/iron-net-digital-repression-in-the-middle-east-and-north-africa\/ (2022)"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Jansen, R., Johnson, A.: Safely measuring tor. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201916, pp. 1553\u20131567 (2016)","DOI":"10.1145\/2976749.2978310"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Johnson, A., et\u00a0al.: Users get routed: traffic correlation on tor by realistic adversaries. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201913, pp. 337\u2013348 (2013)","DOI":"10.1145\/2508859.2516651"},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Juarez, M., et\u00a0al.: Toward an efficient website fingerprinting defense. In: Computer Security\u2013ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I 21, pp. 27\u201346. Springer (2016)","DOI":"10.1007\/978-3-319-45744-4_2"},{"key":"16_CR30","unstructured":"Shubber, K.:. Tempora Surveillance. https:\/\/www.wired.co.uk\/article\/gchq-tempora-101 (2013)"},{"key":"16_CR31","unstructured":"Poireault, K.: VoIP surveillance. https:\/\/www.infosecurity-magazine.com\/news\/lightspy-iphone-spyware-linked\/ (2023)"},{"key":"16_CR32","doi-asserted-by":"crossref","unstructured":"Kim, H., et\u00a0al.: Internet traffic classification demystified: myths, caveats, and the best practices. In: Proceedings of the 2008 ACM CoNEXT Conference, pp. 1\u201312 (2008)","DOI":"10.1145\/1544012.1544023"},{"key":"16_CR33","unstructured":"Lashkari, A.H., et\u00a0al.: Characterization of tor traffic using time based features. In: International Conference on Information Systems Security and Privacy, vol.\u00a02, pp. 253\u2013262. SciTePress (2017)"},{"key":"16_CR34","doi-asserted-by":"crossref","unstructured":"Le Blond, S., et\u00a0al.: Herd: a scalable, traffic analysis resistant anonymity network for VOIP systems. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 639\u2013652 (2015)","DOI":"10.1145\/2785956.2787491"},{"key":"16_CR35","doi-asserted-by":"crossref","unstructured":"Lu, D., et\u00a0al.: DynaFlow: an efficient website fingerprinting defense based on dynamically-adjusting flows. In: Proceedings of the 2018 Workshop on Privacy in the Electronic Society, pp. 109\u2013113 (2018)","DOI":"10.1145\/3267323.3268960"},{"key":"16_CR36","unstructured":"R.\u00a0M.: A Study of VoIP performance in anonymous network-The onion routing (Tor) - PhD thesis (2012)"},{"key":"16_CR37","doi-asserted-by":"crossref","unstructured":"Mani, A., Sherr, M.: Histor$$\\varepsilon $$: differentially private and robust statistics collection for tor. In: Network and Distributed System Security Symposium, NDSS \u201917 (2017)","DOI":"10.14722\/ndss.2017.23411"},{"key":"16_CR38","doi-asserted-by":"crossref","unstructured":"Mittal, P., Khurshid, A., et\u00a0al.: Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting. In: Proceedings of the 18th ACM conference on Computer and Communications Security, pp. 215\u2013226 (2011)","DOI":"10.1145\/2046707.2046732"},{"key":"16_CR39","unstructured":"Moore, W.B., Tan, H., et\u00a0al.: Multi-class traffic morphing for encrypted voip communication. In: Financial Cryptography and Data Security: 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers 19, pp. 65\u201385. Springer (2015)"},{"key":"16_CR40","doi-asserted-by":"crossref","unstructured":"Murdoch, S.J., Zieli\u0144ski, P.: Sampled traffic analysis by internet-exchange-level adversaries. In: International Workshop on Privacy Enhancing Technologies, pp. 167\u2013183. Springer (2007)","DOI":"10.1007\/978-3-540-75551-7_11"},{"key":"16_CR41","unstructured":"Murphy, K.P.: Machine Learning: A Probabilistic Perspective. The MIT Press (2012). ISBN 0262018020"},{"key":"16_CR42","unstructured":"Unuth, N.: Common VoIP Codecs. https:\/\/www.lifewire.com\/voip-codecs-3426728 (2021)"},{"key":"16_CR43","doi-asserted-by":"crossref","unstructured":"Nasr, M., Bahramali, A., et\u00a0al.: DeepCorr: strong flow correlation attacks on tor using deep learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201918, pp. 1962\u20131976 (2018)","DOI":"10.1145\/3243734.3243824"},{"key":"16_CR44","unstructured":"Nick, M.: Tor New Release. https:\/\/blog.torproject.org\/new-release-tor-0401-alpha\/ (2019)"},{"key":"16_CR45","doi-asserted-by":"crossref","unstructured":"Oh, S., Lee, M., et al.: AppSniffer: towards robust mobile app fingerprinting against VPN. In: Proceedings of the ACM Web Conference, vol. 2023, pp. 2318\u20132328 (2023)","DOI":"10.1145\/3543507.3583473"},{"key":"16_CR46","unstructured":"Opus Info. Opus Info. https:\/\/opus-codec.org\/ (2021)"},{"key":"16_CR47","doi-asserted-by":"crossref","unstructured":"Panchenko, A., Lanze, F., et\u00a0al.: Website fingerprinting at internet scale. In: Network and Distributed System Security Symposium, NDSS \u201916 (2016)","DOI":"10.14722\/ndss.2016.23477"},{"key":"16_CR48","doi-asserted-by":"crossref","unstructured":"Panchenko, A., Niessen, L., et\u00a0al.: Website fingerprinting in onion routing based anonymization networks. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, pp. 103\u2013114 (2011)","DOI":"10.1145\/2046556.2046570"},{"key":"16_CR49","unstructured":"PJSIP. PJSIP Stack. https:\/\/www.pjsip.org\/ (2023)"},{"key":"16_CR50","doi-asserted-by":"crossref","unstructured":"Rimmer, V., Preuveneers, D., et\u00a0al.: Automated website fingerprinting through deep learning (2018)","DOI":"10.14722\/ndss.2018.23105"},{"key":"16_CR51","unstructured":"SampleSwap. SampleSwap. https:\/\/sampleswap.org\/index.php (2023)"},{"key":"16_CR52","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1016\/j.procs.2021.01.025","volume":"179","author":"D Sarwinda","year":"2021","unstructured":"Sarwinda, D., Paradisa, R.H., et al.: Deep learning in image classification using residual network (ResNet) variants for detection of colorectal cancer. Procedia Comput. Sci. 179, 423\u2013431 (2021)","journal-title":"Procedia Comput. Sci."},{"key":"16_CR53","unstructured":"Scikit-Learn. sklearn. https:\/\/scikit-learn.org\/stable\/index.html (2022)"},{"key":"16_CR54","unstructured":"Scikit Learn. Mean Decrease in Gini Impurity: Feature Importance Calculation. https:\/\/scikit-learn.org\/stable\/auto_examples\/inspection\/plot_permutation_importance.html (2023)"},{"key":"16_CR55","doi-asserted-by":"crossref","unstructured":"Shapira, T., Shavitt, Y.: FlowPic: encrypted internet traffic classification is as easy as image recognition. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 680\u2013687. IEEE (2019)","DOI":"10.1109\/INFCOMW.2019.8845315"},{"key":"16_CR56","doi-asserted-by":"crossref","unstructured":"Sharma, P.K., Chaudhary, S., et al.: The road not taken: Re-thinking the feasibility of voice calling over tor. In: Proceedings on Privacy Enhancing Technologies, vol. 4, pp. 1\u201320 (2020)","DOI":"10.2478\/popets-2020-0063"},{"key":"16_CR57","doi-asserted-by":"crossref","unstructured":"Sirinam, P., Imani, M., et\u00a0al.: Deep fingerprinting: undermining website fingerprinting defenses with deep learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201918, pp. 1928\u20131943 (2018)","DOI":"10.1145\/3243734.3243768"},{"key":"16_CR58","unstructured":"Sottek. PRISM Surveillance. https:\/\/www.theverge.com\/2013\/7\/17\/4517480\/nsa-spying-prism-surveillance-cheat-sheet (2013)"},{"key":"16_CR59","unstructured":"Sun, Y., Edmundson, A., et\u00a0al.: $$\\{$$RAPTOR$$\\}$$: Routing attacks on privacy in tor. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 271\u2013286 (2015)"},{"key":"16_CR60","unstructured":"Telegraph India. VPN ban in India. https:\/\/www.telegraphindia.com\/business\/vpns-shut-india-based-servers-blame-invasive-government-rules\/cid\/1888380 (2022)"},{"key":"16_CR61","unstructured":"The Verge. VoIP surveillance. https:\/\/www.theverge.com\/2013\/6\/7\/4407782\/phone-spying-and-prism-internet-surveillance-whats-the-difference (2013)"},{"key":"16_CR62","unstructured":"Tor\u2013Project. Tor Metrics. https:\/\/metrics.torproject.org\/networksize.html (2023)"},{"key":"16_CR63","unstructured":"Tor Documentation. Circuit Padding Developer Documentation. https:\/\/gitlab.torproject.org\/tpo\/core\/tor\/-\/blob\/HEAD\/doc\/HACKING\/CircuitPaddingDevelopment.md (2022)"},{"key":"16_CR64","unstructured":"Tor Project. Tor bandwidth. https:\/\/metrics.torproject.org\/bandwidth.html (2023)"},{"key":"16_CR65","unstructured":"TorProject. Tor User base. https:\/\/metrics.torproject.org\/userstats-relay-country.html (2023)"},{"key":"16_CR66","unstructured":"University of Hawaii. University of Hawaii. https:\/\/library.wcc.hawaii.edu\/c.php?g=35279&p=4005956 (2023)"},{"key":"16_CR67","unstructured":"Wang, T., Cai, X., et\u00a0al.: Effective attacks and provable defenses for website fingerprinting. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 143\u2013157 (2014)"},{"key":"16_CR68","unstructured":"Wang, T., Goldberg, I.: $$\\{$$Walkie-Talkie$$\\}$$: an efficient defense against passive website fingerprinting attacks. In: 26th USENIX Security Symposium (USENIX Security 17), pp. 1375\u20131390. (2017)"},{"key":"16_CR69","unstructured":"Washington Post. Importance of Call meta-data. https:\/\/www.washingtonpost.com\/politics\/full-text-of-president-obamas-jan-17-speech-on-nsa-reforms\/2014\/01\/17\/fa33590a-7f8c-11e3-9556-4a4bf7bcbd84_story.html?tid=a_inl_manual (2014)"},{"key":"16_CR70","doi-asserted-by":"crossref","unstructured":"White, A.M., Matthews, A.R., et\u00a0al.: Phonotactic reconstruction of encrypted VoIP conversations: Hookt on Fon-iks. In: 2011 IEEE Symposium on Security and Privacy, pp. 3\u201318. IEEE (2011)","DOI":"10.1109\/SP.2011.34"},{"key":"16_CR71","unstructured":"Wright, C.V., Ballard, L., et\u00a0al.: Language identification of encrypted VoIP traffic: Alejandra y roberto or alice and bob? In: USENIX Security Symposium, (USENIX Security 07), pp. 43\u201354 (2007)"},{"key":"16_CR72","doi-asserted-by":"crossref","unstructured":"Wright, C.V., Ballard, L., et\u00a0al.: Spot me if you can: uncovering spoken phrases in encrypted VoIP conversations. In: 2008 IEEE Symposium on Security and Privacy (SP 2008), pp. 35\u201349. IEEE (2008)","DOI":"10.1109\/SP.2008.21"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-3531-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:12:24Z","timestamp":1741867944000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-3531-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819635306","9789819635313"],"references-count":72,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-3531-3_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss-socialsec2024\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}