{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T04:17:03Z","timestamp":1748405823966,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":49,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819789429"},{"type":"electronic","value":"9789819789436"}],"license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8943-6_18","type":"book-chapter","created":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T08:45:29Z","timestamp":1730105129000},"page":"365-387","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Effective Search Space Pruning for Testing Deep Neural Networks"],"prefix":"10.1007","author":[{"given":"Bala","family":"Rangayah","sequence":"first","affiliation":[]},{"given":"Eugene","family":"Sng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5716-9400","authenticated-orcid":false,"given":"Minh-Thai","family":"Trinh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,28]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","unstructured":"Achterberg, T.: Scip: solving constraint integer programs. Math. Programming Comput. 1, 1\u201341 (2009). https:\/\/doi.org\/10.1007\/s12532-008-0001-1","DOI":"10.1007\/s12532-008-0001-1"},{"key":"18_CR2","doi-asserted-by":"publisher","unstructured":"Alipanahi, B., Delong, A., Weirauch, M., Frey, B.J.: Predicting the sequence specificities of dna- and rna-binding proteins by deep learning. Nature Biotechnol. 33 (2015). https:\/\/doi.org\/10.1038\/nbt.3300","DOI":"10.1038\/nbt.3300"},{"key":"18_CR3","doi-asserted-by":"publisher","unstructured":"Andersen, E.D., Andersen, K.D.: Presolving in linear programming. Math. Program. 71(2), 221\u2013245 (1995). https:\/\/doi.org\/10.1007\/BF01586000, https:\/\/doi.org\/10.1007\/BF01586000","DOI":"10.1007\/BF01586000"},{"key":"18_CR4","doi-asserted-by":"publisher","unstructured":"Botoeva, E., Kouvaros, P., Kronqvist, J., Lomuscio, A., Misener, R.: Efficient verification of relu-based neural networks via dependency analysis. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, issue 04, pp. 3291\u20133299 (2020). https:\/\/doi.org\/10.1609\/aaai.v34i04.5729, https:\/\/ojs.aaai.org\/index.php\/AAAI\/article\/view\/5729","DOI":"10.1609\/aaai.v34i04.5729"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 39\u201357 (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1287\/ijoc.3.2.157","volume":"3","author":"JW Chinneck","year":"1991","unstructured":"Chinneck, J.W., Dravnieks, E.W.: Locating minimal infeasible constraint sets in linear programs. ORSA J. Comput. 3, 85\u2013176 (1991). https:\/\/doi.org\/10.1287\/ijoc.3.2.157. May","journal-title":"ORSA J. Comput."},{"key":"18_CR7","doi-asserted-by":"publisher","unstructured":"Dola, S., Dwyer, M.B., Soffa, M.L.: Distribution-aware testing of neural networks using generative models. In: Proceedings of the 43rd International Conference on Software Engineering, pp. 226\u2013237. ICSE \u201921, IEEE Press (2021). https:\/\/doi.org\/10.1109\/ICSE43902.2021.00032, https:\/\/doi.org\/10.1109\/ICSE43902.2021.00032","DOI":"10.1109\/ICSE43902.2021.00032"},{"key":"18_CR8","doi-asserted-by":"publisher","unstructured":"Gehr, T., Mirman, M., Drachsler-Cohen, D., Tsankov, P., Chaudhuri, S., Vechev, M.: Ai2: safety and robustness certification of neural networks with abstract interpretation. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 3\u201318 (2018). https:\/\/doi.org\/10.1109\/SP.2018.00058","DOI":"10.1109\/SP.2018.00058"},{"key":"18_CR9","doi-asserted-by":"publisher","unstructured":"Godefroid, P., Klarlund, N., Sen, K.: Dart: Directed automated random testing. In: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 213\u2013223. PLDI \u201905, ACM, New York, NY, USA (2005). https:\/\/doi.org\/10.1145\/1065010.1065036, http:\/\/doi.acm.org\/10.1145\/1065010.1065036","DOI":"10.1145\/1065010.1065036"},{"key":"18_CR10","unstructured":"Gopinath, D., P\u0103s\u0103reanu, C.S., Wang, K., Zhang, M., Khurshid, S.: Symbolic Execution for Deep Neural Networks. arXiv preprint arXiv:1807.10439 (2018)"},{"key":"18_CR11","doi-asserted-by":"publisher","unstructured":"Gopinath, D., P\u0103s\u0103reanu, C.S., Wang, K., Zhang, M., Khurshid, S.: Symbolic execution for attribution and attack synthesis in neural networks. In: Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, pp. 282\u2013283. ICSE \u201919, IEEE Press, Piscataway, NJ, USA (2019). https:\/\/doi.org\/10.1109\/ICSE-Companion.2019.00115, https:\/\/doi.org\/10.1109\/ICSE-Companion.2019.00115","DOI":"10.1109\/ICSE-Companion.2019.00115"},{"key":"18_CR12","doi-asserted-by":"publisher","unstructured":"Guo, J., Jiang, Y., Zhao, Y., Chen, Q., Sun, J.: Dlfuzz: differential fuzzing testing of deep learning systems. In: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 739\u2013743. ESEC\/FSE 2018, Association for Computing Machinery, New York, NY, USA (2018).https:\/\/doi.org\/10.1145\/3236024.3264835, https:\/\/doi.org\/10.1145\/3236024.3264835","DOI":"10.1145\/3236024.3264835"},{"key":"18_CR13","doi-asserted-by":"publisher","unstructured":"Huang, W., Zhao, X., Banks, A., Cox, V., Huang, X.: Hierarchical distribution-aware testing of deep learning. ACM Trans. Softw. Eng. Methodol. 33(2) (2023). https:\/\/doi.org\/10.1145\/3625290, https:\/\/doi.org\/10.1145\/3625290","DOI":"10.1145\/3625290"},{"key":"18_CR14","doi-asserted-by":"publisher","unstructured":"Huang, X., Kroening, D., Ruan, W., Sharp, J., Sun, Y., Thamo, E., Wu, M., Yi, X.: A survey of safety and trustworthiness of deep neural networks: verification, testing, adversarial attack and defence, and interpretability. Comput. Sci. Rev. 37, 100270 (2020). https:\/\/doi.org\/10.1016\/j.cosrev.2020.100270, http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1574013719302527","DOI":"10.1016\/j.cosrev.2020.100270"},{"key":"18_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-63387-9_1","volume-title":"Computer Aided Verification","author":"X Huang","year":"2017","unstructured":"Huang, X., Kwiatkowska, M., Wang, S., Wu, M.: Safety verification of deep neural networks. In: Majumdar, R., Kun\u010dak, V. (eds.) Computer Aided Verification, pp. 3\u201329. Springer International Publishing, Cham (2017)"},{"key":"18_CR16","unstructured":"IBM: Ibm ilog cplex optimization studio (2019). https:\/\/www.ibm.com\/products\/ilog-cplex-optimization-studio"},{"key":"18_CR17","doi-asserted-by":"publisher","unstructured":"Jaffar, J., Murali, V., Navas, J.A.: Boosting concolic testing via interpolation. In: Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, pp. 48\u201358. ESEC\/FSE 2013, ACM, New York, NY, USA (2013). https:\/\/doi.org\/10.1145\/2491411.2491425, http:\/\/doi.acm.org\/10.1145\/2491411.2491425","DOI":"10.1145\/2491411.2491425"},{"key":"18_CR18","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/978-3-642-04244-7_37","volume-title":"Principles and Practice of Constraint Programming - CP 2009","author":"J Jaffar","year":"2009","unstructured":"Jaffar, J., Santosa, A.E., Voicu, R.: An interpolation method for clp traversal. In: Gent, I.P. (ed.) Principles and Practice of Constraint Programming - CP 2009, pp. 454\u2013469. Springer, Heidelberg (2009)"},{"key":"18_CR19","unstructured":"Junker, U.: Quickxplain: preferred explanations and relaxations for over-constrained problems. In: Proceedings of the 19th National Conference on Artifical Intelligence, pp. 167\u2013172. AAAI\u201904, AAAI Press (2004). http:\/\/dl.acm.org\/citation.cfm?id=1597148.1597177"},{"key":"18_CR20","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-319-63387-9_5","volume-title":"Computer Aided Verification","author":"G Katz","year":"2017","unstructured":"Katz, G., Barrett, C., Dill, D.L., Julian, K., Kochenderfer, M.J.: Reluplex: an efficient smt solver for verifying deep neural networks. In: Majumdar, R., Kun\u010dak, V. (eds.) Computer Aided Verification, pp. 97\u2013117. Springer International Publishing, Cham (2017)"},{"key":"18_CR21","unstructured":"Kelly, J.H., Dan, S.V., John, J.C., Leanna, K.R.: A practical tutorial on modified condition\/decision coverage. Tech. Rep. (2001)"},{"key":"18_CR22","doi-asserted-by":"publisher","unstructured":"Kim, J., Feldt, R., Yoo, S.: Guiding deep learning system testing using surprise adequacy. In: Proceedings of the 41st International Conference on Software Engineering, pp. 1039\u20131049. ICSE \u201919, IEEE Press (2019). https:\/\/doi.org\/10.1109\/ICSE.2019.00108, https:\/\/doi.org\/10.1109\/ICSE.2019.00108","DOI":"10.1109\/ICSE.2019.00108"},{"key":"18_CR23","unstructured":"Knorr, E.: How Paypal Beats the Bad Guys with Machine Learning (2015). http:\/\/www.infoworld.com\/article\/2907877\/machine-learning\/how-paypal-reduces-fraudwith-machine-learning.html"},{"key":"18_CR24","unstructured":"Krizhevsky, A.: Learning multiple layers of features from tiny images. Tech. Rep. (2009)"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Leisink, M., Kappen, B.: Bound propagation. J. Artif. Int. Res. 19(1), 139\u2013154 (2003). http:\/\/dl.acm.org\/citation.cfm?id=1622434.1622439","DOI":"10.1613\/jair.1130"},{"key":"18_CR26","doi-asserted-by":"publisher","unstructured":"Ma, L., Juefei-Xu, F., Xue, M., Li, B., Li, L., Liu, Y., Zhao, J.: Deepct: tomographic combinatorial testing for deep learning systems. In: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 614\u2013618 (2019). https:\/\/doi.org\/10.1109\/SANER.2019.8668044","DOI":"10.1109\/SANER.2019.8668044"},{"key":"18_CR27","doi-asserted-by":"publisher","unstructured":"Ma, L., Juefei-Xu, F., Zhang, F., Sun, J., Xue, M., Li, B., Chen, C., Su, T., Li, L., Liu, Y., Zhao, J., Wang, Y.: Deepgauge: multi-granularity testing criteria for deep learning systems. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 120\u2013131. ASE 2018, ACM, New York, NY, USA (2018). https:\/\/doi.org\/10.1145\/3238147.3238202, http:\/\/doi.acm.org\/10.1145\/3238147.3238202","DOI":"10.1145\/3238147.3238202"},{"key":"18_CR28","doi-asserted-by":"publisher","unstructured":"Ma, L., Zhang, F., Sun, J., Xue, M., Li, B., Juefei-Xu, F., Xie, C., Li, L., Liu, Y., Zhao, J., Wang, Y.: Deepmutation: mutation testing of deep learning systems. In: 2018 IEEE 29th International Symposium on Software Reliability Engineering (ISSRE), pp. 100\u2013111 (2018). https:\/\/doi.org\/10.1109\/ISSRE.2018.00021","DOI":"10.1109\/ISSRE.2018.00021"},{"key":"18_CR29","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-642-14295-6_10","volume-title":"Computer Aided Verification","author":"KL McMillan","year":"2010","unstructured":"McMillan, K.L.: Lazy annotation for program testing and verification. In: Touili, T., Cook, B., Jackson, P. (eds.) Computer Aided Verification, pp. 104\u2013118. Springer, Heidelberg (2010)"},{"key":"18_CR30","unstructured":"Mirman, M., Gehr, T., Vechev, M.: Differentiable abstract interpretation for provably robust neural networks. In: International Conference on Machine Learning, pp. 3575\u20133583 (2018)"},{"key":"18_CR31","unstructured":"Nair, V., Hinton, G.E.: Rectified linear units improve restricted Boltzmann machines. In: Proceedings of the 27th International Conference on International Conference on Machine Learning, pp. 807\u2013814. ICML\u201910, Omnipress, USA (2010). http:\/\/dl.acm.org\/citation.cfm?id=3104322.3104425"},{"key":"18_CR32","unstructured":"NVIDIA: Nvidia tegra drive px: Self-driving Car Computer (2015)"},{"key":"18_CR33","unstructured":"Odena, A., Olsson, C., Andersen, D., Goodfellow, I.: TensorFuzz: debugging neural networks with coverage-guided fuzzing. In: Chaudhuri, K., Salakhutdinov, R. (eds.) Proceedings of the 36th International Conference on Machine Learning. Proceedings of Machine Learning Research, vol.\u00a097, pp. 4901\u20134911. PMLR, Long Beach, California, USA (2019). http:\/\/proceedings.mlr.press\/v97\/odena19a.html"},{"key":"18_CR34","doi-asserted-by":"publisher","unstructured":"Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z.B., Swami, A.: The limitations of deep learning in adversarial settings. In: 2016 IEEE European Symposium on Security and Privacy (EuroS P), pp. 372\u2013387 (2016). https:\/\/doi.org\/10.1109\/EuroSP.2016.36","DOI":"10.1109\/EuroSP.2016.36"},{"key":"18_CR35","doi-asserted-by":"publisher","unstructured":"Pei, K., Cao, Y., Yang, J., Jana, S.: Deepxplore: automated whitebox testing of deep learning systems. In: Proceedings of the 26th Symposium on Operating Systems Principles, pp. 1\u201318. SOSP \u201917, ACM, New York, NY, USA (2017). https:\/\/doi.org\/10.1145\/3132747.3132785, http:\/\/doi.acm.org\/10.1145\/3132747.3132785","DOI":"10.1145\/3132747.3132785"},{"key":"18_CR36","doi-asserted-by":"crossref","unstructured":"Rangayah, B., Sng, E., Trinh, M.T.: Effective Search Space Pruning for Testing Deep Neural Networks (Technical Report) (2024). https:\/\/trinhmt.github.io\/home\/DNN\/","DOI":"10.1007\/978-981-97-8943-6_18"},{"key":"18_CR37","doi-asserted-by":"publisher","unstructured":"Ruan, W., Huang, X., Kwiatkowska, M.: Reachability analysis of deep neural networks with provable guarantees. In: Proceedings of 27th International Joint Conference on Artificial Intelligence (IJCAI\u201918), pp. 2651\u20132659 (2018). https:\/\/doi.org\/10.24963\/ijcai.2018\/368","DOI":"10.24963\/ijcai.2018\/368"},{"key":"18_CR38","doi-asserted-by":"publisher","unstructured":"Russakovsky, O., Deng, J., Su, H., Krause, J., Satheesh, S., Ma, S., Huang, Z., Karpathy, A., Khosla, A., Bernstein, M., Berg, A.C., Fei-Fei, L.: Imagenet large scale visual recognition challenge. Int. J. Comput. Vision 115(3), 211\u2013252 (2015). https:\/\/doi.org\/10.1007\/s11263-015-0816-y, https:\/\/doi.org\/10.1007\/s11263-015-0816-y","DOI":"10.1007\/s11263-015-0816-y"},{"key":"18_CR39","doi-asserted-by":"publisher","unstructured":"Sun, Y., Huang, X., Kroening, D., Sharp, J., Hill, M., Ashmore, R.: Structural test coverage criteria for deep neural networks. ACM Trans. Embed. Comput. Syst. 18(5s) (2019). https:\/\/doi.org\/10.1145\/3358233, https:\/\/doi.org\/10.1145\/3358233","DOI":"10.1145\/3358233"},{"key":"18_CR40","doi-asserted-by":"publisher","unstructured":"Sun, Y., Wu, M., Ruan, W., Huang, X., Kwiatkowska, M., Kroening, D.: Concolic testing for deep neural networks. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 109\u2013119. ASE 2018, ACM, New York, NY, USA (2018). https:\/\/doi.org\/10.1145\/3238147.3238172, http:\/\/doi.acm.org\/10.1145\/3238147.3238172","DOI":"10.1145\/3238147.3238172"},{"key":"18_CR41","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., Fergus, R.: Intriguing properties of neural networks. In: International Conference on Learning Representations (2014)"},{"key":"18_CR42","doi-asserted-by":"publisher","unstructured":"Tian, Y., Pei, K., Jana, S., Ray, B.: Deeptest: automated testing of deep-neural-network-driven autonomous cars. In: Proceedings of the 40th International Conference on Software Engineering, pp. 303\u2013314. ICSE \u201918, ACM, New York, NY, USA (2018). https:\/\/doi.org\/10.1145\/3180155.3180220, http:\/\/doi.acm.org\/10.1145\/3180155.3180220","DOI":"10.1145\/3180155.3180220"},{"key":"18_CR43","unstructured":"VGG16: Vgg16 Model for Keras (2021). https:\/\/gist.github.com\/baraldilorenzo\/07d7802847aaad0a35d3"},{"key":"18_CR44","doi-asserted-by":"publisher","unstructured":"Wang, L., Xie, X., Du, X., Tian, M., Guo, Q., Yang, Z., Shen, C.: Distxplore: distribution-guided testing for evaluating and enhancing deep learning systems. In: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 68\u201380. ESEC\/FSE 2023, Association for Computing Machinery, New York, NY, USA (2023). https:\/\/doi.org\/10.1145\/3611643.3616266, https:\/\/doi.org\/10.1145\/3611643.3616266","DOI":"10.1145\/3611643.3616266"},{"key":"18_CR45","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/978-3-319-89960-2_22","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"M Wicker","year":"2018","unstructured":"Wicker, M., Huang, X., Kwiatkowska, M.: Feature-guided black-box safety testing of deep neural networks. In: Beyer, D., Huisman, M. (eds.) Tools and Algorithms for the Construction and Analysis of Systems, pp. 408\u2013426. Springer International Publishing, Cham (2018)"},{"key":"18_CR46","doi-asserted-by":"publisher","unstructured":"Xie, X., Ma, L., Juefei-Xu, F., Xue, M., Chen, H., Liu, Y., Zhao, J., Li, B., Yin, J., See, S.: Deephunter: a coverage-guided fuzz testing framework for deep neural networks. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 146\u2013157. ISSTA 2019, Association for Computing Machinery, New York, NY, USA (2019).https:\/\/doi.org\/10.1145\/3293882.3330579, https:\/\/doi.org\/10.1145\/3293882.3330579","DOI":"10.1145\/3293882.3330579"},{"key":"18_CR47","unstructured":"Yann, L., Corinna, C., Christopher, J.B.: The mnist Database of Handwritten Digits (1998)"},{"key":"18_CR48","doi-asserted-by":"crossref","unstructured":"Zhang, F., Chowdhury, S.P., Christakis, M.: DeepSearch: A Simple and Effective Blackbox Attack for Deep Neural Networks, pp. 800\u2013812. Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3368089.3409750","DOI":"10.1145\/3368089.3409750"},{"issue":"1","key":"18_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TSE.2019.2962027","volume":"48","author":"JM Zhang","year":"2022","unstructured":"Zhang, J.M., Harman, M., Ma, L., Liu, Y.: Machine learning testing: survey, landscapes and horizons. IEEE Trans. Software Eng. 48(1), 1\u201336 (2022). https:\/\/doi.org\/10.1109\/TSE.2019.2962027","journal-title":"IEEE Trans. Software Eng."}],"container-title":["Lecture Notes in Computer Science","Programming Languages and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8943-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T16:52:46Z","timestamp":1748364766000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8943-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"ISBN":["9789819789429","9789819789436"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8943-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,28]]},"assertion":[{"value":"28 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APLAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Symposium on Programming Languages and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kyoto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aplas2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.researchr.org\/home\/aplas-2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}