{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T21:24:54Z","timestamp":1777497894787,"version":"3.51.4"},"publisher-location":"Singapore","reference-count":43,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819971077","type":"print"},{"value":"9789819971084","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-7108-4_7","type":"book-chapter","created":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T23:02:16Z","timestamp":1696978936000},"page":"79-90","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Analysis and\u00a0Protection of\u00a0Public Medical Dataset: From Privacy Perspective"],"prefix":"10.1007","author":[{"given":"Samsad","family":"Jahan","sequence":"first","affiliation":[]},{"given":"Yong-Feng","family":"Ge","sequence":"additional","affiliation":[]},{"given":"Enamul","family":"Kabir","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,11]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Alnemari, A., Romanowski, C.J., Raj, R.K.: An adaptive differential privacy algorithm for range queries over healthcare data. In: 2017 IEEE International Conference on Healthcare Informatics (ICHI), pp. 397\u2013402. IEEE (2017)","DOI":"10.1109\/ICHI.2017.49"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.cose.2017.09.014","volume":"72","author":"A Anjum","year":"2018","unstructured":"Anjum, A., et al.: An efficient privacy mechanism for electronic health records. Comput. Secur. 72, 196\u2013211 (2018)","journal-title":"Comput. Secur."},{"issue":"1","key":"7_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/computers6010001","volume":"6","author":"A Anjum","year":"2017","unstructured":"Anjum, A., Raschia, G.: BangA: an efficient and flexible generalization-based algorithm for privacy preserving data publication. Computers 6(1), 1 (2017)","journal-title":"Computers"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Begum, S.H., Nausheen, F.: A comparative analysis of differential privacy vs other privacy mechanisms for big data. In: 2018 2nd International Conference on Inventive Systems and Control (ICISC), pp. 512\u2013516. IEEE (2018)","DOI":"10.1109\/ICISC.2018.8399125"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Belsis, P., Pantziou, G.: Protecting anonymity in wireless medical monitoring environments. In: Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments, pp. 1\u20136 (2011)","DOI":"10.1145\/2141622.2141687"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s00779-012-0618-y","volume":"18","author":"P Belsis","year":"2014","unstructured":"Belsis, P., Pantziou, G.: A k-anonymity privacy-preserving approach in wireless medical monitoring environments. Pers. Ubiquit. Comput. 18, 61\u201374 (2014)","journal-title":"Pers. Ubiquit. Comput."},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Bhuiyan, M.Z.A., Wang, G., Choo, K.K.R.: Secured data collection for a cloud-enabled structural health monitoring system. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), pp. 1226\u20131231. IEEE (2016)","DOI":"10.1109\/HPCC-SmartCity-DSS.2016.0171"},{"key":"7_CR8","unstructured":"Carvalho, T., Moniz, N., Faria, P., Antunes, L.: Survey on privacy-preserving techniques for data publishing. arXiv preprint arXiv:2201.08120 (2022)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Chong, K.M.: Privacy-preserving healthcare informatics: a review. In: ITM Web of Conferences, vol. 36, p. 04005. EDP Sciences (2021)","DOI":"10.1051\/itmconf\/20213604005"},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.comcom.2022.04.011","volume":"190","author":"J Domingo-Ferrer","year":"2022","unstructured":"Domingo-Ferrer, J., Mart\u00ednez, S., S\u00e1nchez, D.: Decentralized k-anonymization of trajectories via privacy-preserving tit-for-tat. Comput. Commun. 190, 57\u201368 (2022)","journal-title":"Comput. Commun."},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79228-4_1"},{"issue":"1","key":"7_CR12","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/2775051.2677005","volume":"50","author":"H Ebadi","year":"2015","unstructured":"Ebadi, H., Sands, D., Schneider, G.: Differential privacy: now it\u2019s getting personal. Acm Sigplan Not. 50(1), 69\u201381 (2015)","journal-title":"Acm Sigplan Not."},{"issue":"5","key":"7_CR13","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1197\/jamia.M2716","volume":"15","author":"K El Emam","year":"2008","unstructured":"El Emam, K., Dankar, F.K.: Protecting privacy using k-anonymity. J. Am. Med. Inform. Assoc. 15(5), 627\u2013637 (2008)","journal-title":"J. Am. Med. Inform. Assoc."},{"issue":"6","key":"7_CR14","first-page":"e9","volume":"9","author":"M Fatima","year":"2022","unstructured":"Fatima, M., Rehman, O., Rahman, I.M.: Impact of features reduction on machine learning based intrusion detection systems. EAI Endors. Trans. Scalable Inf. Syst. 9(6), e9\u2013e9 (2022)","journal-title":"EAI Endors. Trans. Scalable Inf. Syst."},{"issue":"10","key":"7_CR15","doi-asserted-by":"publisher","first-page":"2269","DOI":"10.1093\/jamia\/ocab135","volume":"28","author":"J Ficek","year":"2021","unstructured":"Ficek, J., Wang, W., Chen, H., Dagne, G., Daley, E.: Differential privacy in health research: a scoping review. J. Am. Med. Inform. Assoc. 28(10), 2269\u20132276 (2021)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"7_CR16","doi-asserted-by":"publisher","unstructured":"Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4) (2010). https:\/\/doi.org\/10.1145\/1749603.1749605","DOI":"10.1145\/1749603.1749605"},{"key":"7_CR17","doi-asserted-by":"publisher","DOI":"10.1145\/3613962","author":"YF Ge","year":"2023","unstructured":"Ge, Y.F., Bertino, E., Wang, H., Cao, J., Zhang, Y.: Distributed cooperative coevolution of data publishing privacy and transparency. ACM Trans. Knowl. Discov. Data (2023). https:\/\/doi.org\/10.1145\/3613962","journal-title":"ACM Trans. Knowl. Discov. Data"},{"issue":"5","key":"7_CR18","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1007\/s00778-021-00718-w","volume":"31","author":"YF Ge","year":"2022","unstructured":"Ge, Y.F., Orlowska, M., Cao, J., Wang, H., Zhang, Y.: MDDE: multitasking distributed differential evolution for privacy-preserving database fragmentation. VLDB J. 31(5), 957\u2013975 (2022)","journal-title":"VLDB J."},{"key":"7_CR19","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2023.3302284","author":"YF Ge","year":"2023","unstructured":"Ge, Y.F., et al.: Evolutionary dynamic database partitioning optimization for privacy and utility. IEEE Trans. Dependable Secure Comput. (2023). https:\/\/doi.org\/10.1109\/tdsc.2023.3302284","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/978-3-031-20891-1_24","volume-title":"Web Information Systems Engineering - WISE 2022","author":"YF Ge","year":"2022","unstructured":"Ge, Y.F., Wang, H., Cao, J., Zhang, Y.: An information-driven genetic algorithm for privacy-preserving data publishing. In: Chbeir, R., Huang, H., Silvestri, F., Manolopoulos, Y., Zhang, Y. (eds.) WISE 2022. LNCS, vol. 13724, pp. 340\u2013354. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-20891-1_24"},{"key":"7_CR21","doi-asserted-by":"publisher","first-page":"864","DOI":"10.1016\/j.ins.2022.09.003","volume":"612","author":"YF Ge","year":"2022","unstructured":"Ge, Y.F., et al.: DSGA: a distributed segment-based genetic algorithm for multi-objective outsourced database partitioning. Inf. Sci. 612, 864\u2013886 (2022). https:\/\/doi.org\/10.1016\/j.ins.2022.09.003","journal-title":"Inf. Sci."},{"key":"7_CR22","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1016\/j.ins.2022.08.105","volume":"613","author":"J Hu","year":"2022","unstructured":"Hu, J., Sun, K., Zhang, H.: Helmholtz machine with differential privacy. Inf. Sci. 613, 888\u2013903 (2022)","journal-title":"Inf. Sci."},{"issue":"1","key":"7_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-016-0059-y","volume":"3","author":"P Jain","year":"2016","unstructured":"Jain, P., Gyanchandani, M., Khare, N.: Big data privacy: a technological perspective and review. J. Big Data 3(1), 1\u201325 (2016). https:\/\/doi.org\/10.1186\/s40537-016-0059-y","journal-title":"J. Big Data"},{"issue":"2","key":"7_CR24","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1109\/tcc.2015.2469649","volume":"8","author":"ME Kabir","year":"2020","unstructured":"Kabir, M.E., Mahmood, A.N., Wang, H., Mustafa, A.K.: Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing. IEEE Trans. Cloud Comput. 8(2), 408\u2013417 (2020). https:\/\/doi.org\/10.1109\/tcc.2015.2469649","journal-title":"IEEE Trans. Cloud Comput."},{"key":"7_CR25","doi-asserted-by":"publisher","first-page":"1793","DOI":"10.1007\/s11280-021-00941-z","volume":"25","author":"L Kong","year":"2022","unstructured":"Kong, L., Wang, L., Gong, W., Yan, C., Duan, Y., Qi, L.: LSH-aware multitype health data prediction with privacy preservation in edge environment. World Wide Web 25, 1793\u20131808 (2022)","journal-title":"World Wide Web"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd International Conference on Data Engineering, pp. 106\u2013115. IEEE (2006)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data (TKDD) 1(1), 3-es (2007)","DOI":"10.1145\/1217299.1217302"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Ngatchou, P., Zarei, A., El-Sharkawi, A.: Pareto multi objective optimization. In: Proceedings of the 13th International Conference on, Intelligent Systems Application to Power Systems, pp. 84\u201391. IEEE (2005)","DOI":"10.1109\/ISAP.2005.1599245"},{"issue":"12","key":"7_CR29","first-page":"172","volume":"17","author":"K Rajendran","year":"2017","unstructured":"Rajendran, K., Jayabalan, M., Rana, M.E.: A study on k-anonymity, l-diversity, and t-closeness techniques. IJCSNS 17(12), 172 (2017)","journal-title":"IJCSNS"},{"issue":"6","key":"7_CR30","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"4","key":"7_CR31","first-page":"e5","volume":"9","author":"R Sarki","year":"2022","unstructured":"Sarki, R., Ahmed, K., Wang, H., Zhang, Y., Wang, K.: Convolutional neural network for multi-class classification of diabetic eye disease. EAI Endors. Trans. Scalable Inf. Syst. 9(4), e5\u2013e5 (2022)","journal-title":"EAI Endors. Trans. Scalable Inf. Syst."},{"issue":"5","key":"7_CR32","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1007\/s00778-014-0351-4","volume":"23","author":"J Soria-Comas","year":"2014","unstructured":"Soria-Comas, J., Domingo-Ferrer, J., S\u00e1nchez, D., Mart\u00ednez, S.: Enhancing data utility in differential privacy via microaggregation-based k-anonymity. VLDB J. 23(5), 771\u2013794 (2014)","journal-title":"VLDB J."},{"issue":"4","key":"7_CR33","first-page":"373","volume":"4","author":"P Sowmiyaa","year":"2015","unstructured":"Sowmiyaa, P., Tamilarasu, P., Kavitha, S., Rekha, A., Krishna, G.: Privacy preservation for microdata by using k-anonymity Algorithm. Int. J. Adv. Res. Comput. Commun. Eng. 4(4), 373\u20135 (2015)","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"issue":"3","key":"7_CR34","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1016\/j.future.2010.07.007","volume":"27","author":"X Sun","year":"2011","unstructured":"Sun, X., Li, M., Wang, H.: A family of enhanced (l, $$\\alpha $$)-diversity models for privacy preserving data publishing. Futur. Gener. Comput. Syst. 27(3), 348\u2013356 (2011). https:\/\/doi.org\/10.1016\/j.future.2010.07.007","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"4","key":"7_CR35","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1093\/comjnl\/bxr028","volume":"55","author":"X Sun","year":"2012","unstructured":"Sun, X., Wang, H., Li, J., Zhang, Y.: Satisfying privacy requirements before data anonymization. Comput. J. 55(4), 422\u2013437 (2012)","journal-title":"Comput. J."},{"issue":"05","key":"7_CR36","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"Vadavalli, A., Subhashini, R.: An improved differential privacy-preserving truth discovery approach in healthcare. In: 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 1031\u20131037. IEEE (2019)","DOI":"10.1109\/IEMCON.2019.8936141"},{"key":"7_CR38","first-page":"1","volume":"63","author":"J Vasa","year":"2022","unstructured":"Vasa, J., Thakkar, A.: Deep learning: differential privacy preservation in the era of big data. J. Comput. Inf. Syst. 63, 1\u201324 (2022)","journal-title":"J. Comput. Inf. Syst."},{"issue":"6","key":"7_CR39","first-page":"e7","volume":"9","author":"N Venkateswaran","year":"2022","unstructured":"Venkateswaran, N., Prabaharan, S.P.: An efficient neuro deep learning intrusion detection system for mobile adhoc networks. EAI Endors. Trans. Scalable Inf. Syst. 9(6), e7\u2013e7 (2022)","journal-title":"EAI Endors. Trans. Scalable Inf. Syst."},{"key":"7_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13755-020-00126-4","volume":"8","author":"P Vimalachandran","year":"2020","unstructured":"Vimalachandran, P., Liu, H., Lin, Y., Ji, K., Wang, H., Zhang, Y.: Improving accessibility of the Australian my health records while preserving privacy and security of the system. Health Inf. Sci. Syst. 8, 1\u20139 (2020)","journal-title":"Health Inf. Sci. Syst."},{"issue":"3","key":"7_CR41","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1002\/cpe.3286","volume":"28","author":"H Wang","year":"2016","unstructured":"Wang, H., Yi, X., Bertino, E., Sun, L.: Protecting outsourced data in cloud computing through access management. Concurr. Comput.: Pract. Exp. 28(3), 600\u2013615 (2016)","journal-title":"Concurr. Comput.: Pract. Exp."},{"key":"7_CR42","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s11280-021-00909-z","volume":"25","author":"J Yin","year":"2022","unstructured":"Yin, J., Tang, M., Cao, J., Wang, H., You, M., Lin, Y.: Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning. World Wide Web 25, 401\u2013423 (2022)","journal-title":"World Wide Web"},{"issue":"2","key":"7_CR43","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1007\/s11280-022-01076-5","volume":"26","author":"M You","year":"2023","unstructured":"You, M., et al.: A knowledge graph empowered online learning framework for access control decision-making. World Wide Web 26(2), 827\u2013848 (2023)","journal-title":"World Wide Web"}],"container-title":["Lecture Notes in Computer Science","Health Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-7108-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:12:43Z","timestamp":1730301163000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-7108-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819971077","9789819971084"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-7108-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"11 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Health Information Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"his22023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.his-conferences.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}