{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T07:16:35Z","timestamp":1760426195971,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":47,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819997848"},{"type":"electronic","value":"9789819997855"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-9785-5_36","type":"book-chapter","created":{"date-parts":[[2024,2,3]],"date-time":"2024-02-03T18:02:05Z","timestamp":1706983325000},"page":"513-530","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["KEP: Keystroke Evoked Potential for\u00a0EEG-Based User Authentication"],"prefix":"10.1007","author":[{"given":"Jiaxuan","family":"Wu","sequence":"first","affiliation":[]},{"given":"Wei-Yang","family":"Chiu","sequence":"additional","affiliation":[]},{"given":"Weizhi","family":"Meng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,4]]},"reference":[{"key":"36_CR1","doi-asserted-by":"publisher","unstructured":"Barker, E.: NIST Special Publication 800\u201357 Part 1 Revision 5: Recommendation for Key Management. https:\/\/doi.org\/10.6028\/NIST.SP.800-57pt1r5","DOI":"10.6028\/NIST.SP.800-57pt1r5"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks (1992)","DOI":"10.1145\/168588.168618"},{"issue":"25","key":"36_CR3","doi-asserted-by":"publisher","first-page":"1389","DOI":"10.1049\/el.2020.2532","volume":"56","author":"S Bhalerao","year":"2020","unstructured":"Bhalerao, S., Ansari, I., Kumar, A.: Protection of BCI system via reversible watermarking of EEG signal. Electron. Lett. 56(25), 1389\u20131392 (2020)","journal-title":"Electron. Lett."},{"issue":"5","key":"36_CR4","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1109\/THMS.2022.3196142","volume":"52","author":"K Bialas","year":"2022","unstructured":"Bialas, K., Kedziora, M., Chalupnik, R., Song, H.H.: Multifactor authentication system using simplified EEG brain-computer interface. IEEE Trans. Hum. Mach. Syst. 52(5), 867\u2013876 (2022)","journal-title":"IEEE Trans. Hum. Mach. Syst."},{"issue":"3","key":"36_CR5","doi-asserted-by":"publisher","first-page":"315","DOI":"10.15837\/ijccc.2016.3.2556","volume":"11","author":"I Buciu","year":"2016","unstructured":"Buciu, I., Gacsadi, A.: Biometrics systems and technologies: a survey. Int. J. Comput. Commun. Control 11(3), 315\u2013330 (2016)","journal-title":"Int. J. Comput. Commun. Control"},{"key":"36_CR6","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.patrec.2021.05.006","volume":"148","author":"A Casanova","year":"2021","unstructured":"Casanova, A., Cascone, L., Castiglione, A., Meng, W., Pero, C.: User recognition based on periocular biometrics and touch dynamics. Pattern Recognit. Lett. 148, 114\u2013120 (2021)","journal-title":"Pattern Recognit. Lett."},{"key":"36_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-030-68851-6_18","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"W-Y Chiu","year":"2021","unstructured":"Chiu, W.-Y., Meng, W., Li, W.: I can think like you! Towards reaction spoofing attack on brainwave-based authentication. In: Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H. (eds.) SpaCCS 2020. LNCS, vol. 12382, pp. 251\u2013265. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68851-6_18"},{"issue":"6","key":"36_CR8","doi-asserted-by":"publisher","first-page":"822","DOI":"10.1016\/j.pmcj.2012.06.005","volume":"8","author":"CT Cornelius","year":"2012","unstructured":"Cornelius, C.T., Kotz, D.F.: Recognizing whether sensors are on the same body. Pervasive Mob. Comput. 8(6), 822\u2013836 (2012)","journal-title":"Pervasive Mob. Comput."},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"El-Fiqi, H., Wang, M., Salimi, N., Kasmarik, K., Barlow, M., Abbass, H.: Convolution neural networks for person identification and verification using steady state visual evoked potential. In: 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1062\u20131069. IEEE (2018)","DOI":"10.1109\/SMC.2018.00188"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Gleerup, T., Li, W., Tan, J., Wang, Y.: Zoompass: A zoom-based android unlock scheme on smart devices. In: Su, C., Sakurai, K., Liu, F. (eds.) Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10\u201312, 2022, Revised Selected Papers. Lecture Notes in Computer Science, vol. 13580, pp. 245\u2013259. Springer, Cham (2022)","DOI":"10.1007\/978-3-031-17551-0_16"},{"key":"36_CR11","unstructured":"King, B.J., Read, G.J., Salmon, P.M.: The risks associated with the use of brain-computer interfaces: a systematic review. Int. J. Hum. Comput. Interact. 1\u201318 (2022)"},{"key":"36_CR12","unstructured":"Kirovski, D., Sinclair, M., Wilson, D.: The martini synch. Microsoft Research, Cambridge, UK, Tech. Rep. MSR-TR-2007-123 (2007)"},{"issue":"1","key":"36_CR13","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MVT.2012.2234056","volume":"8","author":"J Klonovs","year":"2013","unstructured":"Klonovs, J., Petersen, C.K., Olesen, H., Hammersh\u00f8j, A.: ID proof on the Go: Development of a mobile EEG-based biometric authentication system. IEEE Veh. Technol. Mag. 8(1), 81\u201389 (2013)","journal-title":"IEEE Veh. Technol. Mag."},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Li, W., Gleerup, T., Tan, J., Wang, Y.: A security enhanced android unlock scheme based on pinch-to-zoom for smart devices. IEEE Trans. Consum. Electron. 1\u20139 (2023)","DOI":"10.1109\/TCE.2023.3280064"},{"key":"36_CR15","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.patrec.2021.01.019","volume":"144","author":"W Li","year":"2021","unstructured":"Li, W., Meng, W., Furnell, S.: Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities. Pattern Recognit. Lett. 144, 35\u201341 (2021)","journal-title":"Pattern Recognit. Lett."},{"key":"36_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102687","volume":"165","author":"W Li","year":"2020","unstructured":"Li, W., Tan, J., Meng, W., Wang, Y.: A swipe-based unlocking mechanism with supervised learning on smartphones: design and evaluation. J. Netw. Comput. Appl. 165, 102687 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"36_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-030-30619-9_11","volume-title":"Machine Learning for Cyber Security","author":"W Li","year":"2019","unstructured":"Li, W., Tan, J., Meng, W., Wang, Yu., Li, J.: SwipeVLock: a supervised unlocking mechanism based on swipe behavior on smartphones. In: Chen, X., Huang, X., Zhang, J. (eds.) ML4CS 2019. LNCS, vol. 11806, pp. 140\u2013153. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30619-9_11"},{"key":"36_CR18","doi-asserted-by":"crossref","unstructured":"Li, W., Tan, J., Zhu, N.: Double-x: Towards double-cross-based unlock mechanism on smartphones. In: Meng, W., Fischer-H\u00fcbner, S., Jensen, C.D. (eds.) ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June 13\u201315, 2022, Proceedings. IFIP Advances in Information and Communication Technology, vol. 648, pp. 412\u2013428. Springer, Cham (2022)","DOI":"10.1007\/978-3-031-06975-8_24"},{"key":"36_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103204","volume":"129","author":"W Li","year":"2023","unstructured":"Li, W., Tan, J., Zhu, N.: Design of double-cross-based smartphone unlock mechanism. Comput. Secur. 129, 103204 (2023)","journal-title":"Comput. Secur."},{"key":"36_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/978-3-030-68884-4_47","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"W Li","year":"2021","unstructured":"Li, W., Tan, J., Zhu, N., Wang, Yu.: Designing double-click-based unlocking mechanism on smartphones. In: Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H. (eds.) SpaCCS 2020. LNCS, vol. 12383, pp. 573\u2013585. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68884-4_47"},{"key":"36_CR21","volume":"55","author":"W Li","year":"2020","unstructured":"Li, W., Wang, Y., Li, J., Xiang, Y.: Toward supervised shape-based behavioral authentication on smartphones. J. Inf. Secur. Appl. 55, 102591 (2020)","journal-title":"J. Inf. Secur. Appl."},{"issue":"1","key":"36_CR22","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/s11036-021-01842-1","volume":"27","author":"W Li","year":"2022","unstructured":"Li, W., Wang, Y., Tan, J., Zhu, N.: DCUS: evaluating double-click-based unlocking scheme on smartphones. Mob. Networks Appl. 27(1), 382\u2013391 (2022)","journal-title":"Mob. Networks Appl."},{"issue":"3","key":"36_CR23","first-page":"85","volume":"7","author":"SH Liew","year":"2015","unstructured":"Liew, S.H., Choo, Y.H., Low, Y.F., Yusoh, Z.I.M.: Identifying visual evoked potential (VEP) electrodes setting for person authentication. Int. J. Adv. Soft Comput. Appl 7(3), 85\u201399 (2015)","journal-title":"Int. J. Adv. Soft Comput. Appl"},{"key":"36_CR24","doi-asserted-by":"crossref","unstructured":"Lin, Q., et al.: H2B: heartbeat-based secret key generation using piezo vibration sensors. In: Proceedings of the 18th International Conference on Information Processing in Sensor Networks, pp. 265\u2013276 (2019)","DOI":"10.1145\/3302506.3310406"},{"key":"36_CR25","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/978-3-030-22312-0_13","volume-title":"ICT Systems Security and Privacy Protection","author":"W Meng","year":"2019","unstructured":"Meng, W., Li, W., Jiang, L., Zhou, J.: SocialAuth: designing touch behavioral smartphone user authentication based on social networking applications. In: Dhillon, G., Karlsson, F., Hedstr\u00f6m, K., Z\u00faquete, A. (eds.) SEC 2019. IAICT, vol. 562, pp. 180\u2013193. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22312-0_13"},{"key":"36_CR26","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.cose.2016.11.010","volume":"65","author":"W Meng","year":"2017","unstructured":"Meng, W., Li, W., Kwok, L., Choo, K.R.: Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones. Comput. Secur. 65, 213\u2013229 (2017)","journal-title":"Comput. Secur."},{"issue":"23","key":"36_CR27","doi-asserted-by":"publisher","first-page":"30167","DOI":"10.1007\/s11042-018-6094-2","volume":"77","author":"W Meng","year":"2018","unstructured":"Meng, W., Li, W., Wong, D.S.: Enhancing touch behavioral authentication via cost-based intelligent mechanism on smartphones. Multim. Tools Appl. 77(23), 30167\u201330185 (2018)","journal-title":"Multim. Tools Appl."},{"key":"36_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1007\/978-3-319-39555-5_34","volume-title":"Applied Cryptography and Network Security","author":"W Meng","year":"2016","unstructured":"Meng, W., Li, W., Wong, D.S., Zhou, J.: TMGuard: a touch movement-based security mechanism for screen unlock patterns on smartphones. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 629\u2013647. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39555-5_34"},{"key":"36_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-319-99807-7_23","volume-title":"Information Security Practice and Experience","author":"W Meng","year":"2018","unstructured":"Meng, W., Liu, Z.: TMGMap: designing touch movement-based geographical password authentication on smartphones. In: Su, C., Kikuchi, H. (eds.) ISPEC 2018. LNCS, vol. 11125, pp. 373\u2013390. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99807-7_23"},{"key":"36_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2018.05.010","volume":"117","author":"W Meng","year":"2018","unstructured":"Meng, W., Wang, Y., Wong, D.S., Wen, S., Xiang, Y.: TouchWB: touch behavioral user authentication based on web browsing on smartphones. J. Netw. Comput. Appl. 117, 1\u20139 (2018)","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"36_CR31","doi-asserted-by":"publisher","first-page":"1268","DOI":"10.1109\/COMST.2014.2386915","volume":"17","author":"W Meng","year":"2015","unstructured":"Meng, W., Wong, D.S., Furnell, S., Zhou, J.: Surveying the development of biometric user authentication on mobile phones. IEEE Commun. Surv. Tutorials 17(3), 1268\u20131293 (2015)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"2","key":"36_CR32","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1108\/IMCS-09-2013-0062","volume":"22","author":"W Meng","year":"2014","unstructured":"Meng, W., Wong, D.S., Kwok, L.: The effect of adaptive mechanism on behavioural biometric based mobile phone authentication. Inf. Manag. Comput. Secur. 22(2), 155\u2013166 (2014)","journal-title":"Inf. Manag. Comput. Secur."},{"key":"36_CR33","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-39218-4_5","volume-title":"Security and Privacy Protection in Information Processing Systems","author":"Y Meng","year":"2013","unstructured":"Meng, Y., Li, W., Kwok, L.-F.: Enhancing click-draw based graphical passwords using multi-touch on mobile phones. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.) SEC 2013. IAICT, vol. 405, pp. 55\u201368. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39218-4_5"},{"issue":"1","key":"36_CR34","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/TNSRE.2005.863842","volume":"14","author":"GR Muller-Putz","year":"2006","unstructured":"Muller-Putz, G.R., Scherer, R., Neuper, C., Pfurtscheller, G.: Steady-state somatosensory evoked potentials: suitable brain signals for brain-computer interfaces? IEEE Trans. Neural Syst. Rehabil. Eng. 14(1), 30\u201337 (2006)","journal-title":"IEEE Trans. Neural Syst. Rehabil. Eng."},{"issue":"3","key":"36_CR35","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/TIFS.2017.2763124","volume":"13","author":"T Nakamura","year":"2018","unstructured":"Nakamura, T., Goverdovsky, V., Mandic, D.P.: In-ear EEG biometrics for feasible and readily collectable real-world person authentication. IEEE Trans. Inf. Forensics Secur. 13(3), 648\u2013661 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"36_CR36","doi-asserted-by":"crossref","unstructured":"Pham, T., Ma, W., Tran, D., Nguyen, P., Phung, D.Q.: Multi-factor EEG-based user authentication. In: 2014 International Joint Conference on Neural Networks, IJCNN 2014, Beijing, China, July 6\u201311, 2014, pp. 4029\u20134034. IEEE (2014)","DOI":"10.1109\/IJCNN.2014.6889569"},{"key":"36_CR37","doi-asserted-by":"crossref","unstructured":"Rostami, M., Juels, A., Koushanfar, F.: Heart-to-heart (H2H) authentication for implanted medical devices. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1099\u20131112 (2013)","DOI":"10.1145\/2508859.2516658"},{"key":"36_CR38","doi-asserted-by":"crossref","unstructured":"Rukhin, A., et al.: A statistical test suite for random and pseudorandom number generators for cryptographic applications, vol. 22. US Department of Commerce, Technology Administration, National Institute of $$\\ldots $$ (2001)","DOI":"10.6028\/NIST.SP.800-22"},{"key":"36_CR39","doi-asserted-by":"crossref","unstructured":"Sch\u00fcrmann, D., Br\u00fcsch, A., Sigg, S., Wolf, L.: Bandana-body area network device-to-device authentication using natural gait. In: 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 190\u2013196. IEEE (2017)","DOI":"10.1109\/PERCOM.2017.7917865"},{"key":"36_CR40","doi-asserted-by":"crossref","unstructured":"Sun, Y., Meng, W., Li, W.: Designing in-air hand gesture-based user authentication system via convex hull. In: 19th Annual International Conference on Privacy, Security & Trust, PST 2022, Fredericton, NB, Canada, August 22\u201324, 2022, pp. 1\u20135. IEEE (2022)","DOI":"10.1109\/PST55820.2022.9851982"},{"key":"36_CR41","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems 30 (2017)"},{"key":"36_CR42","doi-asserted-by":"crossref","unstructured":"Wolpaw, J.R., del R. Mill\u00e1n, J., Ramsey, N.F.: Chapter 2 - brain-computer interfaces: Definitions and principles. In: Ramsey, N.F., del R. Mill\u00e1n, J. (eds.) Brain-Computer Interfaces, Handbook of Clinical Neurology, vol. 168, pp. 15\u201323. Elsevier (2020)","DOI":"10.1016\/B978-0-444-63934-9.00002-0"},{"key":"36_CR43","unstructured":"Wu, B., Meng, W., Chiu, W.: Towards enhanced EEG-based authentication with motor imagery brain-computer interface. In: Annual Computer Security Applications Conference, ACSAC 2022, Austin, TX, USA, December 5\u20139, 2022, pp. 799\u2013812. ACM (2022)"},{"issue":"1","key":"36_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3380981","volume":"4","author":"Y Wu","year":"2020","unstructured":"Wu, Y., Lin, Q., Jia, H., Hassan, M., Hu, W.: Auto-key: using autoencoder to speed up gait-based key generation in body area networks. Proc. ACM Interact. Mob. Wearable Ubiquit. Technol. 4(1), 1\u201323 (2020)","journal-title":"Proc. ACM Interact. Mob. Wearable Ubiquit. Technol."},{"key":"36_CR45","doi-asserted-by":"crossref","unstructured":"Xu, W., Revadigar, G., Luo, C., Bergmann, N., Hu, W.: Walkie-talkie: motion-assisted automatic key generation for secure on-body device communication. In: 2016 15th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN), pp. 1\u201312. IEEE (2016)","DOI":"10.1109\/IPSN.2016.7460726"},{"key":"36_CR46","doi-asserted-by":"crossref","unstructured":"Yadav, V.K., Yadav, R.K., Chaurasia, B.K., Verma, S., Venkatesan, S.: MITM attack on modification of Diffie-Hellman key exchange algorithm. In: Communication, Networks and Computing: Second International Conference, CNC 2020, Gwalior, India, pp. 144\u2013155 (2021)","DOI":"10.1007\/978-981-16-8896-6_12"},{"key":"36_CR47","doi-asserted-by":"crossref","unstructured":"Zhang, S., Sun, L., Mao, X., Hu, C., Liu, P., et al.: Review on EEG-based authentication technology. Comput. Intell. Neurosci. 2021, 20 (2021)","DOI":"10.1155\/2021\/5229576"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-9785-5_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,3]],"date-time":"2024-02-03T18:14:28Z","timestamp":1706984068000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-9785-5_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819997848","9789819997855"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-9785-5_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"4 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIS&P","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ais&p2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/aisp2023","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23 large model and security workshop papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}