{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T10:24:52Z","timestamp":1750328692652,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031471971"},{"type":"electronic","value":"9783031471988"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-47198-8_7","type":"book-chapter","created":{"date-parts":[[2023,10,29]],"date-time":"2023-10-29T10:01:17Z","timestamp":1698573677000},"page":"107-125","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-Preserving NN for\u00a0IDS: A Study on\u00a0the\u00a0Impact of\u00a0TFHE Restrictions"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6102-6165","authenticated-orcid":false,"given":"Ivone","family":"Amorim","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7381-3462","authenticated-orcid":false,"given":"Pedro","family":"Barbosa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8075-531X","authenticated-orcid":false,"given":"Eva","family":"Maia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2519-9859","authenticated-orcid":false,"given":"Isabel","family":"Pra\u00e7a","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,30]]},"reference":[{"key":"7_CR1","unstructured":"Hacktivists step back giving way to professionals: a look at DDos in Q3 2022 (2022). https:\/\/www.kaspersky.com\/about\/press-releases\/2022_hacktivists-step-back-giving-way-to-professionals-a-look-at-ddos-in-q3-2022. Accessed 30 Jun 2023"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Acar, A., Aksu, H., Uluagac, A., Conti, M.: A survey on homomorphic encryption schemes: Theory and implementation. ACM Comput. Surv. 51(4), 1\u201335 (2018)","DOI":"10.1145\/3214303"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Ali, T.E., Chong, Y.W., Manickam, S.: Machine learning techniques to detect a DDos attack in SDN: a systematic review. Appl. Sci. 13(5), 3183 (2023). https:\/\/www.mdpi.com\/2076-3417\/13\/5\/3183","DOI":"10.3390\/app13053183"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Alom, M.Z., et al.: A state-of-the-art survey on deep learning theory and architectures. Electronics 8(3), 292 (2019)","DOI":"10.3390\/electronics8030292"},{"key":"7_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107871","volume":"188","author":"G Amaizu","year":"2021","unstructured":"Amaizu, G., Nwakanma, C., Bhardwaj, S., Lee, J., Kim, D.: Composite and efficient DDos attack detection framework for b5g networks. Comput. Netw. 188, 107871 (2021). https:\/\/doi.org\/10.1016\/j.comnet.2021.107871","journal-title":"Comput. Netw."},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Amorim, I., Maia, E., Barbosa, P., Pra\u00e7a, I.: Data privacy with homomorphic encryption in neural networks training and inference (2023). https:\/\/doi.org\/10.48550\/arXiv.2305.02225","DOI":"10.1007\/978-3-031-38318-2_36"},{"key":"7_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102942","volume":"177","author":"MV Assis","year":"2021","unstructured":"Assis, M.V., Carvalho, L.F., Lloret, J., Proen\u00e7a, M.L.: A GRU deep learning system against attacks in software defined networks. J. Netw. Comput. Appl. 177, 102942 (2021). https:\/\/doi.org\/10.1016\/j.jnca.2020.102942","journal-title":"J. Netw. Comput. Appl."},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s00521-010-0346-z","volume":"20","author":"A Bansal","year":"2011","unstructured":"Bansal, A., Chen, T., Zhong, S.: Privacy preserving back-propagation neural network learning over arbitrarily partitioned data. Neural Comput. Appl. 20, 143\u2013150 (2011). https:\/\/doi.org\/10.1007\/s00521-010-0346-z","journal-title":"Neural Comput. Appl."},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.neucom.2019.11.041","volume":"384","author":"A Boulemtafes","year":"2020","unstructured":"Boulemtafes, A., Derhab, A., Challal, Y.: A review of privacy-preserving techniques for deep learning. Neurocomputing 384, 21\u201345 (2020). https:\/\/doi.org\/10.1016\/j.neucom.2019.11.041","journal-title":"Neurocomputing"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-030-20951-3_20","volume-title":"Cyber Security Cryptography and Machine Learning","author":"C Boura","year":"2019","unstructured":"Boura, C., Gama, N., Georgieva, M., Jetchev, D.: Simulating homomorphic evaluation of deep learning predictions. In: Dolev, S., Hendler, D., Lodha, S., Yung, M. (eds.) CSCML 2019. LNCS, vol. 11527, pp. 212\u2013230. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-20951-3_20"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/978-3-319-96878-0_17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2018","author":"F Bourse","year":"2018","unstructured":"Bourse, F., Minelli, M., Minihold, M., Paillier, P.: Fast homomorphic evaluation of deep discretized neural networks. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10993, pp. 483\u2013512. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96878-0_17"},{"key":"7_CR12","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: Fully homomorphic encryption without bootstrapping. Cryptology ePrint Archive, Paper 2011\/277 (2011). https:\/\/eprint.iacr.org\/2011\/277"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, pp. 309\u2013325. ITCS 2012, Association for Computing Machinery, New York, NY, USA (2012)","DOI":"10.1145\/2090236.2090262"},{"key":"7_CR14","unstructured":"Carey, E., Donnell, I.M.: Powering an inclusive, digital future for all (2023). https:\/\/newsroom.cisco.com\/c\/r\/newsroom\/en\/us\/a\/y2023\/m01\/powering-an-inclusive-digital-future-for-all.html. Accessed 29 Jun 2023"},{"issue":"10","key":"7_CR15","doi-asserted-by":"publisher","first-page":"1554","DOI":"10.1109\/TNN.2009.2026902","volume":"20","author":"T Chen","year":"2009","unstructured":"Chen, T., Zhong, S.: Privacy-preserving backpropagation neural network learning. IEEE Trans. Neural Networks 20(10), 1554\u20131564 (2009). https:\/\/doi.org\/10.1109\/TNN.2009.2026902","journal-title":"IEEE Trans. Neural Networks"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/978-3-319-78381-9_14","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"JH Cheon","year":"2018","unstructured":"Cheon, J.H., Han, K., Kim, A., Kim, M., Song, Y.: Bootstrapping for approximate homomorphic encryption. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10820, pp. 360\u2013384. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78381-9_14"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-319-70694-8_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"JH Cheon","year":"2017","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10624, pp. 409\u2013437. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_15"},{"issue":"1","key":"7_CR18","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00145-019-09319-x","volume":"33","author":"I Chillotti","year":"2020","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: TFHE: fast fully homomorphic encryption over the torus. J. Cryptol. 33(1), 34\u201391 (2020)","journal-title":"J. Cryptol."},{"key":"7_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114520","volume":"169","author":"AE Cil","year":"2021","unstructured":"Cil, A.E., Yildiz, K., Buldu, A.: Detection of DDos attacks with feed forward based deep neural network model. Expert Syst. Appl. 169, 114520 (2021). https:\/\/doi.org\/10.1016\/j.eswa.2020.114520","journal-title":"Expert Syst. Appl."},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-030-81645-2_16","volume-title":"Applied Cryptography and Network Security Workshops","author":"P-E Clet","year":"2021","unstructured":"Clet, P.-E., Stan, O., Zuber, M.: BFV, CKKS, TFHE: which one is\u00a0the\u00a0best for a secure neural network evaluation in the cloud? In: Zhou, J., et al. (eds.) ACNS 2021. LNCS, vol. 12809, pp. 279\u2013300. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-81645-2_16"},{"key":"7_CR21","unstructured":"Dowlin, N., Gilad-Bachrach, R., Laine, K., Lauter, K., Naehrig, M., Wernsing, J.: CryptoNets: applying neural networks to encrypted data with high throughput and accuracy. In: Proceedings of the 33rd International Conference on International Conference on Machine Learning, vol. 48. pp. 201\u2013210. ICML 2016, JMLR.org (2016)"},{"key":"7_CR22","doi-asserted-by":"publisher","unstructured":"Engelen, G., Rimmer, V., Joosen, W.: Troubleshooting an intrusion detection dataset: the CICIDS2017 case study. In: 2021 IEEE Security and Privacy Workshops (SPW), pp. 7\u201312 (2021). https:\/\/doi.org\/10.1109\/SPW53761.2021.00009","DOI":"10.1109\/SPW53761.2021.00009"},{"key":"7_CR23","unstructured":"Fan, J., Vercauteren, F.: Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive, Paper 2012\/144 (2012). https:\/\/eprint.iacr.org\/2012\/144. Accessed 24 Feb 2023"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Ghimes, A.M., Vladuta, V.A., Patriciu, V.V., Ioni\u0163\u0103, A.: Applying neural network approach to homomorphic encrypted data. In: 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), pp. 1\u20136 (2018)","DOI":"10.1109\/ECAI.2018.8679085"},{"key":"7_CR25","unstructured":"Haworth, J.: UK cryptocurrency exchange EXMO knocked offline by \u2018massive\u2019 DDos attack. https:\/\/portswigger.net\/daily-swig\/uk-cryptocurrency-exchange-exmo-knocked-offline-by-massive-ddos-attack (2021). Accessed 29 Jun 2023"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Hussain, F., Abbas, S.G., Husnain, M., Fayyaz, U.U., Shahzad, F., Shah, G.A.: IoT dos and DDos attack detection using ResNet. In: 2020 IEEE 23rd International Multitopic Conference (INMIC), pp. 1\u20136 (2020)","DOI":"10.1109\/INMIC50486.2020.9318216"},{"key":"7_CR27","unstructured":"James, M.: The 8 most devastating DDos attacks of 2022 and what we can learn from them. https:\/\/allaboutcookies.org\/the-worst-ddos-attacks. Accessed 29 Jun 2023"},{"issue":"1","key":"7_CR28","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/44571.44572","volume":"16","author":"RP Lippmann","year":"1988","unstructured":"Lippmann, R.P.: An introduction to computing with neural nets. SIGARCH Comput. Archit. News 16(1), 7\u201325 (1988)","journal-title":"SIGARCH Comput. Archit. News"},{"key":"7_CR29","unstructured":"Lou, Q., Feng, B., Fox, G.C., Jiang, L.: Glyph: fast and accurately training deep neural networks on encrypted data. Neural Inf. Process. Syst. Found. 33, 9193\u20139202 (2020)"},{"key":"7_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-06608-1","author":"M Mittal","year":"2022","unstructured":"Mittal, M., Kumar, K., Behal, S.: Deep learning approaches for detecting DDos attacks: a systematic review. Soft. Comput. (2022). https:\/\/doi.org\/10.1007\/s00500-021-06608-1","journal-title":"Soft. Comput."},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Myers, D., Hutchinson, R.: Efficient implementation of piecewise linear activation function for digital VLSI neural networks. Electron. Lett. 25, 1662\u20131663 (1989). https:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/el_19891114","DOI":"10.1049\/el:19891114"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Nandakumar, K., et al.: Towards deep neural network training on encrypted data. vol. 2019-June, pp. 40\u201348. IEEE Computer Society (2019)","DOI":"10.1109\/CVPRW.2019.00011"},{"key":"7_CR33","doi-asserted-by":"publisher","first-page":"819","DOI":"10.3390\/make3040041","volume":"3","author":"G Onoufriou","year":"2021","unstructured":"Onoufriou, G., Mayfield, P., Leontidis, G.: Fully homomorphically encrypted deep learning as a service. Mach. Learn. Knowl. Extr. 3, 819\u2013834 (2021)","journal-title":"Mach. Learn. Knowl. Extr."},{"key":"7_CR34","doi-asserted-by":"publisher","unstructured":"Ozkan-Okay, M., Samet, R., Aslan, d., Gupta, D.: A comprehensive systematic literature review on intrusion detection systems. IEEE Access 9, 157727\u2013157760 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3129336","DOI":"10.1109\/ACCESS.2021.3129336"},{"key":"7_CR35","doi-asserted-by":"publisher","first-page":"1666","DOI":"10.1007\/s12083-021-01076-8","volume":"14","author":"B Pulido-Gaytan","year":"2021","unstructured":"Pulido-Gaytan, B., et al.: Privacy-preserving neural networks with homomorphic encryption: challenges and opportunities. Peer-to-Peer Netw. Appl. 14, 1666\u20131691 (2021)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"7_CR36","doi-asserted-by":"crossref","unstructured":"Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM 56(6), 84\u201393 (2009)","DOI":"10.1145\/1568318.1568324"},{"key":"7_CR37","doi-asserted-by":"publisher","unstructured":"Sbai, O., El Boukhari, M.: Data flooding intrusion detection system for MANETs using deep learning approach (2020). https:\/\/doi.org\/10.1145\/3419604.3419777","DOI":"10.1145\/3419604.3419777"},{"key":"7_CR38","doi-asserted-by":"publisher","unstructured":"Sharafaldin, I., Lashkari, A.H., Hakak, S., Ghorbani, A.A.: Developing realistic distributed denial of service (DDos) attack dataset and taxonomy. In: 2019 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20138 (2019). https:\/\/doi.org\/10.1109\/CCST.2019.8888419","DOI":"10.1109\/CCST.2019.8888419"},{"key":"7_CR39","doi-asserted-by":"publisher","unstructured":"Song, B., Yoo, J., Hong, M., Yoon, J.: A bitwise design and implementation for privacy-preserving data mining: from atomic operations to advanced algorithms. Secur. Commun. Netw. 2019, 3648671 (2019). https:\/\/doi.org\/10.1155\/2019\/3648671","DOI":"10.1155\/2019\/3648671"},{"key":"7_CR40","doi-asserted-by":"publisher","unstructured":"Yoo, J.S., Yoon, J.W.: t-BMPNet: trainable bitwise multilayer perceptron neural network over fully homomorphic encryption scheme. Secur. Commun. Netw. 2021, 7621260 (2021). https:\/\/doi.org\/10.1155\/2021\/7621260","DOI":"10.1155\/2021\/7621260"},{"issue":"1","key":"7_CR41","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1109\/TPDS.2013.18","volume":"25","author":"J Yuan","year":"2014","unstructured":"Yuan, J., Yu, S.: Privacy preserving back-propagation neural network learning made practical with cloud computing. IEEE Trans. Parallel Distrib. Syst. 25(1), 212\u2013221 (2014). https:\/\/doi.org\/10.1109\/TPDS.2013.18","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"7_CR42","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/TNSE.2020.3040704","volume":"9","author":"Q Zhang","year":"2022","unstructured":"Zhang, Q., Xin, C., Wu, H.: SecureTrain: an approximation-free and computationally efficient framework for privacy-preserved neural network training. IEEE Trans. Netw. Sci. Eng. 9(1), 187\u2013202 (2022). https:\/\/doi.org\/10.1109\/TNSE.2020.3040704","journal-title":"IEEE Trans. Netw. Sci. Eng."}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-47198-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T16:34:46Z","timestamp":1709829286000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-47198-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031471971","9783031471988"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-47198-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"30 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"STM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Security and Trust Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Hague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"stm2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.nics.uma.es\/stm2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}