{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T04:38:21Z","timestamp":1758083901362,"version":"3.44.0"},"publisher-location":"Cham","reference-count":57,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032046260"},{"type":"electronic","value":"9783032046277"}],"license":[{"start":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T00:00:00Z","timestamp":1757980800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T00:00:00Z","timestamp":1757980800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-04627-7_5","type":"book-chapter","created":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T02:05:07Z","timestamp":1757988307000},"page":"77-95","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["AttentionLeak: What Does Human Attention Reveal About Information Visualisation?"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-4668-239X","authenticated-orcid":false,"given":"Malte","family":"S\u00f6nnichsen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6490-9139","authenticated-orcid":false,"given":"Mayar","family":"Elfares","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3633-8623","authenticated-orcid":false,"given":"Yao","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9071-9312","authenticated-orcid":false,"given":"Ralf","family":"K\u00fcsters","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4724-9164","authenticated-orcid":false,"given":"Alina","family":"Roitberg","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6317-7303","authenticated-orcid":false,"given":"Andreas","family":"Bulling","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,16]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Ahn, S., Kelton, C., Balasubramanian, A., Zelinsky, G.: Towards predicting reading comprehension from gaze behavior. In: Proceedings of the ACM International Symposium on Eye Tracking Research and Applications (ETRA), pp.\u00a01\u20135 (2020)","DOI":"10.1145\/3379156.3391335"},{"key":"5_CR2","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1016\/j.neucom.2016.05.047","volume":"207","author":"JF Boisvert","year":"2016","unstructured":"Boisvert, J.F., Bruce, N.D.: Predicting task from eye movements: on the importance of spatial distribution, dynamics, and image features. Neurocomputing 207, 653\u2013668 (2016)","journal-title":"Neurocomputing"},{"issue":"1","key":"5_CR3","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1109\/TVCG.2015.2467732","volume":"22","author":"MA Borkin","year":"2015","unstructured":"Borkin, M.A., et al.: Beyond memorability: visualization recognition and recall. IEEE Trans. Vis. Comput. Graph. (TVCG) 22(1), 519\u2013528 (2015)","journal-title":"IEEE Trans. Vis. Comput. Graph. (TVCG)"},{"issue":"8","key":"5_CR4","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0255979","volume":"16","author":"E Bozkir","year":"2021","unstructured":"Bozkir, E., G\u00fcnl\u00fc, O., Fuhl, W., Schaefer, R.F., Kasneci, E.: Differential privacy for eye tracking with temporal correlations. PLoS ONE 16(8), e0255979 (2021)","journal-title":"PLoS ONE"},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/MITS.2017.2743171","volume":"9","author":"C Braunagel","year":"2017","unstructured":"Braunagel, C., Geisler, D., Rosenstiel, W., Kasneci, E.: Online recognition of driver-activity based on visual scanpath classification. IEEE Intell. Transp. Syst. Mag. (ITS) 9, 23\u201336 (2017)","journal-title":"IEEE Intell. Transp. Syst. Mag. (ITS)"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Bulling, A., Roggen, D.: Recognition of visual memory recall processes using eye movement analysis. In: Proceedings of the 13th International Conference on Ubiquitous Computing (UbiComp), pp. 455\u2013464 (2011)","DOI":"10.1145\/2030112.2030172"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Bulling, A., Zander, T.O.: Cognition-aware computing. In: Proceedings of the International Conference on Pervasive Computing (Pervasive), vol. 13, no. 3, pp. 80\u201383 (2014)","DOI":"10.1109\/MPRV.2014.42"},{"issue":"4","key":"5_CR8","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1016\/j.patcog.2014.02.017","volume":"48","author":"V Cantoni","year":"2015","unstructured":"Cantoni, V., Galdi, C., Nappi, M., Porta, M., Riccio, D.: Gant: gaze analysis technique for human identification. Pattern Recogn. 48(4), 1027\u20131038 (2015)","journal-title":"Pattern Recogn."},{"issue":"5","key":"5_CR9","doi-asserted-by":"publisher","first-page":"2774","DOI":"10.1109\/TVCG.2023.3247048","volume":"29","author":"B David-John","year":"2023","unstructured":"David-John, B., Butler, K., Jain, E.: Privacy-preserving datasets of eye-tracking samples with applications in XR. IEEE TVCG 29(5), 2774\u20132784 (2023). https:\/\/doi.org\/10.1109\/TVCG.2023.3247048","journal-title":"IEEE TVCG"},{"key":"5_CR10","doi-asserted-by":"publisher","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: Imagenet: a large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 248\u2013255 (2009). https:\/\/doi.org\/10.1109\/CVPR.2009.5206848","DOI":"10.1109\/CVPR.2009.5206848"},{"issue":"3","key":"5_CR11","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1145\/320613.320616","volume":"5","author":"DE Denning","year":"1980","unstructured":"Denning, D.E.: Secure statistical databases with random sample queries. ACM Trans. Database Syst. (TODS) 5(3), 291\u2013315 (1980)","journal-title":"ACM Trans. Database Syst. (TODS)"},{"key":"5_CR12","unstructured":"Dosovitskiy, A., et al.: An image is worth 16x16 words: transformers for image recognition at scale (2020)"},{"key":"5_CR13","doi-asserted-by":"publisher","unstructured":"Elfares, M., Hu, Z., Reisert, P., Bulling, A., K\u00fcsters, R.: Federated learning for appearance-based gaze estimation in the wild. NeurIPS-GMML (2022). https:\/\/doi.org\/10.48550\/arXiv.2211.07330","DOI":"10.48550\/arXiv.2211.07330"},{"key":"5_CR14","doi-asserted-by":"publisher","unstructured":"Elfares, M., Reisert, P., Tang, W., Hu, Z., K\u00fcsters, R., Bulling, A.: Privateyes: appearance-based gaze estimation using federated secure multi-party computation. In: ACM Symposium on Eye Tracking Research & Applications (ETRA) (2024). https:\/\/doi.org\/10.48550\/arXiv.2402.18970","DOI":"10.48550\/arXiv.2402.18970"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1322\u20131333 (2015)","DOI":"10.1145\/2810103.2813677"},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.neucom.2018.11.102","volume":"391","author":"L Gao","year":"2020","unstructured":"Gao, L., Cao, L., Xu, X., Shao, J., Song, J.: Question-led object attention for visual question answering. Neurocomputing 391, 227\u2013233 (2020)","journal-title":"Neurocomputing"},{"issue":"2","key":"5_CR17","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1109\/TVCG.2016.2532331","volume":"23","author":"SR Gomez","year":"2016","unstructured":"Gomez, S.R., Jianu, R., Cabeen, R., Guo, H., Laidlaw, D.H.: Fauxvea: crowdsourcing gaze location estimates for visualization analysis tasks. IEEE Trans. Visual Comput. Graphics 23(2), 1042\u20131055 (2016)","journal-title":"IEEE Trans. Visual Comput. Graphics"},{"issue":"1","key":"5_CR18","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/MPRV.2022.3228660","volume":"22","author":"C Gressel","year":"2023","unstructured":"Gressel, C., et al.: Privacy-aware eye tracking: challenges and future directions. IEEE Pervasive Comput. 22(1), 95\u2013102 (2023). https:\/\/doi.org\/10.1109\/MPRV.2022.3228660","journal-title":"IEEE Pervasive Comput."},{"key":"5_CR19","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. CoRR abs\/1512.03385 (2015). http:\/\/arxiv.org\/abs\/1512.03385"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Hild, J., Voit, M., K\u00fchnle, C., Beyerer, J.: Predicting observer\u2019s task from eye movement patterns during motion image analysis. In: Proceedings of the ACM International Symposium on Eye Tracking Research and Applications (ETRA), pp.\u00a01\u20135 (2018)","DOI":"10.1145\/3204493.3204575"},{"issue":"4","key":"5_CR21","doi-asserted-by":"publisher","first-page":"1992","DOI":"10.1109\/TVCG.2021.3138902","volume":"29","author":"Z Hu","year":"2021","unstructured":"Hu, Z., Bulling, A., Li, S., Wang, G.: EHTask: recognizing user tasks from eye and head movements in immersive virtual reality. IEEE Trans. Vis. Comput. Graph. (TVCG) 29(4), 1992\u20132004 (2021)","journal-title":"IEEE Trans. Vis. Comput. Graph. (TVCG)"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Huang, M.X., Li, J., Ngai, G., Leong, H.V., Bulling, A.: Moment-to-moment detection of internal thought during video viewing from eye vergence behavior. In: Proceedings of ACM Multimedia (MM), pp.\u00a01\u20139 (2019)","DOI":"10.1145\/3343031.3350573"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Kifer, D., Gehrke, J.: Injecting utility into anonymized datasets. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, pp. 217\u2013228 (2006)","DOI":"10.1145\/1142473.1142499"},{"issue":"5","key":"5_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3131275","volume":"24","author":"NW Kim","year":"2017","unstructured":"Kim, N.W., et al.: Bubbleview: an interface for crowdsourcing image importance maps and tracking visual attention. ACM Trans. Comput.-Hum. Interact. (TOCHI) 24(5), 1\u201340 (2017)","journal-title":"ACM Trans. Comput.-Hum. Interact. (TOCHI)"},{"key":"5_CR25","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. CoRR abs\/1412.6980 (2014). https:\/\/api.semanticscholar.org\/CorpusID:6628106"},{"key":"5_CR26","unstructured":"Lall\u00e9, S., Conati, C., Carenini, G.: Predicting confusion in information visualization from eye tracking and interaction data. In: IJCAI, pp. 2529\u20132535 (2016)"},{"key":"5_CR27","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.neucom.2013.04.035","volume":"121","author":"F Lethaus","year":"2013","unstructured":"Lethaus, F., Baumann, M.R., K\u00f6ster, F., Lemmer, K.: A comparison of selected simple supervised learning algorithms to predict driver intent based on gaze data. Neurocomputing 121, 108\u2013130 (2013)","journal-title":"Neurocomputing"},{"key":"5_CR28","unstructured":"Li, J., Chowdhury, A.R., Fawaz, K., Kim, Y.: $$\\{$$Kal$$\\varepsilon $$ido$$\\}$$:$$\\{$$Real-Time$$\\}$$ privacy control for $$\\{$$Eye-Tracking$$\\}$$ systems. In: 30th USENIX Security Symposium, pp. 1793\u20131810 (2021)"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Liu, A., Xia, L., Duchowski, A., Bailey, R., Holmqvist, K., Jain, E.: Differential privacy for eye-tracking data. In: ACM Symposium on Eye Tracking Research & Applications, pp. 1\u201310 (2019)","DOI":"10.1145\/3314111.3319823"},{"key":"5_CR30","unstructured":"Loshchilov, I., Hutter, F.: Fixing weight decay regularization in adam. arXiv abs\/1711.05101 (2017). https:\/\/api.semanticscholar.org\/CorpusID:3312944"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Masry, A., Long, D., Tan, J.Q., Joty, S., Hoque, E.: ChartQA: a benchmark for question answering about charts with visual and logical reasoning. In: Findings of the Association for Computational Linguistics: ACL 2022, Dublin, Ireland, pp. 2263\u20132279. Association for Computational Linguistics (2022)","DOI":"10.18653\/v1\/2022.findings-acl.177"},{"issue":"1","key":"5_CR32","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1109\/TVCG.2017.2743939","volume":"24","author":"LE Matzen","year":"2017","unstructured":"Matzen, L.E., Haass, M.J., Divis, K.M., Wang, Z., Wilson, A.T.: Data visualization saliency model: a tool for evaluating abstract data visualizations. IEEE Trans. Vis. Comput. Graph. (TVCG) 24(1), 563\u2013573 (2017)","journal-title":"IEEE Trans. Vis. Comput. Graph. (TVCG)"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"Melis, L., Song, C., De\u00a0Cristofaro, E., Shmatikov, V.: Exploiting unintended feature leakage in collaborative learning. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 691\u2013706. IEEE (2019)","DOI":"10.1109\/SP.2019.00029"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: 2008 IEEE Symposium on Security and Privacy (SP 2008), pp. 111\u2013125. IEEE (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"5_CR35","unstructured":"Oquab, M., et al.: Dinov2: learning robust visual features without supervision (2023)"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Patro, B., Namboodiri, V., et\u00a0al.: Explanation vs attention: a two-player game to obtain attention for VQA. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a034, pp. 11848\u201311855 (2020)","DOI":"10.1609\/aaai.v34i07.6858"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Pfleging, B., Fekety, D.K., Schmidt, A., Kun, A.L.: A model relating pupil diameter to mental workload and lighting conditions. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI), pp. 5776\u20135788 (2016)","DOI":"10.1145\/2858036.2858117"},{"key":"5_CR38","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.cag.2018.01.010","volume":"72","author":"P Polatsek","year":"2018","unstructured":"Polatsek, P., Waldner, M., Viola, I., Kapec, P., Benesova, W.: Exploring visual attention and saliency modeling for task-based visual analysis. Comput. Graph. 72, 26\u201338 (2018)","journal-title":"Comput. Graph."},{"issue":"3","key":"5_CR39","doi-asserted-by":"publisher","first-page":"232","DOI":"10.5709\/acp-0223-1","volume":"13","author":"N Sammaknejad","year":"2017","unstructured":"Sammaknejad, N., Pouretemad, H., Eslahchi, C., Salahirad, A., Alinejad, A.: Gender classification based on eye movements: a processing effect during passive face viewing. Adv. Cogn. Psychol. 13(3), 232 (2017)","journal-title":"Adv. Cogn. Psychol."},{"key":"5_CR40","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/j.neucom.2020.01.028","volume":"387","author":"H Sattar","year":"2020","unstructured":"Sattar, H., Fritz, M., Bulling, A.: Deep gaze pooling: Inferring and visually decoding search intents from human gaze fixations. Neurocomputing 387, 369\u2013382 (2020)","journal-title":"Neurocomputing"},{"issue":"1","key":"5_CR41","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1109\/TVCG.2022.3209472","volume":"29","author":"S Shin","year":"2022","unstructured":"Shin, S., Chung, S., Hong, S., Elmqvist, N.: A scanner deeply: predicting gaze heatmaps on visualizations using crowdsourced eye movement data. IEEE Trans. Vis. Comput. Graph. (TVCG) 29(1), 396\u2013406 (2022)","journal-title":"IEEE Trans. Vis. Comput. Graph. (TVCG)"},{"key":"5_CR42","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3\u201318. IEEE (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"5_CR43","unstructured":"Sood, E., Shi, L., Bortoletto, M., Wang, Y., M\u00fcller, P., Bulling, A.: Improving neural saliency prediction with a cognitive model of human visual attention. In: Proceedings the 45th Annual Meeting of the Cognitive Science Society (CogSci), pp. 3639\u20133646 (2023)"},{"key":"5_CR44","unstructured":"Sutskever, I., Martens, J., Dahl, G., Hinton, G.: On the importance of initialization and momentum in deep learning. In: Proceedings of the 30th International Conference on International Conference on Machine Learning - Volume 28, ICML 2013, pp. III-1139\u2013III-1147. JMLR.org (2013)"},{"key":"5_CR45","unstructured":"Vaswani, A.: Attention is all you need. In: Advances in Neural Information Processing Systems (2017)"},{"key":"5_CR46","doi-asserted-by":"crossref","unstructured":"Wang, H., Zhan, Z., Shan, H., Dai, S., Panoff, M., Wang, S.: Gazeploit: remote keystroke inference attack by gaze estimation from avatar views in VR\/MR devices. In: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, pp. 1731\u20131745 (2024)","DOI":"10.1145\/3658644.3690285"},{"key":"5_CR47","doi-asserted-by":"crossref","unstructured":"Wang, X., et al.: The mental image revealed by gaze tracking. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI), pp. 1\u201312 (2019)","DOI":"10.1145\/3290605.3300839"},{"issue":"11","key":"5_CR48","doi-asserted-by":"publisher","first-page":"2714","DOI":"10.1109\/TMC.2019.2934690","volume":"19","author":"Y Wang","year":"2019","unstructured":"Wang, Y., Cai, W., Gu, T., Shao, W.: Your eyes reveal your secrets: an eye movement based password inference on smartphone. IEEE Trans. Mob. Comput. 19(11), 2714\u20132730 (2019)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"5_CR49","doi-asserted-by":"crossref","unstructured":"Wang, Y., Jiang, Y., Hu, Z., Ruhdorfer, C., B\u00e2ce, M., Bulling, A.: Visrecall++: analysing and predicting visualisation recallability from gaze behaviour. Proc. ACM Hum.-Comput. Interact. 8(ETRA), 1\u201318 (2024)","DOI":"10.1145\/3655613"},{"key":"5_CR50","doi-asserted-by":"crossref","unstructured":"Wang, Y., et al.: Salchartqa: question-driven saliency on information visualisations. In: Proceedings of the CHI Conference on Human Factors in Computing Systems, pp. 1\u201314 (2024)","DOI":"10.1145\/3613904.3642942"},{"key":"5_CR51","doi-asserted-by":"publisher","unstructured":"Wightman, R.: Pytorch image models (2019). https:\/\/github.com\/rwightman\/pytorch-image-models. https:\/\/doi.org\/10.5281\/zenodo.4414861","DOI":"10.5281\/zenodo.4414861"},{"key":"5_CR52","unstructured":"Wolf, T., et al.: Transformers: state-of-the-art natural language processing. In: Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: System Demonstrations, pp. 38\u201345. Association for Computational Linguistics, Online (2020). https:\/\/www.aclweb.org\/anthology\/2020.emnlp-demos.6"},{"key":"5_CR53","doi-asserted-by":"crossref","unstructured":"Yu, D., Fu, J., Mei, T., Rui, Y.: Multi-level attention networks for visual question answering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4709\u20134717 (2017)","DOI":"10.1109\/CVPR.2017.446"},{"key":"5_CR54","doi-asserted-by":"crossref","unstructured":"Zermiani, F., Bulling, A., Wirzberger, M.: Mind wandering trait-level tendencies during lecture viewing: a pilot study. In: Proceedings of the EduEye Workshop on Eye Tracking in Learning and Education (EduEye), pp.\u00a01\u20137 (2022)","DOI":"10.1145\/3517031.3529241"},{"key":"5_CR55","unstructured":"Zhang, B., He, X., Shen, Y., Wang, T., Zhang, Y.: A plot is worth a thousand words: model information stealing attacks via scientific plots. In: 32nd USENIX Security Symposium (USENIX Security 2023), pp. 5289\u20135306 (2023)"},{"key":"5_CR56","doi-asserted-by":"crossref","unstructured":"Zhang, G., et al.: Predicting next actions and latent intents during text formatting. In: Proceedings of the CHI Workshop Computational Approaches for Understanding, Generating, and Adapting User Interfaces, pp.\u00a01\u20136 (2022)","DOI":"10.1145\/3491101.3504030"},{"key":"5_CR57","doi-asserted-by":"crossref","unstructured":"Zhang, S., Ma, D., Wang, Y.: Don\u2019t peek at my chart: privacy-preserving visualization for mobile devices. In: Computer Graphics Forum, vol.\u00a042, pp. 137\u2013148. Wiley Online Library (2023)","DOI":"10.1111\/cgf.14818"}],"container-title":["Lecture Notes in Computer Science","Document Analysis and Recognition \u2013 ICDAR 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-04627-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T02:05:25Z","timestamp":1757988325000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-04627-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,16]]},"ISBN":["9783032046260","9783032046277"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-04627-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,9,16]]},"assertion":[{"value":"16 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ICDAR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Document Analysis and Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdar2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iapr.org\/icdar2025","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}