A Triple-Helix Intervention Approach to Direct the Marble Industry towards Sustainable Business in Mexico
Round 1
Reviewer 1 Report
The authors must review and strengthen the article from the approach of the triple helix model, given that now we speak of the quadruple helix: Society, State, Academy and Company. In this sense, it presents methodological weaknesses that are attached to the area of analysis or theoretical bases. The article presents potentialities to be a publishable work, once these weaknesses are overcome and it is aligned with the conceptual, methodological and results bases of the object of study.
Author Response
"Please see the attachment."
Author Response File: Author Response.pdf
Reviewer 2 Report
Neither.
Author Response
"Please see the attachment."
Author Response File: Author Response.pdf
Reviewer 3 Report
This paper deals with an exciting topic. The article has been read carefully, and some minor issues have been highlighted in order to be considered by the author(s).
#1 What is the motivation of this paper?
#2 What is the contribution and novelty of this paper?
#3 What is the advantage of this survey paper?
#4 Which evaluation metrics did you used for comparison?
#5 It would be good if security domains would be reflected in the related work such as BlindNet backdoor: Attack on deep neural network using blind watermark, Multi-Model Selective Backdoor Attack with Different Trigger Positions, Textual Backdoor Attack for the Text Classification System, and Defending Deep Neural Networks against Backdoor Attack by Using De-trigger Autoencoder, and Ensemble Transfer Attack Targeting Text Classification Systems.
Author Response
"Please see the attachment."
Author Response File: Author Response.pdf
Round 2
Reviewer 3 Report
This paper deals with an exciting topic. The article has been read carefully, and some minor issues have been highlighted in order to be considered by the author(s).
#1 What is the motivation of this paper?
#2 What is the contribution and novelty of this paper?
#3 What is the advantage of this survey paper?
#4 Which evaluation metrics did you used for comparison?
#5 It would be good if security domains would be reflected in the related work such as BlindNet backdoor: Attack on deep neural network using blind watermark, Multi-Model Selective Backdoor Attack with Different Trigger Positions, Textual Backdoor Attack for the Text Classification System, and Defending Deep Neural Networks against Backdoor Attack by Using De-trigger Autoencoder.