{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T01:14:50Z","timestamp":1769908490653,"version":"3.49.0"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","license":[{"start":{"date-parts":[[2022,2,19]],"date-time":"2022-02-19T00:00:00Z","timestamp":1645228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,2,19]],"date-time":"2022-02-19T00:00:00Z","timestamp":1645228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Science and Technology Research Project of Chongqing Education Commission","award":["KJQN201900833"],"award-info":[{"award-number":["KJQN201900833"]}]},{"DOI":"10.13039\/501100012154","name":"Graduate Research and Innovation Projects of Jiangsu Province","doi-asserted-by":"publisher","award":["CYS21398"],"award-info":[{"award-number":["CYS21398"]}],"id":[{"id":"10.13039\/501100012154","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"DOI":"10.1007\/s00371-022-02420-6","type":"journal-article","created":{"date-parts":[[2022,2,19]],"date-time":"2022-02-19T13:04:43Z","timestamp":1645275883000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Lightweight network-based multi-modal feature fusion for face anti-spoofing"],"prefix":"10.1007","author":[{"given":"Dan","family":"He","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3922-3319","authenticated-orcid":false,"given":"Xiping","family":"He","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,19]]},"reference":[{"key":"2420_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37410-4_11","author":"TD Pereira","year":"2012","unstructured":"Pereira, T.D., Anjos, A., Martino, J.M., Marcel, S.: LBP\u2013TOP based countermeasure against face spoofing attacks. ACCV Worksh. (2012). https:\/\/doi.org\/10.1007\/978-3-642-37410-4_11","journal-title":"ACCV Worksh."},{"key":"2420_CR2","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/LSP.2016.2630740","volume":"24","author":"Z Boulkenafet","year":"2017","unstructured":"Boulkenafet, Z., Komulainen, J., Hadid, A.: Face antispoofing using speeded-up robust features and fisher vector encoding. IEEE Signal Process. Lett. 24, 141\u2013145 (2017). https:\/\/doi.org\/10.1109\/LSP.2016.2630740","journal-title":"IEEE Signal Process. Lett."},{"key":"2420_CR3","doi-asserted-by":"publisher","unstructured":"Yang, J., Lei, Z., Liao, S., Li, S.: Face liveness detection with component dependent descriptor. In: 2013 International Conference on Biometrics (ICB) (2013), pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICB.2013.6612955","DOI":"10.1109\/ICB.2013.6612955"},{"key":"2420_CR4","doi-asserted-by":"publisher","first-page":"1818","DOI":"10.1109\/TIFS.2016.2555286","volume":"11","author":"Z Boulkenafet","year":"2016","unstructured":"Boulkenafet, Z., Komulainen, J., Hadid, A.: Face spoofing detection using colour texture analysis. IEEE Trans. Inf. Forensics Secur. 11, 1818\u20131830 (2016). https:\/\/doi.org\/10.1109\/TIFS.2016.2555286","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2420_CR5","doi-asserted-by":"publisher","unstructured":"Li, X., Komulainen, J., Zhao, G., Yuen, P., Pietik\u00e4inen, M.: Generalized face anti-spoofing by detecting pulse from face videos. In: 2016 23rd International Conference on Pattern Recognition (ICPR) (2016), pp. 4244\u20134249. https:\/\/doi.org\/10.1109\/ICPR.2016.7900300","DOI":"10.1109\/ICPR.2016.7900300"},{"key":"2420_CR6","doi-asserted-by":"publisher","unstructured":"Lagorio, A., Tistarelli, M., Cadoni, M., Fookes, C., Sridharan, S.: Liveness detection based on 3D face shape analysis. In: 2013 International Workshop on Biometrics and Forensics (IWBF) (2013), pp. 1\u20134. https:\/\/doi.org\/10.1109\/IWBF.2013.6547310","DOI":"10.1109\/IWBF.2013.6547310"},{"key":"2420_CR7","doi-asserted-by":"publisher","unstructured":"Wang, Y., Nian, F., Li, T., Meng, Z., Wang, K.: Robust face anti-spoofing with depth information. J. Vis. Commun. Image Represent. 49, 332\u2013337 (2017). https:\/\/doi.org\/10.1016\/j.jvcir.2017.09.002","DOI":"10.1016\/j.jvcir.2017.09.002"},{"key":"2420_CR8","doi-asserted-by":"publisher","unstructured":"Liu, S., Lan, X., Yuen, P.: Remote photoplethysmography correspondence feature for 3D mask face presentation attack detection. ECCV (2018). https:\/\/doi.org\/10.1007\/978-3-030-01270-0_34","DOI":"10.1007\/978-3-030-01270-0_34"},{"key":"2420_CR9","doi-asserted-by":"publisher","unstructured":"Liu, Y., Stehouwer, J., Jourabloo, A., Liu, X.: Deep tree learning for zero-shot face anti-spoofing. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2019), pp. 4675\u20134684. https:\/\/doi.org\/10.1109\/CVPR.2019.00481","DOI":"10.1109\/CVPR.2019.00481"},{"key":"2420_CR10","doi-asserted-by":"publisher","unstructured":"Zhang, S., Wang, X., Liu, A., Zhao, C., Wan, J., Escalera, S., Shi, H., Wang, Z., Li, S.: A dataset and benchmark for large-scale multi-modal face anti-spoofing. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2019), pp. 919\u2013928. https:\/\/doi.org\/10.1109\/CVPR.2019.00101","DOI":"10.1109\/CVPR.2019.00101"},{"key":"2420_CR11","doi-asserted-by":"crossref","unstructured":"Xin, J. et al.: Facial attribute capsules for noise face super resolution. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, no. 07 (2020)","DOI":"10.1609\/aaai.v34i07.6935"},{"key":"2420_CR12","doi-asserted-by":"crossref","unstructured":"Xin, J., et al.: Video face super-resolution with motion-adaptive feedback cell. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, no. 07 (2020)","DOI":"10.1609\/aaai.v34i07.6934"},{"key":"2420_CR13","doi-asserted-by":"publisher","unstructured":"Parkin, A., Grinchuk, O.: Recognizing multi-modal face spoofing with face recognition networks. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2019), pp. 1617\u20131623. https:\/\/doi.org\/10.1109\/CVPRW.2019.00204","DOI":"10.1109\/CVPRW.2019.00204"},{"key":"2420_CR14","doi-asserted-by":"publisher","unstructured":"Shen, T., Huang, Y., Tong, Z.: FaceBagNet: Bag-of-local-features model for multi-modal face anti-spoofing. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2019), pp. 1611\u20131616. https:\/\/doi.org\/10.1109\/CVPRW.2019.00203","DOI":"10.1109\/CVPRW.2019.00203"},{"key":"2420_CR15","doi-asserted-by":"publisher","unstructured":"Yu, Z., Zhao, C., Wang, Z., Qin, Y., Su, Z., Li, X., Zhou, F., Zhao, G.: Searching central difference convolutional networks for face anti-spoofing. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2020), pp. 5294\u20135304. https:\/\/doi.org\/10.1109\/CVPR42600.2020.00534","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"2420_CR16","doi-asserted-by":"publisher","unstructured":"Yu, Z., Qin, Y., Li, X., Wang, Z., Zhao, X., Lei, Z., Zhao, G: Multi-modal face anti-spoofing based on central difference networks. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2020), pp. 2766\u20132774. https:\/\/doi.org\/10.1109\/CVPRW50498.2020.00333","DOI":"10.1109\/CVPRW50498.2020.00333"},{"key":"2420_CR17","doi-asserted-by":"publisher","unstructured":"Yu, Z., Wan, J., Qin, Y., Li, X., Li, S., Zhao, G.: NAS-FAS: Static-dynamic central difference network search for face anti-spoofing. IEEE Trans. Pattern Anal. Mach. Intell. (2020). https:\/\/doi.org\/10.1109\/TPAMI.2020.3036338","DOI":"10.1109\/TPAMI.2020.3036338"},{"key":"2420_CR18","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.patcog.2019.01.041","volume":"90","author":"C Peng","year":"2019","unstructured":"Peng, C., Wang, N., Li, J., Gao, X.: DLFace: Deep local descriptor for cross-modality face recognition. Pattern Recognit. 90, 161\u2013171 (2019). https:\/\/doi.org\/10.1016\/j.patcog.2019.01.041","journal-title":"Pattern Recognit."},{"key":"2420_CR19","doi-asserted-by":"publisher","first-page":"4553","DOI":"10.1109\/TIP.2019.2912360","volume":"28","author":"C Peng","year":"2019","unstructured":"Peng, C., Wang, N., Li, J., Gao, X.: Re-ranking high-dimensional deep local representation for NIR-VIS face recognition. IEEE Trans. Image Process. 28, 4553\u20134565 (2019). https:\/\/doi.org\/10.1109\/TIP.2019.2912360","journal-title":"IEEE Trans. Image Process."},{"key":"2420_CR20","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33019054","author":"J Xin","year":"2019","unstructured":"Xin, J., Wang, N., Gao, X., Li, J.: Residual attribute attention network for face image super-resolution. AAAI (2019). https:\/\/doi.org\/10.1609\/aaai.v33i01.33019054","journal-title":"AAAI"},{"key":"2420_CR21","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.neucom.2020.03.073","volume":"402","author":"X Jiang","year":"2020","unstructured":"Jiang, X., Wang, N., Xin, J., Yang, X., Yu, Y., Gao, X.: Image super-resolution via multi-view information fusion networks. Neurocomputing 402, 29\u201337 (2020). https:\/\/doi.org\/10.1016\/j.neucom.2020.03.073","journal-title":"Neurocomputing"},{"key":"2420_CR22","doi-asserted-by":"publisher","unstructured":"George, A., Marcel, S.: Cross modal focal loss for RGBD face anti-spoofing. In: 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 7878\u20137887 (2021). https:\/\/doi.org\/10.1109\/CVPR46437.2021.00779","DOI":"10.1109\/CVPR46437.2021.00779"},{"key":"2420_CR23","unstructured":"Liu, A., Tan, Z., Li, X., Wan, J., Escalera, S., Guo, G., Li, S.: Static and dynamic fusion for multi-modal cross-ethnicity face anti-spoofing. ArXiv: abs\/1912.02340 (2019)"},{"key":"2420_CR24","doi-asserted-by":"publisher","unstructured":"Liu, A., Tan, Z., Li, X., Wan, J., Escalera, S., Guo, G., Li, S.Z.: CASIA-SURF CeFA: A benchmark for multi-modal cross-ethnicity face anti-spoofing. In: 2021 IEEE Winter Conference on Applications of Computer Vision (WACV) (2021), pp. 1178\u20131186. https:\/\/doi.org\/10.1109\/WACV48630.2021.00122","DOI":"10.1109\/WACV48630.2021.00122"},{"key":"2420_CR25","doi-asserted-by":"publisher","unstructured":"Wang, Z., Yu, Z., Zhao, C., Zhu, X., Qin, Y., Zhou, Q., Zhou, F., Lei, Z.: Deep spatial gradient and temporal depth learning for face anti-spoofing. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2020), pp. 5041\u20135050. https:\/\/doi.org\/10.1109\/CVPR42600.2020.00509","DOI":"10.1109\/CVPR42600.2020.00509"},{"key":"2420_CR26","doi-asserted-by":"publisher","unstructured":"Zhang, P., Zou, F., Wu, Z., Dai, N., Mark, S., Fu, M., Zhao, J., Li, K.: FeatherNets: convolutional neural networks as light as feather for face anti-spoofing. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2019), pp. 1574\u20131583. https:\/\/doi.org\/10.1109\/CVPRW.2019.00199","DOI":"10.1109\/CVPRW.2019.00199"},{"key":"2420_CR27","doi-asserted-by":"publisher","unstructured":"Sandler, M., Howard, A.G., Zhu, M., Zhmoginov, A., Chen, L.-C.: MobileNetV2: inverted residuals and linear bottlenecks. In: 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2018), pp. 4510\u20134520. https:\/\/doi.org\/10.1109\/CVPR.2018.00474","DOI":"10.1109\/CVPR.2018.00474"},{"key":"2420_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2913372","author":"J Hu","year":"2020","unstructured":"Hu, J., Shen, L., Albanie, S., Sun, G., Wu, E.: Squeeze-and-excitation networks. IEEE Trans. Pattern Anal. Mach. Intell. (2020). https:\/\/doi.org\/10.1109\/TPAMI.2019.2913372","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2420_CR29","doi-asserted-by":"publisher","unstructured":"Ma, N., Zhang, X., Zheng, H.-T., Sun, J.: ShuffleNet V2: Practical guidelines for efficient CNN architecture design. ECCV (2018). https:\/\/doi.org\/10.1007\/978-3-030-01264-9_8","DOI":"10.1007\/978-3-030-01264-9_8"},{"key":"2420_CR30","doi-asserted-by":"publisher","unstructured":"Han, K., Wang, Y., Tian, Q., Guo, J., Xu, C., & Xu, C.: GhostNet: more features from cheap operations. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2020), pp. 1577\u20131586. https:\/\/doi.org\/10.1109\/CVPR42600.2020.00165","DOI":"10.1109\/CVPR42600.2020.00165"},{"key":"2420_CR31","doi-asserted-by":"publisher","unstructured":"Wu, B., Wan, A., Yue, X., Jin, P.H., Zhao, S., Golmant, N., Gholaminejad, A., Gonzalez, J.E., Keutzer, K.: Shift: a zero FLOP, zero parameter alternative to spatial convolutions. In: 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2018), pp. 9127\u20139135. https:\/\/doi.org\/10.1109\/CVPR.2018.00951","DOI":"10.1109\/CVPR.2018.00951"},{"key":"2420_CR32","doi-asserted-by":"publisher","unstructured":"Deng, J., Guo, J., Zafeiriou, S.: ArcFace: additive angular margin loss for deep face recognition. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2019), pp. 4685\u20134694. https:\/\/doi.org\/10.1109\/CVPR.2019.00482","DOI":"10.1109\/CVPR.2019.00482"},{"key":"2420_CR33","unstructured":"Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: 2012 BIOSIG: Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG), pp. 1\u20137 (2012)"},{"key":"2420_CR34","doi-asserted-by":"publisher","unstructured":"Zhang, Z., Yan, J., Liu, S., Lei, X., Yi, D., Li, S.: A face antispoofing database with diverse attacks. In: 2012 5th IAPR International Conference on Biometrics (ICB) (2012), pp. 26\u201331. https:\/\/doi.org\/10.1109\/ICB.2012.6199754","DOI":"10.1109\/ICB.2012.6199754"},{"key":"2420_CR35","doi-asserted-by":"publisher","unstructured":"Liu, Y., Jourabloo, A., Liu, X.: Learning deep models for face anti-spoofing: binary or auxiliary supervision. In: 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2018), pp. 389\u2013398. https:\/\/doi.org\/10.1109\/CVPR.2018.00048","DOI":"10.1109\/CVPR.2018.00048"},{"key":"2420_CR36","doi-asserted-by":"publisher","unstructured":"Kuang, H., Ji, R., Liu, H., Zhang, S., Sun, X., Huang, F., & Zhang, B. (2019). Multi-modal multi-layer fusion network with average binary center loss for face anti-spoofing. In: Proceedings of the 27th ACM International Conference on Multimedia. https:\/\/doi.org\/10.1145\/3343031.3351001","DOI":"10.1145\/3343031.3351001"},{"key":"2420_CR37","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-021-02123-4","author":"S Arora","year":"2021","unstructured":"Arora, S., Bhatia, M.P., Mittal, V.: A robust framework for spoofing detection in faces using deep learning. Vis. Comput. (2021). https:\/\/doi.org\/10.1007\/s00371-021-02123-4","journal-title":"Vis. Comput."},{"key":"2420_CR38","doi-asserted-by":"publisher","unstructured":"Xu, Z., Li, S., Deng, W.: Learning temporal features using LSTM-CNN architecture for face anti-spoofing. In: 2015 3rd IAPR Asian Conference on Pattern Recognition (ACPR) (2015), pp. 141\u2013145. https:\/\/doi.org\/10.1109\/ACPR.2015.7486482","DOI":"10.1109\/ACPR.2015.7486482"},{"key":"2420_CR39","doi-asserted-by":"publisher","unstructured":"Atoum, Y., Liu, Y., Jourabloo, A., Liu, X.: Face anti-spoofing using patch and depth-based CNNs. In: 2017 IEEE International Joint Conference on Biometrics (IJCB) (2017), pp. 319\u2013328. https:\/\/doi.org\/10.1109\/BTAS.2017.8272713","DOI":"10.1109\/BTAS.2017.8272713"},{"key":"2420_CR40","doi-asserted-by":"publisher","unstructured":"Li, L., Feng, X., Boulkenafet, Z., Xia, Z., Li, M., Hadid, A.: An original face anti-spoofing approach using partial convolutional neural network. In: 2016 sixth international conference on image processing theory, tools and applications (IPTA) (2016), pp. 1\u20136. https:\/\/doi.org\/10.1109\/IPTA.2016.7821013","DOI":"10.1109\/IPTA.2016.7821013"},{"key":"2420_CR41","doi-asserted-by":"publisher","unstructured":"Sun, Y., Xiong, H., Yiu, S.: Understanding deep face anti-spoofing: from the perspective of data. Vis. Comput. 1\u201314 (2020). https:\/\/doi.org\/10.1007\/s00371-020-01849-x","DOI":"10.1007\/s00371-020-01849-x"},{"key":"2420_CR42","doi-asserted-by":"publisher","unstructured":"Komulainen, J., Hadid, A., Pietik\u00e4inen, M., Anjos, A., Marcel, S.: Complementary countermeasures for detecting scenic face spoofing attacks. In: 2013 International Conference on Biometrics (ICB) (2013), pp. 1\u20137. https:\/\/doi.org\/10.1109\/ICB.2013.6612968","DOI":"10.1109\/ICB.2013.6612968"},{"key":"2420_CR43","doi-asserted-by":"publisher","first-page":"1880","DOI":"10.1049\/iet-ipr.2018.5560","volume":"13","author":"M Khammari","year":"2019","unstructured":"Khammari, M.: Robust face anti-spoofing using CNN with LBP and WLD. IET Image Process. 13, 1880\u20131884 (2019). https:\/\/doi.org\/10.1049\/iet-ipr.2018.5560","journal-title":"IET Image Process."},{"key":"2420_CR44","doi-asserted-by":"publisher","unstructured":"Yang, X., Luo, W., Bao, L., Gao, Y., Gong, D., Zheng, S., Li, Z., & Liu, W.: Face anti-spoofing: model matters, so does data. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3502\u20133511 (2019). https:\/\/doi.org\/10.1109\/CVPR.2019.00362","DOI":"10.1109\/CVPR.2019.00362"},{"key":"2420_CR45","doi-asserted-by":"publisher","unstructured":"Li, X., Wan, J., Jin, Y., Liu, A., Guo, G., Li, S.: 3DPC-Net: 3D point cloud network for face anti-spoofing. In: 2020 IEEE International Joint Conference on Biometrics (IJCB) (2020), pp. 1\u20138. https:\/\/doi.org\/10.1109\/IJCB48548.2020.9304873","DOI":"10.1109\/IJCB48548.2020.9304873"},{"key":"2420_CR46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01261-8_18","author":"A Jourabloo","year":"2018","unstructured":"Jourabloo, A., Liu, Y., Liu, X.: Face de-spoofing: anti-spoofing via noise modeling. ECCV (2018). https:\/\/doi.org\/10.1007\/978-3-030-01261-8_18","journal-title":"ECCV"},{"key":"2420_CR47","doi-asserted-by":"publisher","unstructured":"Yang, J., Lei, Z., Li, S.: Learn convolutional neural network for face anti-spoofing. ArXiv: abs\/1408.5601 (2014). https:\/\/doi.org\/10.1007\/978-3-319-21963-9_34","DOI":"10.1007\/978-3-319-21963-9_34"}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-022-02420-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-022-02420-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-022-02420-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,19]],"date-time":"2022-02-19T13:04:56Z","timestamp":1645275896000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-022-02420-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,19]]},"references-count":47,"alternative-id":["2420"],"URL":"https:\/\/doi.org\/10.1007\/s00371-022-02420-6","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,19]]},"assertion":[{"value":"20 January 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}