{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T01:12:21Z","timestamp":1775697141911,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T00:00:00Z","timestamp":1731024000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T00:00:00Z","timestamp":1731024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Shanghai Municipal Science and Technology Major Project","award":["22511104600"],"award-info":[{"award-number":["22511104600"]}]},{"name":"Shanghai Municipal Science and Technology Major Project","award":["22511104600"],"award-info":[{"award-number":["22511104600"]}]},{"name":"Shanghai Municipal Science and Technology Major Project","award":["22511104600"],"award-info":[{"award-number":["22511104600"]}]},{"name":"Shanghai Municipal Science and Technology Major Project","award":["22511104600"],"award-info":[{"award-number":["22511104600"]}]},{"name":"Shanghai Municipal Science and Technology Major Project","award":["22511104600"],"award-info":[{"award-number":["22511104600"]}]},{"DOI":"10.13039\/501100001809","name":"The National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62072183"],"award-info":[{"award-number":["62072183"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"The National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62072183"],"award-info":[{"award-number":["62072183"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Shanghai Urban Digital Transformation Special Fund Project","award":["202301027"],"award-info":[{"award-number":["202301027"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s00371-024-03690-y","type":"journal-article","created":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T11:59:40Z","timestamp":1731067180000},"page":"4779-4798","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Data augmentation with attention framework for robust deepfake detection"],"prefix":"10.1007","volume":"41","author":[{"given":"Sardor","family":"Mamarasulov","sequence":"first","affiliation":[]},{"given":"Lianggangxu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Changgu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Changbo","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,8]]},"reference":[{"key":"3690_CR1","unstructured":"Goodfellow, I.J., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial networks, 6 (2014). [Online]. Available: arXiv:1406.2661"},{"key":"3690_CR2","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.inffus.2020.06.014","volume":"64","author":"R Tolosana","year":"2020","unstructured":"Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Morales, A., Ortega-Garcia, J.: Deepfakes and beyond: a survey of face manipulation and fake detection. Inf. Fus. 64, 131\u2013148 (2020)","journal-title":"Inf. Fus."},{"key":"3690_CR3","unstructured":"Zhang, H., Goodfellow, I., Metaxas, D., Odena, A.: Self-attention generative adversarial networks, 5 (2018). [Online]. Available: arXiv:1805.08318"},{"key":"3690_CR4","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"3690_CR5","first-page":"4915","volume":"10","author":"G Neff","year":"2016","unstructured":"Neff, G., Nagy, P.: Automation, algorithms, and politics| talking to bots: symbiotic agency and the case of Tay. Int. J. Commun. 10, 4915\u20134931 (2016)","journal-title":"Int. J. Commun."},{"key":"3690_CR6","doi-asserted-by":"crossref","unstructured":"Russakovsky, O., Deng, J., Su, H., Krause, J., Satheesh, S., Ma, S., Huang, Z., Karpathy, A., Khosla, A., Bernstein, M., Berg, A.C., Fei-Fei, L.: Imagenet large scale visual recognition challenge, 9 (2014). [Online]. Available: arXiv:1409.0575","DOI":"10.1007\/s11263-015-0816-y"},{"key":"3690_CR7","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, vol.\u00a025 (2012)"},{"issue":"1","key":"3690_CR8","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TPAMI.2012.59","volume":"35","author":"S Ji","year":"2013","unstructured":"Ji, S., Xu, W., Yang, M., Yu, K.: 3d convolutional neural networks for human action recognition. IEEE Trans. Pattern Anal. Mach. Intell. 35(1), 221\u2013231 (2013)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"3690_CR9","doi-asserted-by":"crossref","unstructured":"Shao, R., Wu, T., Liu, Z.: Detecting and recovering sequential deepfake manipulation. In: European Conference on Computer Vision. Springer, pp. 712\u2013728 (2022)","DOI":"10.1007\/978-3-031-19778-9_41"},{"key":"3690_CR10","doi-asserted-by":"crossref","unstructured":"Xie, S., Girshick, R., Doll\u00e1r, P., Tu, Z., He, K.: Aggregated residual transformations for deep neural networks, 11 (2016). [Online]. Available: arXiv:1611.05431","DOI":"10.1109\/CVPR.2017.634"},{"key":"3690_CR11","doi-asserted-by":"crossref","unstructured":"Dang, H., Liu, F., Stehouwer, J., Liu, X., Jain, A.: On the detection of digital face manipulation, 10 (2019). [Online]. Available: arXiv:1910.01717","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"3690_CR12","unstructured":"Li, Y., Lyu, S.: Exposing deepfake videos by detecting face warping artifacts. arxiv (2018), arXiv preprint arXiv:1811.00656, 1811"},{"key":"3690_CR13","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., Batra, D.: Grad-cam: Visual explanations from deep networks via gradient-based localization. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 618\u2013626 (2017)","DOI":"10.1109\/ICCV.2017.74"},{"key":"3690_CR14","doi-asserted-by":"crossref","unstructured":"Yun, S., Han, D., Oh, S.J., Chun, S., Choe, J., Yoo, Y.: Cutmix: regularization strategy to train strong classifiers with localizable features. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 6023\u20136032 (2019)","DOI":"10.1109\/ICCV.2019.00612"},{"key":"3690_CR15","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, L., Polosukhin, I.: Attention is all you need, 6 (2017). [Online]. Available: arXiv:1706.03762"},{"key":"3690_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3293951","author":"D Liu","year":"2023","unstructured":"Liu, D., Dang, Z., Peng, C., Zheng, Y., Li, S., Wang, N., Gao, X.: Fedforgery: Generalized face forgery detection with residual federated learning. IEEE Trans. Inf. Forensics Secur. (2023). https:\/\/doi.org\/10.1109\/TIFS.2023.3293951","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"3690_CR17","first-page":"112","volume":"8","author":"Z Deng","year":"2023","unstructured":"Deng, Z., You, K., Yang, R., Hu, X., Chen, Y.: An improved seq-deepfake detection method. J. Comput. Vis. Med. 8(3), 112\u2013130 (2023)","journal-title":"J. Comput. Vis. Med."},{"key":"3690_CR18","unstructured":"Perez, L., Wang, J.: The effectiveness of data augmentation in image classification using deep learning, arXiv preprint arXiv:1712.04621, (2017)"},{"key":"3690_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, H., Cisse, M., Dauphin, Y.N., Lopez-Paz, D.: mixup: Beyond empirical risk minimization, 10 (2017). [Online]. arXiv:1710.09412","DOI":"10.1007\/978-1-4899-7687-1_79"},{"key":"3690_CR20","unstructured":"Zhong, Z., Zheng, L., Kang, G., Li, S., Yang, Y.: Random erasing data augmentation, 8 (2017). [Online]. Available: arXiv:1708.04896"},{"key":"3690_CR21","unstructured":"Verma, V., Lamb, A., Beckham, C., Najafi, A., Mitliagkas, I., Lopez-Paz, D., Bengio, Y.: Manifold mixup: better representations by interpolating hidden states. In: International Conference on Machine Learning. PMLR, pp. 6438\u20136447 (2019)"},{"key":"3690_CR22","doi-asserted-by":"crossref","unstructured":"Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Nie\u00dfner, M.: Faceforensics++: learning to detect manipulated facial images. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 1\u201311 (2019)","DOI":"10.1109\/ICCV.2019.00009"},{"key":"3690_CR23","unstructured":"Johnson, R., Matthews, L.: Beyond diversity: The real purpose of data augmentation in deep learning. In: Proceedings of the International Conference on Machine Learning, pp. 1234\u20131245 (2021)"},{"key":"3690_CR24","doi-asserted-by":"crossref","unstructured":"Carion, N., Massa, F., Synnaeve, G., Usunier, N., Kirillov, A., Zagoruyko, S.: End-to-end object detection with transformers, 5 (2020). [Online]. Available: arXiv:2005.12872","DOI":"10.1007\/978-3-030-58452-8_13"},{"key":"3690_CR25","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, X., Unterthiner, T., Dehghani, M., Minderer, M., Heigold, G., Gelly, S., Uszkoreit, J., Houlsby, N.: An image is worth 16x16 words: Transformers for image recognition at scale, 10 (2020). [Online]. Available: arXiv:2010.11929"},{"issue":"3","key":"3690_CR26","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/3446776","volume":"64","author":"C Zhang","year":"2021","unstructured":"Zhang, C., Bengio, S., Hardt, M., Recht, B., Vinyals, O.: Understanding deep learning (still) requires rethinking generalization. Commun. ACM 64(3), 107\u2013115 (2021)","journal-title":"Commun. ACM"},{"key":"3690_CR27","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision, 12 (2015). [Online]. Available: arXiv:1512.00567","DOI":"10.1109\/CVPR.2016.308"},{"issue":"11","key":"3690_CR28","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1038\/s42256-020-00257-z","volume":"2","author":"R Geirhos","year":"2020","unstructured":"Geirhos, R., Jacobsen, J., Michaelis, C., Zemel, R., Brendel, W., Bethge, M., Wichmann, F.: Shortcut learning in deep neural networks. Nat. Mach. Intell. 2(11), 665\u2013673 (2020)","journal-title":"Nat. Mach. Intell."},{"key":"3690_CR29","unstructured":"Zhou, W., Veitch, V., Austern, M., Adams, R.P., Orbanz, P.: Non-vacuous generalization bounds at the imagenet scale: a pac-bayesian compression approach, arXiv preprint arXiv:1804.05862, (2018)"},{"issue":"2","key":"3690_CR30","first-page":"210","volume":"77","author":"K Martin","year":"2020","unstructured":"Martin, K., White, T.: Understanding the broader picture: narratives in image recognition. J. Comput. Vis. 77(2), 210\u2013225 (2020)","journal-title":"J. Comput. Vis."},{"key":"3690_CR31","unstructured":"Brendel, W., Bethge, M.: Approximating CNNS with bag-of-local-features models works surprisingly well on imagenet, arXiv preprint arXiv:1904.00760 (2019)"},{"key":"3690_CR32","doi-asserted-by":"crossref","unstructured":"Cubuk, E.D., Zoph, B., Mane, D., Vasudevan, V., Le, Q.V.: \u201cAutoaugment: Learning augmentation strategies from data. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 113\u2013123 (2019)","DOI":"10.1109\/CVPR.2019.00020"},{"key":"3690_CR33","doi-asserted-by":"crossref","unstructured":"Doshi, H., Savla, A., Dholakia, S., Gandhi, H., Suratkar, S., Kazi, F.: Improving deepfake video detection using data augmentation techniques, Research Square (2022)","DOI":"10.21203\/rs.3.rs-1844392\/v1"},{"key":"3690_CR34","doi-asserted-by":"publisher","DOI":"10.1145\/3592615","author":"F Iqbal","year":"2023","unstructured":"Iqbal, F., Abbasi, A., Javed, A.R., Almadhor, A., Jalil, Z., Anwar, S., Rida, I.: Data augmentation-based novel deep learning method for deepfaked images detection. Commun. Appl. ACM Trans. Multimed. Comput. (2023). https:\/\/doi.org\/10.1145\/3592615","journal-title":"Commun. Appl. ACM Trans. Multimed. Comput."},{"issue":"3","key":"3690_CR35","first-page":"45","volume":"15","author":"S Lee","year":"2021","unstructured":"Lee, S., Kim, H.: Challenges in deepfake detection: Beyond conventional image classification. J. Dig. Threats 15(3), 45\u201359 (2021)","journal-title":"J. Dig. Threats"},{"key":"3690_CR36","doi-asserted-by":"crossref","unstructured":"Marra, F., Gragnaniello, D., Cozzolino, D., Verdoliva, L., Detection of Gan-generated fake images over social networks. In: IEEE Conference on Multimedia Information Processing and Retrieval (MIPR). IEEE, pp. 384\u2013389 (2018)","DOI":"10.1109\/MIPR.2018.00084"},{"key":"3690_CR37","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., Echizen, I., Mesonet: a compact facial video forgery detection network. In: IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, pp. 1\u20137 (2018)","DOI":"10.1109\/WIFS.2018.8630761"},{"issue":"14","key":"3690_CR38","doi-asserted-by":"publisher","first-page":"8313","DOI":"10.3390\/app13148313","volume":"13","author":"D Wan","year":"2023","unstructured":"Wan, D., Cai, M., Peng, S., Qin, W., Li, L.: Deepfake detection algorithm based on dual-branch data augmentation and modified attention mechanism. Appl. Sci. 13(14), 8313 (2023). https:\/\/doi.org\/10.3390\/app13148313","journal-title":"Appl. Sci."},{"key":"3690_CR39","unstructured":"Garcia, L., Fernandez, M.: The spatial-temporal advantage in modern deep learning models. In: Proceedings of the Neural Information Processing Systems Conference, pp. 5678\u20135689 (2021)"},{"key":"3690_CR40","unstructured":"Korshunov, P., Marcel, S.: Deepfakes: a new threat to face recognition? assessment and detection, arXiv preprint arXiv:1812.08685, (2018)"},{"key":"3690_CR41","doi-asserted-by":"crossref","unstructured":"Liu, D., Wang, X., Peng, C., Wang, N., Hu, R., Gao, X.: Adv-diffusion: imperceptible adversarial face identity attack via latent diffusion model. In: Proceedings of the AAAI Conference on Artificial Intelligence 38(4), 3585\u20133593 (2024)","DOI":"10.1609\/aaai.v38i4.28147"},{"key":"3690_CR42","unstructured":"Bengio, S., Vinyals, O., Jaitly, N., Shazeer, N.: Scheduled sampling for sequence prediction with recurrent neural networks. In: Advances in neural information processing systems, vol.\u00a028 (2015)"},{"key":"3690_CR43","doi-asserted-by":"crossref","unstructured":"Zhou, B., Khosla, A., Lapedriza, A., Oliva, A., Torralba, A.: Learning deep features for discriminative localization. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2921\u20132929 (2016)","DOI":"10.1109\/CVPR.2016.319"},{"key":"3690_CR44","unstructured":"Miyato, T., Kataoka, T., Koyama, M., Yoshida, Y.: Spectral normalization for generative adversarial networks, arXiv preprint arXiv:1802.05957 (2018)"},{"key":"3690_CR45","unstructured":"Simonyan, K., Vedaldi, A., Zisserman, A.: Deep inside convolutional networks: Visualising image classification models and saliency maps, arXiv preprint arXiv:1312.6034 (2013)"},{"key":"3690_CR46","unstructured":"Pahde, F., Weber, L., Anders, C.J., Samek, W., Lapuschkin, S.: Patclarc: Using pattern concept activation vectors for noise-robust model debugging, arXiv preprint arXiv:2202.03482 (2022)"},{"issue":"11","key":"3690_CR47","doi-asserted-by":"publisher","first-page":"e7","DOI":"10.23915\/distill.00007","volume":"2","author":"C Olah","year":"2017","unstructured":"Olah, C., Mordvintsev, A., Schubert, L.: Feature visualization. Distill 2(11), e7 (2017)","journal-title":"Distill"},{"key":"3690_CR48","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2023.3304913","author":"D Liu","year":"2023","unstructured":"Liu, D., Zheng, Z., Peng, C., Wang, Y., Wang, N., Gao, X.: Hierarchical forgery classifier on multi-modality face forgery clues. IEEE Trans. Multimed. (2023). https:\/\/doi.org\/10.1109\/TMM.2023.3304913","journal-title":"IEEE Trans. Multimed."},{"key":"3690_CR49","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1109\/TIFS.2022.3146766","volume":"17","author":"Y Wang","year":"2022","unstructured":"Wang, Y., Peng, C., Liu, D., Wang, N., Gao, X.: Forgerynir: deep face forgery and detection in near-infrared scenario. IEEE Trans. Inf. Forensics Secur. 17, 500\u2013515 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3690_CR50","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1007\/s10044-022-01083-2","volume":"25","author":"S Ganguly","year":"2022","unstructured":"Ganguly, S., Mohiuddin, S., Malakar, S., Cuevas, E., Sarkar, R.: Visual attention-based deepfake video forgery detection. Pattern Anal. Appl. 25, 981\u2013992 (2022). https:\/\/doi.org\/10.1007\/s10044-022-01083-2","journal-title":"Pattern Anal. Appl."},{"key":"3690_CR51","doi-asserted-by":"publisher","first-page":"49","DOI":"10.3390\/bdcc5040049","volume":"5","author":"A Khormali","year":"2021","unstructured":"Khormali, A., Yuan, J.-S.: Add: attention-based deepfake detection approach. Big Data Cogn. Comput. 5, 49 (2021). https:\/\/doi.org\/10.3390\/bdcc5040049","journal-title":"Big Data Cogn. Comput."},{"key":"3690_CR52","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s10710-022-09385-6","volume":"66","author":"M Chan","year":"2022","unstructured":"Chan, M., Edwards, S., Lee, L.: Deepfake detection using advanced dual attention mechanisms. J. AI Res. 66, 45\u201359 (2022). https:\/\/doi.org\/10.1007\/s10710-022-09385-6","journal-title":"J. AI Res."},{"key":"3690_CR53","doi-asserted-by":"crossref","unstructured":"Wang, W., Shen, J., Dong, X., Borji, A.: Salient object detection driven by fixation prediction. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1711\u20131720","DOI":"10.1109\/CVPR.2018.00184"},{"issue":"3","key":"3690_CR54","first-page":"1","volume":"53","author":"Y Li","year":"2020","unstructured":"Li, Y., Lyu, S.: The creation and detection of deepfakes: a survey. ACM Comput. Surv. (CSUR) 53(3), 1\u201332 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"3690_CR55","doi-asserted-by":"crossref","unstructured":"G\u00fcera, D., Delp, E.J.: Deepfake video detection using recurrent neural networks. In: 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). IEEE, pp. 1\u20136 (2018)","DOI":"10.1109\/AVSS.2018.8639163"},{"issue":"4","key":"3690_CR56","first-page":"200","volume":"10","author":"R Shao","year":"2023","unstructured":"Shao, R., Wu, T., Liu, Z.: Robust sequential deepfake detection. Int. J. Adv. Comput. Technol. 10(4), 200\u2013220 (2023)","journal-title":"Int. J. Adv. Comput. Technol."},{"issue":"2","key":"3690_CR57","first-page":"95","volume":"12","author":"R Yang","year":"2023","unstructured":"Yang, R., Deng, Z., Zhang, Y., Luo, X., Lan, R.: 4dpm: Deepfake detection with a denoising diffusion probabilistic mask. J. Cybersecur. Dig. Forensics 12(2), 95\u2013115 (2023)","journal-title":"J. Cybersecur. Dig. Forensics"}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-024-03690-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-024-03690-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-024-03690-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T10:04:56Z","timestamp":1745489096000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-024-03690-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,8]]},"references-count":57,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["3690"],"URL":"https:\/\/doi.org\/10.1007\/s00371-024-03690-y","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,8]]},"assertion":[{"value":"10 October 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}