{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:34:02Z","timestamp":1775914442586,"version":"3.50.1"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s00500-019-04030-2","type":"journal-article","created":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T01:31:26Z","timestamp":1557797486000},"page":"1999-2012","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":849,"title":["Deep packet: a novel approach for encrypted traffic classification using deep learning"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6858-7985","authenticated-orcid":false,"given":"Mohammad","family":"Lotfollahi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3860-5999","authenticated-orcid":false,"given":"Mahdi","family":"Jafari Siavoshani","sequence":"additional","affiliation":[]},{"given":"Ramin","family":"Shirali Hossein Zade","sequence":"additional","affiliation":[]},{"given":"Mohammdsadegh","family":"Saberian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"key":"4030_CR1","unstructured":"Abadi M, Agarwal A, Barham P, Brevdo E, Chen Z, Citro C, Corrado GS, Davis A, Dean J, Devin M, Ghemawat S, Goodfellow I, Harp A, Irving G, Isard M, Jia Y, Jozefowicz R, Kaiser L, Kudlur M, Levenberg J, Man\u00e9 D, Monga R, Moore S, Murray D, Olah C, Schuster M, Shlens J, Steiner B, Sutskever I, Talwar K, Tucker P, Vanhoucke V, Vasudevan V, Vi\u00e9gas F, Vinyals O, Warden P, Wattenberg M, Wicke M, Yu Y, Zheng X (2015) TensorFlow: large-scale machine learning on heterogeneous systems. http:\/\/tensorflow.org\/ , software available from tensorflow.org"},{"key":"4030_CR2","doi-asserted-by":"crossref","unstructured":"Akhtar N, Mian A (2018) Threat of adversarial attacks on deep learning in computer vision: a survey. arXiv:1801.00553","DOI":"10.1109\/ACCESS.2018.2807385"},{"issue":"8","key":"4030_CR3","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1038\/nbt.3300","volume":"33","author":"B Alipanahi","year":"2015","unstructured":"Alipanahi B, Delong A, Weirauch MT, Frey BJ (2015) Predicting the sequence specificities of dna-and rna-binding proteins by deep learning. Nat Biotechnol 33(8):831\u2013838","journal-title":"Nat Biotechnol"},{"issue":"6","key":"4030_CR4","doi-asserted-by":"publisher","first-page":"1326","DOI":"10.1016\/j.comnet.2010.12.002","volume":"55","author":"R Alshammari","year":"2011","unstructured":"Alshammari R, Zincir-Heywood AN (2011) Can encrypted traffic be identified without port numbers, ip addresses and payload inspection? Comput Netw 55(6):1326\u20131350","journal-title":"Comput Netw"},{"issue":"1","key":"4030_CR5","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1109\/TNN.2006.883010","volume":"18","author":"T Auld","year":"2007","unstructured":"Auld T, Moore AW, Gull SF (2007) Bayesian neural networks for internet traffic classification. IEEE Trans Neural Netw 18(1):223\u2013239","journal-title":"IEEE Trans Neural Netw"},{"issue":"2","key":"4030_CR6","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1080\/23742917.2017.1321891","volume":"1","author":"S Bagui","year":"2017","unstructured":"Bagui S, Fang X, Kalaimannan E, Bagui SC, Sheehan J (2017) Comparison of machine-learning algorithms for classification of vpn network traffic flow using time-related features. J Cyber Secur Technol 1(2):108\u2013126","journal-title":"J Cyber Secur Technol"},{"issue":"1","key":"4030_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/2200000006","volume":"2","author":"Y Bengio","year":"2009","unstructured":"Bengio Y (2009) Learning deep architectures for ai. Found Trends Mach Learn 2(1):1\u2013127","journal-title":"Found Trends Mach Learn"},{"key":"4030_CR8","doi-asserted-by":"crossref","unstructured":"Bengio Y, Lamblin P, Popovici D, Larochelle H (2007) Greedy layer-wise training of deep networks. In: Advances in neural information processing systems, pp 153\u2013160","DOI":"10.7551\/mitpress\/7503.003.0024"},{"key":"4030_CR9","doi-asserted-by":"crossref","unstructured":"Carlini N, Wagner D (2018) Audio adversarial examples: targeted attacks on speech-to-text. arXiv:1801.01944","DOI":"10.1109\/SPW.2018.00009"},{"issue":"12","key":"4030_CR10","first-page":"46","volume":"2","author":"M Caudill","year":"1987","unstructured":"Caudill M (1987) Neural networks primer, part i. AI Expert 2(12):46\u201352","journal-title":"AI Expert"},{"key":"4030_CR11","unstructured":"Chollet F et\u00a0al (2017) Keras. https:\/\/github.com\/fchollet\/keras"},{"issue":"5","key":"4030_CR12","doi-asserted-by":"publisher","first-page":"862","DOI":"10.1016\/j.comnet.2009.10.017","volume":"54","author":"NMK Chowdhury","year":"2010","unstructured":"Chowdhury NMK, Boutaba R (2010) A survey of network virtualization. Comput Netw 54(5):862\u2013876","journal-title":"Comput Netw"},{"key":"4030_CR13","series-title":"Wiley Series in Telecommunications and Signal Processing","volume-title":"Elements of information theory","author":"TM Cover","year":"2006","unstructured":"Cover TM, Thomas JA (2006) Elements of information theory. Wiley Series in Telecommunications and Signal Processing. Wiley-Interscience, New Jersy"},{"issue":"1","key":"4030_CR14","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1198255.1198257","volume":"37","author":"M Crotti","year":"2007","unstructured":"Crotti M, Dusi M, Gringoli F, Salgarelli L (2007) Traffic classification through simple statistical fingerprinting. ACM SIGCOMM Comput Commun Rev 37(1):5\u201316","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"4030_CR15","doi-asserted-by":"crossref","unstructured":"Dainotti A, Pescape A, Claffy KC (2012) Issues and future directions in traffic classification. IEEE Netw 26(1):35-40","DOI":"10.1109\/MNET.2012.6135854"},{"key":"4030_CR16","doi-asserted-by":"crossref","unstructured":"Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. Tech. rep., Naval Research Lab Washington DC","DOI":"10.21236\/ADA465464"},{"key":"4030_CR17","unstructured":"dos Santos CN, Gatti M (2014) Deep convolutional neural networks for sentiment analysis of short texts. In: Proceedings of the 25th international conference on computational linguistics (COLING), Dublin, Ireland"},{"key":"4030_CR18","unstructured":"Du M, Liu N, Hu X (2018) Techniques for interpretable machine learning. arXiv preprint. arXiv:1808.00033"},{"issue":"2","key":"4030_CR19","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1109\/SURV.2013.100613.00161","volume":"16","author":"M Finsterbusch","year":"2014","unstructured":"Finsterbusch M, Richter C, Rocha E, Muller JA, Hanssgen K (2014) A survey of payload-based traffic classification approaches. IEEE Commun Surv Tutor 16(2):1135\u20131156","journal-title":"IEEE Commun Surv Tutor"},{"key":"4030_CR20","unstructured":"Gil GD, Lashkari AH, Mamun M, Ghorbani AA (2016) Characterization of encrypted and vpn traffic using time-related features. In: Proceedings of the 2nd international conference on information systems security and privacy (ICISSP 2016), pp 407\u2013414"},{"issue":"6","key":"4030_CR21","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2012.2205597","volume":"29","author":"G Hinton","year":"2012","unstructured":"Hinton G, Deng L, Yu D, Dahl GE, Ar Mohamed, Jaitly N, Senior A, Vanhoucke V, Nguyen P, Sainath TN et al (2012) Deep neural networks for acoustic modeling in speech recognition: the shared views of four research groups. IEEE Signal Process Mag 29(6):82\u201397","journal-title":"IEEE Signal Process Mag"},{"key":"4030_CR22","unstructured":"Huang SH, Papernot N, Goodfellow IJ, Duan Y, Abbeel P (2017) Adversarial attacks on neural network policies. arXiv:1702.02284"},{"issue":"1","key":"4030_CR23","first-page":"6869","volume":"18","author":"I Hubara","year":"2017","unstructured":"Hubara I, Courbariaux M, Soudry D, El-Yaniv R, Bengio Y (2017) Quantized neural networks: training neural networks with low precision weights and activations. J Mach Learn Res 18(1):6869\u20136898","journal-title":"J Mach Learn Res"},{"issue":"1","key":"4030_CR24","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1113\/jphysiol.1968.sp008455","volume":"195","author":"DH Hubel","year":"1968","unstructured":"Hubel DH, Wiesel TN (1968) Receptive fields and functional architecture of monkey striate cortex. J Physiol 195(1):215\u2013243","journal-title":"J Physiol"},{"key":"4030_CR25","unstructured":"Ioffe S, Szegedy C (2015) Batch normalization: accelerating deep network training by reducing internal covariate shift. In: International conference on machine learning, pp 448\u2013456"},{"issue":"2","key":"4030_CR26","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1002\/nem.1855","volume":"24","author":"J Khalife","year":"2014","unstructured":"Khalife J, Hajjar A, Diaz-Verdejo J (2014) A multilevel taxonomy and requirements for an optimal traffic-classification model. Int J Netw Manag 24(2):101\u2013120","journal-title":"Int J Netw Manag"},{"key":"4030_CR27","unstructured":"Kingma D, Ba J (2014) Adam: a method for stochastic optimization. arXiv preprint. arXiv:1412.6980"},{"key":"4030_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2768018","author":"J Kohout","year":"2018","unstructured":"Kohout J, Pevn\u00fd T (2018) Network traffic fingerprinting based on approximated kernel two-sample test. IEEE Trans Inf Forensics Secur. https:\/\/doi.org\/10.1109\/TIFS.2017.2768018","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"7553","key":"4030_CR29","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436\u2013444","journal-title":"Nature"},{"key":"4030_CR30","doi-asserted-by":"crossref","unstructured":"Lee H, Grosse R, Ranganath R, Ng AY (2009) Convolutional deep belief networks for scalable unsupervised learning of hierarchical representations. In: Proceedings of the 26th annual international conference on machine learning, ACM, New York, NY, USA, ICML \u201909, pp 609\u2013616","DOI":"10.1145\/1553374.1553453"},{"key":"4030_CR31","unstructured":"Lin DD, Talathi SS, Annapureddy VS (2016) Fixed point quantization of deep convolutional networks. In: Proceedings of the 33rd international conference on international conference on machine learning, vol 48, ICML\u201916, pp 2849\u20132858"},{"key":"4030_CR32","unstructured":"Longadge R, Dongre S (2013) Class imbalance problem in data mining review. arXiv preprint. arXiv:1305.1707"},{"key":"4030_CR33","unstructured":"Lotfollahi M, Shirali Hossein\u00a0Zade R, Jafari\u00a0Siavoshani M, Saberian M (2017) Deep packet: a novel approach for encrypted traffic classification using deep learning. CoRR abs\/1709.02656. arXiv:1709.02656"},{"key":"4030_CR34","doi-asserted-by":"crossref","unstructured":"Lotfollahi M, Wolf FA, Theis FJ (2018) Generative modeling and latent space arithmetics predict single-cell perturbation response across cell types, studies and species. bioRxiv p 478503","DOI":"10.1101\/478503"},{"issue":"5","key":"4030_CR35","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s11859-014-1034-0","volume":"19","author":"J Lv","year":"2014","unstructured":"Lv J, Zhu C, Tang S, Yang C (2014) Deepflow: hiding anonymous communication traffic in p2p streaming networks. Wuhan Univ J Nat Sci 19(5):417\u2013425","journal-title":"Wuhan Univ J Nat Sci"},{"key":"4030_CR36","doi-asserted-by":"crossref","unstructured":"Madhukar A, Williamson C (2006) A longitudinal study of p2p traffic classification. In: Modeling, analysis, and simulation of computer and telecommunication systems, 2006. MASCOTS 2006. 14th IEEE international symposium on, IEEE, pp 179\u2013188","DOI":"10.1109\/MASCOTS.2006.6"},{"key":"4030_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.dsp.2017.10.011","volume":"73","author":"G Montavon","year":"2018","unstructured":"Montavon G, Samek W, M\u00fcller KR (2018) Methods for interpreting and understanding deep neural networks. Digit Signal Process 73:1\u201315","journal-title":"Digit Signal Process"},{"key":"4030_CR38","first-page":"41","volume":"5","author":"AW Moore","year":"2005","unstructured":"Moore AW, Papagiannaki K (2005) Toward the accurate identification of network applications. PAM, Springer 5:41\u201354","journal-title":"PAM, Springer"},{"key":"4030_CR39","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1071690.1064220","volume":"33","author":"AW Moore","year":"2005","unstructured":"Moore AW, Zuev D (2005) Internet traffic classification using Bayesian analysis techniques. ACM SIGMETRICS Perform Eval Rev ACM 33:50\u201360","journal-title":"ACM SIGMETRICS Perform Eval Rev ACM"},{"key":"4030_CR40","unstructured":"Moore A, Zuev D, Crogan M (2013) Discriminators for use in flow-based classification. Tech. rep"},{"key":"4030_CR41","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay E (2011) Scikit-learn: machine learning in Python. J Mach Learn Res 12:2825\u20132830","journal-title":"J Mach Learn Res"},{"key":"4030_CR42","doi-asserted-by":"publisher","unstructured":"Perera P, Tian YC, Fidge C, Kelly W (2017) A comparison of supervised machine learning algorithms for classification of communications network traffic. In: Neural information processing. Springer, Cham, Lecture Notes in Computer Science, pp 445\u2013454. https:\/\/doi.org\/10.1007\/978-3-319-70087-8_47","DOI":"10.1007\/978-3-319-70087-8_47"},{"key":"4030_CR43","unstructured":"Prechelt L (1998) Early stopping-but when? Neural networks: tricks of the trade. Springer, pp 55\u201369"},{"key":"4030_CR44","doi-asserted-by":"crossref","unstructured":"Qi Y, Xu L, Yang B, Xue Y, Li J (2009) Packet classification algorithms: from theory to practice. In: INFOCOM 2009, IEEE, IEEE, pp 648\u2013656","DOI":"10.1109\/INFCOM.2009.5061972"},{"issue":"1","key":"4030_CR45","first-page":"39","volume":"1","author":"W Samek","year":"2018","unstructured":"Samek W, Wiegand T, M\u00fcller KR (2018) Explainable artificial intelligence: understanding, visualizing and interpreting deep learning models. ITU J ICT Discov Special Issue 1 Impact Artif Intell (AI) Commun Netw Serv 1(1):39\u201348","journal-title":"ITU J ICT Discov Special Issue 1 Impact Artif Intell (AI) Commun Netw Serv"},{"key":"4030_CR46","doi-asserted-by":"crossref","unstructured":"Sen S, Spatscheck O, Wang D (2004) Accurate, scalable in-network identification of p2p traffic using application signatures. In: Proceedings of the 13th international conference on world wide web, ACM, New York, NY, USA, pp 512\u2013521","DOI":"10.1145\/988672.988742"},{"key":"4030_CR47","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1145\/2829988.2787502","volume":"45","author":"J Sherry","year":"2015","unstructured":"Sherry J, Lan C, Popa RA, Ratnasamy S (2015) Blindbox: deep packet inspection over encrypted traffic. ACM SIGCOMM Comput Commun Rev ACM 45:213\u2013226","journal-title":"ACM SIGCOMM Comput Commun Rev ACM"},{"key":"4030_CR48","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv preprint. arXiv:1409.1556"},{"key":"4030_CR49","unstructured":"Socher R, Perelygin A, Wu JY, Chuang J, Manning CD, Ng AY, Potts CP (2013) Recursive deep models for semantic compositionality over a sentiment treebank. In: EMNLP"},{"key":"4030_CR50","doi-asserted-by":"crossref","unstructured":"Sun R, Yang B, Peng L, Chen Z, Zhang L, Jing S (2010) Traffic classification using probabilistic neural networks. In: Natural computation (ICNC), 2010 sixth international conference on, IEEE, vol\u00a04, pp 1914\u20131919","DOI":"10.1109\/ICNC.2010.5584648"},{"key":"4030_CR51","doi-asserted-by":"crossref","unstructured":"Ting H, Yong W, Xiaoling T (2010) Network traffic classification based on kernel self-organizing maps. In: Intelligent computing and integrated systems (ICISS), 2010 international conference on, IEEE, pp 310\u2013314","DOI":"10.1109\/ICISS.2010.5657079"},{"key":"4030_CR52","unstructured":"Vanhoucke V, Senior A, Mao MZ (2011) Improving the speed of neural networks on cpus. In: Deep learning and unsupervised feature learning workshop, NIPS 2011"},{"issue":"5","key":"4030_CR53","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1002\/nem.1901","volume":"25","author":"P Velan","year":"2015","unstructured":"Velan P, \u010cerm\u00e1k M, \u010celeda P, Dra\u0161ar M (2015) A survey of methods for encrypted traffic classification and analysis. Int J Netw Manag 25(5):355\u2013374","journal-title":"Int J Netw Manag"},{"key":"4030_CR54","doi-asserted-by":"crossref","unstructured":"Vincent P, Larochelle H, Bengio Y, Manzagol PA (2008) Extracting and composing robust features with denoising autoencoders. In: Proceedings of the 25th international conference on machine learning, ACM, pp 1096\u20131103","DOI":"10.1145\/1390156.1390294"},{"key":"4030_CR55","volume-title":"The applications of deep learning on traffic identification","author":"Z Wang","year":"2015","unstructured":"Wang Z (2015) The applications of deep learning on traffic identification. BlackHat, USA"},{"key":"4030_CR56","doi-asserted-by":"crossref","unstructured":"Wang X, Parish DJ (2010) Optimised multi-stage tcp traffic classifier based on packet size distributions. In: Communication theory, reliability, and quality of service (CTRQ), 2010 third international conference on, IEEE, pp 98\u2013103","DOI":"10.1109\/CTRQ.2010.24"},{"key":"4030_CR57","doi-asserted-by":"crossref","unstructured":"Wang W, Zhu M, Wang J, Zeng X, Yang Z (2017) End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: Intelligence and security informatics (ISI), 2017 IEEE international conference on, IEEE, pp 43\u201348","DOI":"10.1109\/ISI.2017.8004872"},{"key":"4030_CR58","doi-asserted-by":"crossref","unstructured":"Yamansavascilar B, Guvensan MA, Yavuz AG, Karsligil ME (2017) Application identification via network traffic classification. In: Computing, networking and communications (ICNC), 2017 international conference on, IEEE, pp 843\u2013848","DOI":"10.1109\/ICCNC.2017.7876241"},{"key":"4030_CR59","doi-asserted-by":"crossref","unstructured":"Yeganeh SH, Eftekhar M, Ganjali Y, Keralapura R, Nucci A (2012) Cute: traffic classification using terms. In: Computer communications and networks (ICCCN), 2012 21st international conference on, IEEE, pp 1\u20139","DOI":"10.1109\/ICCCN.2012.6289207"},{"key":"4030_CR60","unstructured":"Yosinski J, Clune J, Nguyen AM, Fuchs TJ, Lipson H (2015) Understanding neural networks through deep visualization. arXiv:1506.06579"},{"key":"4030_CR61","unstructured":"Yuan X, He P, Zhu Q, Bhat RR, Li X (2017) Adversarial examples: attacks and defenses for deep learning. arXiv:1712.07107"},{"key":"4030_CR62","doi-asserted-by":"crossref","unstructured":"Zhang C, Li P, Sun G, Guan Y, Xiao B, Cong J (2015) Optimizing fpga-based accelerator design for deep convolutional neural networks. In: Proceedings of the 2015 ACM\/SIGDA international symposium on field-programmable gate arrays, ACM, pp 161\u2013170","DOI":"10.1145\/2684746.2689060"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-04030-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-019-04030-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-04030-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T14:53:25Z","timestamp":1694876005000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-019-04030-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":62,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["4030"],"URL":"https:\/\/doi.org\/10.1007\/s00500-019-04030-2","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"13 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"Mohammad Lotfollahi, Mahdi Jafari Siavoshani, Ramin Shirali Hossein Zade, and Mohammdsadegh Saberian declare that they have no conflict of interest","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}