{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T11:41:09Z","timestamp":1778154069757,"version":"3.51.4"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2020,5,23]],"date-time":"2020-05-23T00:00:00Z","timestamp":1590192000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,23]],"date-time":"2020-05-23T00:00:00Z","timestamp":1590192000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"The Natural science fund for colleges and universities of Jiangsu province","award":["18KJB520049"],"award-info":[{"award-number":["18KJB520049"]}]},{"name":"The industry University- Research-Cooperation Project in Jiangsu Province","award":["BY2018124"],"award-info":[{"award-number":["BY2018124"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s00521-020-04873-z","type":"journal-article","created":{"date-parts":[[2020,5,23]],"date-time":"2020-05-23T20:02:19Z","timestamp":1590264139000},"page":"11491-11505","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["MNSSp3: Medical big data privacy protection platform based on Internet of things"],"prefix":"10.1007","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5190-9781","authenticated-orcid":false,"given":"Xiang","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yongting","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Aming","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Minyu","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Huanhuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lian","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,23]]},"reference":[{"issue":"4","key":"4873_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JBHI.2015.2453471","volume":"19","author":"JA Perez","year":"2015","unstructured":"Perez JA, Poon CCY, Merrifield RD et al (2015) Big data for health. IEEE J Biomed Health Inform 19(4):1","journal-title":"IEEE J Biomed Health Inform"},{"issue":"5","key":"4873_CR2","doi-asserted-by":"crossref","first-page":"774","DOI":"10.1016\/j.jbi.2013.07.001","volume":"46","author":"A O\u2019Driscoll","year":"2013","unstructured":"O\u2019Driscoll A, Daugelaite J, Sleator RD (2013) \u2018Big data\u2019, Hadoop and cloud computing in genomics. J Biomed Inform 46(5):774\u2013781","journal-title":"J Biomed Inform"},{"issue":"6","key":"4873_CR3","doi-asserted-by":"crossref","first-page":"731","DOI":"10.4103\/0366-6999.178019","volume":"129","author":"Y Zhang","year":"2016","unstructured":"Zhang Y, Guo SL, Han LN et al (2016) Application and exploration of big data mining in clinical medicine. Chin Med J 129(6):731\u2013738","journal-title":"Chin Med J"},{"key":"4873_CR4","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.jbi.2018.03.014","volume":"82","author":"A Pashazadeh","year":"2018","unstructured":"Pashazadeh A, Navimipour NJ (2018) Big data handling mechanisms in the healthcare applications: a comprehensive and systematic literature review. J Biomed Inform 82:47\u201362","journal-title":"J Biomed Inform"},{"issue":"1","key":"4873_CR5","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s10916-018-1121-4","volume":"43","author":"Y Chen","year":"2018","unstructured":"Chen Y, Ding S, Xu Z et al (2018) Blockchain-based medical records secure storage and medical service framework. J Med Syst 43(1):5","journal-title":"J Med Syst"},{"issue":"4","key":"4873_CR6","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1007\/s11673-017-9809-6","volume":"14","author":"E Vayena","year":"2017","unstructured":"Vayena E, Blasimme A (2017) Biomedical big data: new models of control over access, use and governance. J Bioeth Inq 14(4):501\u2013513","journal-title":"J Bioeth Inq"},{"key":"4873_CR7","doi-asserted-by":"crossref","first-page":"S03043835163034","DOI":"10.1016\/j.canlet.2016.05.033","volume":"382","author":"JE Bibault","year":"2016","unstructured":"Bibault JE, Giraud P, Burgun A (2016) Big data and machine learning in radiation oncology: state of the art and future prospects. Cancer Lett 382:S0304383516303469","journal-title":"Cancer Lett"},{"issue":"6352","key":"4873_CR8","doi-asserted-by":"crossref","first-page":"692","DOI":"10.1126\/science.aam9710","volume":"357","author":"KA Jagadeesh","year":"2017","unstructured":"Jagadeesh KA, Wu DJ, Birgmeier JA et al (2017) Deriving genomic diagnoses without revealing patient genomes. Science 357(6352):692\u2013695","journal-title":"Science"},{"key":"4873_CR9","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1111\/nyas.13259","volume":"1387","author":"S Wang","year":"2016","unstructured":"Wang S, Jiang X, Singh S et al (2016) Genome privacy: challenges, technical approaches to mitigate risk, and ethical considerations in the United States. Ann N Y Acad Sci 1387:73","journal-title":"Ann N Y Acad Sci"},{"issue":"11","key":"4873_CR10","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1007\/s11920-014-0494-4","volume":"16","author":"T Glenn","year":"2014","unstructured":"Glenn T, Monteith S (2014) Privacy in the digital world: medical and health data outside of HIPAA protections. Curr Psychiatry Rep 16(11):494","journal-title":"Curr Psychiatry Rep"},{"key":"4873_CR11","first-page":"1","volume":"4","author":"A Nia","year":"2015","unstructured":"Nia A, Sur-Kolay S, Raghunathan A et al (2015) Physiological information leakage: a new frontier in health information security. IEEE Trans Emerg Top Comput 4:1","journal-title":"IEEE Trans Emerg Top Comput"},{"issue":"99","key":"4873_CR12","first-page":"1","volume":"PP","author":"MHA Ibrahim","year":"2018","unstructured":"Ibrahim MHA, Zhou K, Ren J (2018) Privacy characterization and quantification in data publishing. IEEE Trans Knowl Data Eng PP(99):1","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"4873_CR13","doi-asserted-by":"crossref","first-page":"67","DOI":"10.2147\/RMHP.S179259","volume":"12","author":"K Adane","year":"2019","unstructured":"Adane K, Gizachew M, Kendie S (2019) The role of medical data in efficient patient care delivery: a review. J Risk Manag Healthc Policy 12:67\u201373","journal-title":"J Risk Manag Healthc Policy"},{"issue":"7","key":"4873_CR14","doi-asserted-by":"crossref","first-page":"e1001671","DOI":"10.1371\/journal.pmed.1001671","volume":"11","author":"G Peat","year":"2014","unstructured":"Peat G, Riley RD, Croft P et al (2014) Improving the transparency of prognosis research: the role of reporting, data sharing, registration, and protocols. PLoS Med 11(7):e1001671","journal-title":"PLoS Med"},{"issue":"Database Issue","key":"4873_CR15","doi-asserted-by":"crossref","first-page":"D613","DOI":"10.1093\/nar\/gkp939","volume":"38","author":"B Rhead","year":"2010","unstructured":"Rhead B, Karolchik D, Kuhn RM et al (2010) The UCSC genome browser database: update 2010. Nucleic Acids Res 38(Database Issue):D613","journal-title":"Nucleic Acids Res"},{"key":"4873_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ACCESS.2017.2755738","volume":"5","author":"HAA Hamid","year":"2017","unstructured":"Hamid HAA, Rahman SMM, Hossain MS et al (2017) A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5:1","journal-title":"IEEE Access"},{"issue":"1","key":"4873_CR17","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1111\/nyas.13211","volume":"1387","author":"X Shi","year":"2016","unstructured":"Shi X, Wu X (2016) An overview of human genetic privacy. Ann N Y Acad Sci 1387(1):61","journal-title":"Ann N Y Acad Sci"},{"issue":"3\u20134","key":"4873_CR18","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","volume":"9","author":"C Dwork","year":"2013","unstructured":"Dwork C, Roth A (2013) The algorithmic foundations of differential privacy. Found Trends Theor Comput Sci 9(3\u20134):211\u2013407","journal-title":"Found Trends Theor Comput Sci"},{"issue":"3","key":"4873_CR19","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1166\/jmihi.2018.2312","volume":"8","author":"X Wu","year":"2018","unstructured":"Wu X, Wang H, Wei Y, Mao Y, Jiang S (2018) An anonymous data publishing framework for streaming genomic data. J Med Imaging Health Inform 8(3):546\u2013554","journal-title":"J Med Imaging Health Inform"},{"issue":"7","key":"4873_CR20","doi-asserted-by":"crossref","first-page":"667","DOI":"10.2174\/1574893614666190416152025","volume":"14","author":"X Wu","year":"2019","unstructured":"Wu X, Wei Y, Jiang T, Wang Y, Jiang S (2019) A micro-aggregation algorithm based on density partition method for anonymizing biomedical data. Curr Bioinform 14(7):667\u2013675","journal-title":"Curr Bioinform"},{"issue":"Sp. Iss. SI","key":"4873_CR21","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.jbi.2014.06.002","volume":"50","author":"A Gkoulalas-Divanis","year":"2014","unstructured":"Gkoulalas-Divanis A, Loukides G, Sun J (2014) Publishing data from electronic health records while preserving privacy: a survey of algorithms. J Biomed Inform 50(Sp. Iss. SI):4\u201319","journal-title":"J Biomed Inform"},{"key":"4873_CR22","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3389\/fninf.2014.00035","volume":"8","author":"AD Sarwate","year":"2014","unstructured":"Sarwate AD, Plis SM, Turner JA et al (2014) Sharing privacy-sensitive access to neuroimaging and genetics data: a review and preliminary validation. Front Neuroinform 8:35","journal-title":"Front Neuroinform"},{"key":"4873_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10586-017-0882-8","volume":"21","author":"X Wu","year":"2018","unstructured":"Wu X, Wei Y, Mao Y, Wang L (2018) A differential privacy DNA motif finding method based on closed frequent patterns. Clust Comput 21:1\u201313","journal-title":"Clust Comput"},{"issue":"2\u20133","key":"4873_CR24","first-page":"10","volume":"25","author":"B Woodward","year":"1997","unstructured":"Woodward B (1997) Medical record confidentiality and data collection: current dilemmas. J Law Med Ethics 25(2\u20133):10","journal-title":"J Law Med Ethics"},{"issue":"2\u20134","key":"4873_CR25","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/j.ijmedinf.2004.03.008","volume":"74","author":"B Claerhout","year":"2005","unstructured":"Claerhout B, Demoor GJE (2005) Privacy protection for clinical and genomic data: the use of privacy-enhancing techniques in medicine. Int J Med Inform 74(2\u20134):257\u2013265","journal-title":"Int J Med Inform"},{"key":"4873_CR26","doi-asserted-by":"crossref","first-page":"103138","DOI":"10.1016\/j.jbi.2019.103138","volume":"92","author":"Z Li","year":"2019","unstructured":"Li Z, Roberts K, Jiang X, Long Q (2019) Distributed learning from multiple EHR databases: contextual embedding models for medical events. J Biomed Inform 92:103138","journal-title":"J Biomed Inform"},{"key":"4873_CR27","unstructured":"Malin B (2004) Protecting dna sequence anonymity with generalization lattices. Carnegie Mellon University, School of Computer Science (Institute for Software Research International)"},{"issue":"6117","key":"4873_CR28","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1126\/science.1229566","volume":"339","author":"M Gymrek","year":"2013","unstructured":"Gymrek M, McGuire AL, Golan D, Halperin E, Erlich Y (2013) Identifying personal genomes by surname inference. Science 339(6117):321\u2013324","journal-title":"Science"},{"issue":"7435","key":"4873_CR29","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1038\/494007a","volume":"494","author":"M Angrist","year":"2013","unstructured":"Angrist M (2013) Genetic privacy needs a more nuanced approach. Nature 494(7435):7","journal-title":"Nature"},{"key":"4873_CR30","doi-asserted-by":"crossref","first-page":"e1000167","DOI":"10.1371\/journal.pgen.1000167","volume":"4","author":"N Homer","year":"2008","unstructured":"Homer N, Szelinger S, Redman M et al (2008) Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genet 4:e1000167","journal-title":"PLoS Genet"},{"key":"4873_CR31","doi-asserted-by":"crossref","first-page":"e1001983","DOI":"10.1371\/journal.pbio.1001983","volume":"12","author":"Y Erlich","year":"2014","unstructured":"Erlich Y, Williams JB, Glazer D et al (2014) Redefining genomic privacy: trust and empowerment. PLoS Biol 12:e1001983","journal-title":"PLoS Biol"},{"key":"4873_CR32","doi-asserted-by":"crossref","unstructured":"Dwork C, McSherry F, Nissim K et al (2006) Theory of cryptography. In; Lecture notes computer science, vol 3876. Calibrating noise to sensitivity in private data analysis. Springer, Berlin, pp 265\u2013284","DOI":"10.1007\/11681878_14"},{"key":"4873_CR33","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C Dwork","year":"2011","unstructured":"Dwork C (2011) A firm foundation for private data analysis. Commun ACM 54:86\u201395","journal-title":"Commun ACM"},{"key":"4873_CR34","doi-asserted-by":"crossref","unstructured":"Djatmiko M, Friedman A, Boreli R et al (2014) Proceedings of the 13th workshop on privacy in the electronic society. In: Secure evaluation protocol for personalized medicine. ACM, New York, pp 159\u2013162","DOI":"10.1145\/2665943.2665967"},{"key":"4873_CR35","doi-asserted-by":"crossref","first-page":"664","DOI":"10.1101\/gr.153346.112","volume":"24","author":"D He","year":"2014","unstructured":"He D, Furlotte NA, Hormozdiari F et al (2014) Identifying genetic relatives without compromising privacy. Genome Res 24:664\u2013672","journal-title":"Genome Res"},{"key":"4873_CR36","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1038\/nature26147","volume":"555","author":"E Boto","year":"2018","unstructured":"Boto E et al (2018) Moving magnetoencephalography towards real-world applications with a wearable system. Nature 555:657\u2013661","journal-title":"Nature"},{"key":"4873_CR37","doi-asserted-by":"crossref","first-page":"3096","DOI":"10.1038\/s41467-019-10994-4","volume":"10","author":"DA Moses","year":"2019","unstructured":"Moses DA, Leonard MK, Makin JG et al (2019) Real-time decoding of question-and-answer speech dialogue using human cortical activity. Nat Commun 10:3096","journal-title":"Nat Commun"},{"key":"4873_CR38","unstructured":"Martinovic I, Davies D, Frank M, Perito D, Ros T, Song D (2012) On the feasibility of side-channel attacks with brain\u2013computer interfaces. In: Kohno T (ed) USENIX security symposium. Proceedings. USENIX Association, pp 143\u2013158"},{"key":"4873_CR39","unstructured":"Vu K, Zheng R, Gao J (2012) Efficient algorithms for K-anonymous location privacy in participatory sensing. In; Proceedings\u2014IEEE INFOCOM, pp 2399\u20132407"},{"key":"4873_CR40","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107337756","volume-title":"Secure multiparty computation and secret sharing","author":"R Cramer","year":"2015","unstructured":"Cramer R, Damg\u00e5rd I, Nielsen JB (2015) Secure multiparty computation and secret sharing. University Press, Cambridge"},{"issue":"8","key":"4873_CR41","doi-asserted-by":"crossref","first-page":"1534","DOI":"10.1109\/TNSRE.2019.2926965","volume":"27","author":"A Agarwal","year":"2019","unstructured":"Agarwal A, Dowsley R, Nicholas D et al (2019) Protecting privacy of users in brain\u2013computer interface applications. IEEE Trans Neural Syst Rehabil Eng 27(8):1534\u20134320","journal-title":"IEEE Trans Neural Syst Rehabil Eng"},{"key":"4873_CR42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89500-0_38","author":"G Wenyong","year":"2015","unstructured":"Wenyong G, Yingjie WU, Lan S et al (2015) Frequent pattern mining with differential privacy based on transaction truncation. J Chin Comput Syst. https:\/\/doi.org\/10.1007\/978-3-319-89500-0_38","journal-title":"J Chin Comput Syst"},{"issue":"3\u20134","key":"4873_CR43","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork C, Roth A et al (2014) The algorithmic foundations of differential privacy. Found Trends Theor Comput Sci 9(3\u20134):211\u2013407","journal-title":"Found Trends Theor Comput Sci"},{"key":"4873_CR44","doi-asserted-by":"crossref","unstructured":"Huang D, Han S, Li X (2015) Achieving accuracy guarantee for answering batch queries with differential privacy. In: Pacific-Asia conference on knowledge discovery and data mining. Springer, Cham","DOI":"10.1007\/978-3-319-18032-8_24"},{"key":"4873_CR45","unstructured":"Shen H, Lu Z (2017) A new lower bound of privacy budget for distributed differential privacy. In: 2017 18th international conference on parallel and distributed computing, applications and technologies (PDCAT). IEEE"},{"issue":"8","key":"4873_CR46","doi-asserted-by":"crossref","first-page":"2922","DOI":"10.1109\/TIT.2007.901248","volume":"53","author":"HM Sun","year":"2007","unstructured":"Sun HM, Wu ME, Ting WC et al (2007) Dual RSA and its security analysis. IEEE Trans Inf Theory 53(8):2922\u20132933","journal-title":"IEEE Trans Inf Theory"},{"key":"4873_CR47","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.future.2018.07.064","volume":"90","author":"C Zhang","year":"2019","unstructured":"Zhang C, Zhu L, Xu C, Sharif K, Du X, Guizani M (2019) LPTD: achieving lightweight and privacy-preserving truth discovery in CIoT. Fut Gener Comp Syst 90:175\u2013184","journal-title":"Fut Gener Comp Syst"},{"issue":"2","key":"4873_CR48","doi-asserted-by":"crossref","first-page":"1578","DOI":"10.1109\/TII.2014.2306382","volume":"10","author":"B Xu","year":"2014","unstructured":"Xu B, Xu LD, Cai H et al (2014) Ubiquitous data accessing method in IoT-based information system for emergency medical services. IEEE Trans Ind Inf 10(2):1578\u20131586","journal-title":"IEEE Trans Ind Inf"},{"key":"4873_CR49","doi-asserted-by":"crossref","first-page":"1550","DOI":"10.1109\/JIOT.2018.2792423","volume":"5","author":"H Zhang","year":"2018","unstructured":"Zhang H, Li J, Wen B et al (2018) Connecting intelligent things in smart hospitals using NB-IoT. IEEE Internet Things J 5:1550\u20131560","journal-title":"IEEE Internet Things J"},{"issue":"7","key":"4873_CR50","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1001\/jama.2010.120","volume":"303","author":"Thomas Lumley","year":"2010","unstructured":"Lumley Thomas (2010) Potential for revealing individual-level information in genome-wide association studies. JAMA 303(7):659","journal-title":"JAMA"},{"issue":"8","key":"4873_CR51","doi-asserted-by":"crossref","first-page":"e1000167","DOI":"10.1371\/journal.pgen.1000167","volume":"4","author":"S Homer","year":"2008","unstructured":"Homer S, Szelinger M, Redman D, Duggan W, Tembe J, Muehling JV, Pearson DA, Stephan SF, Nelson DW (2008) Craig, resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genet 4(8):e1000167","journal-title":"PLoS Genet"},{"key":"4873_CR52","doi-asserted-by":"crossref","unstructured":"Chen R, Acs G, Castelluccia C (2012) Differentially private sequential data publication via variable-length N-grams. In: ACM conference on computer and communications security (CCS). ACM","DOI":"10.1145\/2382196.2382263"},{"issue":"Sp. Iss. SI","key":"4873_CR53","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.jbi.2013.12.016","volume":"50","author":"R Chen","year":"2014","unstructured":"Chen R, Peng Y, Choi B et al (2014) A private DNA motif finding algorithm. J Biomed Inform 50(Sp. Iss. SI):122\u2013132","journal-title":"J Biomed Inform"},{"key":"4873_CR54","unstructured":"Kevin O, Seidman R (2016) Personal information security and exchange tool. Interaction processor and exchange tool"},{"key":"4873_CR55","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.comcom.2019.11.015","volume":"150","author":"X Wu","year":"2020","unstructured":"Wu X, Wang H, Wei D et al (2020) ANFIS with natural language processing and gray relational analysis based cloud computing framework for real time energy efficient resource allocation. Comput Commun 150:122\u2013130","journal-title":"Comput Commun"},{"key":"4873_CR56","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00885-7","author":"X Wu","year":"2020","unstructured":"Wu X, Wang H, Tan W et al (2020) Dynamic allocation strategy of VM resources with fuzzy transfer learning method. Peer Netw Appl. https:\/\/doi.org\/10.1007\/s12083-020-00885-7","journal-title":"Peer Netw Appl"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-020-04873-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-020-04873-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-020-04873-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T09:11:04Z","timestamp":1657876264000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-020-04873-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,23]]},"references-count":56,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["4873"],"URL":"https:\/\/doi.org\/10.1007\/s00521-020-04873-z","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,23]]},"assertion":[{"value":"23 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}