{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:21:06Z","timestamp":1740108066965,"version":"3.37.3"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T00:00:00Z","timestamp":1732838400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T00:00:00Z","timestamp":1732838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62101481","62002313","62261060","12202377"],"award-info":[{"award-number":["62101481","62002313","62261060","12202377"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Basic Research Project of Yunnan Province","award":["202301AW070007","202201AU070033"],"award-info":[{"award-number":["202301AW070007","202201AU070033"]}]},{"name":"Basic Research Project of Yunnan Province","award":["202201AT070112","202301AT070407"],"award-info":[{"award-number":["202201AT070112","202301AT070407"]}]},{"name":"Basic Research Project of Yunnan Province","award":["202301AU070210","202005AC160007"],"award-info":[{"award-number":["202301AU070210","202005AC160007"]}]},{"name":"Major Scientific and Technological Project of Yunnan Province","award":["202202AD080002"],"award-info":[{"award-number":["202202AD080002"]}]},{"name":"Yunnan Province Expert Workstations","award":["202305AF150078"],"award-info":[{"award-number":["202305AF150078"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s00521-024-10700-6","type":"journal-article","created":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T16:47:19Z","timestamp":1732898839000},"page":"1783-1795","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Learning dual aggregate features for face forgery detection"],"prefix":"10.1007","volume":"37","author":[{"given":"Yuru","family":"Kou","sequence":"first","affiliation":[]},{"given":"Qian","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2211-2006","authenticated-orcid":false,"given":"Xin","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Shengfa","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Xing","family":"Chu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,29]]},"reference":[{"key":"10700_CR1","doi-asserted-by":"crossref","unstructured":"Afchar Darius et al (2018) \u201cMesoNet: a Compact Facial Video Forgery Detection Network\u201d. In: 2018 IEEE International Workshop on Information Forensics and Security (WIFS). pp.1\u20137","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"10700_CR2","doi-asserted-by":"crossref","unstructured":"Agarwal Shruti et al (2020) \u201cDetecting Deep-Fake Videos from Phoneme-Viseme Mismatches\u201d. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp.2814\u20132822","DOI":"10.1109\/CVPRW50498.2020.00338"},{"key":"10700_CR3","doi-asserted-by":"crossref","unstructured":"Bayar Belhassen, Matthew C Stamm (2018) \u201cConstrained convolutional neural networks: A new approach towards general purpose image manipulation detection\u201d. In: IEEE Transactions on Information Forensics and Security 13.11, pp.2691\u20132706","DOI":"10.1109\/TIFS.2018.2825953"},{"key":"10700_CR4","doi-asserted-by":"crossref","unstructured":"Bitouk Dmitri et al (2008) \u201cFace swapping: automatically replacing faces in photographs\u201d. In: ACM SIGGRAPH 2008 papers. pp.1\u20138","DOI":"10.1145\/1399504.1360638"},{"key":"10700_CR5","doi-asserted-by":"crossref","unstructured":"Cao Junyi et al (2022) \u201cEnd-to-end reconstruction-classification learning for face forgery detection\u201d. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp.4113\u20134122","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"10700_CR6","doi-asserted-by":"crossref","unstructured":"Chen Liang et al (2022) \u201cSelf-supervised learning of adversarial example: Towards good generalizations for deepfake detection\u201d. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. pp.18710\u201318719","DOI":"10.1109\/CVPR52688.2022.01815"},{"key":"10700_CR7","doi-asserted-by":"crossref","unstructured":"Chen Yinpeng et al (2020) \u201cDynamic convolution: Attention over convolution kernels\u201d. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. pp.11030\u201311039","DOI":"10.1109\/CVPR42600.2020.01104"},{"key":"10700_CR8","doi-asserted-by":"crossref","unstructured":"Chen Zheng et al (2023) \u201cDual Aggregation Transformer for Image Super-Resolution\u201d. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision. pp.12312\u201312321","DOI":"10.1109\/ICCV51070.2023.01131"},{"key":"10700_CR9","doi-asserted-by":"crossref","unstructured":"Chollet Fran\u00e7ois (2017) \u201cXception: Deep learning with depthwise separable convolutions\u201d. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp.1251\u20131258","DOI":"10.1109\/CVPR.2017.195"},{"key":"10700_CR10","doi-asserted-by":"crossref","unstructured":"Guo Ying, Zhen Cheng, Yan Pengfei (2023) \u201cControllable Guide-Space for Generalizable Face Forgery Detection\u201d. In: 2023 IEEE\/CVF International Conference on Computer Vision (ICCV). pp.20761\u201320770","DOI":"10.1109\/ICCV51070.2023.01903"},{"key":"10700_CR11","doi-asserted-by":"crossref","unstructured":"Rostami Mohse, Farajollahi Amir, Parvin Hashem (2022) \u201cDeep learning-based face detection and recognition on drones\u201d. In: Journal of Ambient Intelligence and Humanized Computing 15","DOI":"10.1007\/s12652-022-03897-8"},{"key":"10700_CR12","doi-asserted-by":"crossref","unstructured":"Zhao Yi et al (2024) \u201cFace Forgery Detection with Long-Range Noise Features and Multilevel Frequency-Aware Clues\u201d. In: IET Biometrics 2024","DOI":"10.1049\/2024\/6523854"},{"key":"10700_CR13","doi-asserted-by":"crossref","unstructured":"Cozzolino Davide, Poggi Giovanni, Verdoliva Luisa (2017) \u201cRecasting residual-based local descriptors as convolutional neural networks: an application to image forgery detection\u201d. In: Proceedings of the 5th ACM workshop on information hiding and multimedia security. pp.159\u2013164","DOI":"10.1145\/3082031.3083247"},{"key":"10700_CR14","doi-asserted-by":"crossref","unstructured":"Dong Fengkai et al (2023) \u201cContrastive learning-based general Deepfake detection with multi-scale RGB frequency clues\u201d. In: Journal of King Saud University - Computer and Information Sciences 35.4 , pp.90\u201399. ISSN: 1319-1578","DOI":"10.1016\/j.jksuci.2023.03.005"},{"key":"10700_CR15","doi-asserted-by":"crossref","unstructured":"Dong Xiaoyi et al (2022) \u201cProtecting celebrities from deepfake with identity consistency transformer\u201d. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp.9468\u20139478","DOI":"10.1109\/CVPR52688.2022.00925"},{"key":"10700_CR16","doi-asserted-by":"crossref","unstructured":"Fei Jianwei et al (2022) \u201cLearning Second Order Local Anomaly for General Face Forgery Detection\u201d. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). pp.20270\u201320280","DOI":"10.1109\/CVPR52688.2022.01963"},{"key":"10700_CR17","doi-asserted-by":"crossref","first-page":"507","DOI":"10.18280\/ts.360605","volume":"36","author":"Fekri-Ershad Shervan","year":"2019","unstructured":"Shervan Fekri-Ershad (2019) Gender Classification in Human Face Images for Smart Phone Applications Based on Local Texture Information and Evaluated Kullback-Leibler Divergence. Traitement du Signal 36:507\u2013514","journal-title":"Traitement du Signal"},{"key":"10700_CR18","doi-asserted-by":"crossref","unstructured":"Jessica Fridrich, Jan Kodovsky (2012) \u201cRich Models for Steganalysis of Digital Images\u201d. In: IEEE Transactions on Information Forensics and Security 7.3, pp.868\u2013882","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"10700_CR19","doi-asserted-by":"crossref","unstructured":"Gao Yue et al (2021) \u201cHigh-fidelity and arbitrary face editing\u201d. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. pp.16115\u201316124","DOI":"10.1109\/CVPR46437.2021.01585"},{"key":"10700_CR20","doi-asserted-by":"crossref","unstructured":"Gu Qiqi et al (2022) \u201cExploiting fine-grained face forgery clues via progressive enhancement learning\u201d. In: Proceedings of the AAAI Conference on Artificial Intelligence. Vol.36(1), pp.735\u2013743","DOI":"10.1609\/aaai.v36i1.19954"},{"key":"10700_CR21","doi-asserted-by":"crossref","unstructured":"Guo Zhiqing et al (2023) \u201cRethinking gradient operator for exposing AI-enabled face forgeries\u201d. In: Expert Systems with Applications 215, p.119361. ISSN: 0957-4174","DOI":"10.1016\/j.eswa.2022.119361"},{"key":"10700_CR22","doi-asserted-by":"crossref","unstructured":"He Kaiming et al (2016) \u201cDeep residual learning for image recognition\u201d. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp.770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"10700_CR23","doi-asserted-by":"crossref","unstructured":"Huang Gao et al (2017) \u201cDensely connected convolutional networks\u201d. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp.4700\u20134708","DOI":"10.1109\/CVPR.2017.243"},{"key":"10700_CR24","doi-asserted-by":"crossref","unstructured":"Korshunova Iryna et al (2017) \u201cFast face-swap using convolutional neural networks\u201d. In: Proceedings of the IEEE international conference on computer vision. pp.3677\u20133685","DOI":"10.1109\/ICCV.2017.397"},{"key":"10700_CR25","unstructured":"Kowalski M (2018) Faceswap. https:\/\/github.com\/marekkowalski\/faceswap. Accessed: 2020-08-01"},{"key":"10700_CR26","doi-asserted-by":"crossref","unstructured":"Li Jiaming et al (2021) \u201cFrequency-aware discriminative feature learning supervised by single-center loss for face forgery detection\u201d. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. pp.6458\u20136467","DOI":"10.1109\/CVPR46437.2021.00639"},{"key":"10700_CR27","doi-asserted-by":"crossref","unstructured":"Li Lingzhi et al (2020) \u201cFace x-ray for more general face forgery detection\u201d. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. pp.5001\u20135010","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"10700_CR28","unstructured":"Li Lingzhi et al (2019) \u201cFaceshifter: Towards high fidelity and occlusion aware face swapping\u201d. In: arXiv preprint arXiv:1912.13457"},{"key":"10700_CR29","doi-asserted-by":"crossref","unstructured":"Li Yuezun, Chang Ming-Ching, Lyu Siwei (2018) \u201cIn Ictu Oculi: Exposing AI Created Fake Videos by Detecting Eye Blinking\u201d. In: 2018 IEEE International Workshop on Information Forensics and Security (WIFS). pp.1\u20137","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"10700_CR30","doi-asserted-by":"crossref","unstructured":"Li Yuezun et al (2020) \u201cCeleb-df: A large-scale challenging dataset for deepfake forensics\u201d. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. pp.3207\u20133216","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"10700_CR31","doi-asserted-by":"crossref","unstructured":"Liu Kunlin et al (2023) \u201cDeepfacelab: Integrated, flexible and extensible face-swapping framework\u201d. In: Pattern Recognition 141, p.109628","DOI":"10.1016\/j.patcog.2023.109628"},{"key":"10700_CR32","doi-asserted-by":"crossref","unstructured":"Liu Shuai et al (2022) \u201cMultiple Feature Mining Based on Local Correlation and Frequency Information for Face Forgery Detection\u201d. In: 2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI). pp.1347\u20131354","DOI":"10.1109\/ICTAI56018.2022.00204"},{"key":"10700_CR33","doi-asserted-by":"crossref","unstructured":"Luo Yuchen et al (2021) \u201cGeneralizing face forgery detection with high-frequency features\u201d. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. pp.16317\u201316326","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"10700_CR34","doi-asserted-by":"crossref","unstructured":"Masi Iacopo et al (2020) \u201cTwo-branch recurrent network for isolating deepfakes in videos\u201d. In: Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part VII 16. Springer. pp.667\u2013684","DOI":"10.1007\/978-3-030-58571-6_39"},{"key":"10700_CR35","doi-asserted-by":"crossref","unstructured":"Nguyen Huy H, Yamagishi Junichi, Echizen Isao (2019) \u201cCapsule-forensics: Using capsule networks to detect forged images and videos\u201d. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp.2307\u20132311","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"10700_CR36","doi-asserted-by":"crossref","unstructured":"Qian Yuyang et al (2020) \u201cThinking in frequency: Face forgery detection by mining frequency-aware clues\u201d. In: Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part XII. Springer. pp.86\u2013103","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"10700_CR37","doi-asserted-by":"crossref","unstructured":"Rossler Andreas et al (2019) \u201cFaceforensics++: Learning to detect manipulated facial images\u201d. In: Proceedings of the IEEE\/CVF international conference on computer vision. pp.1\u201311","DOI":"10.1109\/ICCV.2019.00009"},{"key":"10700_CR38","doi-asserted-by":"crossref","unstructured":"Selvaraju Ramprasaath R et al (2017) \u201cGrad-cam: Visual explanations from deep networks via gradient-based localization\u201d. In: Proceedings of the IEEE international conference on computer vision. pp.618\u2013626","DOI":"10.1109\/ICCV.2017.74"},{"key":"10700_CR39","doi-asserted-by":"crossref","unstructured":"Sun Ke et al (2019) \u201cDeep high-resolution representation learning for human pose estimation\u201d. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. pp.5693\u20135703","DOI":"10.1109\/CVPR.2019.00584"},{"key":"10700_CR40","doi-asserted-by":"crossref","unstructured":"Sun Ke et al (2022) \u201cDual contrastive learning for general face forgery detection\u201d. In: Proceedings of the AAAI Conference on Artificial Intelligence. Vol.36. 2, pp.2316\u20132324","DOI":"10.1609\/aaai.v36i2.20130"},{"key":"10700_CR41","unstructured":"Tan Mingxing, Le Quoc (2019) \u201cEfficientnet: Rethinking model scaling for convolutional neural networks\u201d. In: International conference on machine learning. PMLR. pp.6105\u20136114"},{"key":"10700_CR42","doi-asserted-by":"crossref","unstructured":"Thies Justus, Zollh\u00f6fer Michael, Nie &szlig;ner Matthias (2019) \u201cDeferred neural rendering: Image synthesis using neural textures\u201d. In: Acm Transactions on Graphics (TOG) 38.4, pp.1\u201312","DOI":"10.1145\/3306346.3323035"},{"key":"10700_CR43","doi-asserted-by":"crossref","unstructured":"Thies Justus et al (2016) \u201cFace2face: Real-time face capture and reenactment of rgb videos\u201d. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp.2387\u20132395","DOI":"10.1109\/CVPR.2016.262"},{"key":"10700_CR44","unstructured":"Tora M, (2018) Deepfakes. https:\/\/github.com\/deepfakes\/faceswap\/tree\/v2.0.0. Accessed: 2021-03-29"},{"key":"10700_CR45","doi-asserted-by":"crossref","unstructured":"Wang Chengrui, Deng Weihong (2021) \u201cRepresentative forgery mining for fake face detection\u201d. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. pp.14923\u201314932","DOI":"10.1109\/CVPR46437.2021.01468"},{"key":"10700_CR46","doi-asserted-by":"crossref","unstructured":"Wang Gaojian et al (2022) \u201cFFR_FD: Effective and fast detection of DeepFakes via feature point defects\u201d. In: Information Sciences 596, pp.472\u2013488. ISSN: 0020-0255","DOI":"10.1016\/j.ins.2022.03.026"},{"key":"10700_CR47","doi-asserted-by":"crossref","unstructured":"Wang Hong-Xia et al (2008) \u201cFacial image composition based on active appearance model\u201d. In: 2008 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE. , pp.893\u2013896","DOI":"10.1109\/ICASSP.2008.4517754"},{"key":"10700_CR48","doi-asserted-by":"crossref","unstructured":"Woo Sanghyun et al (2018) \u201cCbam: Convolutional block attention module\u201d. In: Proceedings of the European conference on computer vision (ECCV). pp.3\u201319","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"10700_CR49","doi-asserted-by":"crossref","unstructured":"Wu Nan et al (2022) \u201cMultisemantic Path Neural Network for Deepfake Detection\u201d. In: Security and Communication Networks (Oct.11, 2022). Ed. by Beijing Chen. Publisher: Hindawi, p.4976848. ISSN: 1939-0114","DOI":"10.1155\/2022\/4976848"},{"key":"10700_CR50","doi-asserted-by":"crossref","unstructured":"Chao Yang et al (2020) Constrained R-CNN: A general image manipulation detection model. In: 2020 IEEE International conference on multimedia and expo (ICME). IEEE. pp. 1\u20136","DOI":"10.1109\/ICME46284.2020.9102825"},{"key":"10700_CR51","doi-asserted-by":"crossref","first-page":"4234","DOI":"10.1109\/TIFS.2021.3102487","volume":"16","author":"Jiachen Yang","year":"2021","unstructured":"Yang Jiachen et al (2021) Mtd-net: learning to detect deepfakes images by multi-scale texture difference. IEEE Transactions on Information Forensics and Security 16:4234\u20134245","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10700_CR52","doi-asserted-by":"crossref","unstructured":"Yang Xin, Li Yuezun, Lyu Siwei (2019) \u201cExposing Deep Fakes Using Inconsistent Head Poses\u201d. In: ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). pp.8261\u20138265","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"10700_CR53","unstructured":"Yu Fisher, Koltun Vladlen (2015) \u201cMulti-Scale Context Aggregation by Dilated Convolutions\u201d. In: CoRR abs\/1511.07122"},{"key":"10700_CR54","doi-asserted-by":"crossref","unstructured":"Zhao Hanqing et al (2021) \u201cMulti-attentional deepfake detection\u201d. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. pp.2185\u20132194","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"10700_CR55","doi-asserted-by":"crossref","unstructured":"Zhu Xiangyu et al (2021) \u201cFace forgery detection by 3d decomposition\u201d. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. pp.2929\u20132939","DOI":"10.1109\/CVPR46437.2021.00295"},{"key":"10700_CR56","doi-asserted-by":"crossref","unstructured":"Zi Bojia et al (2020) \u201cWilddeepfake: A challenging real-world dataset for deepfake detection\u201d. In: Proceedings of the 28th ACM international conference on multimedia. pp.2382\u20132390","DOI":"10.1145\/3394171.3413769"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-10700-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-024-10700-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-10700-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T22:01:06Z","timestamp":1738792866000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-024-10700-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,29]]},"references-count":56,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["10700"],"URL":"https:\/\/doi.org\/10.1007\/s00521-024-10700-6","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2024,11,29]]},"assertion":[{"value":"19 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Data used are from publicly available datasets.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}]}}