{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T14:43:59Z","timestamp":1769265839759,"version":"3.49.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T00:00:00Z","timestamp":1734048000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T00:00:00Z","timestamp":1734048000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"National Key RD Program of China","award":["2021YFF0901002"],"award-info":[{"award-number":["2021YFF0901002"]}]},{"name":"Science and Technology Innovation Program of Hunan Province","award":["2022RC1038"],"award-info":[{"award-number":["2022RC1038"]}]},{"name":"Shenzhen Science and Technology Program","award":["JCYJ20210324141208020"],"award-info":[{"award-number":["JCYJ20210324141208020"]}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2023JJ40162"],"award-info":[{"award-number":["2023JJ40162"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology on Communication Information Security Control Laboratory","award":["2022-JCJQ-LB-053-04"],"award-info":[{"award-number":["2022-JCJQ-LB-053-04"]}]},{"DOI":"10.13039\/100014472","name":"Scientific Research Foundation of Hunan Provincial Education Department","doi-asserted-by":"crossref","award":["22A0592"],"award-info":[{"award-number":["22A0592"]}],"id":[{"id":"10.13039\/100014472","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Changsha Natural Science Foundation","award":["kq2202318"],"award-info":[{"award-number":["kq2202318"]}]},{"DOI":"10.13039\/100014718","name":"Innovative Research Group Project of the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2023JJ30102"],"award-info":[{"award-number":["2023JJ30102"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004761","name":"Provincial Natural Science Foundation of Hunan","doi-asserted-by":"crossref","award":["2023JJ30083"],"award-info":[{"award-number":["2023JJ30083"]}],"id":[{"id":"10.13039\/501100004761","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U23A20317"],"award-info":[{"award-number":["U23A20317"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Post graduate Scientific Research Innovation Project of Hunan Province","award":["QL20220097"],"award-info":[{"award-number":["QL20220097"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s00521-024-10798-8","type":"journal-article","created":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T04:13:50Z","timestamp":1734063230000},"page":"3399-3417","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A novel shilling attack on black-box recommendation systems for multiple targets"],"prefix":"10.1007","volume":"37","author":[{"given":"Shuangyu","family":"Liu","sequence":"first","affiliation":[]},{"given":"Siyang","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Huan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhibang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Mingxing","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Xiangke","family":"Liao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,13]]},"reference":[{"key":"10798_CR1","doi-asserted-by":"publisher","first-page":"105641","DOI":"10.1016\/j.engappai.2022.105641","volume":"118","author":"R Sharma","year":"2023","unstructured":"Sharma R, Gopalani D, Meena Y (2023) An anatomization of research paper recommender system: overview, approaches and challenges. Eng Appl Artif Intell 118:105641","journal-title":"Eng Appl Artif Intell"},{"key":"10798_CR2","unstructured":"O\u2019Mahony MP, Hurley NJ, Silvestre GC (2005) Recommender systems: attack types and strategies. In: AAAI, pp. 334\u2013339"},{"key":"10798_CR3","volume-title":"Adversarial recommender systems: attack, defense, and advances","author":"VW Anelli","year":"2022","unstructured":"Anelli VW, Deldjoo Y, Dinoia T, Merra FA (2022) Adversarial recommender systems: attack, defense, and advances. Springer, New York"},{"key":"10798_CR4","unstructured":"Burke R, Mobasher B, Bhaumik R (2005) Limited knowledge shilling attacks in collaborative filtering systems. In: proceedings of 3rd international workshop on intelligent techniques for web personalization (ITWP 2005), 19th international joint conference on artificial intelligence (IJCAI 2005), pp. 17\u201324"},{"issue":"3","key":"10798_CR5","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MIS.2007.44","volume":"22","author":"NJ Hurley","year":"2007","unstructured":"Hurley NJ, O\u2019Mahony MP, Silvestre GC (2007) Attacking recommender systems: a cost-benefit analysis. IEEE Intell Syst 22(3):64\u201368","journal-title":"IEEE Intell Syst"},{"issue":"1","key":"10798_CR6","doi-asserted-by":"publisher","first-page":"1305","DOI":"10.1109\/TNNLS.2022.3183210","volume":"35","author":"C Lin","year":"2022","unstructured":"Lin C, Chen S, Zeng M, Zhang S, Gao M, Li H (2022) Shilling black-box recommender systems by learning to generate fake user profiles. IEEE Trans Neural Netw Learn Syst 35(1):1305","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"11","key":"10798_CR7","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2020) Generative adversarial networks. Commun ACM 63(11):139\u2013144","journal-title":"Commun ACM"},{"issue":"1","key":"10798_CR8","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s10462-018-9655-x","volume":"53","author":"M Si","year":"2020","unstructured":"Si M, Li Q (2020) Shilling attacks against collaborative recommender systems: a review. Artif Intell Rev 53(1):291\u2013319","journal-title":"Artif Intell Rev"},{"issue":"1","key":"10798_CR9","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MIC.2003.1167344","volume":"7","author":"G Linden","year":"2003","unstructured":"Linden G, Smith B, York J (2003) Amazon com. recommendations: item-to-item collaborative filtering. IEEE Internet Comput 7(1):76\u201380","journal-title":"IEEE Internet Comput"},{"key":"10798_CR10","doi-asserted-by":"crossref","unstructured":"Wang H, Shen Z, Jiang S, Sun G, Zhang R-J (2021) User-based collaborative filtering algorithm design and implementation. In: Journal of Physics: Conference Series, vol. 1757, p. 012168. IOP Publishing","DOI":"10.1088\/1742-6596\/1757\/1\/012168"},{"key":"10798_CR11","doi-asserted-by":"crossref","unstructured":"Astri R, Kamal A, Sura SB (2022) Coffee shop recommendation system using an item-based collaborative filtering approach. In: 2022 international symposium on information technology and digital innovation (ISITDI), pp. 65\u201367. IEEE","DOI":"10.1109\/ISITDI55734.2022.9944403"},{"key":"10798_CR12","first-page":"1","volume-title":"Collaborative filtering","author":"A Althbiti","year":"2019","unstructured":"Althbiti A, Ma X (2019) In: Schintler LA, McNeely CL (eds) Collaborative filtering. Springer, Cham, pp. 1\u20134"},{"issue":"1","key":"10798_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10115-021-01628-7","volume":"64","author":"H Papadakis","year":"2022","unstructured":"Papadakis H, Papagrigoriou A, Panagiotakis C, Kosmas E, Fragopoulou P (2022) Collaborative filtering recommender systems taxonomy. Knowl Inf Syst 64(1):1\u201340","journal-title":"Knowl Inf Syst"},{"key":"10798_CR14","unstructured":"Lu J (2022) Matrix decomposition and applications. arXiv preprint arXiv:2201.00145"},{"key":"10798_CR15","doi-asserted-by":"crossref","unstructured":"Rendle S (2010) Factorization machines. In: 2010 IEEE international conference on data mining, pp. 995\u20131000. IEEE","DOI":"10.1109\/ICDM.2010.127"},{"key":"10798_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06493-7","author":"J Bobadilla","year":"2022","unstructured":"Bobadilla J, Gutierrez A, Alonso S, Gonzalez-Prieto A (2022) Neural collaborative filtering classification model to obtain prediction reliabilities. Neural Comput Appl. https:\/\/doi.org\/10.1007\/s00521-021-06493-7","journal-title":"Neural Comput Appl"},{"key":"10798_CR17","doi-asserted-by":"crossref","unstructured":"Sun P, Wu L, Wang M (2018) Attentive recurrent social recommendation. In: the 41st international ACM SIGIR conference on research & development in information retrieval, pp. 185\u2013194","DOI":"10.1145\/3209978.3210023"},{"key":"10798_CR18","doi-asserted-by":"crossref","unstructured":"Yusuf AA, Chong F, Xianling M (2022) An analysis of graph convolutional networks and recent datasets for visual question answering. Artificial Intelligence Review, pp. 1\u201324","DOI":"10.1007\/s10462-022-10151-2"},{"key":"10798_CR19","doi-asserted-by":"publisher","DOI":"10.1145\/3385414","author":"C Chen","year":"2020","unstructured":"Chen C, Li K, Teo SG, Zou X, Li K, Zeng Z (2020) Citywide traffic flow prediction based on multiple gated spatio-temporal convolutional neural networks. ACM Trans Knowl Discov Data. https:\/\/doi.org\/10.1145\/3385414","journal-title":"ACM Trans Knowl Discov Data"},{"key":"10798_CR20","doi-asserted-by":"crossref","unstructured":"Sedhain S, Menon AK, Sanner S, Xie L (2015) Autorec: Autoencoders meet collaborative filtering. In: proceedings of the 24th international conference on world wide web, pp. 111\u2013112","DOI":"10.1145\/2740908.2742726"},{"key":"10798_CR21","doi-asserted-by":"crossref","unstructured":"Cheng J, Dong L, Lapata M (2016) Long short-term memory-networks for machine reading. arXiv preprint arXiv:1601.06733","DOI":"10.18653\/v1\/D16-1053"},{"issue":"4","key":"10798_CR22","doi-asserted-by":"publisher","first-page":"3097","DOI":"10.1007\/s00521-021-06573-8","volume":"34","author":"Z-W Wu","year":"2022","unstructured":"Wu Z-W, Chen C-T, Huang S-H (2022) Poisoning attacks against knowledge graph-based recommendation systems using deep reinforcement learning. Neural Comput Appl 34(4):3097\u20133115. https:\/\/doi.org\/10.1007\/s00521-021-06573-8","journal-title":"Neural Comput Appl"},{"issue":"1","key":"10798_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3158369","volume":"52","author":"S Zhang","year":"2019","unstructured":"Zhang S, Yao L, Sun A, Tay Y (2019) Deep learning based recommender system: a survey and new perspectives. ACM Comput Surv (CSUR) 52(1):1\u201338","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"1","key":"10798_CR24","doi-asserted-by":"publisher","first-page":"102763","DOI":"10.1016\/j.ipm.2021.102763","volume":"59","author":"Z Nana","year":"2022","unstructured":"Nana Z, Xiujian W, Zhongqiu Z (2022) Game theory analysis on credit risk assessment in e-commerce. Inf Process Manag 59(1):102763","journal-title":"Inf Process Manag"},{"key":"10798_CR25","doi-asserted-by":"publisher","first-page":"2701","DOI":"10.1109\/TMM.2021.3088307","volume":"24","author":"Y Wei","year":"2021","unstructured":"Wei Y, Wang X, He X, Nie L, Rui Y, Chua T-S (2021) Hierarchical user intent graph network for multimedia recommendation. IEEE Trans Multimed 24:2701","journal-title":"IEEE Trans Multimed"},{"issue":"13","key":"10798_CR26","doi-asserted-by":"publisher","first-page":"6569","DOI":"10.3390\/app12136569","volume":"12","author":"H Gao","year":"2022","unstructured":"Gao H, Zhang Y, Lv W, Yin J, Qasim T, Wang D (2022) A deep convolutional generative adversarial networks-based method for defect detection in small sample industrial parts images. Appl Sci 12(13):6569","journal-title":"Appl Sci"},{"issue":"2","key":"10798_CR27","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s11760-020-01749-6","volume":"15","author":"D Gupta","year":"2021","unstructured":"Gupta D, Jain S, Tripathi U, Chattopadhyay P, Wang L (2021) A robust and efficient image de-fencing approach using conditional generative adversarial networks. Signal Image Video Process 15(2):297\u2013305","journal-title":"Signal Image Video Process"},{"key":"10798_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2023.3239229","author":"Z Wang","year":"2023","unstructured":"Wang Z, Xu X, Wang G, Yang Y, Shen HT (2023) Quaternion relation embedding for scene graph generation. IEEE Trans Multimed. https:\/\/doi.org\/10.1109\/TMM.2023.3239229","journal-title":"IEEE Trans Multimed"},{"issue":"3","key":"10798_CR29","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1049\/bme2.12069","volume":"11","author":"F Taherkhani","year":"2022","unstructured":"Taherkhani F, Talreja V, Dawson J, Valenti MC, Nasrabadi NM (2022) Profile to frontal face recognition in the wild using coupled conditional generative adversarial network. IET Biom 11(3):260\u2013276","journal-title":"IET Biom"},{"key":"10798_CR30","unstructured":"Arjovsky M, Chintala S, Bottou L (2017) Wasserstein generative adversarial networks. In: international conference on machine learning, pp. 214\u2013223. PMLR"},{"key":"10798_CR31","doi-asserted-by":"crossref","unstructured":"Xiao C, Li B, Zhu J-Y, He W, Liu M, Song D (2018) Generating adversarial examples with adversarial networks. arXiv preprint arXiv:1801.02610","DOI":"10.24963\/ijcai.2018\/543"},{"key":"10798_CR32","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3274142","author":"M Duan","year":"2023","unstructured":"Duan M, Qin Y, Deng J, Li K, Xiao B (2023) Dual attention adversarial attacks with limited perturbations. IEEE Trans Neural Netw Learn Syst. https:\/\/doi.org\/10.1109\/TNNLS.2023.3274142","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"4","key":"10798_CR33","doi-asserted-by":"publisher","first-page":"1725","DOI":"10.1007\/s11280-022-01058-7","volume":"25","author":"Z Wang","year":"2022","unstructured":"Wang Z, Yang Y, Li J, Zhu X (2022) Universal adversarial perturbations generative network. World Wide Web 25(4):1725\u20131746. https:\/\/doi.org\/10.1007\/s11280-022-01058-7","journal-title":"World Wide Web"},{"issue":"4","key":"10798_CR34","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1007\/s10462-012-9364-9","volume":"42","author":"I Gunes","year":"2014","unstructured":"Gunes I, Kaleli C, Bilge A, Polat H (2014) Shilling attacks against recommender systems: a comprehensive survey. Artif Intell Rev 42(4):767\u2013799","journal-title":"Artif Intell Rev"},{"key":"10798_CR35","unstructured":"Burke R, Mobasher B, Zabicki R, Bhaumik R (2005) Identifying attack models for secure recommendation. In: beyond personalization: a workshop on the next generation of recommender systems, pp. 347\u2013361"},{"key":"10798_CR36","doi-asserted-by":"crossref","unstructured":"Lam SK, Riedl J (2004) Shilling recommender systems for fun and profit. In: proceedings of the 13th international conference on world wide web, pp. 393\u2013402","DOI":"10.1145\/988672.988726"},{"issue":"4","key":"10798_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3506852","volume":"18","author":"M Duan","year":"2022","unstructured":"Duan M, Li K, Deng J, Xiao B, Tian Q (2022) A novel multi-sample generation method for adversarial attacks. ACM Trans Multimed Comput Commun Appl (TOMM) 18(4):1\u201321","journal-title":"ACM Trans Multimed Comput Commun Appl (TOMM)"},{"key":"10798_CR38","doi-asserted-by":"crossref","unstructured":"Mingxing D, Li K, Xie L, Tian Q, Xiao B (2021) Towards multiple black-boxes attack via adversarial example generation network. In: proceedings of the 29th ACM international conference on multimedia, pp. 264\u2013272","DOI":"10.1145\/3474085.3475542"},{"issue":"3","key":"10798_CR39","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/2.485891","volume":"29","author":"AK Jain","year":"1996","unstructured":"Jain AK, Mao J, Mohiuddin KM (1996) Artificial neural networks: a tutorial. Computer 29(3):31\u201344","journal-title":"Computer"},{"issue":"4","key":"10798_CR40","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1016\/S0893-6080(05)80038-3","volume":"5","author":"MT Musavi","year":"1992","unstructured":"Musavi MT, Ahmed W, Chan KH, Faris KB, Hummels DM (1992) On the training of radial basis function classifiers. Neural Netw 5(4):595\u2013603","journal-title":"Neural Netw"},{"key":"10798_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2022.123712","volume":"249","author":"R Cisneros-Maga\u00f1a","year":"2022","unstructured":"Cisneros-Maga\u00f1a R, Medina-Rios A, Fuerte-Esquivel CR, Segundo-Ram\u00edrez J (2022) Harmonic state estimation based on discrete exponential expansion, singular value decomposition and a variable measurement model. Energy 249:123712","journal-title":"Energy"},{"key":"10798_CR42","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.neucom.2021.08.152","volume":"491","author":"W-S Chen","year":"2022","unstructured":"Chen W-S, Zeng Q, Pan B (2022) A survey of deep nonnegative matrix factorization. Neurocomputing 491:305\u2013320","journal-title":"Neurocomputing"},{"key":"10798_CR43","first-page":"1","volume":"79","author":"VR Yannam","year":"2022","unstructured":"Yannam VR, Kumar J, Babu KS, Patra BK (2022) Enhancing the accuracy of group recommendation using slope one. J Supercomput 79:1\u201342","journal-title":"J Supercomput"},{"issue":"9","key":"10798_CR44","doi-asserted-by":"publisher","first-page":"835","DOI":"10.2174\/1574893617666220609114052","volume":"17","author":"H Liu","year":"2022","unstructured":"Liu H, Yu J, Chen X, Zhang L (2022) Neumf: Predicting anti-cancer drug response through a neural matrix factorization model. Curr Bioinform 17(9):835\u2013847","journal-title":"Curr Bioinform"},{"key":"10798_CR45","unstructured":"Zhang Y, Tan Y, Zhang M, Liu Y, Chua T-S, Ma S (2015) Catch the black sheep: unified framework for shilling attack detection based on fraudulent action propagation. In: twenty-fourth international joint conference on artificial intelligence"},{"issue":"1","key":"10798_CR46","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/TCC.2017.2701793","volume":"9","author":"C Liu","year":"2021","unstructured":"Liu C, Li K, Li K, Buyya R (2021) A new service mechanism for profit optimizations of a cloud provider and its users. IEEE Trans Cloud Comput 9(1):14\u201326. https:\/\/doi.org\/10.1109\/TCC.2017.2701793","journal-title":"IEEE Trans Cloud Comput"},{"issue":"1","key":"10798_CR47","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPDS.2019.2907537","volume":"32","author":"G Xiao","year":"2021","unstructured":"Xiao G, Li K, Chen Y, He W, Zomaya AY, Li T (2021) Caspmv: A customized and accelerative spmv framework for the sunway taihulight. IEEE Trans Parallel Distrib Syst 32(1):131\u2013146. https:\/\/doi.org\/10.1109\/TPDS.2019.2907537","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"2","key":"10798_CR48","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1109\/TPDS.2022.3221821","volume":"34","author":"T Weng","year":"2023","unstructured":"Weng T, Zhou X, Li K, Tan K-L, Li K (2023) Distributed approaches to butterfly analysis on large dynamic bipartite graphs. IEEE Trans Parallel Distrib Syst 34(2):431\u2013445. https:\/\/doi.org\/10.1109\/TPDS.2022.3221821","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"10798_CR49","first-page":"2979","volume":"33","author":"K Zhong","year":"2021","unstructured":"Zhong K, Yang Z, Xiao G, Li X, Yang W, Li K (2021) An efficient parallel reinforcement learning approach to cross-layer defense mechanism in industrial control systems. IEEE Trans Parallel Distrib Syst 33:2979","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"11","key":"10798_CR50","doi-asserted-by":"publisher","first-page":"2867","DOI":"10.1109\/TPDS.2013.270","volume":"25","author":"K Li","year":"2014","unstructured":"Li K, Tang X, Li K (2014) Energy-efficient stochastic task scheduling on heterogeneous computing systems. IEEE Trans Parallel Distrib Syst 25(11):2867\u20132876. https:\/\/doi.org\/10.1109\/TPDS.2013.270","journal-title":"IEEE Trans Parallel Distrib Syst"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-10798-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-024-10798-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-10798-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T09:02:11Z","timestamp":1738918931000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-024-10798-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,13]]},"references-count":50,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["10798"],"URL":"https:\/\/doi.org\/10.1007\/s00521-024-10798-8","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,13]]},"assertion":[{"value":"21 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}