{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T17:26:27Z","timestamp":1769275587677,"version":"3.49.0"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T00:00:00Z","timestamp":1665964800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T00:00:00Z","timestamp":1665964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Beijing Natural Science Foundation, China","award":["4202002"],"award-info":[{"award-number":["4202002"]}]},{"name":"Beijing Natural Science Foundation, China","award":["4202002"],"award-info":[{"award-number":["4202002"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s00530-022-00997-5","type":"journal-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T04:02:33Z","timestamp":1665979353000},"page":"653-668","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["User authentication method based on keystroke dynamics and mouse dynamics using HDA"],"prefix":"10.1007","volume":"29","author":[{"given":"Yutong","family":"Shi","sequence":"first","affiliation":[]},{"given":"Xiujuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kangfeng","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Siwei","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,17]]},"reference":[{"key":"997_CR1","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MSECP.2003.1203221","volume":"1","author":"V Matyas","year":"2003","unstructured":"Matyas, V., Riha, Z.: Toward reliable user authentication through biometrics. IEEE Secur. Priv. 1, 45\u201349 (2003). https:\/\/doi.org\/10.1109\/MSECP.2003.1203221","journal-title":"IEEE Secur. Priv."},{"key":"997_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2013\/408280","volume":"2013","author":"PS Teh","year":"2013","unstructured":"Teh, P.S., Teoh, A.B.J., Yue, S.: A survey of keystroke dynamics biometrics. Sci. World J. 2013, 1\u201324 (2013). https:\/\/doi.org\/10.1155\/2013\/408280","journal-title":"Sci. World J."},{"key":"997_CR3","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1109\/THMS.2014.2302371","volume":"44","author":"Z Cai","year":"2014","unstructured":"Cai, Z., Shen, C., Guan, X.: Mitigating behavioral variability for mouse dynamics: a dimensionality-reduction-based approach. IEEE Trans. Human-Mach. Syst. 44, 244\u2013255 (2014). https:\/\/doi.org\/10.1109\/THMS.2014.2302371","journal-title":"IEEE Trans. Human-Mach. Syst."},{"key":"997_CR4","doi-asserted-by":"crossref","unstructured":"\u00c7eker, H., Upadhyaya, S.: User authentication with keystroke dynamics in long-text data. In: 2016 IEEE 8th international conference on biometrics theory, applications and systems (BTAS), pp 1\u20136, (2016)","DOI":"10.1109\/BTAS.2016.7791182"},{"key":"997_CR5","doi-asserted-by":"publisher","first-page":"1024","DOI":"10.1016\/j.asoc.2017.11.018","volume":"70","author":"A Alsultan","year":"2018","unstructured":"Alsultan, A., Warwick, K., Wei, H.: Improving the performance of free-text keystroke dynamics authentication by fusion. Appl. Soft Comput. 70, 1024\u20131033 (2018). https:\/\/doi.org\/10.1016\/j.asoc.2017.11.018","journal-title":"Appl. Soft Comput."},{"key":"997_CR6","first-page":"1","volume-title":"IEEE international conference on identity, security and behavior analysis (ISBA 2015)","author":"J Huang","year":"2015","unstructured":"Huang, J., Hou, D., Schuckers, S., Hou, Z.: Effect of data size on performance of free-text keystroke authentication. In: IEEE international conference on identity, security and behavior analysis (ISBA 2015), pp. 1\u20137. IEEE, Hong Kong (2015)"},{"key":"997_CR7","doi-asserted-by":"crossref","unstructured":"\u00c7eker, H., Upadhyaya, S., (2017) Sensitivity analysis in keystroke dynamics using convolutional neural networks. In: 2017 IEEE workshop on information forensics and security (WIFS). pp 1\u20136","DOI":"10.1109\/WIFS.2017.8267667"},{"key":"997_CR8","doi-asserted-by":"publisher","first-page":"5369","DOI":"10.14704\/WEB\/V19I1\/WEB19360","volume":"19","author":"A Tewari","year":"2022","unstructured":"Tewari, A., Verma, P.: An improved user identification based on keystroke-dynamics and transfer learning. WEB 19, 5369\u20135387 (2022). https:\/\/doi.org\/10.14704\/WEB\/V19I1\/WEB19360","journal-title":"WEB"},{"key":"997_CR9","doi-asserted-by":"crossref","unstructured":"Gamboa, H., Fred, A.: A behavioral biometric system based on human-computer interaction. In: Jain, A.K., Ratha, N.K. (eds.) Biometric technology for human identification, Orlando, FL, pp. 381\u2013392 (2004)","DOI":"10.1117\/12.542625"},{"key":"997_CR10","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/TDSC.2007.70207","volume":"4","author":"AAE Ahmed","year":"2007","unstructured":"Ahmed, A.A.E., Traore, I.: A new biometric technology based on mouse dynamics. IEEE Trans. Dependable Secur. Comput. 4, 165\u2013179 (2007). https:\/\/doi.org\/10.1109\/TDSC.2007.70207","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"997_CR11","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s10044-016-0568-5","volume":"21","author":"P Kasprowski","year":"2018","unstructured":"Kasprowski, P., Harezlak, K.: Fusion of eye movement and mouse dynamics for reliable behavioral biometrics. Pattern Anal. Applic. 21, 91\u2013103 (2018). https:\/\/doi.org\/10.1007\/s10044-016-0568-5","journal-title":"Pattern Anal. Applic."},{"key":"997_CR12","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TIFS.2019.2930429","volume":"15","author":"P Chong","year":"2020","unstructured":"Chong, P., Elovici, Y., Binder, A.: User authentication based on mouse dynamics using deep neural networks: a comprehensive study. IEEE Trans. Inform. Forensic Secur. 15, 1086\u20131101 (2020). https:\/\/doi.org\/10.1109\/TIFS.2019.2930429","journal-title":"IEEE Trans. Inform. Forensic Secur."},{"key":"997_CR13","doi-asserted-by":"crossref","unstructured":"Mondal, S., Bours, P.: Combining keystroke and mouse dynamics for continuous user authentication and identification. In: 2016 IEEE international conference on identity, security and behavior analysis (ISBA), pp 1\u20138, IEEE, Sendai, (2016)","DOI":"10.1109\/ISBA.2016.7477228"},{"key":"997_CR14","doi-asserted-by":"publisher","unstructured":"An examination of user behavior for user re-authentication. In: Guide books. https:\/\/dl.acm.org\/doi\/abs\/https:\/\/doi.org\/10.5555\/1368529. Accessed 6 June 2022","DOI":"10.5555\/1368529"},{"key":"997_CR15","unstructured":"Peterson KOB and JSO and GL User identification and authentication using multi-modal behavioral biometrics | EndNote Click. https:\/\/click.endnote.com\/viewer?doi=10.1016%2Fj.cose.2014.03.005&token=WzI4MTA5MDUsIjEwLjEwMTYvai5jb3NlLjIwMTQuMDMuMDA1Il0.5i_tWpM2Ucag7vA5yMnIayfc9UU. Accessed 15 May 2022"},{"key":"997_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.11.031","author":"S Mondal","year":"2016","unstructured":"Mondal, S., Bours, P.: A study on continuous authentication using a combination of keystroke and mouse biometrics. Neurocomputing (2016). https:\/\/doi.org\/10.1016\/j.neucom.2016.11.031","journal-title":"Neurocomputing"},{"key":"997_CR17","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1109\/TCE.2006.1706507","volume":"52","author":"H Lv","year":"2006","unstructured":"Lv, H., Wang, W.-Y.: Biologic verification based on pressure sensor keyboards and classifier fusion techniques. IEEE Trans. Consumer Electron. 52, 1057\u20131063 (2006). https:\/\/doi.org\/10.1109\/TCE.2006.1706507","journal-title":"IEEE Trans. Consumer Electron."},{"key":"997_CR18","doi-asserted-by":"publisher","first-page":"94625","DOI":"10.1109\/ACCESS.2021.3092840","volume":"9","author":"A Rahman","year":"2021","unstructured":"Rahman, A., Chowdhury, M.E.H., Khandakar, A., et al.: Multimodal EEG and keystroke dynamics based biometric system using machine learning algorithms. IEEE Access 9, 94625\u201394643 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3092840","journal-title":"IEEE Access"},{"key":"997_CR19","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-981-10-3409-1_13","volume-title":"Advanced computing and systems for security","author":"P Panasiuk","year":"2017","unstructured":"Panasiuk, P., D\u0105browski, M., Saeed, K.: Keystroke dynamics and face image fusion as a method of identification accuracy improvement. In: Chaki, R., Saeed, K., Cortesi, A., Chaki, N. (eds.) Advanced computing and systems for security, pp. 187\u2013196. Springer Singapore, Singapore (2017)"},{"key":"997_CR20","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-319-59105-6_13","volume-title":"computer information systems and industrial management","author":"TE Weso\u0142owski","year":"2017","unstructured":"Weso\u0142owski, T.E., Doroz, R., Wrobel, K., Safaverdi, H.: Keystroke dynamics and finger knuckle imaging fusion for continuous user verification. In: Saeed, K., Homenda, W., Chaki, R. (eds.) computer information systems and industrial management, pp. 141\u2013152. Springer International Publishing, Cham (2017)"},{"key":"997_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.12.003","author":"M Singh","year":"2019","unstructured":"Singh, M., Singh, R., Ross, A.: A comprehensive overview of biometric fusion. Inform. Fusion (2019). https:\/\/doi.org\/10.1016\/j.inffus.2018.12.003","journal-title":"Inform. Fusion"},{"key":"997_CR22","doi-asserted-by":"publisher","first-page":"5588","DOI":"10.1109\/TNNLS.2020.2973293","volume":"31","author":"F Liu","year":"2020","unstructured":"Liu, F., Zhang, G., Lu, J.: Heterogeneous domain adaptation: an unsupervised approach. IEEE Trans Neural Netw Learning Syst 31, 5588\u20135602 (2020). https:\/\/doi.org\/10.1109\/TNNLS.2020.2973293","journal-title":"IEEE Trans Neural Netw Learning Syst"},{"key":"997_CR23","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-030-15887-3_2","volume-title":"Handbook of multimedia information security: techniques and applications","author":"M Sharif","year":"2019","unstructured":"Sharif, M., Raza, M., Shah, J.H., et al.: An overview of biometrics methods. In: Singh, A.K., Mohan, A. (eds.) Handbook of multimedia information security: techniques and applications, pp. 15\u201335. Springer International Publishing, Cham (2019)"},{"key":"997_CR24","doi-asserted-by":"crossref","unstructured":"Dharavath, K., Talukdar, F.A., Laskar, R.H.: Study on biometric authentication systems, challenges and future trends: A review. In: 2013 IEEE international conference on computational intelligence and computing research, pp 1\u20137, IEEE, Enathi, Tamilnadu, India, (2013)","DOI":"10.1109\/ICCIC.2013.6724278"},{"key":"997_CR25","doi-asserted-by":"publisher","DOI":"10.1145\/3533705","author":"J Jeong","year":"2022","unstructured":"Jeong, J., Zolotavkin, Y., Doss, R.: Examining the current status and emerging trends in continuous authentication technologies through citation network analysis. ACM Comput. Surv. (2022). https:\/\/doi.org\/10.1145\/3533705","journal-title":"ACM Comput. Surv."},{"key":"997_CR26","volume-title":"Authentication by keystroke timing: some preliminary results","author":"RS Gaines","year":"1980","unstructured":"Gaines, R.S., Lisowski, W., Press, S.J., Shapiro, N.: Authentication by keystroke timing: some preliminary results. RAND Corporation (1980)"},{"key":"997_CR27","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/s13173-013-0117-7","volume":"19","author":"PH Pisani","year":"2013","unstructured":"Pisani, P.H., Lorena, A.C.: A systematic review on keystroke dynamics. J Braz Comput Soc 19, 573\u2013587 (2013). https:\/\/doi.org\/10.1007\/s13173-013-0117-7","journal-title":"J Braz Comput Soc"},{"key":"997_CR28","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/75577.75582","volume":"33","author":"R Joyce","year":"1990","unstructured":"Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Commun ACM 33, 168\u2013176 (1990). https:\/\/doi.org\/10.1145\/75577.75582","journal-title":"Commun ACM"},{"key":"997_CR29","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/TBIOM.2020.3003988","volume":"2","author":"B Ayotte","year":"2020","unstructured":"Ayotte, B., Banavar, M., Hou, D., Schuckers, S.: Fast free-text authentication via instance-based keystroke dynamics. IEEE Trans Biom Behav Identity Sci 2, 377\u2013387 (2020). https:\/\/doi.org\/10.1109\/TBIOM.2020.3003988","journal-title":"IEEE Trans Biom Behav Identity Sci"},{"key":"997_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101861","volume":"96","author":"X Lu","year":"2020","unstructured":"Lu, X., Zhang, S., Hui, P., Lio, P.: Continuous authentication by free-text keystroke based on CNN and RNN. Comput. Secur. 96, 101861 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.101861","journal-title":"Comput. Secur."},{"key":"997_CR31","doi-asserted-by":"publisher","first-page":"1166","DOI":"10.1109\/TPAMI.2003.1227991","volume":"25","author":"RAJ Everitt","year":"2003","unstructured":"Everitt, R.A.J., McOwan, P.W.: Java-based internet biometric authentication system. IEEE Trans. Pattern Anal. Mach. Intell. 25, 1166\u20131172 (2003). https:\/\/doi.org\/10.1109\/TPAMI.2003.1227991","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"997_CR32","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TIFS.2012.2223677","volume":"8","author":"C Shen","year":"2013","unstructured":"Shen, C., Cai, Z., Guan, X., et al.: User authentication through mouse dynamics. IEEE Trans. Inform. Forensic Secur. 8, 16\u201330 (2013). https:\/\/doi.org\/10.1109\/TIFS.2012.2223677","journal-title":"IEEE Trans. Inform. Forensic Secur."},{"key":"997_CR33","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.cose.2014.05.002","volume":"45","author":"C Shen","year":"2014","unstructured":"Shen, C., Cai, Z., Guan, X., Maxion, R.: Performance evaluation of anomaly-detection algorithms for mouse dynamics. Comput. Secur. 45, 156\u2013171 (2014). https:\/\/doi.org\/10.1016\/j.cose.2014.05.002","journal-title":"Comput. Secur."},{"key":"997_CR34","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.ins.2012.02.066","volume":"201","author":"C Feher","year":"2012","unstructured":"Feher, C., Elovici, Y., Moskovitch, R., et al.: User identity verification via mouse dynamics. Inf. Sci. 201, 19\u201336 (2012). https:\/\/doi.org\/10.1016\/j.ins.2012.02.066","journal-title":"Inf. Sci."},{"key":"997_CR35","doi-asserted-by":"crossref","unstructured":"Shen, C., Cai, Z., Guan, X.: Continuous authentication for mouse dynamics: a pattern-growth approach. In: IEEE\/IFIP international conference on dependable systems and networks (DSN 2012), pp 1\u201312, IEEE, Boston, MA, USA, (2012)","DOI":"10.1109\/DSN.2012.6263955"},{"key":"997_CR36","unstructured":"Ahmed, A.A.E, Traore, I.: Anomaly intrusion detection based on biometrics. In: Proceedings from the sixth annual IEEE systems, man and cybernetics (SMC) information assurance workshop, 2005, pp 452\u2013453, IEEE, West Point, NY, USA, (2005)"},{"key":"997_CR37","doi-asserted-by":"crossref","unstructured":"Traore, I., Woungang, I., Obaidat, M.S., et al.: Combining mouse and keystroke dynamics biometrics for risk-based authentication in web environments. In: 2012 fourth international conference on digital home, pp 138\u2013145, (2012)","DOI":"10.1109\/ICDH.2012.59"},{"key":"997_CR38","doi-asserted-by":"crossref","unstructured":"Shimshon, T., Moskovitch, R., Rokach, L., Elovici, Y.: Clustering di-graphs for continuously verifying users according to their typing patterns. In: 2010 IEEE 26-th convention of electrical and electronics engineers in Israel, pp 000445\u2013000449, (2010)","DOI":"10.1109\/EEEI.2010.5662182"},{"key":"997_CR39","doi-asserted-by":"crossref","unstructured":"Gretton, A., Borgwardt, K.M., Rasch, M., et al.: A Kernel method for the two-sample-problem, 8, (2006)","DOI":"10.7551\/mitpress\/7503.003.0069"},{"key":"997_CR40","doi-asserted-by":"publisher","first-page":"988","DOI":"10.1109\/72.788640","volume":"10","author":"VN Vapnik","year":"1999","unstructured":"Vapnik, V.N.: An overview of statistical learning theory. IEEE Trans. Neural Netw. 10, 988\u2013999 (1999). https:\/\/doi.org\/10.1109\/72.788640","journal-title":"IEEE Trans. Neural Netw."},{"key":"997_CR41","doi-asserted-by":"publisher","first-page":"39154","DOI":"10.1109\/ACCESS.2018.2854966","volume":"6","author":"S Salmeron-Majadas","year":"2018","unstructured":"Salmeron-Majadas, S., Baker, R.S., Santos, O.C., Boticario, J.G.: A Machine learning approach to leverage individual keyboard and mouse interaction behavior from multiple users in real-world learning scenarios. IEEE Access 6, 39154\u201339179 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2854966","journal-title":"IEEE Access"},{"key":"997_CR42","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization, (2017)"},{"key":"997_CR43","doi-asserted-by":"crossref","unstructured":"Giot, R., Rocha, A.: Siamese networks for static keystroke dynamics authentication. In: 2019 IEEE international workshop on information forensics and security (WIFS), pp 1\u20136, IEEE, Delft, Netherlands, (2019)","DOI":"10.1109\/WIFS47025.2019.9035100"},{"key":"997_CR44","doi-asserted-by":"crossref","unstructured":"Yao, Y., Zhang, Y., Li, X., Ye, Y.: Heterogeneous domain adaptation via soft transfer network. In: Proceedings of the 27th ACM international conference on multimedia, pp 1578\u20131586, ACM, Nice France, (2019)","DOI":"10.1145\/3343031.3350955"},{"key":"997_CR45","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1186\/s40537-017-0089-0","volume":"4","author":"O Day","year":"2017","unstructured":"Day, O., Khoshgoftaar, T.M.: A survey on heterogeneous transfer learning. J. Big Data 4, 29 (2017). https:\/\/doi.org\/10.1186\/s40537-017-0089-0","journal-title":"J. Big Data"},{"key":"997_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/9282380","volume":"2020","author":"X Wang","year":"2020","unstructured":"Wang, X., Zheng, Q., Zheng, K., Wu, T.: User authentication method based on MKL for keystroke and mouse behavioral feature fusion. Secur. Commun. Netw. 2020, 1\u201314 (2020). https:\/\/doi.org\/10.1155\/2020\/9282380","journal-title":"Secur. Commun. Netw."},{"key":"997_CR47","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1016\/j.procs.2013.05.111","volume":"17","author":"X Chen","year":"2013","unstructured":"Chen, X., Zicheng, W., Yiguo, P., Jinqiao, S.: A continuous re-authentication approach using ensemble learning. Proc. Comput. Sci. 17, 870\u2013878 (2013). https:\/\/doi.org\/10.1016\/j.procs.2013.05.111","journal-title":"Proc. Comput. Sci."}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-022-00997-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-022-00997-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-022-00997-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T23:31:27Z","timestamp":1701214287000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-022-00997-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,17]]},"references-count":47,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["997"],"URL":"https:\/\/doi.org\/10.1007\/s00530-022-00997-5","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,17]]},"assertion":[{"value":"12 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}