{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T05:08:36Z","timestamp":1764133716030,"version":"3.28.0"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T00:00:00Z","timestamp":1722211200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T00:00:00Z","timestamp":1722211200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2021YFB1006201","2021YFB1006201","2021YFB1006201","2021YFB1006201","2021YFB1006201"],"award-info":[{"award-number":["2021YFB1006201","2021YFB1006201","2021YFB1006201","2021YFB1006201","2021YFB1006201"]}]},{"name":"Major Science and Technology Project of Henan Province in China","award":["221100211200-02","221100211200-02","221100211200-02","221100211200-02","221100211200-02"],"award-info":[{"award-number":["221100211200-02","221100211200-02","221100211200-02","221100211200-02","221100211200-02"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s00530-024-01416-7","type":"journal-article","created":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T09:02:57Z","timestamp":1722243777000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["SA-MDRAD: sample-adaptive multi-teacher dynamic rectification adversarial distillation"],"prefix":"10.1007","volume":"30","author":[{"given":"Shuyi","family":"Li","sequence":"first","affiliation":[]},{"given":"Xiaohan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Guozhen","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Wenyan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hongchao","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,29]]},"reference":[{"key":"1416_CR1","doi-asserted-by":"publisher","unstructured":"Amik F, Tasin A, Ahmed S, Elahi M, Mohammed N(2022)Dynamic Rectification Knowledge Distillation.Preprint. https:\/\/doi.org\/10.48550\/arXiv.2201.11319","DOI":"10.48550\/arXiv.2201.11319"},{"key":"1416_CR2","doi-asserted-by":"crossref","unstructured":"Boban S, Ivan P, Jovan B, Boban B, Danilo O(2022)Single and multiple drones detection and identification using RF based deep learning algorithm.Expert Systems with Application 187:115928\u2013115943","DOI":"10.1016\/j.eswa.2021.115928"},{"key":"1416_CR3","doi-asserted-by":"publisher","unstructured":"Bojia Z, Shihao Z, Xingjun M, Yu-Gang J. (2021). Revisiting adversarial robustness distillation: Robust soft labels make student better. Paper presented at the 2021 IEEE\/CVF International Conference on Computer Vision(ICCV 2021), Montreal, QC, Canada. https:\/\/doi.org\/10.48550\/arXiv.2108.07969","DOI":"10.48550\/arXiv.2108.07969"},{"key":"1416_CR4","doi-asserted-by":"publisher","unstructured":"Cao G, Wang Z, Dong X, Zhang Z, Guo H, Qin Z, Ren K(2022)Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training.Preprint. https:\/\/doi.org\/10.48550\/arXiv.2206.02158","DOI":"10.48550\/arXiv.2206.02158"},{"key":"1416_CR5","doi-asserted-by":"publisher","unstructured":"Carlini N, Wagner D. (2017). Towards evaluating the robustness of neural networks. Paper presented at the Proceedings - IEEE Symposium on Security and Privacy. https:\/\/doi.org\/10.1109\/SP.2017.49, arXiv:1608.04644","DOI":"10.1109\/SP.2017.49"},{"key":"1416_CR6","unstructured":"Chen T, Zhang Z, Liu S, Chang S, Wang Z. (2021). Robust overfitting may be mitigated by properly learned smoothening. Paper presented at the International Conference on Learning Representations"},{"key":"1416_CR7","doi-asserted-by":"publisher","unstructured":"Cohen J, Rosenfeld E, Kolter JZ. (2019). Certified Adversarial Robustness via Randomized Smoothing. Paper presented at the International Conference on Machine Learning(ICML). https:\/\/doi.org\/10.48550\/arXiv.1902.02918","DOI":"10.48550\/arXiv.1902.02918"},{"key":"1416_CR8","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2003.01690","author":"C Francesco","year":"2020","unstructured":"Francesco, C., Matthias, H.: Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. Paper presented at the International Conference on Machine Learning (2020). https:\/\/doi.org\/10.48550\/arXiv.2003.01690","journal-title":"Paper presented at the International Conference on Machine Learning"},{"key":"1416_CR9","doi-asserted-by":"publisher","unstructured":"Geoffrey H, Oriol V, Jeff D. (2014). Distilling the knowledge in a neural network. Paper presented at the NIPS 2014 Deep Learning Workshop. https:\/\/doi.org\/10.4140\/TCP.n.2015.249","DOI":"10.4140\/TCP.n.2015.249"},{"key":"1416_CR10","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5816","author":"M Goldblum","year":"2020","unstructured":"Goldblum, M., Fowl, L., Feizi, S., Goldstein, T.: Adversarially robust distillation. Paper presented at the Proceedings of the AAAI Conference on Artificial Intelligence (2020). https:\/\/doi.org\/10.1609\/aaai.v34i04.5816","journal-title":"Paper presented at the Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"1416_CR11","unstructured":"Goodfellow IJ, Shlens J, Szegedy C. (Explaining and harnessing adversarial examplesICML, 2015"},{"key":"1416_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90","author":"K He","year":"2016","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. Paper presented at the Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.90","journal-title":"Paper presented at the Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"1416_CR13","doi-asserted-by":"crossref","unstructured":"Huang B, Chen M, Wang Y, Lu J, Cheng M, Wang W. (2023). Boosting accuracy and robustness of student models via adaptive adversarial distillationProceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 202324668\u201324677","DOI":"10.1109\/CVPR52729.2023.02363"},{"key":"1416_CR14","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1608.06993","author":"G Huang","year":"2017","unstructured":"Huang, G., Liu, Z., Van Der Maaten, L., Weinberger, K.: Densely connected convolutional networks. Paper presented at the Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2017). https:\/\/doi.org\/10.48550\/arXiv.1608.06993","journal-title":"Paper presented at the Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"1416_CR15","doi-asserted-by":"publisher","unstructured":"Huang K, Sui T, Wu H(2022)3D human pose estimation with multi-scale graph convolution and hierarchical body pooling.MULTIMEDIA SYST 28 (2):403\u2013412. https:\/\/doi.org\/10.1007\/s00530-021-00808-3","DOI":"10.1007\/s00530-021-00808-3"},{"key":"1416_CR16","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2107.00181","author":"Z Huang","year":"2021","unstructured":"Huang, Z., Shen, X., Jun, X., Liu, T., Tian, X., Li, H., Deng, B., Huang, J., Hua, X.: Revisiting Knowledge Distillation: An Inheritance and Exploration Framework. Paper presented at the IEEE Conference on Computer Vision and Pattern Recognition (2021). https:\/\/doi.org\/10.48550\/arXiv.2107.00181","journal-title":"Paper presented at the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"1416_CR17","unstructured":"Ioffe S, Szegedy C. (Batch normalization: Accelerating deep network training by reducing internal covariate shiftInternational conference on machine learning, 2015. pmlr, p 448\u2013456"},{"key":"1416_CR18","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2106.04928","author":"J Z, J Y, B H, J Z, T L, G N, J Z,","year":"2022","unstructured":"J Z, J Y, B H, J Z, T L, G N, J Z, J X, Yang H.: Reliable adversarial distillation with unreliable teachers. Paper presented at the International Conference On Learning Representations (2022). https:\/\/doi.org\/10.48550\/arXiv.2106.04928","journal-title":"Paper presented at the International Conference On Learning Representations"},{"key":"1416_CR19","doi-asserted-by":"publisher","unstructured":"Jeong J, Shin J. (2020). Consistency regularization for certified robustness of smoothed classifiers. Paper presented at the Advances in Neural Information Processing Systems(NIPS). https:\/\/doi.org\/10.48550\/arXiv.2006.04062","DOI":"10.48550\/arXiv.2006.04062"},{"key":"1416_CR20","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1811.12673","author":"X Jia","year":"2019","unstructured":"Jia, X., Wei, X., Cao, X., Hassan, F.: Comdefend: An efficient image compression model to defend adversarial examples. Paper presented at the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2019). https:\/\/doi.org\/10.48550\/arXiv.1811.12673","journal-title":"Paper presented at the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"1416_CR21","doi-asserted-by":"crossref","unstructured":"Jung J, Jang H, Song J, Lee J. (2023). PeerAiD: Improving Adversarial Distillation from a Specialized Peer TutorProceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 202424482\u201324491","DOI":"10.1109\/CVPR52733.2024.02311"},{"key":"1416_CR22","doi-asserted-by":"publisher","unstructured":"Khattak S, Jan S, Ahmad I, Wadud Z, Khan FQ(2021)An effective security assessment approach for Internet banking services via deep analysis of multimedia data.MULTIMEDIA SYST 27 (4):733\u2013751. https:\/\/doi.org\/10.1007\/s00530-020-00680-7","DOI":"10.1007\/s00530-020-00680-7"},{"key":"1416_CR23","unstructured":"Krizhevsky A, Hinton G(2009)Learning multiple layers of features from tiny images.Preprint"},{"key":"1416_CR24","doi-asserted-by":"publisher","unstructured":"Li T, Han Y(2023)Improving transferable adversarial attack for vision transformers via global attention and local drop.MULTIMEDIA SYST. https:\/\/doi.org\/10.1007\/s00530-023-01157-z","DOI":"10.1007\/s00530-023-01157-z"},{"key":"1416_CR25","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2006.08403","author":"C Liu","year":"2020","unstructured":"Liu, C., Salzmann, M., Lin, T., Tomioka, R., Usstrunk, S.: On the loss landscape of adversarial training: Identifying challenges and how to overcome them. Paper presented at the Conference and Workshop on Neural Information Processing Systems (2020). https:\/\/doi.org\/10.48550\/arXiv.2006.08403","journal-title":"Paper presented at the Conference and Workshop on Neural Information Processing Systems"},{"key":"1416_CR26","doi-asserted-by":"publisher","unstructured":"Liu S, Tang Y, Tian Y, Su H(2023)Visual driving assistance system based on few-shot learning.MULTIMEDIA SYST 29 (5):2853\u20132863. https:\/\/doi.org\/10.1007\/s00530-021-00830-5","DOI":"10.1007\/s00530-021-00830-5"},{"key":"1416_CR27","doi-asserted-by":"publisher","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A. (2018). Towards deep learning models resistant to adversarial attacks. Paper presented at the 6th International Conference on Learning Representations(ICLR). https:\/\/doi.org\/10.48550\/arXiv.1706.06083","DOI":"10.48550\/arXiv.1706.06083"},{"key":"1416_CR28","unstructured":"Maroto J, Ortiz-Jim\u00e9nez G, Frossard P(2022)On the benefits of knowledge distillation for adversarial robustness.ArXiv abs\/2203.07159"},{"key":"1416_CR29","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1901.00532","author":"P Nakkiran","year":"2019","unstructured":"Nakkiran, P.: Adversarial Robustness May Be at Odds With Simplicity. Paper presented at the (2019). https:\/\/doi.org\/10.48550\/arXiv.1901.00532","journal-title":"Paper presented at the"},{"key":"1416_CR30","unstructured":"Pouransari H, Ghili S. (2015). Tiny imagenet visual recognition challenge. Paper presented at the CS231N"},{"key":"1416_CR31","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2101.05544","author":"A Rame","year":"2021","unstructured":"Rame, A., Cord, M.: DICE: Diversity in Deep Ensembles via Conditional Redundancy Adversarial Estimation. Paper presented at the International Conference On Learning Representations (2021). https:\/\/doi.org\/10.48550\/arXiv.2101.05544","journal-title":"Paper presented at the International Conference On Learning Representations"},{"key":"1416_CR32","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1412.6550","author":"A Romero","year":"2015","unstructured":"Romero, A., Ballas, N., Ebrahimi Kahou, S., Chassang, A., Gatta, C., Bengio, Y.: Fitnets: Hints for thin deep nets. Paper presented at the International Conference on Learning Representations (2015). https:\/\/doi.org\/10.48550\/arXiv.1412.6550","journal-title":"Paper presented at the International Conference on Learning Representations"},{"key":"1416_CR33","doi-asserted-by":"publisher","unstructured":"Sandler M, Howard A, Zhu M, Zhmoginov A, Chen L. (2018). Mobilenetv2: Inverted residuals and linear bottlenecks. Paper presented at the 018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA. https:\/\/doi.org\/10.1109\/CVPR.2018.00474","DOI":"10.1109\/CVPR.2018.00474"},{"key":"1416_CR34","unstructured":"Shiji Z, Jie Y, Zhenlong S, Bo Z, Xingxing W. (2022). Enhanced Accuracy and Robustness via Multi-teacher Adversarial Distillation. Paper presented at the European Conference on Computer Vision(ECCV)"},{"key":"1416_CR35","doi-asserted-by":"publisher","unstructured":"Simonyan K, Zisserman A(2014)Very deep convolutional networks for large-scale image recognition.Preprint. https:\/\/doi.org\/10.48550\/arXiv.1409.1556","DOI":"10.48550\/arXiv.1409.1556"},{"key":"1416_CR36","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1808.01688","author":"D Su","year":"2018","unstructured":"Su, D., Zhang, H., Chen, H., Yi, J., Chen, P.Y., Gao, Y.: Is Robustness the Cost of Accuracy? \u2013 A Comprehensive Study on the Robustness of 18 Deep Image Classification Models. Paper presented at the European Conference on Computer Vision (2018). https:\/\/doi.org\/10.48550\/arXiv.1808.01688","journal-title":"Paper presented at the European Conference on Computer Vision"},{"key":"1416_CR37","doi-asserted-by":"publisher","unstructured":"Sukumar A, Subramaniyaswamy V, Ravi L, Vijayakumar V, Indragandhi V(2021)Robust image steganography approach based on RIWT-Laplacian pyramid and histogram shifting using deep learning.MULTIMEDIA SYST 27 (4):651\u2013666. https:\/\/doi.org\/10.1007\/s00530-020-00665-6","DOI":"10.1007\/s00530-020-00665-6"},{"key":"1416_CR38","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1812.00037","author":"B Sun","year":"2019","unstructured":"Sun, B., Tsai, N., Liu, F., Yu, R., Hao, S.: Adversarial defense by stratified convolutional sparse coding. Paper presented at the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2019). https:\/\/doi.org\/10.48550\/arXiv.1812.00037","journal-title":"Paper presented at the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"1416_CR39","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow IJ, Fergus R(2013)Intriguing properties of neural networks.CoRRabs\/1312.6199"},{"key":"1416_CR40","doi-asserted-by":"publisher","unstructured":"Ta N, Chen H, Liu X, Jin N(2023)LET-Net: locally enhanced transformer network for medical image segmentation.MULTIMEDIA SYST. https:\/\/doi.org\/10.1007\/s00530-023-01165-z","DOI":"10.1007\/s00530-023-01165-z"},{"key":"1416_CR41","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1910.10699","author":"Y Tian","year":"2020","unstructured":"Tian, Y., Krishnan, D., Isola, P.: Contrastive representation distillation. Paper presented at the International Conference On Learning Representations (2020). https:\/\/doi.org\/10.48550\/arXiv.1910.10699","journal-title":"Paper presented at the International Conference On Learning Representations"},{"key":"1416_CR42","doi-asserted-by":"publisher","unstructured":"Tripathy JK, Chakkaravarthy SS, Satapathy SC, Sahoo M, Vaidehi V(2022)ALBERT-based fine-tuning model for cyberbullying analysis.MULTIMEDIA SYST 28 (6):1941\u20131949. https:\/\/doi.org\/10.1007\/s00530-020-00690-5","DOI":"10.1007\/s00530-020-00690-5"},{"key":"1416_CR43","unstructured":"Wang Y, Zou D, Yi J. (Improving adversarial robustness requires revisiting misclassified examples"},{"key":"1416_CR44","unstructured":"Wang Y, Zou D, Yi J, James B, Ma X. (2020). Improving adversarial robustness requires revisiting misclassified examples. Paper presented at the International Conference On Learning Representations"},{"key":"1416_CR45","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2010.01279","author":"B Wu","year":"2020","unstructured":"Wu, B., Chen, J., Cai, D., He, X., Gu, Q.: Does network width really help adversarial robustness? Paper presented at the (2020). https:\/\/doi.org\/10.48550\/arXiv.2010.01279","journal-title":"Paper presented at the"},{"key":"1416_CR46","unstructured":"Yang H, Zhang J, Dong H, Inkawhich N, Gardner AB, Touchet A, Wilkes W, Berry H, Li HH(2020)DVERGE: Diversifying Vulnerabilities for Enhanced Robust Generation of Ensembles.ArXivabs\/2009.14720"},{"key":"1416_CR47","doi-asserted-by":"publisher","unstructured":"Ye M, Xu J, Nan G, Wang Y(2023)Anomaly detection based on multi-teacher knowledge distillation.J SYST ARCHITECT 138:102861. https:\/\/doi.org\/10.1016\/j.sysarc.2023.102861","DOI":"10.1016\/j.sysarc.2023.102861"},{"key":"1416_CR48","doi-asserted-by":"publisher","unstructured":"Yuan J, He Z. (2020). Ensemble generative cleaning with feedback loops for defending adversarial attacks. Paper presented at the IEEE\/CVF Conference on Computer Vision and Pattern Recognition(CVPR). https:\/\/doi.org\/10.1007\/s11042-021-10760-z","DOI":"10.1007\/s11042-021-10760-z"},{"key":"1416_CR49","doi-asserted-by":"publisher","unstructured":"Zagoruyko S, Komodakis N. (2016). Wide residual networks. Paper presented at the European Conference on Computer Vision 2018 camera ready Machine Learning. https:\/\/doi.org\/10.48550\/arXiv.1605.07146","DOI":"10.48550\/arXiv.1605.07146"},{"key":"1416_CR50","doi-asserted-by":"publisher","unstructured":"Zhang H, Chen D, Wang C. (2022). Confidence-Aware Multi-Teacher Knowledge Distillation. Paper presented at the 2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP). https:\/\/doi.org\/10.48550\/arXiv.2201.00007","DOI":"10.48550\/arXiv.2201.00007"},{"key":"1416_CR51","doi-asserted-by":"publisher","unstructured":"Zhang H, Wang Q, Feng G(2023)Artistic image adversarial attack via style perturbation.MULTIMEDIA SYST. https:\/\/doi.org\/10.1007\/s00530-023-01183-x","DOI":"10.1007\/s00530-023-01183-x"},{"key":"1416_CR52","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1901.08573","author":"H Zhang","year":"2019","unstructured":"Zhang, H., Yu, Y., Jiao, J., Xing, E., Jordan, M.: Theoretically principled trade-off between robustness and accuracy. Paper presented at the International conference on machine learning (ICML) (2019). https:\/\/doi.org\/10.48550\/arXiv.1901.08573","journal-title":"Paper presented at the International conference on machine learning (ICML)"},{"key":"1416_CR53","doi-asserted-by":"crossref","unstructured":"Zhang K, Zhou H, Bian H, Zhang W, Yu N(2022)Certified defense against patch attacks via mask-guided randomized smoothing.Science China Information Sciences 65","DOI":"10.1007\/s11432-021-3457-7"},{"key":"1416_CR54","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2107.14185","author":"W Zhibo","year":"2021","unstructured":"Zhibo, W., Hengchang, G., Zhifei, Z., Wenxin, L., Zhan, Q., Kui, R.: Feature importance-aware transferable adversarial attacks. Paper presented at the Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV) (2021). https:\/\/doi.org\/10.48550\/arXiv.2107.14185","journal-title":"Paper presented at the Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV)"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-024-01416-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-024-01416-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-024-01416-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T00:00:37Z","timestamp":1732492837000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-024-01416-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,29]]},"references-count":54,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["1416"],"URL":"https:\/\/doi.org\/10.1007\/s00530-024-01416-7","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"type":"print","value":"0942-4962"},{"type":"electronic","value":"1432-1882"}],"subject":[],"published":{"date-parts":[[2024,7,29]]},"assertion":[{"value":"29 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no competing interests related to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"225"}}