{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T23:59:39Z","timestamp":1775174379384,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T00:00:00Z","timestamp":1748476800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T00:00:00Z","timestamp":1748476800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s00530-025-01833-2","type":"journal-article","created":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T22:09:04Z","timestamp":1748470144000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Spatial and frequency feature fusion using multi-scale cross attention for enhancing deepfake face detection"],"prefix":"10.1007","volume":"31","author":[{"given":"Main","family":"Uddin","sequence":"first","affiliation":[]},{"given":"Zhangjie","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Abu Bakor Hayat","family":"Arnob","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,29]]},"reference":[{"key":"1833_CR1","doi-asserted-by":"publisher","unstructured":"Qian, Y., Yin, G., Sheng, L., Chen, Z., Shao, J.: Thinking in frequency: Face forgery detection by mining frequency-aware clues. In: Lecture Notes in Computer Science (including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12357 LNCS (2020). https:\/\/doi.org\/10.1007\/978-3-030-58610-2_6","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"1833_CR2","doi-asserted-by":"publisher","unstructured":"Zhao, H., Zhou, W., Chen, D., Wei, T., Zhang, W., Yu, N.: Multi-attentional deepfake detection. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (2021). https:\/\/doi.org\/10.1109\/CVPR46437.2021.00222","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"1833_CR3","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Jin, X., Jiang, Q., Dong, Y., Wu, N., Yao, S., Zhou, W.: Deepfake detection using multiple feature fusion. In: IFIP Advances in Information and Communication Technology, vol. 653 IFIP (2022). https:\/\/doi.org\/10.1007\/978-3-031-10078-9_7","DOI":"10.1007\/978-3-031-10078-9_7"},{"key":"1833_CR4","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4030341","author":"TT Nguyen","year":"2022","unstructured":"Nguyen, T.T., Nguyen, Q.V.H., Nguyen, D.T., Nguyen, D.T., Huynh-The, T., Nahavandi, S., Nguyen, T.T., Pham, Q.-V., Nguyen, C.M.: Deep learning for deepfakes creation and detection: A survey. SSRN Electronic Journal (2022). https:\/\/doi.org\/10.2139\/ssrn.4030341","journal-title":"SSRN Electronic Journal"},{"key":"1833_CR5","doi-asserted-by":"publisher","unstructured":"Lin, H., Huang, W., Luo, W., Lu, W.: Deepfake detection with multi-scale convolution and vision transformer. Digit. Signal Process. Rev. J. 134 (2023). https:\/\/doi.org\/10.1016\/j.dsp.2022.103895","DOI":"10.1016\/j.dsp.2022.103895"},{"key":"1833_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.108341","volume":"133","author":"B Wang","year":"2024","unstructured":"Wang, B., Wu, X., Wang, F., Zhang, Y., Wei, F., Song, Z.: Spatial-frequency feature fusion based deepfake detection through knowledge distillation. Eng. Appl. Artif. Intell. 133, 108341 (2024). https:\/\/doi.org\/10.1016\/j.engappai.2024.108341","journal-title":"Eng. Appl. Artif. Intell."},{"key":"1833_CR7","doi-asserted-by":"publisher","unstructured":"Ahmed, S.R., Sonuc, E., Ahmed, M.R., Duru, A.D.: Analysis survey on deepfake detection and recognition with convolutional neural networks. In: HORA 2022 - 4th International Congress on Human-Computer Interaction, Optimization and Robotic Applications, Proceedings (2022). https:\/\/doi.org\/10.1109\/HORA55278.2022.9799858","DOI":"10.1109\/HORA55278.2022.9799858"},{"key":"1833_CR8","doi-asserted-by":"publisher","unstructured":"Pan, X., Zhang, X., Lyu, S.: Exposing image splicing with inconsistent local noise variances. In: 2012 IEEE International Conference on Computational Photography, ICCP 2012 (2012). https:\/\/doi.org\/10.1109\/ICCPhot.2012.6215223","DOI":"10.1109\/ICCPhot.2012.6215223"},{"key":"1833_CR9","doi-asserted-by":"publisher","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 2016-December (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"1833_CR10","unstructured":"Tan, M., Le, Q.V.: Efficientnetv2: Smaller models and faster training. In: Proceedings of Machine Learning Research, vol. 139 (2021)"},{"key":"1833_CR11","doi-asserted-by":"publisher","unstructured":"Wu, Y., Abdalmageed, W., Natarajan, P.: Mantra-net: Manipulation tracing network for detection and localization of image forgeries with anomalous features. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 2019-June (2019). https:\/\/doi.org\/10.1109\/CVPR.2019.00977","DOI":"10.1109\/CVPR.2019.00977"},{"key":"1833_CR12","doi-asserted-by":"publisher","unstructured":"Chollet, F.: Xception: Deep learning with depthwise separable convolutions. In: Proceedings - 30th IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017, vol. 2017-January (2017). https:\/\/doi.org\/10.1109\/CVPR.2017.195","DOI":"10.1109\/CVPR.2017.195"},{"key":"1833_CR13","doi-asserted-by":"publisher","unstructured":"Umirzakova, S., Whangbo, T.K.: Detailed feature extraction network-based fine-grained face segmentation. Knowl.-Based Syst. 250, 109036 (2022). https:\/\/doi.org\/10.1016\/j.knosys.2022.109036","DOI":"10.1016\/j.knosys.2022.109036"},{"key":"1833_CR14","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, X., Unterthiner, T., Dehghani, M., Minderer, M., Heigold, G., Gelly, S., Uszkoreit, J., Houlsby, N.: An Image is Worth 16x16 Words: Transformers for Image Recognition at Scale (2021)"},{"key":"1833_CR15","doi-asserted-by":"publisher","unstructured":"Shah, D., Shah, D., Jodhawat, D., Parekh, J., Srivastava, K.: Xception net & vision transformer: A comparative study for deepfake detection. In: Proceedings - 2022 International Conference on Machine Learning, Computer Systems and Security, MLCSS 2022 (2022). https:\/\/doi.org\/10.1109\/MLCSS57186.2022.00077","DOI":"10.1109\/MLCSS57186.2022.00077"},{"key":"1833_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118423","volume":"210","author":"S Ganguly","year":"2022","unstructured":"Ganguly, S., Ganguly, A., Mohiuddin, S., Malakar, S., Sarkar, R.: Vixnet: Vision transformer with xception network for deepfakes based video and image forgery detection. Expert Systems with Applications 210, 118423 (2022). https:\/\/doi.org\/10.1016\/j.eswa.2022.118423","journal-title":"Expert Systems with Applications"},{"key":"1833_CR17","doi-asserted-by":"publisher","unstructured":"Coccomini, D.A., Messina, N., Gennaro, C., Falchi, F.: Combining efficientnet and vision transformers for video deepfake detection. In: Lecture Notes in Computer Science (including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13233 LNCS (2022). https:\/\/doi.org\/10.1007\/978-3-031-06433-3_19","DOI":"10.1007\/978-3-031-06433-3_19"},{"key":"1833_CR18","unstructured":"Wodajo, D., Atnafu, S.: Deepfake video detection using convolutional vision transformer. CoRR:abs\/2102.11126 (2021)"},{"key":"1833_CR19","doi-asserted-by":"publisher","unstructured":"Chen, C.F., Fan, Q., Panda, R.: Crossvit: Cross-attention multi-scale vision transformer for image classification. In: Proceedings of the IEEE International Conference on Computer Vision (2021).https:\/\/doi.org\/10.1109\/ICCV48922.2021.00041","DOI":"10.1109\/ICCV48922.2021.00041"},{"key":"1833_CR20","doi-asserted-by":"publisher","unstructured":"Li, J., Xie, H., Li, J., Wang, Z., Zhang, Y.: Frequency-aware discriminative feature learning supervised by single-center loss for face forgery detection. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (2021). https:\/\/doi.org\/10.1109\/CVPR46437.2021.00639","DOI":"10.1109\/CVPR46437.2021.00639"},{"key":"1833_CR21","doi-asserted-by":"publisher","unstructured":"Gu, Q., Chen, S., Yao, T., Chen, Y., Ding, S., Yi, R.: Exploiting fine-grained face forgery clues via progressive enhancement learning. In: Proceedings of the 36th AAAI Conference on Artificial Intelligence, AAAI 2022, vol. 36 (2022). https:\/\/doi.org\/10.1609\/aaai.v36i1.19954","DOI":"10.1609\/aaai.v36i1.19954"},{"key":"1833_CR22","doi-asserted-by":"publisher","unstructured":"Shuai, C., Zhong, J., Wu, S., Lin, F., Wang, Z., Ba, Z., Liu, Z., Cavallaro, L., Ren, K.: Locate and verify: A two-stream network for improved deepfake detection. In: MM 2023 - Proceedings of the 31st ACM International Conference on Multimedia (2023). https:\/\/doi.org\/10.1145\/3581783.3612386","DOI":"10.1145\/3581783.3612386"},{"key":"1833_CR23","doi-asserted-by":"publisher","first-page":"1959","DOI":"10.7717\/peerj-cs.1959","volume":"10","author":"H Zhao","year":"2024","unstructured":"Zhao, H., Li, X., Xu, B., Liu, H.: Combined spatial and frequency dual stream network for face forgery detection. PeerJ Comput. Sci. 10, 1959 (2024). https:\/\/doi.org\/10.7717\/peerj-cs.1959","journal-title":"PeerJ Comput. Sci."},{"key":"1833_CR24","doi-asserted-by":"publisher","unstructured":"Chen, S., Yao, T., Chen, Y., Ding, S., Li, J., Ji, R.: Local relation learning for face forgery detection. In: 35th AAAI Conference on Artificial Intelligence, AAAI 2021, vol. 2A (2021). https:\/\/doi.org\/10.1609\/aaai.v35i2.16193","DOI":"10.1609\/aaai.v35i2.16193"},{"key":"1833_CR25","doi-asserted-by":"publisher","unstructured":"Liu, H., Li, X., Zhou, W., Chen, Y., He, Y., Xue, H., Zhang, W., Yu, N.: Spatial-phase shallow learning: Rethinking face forgery detection in frequency domain. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (2021). https:\/\/doi.org\/10.1109\/CVPR46437.2021.00083","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"1833_CR26","doi-asserted-by":"publisher","unstructured":"Zhang, T., Zhu, X., Pan, F., Xiang, K., Lei, Z.: Face forgery detection by multi-dimensional image decomposition. In: Lecture Notes in Computer Science (including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13628 LNCS (2022). https:\/\/doi.org\/10.1007\/978-3-031-20233-9_60","DOI":"10.1007\/978-3-031-20233-9_60"},{"key":"1833_CR27","doi-asserted-by":"publisher","unstructured":"Yang, X., Li, Y., Lyu, S.: Exposing deep fakes using inconsistent head poses. In: ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, vol. 2019-May (2019).https:\/\/doi.org\/10.1109\/ICASSP.2019.8683164","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"1833_CR28","doi-asserted-by":"publisher","unstructured":"Li, Y., Chang, M.C., Lyu, S.: In ictu oculi: Exposing ai created fake videos by detecting eye blinking. In: 10th IEEE International Workshop on Information Forensics and Security, WIFS 2018 (2018). https:\/\/doi.org\/10.1109\/WIFS.2018.8630787","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"1833_CR29","doi-asserted-by":"publisher","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., Echizen, I.: Mesonet: A compact facial video forgery detection network. In: 10th IEEE International Workshop on Information Forensics and Security, WIFS 2018 (2019). https:\/\/doi.org\/10.1109\/WIFS.2018.8630761","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"1833_CR30","doi-asserted-by":"publisher","unstructured":"Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Niessner, M.: Faceforensics++: Learning to detect manipulated facial images. In: Proceedings of the IEEE International Conference on Computer Vision, vol. 2019-October (2019). https:\/\/doi.org\/10.1109\/ICCV.2019.00009","DOI":"10.1109\/ICCV.2019.00009"},{"key":"1833_CR31","doi-asserted-by":"publisher","unstructured":"Chen, B., Liu, X., Zheng, Y., Zhao, G., Shi, Y.Q.: A robust gan-generated face detection method based on dual-color spaces and an improved xception. IEEE Trans. Circuits Syst. Video Technol. 32 (2022) https:\/\/doi.org\/10.1109\/TCSVT.2021.3116679","DOI":"10.1109\/TCSVT.2021.3116679"},{"key":"1833_CR32","doi-asserted-by":"publisher","unstructured":"Jeon, H., Bang, Y., Woo, S.S.: Fdftnet: Facing off fake images using fake detection fine-tuning network. In: IFIP Advances in Information and Communication Technology, vol. 580 IFIP (2020). https:\/\/doi.org\/10.1007\/978-3-030-58201-2_28","DOI":"10.1007\/978-3-030-58201-2_28"},{"key":"1833_CR33","doi-asserted-by":"publisher","unstructured":"Wang, C., Deng, W.: Representative forgery mining for fake face detection. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (2021).https:\/\/doi.org\/10.1109\/CVPR46437.2021.01468","DOI":"10.1109\/CVPR46437.2021.01468"},{"key":"1833_CR34","doi-asserted-by":"publisher","unstructured":"Shiohara, K., Yamasaki, T.: Detecting deepfakes with self-blended images. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 2022-June (2022). https:\/\/doi.org\/10.1109\/CVPR52688.2022.01816","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"1833_CR35","doi-asserted-by":"publisher","unstructured":"Guo, Z., Yang, G., Zhang, D., Xia, M.: Rethinking gradient operator for exposing ai-enabled face forgeries. Expert Syst. Appl. 215 (2023) https:\/\/doi.org\/10.1016\/j.eswa.2022.119361","DOI":"10.1016\/j.eswa.2022.119361"},{"key":"1833_CR36","doi-asserted-by":"publisher","unstructured":"Li, L., Bao, J., Zhang, T., Yang, H., Chen, D., Wen, F., Guo, B.: Face x-ray for more general face forgery detection. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (2020). https:\/\/doi.org\/10.1109\/CVPR42600.2020.00505","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"1833_CR37","doi-asserted-by":"publisher","unstructured":"Ni, Y., Meng, D., Yu, C., Quan, C., Ren, D., Zhao, Y.: Core: Consistent representation learning for face forgery detection. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, vol. 2022-June (2022). https:\/\/doi.org\/10.1109\/CVPRW56347.2022.00011","DOI":"10.1109\/CVPRW56347.2022.00011"},{"key":"1833_CR38","doi-asserted-by":"crossref","unstructured":"Jingjing, Peng, Z., Chunmao, W., Di, X., Jie, P.S.L., Wang: Multi-scale wavelet transformer for face forgery detection. In: Juergen, Tat-Jun, C., Imari, S., Lei, C.R.W., Gall (eds.) Computer Vision - ACCV 2022, pp. 52\u201368. Springer, ??? (2023)","DOI":"10.1007\/978-3-031-26351-4_4"},{"key":"1833_CR39","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1109\/TIFS.2022.3233774","volume":"18","author":"C Miao","year":"2023","unstructured":"Miao, C., Tan, Z., Chu, Q., Liu, H., Hu, H., Yu, N.: F2trans: High-frequency fine-grained transformer for face forgery detection. IEEE Trans. Inf. Forensics Secur. 18, 1039\u20131051 (2023). https:\/\/doi.org\/10.1109\/TIFS.2022.3233774","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1833_CR40","doi-asserted-by":"publisher","unstructured":"Jia, G., Zheng, M., Hu, C., Ma, X., Xu, Y., Liu, L., Deng, Y., He, R.: Inconsistency-aware wavelet dual-branch network for face forgery detection. IEEE Trans. Biomet. Behav. Identity Sci. 3 (2021) https:\/\/doi.org\/10.1109\/TBIOM.2021.3086109","DOI":"10.1109\/TBIOM.2021.3086109"},{"key":"1833_CR41","doi-asserted-by":"crossref","unstructured":"Jeevan, P., Viswanathan, K., S, A.A., Sethi, A.: WaveMix: A Resource-efficient Neural Network for Image Analysis (2024)","DOI":"10.1109\/WACV57701.2024.00578"},{"key":"1833_CR42","doi-asserted-by":"publisher","unstructured":"Guo, Z., Jia, Z., Wang, L., Wang, D., Yang, G., Kasabov, N.: Constructing new backbone networks via space-frequency interactive convolution for deepfake detection. IEEE Trans. Inf. Forensics Security 19 (2024) https:\/\/doi.org\/10.1109\/TIFS.2023.3324739","DOI":"10.1109\/TIFS.2023.3324739"},{"key":"1833_CR43","unstructured":"Patro, B.N., Namboodiri, V.P., Agneeswaran, V.S.: SpectFormer Frequency and Attention is what you need in a Vision Transformer (2023). arxiv:2304.06446"},{"key":"1833_CR44","doi-asserted-by":"publisher","unstructured":"Su, K., Cao, L., Zhao, B., Li, N., Wu, D., Han, X., Liu, Y.: Dctvit: Discrete cosine transform meet vision transformers. Neural Netw. 172, (2024) https:\/\/doi.org\/10.1016\/j.neunet.2024.106139","DOI":"10.1016\/j.neunet.2024.106139"},{"key":"1833_CR45","doi-asserted-by":"publisher","unstructured":"Luo, Y., Zhang, Y., Yan, J., Liu, W.: Generalizing face forgery detection with high-frequency features. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (2021). https:\/\/doi.org\/10.1109\/CVPR46437.2021.01605","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"1833_CR46","doi-asserted-by":"publisher","unstructured":"Kathariya, B., Li, Z., Wang, H., Coban, M.: Multi-stage spatial and frequency feature fusion using transformer in cnn-based in-loop filter for vvc. In: 2022 Picture Coding Symposium, PCS 2022 - Proceedings (2022). https:\/\/doi.org\/10.1109\/PCS56426.2022.10017998","DOI":"10.1109\/PCS56426.2022.10017998"},{"key":"1833_CR47","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.patrec.2023.05.029","volume":"172","author":"Y Liang","year":"2023","unstructured":"Liang, Y., Wang, M., Jin, Y., Pan, S., Liu, Y.: Hierarchical supervisions with two-stream network for deepfake detection. Pattern Recogn. Lett. 172, 121\u2013127 (2023). https:\/\/doi.org\/10.1016\/j.patrec.2023.05.029","journal-title":"Pattern Recogn. Lett."},{"key":"1833_CR48","doi-asserted-by":"publisher","unstructured":"Li, Y., Wu, C.Y., Fan, H., Mangalam, K., Xiong, B., Malik, J., Feichtenhofer, C.: Mvitv2: Improved multiscale vision transformers for classification and detection. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 2022-June (2022). https:\/\/doi.org\/10.1109\/CVPR52688.2022.00476","DOI":"10.1109\/CVPR52688.2022.00476"},{"key":"1833_CR49","doi-asserted-by":"publisher","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-df: A large-scale challenging dataset for deepfake forensics. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (2020). https:\/\/doi.org\/10.1109\/CVPR42600.2020.00327","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"1833_CR50","doi-asserted-by":"publisher","unstructured":"Zhang, K., Zhang, Z., Li, Z., Qiao, Y.: Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process. Lett. 23 (2016). https:\/\/doi.org\/10.1109\/LSP.2016.2603342","DOI":"10.1109\/LSP.2016.2603342"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-025-01833-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-025-01833-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-025-01833-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T09:00:46Z","timestamp":1757926846000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-025-01833-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,29]]},"references-count":50,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["1833"],"URL":"https:\/\/doi.org\/10.1007\/s00530-025-01833-2","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,29]]},"assertion":[{"value":"8 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"270"}}