{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T18:07:33Z","timestamp":1759774053785,"version":"3.37.3"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,7,14]],"date-time":"2020-07-14T00:00:00Z","timestamp":1594684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,7,14]],"date-time":"2020-07-14T00:00:00Z","timestamp":1594684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U1636215, 61871140, 61872100"],"award-info":[{"award-number":["U1636215, 61871140, 61872100"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the National Key research and Development Plan","award":["2018YFB0803504"],"award-info":[{"award-number":["2018YFB0803504"]}]},{"name":"Natural Science Foundation of Beijing Municipality","award":["4172006"],"award-info":[{"award-number":["4172006"]}]},{"name":"the Guangdong Province Key Research and Development Plan","award":["2019B010137004"],"award-info":[{"award-number":["2019B010137004"]}]},{"name":"the Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme","award":["2019"],"award-info":[{"award-number":["2019"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2021,2]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>With the popularization of new energy electric vehicles (EVs), the recommendation algorithm is widely used in the relatively new field of charge piles. At the same time, the construction of charging infrastructure is facing increasing demand and more severe challenges. With the ubiquity of Internet of vehicles (IoVs), inter-vehicle communication can share information about the charging experience and traffic condition to help achieving better charging recommendation and higher energy efficiency. The recommendation of charging piles is of great value. However, the existing methods related to such recommendation consider inadequate reference factors and most of them are generalized for all users, rather than personalized for specific populations. In this paper, we propose a recommendation method based on dynamic charging area mechanism, which recommends the appropriate initial charging area according to the user's warning level, and dynamically changes the charging area according to the real-time state of EVs and charging piles. The recommendation method based on a classification chain provides more personalized services for users according to different charging needs and improves the utilization ratio of charging piles. This satisfies users' multilevel charging demands and realizes a more effective charging planning, which is beneficial to overall balance. The chained recommendation method mainly consists of three modules: intention detection, warning levels classification, and chained recommendation. The dynamic charging area mechanism reduces the occurrence of recommendation conflict and provides more personalized service for users according to different charging needs. Simulations and computations validate the correctness and effectiveness of the proposed method.<\/jats:p>","DOI":"10.1007\/s00607-020-00832-7","type":"journal-article","created":{"date-parts":[[2020,7,14]],"date-time":"2020-07-14T15:03:51Z","timestamp":1594739031000},"page":"231-249","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A method of chained recommendation for charging piles in internet of vehicles"],"prefix":"10.1007","volume":"103","author":[{"given":"Tianle","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Liwen","family":"Zheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6949-4876","authenticated-orcid":false,"given":"Yu","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Zhihong","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[]},{"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,14]]},"reference":[{"key":"832_CR1","doi-asserted-by":"crossref","unstructured":"Qin H, Zhang W (2011) Charging scheduling with minimal waiting in a network of electric vehicles and charging piles. In: Proceedings of the Eighth ACM international workshop on Vehicular inter-networking. ACM, pp 51\u201360","DOI":"10.1145\/2030698.2030706"},{"key":"832_CR2","doi-asserted-by":"crossref","unstructured":"Zhu M, Liu XY, Kong L et al (2014) The charging-scheduling problem for electric vehicle networks. In: IEEE wireless communications and networking conference (WCNC) IEEE, pp 3178\u20133183","DOI":"10.1109\/WCNC.2014.6953026"},{"issue":"10","key":"832_CR3","doi-asserted-by":"publisher","first-page":"2752","DOI":"10.3390\/en11102752","volume":"11","author":"J Garc\u00eda \u00c1lvarez","year":"2018","unstructured":"Garc\u00eda \u00c1lvarez J, Gonz\u00e1lez M, Rodr\u00edguez VC et al (2018) Electric vehicle charging scheduling by an enhanced artificial bee colony algorithm. Energies 11(10):2752","journal-title":"Energies"},{"issue":"11","key":"832_CR4","doi-asserted-by":"publisher","first-page":"3098","DOI":"10.1109\/TITS.2016.2539201","volume":"17","author":"Z Tian","year":"2016","unstructured":"Tian Z, Jung T, Wang Y et al (2016) Real-time charging pile recommendation system for electric- vehicle taxis. IEEE Trans Intell Transp Syst 17(11):3098\u20133109","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"832_CR5","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.trc.2014.01.008","volume":"40","author":"J Jung","year":"2014","unstructured":"Jung J, Chow JY, Jayakrishnan R, Park JY (2014) Stochastic dynamic itinerary interception refueling location problem with queue delay for electric taxi charging piles. Transp Res C Emerging Technol 40:123\u2013142","journal-title":"Transp Res C Emerging Technol"},{"key":"832_CR6","doi-asserted-by":"crossref","unstructured":"Gharbaoui M et al (2013) Designing and evaluating activity-based electric vehicle charging in urban areas. In: Proceedings of IEEE IEVC, 2013, pp 1\u20135","DOI":"10.1109\/IEVC.2013.6681140"},{"issue":"3","key":"832_CR7","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1109\/JSAC.2018.2815442","volume":"36","author":"L Zhu","year":"2018","unstructured":"Zhu L, Tang X, Shen M, Du X, Guizani M (2018) Privacy-preserving DDoS attack detection using cross-domain traffic in software defined networks. IEEE J Sel Areas Commun 36(3):628\u2013643","journal-title":"IEEE J Sel Areas Commun"},{"key":"832_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6938-9","author":"WH Han","year":"2018","unstructured":"Han WH, Tian ZH, Huang ZH, Li SD, Jia Y (2018) Bidirectional self-adaptive resampling in imbalanced big data learning. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-018-6938-9","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"832_CR9","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MCOM.2018.1800089","volume":"56","author":"C Wu","year":"2018","unstructured":"Wu C, Liu Z, Zhang D, Yoshinaga T, Ji YS (2018) Spatial intelligence toward trustworthy vehicular IoT. IEEE Commun Mag 56(10):22\u201327. https:\/\/doi.org\/10.1109\/MCOM.2018.1800089","journal-title":"IEEE Commun Mag"},{"key":"832_CR10","doi-asserted-by":"crossref","unstructured":"Chen X, Wu C, Chen T, et al (2020) Age of information-aware radio resource management in vehicular networks: a proactive deep reinforcement learning perspective. IEEE Transactions on Wireless Communications, pp 1\u20131","DOI":"10.1109\/TWC.2019.2963667"},{"issue":"7","key":"832_CR11","doi-asserted-by":"publisher","first-page":"4285","DOI":"10.1109\/TII.2019.2907754","volume":"15","author":"Z Tian","year":"2019","unstructured":"Tian Z, Shi W, Wang Y, Zhu C, Du X et al (2019) Real-time lateral movement detection based on evidence reasoning network for edge computing environment. IEEE Trans Ind Inf 15(7):4285\u20134294","journal-title":"IEEE Trans Ind Inf"},{"issue":"5\/6","key":"832_CR12","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1504\/IJSNET.2007.014354","volume":"2","author":"X Du","year":"2007","unstructured":"Du X, Zhang M, Nygard K, Guizani S, Chen HH (2007) Self-healing sensor networks with distributed decision making. Int J Sens Netw 2(5\/6):289\u2013298","journal-title":"Int J Sens Netw"},{"issue":"1","key":"832_CR13","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MVT.2018.2879647","volume":"14","author":"JY Feng","year":"2019","unstructured":"Feng JY, Liu Z, Wu C, Ji YS (2019) Mobile edge computing for the internet of vehicles: offloading framework and job scheduling. IEEE Veh Technol Mag 14(1):28\u201336","journal-title":"IEEE Veh Technol Mag"},{"issue":"12","key":"832_CR14","doi-asserted-by":"publisher","first-page":"10660","DOI":"10.1109\/TVT.2017.2714704","volume":"66","author":"JY Feng","year":"2017","unstructured":"Feng JY, Liu Z, Wu C, Ji YS (2017) AVE: autonomous vehicular edge computing framework with ACO-based scheduling. IEEE Trans Veh Technol 66(12):10660\u201310675. https:\/\/doi.org\/10.1109\/TVT.2017.2714704","journal-title":"IEEE Trans Veh Technol"},{"issue":"10","key":"832_CR15","doi-asserted-by":"publisher","first-page":"2742","DOI":"10.1109\/TMC.2017.2687918","volume":"16","author":"L Xiao","year":"2017","unstructured":"Xiao L, Li Y, Huang X, Du X (2017) Cloud-based malware detection game for mobile devices with offloading. IEEE Trans Mob Comput 16(10):2742\u20132750. https:\/\/doi.org\/10.1109\/TMC.2017.2687918","journal-title":"IEEE Trans Mob Comput"},{"key":"832_CR16","doi-asserted-by":"crossref","unstructured":"Du X, Guizani M, Xiao Y, Chen HH (2008) Defending DoS attacks on broadcast authentication in wireless sensor networks. In: Proceedings of of IEEE international conference on communications (ICC 2008), Beijing, China, May 2008","DOI":"10.1109\/ICC.2008.319"},{"key":"832_CR17","doi-asserted-by":"crossref","unstructured":"Du X, Xiao Y, Ci S, Guizani M, Chen HH (2007) A routing-driven key management scheme for heterogeneous sensor network. In: Proceedings of IEEE international conference on communications (ICC 2007), Glasgow, Scotland, June 2007","DOI":"10.1109\/ICC.2007.564"},{"key":"832_CR18","doi-asserted-by":"crossref","unstructured":"Du X, Rozenblit M, Shayman M (2001) Implementation and performance analysis of SNMP on a TLS\/TCP base. In: Proceedings of the seventh IFIP\/IEEE international symposium on integrated network management (IM 2001), pp 453\u2013466, Seattle, WA, May 2001","DOI":"10.1109\/INM.2001.918059"},{"key":"832_CR19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2969326","author":"J Qiu","year":"2020","unstructured":"Qiu J, Tian Z, Du C, Zuo Q, Su S, Fang B (2020) A survey on access control in the age of internet of things. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2020.2969326","journal-title":"IEEE Internet Things J"},{"key":"832_CR20","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5823439","author":"X Yu","year":"2018","unstructured":"Yu X, Tian ZH, Qiu J, Jiang F (2018) A data leakage prevention method based on the reduction of confidential and context terms for smart mobile devices. Wirel Commun Mob Comput. https:\/\/doi.org\/10.1155\/2018\/5823439","journal-title":"Wirel Commun Mob Comput"},{"issue":"4","key":"832_CR21","doi-asserted-by":"publisher","first-page":"2659","DOI":"10.1109\/TII.2019.2943906","volume":"16","author":"J Qiu","year":"2020","unstructured":"Qiu J, Du L, Zhang D, Su S, Tian Z (2020) Nei-TTE: intelligent traffic time estimation based on fine-grained time derivation of road segments for smart city. IEEE Trans Ind Inf 16(4):2659\u20132666","journal-title":"IEEE Trans Ind Inf"},{"key":"832_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2962914","author":"M Li","year":"2020","unstructured":"Li M, Sun Y, Lu H, Maharjan S, Tian Z (2020) Deep reinforcement learning for partially observable data poisoning attack in crowdsensing systems. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2019.2962914","journal-title":"IEEE Internet Things J"},{"key":"832_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2951620","author":"Z Tian","year":"2020","unstructured":"Tian Z, Gao X, Su S, Qiu J (2020) Vcash: a novel reputation framework for identifying denial of traffic service in internet of connected vehicles. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2019.2951620","journal-title":"IEEE Internet Things J"},{"key":"832_CR24","doi-asserted-by":"crossref","unstructured":"Kang CY, Zhang TL (2018) Realistic traffic data based mobility modeling and simulation of smart EV. In: The 3rd IEEE international conference on data science in cyberspace (DSC), 2018, pp 854\u2013857","DOI":"10.1109\/DSC.2018.00137"},{"issue":"2","key":"832_CR25","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1109\/TPWRD.2012.2236364","volume":"28","author":"J Rolink","year":"2013","unstructured":"Rolink J, Rehtanz C (2013) Large-scale modeling of grid-connected electric vehicles. IEEE Trans Power Deliv 28(2):894\u2013902","journal-title":"IEEE Trans Power Deliv"},{"key":"832_CR26","unstructured":"European Power Exchange (EPEX SPOT) Market Data. https:\/\/www.epexspot.com\/en\/. Accessed on 31 Jan 2013"},{"issue":"3","key":"832_CR27","doi-asserted-by":"publisher","first-page":"437","DOI":"10.3390\/app9030437","volume":"9","author":"S Su","year":"2019","unstructured":"Su S, Sun YB, Gao XS, Qiu J, Tian ZH (2019) A correlation-change based feature selection method for IoT equipment anomaly detection. Appl Sci 9(3):437. https:\/\/doi.org\/10.3390\/app9030437","journal-title":"Appl Sci"},{"key":"832_CR28","doi-asserted-by":"crossref","unstructured":"He X, Liao L, Zhang H et al (2017) Neural collaborative filtering. In: International conference on world wide web, pp 173\u2013182","DOI":"10.1145\/3038912.3052569"},{"key":"832_CR29","unstructured":"Tian Z et al (2014) Understanding operational and charging patterns of electric vehicle taxis using GPS records. In: Proceedings of IEEE 17th international conference ITSC, 2014, pp 2472\u20132479"},{"key":"832_CR30","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.future.2018.12.054","volume":"95","author":"Z Tian","year":"2019","unstructured":"Tian Z, Su S, Shi W, Du X, Guizani M, Yu X (2019) A data-driven method for future internet route decision modeling. Future Gen Comput Syst 95:212\u2013220","journal-title":"Future Gen Comput Syst"},{"key":"832_CR31","doi-asserted-by":"crossref","unstructured":"Aldejohann C, Maasmann J, Horenkamp W, Rettberg F, Rehtanz C (2014) Testing environment for vehicle to grid (V2G) applications for investigating a voltage stability support method. In: IEEE transportation and electrification conference and expo (ITEC), Dearborn 2014","DOI":"10.1109\/ITEC.2014.6861812"},{"issue":"11\u201312","key":"832_CR32","doi-asserted-by":"publisher","first-page":"2314","DOI":"10.1016\/j.comcom.2007.04.009","volume":"30","author":"Y Xiao","year":"2007","unstructured":"Xiao Y, Rayi V, Sun B, Du X, Hu F, Galloway M (2007) A survey of key management schemes in wireless sensor networks. J Comput Commun 30(11\u201312):2314\u20132341","journal-title":"J Comput Commun"},{"key":"832_CR33","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.ins.2019.04.011","volume":"491","author":"Z Tian","year":"2019","unstructured":"Tian Z, Li M, Qiu M, Sun Y, Su S (2019) Block-DEF: a secure digital evidence framework using blockchain. Inf Sci 491:151\u2013165. https:\/\/doi.org\/10.1016\/j.ins.2019.04.011","journal-title":"Inf Sci"},{"key":"832_CR34","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7943586","author":"ZH Wang","year":"2018","unstructured":"Wang ZH, Liu CG, Qiu J, Tian ZH, Cui X, Dong YF, Su S (2018) Automatically traceback RDP-based targeted ransomware attacks. Wirel Commun Mob Comput. https:\/\/doi.org\/10.1155\/2018\/7943586","journal-title":"Wirel Commun Mob Comput"},{"key":"832_CR35","doi-asserted-by":"crossref","unstructured":"Rutherford MJ, Yousefzadeh V (2011) The impact of Electric Vehicle battery charging on distribution transformers. In: Applied power electronics conference and exposition (APEC), 2011 twenty-sixth annual IEEE, 2011, pp 396\u2013400","DOI":"10.1109\/APEC.2011.5744627"},{"issue":"7","key":"832_CR36","doi-asserted-by":"publisher","first-page":"4285","DOI":"10.1109\/TII.2019.2907754","volume":"15","author":"Z Tian","year":"2019","unstructured":"Tian Z, Shi W, Wang Y, Zhu C, Du X, Su S, Sun Y, Guizani N (2019) Real time lateral movement detection based on evidence reasoning network for edge computing environment. IEEE Trans Ind Inf 15(7):4285\u20134294","journal-title":"IEEE Trans Ind Inf"},{"key":"832_CR37","unstructured":"Road vehicles\u2014Vehicle to grid communication interface\u2014Part 1: General information and use-case definition, ISO 15118\u20131, 2013."},{"issue":"1","key":"832_CR38","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.adhoc.2006.05.012","volume":"5","author":"X Du","year":"2007","unstructured":"Du X, Xiao Y, Guizani M, Chen HH (2007) An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw Elsevier 5(1):24\u201334","journal-title":"Ad Hoc Netw Elsevier"},{"issue":"6","key":"832_CR39","doi-asserted-by":"publisher","first-page":"5971","DOI":"10.1109\/TVT.2019.2910217","volume":"68","author":"Z Tian","year":"2019","unstructured":"Tian Z, Gao X, Su S, Qiu J, Du X, Guizani M (2019) Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory. IEEE Trans Veh Technol 68(6):5971\u20135980","journal-title":"IEEE Trans Veh Technol"},{"key":"832_CR40","doi-asserted-by":"crossref","unstructured":"Huang X, Du X (2014) Achieving big data privacy via hybrid cloud. In: Proceedings of 2014 IEEE INFOCOM workshops, pp 512\u2013517. 10.1109\/INFCOMW.2014.6849284.","DOI":"10.1109\/INFCOMW.2014.6849284"},{"key":"832_CR41","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2938778","author":"Z Tian","year":"2019","unstructured":"Tian Z, Luo C, Qiu J, Du X, Guizani M (2019) A distributed deep learning system for web attack detection on edge devices. IEEE Trans Ind Inf. https:\/\/doi.org\/10.1109\/TII.2019.2938778","journal-title":"IEEE Trans Ind Inf"},{"issue":"2","key":"832_CR42","doi-asserted-by":"publisher","first-page":"1584","DOI":"10.1109\/JIOT.2018.2846624","volume":"6","author":"Q Tan","year":"2019","unstructured":"Tan Q, Gao Y, Shi J, Wang X, Fang B, Tian Z (2019) Toward a comprehensive insight into the eclipse attacks of tor hidden services. IEEE Internet Things J 6(2):1584\u20131593","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"832_CR43","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/TWC.2009.060598","volume":"8","author":"X Du","year":"2009","unstructured":"Du X, Guizani M, Xiao Y, Chen HH (2009) A Routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. IEEE Trans Wirel Commun 8(3):1223\u20131229","journal-title":"IEEE Trans Wirel Commun"},{"key":"832_CR44","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1186\/s13638-019-1589-8","volume":"1","author":"T Zhang","year":"2019","unstructured":"Zhang T, Liu X, Luo Z, Dong F, Jiang Y (2019) Time series behavior modeling with digital twin for internet of vehicles. EURASIP J Wirel Commun Netw 1:271","journal-title":"EURASIP J Wirel Commun Netw"},{"issue":"4","key":"832_CR45","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MWC.2008.4599222","volume":"15","author":"X Du","year":"2008","unstructured":"Du X, Chen HH (2008) Security in wireless sensor networks. IEEE Wirel Commun Mag 15(4):60\u201366","journal-title":"IEEE Wirel Commun Mag"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-020-00832-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-020-00832-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-020-00832-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T00:01:08Z","timestamp":1626220868000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-020-00832-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,14]]},"references-count":45,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["832"],"URL":"https:\/\/doi.org\/10.1007\/s00607-020-00832-7","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"type":"print","value":"0010-485X"},{"type":"electronic","value":"1436-5057"}],"subject":[],"published":{"date-parts":[[2020,7,14]]},"assertion":[{"value":"15 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":".","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Availability of data and material"}},{"value":".","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}