{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T12:02:06Z","timestamp":1777982526216,"version":"3.51.4"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T00:00:00Z","timestamp":1718668800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T00:00:00Z","timestamp":1718668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["IJDAR"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s10032-024-00469-8","type":"journal-article","created":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T05:06:55Z","timestamp":1718687215000},"page":"475-499","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards privacy preserved document image classification: a comprehensive benchmark"],"prefix":"10.1007","volume":"27","author":[{"given":"Saifullah","family":"Saifullah","sequence":"first","affiliation":[]},{"given":"Dominique","family":"Mercier","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Agne","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Dengel","sequence":"additional","affiliation":[]},{"given":"Sheraz","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,18]]},"reference":[{"key":"469_CR1","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770\u2013778 (2015). https:\/\/api.semanticscholar.org\/CorpusID:206594692","DOI":"10.1109\/CVPR.2016.90"},{"key":"469_CR2","doi-asserted-by":"crossref","unstructured":"Liu, Z., et\u00a0al.: A convnet for the 2020s. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 11976\u201311986 (2022)","DOI":"10.1109\/CVPR52688.2022.01167"},{"key":"469_CR3","volume-title":"Advances in Neural Information Processing Systems","author":"A Vaswani","year":"2017","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Guyon, I., et al. (eds.) Advances in Neural Information Processing Systems, vol. 30. Curran Associates Inc., New York (2017)"},{"key":"469_CR4","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.: BERT: Pre-training of deep bidirectional transformers for language understanding. In: Association for Computational Linguistics, Minneapolis, pp. 4171\u20134186 (2019). https:\/\/aclanthology.org\/N19-1423"},{"key":"469_CR5","doi-asserted-by":"crossref","unstructured":"Afzal, M.Z., Kolsch, A., Ahmed, S., Liwicki, M.: Cutting the error by half: investigation of very deep CNN and advanced training strategies for document image classification. In: 2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR), vol. 1, pp. 883\u2013888 (2017). arXiv:1704.03557","DOI":"10.1109\/ICDAR.2017.149"},{"key":"469_CR6","doi-asserted-by":"crossref","unstructured":"Ferrando, J., et\u00a0al.: Improving accuracy and speeding up document image classification through parallel systems. In: Computational Science-ICCS 2020: 20th International Conference, Amsterdam, The Netherlands, June 3\u20135, 2020, Proceedings, Part II 20, 12138 LNCS, pp. 387\u2013400 (2020). arXiv:2006.09141","DOI":"10.1007\/978-3-030-50417-5_29"},{"key":"469_CR7","doi-asserted-by":"crossref","unstructured":"Powalski Rafa\u0142 Borchmann, \u0141., Jurkiewicz, D., Dwojak, T., Pietruszka Micha\u0142 Pa\u0142ka, G., Llad\u00f3s, J., Lopresti, D., Uchida, S.: Going full-TILT boogie on document understanding with text-image-layout transformer. In: Llad\u00f3s, J., Lopresti, D. Uchida, S. (eds.) Document Analysis and Recognition\u2013ICDAR 2021, Springer International Publishing, Cham (2021)","DOI":"10.1007\/978-3-030-86331-9_47"},{"key":"469_CR8","doi-asserted-by":"crossref","unstructured":"Lee, C.Y., et\u00a0al.: FormNet: structural encoding beyond sequential modeling in form document information extraction. vol.\u00a01, pp. 3735\u20133754 (Long Papers, 2022). arXiv:2203.08411","DOI":"10.18653\/v1\/2022.acl-long.260"},{"key":"469_CR9","doi-asserted-by":"crossref","unstructured":"Shen, Z., et\u00a0al.: Layoutparser: a unified toolkit for deep learning based document image analysis. In: Llad\u00f3s, J., Lopresti, D., Uchida, S. (eds) Document Analysis and Recognition\u2013ICDAR 2021, pp. 131\u2013146. Springer International Publishing, Cham (2021)","DOI":"10.1007\/978-3-030-86549-8_9"},{"issue":"2","key":"469_CR10","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSEC.2018.2888775","volume":"17","author":"M Al-Rubaie","year":"2019","unstructured":"Al-Rubaie, M., Chang, J.M.: Privacy-preserving machine learning: threats and solutions. IEEE Secur. Priv. 17(2), 49\u201358 (2019). arXiv:1804.11238","journal-title":"IEEE Secur. Priv."},{"key":"469_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, D., Chen, X., Wang, D., Shi, J.: A survey on collaborative deep learning and privacy-preserving. In: 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), pp. 652\u2013658 (2018)","DOI":"10.1109\/DSC.2018.00104"},{"key":"469_CR12","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V. Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3\u201318 (2017). arXiv:1610.05820","DOI":"10.1109\/SP.2017.41"},{"key":"469_CR13","doi-asserted-by":"crossref","unstructured":"Dupuy, C., Arava, R., Gupta, R., Rumshisky, A.: An efficient DP-SGD mechanism for large scale NLU models, vol. 2022-May, pp. 4118\u20134122 (2022). https:\/\/aws.amazon.com\/ec2\/instance-types\/. arXiv:2107.14586","DOI":"10.1109\/ICASSP43922.2022.9746975"},{"issue":"21","key":"469_CR14","doi-asserted-by":"publisher","first-page":"11177","DOI":"10.3390\/app122111177","volume":"12","author":"D Wunderlich","year":"2022","unstructured":"Wunderlich, D., Bernau, D., Ald\u00e0, F., Parra-Arnau, J., Strufe, T.: On the privacy-utility trade-off in differentially private hierarchical text classification. Appl. Sci. 12(21), 11177 (2022). https:\/\/doi.org\/10.3390\/app122111177","journal-title":"Appl. Sci."},{"key":"469_CR15","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, vol. 2015\u2013Oct, pp. 1322\u20131333 (ACM, New York, NY, USA, 2015)","DOI":"10.1145\/2810103.2813677"},{"key":"469_CR16","doi-asserted-by":"crossref","unstructured":"Hitaj, B., Ateniese, G., Perez-Cruz, F.: Deep models under the GAN: information leakage from collaborative deep learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 603\u2013618 (2017)","DOI":"10.1145\/3133956.3134012"},{"key":"469_CR17","unstructured":"Carlini, N., Liu, C., Erlingsson, \u00da., Kos, J., Song, D.: The secret sharer: evaluating and testing unintended memorization in neural networks. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 267\u2013284 (2019). arXiv:1802.08232"},{"key":"469_CR18","unstructured":"Coavoux, M., Narayan, S., Cohen, S.B.: Privacy-preserving neural representations of text. pp. 1\u201310 (2020). arXiv:1808.09408"},{"key":"469_CR19","doi-asserted-by":"crossref","unstructured":"Milli, S., Dragan, A.D., Schmidt, L., Hardt, M.: Model reconstruction from model explanations. In: FAT* 2019-Proceedings of the Conference on Fairness, Accountability, and Transparency, pp. 1\u20139 (2019). arXiv:1807.05185","DOI":"10.1145\/3287560.3287562"},{"key":"469_CR20","unstructured":"Tram\u00e8r, F., Zhang, F., Juels, A., Reiter, M.K., Ristenpart, T.: Stealing machine learning models via prediction apis. In: SEC\u201916, pp. 601\u2013618. USENIX Association, USA (2016)"},{"key":"469_CR21","unstructured":"European Parliament & Council of the European Union. Regulation (EU) 2016\/679 of the European Parliament and of the Council. https:\/\/data.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"469_CR22","doi-asserted-by":"publisher","unstructured":"Abadi, M., et\u00a0al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (ACM, 2016). https:\/\/doi.org\/10.1145\/2976749.2978318","DOI":"10.1145\/2976749.2978318"},{"key":"469_CR23","unstructured":"McMahan, H.B., Moore, E., Ramage, D., Hampson, S., y\u00a0Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. (2016)"},{"key":"469_CR24","unstructured":"Reddi, S., et\u00a0al.: Adaptive federated optimization (2021). arXiv:2003.00295"},{"key":"469_CR25","unstructured":"McMahan, H.B., Ramage, D., Talwar, K., Zhang, L.: Learning differentially private recurrent language models. (2017)"},{"key":"469_CR26","doi-asserted-by":"publisher","first-page":"7834","DOI":"10.1109\/TII.2021.3124476","volume":"18","author":"D Mercier","year":"2021","unstructured":"Mercier, D., Lucieri, A., Munir, M., Dengel, A., Ahmed, S.: Evaluating privacy-preserving machine learning in critical infrastructures: a case study on time-series classification. IEEE Trans. Ind. Inf. 18, 7834\u20137842 (2021)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"469_CR27","doi-asserted-by":"crossref","unstructured":"Mohassel, P., Zhang, Y.: Secureml: a system for scalable privacy-preserving machine learning. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 19\u201338 (2017)","DOI":"10.1109\/SP.2017.12"},{"key":"469_CR28","unstructured":"Knott, B., et\u00a0al.: Crypten: secure multi-party computation meets machine learning (2022). arXiv:2109.00984"},{"issue":"6","key":"469_CR29","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1038\/s42256-021-00337-8","volume":"3","author":"G Kaissis","year":"2021","unstructured":"Kaissis, G., et al.: End-to-end privacy preserving deep learning on multi-institutional medical imaging. Nat. Mach. Intell. 3(6), 473\u2013484 (2021)","journal-title":"Nat. Mach. Intell."},{"key":"469_CR30","unstructured":"Li, X., Tramer, F., Liang, P., Hashimoto, T.: Large language models can be strong differentially private learners (2022). https:\/\/openreview.net\/forum?id=bVuP3ltATMz"},{"key":"469_CR31","doi-asserted-by":"crossref","unstructured":"Plant, R., Gkatzia, D., Giuffrida, V.: CAPE: context-aware private embeddings for private language learning. Association for Computational Linguistics, Online and Punta Cana, Dominican Republic, pp. 7970\u20137978 (2021). https:\/\/aclanthology.org\/2021.emnlp-main.628","DOI":"10.18653\/v1\/2021.emnlp-main.628"},{"key":"469_CR32","doi-asserted-by":"crossref","unstructured":"Meehan, C., Mrini, K., Chaudhuri, K.: Sentence-level privacy for document embeddings. vol.\u00a01, 3367\u20133380 (Association for Computational Linguistics, Stroudsburg, PA, USA, 2022). https:\/\/aclanthology.org\/2022.acl-long.238. arXiv:2205.04605","DOI":"10.18653\/v1\/2022.acl-long.238"},{"key":"469_CR33","doi-asserted-by":"crossref","unstructured":"Das, A., Roy, S., Bhattacharya, U., Parui, S.K.: Document image classification with intra-domain transfer learning and stacked generalization of deep convolutional neural networks. In: 2018 24th international conference on pattern recognition (ICPR), 2018-Augus, pp. 3180\u20133185 (2018). arXiv:1801.09321","DOI":"10.1109\/ICPR.2018.8545630"},{"key":"469_CR34","doi-asserted-by":"crossref","unstructured":"Harley, A.W., Ufkes, A., Derpanis, K.G.: Evaluation of deep convolutional nets for document image classification and retrieval. In: 2015 13th International Conference on Document Analysis and Recognition (ICDAR), 2015-Novem, pp. 991\u2013995 (2015). arXiv:1502.07058","DOI":"10.1109\/ICDAR.2015.7333910"},{"key":"469_CR35","doi-asserted-by":"crossref","unstructured":"Saifullah, S., Agne, S., Dengel, A., Ahmed, S.: Docxclassifier: high performance explainable deep network for document image classification (2022)","DOI":"10.36227\/techrxiv.19310489.v3"},{"key":"469_CR36","doi-asserted-by":"crossref","unstructured":"Huang, Y., Lv, T., Cui, L., Lu, Y., Wei, F.: LayoutLMv3: pre-training for document AI with unified text and image masking. In: Proceedings of the 30th ACM International Conference on Multimedia, pp. 4083\u20134091 (ACM, New York, NY, USA, 2022). https:\/\/dl.acm.org\/doi\/10.1145\/3503161.3548112. arXiv:2204.08387","DOI":"10.1145\/3503161.3548112"},{"key":"469_CR37","unstructured":"Kumar, J., Ye, P., Doermann, D.: Learning document structure for retrieval and classification. In: Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012), pp. 1558\u20131561 (2012)"},{"issue":"4","key":"469_CR38","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1109\/TPAMI.2003.1190578","volume":"25","author":"M Diligenti","year":"2003","unstructured":"Diligenti, M., Frasconi, P., Gori, M.: Hidden tree Markov models for document image classification. IEEE Trans. Pattern Anal. Mach. Intell. 25(4), 519\u2013523 (2003)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"469_CR39","doi-asserted-by":"crossref","unstructured":"Wang, B., Gong, N.Z.: Stealing hyperparameters in machine learning (2019). arXiv:1802.05351","DOI":"10.1109\/SP.2018.00038"},{"key":"469_CR40","doi-asserted-by":"publisher","DOI":"10.1109\/PUNECON.2018.8745425","volume-title":"Anonymization Techniques for Protecting Privacy: A Survey","author":"A Pawar","year":"2018","unstructured":"Pawar, A., Ahirrao, S., Churi, P.P.: Anonymization Techniques for Protecting Privacy: A Survey. Institute of Electrical and Electronics Engineers Inc., Piscataway (2018)"},{"key":"469_CR41","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential Privacy. vol. 4052 LNCS, pp. 1\u201312, Springer, Berlin (2006)","DOI":"10.1007\/11787006_1"},{"key":"469_CR42","first-page":"13773","volume-title":"Advances in Neural Information Processing Systems","author":"X Chen","year":"2020","unstructured":"Chen, X., Wu, S.Z., Hong, M.: Understanding gradient clipping in private SGD: a geometric perspective. In: Larochelle, H., Ranzato, M., Hadsell, R., Balcan, M., Lin, H. (eds.) Advances in Neural Information Processing Systems, vol. 33, pp. 13773\u201313782. Curran Associates Inc., New York (2020)"},{"key":"469_CR43","doi-asserted-by":"crossref","unstructured":"Dengel, A., Dubiel, F.: Clustering and classification of document structure-a machine learning approach. In: Proceedings of 3rd International Conference on Document Analysis and Recognition, vol. 2, pp. 587\u2013591 (1995)","DOI":"10.1109\/ICDAR.1995.601965"},{"key":"469_CR44","doi-asserted-by":"crossref","unstructured":"Baldi, S., Marinai, S., Soda, G.: Using tree-grammars for training set expansion in page classification. In: Seventh International Conference on Document Analysis and Recognition, 2003-Janua\u00a0(Icdar), pp. 829\u2013833 (2003)","DOI":"10.1109\/ICDAR.2003.1227778"},{"issue":"1","key":"469_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10032-006-0020-2","volume":"10","author":"N Chen","year":"2007","unstructured":"Chen, N., Blostein, D.: A survey of document image classification: problem statement, classifier architecture and performance evaluation. Int. J. Doc. Anal. Recognit. 10(1), 1\u201316 (2007)","journal-title":"Int. J. Doc. Anal. Recognit."},{"key":"469_CR46","doi-asserted-by":"crossref","unstructured":"Asim, M.N., et al.: Two stream deep network for document image classification. In: 2019 International Conference on Document Analysis and Recognition (ICDAR), pp. 1410\u20131416. (2019)","DOI":"10.1109\/ICDAR.2019.00227"},{"key":"469_CR47","doi-asserted-by":"crossref","unstructured":"Audebert, N., Herold, C., Slimani, K., Vidal, C.: Multimodal deep networks for text and image-based document classification. In: Machine Learning and Knowledge Discovery in Databases: International Workshops of ECML PKDD 2019, vol. 1167 CCIS, pp. 427\u2013443, Springer, Cham (2020). arXiv:1907.06370","DOI":"10.1007\/978-3-030-43823-4_35"},{"key":"469_CR48","doi-asserted-by":"crossref","unstructured":"Saifullah, Siddiqui, S.\u00a0A., Agne, S., Dengel, A., Ahmed, S.: Are deep models robust against real distortions? A case study on document image classification. In: 2022 26th International Conference on Pattern Recognition (ICPR), pp. 1628\u20131635 (2022)","DOI":"10.1109\/ICPR56361.2022.9956167"},{"key":"469_CR49","doi-asserted-by":"publisher","unstructured":"Siddiqui, S.A., Dengel, A., Ahmed, S.: Analyzing the potential of zero-shot recognition for document image classification. In: International Conference on Document Analysis and Recognition, pp. 293\u2013304, Springer-Verlag, Berlin, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-030-86337-1_20","DOI":"10.1007\/978-3-030-86337-1_20"},{"key":"469_CR50","unstructured":"Dosovitskiy, A., et\u00a0al.: An image is worth 16x16 words: transformers for image recognition at scale (2021). https:\/\/openreview.net\/forum?id=YicbFdNTTy"},{"key":"469_CR51","doi-asserted-by":"publisher","unstructured":"Li, J., et al.: Dit: self-supervised pre-training for document image transformer. In: Proceedings of the 30th ACM International Conference on Multimedia, pp. 3530\u20133539 (Association for Computing Machinery, New York, NY. USA (2022). https:\/\/doi.org\/10.1145\/3503161.3547911","DOI":"10.1145\/3503161.3547911"},{"key":"469_CR52","doi-asserted-by":"crossref","unstructured":"Xu, Y., et\u00a0al.: LayoutLMv2: multi-modal pre-training for visually-rich document understanding. pp. 2579\u20132591 (Association for Computational Linguistics, Online, 2021). https:\/\/aclanthology.org\/2021.acl-long.201","DOI":"10.18653\/v1\/2021.acl-long.201"},{"key":"469_CR53","unstructured":"Koskela, A., Tobaben, M., Honkela, A.: Individual privacy accounting with gaussian differential privacy (2022). arXiv:2209.15596"},{"key":"469_CR54","doi-asserted-by":"crossref","unstructured":"Mironov, I.: R\u00e9nyi differential privacy (IEEE, 2017). https:\/\/doi.org\/10.1109%2Fcsf.2017.11","DOI":"10.1109\/CSF.2017.11"},{"key":"469_CR55","unstructured":"Gopi, S., Lee, Y.T., Wutschitz, L.: Numerical composition of differential privacy. In: Ranzato, M., Beygelzimer, A., Dauphin, Y., Liang, P., Vaughan, J.W. (eds.) Advances in Neural Information Processing Systems, vol. 34, pp. 11631\u201311642. Curran Associates, Inc., New York (2021)"},{"key":"469_CR56","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. CoRR. abs\/1412.6980 (2014). https:\/\/api.semanticscholar.org\/CorpusID:6628106"},{"key":"469_CR57","unstructured":"Yousefpour, A., et\u00a0al.: Opacus: user-friendly differential privacy library in PyTorch. arXiv preprint arXiv:2109.12298 (2021)"},{"key":"469_CR58","unstructured":"Beutel, D.J., et\u00a0al.: Flower: a friendly federated learning research framework. arXiv preprint arXiv:2007.14390 (2020)"},{"key":"469_CR59","volume-title":"Advances in Neural Information Processing Systems","author":"A Krizhevsky","year":"2012","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Pereira, F., Burges, C., Bottou, L., Weinberger, K. (eds.) Advances in Neural Information Processing Systems, vol. 25. Curran Associates, Inc., New York (2012)"},{"key":"469_CR60","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. CoRR. abs\/1409.1556 (2014). https:\/\/api.semanticscholar.org\/CorpusID:14124313"},{"key":"469_CR61","unstructured":"Tan, M., Le, Q.: Efficientnet: rethinking model scaling for convolutional neural networks. In: International Conference on Machine Learning, pp. 6105\u20136114 (2019)"},{"key":"469_CR62","doi-asserted-by":"crossref","unstructured":"Deng, J., et\u00a0al.: Imagenet: a large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 248\u2013255 (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"469_CR63","doi-asserted-by":"crossref","unstructured":"Kerrigan, G., Slack, D., Tuyls, J.: Differentially private language models benefit from public pre-training. In: Feyisetan, O., Ghanavati, S., Malmasi, S., Thaine, P. (eds.) Proceedings of the Second Workshop on Privacy in NLP, pp. 39\u201345 (Association for Computational Linguistics, Online, 2020). https:\/\/aclanthology.org\/2020.privatenlp-1.5","DOI":"10.18653\/v1\/2020.privatenlp-1.5"},{"key":"469_CR64","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1214\/aos\/1013203451","volume":"29","author":"JH Friedman","year":"2001","unstructured":"Friedman, J.H.: Greedy function approximation: a gradient boosting machine. Ann. Stat. 29, 1189\u20131232 (2001)","journal-title":"Ann. Stat."}],"container-title":["International Journal on Document Analysis and Recognition (IJDAR)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10032-024-00469-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10032-024-00469-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10032-024-00469-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T06:11:24Z","timestamp":1725084684000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10032-024-00469-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,18]]},"references-count":64,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["469"],"URL":"https:\/\/doi.org\/10.1007\/s10032-024-00469-8","relation":{"has-preprint":[{"id-type":"doi","id":"10.36227\/techrxiv.19518925.v1","asserted-by":"object"},{"id-type":"doi","id":"10.21203\/rs.3.rs-3612315\/v1","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.19518925.v2","asserted-by":"object"}]},"ISSN":["1433-2833","1433-2825"],"issn-type":[{"value":"1433-2833","type":"print"},{"value":"1433-2825","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,18]]},"assertion":[{"value":"14 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 June 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}