{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T07:01:06Z","timestamp":1760598066371,"version":"3.37.3"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T00:00:00Z","timestamp":1624233600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T00:00:00Z","timestamp":1624233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71932008;71401188"],"award-info":[{"award-number":["71932008;71401188"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s10115-021-01585-1","type":"journal-article","created":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T11:03:36Z","timestamp":1624273416000},"page":"2129-2155","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Improved incremental local outlier detection for data streams based on the landmark window model"],"prefix":"10.1007","volume":"63","author":[{"given":"Aihua","family":"Li","sequence":"first","affiliation":[]},{"given":"Weijia","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Zhidong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,21]]},"reference":[{"key":"1585_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14142-8_8","volume-title":"Outlier analysis","author":"CC Aggarwal","year":"2015","unstructured":"Aggarwal CC (2015) Outlier analysis. Springer, Switzerland. https:\/\/doi.org\/10.1007\/978-3-319-14142-8_8"},{"issue":"2","key":"1585_CR2","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/376284.375668","volume":"30","author":"CC Aggarwal","year":"2001","unstructured":"Aggarwal CC, Yu PS (2001) Outlier detection for high dimensional data. ACM SIGMOD Rec 30(2):37\u201346. https:\/\/doi.org\/10.1145\/376284.375668","journal-title":"ACM SIGMOD Rec"},{"issue":"1","key":"1585_CR3","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1080\/02664763.2018.1452901","volume":"46","author":"J Ahn","year":"2019","unstructured":"Ahn J, Lee MH, Lee JA (2019) Distance-based outlier detection for high dimension, low sample size data. J Appl Stat 46(1):13\u201329. https:\/\/doi.org\/10.1080\/02664763.2018.1452901","journal-title":"J Appl Stat"},{"key":"1585_CR4","doi-asserted-by":"publisher","DOI":"10.1002\/047134608X.W8382","author":"T Andrade","year":"2019","unstructured":"Andrade T, Gama J, Ribeiro RP, Sousa W, Carvalho A (2019) Anomaly detection in sequential data: principles and case studies. Wiley Encycl Electr Electron Eng. https:\/\/doi.org\/10.1002\/047134608X.W8382","journal-title":"Wiley Encycl Electr Electron Eng"},{"issue":"3","key":"1585_CR5","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/S0167-9473(99)00101-2","volume":"34","author":"N Billor","year":"2000","unstructured":"Billor N, Hadi AS, Velleman PF (2000) Bacon: blocked adaptive computationally efficient outlier nominators. Comput Stats Data Anal 34(3):279\u2013298. https:\/\/doi.org\/10.1016\/S0167-9473(99)00101-2","journal-title":"Comput Stats Data Anal"},{"issue":"4","key":"1585_CR6","doi-asserted-by":"publisher","first-page":"3433","DOI":"10.1109\/LRA.2019.2928202","volume":"4","author":"C Blaiotta","year":"2019","unstructured":"Blaiotta C (2019) Learning generative socially aware models of pedestrian motion. IEEE Robot Autom Lett 4(4):3433\u20133440. https:\/\/doi.org\/10.1109\/LRA.2019.2928202","journal-title":"IEEE Robot Autom Lett"},{"key":"1585_CR7","doi-asserted-by":"publisher","unstructured":"Breunig MM, Kriegel HP, Ng RT, Sander J (2000) LOF: identifying density based local outliers. In: Proceedings of ACM SIGMOD 2000 international conference on management of data 29(2): 1\u201312. https:\/\/doi.org\/10.1145\/342009.335388","DOI":"10.1145\/342009.335388"},{"key":"1585_CR8","doi-asserted-by":"publisher","unstructured":"Cao L, Yang D, Wang Q, Yu Y, Wang J, Rundensteiner, EA (2014) Scalable distance-based outlier detection over high-volume data streams. In: IEEE 30th international conference on data engineering, Chicago, IL, USA, pp 76\u201387. https:\/\/doi.org\/10.1109\/ICDE.2014.6816641","DOI":"10.1109\/ICDE.2014.6816641"},{"issue":"3","key":"1585_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3):1\u201358. https:\/\/doi.org\/10.1145\/1541880.1541882","journal-title":"ACM Comput Surv"},{"issue":"1","key":"1585_CR10","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) SMOTE: synthetic minority over-sampling technique. J Artif Intell Res 16(1):321\u2013357. https:\/\/doi.org\/10.1613\/jair.953","journal-title":"J Artif Intell Res"},{"key":"1585_CR11","unstructured":"Dua D, Graff C (2019) UCI machine learning repository http:\/\/archive.ics.uci.edu\/ml. Irvine, CA: University of California, School of Information and Computer Science"},{"key":"1585_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-1-4615-0953-0_4","volume-title":"Applications of data mining in computer security. Advances in information security","author":"E Eskin","year":"2002","unstructured":"Eskin E, Arnold A, Prerau M, Portnoy L, Stolfo S (2002) A geometric framework for unsupervised anomaly detection. In: Barbar\u00e1 D, Jajodia S (eds) Applications of data mining in computer security. Advances in information security. Springer, Boston, pp 77\u2013101. https:\/\/doi.org\/10.1007\/978-1-4615-0953-0_4"},{"issue":"9","key":"1585_CR13","first-page":"38","volume":"34","author":"M Esmaeili","year":"2011","unstructured":"Esmaeili M, Almadan A (2011) Stream data mining and anomaly detection. Int J Comput Appl 34(9):38\u201341","journal-title":"Int J Comput Appl"},{"key":"1585_CR14","doi-asserted-by":"publisher","unstructured":"Guigou F, Collet P, Parrend P (2017) Anomaly detection and motif discovery in symbolic representations of time series, https:\/\/doi.org\/10.13140\/RG.2.2.20158.69447","DOI":"10.13140\/RG.2.2.20158.69447"},{"issue":"9","key":"1585_CR15","doi-asserted-by":"publisher","first-page":"2250","DOI":"10.1109\/TKDE.2013.184","volume":"26","author":"M Gupta","year":"2014","unstructured":"Gupta M, Gao J, Aggarwal CC, Han J (2014) Outlier detection for temporal data: a survey. IEEE Trans Knowl Data Eng 26(9):2250\u20132267. https:\/\/doi.org\/10.1109\/TKDE.2013.184","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1585_CR16","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/3-540-46145-0_17","volume-title":"Data warehousing and knowledge discovery. Lecture notes in computer science","author":"S Hawkins","year":"2002","unstructured":"Hawkins S, He H, Williams G, Baxter R (2002) Outlier detection using replicator neural networks. In: Kambayashi Y, Winiwarter W, Arikawa M (eds) Data warehousing and knowledge discovery. Lecture notes in computer science, vol 2454. Springer, Berlin, pp 170\u2013180. https:\/\/doi.org\/10.1007\/3-540-46145-0_17"},{"issue":"9\u201310","key":"1585_CR17","doi-asserted-by":"publisher","first-page":"1641","DOI":"10.1016\/S0167-8655(03)00003-5","volume":"24","author":"ZY He","year":"2003","unstructured":"He ZY, Xu XF, Deng SC (2003) Discovering cluster-based local outliers. Pattern Recogn Lett 24(9\u201310):1641\u20131650. https:\/\/doi.org\/10.1016\/S0167-8655(03)00003-5","journal-title":"Pattern Recogn Lett"},{"key":"1585_CR18","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.chemolab.2016.07.004","volume":"157","author":"R Huerta","year":"2016","unstructured":"Huerta R, Mosqueiro T, Fonollosa J, Rulkov FN, Rodriguez-Lujan I (2016) Online decorrelation of humidity and temperature in chemical sensors for continuous monitoring. Chemom Intell Lab Syst 157:169\u2013176. https:\/\/doi.org\/10.1016\/j.chemolab.2016.07.004","journal-title":"Chemom Intell Lab Syst"},{"key":"1585_CR19","doi-asserted-by":"publisher","unstructured":"Karimian SH, Kelarestaghi M, Hashemi S (2012) I-IncLOF: improved incremental local outlier detection for data streams. In: Proceedings of the 16th CSI international symposium on artificial intelligence and signal. Shiraz, Fars, pp 023\u2013028. https:\/\/doi.org\/10.1109\/AISP.2012.6313711","DOI":"10.1109\/AISP.2012.6313711"},{"key":"1585_CR20","first-page":"392","volume-title":"Algorithms for mining distance-based outliers in large data sets","author":"E Knorr","year":"1998","unstructured":"Knorr E, Ng R (1998) Algorithms for mining distance-based outliers in large data sets. VLDB, Morgan Kaufmann, Burlington, pp 392\u2013403"},{"key":"1585_CR21","doi-asserted-by":"publisher","unstructured":"Kontaki M, Gounaris A, Papadopoulos AN, Tsichlas K, Manolopoulos Y (2011) Continuous monitoring of distance-based outliers over data streams. In: IEEE 27th international conference on data engineering, Hannover, Germany, pp 135\u2013146. https:\/\/doi.org\/10.1109\/ICDE.2011.5767923","DOI":"10.1109\/ICDE.2011.5767923"},{"key":"1585_CR22","doi-asserted-by":"publisher","unstructured":"Kriegel HP, Kroger P, Schubert E, Zimek A (2009) LoOP: local outlier probabilities. In: Proceedings of the 18th ACM conference on information and knowledge management. Hong Kong, China, pp 1649\u20131652. https:\/\/doi.org\/10.1145\/1645953.1646195","DOI":"10.1145\/1645953.1646195"},{"issue":"3\/4","key":"1585_CR23","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1504\/IJISTA.2006.009914","volume":"1","author":"LJ Latecki","year":"2006","unstructured":"Latecki LJ, Miezianko R, Megalooikonomou V, Pokrajac D (2006) Using spatiotemporal blocks to reduce the uncertainty in detecting and tracking moving objects in video. Int J Intell Syst Technol Appl 1(3\/4):376\u2013392. https:\/\/doi.org\/10.1504\/IJISTA.2006.009914","journal-title":"Int J Intell Syst Technol Appl"},{"key":"1585_CR24","doi-asserted-by":"publisher","unstructured":"Lazarevic A, Kumar V (2005) Feature bagging for outlier detection. In: Eleventh ACM SIGKDD international conference on knowledge discovery in data mining. ACM, New York, United States, pp 157\u2013166. https:\/\/doi.org\/10.1145\/1081870.1081891","DOI":"10.1145\/1081870.1081891"},{"issue":"7","key":"1585_CR25","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.1016\/j.jprocont.2011.06.004","volume":"21","author":"J Lee","year":"2011","unstructured":"Lee J, Kang B, Kang SH (2011) Integrating independent component analysis and local outlier factor for plant-wide process monitoring. J Process Control 21(7):1011\u20131021. https:\/\/doi.org\/10.1016\/j.jprocont.2011.06.004","journal-title":"J Process Control"},{"issue":"09","key":"1585_CR26","doi-asserted-by":"publisher","first-page":"1756","DOI":"10.16383\/j.aas.c180425","volume":"45","author":"F Liu","year":"2019","unstructured":"Liu F, Qi JP, Yu YW, Cao L, Zhao JD (2019) A fast algorithm for density-based top-n local outlier detection. ACTA Autom Sin 45(09):1756\u20131771. https:\/\/doi.org\/10.16383\/j.aas.c180425","journal-title":"ACTA Autom Sin"},{"key":"1585_CR27","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.knosys.2013.07.005","volume":"51","author":"J Liu","year":"2013","unstructured":"Liu J, Deng HF (2013) Outlier detection on uncertain data based on local information. Knowl Based Syst 51:60\u201371. https:\/\/doi.org\/10.1016\/j.knosys.2013.07.005","journal-title":"Knowl Based Syst"},{"issue":"6","key":"1585_CR28","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1016\/j.camwa.2008.10.060","volume":"57","author":"X Liu","year":"2009","unstructured":"Liu X, Guan J, Hu P (2009) Mining frequent closed itemsets from a landmark window over online data streams. Comput Math Appl 57(6):927\u2013936. https:\/\/doi.org\/10.1016\/j.camwa.2008.10.060","journal-title":"Comput Math Appl"},{"issue":"8","key":"1585_CR29","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1109\/34.946990","volume":"23","author":"G Medioni","year":"2001","unstructured":"Medioni G, Cohen I, Hongeng S, Bremond F, Nevatia R (2001) Event detection and analysis from video streams. IEEE Trans Pattern Anal Mach Intell 23(8):873\u2013889. https:\/\/doi.org\/10.1109\/34.946990","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"18","key":"1585_CR30","doi-asserted-by":"publisher","first-page":"4203","DOI":"10.1002\/sec.1335","volume":"8","author":"N Paulauskas","year":"2015","unstructured":"Paulauskas N, Bagdonas AF (2015) Local outlier factor use for the network flow anomaly detection. Secur Commun Networks 8(18):4203\u20134212. https:\/\/doi.org\/10.1002\/sec.1335","journal-title":"Secur Commun Networks"},{"key":"1585_CR31","doi-asserted-by":"publisher","unstructured":"Pokrajac D, Lazarevic A, Latecki LJ (2007) Incremental local outlier detection for data streams. In: IEEE symposium on computational intelligence and data mining. Honolulu, HI, pp 504\u2013515. https:\/\/doi.org\/10.1109\/CIDM.2007.368917","DOI":"10.1109\/CIDM.2007.368917"},{"issue":"3","key":"1585_CR32","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1023\/A:1007601015854","volume":"42","author":"F Provost","year":"2001","unstructured":"Provost F, Fawcett T (2001) Robust classification for imprecise environments. Mach Learn 42(3):203\u2013231. https:\/\/doi.org\/10.1023\/A:1007601015854","journal-title":"Mach Learn"},{"issue":"1","key":"1585_CR33","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s10994-016-5584-6","volume":"105","author":"RP Ribeiro","year":"2016","unstructured":"Ribeiro RP, Pereira P, Gama J (2016) Sequential anomalies: a study in the Railway Industry. Mach Learn 105(1):127\u2013153. https:\/\/doi.org\/10.1007\/s10994-016-5584-6","journal-title":"Mach Learn"},{"issue":"12","key":"1585_CR34","doi-asserted-by":"publisher","first-page":"3246","DOI":"10.1109\/TKDE.2016.2597833","volume":"28","author":"M Salehi","year":"2016","unstructured":"Salehi M, Leckie C, Bezdek JC, Vaithianathan T, Zhang X (2016) Fast memory efficient local outlier detection in data streams. IEEE Trans Knowl Data Eng 28(12):3246\u20133260. https:\/\/doi.org\/10.1109\/TKDE.2016.2597833","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1585_CR35","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/978-3-319-06605-9_38","volume-title":"Advances in knowledge discovery and data mining. Lecture notes in computer science","author":"M Salehi","year":"2014","unstructured":"Salehi M, Leckie CA, Moshtaghi M, Vaithianathan T (2014) A relevance weighted ensemble model for anomaly detection in switching data streams. In: Tseng VS, Ho TB, Zhou ZH, Chen ALP, Kao HY (eds) Advances in knowledge discovery and data mining. Lecture notes in computer science, vol 8444. Springer, Cham, pp 461\u2013473. https:\/\/doi.org\/10.1007\/978-3-319-06605-9_38"},{"issue":"1","key":"1585_CR36","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/s10618-012-0300-z","volume":"28","author":"E Schubert","year":"2014","unstructured":"Schubert E, Zimek A, Kriegel HP (2014) Local outlier detection reconsidered: a generalized view on locality with applications to spatial, video, and network outlier detection. Data Min Knowl Disc 28(1):190\u2013237. https:\/\/doi.org\/10.1007\/s10618-012-0300-z","journal-title":"Data Min Knowl Disc"},{"key":"1585_CR37","doi-asserted-by":"publisher","unstructured":"Sun P, Chawla S (2004) On local spatial outliers. In: International conference on data mining. Brighton, UK, pp 209\u2013216. https:\/\/doi.org\/10.1109\/ICDM.2004.10097","DOI":"10.1109\/ICDM.2004.10097"},{"key":"1585_CR38","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/3-540-47887-6_53","volume-title":"Advances in knowledge discovery and data mining. Lecture notes in computer science","author":"J Tang","year":"2002","unstructured":"Tang J, Chen Z, Fu A, Cheung D (2002) Enhancing effectiveness of outlier detections for low density patterns. In: Chen MS, Yu PS, Liu B (eds) Advances in knowledge discovery and data mining. Lecture notes in computer science, vol 2336. Springer, Berlin, pp 535\u2013548. https:\/\/doi.org\/10.1007\/3-540-47887-6_53"},{"issue":"1","key":"1585_CR39","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10851-006-9000-x","volume":"39","author":"J Xu","year":"2007","unstructured":"Xu J, Sung AH, Liu Q (2007) Behaviour mining for fraud detection. J Res Pract Inf 39(1):3\u201318. https:\/\/doi.org\/10.1007\/s10851-006-9000-x","journal-title":"J Res Pract Inf"},{"key":"1585_CR40","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1023\/B:DAMI.0000023676.72185.7c","volume":"8","author":"K Yamanishi","year":"2000","unstructured":"Yamanishi K, Takeuchi J, Williams G, Milne P (2000) Online unsupervised outlier detection using finite mixtures with discounting learning algorithms. Data Min Knowl Disc 8:275\u2013300. https:\/\/doi.org\/10.1023\/B:DAMI.0000023676.72185.7c","journal-title":"Data Min Knowl Disc"},{"issue":"4","key":"1585_CR41","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s101150200013","volume":"4","author":"D Yu","year":"2002","unstructured":"Yu D, Sheikholeslami G, Zhang A (2002) FindOut: finding outliers in very large datasets. Knowl Inf Syst 4(4):387\u2013412. https:\/\/doi.org\/10.1007\/s101150200013","journal-title":"Knowl Inf Syst"},{"issue":"3","key":"1585_CR42","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s10115-005-0197-6","volume":"9","author":"JX Yu","year":"2006","unstructured":"Yu JX, Qian W, Lu H, Zhou A (2006) Finding centric local outliers in categorical\/numerical spaces. Knowl Inf Syst 9(3):309\u2013338. https:\/\/doi.org\/10.1007\/s10115-005-0197-6","journal-title":"Knowl Inf Syst"},{"issue":"10","key":"1585_CR43","doi-asserted-by":"publisher","first-page":"131","DOI":"10.3778\/j.issn.1002-8331.2011.10.037","volume":"47","author":"GL Zhang","year":"2011","unstructured":"Zhang GL, Lei JS (2011) Characteristics of data stream mining for frequent pattern based on landmark window. Comput Eng Appl 47(10):131\u2013134. https:\/\/doi.org\/10.3778\/j.issn.1002-8331.2011.10.037","journal-title":"Comput Eng Appl"},{"key":"1585_CR44","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1007\/978-3-642-01307-2_84","volume-title":"Advances in knowledge discovery and data mining. Lecture notes in computer science","author":"K Zhang","year":"2009","unstructured":"Zhang K, Hutter M, Jin HD (2009) A new local distance-based outlier detection approach for scattered real-world data. In: Theeramunkong T, Kijsirikul B, Cercone N, Ho TB (eds) Advances in knowledge discovery and data mining. Lecture notes in computer science, vol 5476. Springer, Berlin, pp 813\u2013822. https:\/\/doi.org\/10.1007\/978-3-642-01307-2_84"},{"issue":"3","key":"1585_CR45","first-page":"355","volume":"49","author":"Y Zhang","year":"2007","unstructured":"Zhang Y, Meratnia N, Havinga P (2007) A taxonomy framework for unsupervised outlier detection techniques for multi-type data sets. Computer 49(3):355\u2013363","journal-title":"Computer"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-021-01585-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-021-01585-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-021-01585-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T10:03:26Z","timestamp":1626602606000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-021-01585-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,21]]},"references-count":45,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["1585"],"URL":"https:\/\/doi.org\/10.1007\/s10115-021-01585-1","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"type":"print","value":"0219-1377"},{"type":"electronic","value":"0219-3116"}],"subject":[],"published":{"date-parts":[[2021,6,21]]},"assertion":[{"value":"10 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare they have no financial interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}