{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:25:27Z","timestamp":1772119527542,"version":"3.50.1"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T00:00:00Z","timestamp":1738800000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T00:00:00Z","timestamp":1738800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s10115-024-02327-9","type":"journal-article","created":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T22:42:23Z","timestamp":1738795343000},"page":"4459-4486","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Unleashing the power of indirect attacks against trust prediction via preferential path"],"prefix":"10.1007","volume":"67","author":[{"given":"Yu","family":"Bu","sequence":"first","affiliation":[]},{"given":"Yulin","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Longling","family":"Geng","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,6]]},"reference":[{"issue":"3","key":"2327_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2956185","volume":"49","author":"J Tang","year":"2016","unstructured":"Tang J, Chang Y, Aggarwal C, Liu H (2016) A survey of signed network mining in social media. ACM Comput Surv 49(3):1\u201337. https:\/\/doi.org\/10.1145\/2956185","journal-title":"ACM Comput Surv"},{"key":"2327_CR2","doi-asserted-by":"publisher","unstructured":"Leskovec J, Huttenlocher D, Kleinberg J (2010) Signed networks in social media. In: Proceedings of the SIGCHI conference on human factors in computing systems, pp 1361\u20131370. https:\/\/doi.org\/10.1145\/1753326.1753532","DOI":"10.1145\/1753326.1753532"},{"key":"2327_CR3","unstructured":"Kunegis J (2014) Applications of structural balance in signed social networks. arXiv preprint arXiv:1402.6865"},{"key":"2327_CR4","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1162\/tacl_a_00184","volume":"2","author":"R West","year":"2014","unstructured":"West R, Paskov HS, Leskovec J, Potts C (2014) Exploiting social network structure for person-to-person sentiment analysis. Trans Assoc Comput Linguist 2:297\u2013310. https:\/\/doi.org\/10.1162\/tacl_a_00184","journal-title":"Trans Assoc Comput Linguist"},{"issue":"1","key":"2327_CR5","doi-asserted-by":"publisher","first-page":"115","DOI":"10.3390\/sym13010115","volume":"13","author":"Y Jing","year":"2021","unstructured":"Jing Y, Wang H, Shao K, Huo X (2021) Relation representation learning via signed graph mutual information maximization for trust prediction. Symmetry 13(1):115. https:\/\/doi.org\/10.3390\/sym13010115","journal-title":"Symmetry"},{"key":"2327_CR6","doi-asserted-by":"publisher","first-page":"286","DOI":"10.3389\/fphy.2020.00286","volume":"8","author":"N Vallarano","year":"2020","unstructured":"Vallarano N, Tessone CJ, Squartini T (2020) Bitcoin transaction networks: an overview of recent results. Front Phys 8:286. https:\/\/doi.org\/10.3389\/fphy.2020.00286","journal-title":"Front Phys"},{"key":"2327_CR7","doi-asserted-by":"publisher","unstructured":"Evans DS (2014) Economic aspects of Bitcoin and other decentralized public-ledger currency platforms. University of Chicago Coase-Sandor Institute for Law Economics Research Paper (685). https:\/\/doi.org\/10.2139\/ssrn.2424516","DOI":"10.2139\/ssrn.2424516"},{"key":"2327_CR8","doi-asserted-by":"publisher","unstructured":"Wijaya DA (2016) Extending asset management system functionality in bitcoin platform. In: 2016 international conference on computer, control, informatics and its applications (IC3INA). IEEE, pp 97\u2013101. https:\/\/doi.org\/10.1109\/ic3ina.2016.7863031","DOI":"10.1109\/ic3ina.2016.7863031"},{"issue":"6","key":"2327_CR9","doi-asserted-by":"publisher","first-page":"3829","DOI":"10.1007\/s10586-022-03617-z","volume":"25","author":"G Jethava","year":"2022","unstructured":"Jethava G, Rao UP (2022) A novel trust prediction approach for online social networks based on multifaceted feature similarity. Cluster Comput 25(6):3829\u20133843. https:\/\/doi.org\/10.1007\/s10586-022-03617-z","journal-title":"Cluster Comput"},{"issue":"8","key":"2327_CR10","doi-asserted-by":"publisher","first-page":"9615","DOI":"10.1007\/s13369-021-06332-w","volume":"47","author":"G Jethava","year":"2022","unstructured":"Jethava G, Rao UP (2022) An interaction-based and graph-based hybrid approach to evaluate Trust in Online Social Networks (OSNs). Arab J Sci Eng 47(8):9615\u20139628. https:\/\/doi.org\/10.1007\/s13369-021-06332-w","journal-title":"Arab J Sci Eng"},{"key":"2327_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103790","author":"G Jethava","year":"2024","unstructured":"Jethava G, Rao UP (2024) Exploring security and trust mechanisms in online social networks: an extensive review. Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2024.103790","journal-title":"Comput Secur"},{"key":"2327_CR12","doi-asserted-by":"publisher","unstructured":"Kumar S, Spezzano F, Subrahmanian VS, Faloutsos C (2016) Edge weight prediction in weighted signed networks. In: 2016 IEEE 16th international conference on data mining (ICDM). IEEE, pp 221\u2013230. https:\/\/doi.org\/10.1109\/icdm.2016.0033","DOI":"10.1109\/icdm.2016.0033"},{"key":"2327_CR13","doi-asserted-by":"publisher","unstructured":"Kumar S, Hooi B, Makhija D, Kumar M, Faloutsos C, Subrahmanian VS (2018) Rev2: fraudulent user prediction in rating platforms. In: Proceedings of the Eleventh ACM international conference on web search and data mining, pp 333\u2013341. https:\/\/doi.org\/10.1145\/3159652.3159729","DOI":"10.1145\/3159652.3159729"},{"key":"2327_CR14","doi-asserted-by":"crossref","unstructured":"Lin D, Wu J, Fu Q, Zheng Z, Chen T (2023) RiskProp: account risk rating on ethereum via de-anonymous score and network propagation. arXiv preprint arXiv:2301.00354","DOI":"10.1109\/TDSC.2024.3475825"},{"key":"2327_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2023.3263382","author":"Q Fu","year":"2023","unstructured":"Fu Q, Lin D, Wu J, Zheng Z (2023) A general framework for account risk rating on Ethereum: toward safer blockchain technology. IEEE Trans Comput Soc Syst. https:\/\/doi.org\/10.1109\/tcss.2023.3263382","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"2327_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2022.3201243","author":"L Sun","year":"2022","unstructured":"Sun L, Dou Y, Yang C, Zhang K, Wang J, Philip SY, Li B (2022) Adversarial attack and defense on graph data: a survey. IEEE Trans Knowl Data Eng. https:\/\/doi.org\/10.1109\/tkde.2022.3201243","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2327_CR17","doi-asserted-by":"crossref","unstructured":"Lizurej T, Michalak T, Dziembowski S (2023) On manipulating weight predictions in signed weighted networks. arXiv preprint arXiv:2302.02687","DOI":"10.1609\/aaai.v37i4.25652"},{"key":"2327_CR18","doi-asserted-by":"publisher","unstructured":"Bu Y, Zhu Y, Geng L, Zhou K (2024) Uncovering strong ties: a study of indirect Sybil attack on signed social network. In: ICASSP 2024-2024 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 4535\u20134539. https:\/\/doi.org\/10.1109\/icassp48485.2024.10447587","DOI":"10.1109\/icassp48485.2024.10447587"},{"key":"2327_CR19","doi-asserted-by":"publisher","unstructured":"Douceur JR (2002) The Sybil attack. In: International workshop on peer-to-peer systems. Springer Berlin Heidelberg, Berlin, Heidelberg, pp 251\u2013260. https:\/\/doi.org\/10.1007\/3-540-45748-8_24","DOI":"10.1007\/3-540-45748-8_24"},{"key":"2327_CR20","doi-asserted-by":"publisher","unstructured":"Piro C, Shields C, Levine BN (2006) Detecting the Sybil attack in mobile ad hoc networks. In: 2006 Securecomm and workshops. IEEE, pp 1\u201311. https:\/\/doi.org\/10.1109\/seccomw.2006.359558","DOI":"10.1109\/seccomw.2006.359558"},{"key":"2327_CR21","doi-asserted-by":"publisher","unstructured":"Yu H, Kaminsky M, Gibbons PB, Flaxman A (2006, August) Sybilguard: defending against Sybil attacks via social networks. In: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, pp 267\u2013278. https:\/\/doi.org\/10.1145\/1159913.1159945","DOI":"10.1145\/1159913.1159945"},{"key":"2327_CR22","doi-asserted-by":"publisher","unstructured":"Mohaisen A, Kim J (2013) The sybil attacks and defenses: a survey. arXiv preprint arXiv:1312.6349. https:\/\/doi.org\/10.6029\/smartcr.2013.06.009","DOI":"10.6029\/smartcr.2013.06.009"},{"key":"2327_CR23","doi-asserted-by":"publisher","unstructured":"Kleinberg JM (1998) Authoritative sources in a hyperlinked environment. In: SODA, vol 98, pp 668\u2013677. https:\/\/doi.org\/10.1515\/9781400841356.514","DOI":"10.1515\/9781400841356.514"},{"key":"2327_CR24","doi-asserted-by":"publisher","unstructured":"Mishra A, Bhattacharya A (2011) Finding the bias and prestige of nodes in networks based on trust scores. In: Proceedings of the 20th international conference on World wide web, pp 567\u2013576. https:\/\/doi.org\/10.1145\/1963405.1963485","DOI":"10.1145\/1963405.1963485"},{"key":"2327_CR25","doi-asserted-by":"publisher","unstructured":"Li RH, Xu Yu J, Huang X, Cheng H (2012) Robust reputation-based ranking on bipartite rating networks. In: Proceedings of the 2012 SIAM international conference on data mining. Society for Industrial and Applied Mathematics, pp 612\u2013623. https:\/\/doi.org\/10.1137\/1.9781611972825.53","DOI":"10.1137\/1.9781611972825.53"},{"key":"2327_CR26","doi-asserted-by":"publisher","unstructured":"Akoglu L, Chandy R, Faloutsos C (2013) Opinion fraud detection in online reviews by network effects. In: Proceedings of the international AAAI conference on web and social media, vol 7, No. 1, pp 2\u201311. https:\/\/doi.org\/10.1609\/icwsm.v7i1.14380","DOI":"10.1609\/icwsm.v7i1.14380"},{"issue":"1","key":"2327_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-014-0172-x","volume":"4","author":"M Shahriari","year":"2014","unstructured":"Shahriari M, Jalili M (2014) Ranking nodes in signed social networks. Soc Netw Anal Min 4(1):1\u201312. https:\/\/doi.org\/10.1007\/s13278-014-0172-x","journal-title":"Soc Netw Anal Min"},{"key":"2327_CR28","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-642-16567-2_14","volume":"2010","author":"V Traag","year":"2010","unstructured":"Traag V, Nesterov Y, Van Dooren P (2010) Exponential ranking: taking into account negative links. Soc Inform 2010:192\u2013202. https:\/\/doi.org\/10.1007\/978-3-642-16567-2_14","journal-title":"Soc Inform"},{"key":"2327_CR29","doi-asserted-by":"publisher","unstructured":"Wu Z, Aggarwal CC, Sun J (2016) The troll-trust model for ranking in signed networks. In: Proceedings of the ninth ACM international conference on web search and data mining, pp 447\u2013456. https:\/\/doi.org\/10.1145\/2835776.2835816","DOI":"10.1145\/2835776.2835816"},{"key":"2327_CR30","doi-asserted-by":"publisher","unstructured":"Leskovec J, Huttenlocher D, Kleinberg J (2010) Signed networks in social media. In: Proceedings of the SIGCHI conference on human factors in computing systems, pp 1361\u20131370. https:\/\/doi.org\/10.1145\/1753326.1753532","DOI":"10.1145\/1753326.1753532"},{"key":"2327_CR31","doi-asserted-by":"publisher","unstructured":"Yang SH, Smola AJ, Long B, Zha H, Chang Y (2012, August) Friend or frenemy? Predicting signed ties in social networks. In: Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval, pp 555\u2013564. https:\/\/doi.org\/10.1145\/2348283.2348359","DOI":"10.1145\/2348283.2348359"},{"key":"2327_CR32","doi-asserted-by":"publisher","unstructured":"Wang Y, Wang X, Tang J, Zuo W, Cai G (2015) Modeling status theory in trust prediction. In: Proceedings of the AAAI conference on artificial intelligence, vol 29, no. 1. https:\/\/doi.org\/10.1609\/aaai.v29i1.9460","DOI":"10.1609\/aaai.v29i1.9460"},{"key":"2327_CR33","doi-asserted-by":"publisher","unstructured":"Guha R, Kumar R, Raghavan P, Tomkins A (2004) Propagation of trust and distrust. In: Proceedings of the 13th international conference on world wide web, pp 403\u2013412. https:\/\/doi.org\/10.1145\/988672.988727","DOI":"10.1145\/988672.988727"},{"key":"2327_CR34","doi-asserted-by":"publisher","unstructured":"Lee W, Lee YC, Lee D, Kim SW (2021) Look before you leap: confirming edge signs in random walk with restart for personalized node ranking in signed networks. In: Proceedings of the 44th international ACM SIGIR conference on research and development in information retrieval, pp 143\u2013152. https:\/\/doi.org\/10.1145\/3404835.3462923","DOI":"10.1145\/3404835.3462923"},{"key":"2327_CR35","unstructured":"Knapskog SJ (1998) A metric for trusted systems. In: Proceedings of the 21st National Security Conference. NSA, pp 16\u201329"},{"key":"2327_CR36","doi-asserted-by":"publisher","unstructured":"De Cock M, Da Silva PP (2006) A many valued representation and propagation of trust and distrust. In: Fuzzy logic and applications: 6th international workshop, WILF 2005, Crema, Italy, September 15-17, 2005, Revised Selected Papers 6. Springer Berlin Heidelberg, pp 114\u2013120. https:\/\/doi.org\/10.1007\/11676935_14","DOI":"10.1007\/11676935_14"},{"key":"2327_CR37","unstructured":"Victor P, Cornelis C, De Cock M, Pinheiro da Silva P (2006) Towards a provenance-preserving trust model in agent networks. In: WWW2006 conference proceedings, special interest tracks, posters and workshops"},{"key":"2327_CR38","unstructured":"Dai H, Li H, Tian T, Huang X, Wang L, Zhu J, Song L (2018) Adversarial attack on graph structured data. In: International conference on machine learning. PMLR, pp 1115\u20131124"},{"key":"2327_CR39","doi-asserted-by":"publisher","unstructured":"Wang B, Gong NZ (2019) Attacking graph-based classification via manipulating the graph structure. In: Proceedings of the 2019 ACM SIGSAC conference on computer and communications security, pp 2023\u20132040. https:\/\/doi.org\/10.1145\/3319535.3354206","DOI":"10.1145\/3319535.3354206"},{"key":"2327_CR40","doi-asserted-by":"publisher","unstructured":"Z\u00fcgner D, Akbarnejad A, G\u00fcnnemann S (2018) Adversarial attacks on neural networks for graph data. In: Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery & data mining, pp 2847\u20132856. https:\/\/doi.org\/10.1145\/3219819.3220078","DOI":"10.1145\/3219819.3220078"},{"key":"2327_CR41","unstructured":"Chen J, Wu Y, Xu X, Chen Y, Zheng H, Xuan Q (2018) Fast gradient attack on network embedding. arXiv preprint arXiv:1809.02797"},{"key":"2327_CR42","doi-asserted-by":"crossref","unstructured":"Z\u00fcgner D, G\u00fcnnemann S (2019) Adversarial attacks on graph neural networks via meta learning. In: International conference on learning representations (ICLR). arXiv:1902.08412pdf","DOI":"10.24963\/ijcai.2019\/872"},{"key":"2327_CR43","doi-asserted-by":"publisher","unstructured":"Zhu Y, Lai Y, Zhao K, Luo X, Yuan M, Ren J, Zhou K (2021) Binarizedattack: structural poisoning attacks to graph-based anomaly detection. arXiv preprint arXiv:2106.09989. https:\/\/doi.org\/10.1109\/icde53745.2022.00006","DOI":"10.1109\/icde53745.2022.00006"},{"key":"2327_CR44","doi-asserted-by":"publisher","unstructured":"Taylor M, Guiver J, Robertson S, Minka T (2008) Softrank: optimizing non-smooth rank metrics. In: Proceedings of the 2008 international conference on web search and data mining, pp 77\u201386. https:\/\/doi.org\/10.1145\/1341531.1341544","DOI":"10.1145\/1341531.1341544"},{"key":"2327_CR45","unstructured":"Xi Z, Pang R, Ji S, Wang T (2021) Graph backdoor. In: 30th USENIX Security Symposium (USENIX Security 21), pp 1523\u20131540"},{"key":"2327_CR46","doi-asserted-by":"publisher","unstructured":"Zhang Z, Jia J, Wang B, Gong NZ (2021) Backdoor attacks to graph neural networks. In: Proceedings of the 26th ACM symposium on access control models and technologies, pp 15\u201326. https:\/\/doi.org\/10.1145\/3450569.3463560","DOI":"10.1145\/3450569.3463560"},{"key":"2327_CR47","doi-asserted-by":"publisher","unstructured":"Xu J, Xue M, Picek S (2021) Explainability-based backdoor attacks against graph neural networks. In: Proceedings of the 3rd ACM workshop on wireless security and machine learning, pp 31\u201336. https:\/\/doi.org\/10.1145\/3468218.3469046","DOI":"10.1145\/3468218.3469046"},{"key":"2327_CR48","doi-asserted-by":"publisher","unstructured":"Yang S, Doan BG, Montague P, De Vel O, Abraham T, Camtepe S, Kanhere SS (2022) Transferable graph backdoor attack. In: Proceedings of the 25th international symposium on research in attacks, intrusions and defenses, pp 321\u2013332. https:\/\/doi.org\/10.1145\/3545948.3545976","DOI":"10.1145\/3545948.3545976"},{"key":"2327_CR49","unstructured":"Wu B, Liu L, Zhu Z, Liu Q, He Z, Lyu S (2023) Adversarial machine learning: a systematic survey of backdoor attack, weight attack and adversarial example. arXiv preprint arXiv:2302.09457"},{"key":"2327_CR50","doi-asserted-by":"publisher","unstructured":"Wu H, Wang C, Tyshetskiy Y, Docherty A, Lu K, Zhu L (2019) Adversarial examples on graph data: deep insights into attack and defense. arXiv preprint arXiv:1903.01610. https:\/\/doi.org\/10.24963\/ijcai.2019\/669","DOI":"10.24963\/ijcai.2019\/669"},{"issue":"7","key":"2327_CR51","doi-asserted-by":"publisher","first-page":"2578","DOI":"10.1109\/tnnls.2019.2933524","volume":"31","author":"J Zhang","year":"2019","unstructured":"Zhang J, Li C (2019) Adversarial examples: opportunities and challenges. IEEE Trans Neural Netw Learn Syst 31(7):2578\u20132593. https:\/\/doi.org\/10.1109\/tnnls.2019.2933524","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"2327_CR52","doi-asserted-by":"publisher","unstructured":"Xiao C, Li B, Zhu JY, He W, Liu M, Song D (2018) Generating adversarial examples with adversarial networks. arXiv preprint arXiv:1801.02610. https:\/\/doi.org\/10.24963\/ijcai.2018\/543","DOI":"10.24963\/ijcai.2018\/543"},{"key":"2327_CR53","doi-asserted-by":"publisher","unstructured":"Malik S, Dedeoglu V, Kanhere SS, Jurdak R (2019, July) Trustchain: Trust management in blockchain and iot supported supply chains. In: 2019 IEEE international conference on blockchain (blockchain). IEEE, pp 184\u2013193. https:\/\/doi.org\/10.1109\/blockchain.2019.00032","DOI":"10.1109\/blockchain.2019.00032"},{"key":"2327_CR54","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1016\/j.future.2017.08.048","volume":"107","author":"P Otte","year":"2020","unstructured":"Otte P, de Vos M, Pouwelse J (2020) TrustChain: a Sybil-resistant scalable blockchain. Future Gener Comput Syst 107:770\u2013780. https:\/\/doi.org\/10.1016\/j.future.2017.08.048","journal-title":"Future Gener Comput Syst"},{"issue":"1","key":"2327_CR55","doi-asserted-by":"publisher","first-page":"115","DOI":"10.25300\/MISQ\/2017\/41.1.06","volume":"41","author":"R Bapna","year":"2017","unstructured":"Bapna R, Gupta A, Rice S, Sundararajan A (2017) Trust and the strength of ties in online social networks. MIS Q 41(1):115\u2013130","journal-title":"MIS Q"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-024-02327-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-024-02327-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-024-02327-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T23:42:54Z","timestamp":1744414974000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-024-02327-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,6]]},"references-count":55,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["2327"],"URL":"https:\/\/doi.org\/10.1007\/s10115-024-02327-9","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3511555\/v1","asserted-by":"object"}]},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,6]]},"assertion":[{"value":"30 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 February 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}