{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T01:38:46Z","timestamp":1778290726148,"version":"3.51.4"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T00:00:00Z","timestamp":1756944000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T00:00:00Z","timestamp":1756944000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s10115-025-02580-6","type":"journal-article","created":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T10:03:06Z","timestamp":1756980186000},"page":"11903-11953","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Revolutionising anomaly detection: a hybrid framework for anomaly detection integrating isolation forest, autoencoder, and Conv. LSTM"],"prefix":"10.1007","volume":"67","author":[{"given":"Ankit","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Abhishek","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Rohit","family":"Raja","sequence":"additional","affiliation":[]},{"given":"Amit Kumar","family":"Dewangan","sequence":"additional","affiliation":[]},{"given":"Manoj","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Aradhana","family":"Soni","sequence":"additional","affiliation":[]},{"given":"Dheeraj","family":"Agarwal","sequence":"additional","affiliation":[]},{"given":"Abdul Khader Jilani","family":"Saudagar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,4]]},"reference":[{"issue":"4","key":"2580_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0152173","volume":"11","author":"M Goldstein","year":"2016","unstructured":"Goldstein M, Uchida S (2016) A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PLoS ONE 11(4):1\u201331","journal-title":"PLoS ONE"},{"key":"2580_CR2","doi-asserted-by":"crossref","unstructured":"Liu FT, Ting KM, Zhou ZH (2008) Isolation forest. In: Proc. 8th IEEE Int. Conf. Data Mining (ICDM), Pisa, Italy, Dec. pp. 413\u2013422","DOI":"10.1109\/ICDM.2008.17"},{"key":"2580_CR3","first-page":"38371","volume":"7","author":"H Li","year":"2019","unstructured":"Li H, Ma J, Zhang X (2019) Intrusion detection using deep learning in cybersecurity. IEEE Access 7:38371\u201338378","journal-title":"IEEE Access"},{"issue":"11","key":"2580_CR4","first-page":"2753","volume":"28","author":"Y Zhai","year":"2016","unstructured":"Zhai Y, Cheng H, Zhang H (2016) Outlier detection based on clustering: a survey. IEEE Trans Knowl Data Eng 28(11):2753\u20132774","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"10","key":"2580_CR5","first-page":"73","volume":"57","author":"N Esfandiari","year":"2019","unstructured":"Esfandiari N, Rashidi M, Hashemi SH (2019) Anomaly detection in large-scale networks using clustering. IEEE Commun Mag 57(10):73\u201378","journal-title":"IEEE Commun Mag"},{"key":"2580_CR6","unstructured":"Hendrycks D, Gimpel K (2017) A Baseline for detecting misclassified and out-of-distribution examples in neural networks. In: Proc. Int. Conf. Learn. Represent. (ICLR), Toulon, France"},{"issue":"8","key":"2580_CR7","first-page":"2672","volume":"31","author":"SS Liu","year":"2020","unstructured":"Liu SS, Liu Y, Wang Y (2020) Efficient learning of deep generative models for anomaly detection. IEEE Trans Neural Netw Learn Syst 31(8):2672\u20132685","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"4","key":"2580_CR8","first-page":"847","volume":"15","author":"J Lin","year":"2019","unstructured":"Lin J, Keogh J, Lonardi S (2019) Visually mining and monitoring massive time series data. IEEE Trans Knowl Data Eng 15(4):847\u2013860","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2580_CR9","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"M Ahmed","year":"2016","unstructured":"Ahmed M, Mahmood AN, Hu J (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19\u201331","journal-title":"J Netw Comput Appl"},{"key":"2580_CR10","first-page":"1","volume":"16","author":"Y Guan","year":"2021","unstructured":"Guan Y et al (2021) Autoencoders for unsupervised anomaly detection in high-dimensional cybersecurity data. IEEE Trans Inf Forensics Secur 16:1\u201312","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2580_CR11","unstructured":"Ruff L et al. (2018) Deep one-class classification. In: Proc. 35th Int. Conf. Mach. Learn. (ICML), Stockholm, Sweden. pp. 4393\u20134402"},{"key":"2580_CR12","first-page":"24610","volume":"8","author":"Y Ren","year":"2020","unstructured":"Ren Y, Lian H, Zhang Y (2020) Anomaly detection based on machine learning algorithms in high-dimensional data. IEEE Access 8:24610\u201324625","journal-title":"IEEE Access"},{"key":"2580_CR13","doi-asserted-by":"publisher","first-page":"1991","DOI":"10.1109\/ACCESS.2018.2886457","volume":"7","author":"M Munir","year":"2018","unstructured":"Munir M, Siddiqui SA, Dengel A, Ahmed S (2018) DeepAnT: a deep learning approach for unsupervised anomaly detection in time series. IEEE Access 7:1991\u20132005","journal-title":"IEEE Access"},{"issue":"3","key":"2580_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3444690","volume":"54","author":"J Bl\u00e1zquez-Garc\u00eda","year":"2021","unstructured":"Bl\u00e1zquez-Garc\u00eda J, Conde A, Mori U, Lozano JA (2021) A review on outlier\/anomaly detection in time series data. ACM Comput Surv 54(3):1\u201333","journal-title":"ACM Comput Surv"},{"issue":"12","key":"2580_CR15","doi-asserted-by":"publisher","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","volume":"51","author":"A Patcha","year":"2017","unstructured":"Patcha A, Park J-M (2017) An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput Netw 51(12):3448\u20133470","journal-title":"Comput Netw"},{"issue":"2","key":"2580_CR16","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2016","unstructured":"Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surveys Tuts 18(2):1153\u20131176","journal-title":"IEEE Commun Surveys Tuts"},{"issue":"8","key":"2580_CR17","first-page":"2686","volume":"31","author":"Y Duan","year":"2020","unstructured":"Duan Y et al (2020) Learning deep generative models for unsupervised anomaly detection. IEEE Trans Neural Netw Learn Syst 31(8):2686\u20132695","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"2580_CR18","first-page":"120296","volume":"229","author":"A Yousri","year":"2023","unstructured":"Yousri A, Elkenawy E-SM, Hassanien AE, Ibrahim A, Aboul Ella AM (2023) Greylag goose optimization: nature-inspired optimization algorithm. Expert Syst Appl 229:120296","journal-title":"Expert Syst Appl"},{"key":"2580_CR19","first-page":"57","volume":"4","author":"E-SM El-Kenawy","year":"2023","unstructured":"El-Kenawy E-SM, Shehab MH, Alhajj R (2023) An AI-based system for predicting renewable energy power output. Int J Intell Netw 4:57\u201366","journal-title":"Int J Intell Netw"},{"issue":"3","key":"2580_CR20","first-page":"127","volume":"16","author":"E-SM El-kenawy","year":"2023","unstructured":"El-kenawy E-SM, Eid MM, Abualigah L (2023) Machine learning in public health forecasting and monitoring the Zika virus. Int J Intell Eng Syst 16(3):127\u2013137","journal-title":"Int J Intell Eng Syst"},{"issue":"24","key":"2580_CR21","doi-asserted-by":"publisher","first-page":"12122","DOI":"10.3390\/app112412122","volume":"11","author":"DA Zebari","year":"2021","unstructured":"Zebari DA, Ibrahim DA, Zeebaree DQ, Mohammed MA, Haron H, Zebari NA, Dama\u0161evi\u010dius R, Maskeli\u016bnas R (2021) Breast cancer detection using mammogram images with improved multi-fractal dimension approach and feature fusion. Appl Sci 11(24):12122. https:\/\/doi.org\/10.3390\/app112412122","journal-title":"Appl Sci"},{"issue":"1","key":"2580_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/08839514.2021.2001177","volume":"36","author":"A Jeyakumar","year":"2022","unstructured":"Jeyakumar A, Esakkirajan S (2022) Systematic review of computing approaches for breast cancer detection based computer-aided diagnosis using mammogram images. Appl Artif Intell 36(1):1\u201327. https:\/\/doi.org\/10.1080\/08839514.2021.2001177","journal-title":"Appl Artif Intell"},{"key":"2580_CR23","doi-asserted-by":"publisher","DOI":"10.52866\/ijcsm.2023.01.01.0014","author":"MA Mohammed","year":"2023","unstructured":"Mohammed MA, Mukhlif AA, Al Khateeb B (2023) Breast cancer images classification using new transfer learning techniques. Iraqi J Comput Sci Math. https:\/\/doi.org\/10.52866\/ijcsm.2023.01.01.0014","journal-title":"Iraqi J Comput Sci Math"},{"issue":"5","key":"2580_CR24","doi-asserted-by":"publisher","first-page":"393","DOI":"10.3390\/aerospace11050393","volume":"11","author":"S Zhou","year":"2024","unstructured":"Zhou S, He Z, Chen X, Chang W (2024) An anomaly detection method for UAV based on wavelet decomposition and stacked denoising autoencoder. Aerospace 11(5):393. https:\/\/doi.org\/10.3390\/aerospace11050393","journal-title":"Aerospace"},{"key":"2580_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2024.3449573","author":"B Tu","year":"2024","unstructured":"Tu B, Yang X, He B, Chen Y, Li J, Plaza A (2024) Anomaly detection in hyperspectral images using adaptive graph frequency location. IEEE Trans Neural Netw Learn Syst. https:\/\/doi.org\/10.1109\/tnnls.2024.3449573","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"3","key":"2580_CR26","doi-asserted-by":"publisher","first-page":"1357","DOI":"10.1109\/TMC.2024.3480983","volume":"24","author":"E Wang","year":"2025","unstructured":"Wang E, Song Z, Wu M, Liu W, Yang B, Yang Y, Wu J (2025) A new data completion perspective on sparse crowdsensing: spatiotemporal evolutionary inference approach. IEEE Trans Mob Comput 24(3):1357\u20131371. https:\/\/doi.org\/10.1109\/TMC.2024.3480983","journal-title":"IEEE Trans Mob Comput"},{"key":"2580_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3481045","author":"W Lin","year":"2024","unstructured":"Lin W, Xia C, Wang T, Zhao Y, Xi L, Zhang S (2024) Input and output matter: malicious traffic detection with explainability. IEEE Netw. https:\/\/doi.org\/10.1109\/MNET.2024.3481045","journal-title":"IEEE Netw"},{"key":"2580_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TGRS.2024.3515648","volume":"63","author":"Z Wang","year":"2025","unstructured":"Wang Z, Wang C, Li X, Xia C, Xu J (2025) Mlp-net: multilayer perceptron fusion network for infrared small target detection. IEEE Trans Geosci Remote Sens 63:1\u201313. https:\/\/doi.org\/10.1109\/TGRS.2024.3515648","journal-title":"IEEE Trans Geosci Remote Sens"},{"key":"2580_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2024.3492054","author":"Y Chen","year":"2024","unstructured":"Chen Y, Li H, Song Y, Zhu X (2024) Recoding hybrid stochastic numbers for preventing bit width accumulation and fault tolerance. IEEE Trans Circuits Syst I Regular Papers. https:\/\/doi.org\/10.1109\/TCSI.2024.3492054","journal-title":"IEEE Trans Circuits Syst I Regular Papers"},{"issue":"2","key":"2580_CR30","doi-asserted-by":"publisher","first-page":"2190","DOI":"10.1109\/TII.2023.3280337","volume":"20","author":"Y Qiao","year":"2024","unstructured":"Qiao Y, L\u00fc J, Wang T, Liu K, Zhang B, Snoussi H (2024) A multihead attention self-supervised representation model for industrial sensors anomaly detection. IEEE Trans Ind Inform 20(2):2190\u20132199. https:\/\/doi.org\/10.1109\/TII.2023.3280337","journal-title":"IEEE Trans Ind Inform"},{"issue":"2","key":"2580_CR31","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1109\/TCSI.2024.3461736","volume":"72","author":"Y Xu","year":"2025","unstructured":"Xu Y, Ding L, He P, Lu Z, Zhang J (2025) META: a memory-efficient tri-stage polynomial multiplication accelerator using 2D coupled-BFUs. IEEE Trans Circuits Syst I Regul Pap 72(2):647\u2013660. https:\/\/doi.org\/10.1109\/TCSI.2024.3461736","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"issue":"3","key":"2580_CR32","doi-asserted-by":"publisher","first-page":"1196","DOI":"10.1109\/TSC.2024.3355188","volume":"17","author":"P Wang","year":"2024","unstructured":"Wang P, Song W, Qi H, Zhou C, Li F, Wang Y, Zhang Q (2024) Server-initiated federated unlearning to eliminate impacts of low-quality data. IEEE Trans Serv Comput 17(3):1196\u20131211. https:\/\/doi.org\/10.1109\/TSC.2024.3355188","journal-title":"IEEE Trans Serv Comput"},{"issue":"8","key":"2580_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3664655","volume":"18","author":"T Li","year":"2024","unstructured":"Li T, Hui S, Zhang S, Wang H, Zhang Y, Hui P, Li Y (2024) Mobile user traffic generation via multi-scale hierarchical GAN. ACM Trans Knowledge Discovery Data 18(8):1\u201319. https:\/\/doi.org\/10.1145\/3664655","journal-title":"ACM Trans Knowledge Discovery Data"},{"key":"2580_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cja.2025.103426","author":"Y Qiao","year":"2025","unstructured":"Qiao Y, Wang T, L\u00fc J, Liu K (2025) TEMPO: Time-evolving multi-period observational anomaly detection method for space probes. Chin J Aeron. https:\/\/doi.org\/10.1016\/j.cja.2025.103426","journal-title":"Chin J Aeron"},{"issue":"6","key":"2580_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-021-0236-9","volume":"16","author":"T Wang","year":"2022","unstructured":"Wang T, Li J, Wu H, Li C, Snoussi H, Wu Y (2022) ResLNet: Deep residual LSTM network with longer input for action recognition. Front Comput Sci 16(6):166334. https:\/\/doi.org\/10.1007\/s11704-021-0236-9","journal-title":"Front Comput Sci"},{"issue":"2","key":"2580_CR36","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/2481244.2481252","volume":"16","author":"C Aggarwal","year":"2020","unstructured":"Aggarwal C (2020) Outlier analysis: methods and applications. ACM SIGKDD Explor Newslett 16(2):49\u201365","journal-title":"ACM SIGKDD Explor Newslett"},{"issue":"1","key":"2580_CR37","first-page":"147","volume":"51","author":"J Zhang","year":"2021","unstructured":"Zhang J, Qin S, Liu Y (2021) Anomaly detection in network traffic using self-supervised learning. IEEE Trans Cybern 51(1):147\u2013157","journal-title":"IEEE Trans Cybern"},{"issue":"1","key":"2580_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TASE.2004.840075","volume":"17","author":"D Wang","year":"2020","unstructured":"Wang D, Huang H (2020) Anomaly detection in sensor networks using machine learning techniques. IEEE Trans Autom Sci Eng 17(1):1\u201313","journal-title":"IEEE Trans Autom Sci Eng"},{"issue":"4","key":"2580_CR39","doi-asserted-by":"publisher","first-page":"1690","DOI":"10.1016\/j.eswa.2013.08.066","volume":"41","author":"G Kim","year":"2019","unstructured":"Kim G, Lee S, Kim S (2019) A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst Appl 41(4):1690\u20131700","journal-title":"Expert Syst Appl"},{"key":"2580_CR40","first-page":"21556","volume":"8","author":"H Akhavan","year":"2020","unstructured":"Akhavan H, Noorbehbahani AC, Bayat M (2020) A novel anomaly detection algorithm using machine learning approaches. IEEE Access 8:21556\u201321569","journal-title":"IEEE Access"},{"key":"2580_CR41","unstructured":"Nandhini M, Arthi R (2019) Anomaly detection for cybersecurity using deep learning techniques. In: Proc. Int. Conf. Soft Comput. Signal Process. (ICSCS), pp. 123\u2013128"},{"issue":"7","key":"2580_CR42","first-page":"174","volume":"54","author":"S Park","year":"2019","unstructured":"Park S, Lee W, Han D (2019) Dynamic trust management scheme for internet of things and smart devices. IEEE Commun Mag 54(7):174\u2013180","journal-title":"IEEE Commun Mag"},{"issue":"11","key":"2580_CR43","first-page":"6063","volume":"15","author":"H Zhang","year":"2019","unstructured":"Zhang H et al (2019) Real-time anomaly detection based on machine learning for streaming data. IEEE Trans Ind Informat 15(11):6063\u20136071","journal-title":"IEEE Trans Ind Informat"},{"key":"2580_CR44","first-page":"295","volume":"93","author":"NM Sultana","year":"2020","unstructured":"Sultana NM, Rizvi AA, Hassan R (2020) Comparative analysis of anomaly detection methods in network intrusion detection systems. J Comput Netw 93:295\u2013306","journal-title":"J Comput Netw"},{"issue":"5","key":"2580_CR45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TSG.2019.2932887","volume":"10","author":"GP Spathis","year":"2019","unstructured":"Spathis GP, Vlachogiannis D (2019) Outlier detection in smart grids using deep learning techniques. IEEE Trans Smart Grid 10(5):1\u20139","journal-title":"IEEE Trans Smart Grid"},{"key":"2580_CR46","first-page":"22122","volume":"9","author":"P Kumari","year":"2021","unstructured":"Kumari P, Tomar S, Gupta K (2021) Security threats and intrusion detection in 5G network using machine learning approaches. IEEE Access 9:22122\u201322139","journal-title":"IEEE Access"},{"key":"2580_CR47","first-page":"20518","volume":"8","author":"AK Bansal","year":"2020","unstructured":"Bansal AK, Sharma S, Bhatia G (2020) A hybrid approach to detect network intrusions using machine learning. IEEE Access 8:20518\u201320533","journal-title":"IEEE Access"},{"issue":"4","key":"2580_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0152173","volume":"11","author":"M Goldstein","year":"2016","unstructured":"Goldstein M, Uchida S (2016) A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PLoS ONE 11(4):1\u201331","journal-title":"PLoS ONE"},{"issue":"2","key":"2580_CR49","first-page":"1","volume":"54","author":"T Chalapathy","year":"2019","unstructured":"Chalapathy T, Chawla S (2019) Deep learning for anomaly detection: a survey. ACM Comput Surv 54(2):1\u201338","journal-title":"ACM Comput Surv"},{"key":"2580_CR50","unstructured":"Malhotra A, Vig L, Shroff P, Shroff G (2015) Long short-term memory networks for anomaly detection in time series. In: Proc. 23rd Euro. Signal Process. Conf. (EUSIPCO), Nice, France, 2015, pp. 1\u20135"},{"issue":"no. 5","key":"2580_CR51","doi-asserted-by":"crossref","first-page":"1307","DOI":"10.1109\/TSP.2018.2889984","volume":"67","author":"N Erichson","year":"2019","unstructured":"Erichson N, Zhang AY, Mahoney MW (2019) Sparse randomized subspace learning for high-dimensional data. IEEE Trans Signal Process 67(5):1307\u20131320","journal-title":"IEEE Trans Signal Process"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-025-02580-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-025-02580-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-025-02580-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T05:07:48Z","timestamp":1763701668000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-025-02580-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,4]]},"references-count":51,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["2580"],"URL":"https:\/\/doi.org\/10.1007\/s10115-025-02580-6","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,4]]},"assertion":[{"value":"13 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Institutional review board statement"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}