{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:15:26Z","timestamp":1767705326841,"version":"3.40.3"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T00:00:00Z","timestamp":1671148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T00:00:00Z","timestamp":1671148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s10207-022-00646-y","type":"journal-article","created":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T10:03:13Z","timestamp":1671184993000},"page":"497-509","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Defense against membership inference attack in graph neural networks through graph perturbation"],"prefix":"10.1007","volume":"22","author":[{"given":"Kai","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jinxia","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Tianqing","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,16]]},"reference":[{"issue":"6","key":"646_CR1","doi-asserted-by":"publisher","first-page":"2962","DOI":"10.1109\/TKDE.2020.3015835","volume":"34","author":"T Zhu","year":"2022","unstructured":"Zhu, T., Li, J., Hu, X., Xiong, P., Zhou, W.: The dynamic privacy-preserving mechanisms for online dynamic social networks. IEEE Trans. Knowl. Data Eng. 34(6), 2962\u20132974 (2022). https:\/\/doi.org\/10.1109\/TKDE.2020.3015835","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"646_CR2","doi-asserted-by":"crossref","unstructured":"Breuer, A., Eilat, R., Weinsberg, U.: Friend or faux: graph-based early detection of fake accounts on social networks. In: Huang, Y., King, I., Liu, T., van Steen, M. (eds.) WWW \u201920: The Web Conference 2020, pp. 1287\u20131297. Taipei, (2020).arxiv:2004.04834","DOI":"10.1145\/3366423.3380204"},{"key":"646_CR3","unstructured":"Velickovic, P., Cucurull, G., Casanova, A., Romero, A., Li\u00f2, P., Bengio, Y.: Graph Attention Networks. In: 6th International Conference on Learning Representations, ICLR 2018, Conference Track Proceedings, Vancouver, (2018).arxiv:1710.10903"},{"issue":"3","key":"646_CR4","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","volume":"29","author":"L Akoglu","year":"2015","unstructured":"Akoglu, L., Tong, H., Koutra, D.: Graph based anomaly detection and description: a survey. Data Min. Knowl. Discov. 29(3), 626\u2013688 (2015).https:\/\/doi.org\/10.1007\/s10618-014-0365-y","journal-title":"Data Min. Knowl. Discov."},{"key":"646_CR5","unstructured":"Gilmer J., Schoenholz, S.S., Riley, P.F., Vinyals, O., Dahl, G.E.: Neural message passing for quantum chemistry. In: D.\u00a0Precup, Y.W. Teh. (ed.) Proceedings of the 34th International Conference on Machine Learning, ICML 2017, vol. 70, pp. 1263\u20131272. Sydney, (2017).arxiv:1704.01212"},{"key":"646_CR6","unstructured":"Sun, L., Wang, J., Yu, P.S., Li, B.: Adversarial attack and defense on graph data: a survey. CoRR abs\/1812.10528.arxiv:1812.10528"},{"key":"646_CR7","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. In: 5th International Conference on Learning Representations, ICLR 2017 Conference Track Proceedings, Toulon, (2017).arxiv:1609.02907"},{"key":"646_CR8","unstructured":"Xu, K., Hu, W., Leskovec, J., Jegelka, S.: How powerful are graph neural networks?. In: 7th International Conference on Learning Representations, ICLR 2019, New Orleans, (2019).arxiv:1810.00826"},{"key":"646_CR9","doi-asserted-by":"crossref","unstructured":"Chiang, W., Liu, X., Si, S., Li, Y., Bengio, S., Hsieh, C.: Cluster-GCN: An Efficient Algorithm for Training Deep and Large Graph Convolutional Networks. In: A. Teredesai, V. Kumar, Y. Li, R. Rosales, E. Terzi, G. Karypis. (eds.) Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2019, pp. 257\u2013266. Anchorage, (2019).arxiv:1905.07953","DOI":"10.1145\/3292500.3330925"},{"key":"646_CR10","unstructured":"Zhang, M., Chen, Y.: Link prediction based on graph neural networks. In: S. Bengio, H.M. Wallach, H. Larochelle, K. Grauman, N. Cesa-Bianchi, R. Garnett. (eds.) Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, Montr\u00e9al, Canada, pp. 5171\u20135181. Canada, (2018).arxiv:1802.09691"},{"issue":"2","key":"646_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3424672","volume":"15","author":"A Rossi","year":"2021","unstructured":"Rossi, A., Barbosa, D., Firmani, D., Matinata, A., Merialdo, P.: Knowledge graph embedding for link prediction: a comparative analysis. ACM Trans. Knowl. Discov. Data 15(2), 1 (2021)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"646_CR12","unstructured":"Zhang, M., Cui, Z., Neumann, M., Chen, Y.: An end-to-end deep learning architecture for graph classification. In: McIlraith, S.A., Weinberger, K.Q. (eds.) Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, (AAAI-18), the 30th innovative Applications of Artificial Intelligence (IAAI-18), and the 8th AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-18), pp. 4438\u20134445. New Orleans, (2018)"},{"issue":"9","key":"646_CR13","doi-asserted-by":"publisher","first-page":"1616","DOI":"10.1109\/TKDE.2018.2807452","volume":"30","author":"H Cai","year":"2018","unstructured":"Cai, H., Zheng, V.W., Chang, K.C.: A comprehensive survey of graph embedding: problems, techniques, and applications. IEEE Trans. Knowl. Data Eng. 30(9), 1616\u20131637 (2018)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"646_CR14","unstructured":"Duddu, V., Boutet, A., Shejwalkar, V.: Quantifying privacy leakage in graph embedding. In: M\u00fchlh\u00e4user, M., Polyzos, G.C., Michahelles, F., Guinea, A.S., Wang, L. (eds.) MobiQuitous \u201920: Computing, Networking and Services, Virtual, pp. 76\u201385. Darmstadt, (2020).arxiv:2010.00906"},{"key":"646_CR15","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy, SP 2017, pp. 3\u201318. San Jose, (2017).arxiv:1610.05820","DOI":"10.1109\/SP.2017.41"},{"key":"646_CR16","doi-asserted-by":"publisher","unstructured":"Liu, B., Ding, M., Shaham, S., Rahayu, W., Farokhi, F., Lin, Z.: When machine learning meets privacy: a survey and outlook. ACM Comput. Surv. 54(2), pp. 31:1, pp. 31:1\u201331:36 (2021).https:\/\/doi.org\/10.1145\/3436755","DOI":"10.1145\/3436755"},{"key":"646_CR17","unstructured":"Sun, H., Zhu, T., Zhang, Z., Jin, D., Xiong, P., Zhou, W.: Adversarial attacks against deep generative models on data: a survey. IEEE Trans. Knowl. Data Eng. (2021).arxiv:2112.00247"},{"key":"646_CR18","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P.D., Goodfellow, I.J., Jha, S., Celik, Z.B., Swami, A.: Practical black-box attacks against machine learning. In: R. Karri, O. Sinanoglu, A. Sadeghi, X. Yi. (eds.) Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, pp. 506\u2013519. Abu Dhabi, (2017).arxiv:1602.02697","DOI":"10.1145\/3052973.3053009"},{"key":"646_CR19","unstructured":"Tram\u00e8r, F., Zhang, F., Juels, A., Reiter, M.K., Ristenpart, T.: Stealing machine learning models via prediction APIs. In: Holz, T., Savage, S. (eds.) 25th USENIX Security Symposium, USENIX Security 16, pp. 601\u2013618. Austin, (2016).arxiv:1609.02943"},{"key":"646_CR20","doi-asserted-by":"crossref","unstructured":"Long, J., Shelhamer, E., Darrell, T.: Fully convolutional networks for semantic segmentation. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, pp. 3431\u20133440. Boston, (2015).arxiv:1411.4038","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"646_CR21","unstructured":"Kim, Y.: Convolutional neural networks for sentence classification. In: A. Moschitti, B. Pang, W. Daelemans. (eds.) Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, EMNLP 2014, October 25-29, 2014, Doha, Qatar, A meeting of SIGDAT, a Special Interest Group of the ACL, pp. 1746\u20131751. Doha, (2014).arxiv:1408.5882"},{"key":"646_CR22","doi-asserted-by":"publisher","unstructured":"Wang, Z., Kuang, W., Xie, Y., Yao, L., Li, Y., Ding, B., Zhou, J.: FederatedScope-GNN: towards a Unified, comprehensive and efficient package for federated graph learning. In: A. Zhang, H. Rangwala. (eds.) KDD \u201922: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, August 14 - 18, 2022. pp. 4110\u20134120. ACM, (2022). https:\/\/doi.org\/10.1145\/3534678.3539112","DOI":"10.1145\/3534678.3539112"},{"key":"646_CR23","unstructured":"Zhang, K., Yang, C., Li, X., Sun, L., Yiu, S.: Subgraph federated learning with missing neighbor generation. In: M. Ranzato, A. Beygelzimer, Y.N. Dauphin, P. Liang, J.W. Vaughan Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021, December 6-14, 2021, virtual, pp. 6671\u20136682. (2021).arxiv:2106.13430"},{"key":"646_CR24","unstructured":"Hamilton, W.L., Ying, Z., Leskovec, J.: Inductive representation learning on large graphs. In: I. Guyon, U. von Luxburg, S. Bengio, H.M. Wallach, R. Fergus, S.V.N. Vishwanathan, R. Garnett. (eds.) Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4-9, 2017, pp. 1024\u20131034. Long Beach, (2017).arxiv:1706.02216"},{"key":"646_CR25","doi-asserted-by":"publisher","unstructured":"Hu, H., Salcic, Z., Sun, L., Dobbie, G., Yu, P.S., Zhang, X.: Membership inference attacks on machine learning: a survey. ACM Computing Surveys (CSUR) (2021). https:\/\/doi.org\/10.1145\/3523273","DOI":"10.1145\/3523273"},{"key":"646_CR26","unstructured":"Zhou, J., Chen, Y., Shen, C., Zhang, Y.: Property inference attacks against GANs. CoRR abs\/2111.07608 (2021).arxiv:2111.07608"},{"key":"646_CR27","doi-asserted-by":"publisher","unstructured":"Zhang, H., Wu, B., Yuan, X., Pan, S., Tong, H., Pei, J.: Trustworthy graph neural networks: aspects, methods and trends. CoRR abs\/2205.07424 (2022). https:\/\/doi.org\/10.48550\/arXiv.2205.07424","DOI":"10.48550\/arXiv.2205.07424"},{"key":"#cr-split#-646_CR28.1","doi-asserted-by":"crossref","unstructured":"Y. Shen, X. He, Y. Han, Y. Zhang.: Model stealing attacks against inductive graph neural networks. In: 2022 IEEE Symposium on Security and Privacy","DOI":"10.1109\/SP46214.2022.9833607"},{"key":"#cr-split#-646_CR28.2","unstructured":"(SP) pp. 1175, IEEE. (2022).arxiv:2112.08331"},{"key":"646_CR29","unstructured":"Liu, Y., Wen, R., He, X., Salem, A., Zhang, Z., Backes, M., De\u00a0Cristofaro, E., Fritz, M., Zhang, Y.: $$\\{ML-Doctor\\}$$: Holistic risk assessment of inference attacks against machine learning models. In: 31st USENIX Security Symposium (USENIX Security 22) pp. 4525\u20134542. (2022).arxiv:2102.02551"},{"key":"646_CR30","unstructured":"He, X., Wen, R., Wu, Y., Backes, M., Shen, Y., Zhang, Y.: Node-level membership inference attacks against graph neural networks. CoRR abs\/2102.05429 (2021). arXiv:2102.05429"},{"issue":"11","key":"646_CR31","first-page":"535","volume":"9","author":"L Van der Maaten","year":"2008","unstructured":"Van der Maaten, L., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9(11), 535 (2008).http:\/\/www.jmlr.org\/papers\/v9\/vandermaaten08a.html","journal-title":"J. Mach. Learn. Res."},{"key":"646_CR32","unstructured":"Kipf, T.N., Welling, M.: Variational graph auto-encoders. CoRR abs\/1611.07308 (2016). arxiv:1611.07308"},{"key":"646_CR33","unstructured":"Kingma, D.P., Welling, M.: Auto-encoding variational bayes. In: Y. Bengio, Y. LeCun. (eds.) 2nd International Conference on Learning Representations, ICLR 2014, April 14-16, 2014, Conference Track Proceedings, Banff, (2014).arxiv:1312.6114"},{"key":"646_CR34","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3014246","author":"T Zhu","year":"2020","unstructured":"Zhu, T., Ye, D., Wang, W., Zhou, W., Yu, P.: More than privacy: applying differential privacy in key areas of artificial intelligence. IEEE Trans. Knowl. Data Eng. (2020). https:\/\/doi.org\/10.1109\/TKDE.2020.3014246","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"646_CR35","doi-asserted-by":"publisher","first-page":"1466","DOI":"10.1109\/TIFS.2022.3163591","volume":"17","author":"D Ye","year":"2022","unstructured":"Ye, D., Shen, S., Zhu, T., Liu, B., Zhou, W.: One parameter defense\u2013defending against data inference attacks via differential privacy. IEEE Trans. Inf. Forensics Secur. 17, 1466 (2022).arxiv:2203.06580","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"646_CR36","doi-asserted-by":"publisher","unstructured":"Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: privacy via distributed noise generation. In: S. Vaudenay. (ed.) Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings, Lecture Notes in Computer Science, vol. 4004, pp. 486\u2013503. Russia, (2006).https:\/\/doi.org\/10.1007\/11761679_29","DOI":"10.1007\/11761679_29"},{"key":"646_CR37","unstructured":"Namata, G., London, B., Getoor, L., Huang, B., EDU, U.: Query-driven active surveying for collective classification. In: 10th International Workshop on Mining and Learning with Graphs. vol.\u00a08, p.\u00a01. (2012).https:\/\/people.cs.vt.edu\/~bhuang\/papers\/namata-mlg12.pdf"},{"issue":"3","key":"646_CR38","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1609\/aimag.v29i3.2157","volume":"29","author":"P Sen","year":"2008","unstructured":"Sen, P., Namata, G., Bilgic, M., Getoor, L., Galligher, B., Eliassi-Rad, T.: Collective classification in network data. AI Magaz. 29(3), 93\u201393 (2008).https:\/\/doi.org\/10.1609\/aimag.v29i3.2157","journal-title":"AI Magaz."},{"key":"646_CR39","unstructured":"Zhang, Z., Chen, M., Backes, M., Shen, Y., Zhang, Y.: Inference attacks against graph neural networks. CoRR abs\/2110.02631 (2021). arxiv:2110.02631"},{"key":"646_CR40","unstructured":"Zhang, Z., Wang, T., Li, N., Honorio, J., Backes, M., He, S., Chen, J., Zhang, Y., PrivSyn: Differentially Private Data Synthesis. In: M. Bailey. R. Greenstadt. (eds.) 30th USENIX Security Symposium, USENIX Security 2021(August), pp. 11\u201313, pp. 929\u2013946. (2021).https:\/\/www.usenix.org\/system\/files\/sec21fall-zhang-zhikun.pdf"},{"key":"646_CR41","unstructured":"He, X., Jia, J., Backes, M., Gong, N.Z., Zhang, Y., Links, Stealing, from graph neural networks. In: M. Bailey. R. Greenstadt. (eds.) 30th USENIX Security Symposium, USENIX Security 2021(August), pp. 11\u201313, pp. 2669\u20132686. (2021).arxiv:2005.02131"},{"key":"646_CR42","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Liu, Q., Huang, Z., Wang, H., Lu, C., Liu, C., Chen, E.: GraphMI: extracting private graph data from graph neural networks. In: Z.\u00a0Zhou. (ed.) Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, IJCAI 2021, Virtual Event \/ 19-27 August 2021, pp. 3749\u20133755, Montreal, (2021).arxiv:2106.02820","DOI":"10.24963\/ijcai.2021\/516"},{"key":"646_CR43","doi-asserted-by":"crossref","unstructured":"Wu, B., Yang, X., Pan, S., Yuan, X.: Adapting membership inference attacks to GNN for graph classification: approaches and implications. In: Bailey, J., Miettinen, P., Koh, Y.S., Tao, D., Wu, X. (eds.) IEEE International Conference on Data Mining, ICDM 2021, December 7\u201310, 2021, pp. 1421\u20131426. New Zealand, (2021).arxiv:2110.08760","DOI":"10.1109\/ICDM51629.2021.00182"},{"key":"646_CR44","unstructured":"Wu, B., Yang, X., Pan, S., Yuan, X.: Model extraction attacks on graph neural networks: taxonomy and realization. CoRR abs\/2010.12751 (2020). arxiv:2010.12751"},{"key":"646_CR45","unstructured":"Shen, Y., He, X., Han, Y., Zhang, Y.: Model stealing attacks against inductive graph neural networks. CoRR abs\/2112.08331 (2021). arxiv:2112.08331"},{"issue":"8","key":"646_CR46","doi-asserted-by":"publisher","first-page":"6904","DOI":"10.1109\/JIOT.2020.3036583","volume":"8","author":"K Li","year":"2021","unstructured":"Li, K., Luo, G., Ye, Y., Li, W., Ji, S., Cai, Z.: Adversarial privacy-preserving graph embedding against inference attack. IEEE Internet Things J. 8(8), 6904\u20136915 (2021).arxiv:2008.13072","journal-title":"IEEE Internet Things J."},{"key":"646_CR47","doi-asserted-by":"crossref","unstructured":"Sajadmanesh, S., Gatica-Perez, D.: Locally private graph neural network. In: Y.\u00a0Kim, J.\u00a0Kim, G.\u00a0Vigna, E.\u00a0Shi. (eds.) CCS \u201921: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19. pp. 2130\u20132145. Republic of Korea, (2021).arxiv:2006.05535","DOI":"10.1145\/3460120.3484565"},{"key":"646_CR48","unstructured":"Zhou, J., Chen, C., Zheng, L., Wu, H., Wu, J., Zheng, X., Wu, B., Liu, Z., Wang, L.: Vertically federated graph neural network for privacy-preserving node classification (2021).arxiv:2005.11903"},{"key":"646_CR49","unstructured":"Gu, Z., Huang, H., Zhang, J., Su, D., Lamba, A., Pendarakis, D., Molloy, I.M.: Securing input data of deep learning inference systems via partitioned enclave execution. CoRR abs\/1807.00969 (2018). arxiv:1807.00969"},{"issue":"5","key":"646_CR50","doi-asserted-by":"publisher","first-page":"4505","DOI":"10.1109\/JIOT.2020.2967734","volume":"7","author":"SA Osia","year":"2020","unstructured":"Osia, S.A., Shamsabadi, A.S., Sajadmanesh, S., Taheri, A., Katevas, K., Rabiee, H.R., Lane, N.D., Haddadi, H.: A hybrid deep learning architecture for privacy-preserving mobile analytics. IEEE Internet Things J. 7(5), 4505\u20134518 (2020).arxiv:1703.02952","journal-title":"IEEE Internet Things J."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00646-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-022-00646-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00646-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T19:53:12Z","timestamp":1744141992000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-022-00646-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,16]]},"references-count":51,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["646"],"URL":"https:\/\/doi.org\/10.1007\/s10207-022-00646-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2022,12,16]]},"assertion":[{"value":"16 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare that we have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}