{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T21:49:00Z","timestamp":1772833740319,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s10489-024-05288-2","type":"journal-article","created":{"date-parts":[[2024,1,27]],"date-time":"2024-01-27T08:02:26Z","timestamp":1706342546000},"page":"2009-2030","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A novel immune detector training method for network anomaly detection"],"prefix":"10.1007","volume":"54","author":[{"given":"Xiaowen","family":"Liu","sequence":"first","affiliation":[]},{"given":"Geying","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8085-1312","authenticated-orcid":false,"given":"Lina","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Qinghao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,27]]},"reference":[{"key":"5288_CR1","doi-asserted-by":"publisher","unstructured":"Javaheri D, Gorgin S, Lee JA et al (2023) Fuzzy logic-based ddos attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives. Inf Sci 626:315\u2013338. https:\/\/doi.org\/10.1016\/j.ins.2023.01.067","DOI":"10.1016\/j.ins.2023.01.067"},{"key":"5288_CR2","doi-asserted-by":"publisher","unstructured":"Ding C, Sun S, Zhao J (2023) Mst-gat: A multimodal spatial-temporal graph attention network for time series anomaly detection. Inf Fusion 89:527\u2013536. https:\/\/doi.org\/10.1016\/j.inffus.2022.08.011","DOI":"10.1016\/j.inffus.2022.08.011"},{"issue":"109","key":"5288_CR3","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1016\/j.knosys.2022.109456","volume":"253","author":"W Ullah","year":"2022","unstructured":"Ullah W, Hussain T, Khan ZA et al (2022) Intelligent dual stream cnn and echo state network for anomaly detection. Knowl-Based Syst 253(109):456. https:\/\/doi.org\/10.1016\/j.knosys.2022.109456","journal-title":"Knowl-Based Syst"},{"issue":"116","key":"5288_CR4","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1016\/j.eswa.2022.116510","volume":"193","author":"M Jain","year":"2022","unstructured":"Jain M, Kaur G, Saxena V (2022) A k-means clustering and svm based hybrid concept drift detection technique for network anomaly detection. Expert Syst Appl 193(116):510. https:\/\/doi.org\/10.1016\/j.eswa.2022.116510","journal-title":"Expert Syst Appl"},{"issue":"7","key":"5288_CR5","doi-asserted-by":"publisher","first-page":"4525","DOI":"10.1007\/s10489-020-02001-x","volume":"51","author":"J Chen","year":"2021","unstructured":"Chen J, Wang X, Su M et al (2021) A fast detector generation algorithm for negative selection. Appl Intell 51(7):4525\u20134547. https:\/\/doi.org\/10.1007\/s10489-020-02001-x","journal-title":"Appl Intell"},{"key":"5288_CR6","doi-asserted-by":"publisher","unstructured":"Yang G, Wang L, Yu R et al (2023) A modified gray wolf optimizer-based negative selection algorithm for network anomaly detection. Int J Intell Syst 2023. https:\/\/doi.org\/10.1155\/2023\/8980876","DOI":"10.1155\/2023\/8980876"},{"key":"5288_CR7","doi-asserted-by":"publisher","unstructured":"Zhu Y, Li T, Lan X (2023) Feature selection optimized by the artificial immune algorithm based on genome shuffling and conditional lethal mutation. Appl Intell 53(11):13,972\u201313,992. https:\/\/doi.org\/10.1007\/s10489-022-03971-w","DOI":"10.1007\/s10489-022-03971-w"},{"issue":"107","key":"5288_CR8","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1016\/j.knosys.2021.107477","volume":"232","author":"Z Li","year":"2021","unstructured":"Li Z, Li T, He J et al (2021) A hybrid real-valued negative selection algorithm with variable-sized detectors and the k-nearest neighbors algorithm. Knowl-Based Syst 232(107):477. https:\/\/doi.org\/10.1016\/j.knosys.2021.107477","journal-title":"Knowl-Based Syst"},{"key":"5288_CR9","doi-asserted-by":"publisher","unstructured":"Zhang R, Xiao X (2018) A clone selection based real-valued negative selection algorithm. Complexity 2018. https:\/\/doi.org\/10.1155\/2018\/2520940","DOI":"10.1155\/2018\/2520940"},{"issue":"107","key":"5288_CR10","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1016\/j.asoc.2021.107726","volume":"112","author":"J He","year":"2021","unstructured":"He J, Chen W, Li T et al (2021) Hd-nsa: A real-valued negative selection algorithm based on hierarchy division. Appl Soft Comput 112(107):726. https:\/\/doi.org\/10.1016\/j.asoc.2021.107726","journal-title":"Appl Soft Comput"},{"key":"5288_CR11","doi-asserted-by":"publisher","unstructured":"Sun X, Wang H, Liu S et\u00a0al. (2022) Self-updating continual learning classification method based on artificial immune system. Appl Intell 52(11):12,817\u201312,843. https:\/\/doi.org\/10.1007\/s10489-021-03123-6","DOI":"10.1007\/s10489-021-03123-6"},{"issue":"2","key":"5288_CR12","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/TAI.2021.3114661","volume":"3","author":"KD Gupta","year":"2022","unstructured":"Gupta KD, Dasgupta D (2022) Negative selection algorithm research and applications in the last decade: A review. IEEE Trans Artif Intell 3(2):110\u2013128. https:\/\/doi.org\/10.1109\/TAI.2021.3114661","journal-title":"IEEE Trans Artif Intell"},{"issue":"107","key":"5288_CR13","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1016\/j.knosys.2021.107661","volume":"236","author":"C Wen","year":"2022","unstructured":"Wen C, Changzhi W (2022) Combine labeled and unlabeled data for immune detector training with label propagation. Knowl-Based Syst 236(107):661. https:\/\/doi.org\/10.1016\/j.knosys.2021.107661","journal-title":"Knowl-Based Syst"},{"issue":"3","key":"5288_CR14","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/TEVC.2021.3058687","volume":"25","author":"L Xi","year":"2021","unstructured":"Xi L, Wang RD, Yao ZY et al (2021) Multisource neighborhood immune detector adaptive model for anomaly detection. IEEE Trans Evolutionary Comput 25(3):582\u2013594. https:\/\/doi.org\/10.1109\/TEVC.2021.3058687","journal-title":"IEEE Trans Evolutionary Comput"},{"key":"5288_CR15","doi-asserted-by":"publisher","unstructured":"Aissa NB, Guerroumi M, Derhab A (2019) Nsnad: negative selection-based network anomaly detection approach with relevant feature subset. Neural Comput Appl 32:3475\u20133501. https:\/\/doi.org\/10.1007\/s00521-019-04396-2","DOI":"10.1007\/s00521-019-04396-2"},{"key":"5288_CR16","doi-asserted-by":"publisher","unstructured":"Mafarja M, Mirjalili S (2018) Whale optimization approaches for wrapper feature selection. Appl Soft Comput 62:441\u2013453. https:\/\/doi.org\/10.1016\/j.asoc.2017.11.006","DOI":"10.1016\/j.asoc.2017.11.006"},{"issue":"3","key":"5288_CR17","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1109\/JAS.2019.1911447","volume":"6","author":"H Liu","year":"2019","unstructured":"Liu H, Zhou M, Liu Q (2019) An embedded feature selection method for imbalanced data classification. IEEE\/CAA J Automatica Sinica 6(3):703\u2013715. https:\/\/doi.org\/10.1109\/JAS.2019.1911447","journal-title":"IEEE\/CAA J Automatica Sinica"},{"key":"5288_CR18","doi-asserted-by":"publisher","unstructured":"Han Y, Zhao S, Deng H et al (2023) Principal graph embedding convolutional recurrent network for traffic flow prediction. Appl Intell 1\u201315. https:\/\/doi.org\/10.1007\/s10489-022-04211-x","DOI":"10.1007\/s10489-022-04211-x"},{"issue":"1","key":"5288_CR19","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1080\/03610918.2020.1850790","volume":"52","author":"Y Zhong","year":"2023","unstructured":"Zhong Y, Chalise P, He J (2023) Nested cross-validation with ensemble feature selection and classification model for high-dimensional biological data. Commun Stat-simulation Comput 52(1):110\u2013125. https:\/\/doi.org\/10.1080\/03610918.2020.1850790","journal-title":"Commun Stat-simulation Comput"},{"key":"5288_CR20","doi-asserted-by":"publisher","unstructured":"Zhu Y, Li T, Lan X (2022) Feature selection optimized by the artificial immune algorithm based on genome shuffling and conditional lethal mutation. Appl Intell 1\u201321. https:\/\/doi.org\/10.1007\/s10489-022-03971-w","DOI":"10.1007\/s10489-022-03971-w"},{"issue":"6","key":"5288_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3136625","volume":"50","author":"J Li","year":"2017","unstructured":"Li J, Cheng K, Wang S et al (2017) Feature selection: A data perspective. ACM Comput Surv (CSUR) 50(6):1\u201345. https:\/\/doi.org\/10.1145\/3136625","journal-title":"ACM Comput Surv (CSUR)"},{"key":"5288_CR22","doi-asserted-by":"publisher","unstructured":"Hadri A, Chougdali K, Touahni R (2016) Intrusion detection system using pca and fuzzy pca techniques. In: 2016 International conference on advanced communication systems and information security (ACOSIS), pp 1\u20137, https:\/\/doi.org\/10.1109\/ACOSIS.2016.7843930","DOI":"10.1109\/ACOSIS.2016.7843930"},{"issue":"10","key":"5288_CR23","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1109\/TC.2016.2519914","volume":"65","author":"MA Ambusaidi","year":"2016","unstructured":"Ambusaidi MA, He X, Nanda P et al (2016) Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans Comput 65(10):2986\u20132998. https:\/\/doi.org\/10.1109\/TC.2016.2519914","journal-title":"IEEE Trans Comput"},{"key":"5288_CR24","doi-asserted-by":"publisher","unstructured":"Benaddi H, Ibrahimi K, Benslimane A (2018) Improving the intrusion detection system for nsl-kdd dataset based on pca-fuzzy clustering-knn. In: 2018 6th International conference on wireless networks and mobile communications (WINCOM), pp 1\u20136, https:\/\/doi.org\/10.1109\/WINCOM.2018.8629718","DOI":"10.1109\/WINCOM.2018.8629718"},{"key":"5288_CR25","doi-asserted-by":"crossref","unstructured":"Nazir A, Khan RA (2021) A novel combinatorial optimization based feature selection method for network intrusion detection. Comput Sec 102:102,164. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404820304375","DOI":"10.1016\/j.cose.2020.102164"},{"issue":"5","key":"5288_CR26","doi-asserted-by":"publisher","first-page":"660","DOI":"10.6633\/IJNS.201709.19(5).02","volume":"19","author":"E Popoola","year":"2017","unstructured":"Popoola E, Adewumi AO (2017) Efficient feature selection technique for network intrusion detection system using discrete differential evolution and decision. Int J Netw Secur 19(5):660\u2013669. https:\/\/doi.org\/10.6633\/IJNS.201709.19(5).02","journal-title":"Int J Netw Secur"},{"issue":"108","key":"5288_CR27","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1016\/j.patcog.2022.108912","volume":"132","author":"WL Al-Yaseen","year":"2022","unstructured":"Al-Yaseen WL, Idrees AK, Almasoudy FH (2022) Wrapper feature selection method based differential evolution and extreme learning machine for intrusion detection system. Pattern Recognit 132(108):912. https:\/\/doi.org\/10.1016\/j.patcog.2022.108912","journal-title":"Pattern Recognit"},{"issue":"5","key":"5288_CR28","doi-asserted-by":"publisher","first-page":"5449","DOI":"10.1007\/s10489-022-03772-1","volume":"53","author":"C Zhang","year":"2023","unstructured":"Zhang C, Soda P, Bi J et al (2023) An empirical study on the joint impact of feature selection and data resampling on imbalance classification. Appl Intell 53(5):5449\u20135461. https:\/\/doi.org\/10.1007\/s10489-022-03772-1","journal-title":"Appl Intell"},{"issue":"3","key":"5288_CR29","doi-asserted-by":"publisher","first-page":"3545","DOI":"10.1007\/s10489-022-03465-9","volume":"53","author":"F Han","year":"2023","unstructured":"Han F, Wang T, Ling Q (2023) An improved feature selection method based on angle-guided multi-objective pso and feature-label mutual information. Appl Intell 53(3):3545\u20133562. https:\/\/doi.org\/10.1007\/s10489-022-03465-9","journal-title":"Appl Intell"},{"key":"5288_CR30","doi-asserted-by":"publisher","unstructured":"Singh D, Singh B (2019) Hybridization of feature selection and feature weighting for high dimensional data. Appl Intell 49:1580\u20131596. https:\/\/doi.org\/10.1007\/s10489-018-1348-2","DOI":"10.1007\/s10489-018-1348-2"},{"key":"5288_CR31","doi-asserted-by":"publisher","unstructured":"Liu J, Zio E (2019) Integration of feature vector selection and support vector machine for classification of imbalanced data. Appl Soft Comput 75:702\u2013711. https:\/\/doi.org\/10.1016\/j.asoc.2018.11.045","DOI":"10.1016\/j.asoc.2018.11.045"},{"key":"5288_CR32","doi-asserted-by":"publisher","unstructured":"Alelyani S, Tang J, Liu H (2018) Feature selection for clustering: A review. Data Clustering 29\u201360. https:\/\/doi.org\/10.1016\/j.neucom.2017.11.077","DOI":"10.1016\/j.neucom.2017.11.077"},{"key":"5288_CR33","doi-asserted-by":"publisher","unstructured":"Sheikhpour R, Sarram MA, Gharaghani S et al (2017) A survey on semi-supervised feature selection methods. Pattern Recognit 64:141\u2013158. https:\/\/doi.org\/10.1016\/j.patcog.2016.11.003","DOI":"10.1016\/j.patcog.2016.11.003"},{"key":"5288_CR34","doi-asserted-by":"publisher","unstructured":"Shi S, Xiong H (2022) A hybrid immune genetic algorithm with tabu search for minimizing the tool switch times in cnc milling batch-processing. Appl Intell 1\u201315. https:\/\/doi.org\/10.1007\/s10489-021-02869-3","DOI":"10.1007\/s10489-021-02869-3"},{"key":"5288_CR35","doi-asserted-by":"publisher","unstructured":"Lu T, Zhang L, Fu Y (2018) A novel immune-inspired shellcode detection algorithm based on hyperellipsoid detectors. Sec Commun Netw 2018. https:\/\/doi.org\/10.1155\/2018\/2063089","DOI":"10.1155\/2018\/2063089"},{"key":"5288_CR36","doi-asserted-by":"publisher","unstructured":"Fan Z, Wen C, Tao L, et\u00a0al (2019) An antigen space triangulation coverage based real-value negative selection algorithm. IEEE Access 7:51,886\u201351,898. https:\/\/doi.org\/10.1109\/ACCESS.2019.2911660","DOI":"10.1109\/ACCESS.2019.2911660"},{"key":"5288_CR37","doi-asserted-by":"publisher","unstructured":"Ren Y, Wang X, Zhang C (2021) A novel fault diagnosis method based on improved negative selection algorithm. IEEE Trans Instrument Measure 70:1\u20138. https:\/\/doi.org\/10.1109\/TIM.2020.3031166","DOI":"10.1109\/TIM.2020.3031166"},{"issue":"108","key":"5288_CR38","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1016\/j.asoc.2022.108838","volume":"122","author":"YJ Kim","year":"2022","unstructured":"Kim YJ, Nam W, Lee J (2022) Multiclass anomaly detection for unsupervised and semi-supervised data based on a combination of negative selection and clonal selection algorithms. Appl Soft Comput 122(108):838. https:\/\/doi.org\/10.1016\/j.asoc.2022.108838","journal-title":"Appl Soft Comput"},{"issue":"110","key":"5288_CR39","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.knosys.2022.110111","volume":"260","author":"Y Zhu","year":"2023","unstructured":"Zhu Y, Li W, Li T (2023) A hybrid artificial immune optimization for high-dimensional feature selection. Knowl-Based Syst 260(110):111. https:\/\/doi.org\/10.1016\/j.knosys.2022.110111","journal-title":"Knowl-Based Syst"},{"key":"5288_CR40","doi-asserted-by":"publisher","unstructured":"Forrest S, Perelson AS, Allen L et\u00a0al. (1994) Self-nonself discrimination in a computer. In: Proceedings of 1994 IEEE computer society symposium on research in security and privacy, Ieee, pp 202\u2013212, https:\/\/doi.org\/10.1109\/RISP.1994.296580","DOI":"10.1109\/RISP.1994.296580"},{"key":"5288_CR41","doi-asserted-by":"publisher","unstructured":"Ho TK (1995) Random decision forests. In: Proceedings of 3rd international conference on document analysis and recognition, IEEE, pp 278\u2013282, https:\/\/doi.org\/10.1109\/ICDAR.1995.598994","DOI":"10.1109\/ICDAR.1995.598994"},{"key":"5288_CR42","doi-asserted-by":"publisher","unstructured":"Chen T, Guestrin C (2016) Xgboost: A scalable tree boosting system. In: Proceedings of the 22nd acm sigkdd international conference on knowledge discovery and data mining, pp 785\u2013794, https:\/\/doi.org\/10.1145\/2939672.2939785","DOI":"10.1145\/2939672.2939785"},{"key":"5288_CR43","doi-asserted-by":"publisher","unstructured":"Zhang T, Ramakrishnan R, Livny M (1997) Birch: A new data clustering algorithm and its applications. Data Mining Knowl Discov 1:141\u2013182. https:\/\/doi.org\/10.1023\/A:1009783824328","DOI":"10.1023\/A:1009783824328"},{"key":"5288_CR44","doi-asserted-by":"publisher","unstructured":"Gonzalez F, Dasgupta D, Ni\u00f1o LF (2003) A randomized real-valued negative selection algorithm. In: Artificial immune systems: second international conference, ICARIS 2003, Edinburgh, UK, September 1-3, 2003. Proceedings 2, Springer, pp 261\u2013272, https:\/\/doi.org\/10.1007\/978-3-540-45192-1_25","DOI":"10.1007\/978-3-540-45192-1_25"},{"key":"5288_CR45","doi-asserted-by":"publisher","unstructured":"Ji Z, Dasgupta D (2004) Real-valued negative selection algorithm with variable-sized detectors. In: Genetic and evolutionary computation conference, Springer, pp 287\u2013298, https:\/\/doi.org\/10.1007\/978-3-540-24854-5_30","DOI":"10.1007\/978-3-540-24854-5_30"},{"key":"5288_CR46","doi-asserted-by":"publisher","unstructured":"Wen C, Xiaoming D, Tao L et al (2014) Negative selection algorithm based on grid file of the feature space. Knowl-Based Syst 56:26\u201335. https:\/\/doi.org\/10.1016\/j.knosys.2013.10.018","DOI":"10.1016\/j.knosys.2013.10.018"},{"key":"5288_CR47","doi-asserted-by":"publisher","unstructured":"Stibor T, Mohr P, Timmis J et\u00a0al. (2005) Is negative selection appropriate for anomaly detection. Association for Computing Machinery, New York, NY, USA, GECCO \u201905, p 321-328, https:\/\/doi.org\/10.1145\/1068009.1068061","DOI":"10.1145\/1068009.1068061"},{"key":"5288_CR48","doi-asserted-by":"publisher","unstructured":"Tavallaee M, Bagheri E, Lu W et\u00a0al. (2009) A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE Symposium on computational intelligence for security and defense applications, pp 1\u20136, https:\/\/doi.org\/10.1109\/CISDA.2009.5356528","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"5288_CR49","doi-asserted-by":"publisher","unstructured":"Moustafa N (2017) Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic. PhD thesis, UNSW Sydney, https:\/\/doi.org\/10.26190\/unsworks\/3298","DOI":"10.26190\/unsworks\/3298"},{"key":"5288_CR50","doi-asserted-by":"publisher","unstructured":"Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1:108\u2013116. https:\/\/doi.org\/10.5220\/0006639801080116","DOI":"10.5220\/0006639801080116"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-024-05288-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-024-05288-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-024-05288-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,16]],"date-time":"2024-02-16T12:34:09Z","timestamp":1708086849000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-024-05288-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":50,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["5288"],"URL":"https:\/\/doi.org\/10.1007\/s10489-024-05288-2","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1]]},"assertion":[{"value":"19 January 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interests"}},{"value":"All datasets used in this paper are public datasets, which can be downloaded through public channels upon request.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical and informed consent for data used"}}]}}