{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T19:38:39Z","timestamp":1768419519045,"version":"3.49.0"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"21","license":[{"start":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T00:00:00Z","timestamp":1724284800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T00:00:00Z","timestamp":1724284800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902196"],"award-info":[{"award-number":["61902196"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102194"],"award-info":[{"award-number":["62102194"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102196"],"award-info":[{"award-number":["62102196"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Postgraduate Research and Practice Innovation Program of Jiangsu Province","award":["KYCX22_1019"],"award-info":[{"award-number":["KYCX22_1019"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s10489-024-05728-z","type":"journal-article","created":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T12:02:39Z","timestamp":1724414559000},"page":"10608-10626","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Improving the transferability of adversarial attacks via self-ensemble"],"prefix":"10.1007","volume":"54","author":[{"given":"Shuyan","family":"Cheng","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5026-5347","authenticated-orcid":false,"given":"Peng","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianguo","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"He","family":"Xu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yudong","family":"Yao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"name":"Fellow, IEEE","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shuyan","family":"Cheng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peng","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianguo","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"He","family":"Xu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yudong","family":"Yao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,8,22]]},"reference":[{"key":"5728_CR1","doi-asserted-by":"crossref","first-page":"1952","DOI":"10.1109\/TIP.2023.3258739","volume":"32","author":"Ou Xianfeng","year":"2023","unstructured":"Xianfeng Ou, Meng Wu, Bing Tu et al (2023) Multi-Objective Unsupervised Band Selection Method for Hyperspectral Images Classification. IEEE Trans Image Process 32:1952\u20131965","journal-title":"IEEE Trans Image Process"},{"key":"5728_CR2","doi-asserted-by":"crossref","first-page":"2653","DOI":"10.1109\/TIFS.2023.3269152","volume":"18","author":"Ruidong Han","year":"2023","unstructured":"Han Ruidong, Wang Xiaofeng, Bai Ningning et al (2023) FCD-Net: Learning to Detect Multiple Types of Homologous Deepfake Face Images. IEEE Trans Inf Forensics Secur 18:2653\u20132666","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5728_CR3","doi-asserted-by":"crossref","first-page":"5359","DOI":"10.1109\/TIP.2022.3195638","volume":"31","author":"Xianwei Lv","year":"2022","unstructured":"Lv Xianwei, Chen Yu, Jin Hai et al (2022) HQ2CL: A High-Quality Class Center Learning System for Deep Face Recognition. IEEE Trans Image Process 31:5359\u20135370","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"5728_CR4","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/TMI.2022.3206142","volume":"42","author":"Sekeun Kim","year":"2023","unstructured":"Kim Sekeun, Jiang Zhenxiang, Zambrano Byron A et al (2023) Deep Learning on Multiphysical Features and Hemodynamic Modeling for Abdominal Aortic Aneurysm Growth Prediction. IEEE Trans Med Imaging 42(1):196\u2013208","journal-title":"IEEE Trans Med Imaging"},{"key":"5728_CR5","doi-asserted-by":"crossref","first-page":"1700","DOI":"10.1109\/TMM.2022.3154159","volume":"25","author":"Yucheng Shu","year":"2023","unstructured":"Shu Yucheng, Li Hengbo, Xiao Bin, Bi Xiuli et al (2023) Cross-Mix Monitoring for Medical Image Segmentation With Limited Supervision. IEEE Trans Multimedia 25:1700\u20131712","journal-title":"IEEE Trans Multimedia"},{"key":"5728_CR6","doi-asserted-by":"crossref","first-page":"1713","DOI":"10.1109\/TMM.2022.3154165","volume":"25","author":"Bin Fan","year":"2023","unstructured":"Fan Bin, Yang Yuzhu, Feng Wensen et al (2023) Seeing Through Darkness: Visual Localization at Night via Weakly Supervised Learning of Domain Invariant Features. IEEE Trans Multimedia 25:1713\u20131726","journal-title":"IEEE Trans Multimedia"},{"issue":"8","key":"5728_CR7","doi-asserted-by":"crossref","first-page":"9071","DOI":"10.1109\/TII.2022.3224958","volume":"19","author":"Meiqi Wang","year":"2023","unstructured":"Wang Meiqi, Tianqi Su, Chen Siyi et al (2023) Automatic Model-Based Dataset Generation for High-Level Vision Tasks of Autonomous Driving in Haze Weather. IEEE Trans Industr Inf 19(8):9071\u20139081","journal-title":"IEEE Trans Industr Inf"},{"key":"5728_CR8","unstructured":"Goodfellow I J, Shlens J, Szegedy C (2015) \u201cExplaining and Harnessing Adversarial Examples,\u201d in Proc Int Conf Learn Represent (ICLR)"},{"key":"5728_CR9","unstructured":"Tram\u00e8r F, Kurakin A, Papernot N, Goodfellow I, Boneh D, McDaniel P (2018) \u201cEnsemble Adversarial Training: Attacks and Defenses,\u201d in Proc Int Conf Learn Represent (ICLR), Sept 2018"},{"key":"5728_CR10","doi-asserted-by":"crossref","unstructured":"Dong Y et al (2018) \u201cBoosting Adversarial Attacks with Momentum,\u201d in Proc IEEE Conf Comput Vis Pattern Recognit (CVPR), Jun 2018, pp 9185-9193","DOI":"10.1109\/CVPR.2018.00957"},{"key":"5728_CR11","doi-asserted-by":"crossref","unstructured":"Y Dong T, Pang H, Su, Zhu J (2019) \u201cEvading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks,\u201d in Proc IEEE Conf Comput Vis Pattern Recognit (CVPR), Jun 2019, pp 4312-4321","DOI":"10.1109\/CVPR.2019.00444"},{"key":"5728_CR12","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1109\/TIFS.2023.3275737","volume":"19","author":"A Esmaeili","year":"2024","unstructured":"Esmaeili A, Edraki M, Rahnavard N, Mian A, Shah M (2024) Low-Rank and Sparse Decomposition for Low-Query Decision-Based Adversarial Attacks. IEEE Trans Inf Forensics Secur 19:1561\u20131575","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5728_CR13","doi-asserted-by":"crossref","first-page":"4361","DOI":"10.1109\/TIFS.2023.3293959","volume":"18","author":"A Rashid","year":"2023","unstructured":"Rashid A, Such JM (2023) MalProtect: Stateful Defense Against Adversarial Query Attacks in ML-Based Malware Detection. IEEE Trans Inf Forensics Secur 18:4361\u20134376","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5728_CR14","doi-asserted-by":"crossref","unstructured":"Kurakin A, Goodfellow I J, Bengio S (2017) \u201cAdversarial Examples in the Physical World,\u201d in Proc Int Conf Learn Represent (ICLR), Sept 2017","DOI":"10.1201\/9781351251389-8"},{"key":"5728_CR15","unstructured":"Szegedy C et al (2014) \u201cIntriguing Properties of Neural Networks,\u201d in Proc Int Conf Learn Represent (ICLR), Sept 2014"},{"key":"5728_CR16","doi-asserted-by":"crossref","unstructured":"Xie C et al (2019) \u201cImproving Transferability of Adversarial Examples With Input Diversity,\u201d in Proc. IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Jun. 2019, pp 2725-2734","DOI":"10.1109\/CVPR.2019.00284"},{"key":"5728_CR17","unstructured":"Naseer M, H Khan S, Rahman S, Porikli F (2018) \u201cTask-generalizable Adversarial Attack Based on Perceptual Metric,\u201d arXiv:1811.09020"},{"key":"5728_CR18","doi-asserted-by":"crossref","unstructured":"Ganeshan A, V B S, Radhakrishnan V B (2019) \u201cFDA: Feature Disruptive Attack,\u201d in Proc ICCV, Feb. 2019, pp 8068\u20138078","DOI":"10.1109\/ICCV.2019.00816"},{"key":"5728_CR19","doi-asserted-by":"crossref","unstructured":"Wang X, He K (2021) \u201cEnhancing the Transferability of Adversarial Attacks through Variance Tuning,\u201d in Proc IEEE Conf Comput Vis Pattern Recognit (CVPR), Nov. 2021, pp 1924-1933","DOI":"10.1109\/CVPR46437.2021.00196"},{"key":"5728_CR20","doi-asserted-by":"crossref","unstructured":"Wang Z, Guo H, Zhang Z, Liu W, Qin Z, Ren K (2021) \u201cFeature Importance-aware Transferable Adversarial Attacks,\u201d in Proc ICCV, Feb. 2021, pp 7619-7628","DOI":"10.1109\/ICCV48922.2021.00754"},{"key":"5728_CR21","unstructured":"Ilyas A, Santurkar S, Tsipras D, Engstrom L, Tran B, Madry A, \u201cAdversarial Examples Are not Bugs, They Are Features,\u201d in Proc Adv Neural Inf Process Syst (NIPS), Dec 2019, pp 125-136"},{"key":"5728_CR22","doi-asserted-by":"crossref","unstructured":"Wu W et al (2020) \u201cBoosting the Transferability of Adversarial Samples via Attention,\u201d in Proc IEEE Conf Comput Vis Pattern Recognit (CVPR), Aug 2020, pp 1158-1167","DOI":"10.1109\/CVPR42600.2020.00124"},{"key":"5728_CR23","doi-asserted-by":"crossref","unstructured":"Y Qian et al (2022) \u201cVisually Imperceptible Adversarial Patch Attacks,\u201d Comput Secur, vol 123, Dec 2022","DOI":"10.1016\/j.cose.2022.102943"},{"key":"5728_CR24","doi-asserted-by":"crossref","unstructured":"Zou J, Pan Z, Qiu J, Liu X, Rui T, Li W (2020) \u201cImproving the Transferability of Adversarial Examples with Resized-Diverse-Inputs, Diversity-Ensemble and Region Fitting,\u201d in Proc Eur Conf Comput Vis (ECCV), pp 563-579","DOI":"10.1007\/978-3-030-58542-6_34"},{"key":"5728_CR25","doi-asserted-by":"crossref","unstructured":"Huang T, Menkovski V, Pei Y, Wang Y, Pechenizkiy M (2022) \u201cDirection-aggregated Attack for Transferable Adversarial Examples,\u201d J Emerg Technol Comput Syst, vol 18, no 3, Apr 2022","DOI":"10.1145\/3501769"},{"key":"5728_CR26","unstructured":"Lin J, Song C, He K, Wang L, Hopcroft J E (2020) \u201cNesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks,\u201d in Proc Int Conf Learn Represent (ICLR), Sept 2020"},{"key":"5728_CR27","doi-asserted-by":"crossref","unstructured":"Lu Y et al (2020) \u201cEnhancing Cross-Task Black-Box Transferability of Adversarial Examples With Dispersion Reduction,\u201d in Proc IEEE Conf Comput Vis Pattern Recognit (CVPR), Jun 2020, pp 940-949","DOI":"10.1109\/CVPR42600.2020.00102"},{"key":"5728_CR28","unstructured":"Liu Y, Chen X, Liu C, Song D (2016) \u201cDelving into Transferable Adversarial Examples and Black-box Attacks,\u201d in Proc Int Conf Learn Represent (ICLR), Nov 2016"},{"issue":"7","key":"5728_CR29","first-page":"11458","volume":"34","author":"Y Li","year":"2020","unstructured":"Li Y et al (2020) Learning Transferable Adversarial Examples via Ghost Networks. Proc AAAI Conf Artif Intell 34(7):11458\u201311465","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"5728_CR30","doi-asserted-by":"crossref","unstructured":"Xiong Y, et al (2022) \u201cStochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability,\u201d in Proc IEEE Conf Comput Vis Pattern Recognit (CVPR), Sept 2022, pp 14963-14972","DOI":"10.1109\/CVPR52688.2022.01456"},{"key":"5728_CR31","unstructured":"Dongxian Wu, Yisen Wang, Shu-Tao Xia, James Bailey, Xingjun Ma, (2020) \u201cSkip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets,\u201d in Proc Int Conf Learn Represent (ICLR), Sept 2020, pp 5025-5034"},{"issue":"1","key":"5728_CR32","doi-asserted-by":"crossref","first-page":"984","DOI":"10.1109\/TII.2022.3169973","volume":"19","author":"X Ding","year":"2023","unstructured":"Ding X, Cheng Y, Luo Y, Li Q, Gope P (2023) Consensus Adversarial Defense Method Based on Augmented Examples. IEEE Trans Ind Informatics 19(1):984\u2013994","journal-title":"IEEE Trans Ind Informatics"},{"issue":"11","key":"5728_CR33","first-page":"13054","volume":"45","author":"CP Lau","year":"2024","unstructured":"Lau CP, Liu J, Souri H, Lin W, Feizi S, Chellappa R (2024) Interpolated Joint Space Adversarial Training for Robust and Generalizable Defenses. IEEE Trans Pattern Anal Mach Intell 45(11):13054\u201313067","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"5728_CR34","doi-asserted-by":"crossref","first-page":"2119","DOI":"10.1109\/TIFS.2023.3263637","volume":"18","author":"J Yin","year":"2023","unstructured":"Yin J, Chen B, Zhu W, Chen B, Liu X (2023) Push Stricter to Decide Better: A Class-Conditional Feature Adaptive Framework for Improving Adversarial Robustness. IEEE Trans Inf Forensics Secur 18:2119\u20132131","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5728_CR35","doi-asserted-by":"crossref","unstructured":"Liu D, Wu LY, Li B, Boussa\u00efd F, Bennamoun M, Xie X, Liang C (2024) Jacobian norm with Selective Input Gradient Regularization for interpretable adversarial defense. Pattern Recognit 145","DOI":"10.1016\/j.patcog.2023.109902"},{"key":"5728_CR36","doi-asserted-by":"crossref","first-page":"5936","DOI":"10.1109\/TIFS.2023.3289000","volume":"18","author":"Q Li","year":"2023","unstructured":"Li Q, Hu Q, Lin C, Wu D, Shen C (2023) Revisiting Gradient Regularization: Inject Robust Saliency-Aware Weight Bias for Adversarial Defense. IEEE Trans Inf Forensics Secur 18:5936\u20135949","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5728_CR37","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.118957","volume":"214","author":"P Laykaviriyakul","year":"2023","unstructured":"Laykaviriyakul P, Phaisangittisagul E (2023) Collaborative Defense-GAN for protecting adversarial attacks on classification system. Expert Syst Appl 214:118957","journal-title":"Expert Syst Appl"},{"key":"5728_CR38","doi-asserted-by":"crossref","unstructured":"Zhao C, Mei S, Ni B, Yuan S, Yu Z, Jun Wang (2024) \u201cVariational Adversarial Defense: A Bayes Perspective for Adversarial Training,\u201d IEEE Trans Pattern Anal Mach Intell, vol 46, no 5, pp 3047-3063","DOI":"10.1109\/TPAMI.2023.3341639"},{"key":"5728_CR39","doi-asserted-by":"crossref","unstructured":"Niu Z, Yang Y (2023) Defense Against Adversarial Attacks with Efficient Frequency-Adaptive Compression and Reconstruction. Pattern Recognit 138","DOI":"10.1016\/j.patcog.2023.109382"},{"key":"5728_CR40","doi-asserted-by":"crossref","unstructured":"Han K, Xia B, Li Y (2022) (AD)2: Adversarial domain adaptation to defense with adversarial perturbation removal. Pattern Recognit 122","DOI":"10.1016\/j.patcog.2021.108303"},{"issue":"3","key":"5728_CR41","doi-asserted-by":"crossref","first-page":"1139","DOI":"10.1109\/TDSC.2023.3269012","volume":"21","author":"Y Wang","year":"2024","unstructured":"Wang Y, Li X, Yang L, Ma J, Li H (2024) ADDITION: Detecting Adversarial Examples With Image-Dependent Noise Reduction. IEEE Trans Dependable Secur Comput 21(3):1139\u20131154","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"1","key":"5728_CR42","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/TSC.2023.3329081","volume":"17","author":"E Nowroozi","year":"2024","unstructured":"Nowroozi E, Mohammadi M, Golmohammadi P, Mekdad Y, Conti M, Uluagac S (2024) Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization. IEEE Trans Serv Comput 17(1):18\u201329","journal-title":"IEEE Trans Serv Comput"},{"issue":"2","key":"5728_CR43","doi-asserted-by":"crossref","first-page":"2096","DOI":"10.1109\/TNSM.2023.3267831","volume":"20","author":"E Nowroozi","year":"2023","unstructured":"Nowroozi E, Mohammadi M, Savas E, Mekdad Y, Conti M (2023) Employing Deep Ensemble Learning for Improving the Security of Computer Networks Against Adversarial Attacks. IEEE Trans Netw Serv Manag 20(2):2096\u20132105","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"3\u20134","key":"5728_CR44","doi-asserted-by":"crossref","first-page":"2383","DOI":"10.1007\/s11042-019-08425-z","volume":"79","author":"M Barni","year":"2020","unstructured":"Barni M, Nowroozi E, Tondi B (2020) Improving the security of image manipulation detection through one-and-a-half-class multiple classification. Multim Tools Appl 79(3\u20134):2383\u20132408","journal-title":"Multim Tools Appl"},{"key":"5728_CR45","doi-asserted-by":"crossref","unstructured":"Kim WJ, Hong S, Yoon SE (2022) \u201cDiverse Generative Perturbations on Attention Space for Transferable Adversarial Attacks,\u201d in Proc IEEE Int Conf Image Process (ICIP), Oct 2022, pp 281-285","DOI":"10.1109\/ICIP46576.2022.9897346"},{"key":"5728_CR46","doi-asserted-by":"crossref","unstructured":"Hang J, et al (2022) \u201cEnsemble adversarial black-box attacks against deep learning systems,\u201d Pattern Recogn, vol 101, May 2022","DOI":"10.1016\/j.patcog.2019.107184"},{"key":"5728_CR47","unstructured":"Allen-Zhu Z, Li Y (2023) \u201cTowards Understanding Ensemble, Knowledge Distillation and Self-Distillation in Deep Learning,\u201d in Proc Int Conf Learn Represent (ICLR), Sept 2023"},{"issue":"4","key":"5728_CR48","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1007\/s11390-021-1119-0","volume":"38","author":"Y Xu","year":"2023","unstructured":"Xu Y, Qiu X, Zhou L, Huang X (2023) Improving BERT Fine-Tuning via Self-Ensemble and Self-Distillation. J Comput Sci Technol 38(4):853\u2013866","journal-title":"J Comput Sci Technol"},{"key":"5728_CR49","doi-asserted-by":"crossref","unstructured":"Ma N, Zhang X, Zheng H, Sun J (2018) \u201cShuffleNet V2: Practical Guidelines for Efficient CNN Architecture Design,\u201d in Proc Eur Conf Comput Vis (ECCV), pp 122-138","DOI":"10.1007\/978-3-030-01264-9_8"},{"key":"5728_CR50","doi-asserted-by":"crossref","unstructured":"Xiaohan Ding, Xiangyu Zhang, Ningning Ma, Jungong Han, Guiguang Ding, Jian Sun (2021) \u201cRepVGG: Making VGG-Style ConvNets Great Again,\u201d in Proc IEEE Conf Comput Vis Pattern Recognit (CVPR), Dec 2021, pp 13733-13742","DOI":"10.1109\/CVPR46437.2021.01352"},{"key":"5728_CR51","doi-asserted-by":"crossref","unstructured":"Sandler M, Howard AG, Zhu M, Zhmoginov A, Chen L (2018) \u201cMobileNetV2: Inverted Residuals and Linear Bottlenecks,\u201d in Proc IEEE Conf Comput Vis Pattern Recognit (CVPR), Dec 2018, pp 4510-4520","DOI":"10.1109\/CVPR.2018.00474"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-024-05728-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-024-05728-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-024-05728-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T14:04:39Z","timestamp":1726668279000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-024-05728-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,22]]},"references-count":51,"journal-issue":{"issue":"21","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["5728"],"URL":"https:\/\/doi.org\/10.1007\/s10489-024-05728-z","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,22]]},"assertion":[{"value":"4 August 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 August 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"All procedures performed in the studies involving human participants were in accordance with the ethical standards of the institutional and\/or national research committee and with the 1964 Helsinki Declaration and its later amendments or comparable ethical standards.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}