{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:31:27Z","timestamp":1775068287464,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T00:00:00Z","timestamp":1741564800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T00:00:00Z","timestamp":1741564800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62162012"],"award-info":[{"award-number":["62162012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62173278"],"award-info":[{"award-number":["62173278"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072061"],"award-info":[{"award-number":["62072061"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s10489-024-06069-7","type":"journal-article","created":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T05:28:04Z","timestamp":1741584484000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Parallel recurrent neural network with transformer for anomalous trajectory detection"],"prefix":"10.1007","volume":"55","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0151-9643","authenticated-orcid":false,"given":"Dawen","family":"Xia","sequence":"first","affiliation":[]},{"given":"Yunsong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuce","family":"Ao","sequence":"additional","affiliation":[]},{"given":"Xiaoduo","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Yantao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Huaqing","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,10]]},"reference":[{"issue":"3","key":"6069_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2743025","volume":"6","author":"Y Zheng","year":"2015","unstructured":"Zheng Y (2015) Trajectory data mining: an overview. ACM Trans Intell Syst Technol 6(3):1\u201341","journal-title":"ACM Trans Intell Syst Technol"},{"key":"6069_CR2","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1007\/s11280-017-0487-4","volume":"21","author":"X Kong","year":"2018","unstructured":"Kong X, Song X, Xia F, Guo H, Wang J, Tolba A (2018) LoTAD: long-term traffic anomaly detection based on crowdsourced bus trajectory data. World Wide Web 21:825\u2013847","journal-title":"World Wide Web"},{"key":"6069_CR3","doi-asserted-by":"crossref","unstructured":"Gao Q, Zhou F, Zhang K, Trajcevski G, Luo X, Zhang F (2017) Identifying human mobility via trajectory embeddings. In: IJCAI, vol 17, pp 1689\u20131695","DOI":"10.24963\/ijcai.2017\/234"},{"key":"6069_CR4","doi-asserted-by":"crossref","unstructured":"Yuan H, Li G (2021) A survey of traffic prediction: from spatio-temporal data to intelligent transportation. Data Sci Eng 6:63\u201385","DOI":"10.1007\/s41019-020-00151-z"},{"issue":"15","key":"6069_CR5","doi-asserted-by":"publisher","first-page":"17042","DOI":"10.1007\/s10489-021-02757-w","volume":"52","author":"X Niu","year":"2021","unstructured":"Niu X, Zheng Y, Fournier-Viger P, Wang B (2021) Parallel grid-based density peak clustering of big trajectory data. Appl Intell 52(15):17042\u201317057","journal-title":"Appl Intell"},{"issue":"4","key":"6069_CR6","doi-asserted-by":"publisher","first-page":"4599","DOI":"10.1109\/TITS.2022.3197446","volume":"24","author":"G Raja","year":"2022","unstructured":"Raja G, Begum M, Gurumoorthy S, Rajendran DS, Srividya P, Dev K, Qureshi NMF (2022) AI-empowered trajectory anomaly detection and classification in 6G\u2013V2X. IEEE Trans Intell Transp Syst 24(4):4599\u20134607","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"6069_CR7","doi-asserted-by":"publisher","first-page":"106173","DOI":"10.1016\/j.engappai.2023.106173","volume":"123","author":"W Ullah","year":"2023","unstructured":"Ullah W, Hussain T, Ullah FUM, Lee MY, Baik SW (2023) TransCNN: hybrid CNN and transformer mechanism for surveillance anomaly detection. Eng Appl Artif Intell 123:106173","journal-title":"Eng Appl Artif Intell"},{"issue":"4","key":"6069_CR8","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/s10109-012-0166-z","volume":"14","author":"Y Liu","year":"2012","unstructured":"Liu Y, Kang C, Gao S, Xiao Y, Tian Y (2012) Understanding intra-urban trip patterns from taxi trajectory data. J Geogr Syst 14(4):463\u2013483","journal-title":"J Geogr Syst"},{"issue":"10","key":"6069_CR9","doi-asserted-by":"publisher","first-page":"12489","DOI":"10.1007\/s10489-022-04140-9","volume":"53","author":"S Dutta","year":"2023","unstructured":"Dutta S, Patra BK (2023) Inferencing transportation mode using unsupervised deep learning approach exploiting GPS point-level characteristics. Appl Intell 53(10):12489\u201312503","journal-title":"Appl Intell"},{"key":"6069_CR10","doi-asserted-by":"publisher","first-page":"2437","DOI":"10.1007\/s10462-018-9619-1","volume":"52","author":"F Meng","year":"2019","unstructured":"Meng F, Yuan G, Lv S, Wang Z, Xia S (2019) An overview on trajectory outlier detection. Artif Intell Rev 52:2437\u20132456","journal-title":"Artif Intell Rev"},{"key":"6069_CR11","doi-asserted-by":"crossref","unstructured":"Ma C, Miao Z, Li M, Song S, Yang M-H (2018) Detecting anomalous trajectories via recurrent neural networks. In: Asian conference on computer vision. Springer, pp 370\u2013382","DOI":"10.1007\/978-3-030-20870-7_23"},{"key":"6069_CR12","doi-asserted-by":"publisher","first-page":"12192","DOI":"10.1109\/ACCESS.2019.2893124","volume":"7","author":"Y Djenouri","year":"2019","unstructured":"Djenouri Y, Belhadi A, Lin JC-W, Djenouri D, Cano A (2019) A survey on urban traffic anomalies detection algorithms. IEEE Access 7:12192\u201312205","journal-title":"IEEE Access"},{"key":"6069_CR13","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.datak.2013.05.002","volume":"87","author":"LX Pang","year":"2013","unstructured":"Pang LX, Chawla S, Liu W, Zheng Y (2013) On detection of emerging anomalous traffic patterns using GPS data. Data Knowl Eng 87:357\u2013373","journal-title":"Data Knowl Eng"},{"key":"6069_CR14","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.inffus.2020.08.003","volume":"65","author":"A Belhadi","year":"2021","unstructured":"Belhadi A, Djenouri Y, Srivastava G, Djenouri D, Lin JC-W, Fortino G (2021) Deep learning for pedestrian collective behavior analysis in smart cities: a model of group trajectory outlier detection. Inf Fusion 65:13\u201320","journal-title":"Inf Fusion"},{"key":"6069_CR15","doi-asserted-by":"crossref","unstructured":"Zhang D, Li N, Zhou Z, Chen C, Sun L, Li S (2011) iBAT: detecting anomalous taxi trajectories from GPS traces. In: Proceedings of the 13th international conference on ubiquitous computing, pp 99\u2013108","DOI":"10.1145\/2030112.2030127"},{"issue":"2","key":"6069_CR16","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1109\/TITS.2013.2238531","volume":"14","author":"C Chen","year":"2013","unstructured":"Chen C, Zhang D, Castro PS, Li N, Sun L, Li S, Wang Z (2013) iBOAT: isolation-based online anomalous trajectory detection. IEEE Trans Intell Transp Syst 14(2):806\u2013818","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"1","key":"6069_CR17","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s11280-016-0400-6","volume":"20","author":"J Zhu","year":"2017","unstructured":"Zhu J, Jiang W, Liu A, Liu G, Zhao L (2017) Effective and efficient trajectory outlier detection based on time-dependent popular route. World Wide Web 20(1):111\u2013134","journal-title":"World Wide Web"},{"key":"6069_CR18","doi-asserted-by":"crossref","unstructured":"Song L, Wang R, Xiao D, Han X, Cai Y, Shi C (2018) Anomalous trajectory detection using recurrent neural network. In: Advanced data mining and applications: 14th International Conference, ADMA 2018, Nanjing, China, November 16\u201318, 2018, Proceedings 14. Springer, pp 263\u2013277","DOI":"10.1007\/978-3-030-05090-0_23"},{"key":"6069_CR19","doi-asserted-by":"crossref","unstructured":"Lee J-G, Han J, Li X (2008) Trajectory outlier detection: a partition-and-detect framework. In: 2008 IEEE 24th International conference on data engineering. IEEE, pp 140\u2013149","DOI":"10.1109\/ICDE.2008.4497422"},{"key":"6069_CR20","doi-asserted-by":"crossref","unstructured":"Ge Y, Xiong H, Liu C, Zhou Z-H (2011) A taxi driving fraud detection system. In: 2011 IEEE 11th International conference on data mining. IEEE, pp 181\u2013190","DOI":"10.1109\/ICDM.2011.18"},{"key":"6069_CR21","doi-asserted-by":"crossref","unstructured":"Yu Y, Cao L, Rundensteiner EA, Wang Q (2014) Detecting moving object outliers in massive-scale trajectory streams. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining, pp 422\u2013431","DOI":"10.1145\/2623330.2623735"},{"issue":"3","key":"6069_CR22","doi-asserted-by":"publisher","first-page":"2487","DOI":"10.1109\/TVT.2020.2967865","volume":"69","author":"J Wang","year":"2020","unstructured":"Wang J, Yuan Y, Ni T, Ma Y, Liu M, Xu G, Shen W (2020) Anomalous trajectory detection and classification based on difference and intersection set distance. IEEE Trans Veh Technol 69(3):2487\u20132500","journal-title":"IEEE Trans Veh Technol"},{"key":"6069_CR23","doi-asserted-by":"publisher","first-page":"103196","DOI":"10.1016\/j.trc.2021.103196","volume":"128","author":"SE Huang","year":"2021","unstructured":"Huang SE, Feng Y, Liu HX (2021) A data-driven method for falsified vehicle trajectory identification by anomaly detection. Transp Res Part C Emerg Technol 128:103196","journal-title":"Transp Res Part C Emerg Technol"},{"key":"6069_CR24","doi-asserted-by":"publisher","first-page":"128770","DOI":"10.1016\/j.physa.2023.128770","volume":"621","author":"D Xia","year":"2023","unstructured":"Xia D, Jiang S, Li Y, Yang N, Hu Y, Li Y, Li H (2023) An ASM-CF model for anomalous trajectory detection with mobile trajectory big data. Physica A Stat Mech Appl 621:128770","journal-title":"Physica A Stat Mech Appl"},{"issue":"1","key":"6069_CR25","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s10115-015-0845-4","volume":"47","author":"P-R Lei","year":"2016","unstructured":"Lei P-R (2016) A framework for anomaly detection in maritime trajectory behavior. Knowl Inf Syst 47(1):189\u2013214","journal-title":"Knowl Inf Syst"},{"key":"6069_CR26","doi-asserted-by":"crossref","unstructured":"Li X, Li Z, Han J, Lee J-G (2009) Temporal outlier detection in vehicle traffic data. In: 2009 IEEE 25th international conference on data engineering. IEEE, pp 1319\u20131322","DOI":"10.1109\/ICDE.2009.230"},{"key":"6069_CR27","doi-asserted-by":"crossref","unstructured":"Zhu J, Jiang W, Liu A, Liu G, Zhao L (2015) Time-dependent popular routes based trajectory outlier detection. In: Web information systems engineering\u2013WISE 2015: 16th International Conference, Miami, FL, USA, November 1-3, 2015, Proceedings, Part I 16. Springer, pp 16\u201330","DOI":"10.1007\/978-3-319-26190-4_2"},{"key":"6069_CR28","unstructured":"Malhotra P, Vig L, Shroff G, Agarwal P (2015) Long short term memory networks for anomaly detection in time series. In: ESANN, vol 2015, p 89"},{"key":"6069_CR29","doi-asserted-by":"crossref","unstructured":"Ren H, Xu B, Wang Y, Yi C, Huang C, Kou X, Xing T, Yang M, Tong J, Zhang Q (2019) Time-series anomaly detection service at Microsoft. In: Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery and data mining, pp 3009\u20133017","DOI":"10.1145\/3292500.3330680"},{"key":"6069_CR30","doi-asserted-by":"crossref","unstructured":"Laptev N, Amizadeh S, Flint I (2015) Generic and scalable framework for automated time-series anomaly detection. In: Proceedings of the 21th ACM SIGKDD international conference on knowledge discovery and data mining, pp 1939\u20131947","DOI":"10.1145\/2783258.2788611"},{"key":"6069_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.105964","volume":"120","author":"J Kim","year":"2023","unstructured":"Kim J, Kang H, Kang P (2023) Time-series anomaly detection with stacked transformer representations and 1d convolutional network. Eng Appl Artif Intell 120:105964","journal-title":"Eng Appl Artif Intell"},{"issue":"2","key":"6069_CR32","doi-asserted-by":"publisher","first-page":"2499","DOI":"10.1007\/s13369-021-06227-w","volume":"47","author":"A Alsayat","year":"2022","unstructured":"Alsayat A (2022) Improving sentiment analysis for social media applications using an ensemble deep learning language model. Arab J Sci Eng 47(2):2499\u20132511","journal-title":"Arab J Sci Eng"},{"issue":"6","key":"6069_CR33","doi-asserted-by":"publisher","first-page":"4701","DOI":"10.1007\/s00521-022-07992-x","volume":"35","author":"A Alsayat","year":"2023","unstructured":"Alsayat A (2023) Customer decision-making analysis based on big social data using machine learning: a case study of hotels in mecca. Neural Comput Appl 35(6):4701\u20134722","journal-title":"Neural Comput Appl"},{"issue":"2","key":"6069_CR34","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1109\/TFUZZ.2022.3197876","volume":"31","author":"U Ahmed","year":"2022","unstructured":"Ahmed U, Lin JC-W, Srivastava G (2022) Deep fuzzy contrast-set deviation point representation and trajectory detection. IEEE Trans Fuzzy Syst 31(2):571\u2013581","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"3","key":"6069_CR35","doi-asserted-by":"publisher","first-page":"3267","DOI":"10.1007\/s11063-022-11009-y","volume":"55","author":"A Alsayat","year":"2023","unstructured":"Alsayat A, Ahmadi H (2023) A hybrid method using ensembles of neural network and text mining for learner satisfaction analysis from big datasets in online learning platform. Neural Process Lett 55(3):3267\u20133303","journal-title":"Neural Process Lett"},{"key":"6069_CR36","doi-asserted-by":"crossref","unstructured":"Wu H, Sun W, Zheng B (2017) A fast trajectory outlier detection approach via driving behavior modeling. In: Proceedings of the 2017 ACM on conference on information and knowledge management, pp 837\u2013846","DOI":"10.1145\/3132847.3132933"},{"key":"6069_CR37","doi-asserted-by":"crossref","unstructured":"Cheng Y, Wu B, Song L, Shi C (2019) Spatial-temporal recurrent neural network for anomalous trajectories detection. In: Advanced data mining and applications: 15th International Conference, ADMA 2019, Dalian, China, November 21\u201323, 2019, Proceedings 15. Springer, pp 565\u2013578","DOI":"10.1007\/978-3-030-35231-8_41"},{"key":"6069_CR38","doi-asserted-by":"publisher","first-page":"104063","DOI":"10.1109\/ACCESS.2020.2997967","volume":"8","author":"Y Ji","year":"2020","unstructured":"Ji Y, Wang L, Wu W, Shao H, Feng Y (2020) A method for LSTM-based trajectory modeling and abnormal trajectory detection. IEEE Access 8:104063\u2013104073","journal-title":"IEEE Access"},{"key":"6069_CR39","volume":"115","author":"W Yu","year":"2022","unstructured":"Yu W, Huang Q (2022) A deep encoder-decoder network for anomaly detection in driving trajectory behavior under spatio-temporal context. Int J Appl Earth Obs Geoinf 115:103115","journal-title":"Int J Appl Earth Obs Geoinf"},{"issue":"4","key":"6069_CR40","doi-asserted-by":"publisher","first-page":"880","DOI":"10.3390\/jmse11040880","volume":"11","author":"D Jiang","year":"2023","unstructured":"Jiang D, Shi G, Li N, Ma L, Li W, Shi J (2023) TRFM-LS: Transformer-based deep learning method for vessel trajectory prediction. J Mar Sci Eng 11(4):880","journal-title":"J Mar Sci Eng"},{"issue":"7","key":"6069_CR41","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.14778\/3523210.3523225","volume":"15","author":"X Han","year":"2022","unstructured":"Han X, Cheng R, Ma C, Grubenmann T (2022) DeepTEA: effective and efficient online time-dependent trajectory outlier detection. Proceedings of the VLDB Endowment 15(7):1493\u20131505","journal-title":"Proceedings of the VLDB Endowment"},{"key":"6069_CR42","doi-asserted-by":"crossref","unstructured":"Gray K, Smolyak D, Badirli S, Mohler G (2020) Coupled igmm-gans for deep multimodal anomaly detection in human mobility data. ACM Trans Spat Algorithms Syst (TSAS) 1\u201314","DOI":"10.1145\/3385809"},{"key":"6069_CR43","doi-asserted-by":"crossref","unstructured":"Liu Y, Zhao K, Cong G, Bao Z (2020) Online anomalous trajectory detection with deep generative sequence modeling. In: 2020 IEEE 36th international conference on data engineering (ICDE). IEEE, pp 949\u2013960","DOI":"10.1109\/ICDE48307.2020.00087"},{"key":"6069_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.future.2023.02.007","volume":"144","author":"C Wang","year":"2023","unstructured":"Wang C, Li K, Chen L (2023) Deep unified attention-based sequence modeling for online anomalous trajectory detection. Futur Gener Comput Syst 144:1\u201311","journal-title":"Futur Gener Comput Syst"},{"issue":"8","key":"6069_CR45","doi-asserted-by":"publisher","first-page":"810","DOI":"10.1049\/iet-its.2014.0238","volume":"9","author":"Y Cai","year":"2015","unstructured":"Cai Y, Wang H, Chen X, Jiang H (2015) Trajectory-based anomalous behaviour detection for intelligent traffic surveillance. IET Intel Transport Syst 9(8):810\u2013816","journal-title":"IET Intel Transport Syst"},{"key":"6069_CR46","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser \u0141, Polosukhin I (2017) Attention is all you need. Adv Neural Inf Process Syst 30:5998\u20136008"},{"issue":"8","key":"6069_CR47","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780","journal-title":"Neural Comput"},{"key":"6069_CR48","doi-asserted-by":"crossref","unstructured":"Chen T, Guestrin C (2016) XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, KDD \u201916, pp 785\u2013794","DOI":"10.1145\/2939672.2939785"},{"key":"6069_CR49","unstructured":"Kingma DP, Ba J (2015) Adam: a method for stochastic optimization. In: Proceedings of the 3rd international conference on learning representations (ICLR) 1\u201315"},{"issue":"1","key":"6069_CR50","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1186\/s40537-021-00515-w","volume":"8","author":"DL Naik","year":"2021","unstructured":"Naik DL, Kiran R (2021) A novel sensitivity-based method for feature selection. J Big Data 8(1):128","journal-title":"J Big Data"},{"issue":"3","key":"6069_CR51","doi-asserted-by":"publisher","first-page":"562","DOI":"10.2166\/hydro.2020.098","volume":"22","author":"R Asheghi","year":"2020","unstructured":"Asheghi R, Hosseini SA, Saneie M, Shahri AA (2020) Updating the neural network sediment load models using different sensitivity analysis methods: a regional application. J Hydroinf 22(3):562\u2013577","journal-title":"J Hydroinf"},{"issue":"3","key":"6069_CR52","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1007\/s11053-022-10051-w","volume":"31","author":"A Abbaszadeh Shahri","year":"2022","unstructured":"Abbaszadeh Shahri A, Shan C, Larsson S (2022) A novel approach to uncertainty quantification in groundwater table modeling by automated predictive deep learning. Nat Resour Res 31(3):1351\u20131373","journal-title":"Nat Resour Res"},{"key":"6069_CR53","doi-asserted-by":"crossref","unstructured":"Lohrer A, Malik D, Zelenka C, Kr\u00f6ger P (2024) GADformer: a transparent transformer model for group anomaly detection on trajectories. In: 2024 international joint conference on neural networks (IJCNN). IEEE, pp 1\u20138","DOI":"10.1109\/IJCNN60899.2024.10650999"},{"key":"6069_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2020.110045","volume":"139","author":"M Sangiorgio","year":"2020","unstructured":"Sangiorgio M, Dercole F (2020) Robustness of LSTM neural networks for multi-step forecasting of chaotic time series. Chaos, Solitons & Fractals 139:110045","journal-title":"Chaos, Solitons & Fractals"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-024-06069-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-024-06069-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-024-06069-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T19:38:55Z","timestamp":1758310735000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-024-06069-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,10]]},"references-count":54,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["6069"],"URL":"https:\/\/doi.org\/10.1007\/s10489-024-06069-7","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,10]]},"assertion":[{"value":"13 November 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}],"article-number":"519"}}