{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T11:22:39Z","timestamp":1770290559240,"version":"3.49.0"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T00:00:00Z","timestamp":1694563200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T00:00:00Z","timestamp":1694563200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s10515-023-00392-y","type":"journal-article","created":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T20:41:46Z","timestamp":1694637706000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Tips: towards automating patch suggestion for vulnerable smart contracts"],"prefix":"10.1007","volume":"30","author":[{"given":"Qianguo","family":"Chen","sequence":"first","affiliation":[]},{"given":"Teng","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Kui","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chunpeng","family":"Ge","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jacques","family":"Klein","sequence":"additional","affiliation":[]},{"given":"Tegawend\u00e9 F.","family":"Bissyand\u00e9","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,13]]},"reference":[{"key":"392_CR1","doi-asserted-by":"publisher","first-page":"99552","DOI":"10.1109\/ACCESS.2020.2995183","volume":"8","author":"I Ashraf","year":"2020","unstructured":"Ashraf, I., Ma, X., Jiang, B., Chan, W.K.: GasFuzzer: fuzzing ethereum smart contract binaries to expose gas-oriented exception security vulnerabilities. IEEE Access 8, 99552\u201399564 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2995183","journal-title":"IEEE Access"},{"key":"392_CR2","doi-asserted-by":"publisher","unstructured":"Brent, L., Grech, N., Lagouvardos, S., Scholz, B., Smaragdakis, Y.: Ethainter: a smart contract security analyzer for composite vulnerabilities. In: Proceedings of the 41st ACM SIGPLAN International Conference on Programming Language Design and Implementation, pp. 454\u2013469. ACM (2020). https:\/\/doi.org\/10.1145\/3385412.3385990","DOI":"10.1145\/3385412.3385990"},{"key":"392_CR3","unstructured":"Chen, J., Xia, X., Lo, D., Grundy, J., Luo, X., Chen, T.: Defining smart contract defects on ethereum. IEEE Trans. Softw. Eng. (2020)"},{"key":"392_CR4","unstructured":"del Castillo, M.: The DAO attacked: code issue leads to \\$60 million ether theft (2016)"},{"key":"392_CR5","doi-asserted-by":"crossref","unstructured":"Durieux, T., Cornu, B., Seinturier, L., Monperrus, M.: Dynamic patch generation for null pointer exceptions using metaprogramming. In: Proceedings of the 24th International Conference on Software Analysis, Evolution and Reengineering, pp. 349\u2013358 (2017)","DOI":"10.1109\/SANER.2017.7884635"},{"key":"392_CR6","doi-asserted-by":"crossref","unstructured":"Durieux, T., Ferreira, J.F., Abreu, R., Cruz, P.: Empirical review of automated analysis tools on 47,587 ethereum smart contracts. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering, pp. 530\u2013541 (2020)","DOI":"10.1145\/3377811.3380364"},{"key":"392_CR7","unstructured":"Ethereum smart contract security best practices. https:\/\/consensys.github.io\/smart-contract-best-practices\/ (Last Accessed: July 2021)"},{"key":"392_CR8","unstructured":"Ethereum. https:\/\/ethereum.org\/ (Last Accessed: July 2021)"},{"key":"392_CR9","doi-asserted-by":"crossref","unstructured":"Feist, J., Grieco, G., Groce, A.: Slither: a static analysis framework for smart contracts. In: 2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), pp. 8\u201315 (2019)","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"392_CR10","unstructured":"Gao, Z., Jiang, L., Xia, X., Lo, D., Grundy, J.C.: Checking smart contracts with structural code embedding. IEEE Trans. Softw. Eng. 1\u20131 (2020)"},{"issue":"1","key":"392_CR11","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/TSE.2017.2755013","volume":"45","author":"L Gazzola","year":"2017","unstructured":"Gazzola, L., Micucci, D., Mariani, L.: Automatic software repair: a survey. IEEE Trans. Softw. Eng. 45(1), 34\u201367 (2017)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"392_CR12","doi-asserted-by":"publisher","unstructured":"Ghanbari, A., Benton, S., Zhang, L.: Practical program repair via bytecode mutation. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 19\u201330. ACM (2019). https:\/\/doi.org\/10.1145\/3293882.3330559","DOI":"10.1145\/3293882.3330559"},{"issue":"12","key":"392_CR13","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/3318162","volume":"62","author":"CL Goues","year":"2019","unstructured":"Goues, C.L., Pradel, M., Roychoudhury, A.: Automated program repair. Commun. ACM 62(12), 56\u201365 (2019)","journal-title":"Commun. ACM"},{"key":"392_CR14","doi-asserted-by":"publisher","unstructured":"Hartel, P.H., Schumi, R.: Mutation testing of smart contracts at scale. In: Proceedings of the 14th International Conference on Tests and Proofs. Lecture Notes in Computer Science, vol. 12165, pp. 23\u201342 (2020). https:\/\/doi.org\/10.1007\/978-3-030-50995-8_2","DOI":"10.1007\/978-3-030-50995-8_2"},{"key":"392_CR15","doi-asserted-by":"crossref","unstructured":"Huang, Y., Jiang, B., Chan, W.K.: EOSFuzze: fuzzing EOSIO smart contracts for vulnerability detection. CoRR (2020) arXiv:2007.14903","DOI":"10.1145\/3457913.3457920"},{"key":"392_CR16","unstructured":"ICO Security. https:\/\/blog.positive.com (Last Accessed: July 2021)"},{"key":"392_CR17","doi-asserted-by":"publisher","unstructured":"Jiang, B., Liu, Y., Chan, W.K.: ContractFuzzer: fuzzing smart contracts for vulnerability detection. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 259\u2013269. ACM (2018a). https:\/\/doi.org\/10.1145\/3238147.3238177","DOI":"10.1145\/3238147.3238177"},{"key":"392_CR18","doi-asserted-by":"crossref","unstructured":"Jiang, J., Xiong, Y., Zhang, H., Gao, Q., Chen, X.: Shaping program repair space with existing patches and similar code. In: Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 298\u2013309. ACM, (2018b)","DOI":"10.1145\/3213846.3213871"},{"key":"392_CR19","doi-asserted-by":"crossref","unstructured":"Kim, D., Nam, J., Song, J., Kim, S.: Automatic patch generation learned from human-written patches. In: 2013 35th International Conference on Software Engineering (ICSE), pp. 802\u2013811 (2013)","DOI":"10.1109\/ICSE.2013.6606626"},{"key":"392_CR20","doi-asserted-by":"crossref","unstructured":"Koyuncu, A., Liu, K., Bissyand\u00e9, T.F., Kim, D., Monperrus, M., Klein, J., Le\u00a0Traon, Y.: ifixr: bug report driven program repair. In: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 314\u2013325 (2019)","DOI":"10.1145\/3338906.3338935"},{"issue":"3","key":"392_CR21","doi-asserted-by":"publisher","first-page":"1980","DOI":"10.1007\/s10664-019-09780-z","volume":"25","author":"A Koyuncu","year":"2020","unstructured":"Koyuncu, A., Liu, K., Bissyand\u00e9, T.F., Kim, D., Monperrus, M., Klein, J., Le Traon, Y.: FixMiner: mining relevant fix patterns for automated program repair. Empir. Softw. Eng. 25(3), 1980\u20132024 (2020). https:\/\/doi.org\/10.1007\/s10664-019-09780-z","journal-title":"Empir. Softw. Eng."},{"key":"392_CR22","doi-asserted-by":"crossref","unstructured":"Le, X.B.D., Lo, D., Le\u00a0Goues, C.: History driven program repair. In: 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), vol. 1, pp. 213\u2013224. IEEE (2016)","DOI":"10.1109\/SANER.2016.76"},{"key":"392_CR23","doi-asserted-by":"publisher","unstructured":"Li, Z., Wu, H., Xu, J., Wang, X., Zhang, L., Chen, Z.: Musc: a tool for mutation testing of ethereum smart contract. In: Proceedings of the 34th IEEE\/ACM International Conference on Automated Software Engineering, pp. 1198\u20131201. IEEE (2019). https:\/\/doi.org\/10.1109\/ASE.2019.00136","DOI":"10.1109\/ASE.2019.00136"},{"key":"392_CR24","doi-asserted-by":"crossref","unstructured":"Liu, X., Zhong, H.: Mining stackoverflow for program repair. In: Proceedings of the 25th International Conference on Software Analysis, Evolution and Reengineering, pp. 118\u2013129 (2018)","DOI":"10.1109\/SANER.2018.8330202"},{"key":"392_CR25","doi-asserted-by":"publisher","unstructured":"Liu, C., Liu, H., Cao, Z., Chen, Z., Chen, B., Roscoe, B.: ReGuard: finding reentrancy bugs in smart contracts. In: Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, pp. 65\u201368. ACM, (2018a). https:\/\/doi.org\/10.1145\/3183440.3183495","DOI":"10.1145\/3183440.3183495"},{"key":"392_CR26","doi-asserted-by":"publisher","unstructured":"Liu, H., Liu, C., Zhao, W., Jiang, Y., Sun, J.: S-gram: towards semantic-aware security auditing for ethereum smart contracts. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 814\u2013819. ACM (2018b). https:\/\/doi.org\/10.1145\/3238147.3240728","DOI":"10.1145\/3238147.3240728"},{"key":"392_CR27","doi-asserted-by":"crossref","unstructured":"Liu, K., Koyuncu, A., Bissyand\u00e9, T.F., Kim, D., Klein, J., Le\u00a0Traon, Y.: You cannot fix what you cannot find! an investigation of fault localization bias in benchmarking automated program repair systems. In: 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST), pp. 102\u2013113 (2019a)","DOI":"10.1109\/ICST.2019.00020"},{"key":"392_CR28","doi-asserted-by":"crossref","unstructured":"Liu, K., Koyuncu, A., Kim, D., Bissyand\u00e9, T.F.: Avatar: Fixing semantic bugs with fix patterns of static analysis violations. In: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 1\u201312 (2019b)","DOI":"10.1109\/SANER.2019.8667970"},{"key":"392_CR29","doi-asserted-by":"publisher","unstructured":"Liu, K., Koyuncu, A., Kim, D., Bissyand\u00e9, T.F.: TBar: revisiting template-based automated program repair. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 31\u201342 (2019c). https:\/\/doi.org\/10.1145\/3293882.3330577","DOI":"10.1145\/3293882.3330577"},{"key":"392_CR30","doi-asserted-by":"publisher","unstructured":"Liu, K., Wang, S., Koyuncu, A., Kim, K., Bissyand\u00e9, T.F., Kim, D., Wu, P., Klein, J., Mao, X., Traon, Y.L.: On the efficiency of test suite based program repair: a systematic assessment of 16 automated repair systems for java programs. In: Proceedings of the 42nd International Conference on Software Engineering, pp. 615\u2013627. ACM (2020). https:\/\/doi.org\/10.1145\/3377811.3380338","DOI":"10.1145\/3377811.3380338"},{"key":"392_CR31","doi-asserted-by":"publisher","first-page":"110817","DOI":"10.1016\/j.jss.2020.110817","volume":"171","author":"K Liu","year":"2021","unstructured":"Liu, K., Li, L., Koyuncu, A., Kim, D., Liu, Z., Klein, J., Bissyand\u00e9, T.F.: A critical review on the evaluation of automated program repair systems. J. Syst. Softw. 171, 110817 (2021). https:\/\/doi.org\/10.1016\/j.jss.2020.110817","journal-title":"J. Syst. Softw."},{"key":"392_CR32","doi-asserted-by":"publisher","DOI":"10.1145\/3579637","author":"K Liu","year":"2022","unstructured":"Liu, K., Zhang, J., Li, L., Koyuncu, A., Kim, D., Ge, C., Liu, Z., Klein, J., Bissyand\u00e9, T.F.: Reliable fix patterns inferred from static checkers for automated program repair. ACM Trans. Softw. Eng. Methodol. (2022). https:\/\/doi.org\/10.1145\/3579637","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"392_CR33","doi-asserted-by":"crossref","unstructured":"Long, F., Amidon, P., Rinard, M.: Automatic inference of code transforms for patch generation. In: Proceedings of the 11th Joint Meeting on Foundations of Software Engineering, pp. 727\u2013739 (2017)","DOI":"10.1145\/3106237.3106253"},{"key":"392_CR34","doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D.-H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 254\u2013269. ACM (2016)","DOI":"10.1145\/2976749.2978309"},{"issue":"1","key":"392_CR35","first-page":"17","volume":"51","author":"M Monperrus","year":"2018","unstructured":"Monperrus, M.: Automatic software repair: a bibliography. ACM Comput. Surv. 51(1), 17\u201311724 (2018)","journal-title":"ACM Comput. Surv."},{"key":"392_CR36","unstructured":"Mueller, B.: Smashing ethereum smart contracts for fun and real profit. In: 9th Annual HITB Security Conference (HITBSecConf), p. 54 (2018)"},{"key":"392_CR37","doi-asserted-by":"crossref","unstructured":"Nguyen, T.D., Pham, L.H., Sun, J., Lin, Y., Minh, Q.T.: sFuzz: an efficient adaptive fuzzer for solidity smart contracts. CoRR (2020). arXiv:2004.08563","DOI":"10.1145\/3377811.3380334"},{"key":"392_CR38","doi-asserted-by":"crossref","unstructured":"Nguyen, T.D., Pham, L.H., Sun, J.: sGUARD: towards fixing vulnerable smart contracts automatically (2021). arXiv preprint arXiv:2101.01917","DOI":"10.1109\/SP40001.2021.00057"},{"key":"392_CR39","doi-asserted-by":"crossref","unstructured":"Nikoli\u0107, I., Kolluri, A., Sergey, I., Saxena, P., Hobor, A.: Finding the greedy, prodigal, and suicidal contracts at scale. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 653\u2013663 (2018)","DOI":"10.1145\/3274694.3274743"},{"key":"392_CR40","unstructured":"(Not So) Smart Contracts. https:\/\/github.com\/crytic\/not-so-smart-contracts (Last Accessed: July 2021)"},{"key":"392_CR41","unstructured":"O\u2019Leary, R.-R.: Parity team publishes postmortem on $160 million ether freeze (2017)"},{"key":"392_CR42","unstructured":"Remix. https:\/\/remix.ethereum.org\/ (Last Accessed: July 2021)"},{"key":"392_CR43","unstructured":"Rolim, R., Soares, G., Gheyi, R., D\u2019Antoni, L.: Learning quick fixes from code repositories (2018). arXiv preprint arXiv:1803.03806"},{"key":"392_CR44","doi-asserted-by":"crossref","unstructured":"Saha, R.K., Lyu, Y., Yoshida, H., Prasad, M.R.: ELIXIR: effective object-oriented program repair. In: Proceedings of the 32nd IEEE\/ACM International Conference on Automated Software Engineering, pp. 648\u2013659 (2017)","DOI":"10.1109\/ASE.2017.8115675"},{"key":"392_CR45","doi-asserted-by":"publisher","unstructured":"Saha, S., Saha, R.K., Prasad, M.R.: Harnessing evolution for multi-hunk program repair. In: Proceedings of the 41st International Conference on Software Engineering, pp. 13\u201324. IEEE (2019). https:\/\/doi.org\/10.1109\/ICSE.2019.00020","DOI":"10.1109\/ICSE.2019.00020"},{"key":"392_CR46","unstructured":"Solidity. https:\/\/github.com\/ethereum\/solidity (Last Accessed: July 2021)"},{"key":"392_CR47","unstructured":"SWC-registry. https:\/\/smartcontractsecurity.github.io\/SWC-registry (Last Accessed: July 2021)"},{"key":"392_CR48","unstructured":"This is the very first iteration of the Decentralized Application Security Project (or DASP) Top 10 of 2018. https:\/\/dasp.co\/ (Last Accessed: July 2021)"},{"key":"392_CR49","doi-asserted-by":"crossref","unstructured":"Tikhomirov, S., Voskresenskaya, E., Ivanitskiy, I., Takhaviev, R., Marchenko, E., Alexandrov, Y.: Smartcheck: static analysis of ethereum smart contracts. In: Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, pp. 9\u201316 (2018)","DOI":"10.1145\/3194113.3194115"},{"key":"392_CR50","doi-asserted-by":"publisher","unstructured":"Torres, C.F., Sch\u00fctte, J., State, R.: Osiris: Hunting for integer bugs in ethereum smart contracts. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 664\u2013676. ACM (2018). https:\/\/doi.org\/10.1145\/3274694.3274737","DOI":"10.1145\/3274694.3274737"},{"key":"392_CR51","doi-asserted-by":"crossref","unstructured":"Wan, Z., Xia, X., Lo, D., Chen, J., Luo, X., Yang, X.: Smart contract security: a practitioners\u2019 perspective (2021). arXiv preprint arXiv:2102.10963","DOI":"10.1109\/ICSE43902.2021.00127"},{"key":"392_CR52","doi-asserted-by":"crossref","unstructured":"Wen, M., Chen, J., Wu, R., Hao, D., Cheung, S.-C.: Context-aware patch generation for better automated program repair. In: Proceedings of the 40th IEEE\/ACM International Conference on Software Engineering, pp. 1\u201311 (2018)","DOI":"10.1145\/3180155.3180233"},{"key":"392_CR53","doi-asserted-by":"crossref","unstructured":"W\u00fcstholz, V., Christakis, M.: Harvey: a greybox fuzzer for smart contracts. CoRR (2019). arXiv:1905.06944","DOI":"10.1145\/3368089.3417064"},{"key":"392_CR54","doi-asserted-by":"publisher","unstructured":"Xiong, Y., Wang, J., Yan, R., Zhang, J., Han, S., Huang, G., Zhang, L.: Precise condition synthesis for program repair. In: Proceedings of the 39th IEEE\/ACM International Conference on Software Engineering, pp. 416\u2013426. IEEE (2017). https:\/\/doi.org\/10.1109\/ICSE.2017.45","DOI":"10.1109\/ICSE.2017.45"},{"issue":"4","key":"392_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3402450","volume":"29","author":"XL Yu","year":"2020","unstructured":"Yu, X.L., Al-Bataineh, O., Lo, D., Roychoudhury, A.: Smart contract repair. ACM Trans. Softw. Eng. Methodol. 29(4), 1\u201332 (2020)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"392_CR56","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2874648","author":"Y Yuan","year":"2018","unstructured":"Yuan, Y., Banzhaf, W.: ARJA: automated repair of java programs via multi-objective genetic programming. IEEE Trans. Softw. Eng. (2018). https:\/\/doi.org\/10.1109\/TSE.2018.2874648","journal-title":"IEEE Trans. Softw. Eng."},{"key":"392_CR57","doi-asserted-by":"publisher","unstructured":"Zhang, Q., Wang, Y., Li, J., Ma, S.: EthPloit: from fuzzing to efficient exploit generation against smart contracts. In: Proceedings of the 27th IEEE International Conference on Software Analysis, Evolution and Reengineering, pp. 116\u2013126 (2020a). https:\/\/doi.org\/10.1109\/SANER48275.2020.9054822","DOI":"10.1109\/SANER48275.2020.9054822"},{"key":"392_CR58","doi-asserted-by":"crossref","unstructured":"Zhang, P., Yu, J., Ji, S.: ADF-GA: data flow criterion based test case generation for ethereum smart contracts. CoRR abs\/2003.00257 (2020b). arXiv:2003.00257","DOI":"10.1145\/3387940.3391499"}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-023-00392-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10515-023-00392-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-023-00392-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,25]],"date-time":"2023-10-25T07:11:44Z","timestamp":1698217904000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10515-023-00392-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,13]]},"references-count":58,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["392"],"URL":"https:\/\/doi.org\/10.1007\/s10515-023-00392-y","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"value":"0928-8910","type":"print"},{"value":"1573-7535","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,13]]},"assertion":[{"value":"19 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"31"}}