{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T15:00:34Z","timestamp":1766847634960,"version":"3.37.3"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2024,6,16]],"date-time":"2024-06-16T00:00:00Z","timestamp":1718496000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,16]],"date-time":"2024-06-16T00:00:00Z","timestamp":1718496000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62102211"],"award-info":[{"award-number":["62102211"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100007129","name":"Shandong Provincial Natural Science Foundation","doi-asserted-by":"crossref","award":["ZR2021QF018"],"award-info":[{"award-number":["ZR2021QF018"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s10586-024-04558-5","type":"journal-article","created":{"date-parts":[[2024,6,16]],"date-time":"2024-06-16T07:01:31Z","timestamp":1718521291000},"page":"12727-12743","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["PPFLV: privacy-preserving federated learning with verifiability"],"prefix":"10.1007","volume":"27","author":[{"given":"Qun","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Wenting","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,16]]},"reference":[{"key":"4558_CR1","doi-asserted-by":"publisher","first-page":"3709","DOI":"10.1109\/TIFS.2020.2997134","volume":"15","author":"Q Feng","year":"2020","unstructured":"Feng, Q., He, D., Liu, Z., Wang, H., Choo, K.-K.R.: Securenlp: a system for multi-party privacy-preserving natural language processing. IEEE Trans. Inf. Forensics Secur. 15, 3709\u20133721 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4558_CR2","doi-asserted-by":"crossref","unstructured":"Xiong, Z., Li, W., Han, Q., Cai, Z.: Privacy-preserving auto-driving: a gan-based approach to protect vehicular camera data. In: 2019 IEEE International Conference on Data Mining (ICDM), pp. 668\u2013677. IEEE (2019)","DOI":"10.1109\/ICDM.2019.00077"},{"issue":"3","key":"4558_CR3","doi-asserted-by":"publisher","first-page":"47","DOI":"10.3390\/mti2030047","volume":"2","author":"M Bakator","year":"2018","unstructured":"Bakator, M., Radosav, D.: Deep learning and medical diagnosis: a review of literature. Multimodal Technol. Interact. 2(3), 47 (2018)","journal-title":"Multimodal Technol. Interact."},{"key":"4558_CR4","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1109\/TIFS.2019.2929409","volume":"15","author":"G Xu","year":"2019","unstructured":"Xu, G., Li, H., Liu, S., Yang, K., Lin, X.: Verifynet: secure and verifiable federated learning. IEEE Trans. Inf. Forensics Secur. 15, 911\u2013926 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4558_CR5","doi-asserted-by":"publisher","first-page":"117086","DOI":"10.1016\/j.eswa.2022.117086","volume":"201","author":"Y Chen","year":"2022","unstructured":"Chen, Y., Zhao, Q., Duan, P., Zhang, B., Hong, Z., Wang, B.: Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud. Expert Syst. Appl. 201, 117086 (2022)","journal-title":"Expert Syst. Appl."},{"key":"4558_CR6","doi-asserted-by":"crossref","unstructured":"Wang, B., Chen, Y., Li, F., Song, J., Lu, R., Duan, P., Tian, Z.: Privacy-preserving convolutional neural network classification scheme with multiple keys. IEEE Trans. Serv. Comput. (2024)","DOI":"10.1109\/TSC.2023.3349298"},{"key":"4558_CR7","unstructured":"Kone\u010dn\u1ef3, J., McMahan, H.B., Yu, F.X., Richt\u00e1rik, P., Suresh, A.T., Bacon, D.: Federated learning: strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492 (2016)"},{"key":"4558_CR8","doi-asserted-by":"publisher","first-page":"102993","DOI":"10.1016\/j.cose.2022.102993","volume":"124","author":"S Lu","year":"2023","unstructured":"Lu, S., Li, R., Liu, W., Guan, C., Yang, X.: Top-k sparsification with secure aggregation for privacy-preserving federated learning. Comput. Secur. 124, 102993 (2023)","journal-title":"Comput. Secur."},{"key":"4558_CR9","doi-asserted-by":"crossref","unstructured":"Dasu, V.A., Sarkar, S., Mandal, K.: PROV-FL: Privacy-Preserving Round Optimal Verifiable Federated Learning. In: Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, pp. 33\u201344 (2022)","DOI":"10.1145\/3560830.3563729"},{"key":"4558_CR10","doi-asserted-by":"publisher","first-page":"1905","DOI":"10.1109\/TIFS.2022.3174394","volume":"17","author":"H Zhou","year":"2022","unstructured":"Zhou, H., Yang, G., Dai, H., Liu, G.: PFLF: privacy-preserving federated learning framework for edge computing. IEEE Trans. Inf. Forensics Secur. 17, 1905\u20131918 (2022). https:\/\/doi.org\/10.1109\/TIFS.2022.3174394","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4558_CR11","unstructured":"Hahn, C., Kim, H., Kim, M., Hur, J.: VerSA: verifiable secure aggregation for cross-device federated learning. IEEE Trans. Dependable Secure Comput. (2021)"},{"key":"4558_CR12","doi-asserted-by":"crossref","unstructured":"Wang, Z., Song, M., Zhang, Z., Song, Y., Wang, Q., Qi, H.: Beyond inferring class representatives: User-level privacy leakage from federated learning. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 2512\u20132520. IEEE (2019)","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"4558_CR13","doi-asserted-by":"crossref","unstructured":"Mo, F., Haddadi, H., Katevas, K., Marin, E., Perino, D., Kourtellis, N.: PPFL: privacy-preserving federated learning with trusted execution environments. In: Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services, pp. 94\u2013108 (2021)","DOI":"10.1145\/3458864.3466628"},{"issue":"4","key":"4558_CR14","doi-asserted-by":"publisher","first-page":"94","DOI":"10.3390\/fi13040094","volume":"13","author":"H Fang","year":"2021","unstructured":"Fang, H., Qian, Q.: Privacy preserving machine learning with homomorphic encryption and federated learning. Future Internet 13(4), 94 (2021)","journal-title":"Future Internet"},{"issue":"9","key":"4558_CR15","doi-asserted-by":"publisher","first-page":"5880","DOI":"10.1002\/int.22818","volume":"37","author":"J Ma","year":"2022","unstructured":"Ma, J., Naas, S.-A., Sigg, S., Lyu, X.: Privacy-preserving federated learning based on multi-key homomorphic encryption. Int. J. Intell. Syst. 37(9), 5880\u20135901 (2022)","journal-title":"Int. J. Intell. Syst."},{"key":"4558_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, X., Fu, A., Wang, H., Zhou, C., Chen, Z.: A privacy-preserving and verifiable federated learning scheme. In: ICC 2020-2020 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/ICC40277.2020.9148628"},{"issue":"1","key":"4558_CR17","doi-asserted-by":"publisher","first-page":"103167","DOI":"10.1016\/j.ipm.2022.103167","volume":"60","author":"W Wang","year":"2023","unstructured":"Wang, W., Li, X., Qiu, X., Zhang, X., Zhao, J., Brusic, V.: A privacy preserving framework for federated learning in smart healthcare systems. Inf. Process. Manag. 60(1), 103167 (2023)","journal-title":"Inf. Process. Manag."},{"key":"4558_CR18","doi-asserted-by":"crossref","unstructured":"Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H.B., Patel, S., Ramage, D., Segal, A., Seth, K.: Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1175\u20131191 (2017)","DOI":"10.1145\/3133956.3133982"},{"issue":"5","key":"4558_CR19","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1109\/TIFS.2017.2787987","volume":"13","author":"LT Phong","year":"2018","unstructured":"Phong, L.T., Aono, Y., Hayashi, T., Wang, L., Moriai, S.: Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans. Inf. Forensics Secur. 13(5), 1333\u20131345 (2018). https:\/\/doi.org\/10.1109\/TIFS.2017.2787987","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"4558_CR20","doi-asserted-by":"publisher","first-page":"4049","DOI":"10.1109\/TII.2021.3085960","volume":"18","author":"B Jia","year":"2021","unstructured":"Jia, B., Zhang, X., Liu, J., Zhang, Y., Huang, K., Liang, Y.: Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in IIoT. IEEE Trans. Ind. Inform. 18(6), 4049\u20134058 (2021)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"5","key":"4558_CR21","doi-asserted-by":"publisher","first-page":"3316","DOI":"10.1109\/TII.2020.3036166","volume":"18","author":"A Fu","year":"2020","unstructured":"Fu, A., Zhang, X., Xiong, N., Gao, Y., Wang, H., Zhang, J.: VFL: a verifiable federated learning with privacy-preserving for big data in industrial IoT. IEEE Trans. Ind. Inform. 18(5), 3316\u20133326 (2020)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"4558_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Yu, H.: Towards verifiable federated learning. arXiv preprint arXiv:2202.08310 (2022)","DOI":"10.24963\/ijcai.2022\/792"},{"key":"4558_CR23","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.ins.2022.11.124","volume":"622","author":"H Gao","year":"2023","unstructured":"Gao, H., He, N., Gao, T.: SVeriFL: successive verifiable federated learning with privacy-preserving. Inf. Sci. 622, 98\u2013114 (2023)","journal-title":"Inf. Sci."},{"key":"4558_CR24","unstructured":"Zhang, C., Li, S., Xia, J., Wang, W., Yan, F., Liu, Y.: Batchcrypt: efficient homomorphic encryption for cross-silo federated learning. In: Proceedings of the 2020 USENIX Annual Technical Conference (USENIX ATC 2020) (2020)"},{"key":"4558_CR25","doi-asserted-by":"crossref","unstructured":"Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1310\u20131321 (2015)","DOI":"10.1145\/2810103.2813687"},{"key":"4558_CR26","doi-asserted-by":"crossref","unstructured":"Truex, S., Baracaldo, N., Anwar, A., Steinke, T., Ludwig, H., Zhang, R., Zhou, Y.: A hybrid approach to privacy-preserving federated learning. In: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, pp. 1\u201311 (2019)","DOI":"10.1145\/3338501.3357370"},{"key":"4558_CR27","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Tian, Y., Xiong, J., Ma, J., Peng, C.: Blockchain-enabled secure and trusted federated data sharing in IIoT. IEEE Trans. Ind. Inform. (2022)","DOI":"10.1109\/TII.2022.3215192"},{"issue":"10","key":"4558_CR28","doi-asserted-by":"publisher","first-page":"9530","DOI":"10.1109\/JIOT.2020.2991416","volume":"7","author":"R Hu","year":"2020","unstructured":"Hu, R., Guo, Y., Li, H., Pei, Q., Gong, Y.: Personalized federated learning with differential privacy. IEEE Internet Things J. 7(10), 9530\u20139539 (2020)","journal-title":"IEEE Internet Things J."},{"key":"4558_CR29","doi-asserted-by":"publisher","first-page":"119036","DOI":"10.1016\/j.eswa.2022.119036","volume":"213","author":"J Chen","year":"2023","unstructured":"Chen, J., Xue, J., Wang, Y., Huang, L., Baker, T., Zhou, Z.: Privacy-preserving and traceable federated learning for data sharing in industrial IoT applications. Expert Syst. Appl. 213, 119036 (2023)","journal-title":"Expert Syst. Appl."},{"key":"4558_CR30","doi-asserted-by":"crossref","unstructured":"Tang, X., Shen, M., Li, Q., Zhu, L., Xue, T., Qu, Q.: Pile: robust privacy-preserving federated learning via verifiable perturbations. IEEE Trans. Depend. Secure Comput. (2023)","DOI":"10.1109\/TDSC.2023.3239007"},{"key":"4558_CR31","doi-asserted-by":"publisher","first-page":"101889","DOI":"10.1016\/j.cose.2020.101889","volume":"96","author":"C Fang","year":"2020","unstructured":"Fang, C., Guo, Y., Wang, N., Ju, A.: Highly efficient federated learning with strong privacy preservation in cloud computing. Comput. Secur. 96, 101889 (2020)","journal-title":"Comput. Secur."},{"key":"4558_CR32","doi-asserted-by":"publisher","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","volume":"15","author":"K Wei","year":"2020","unstructured":"Wei, K., Li, J., Ding, M., Ma, C., Yang, H.H., Farokhi, F., Jin, S., Quek, T.Q., Poor, H.V.: Federated learning with differential privacy: algorithms and performance analysis. IEEE Trans. Inf. Forensics Secur. 15, 3454\u20133469 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4558_CR33","unstructured":"Mugunthan, V., Polychroniadou, A., Byrd, D., Balch, T.H.: SMPAI: secure multi-party computation for federated learning. In: Proceedings of the NeurIPS 2019 Workshop on Robust AI in Financial Services (2019)"},{"issue":"11","key":"4558_CR34","doi-asserted-by":"publisher","first-page":"10782","DOI":"10.1109\/JIOT.2020.2987958","volume":"7","author":"C Zhou","year":"2020","unstructured":"Zhou, C., Fu, A., Yu, S., Yang, W., Wang, H., Zhang, Y.: Privacy-preserving federated learning in fog computing. IEEE Internet Things J. 7(11), 10782\u201310793 (2020)","journal-title":"IEEE Internet Things J."},{"key":"4558_CR35","doi-asserted-by":"crossref","unstructured":"Lin, L., Zhang, X.: PPVerifier: a privacy-preserving and verifiable federated learning method in cloud-edge collaborative computing environment. IEEE Internet Things J. (2022)","DOI":"10.1109\/JIOT.2022.3233024"},{"key":"4558_CR36","doi-asserted-by":"publisher","first-page":"2059","DOI":"10.1109\/TIFS.2022.3176191","volume":"17","author":"J Zhao","year":"2022","unstructured":"Zhao, J., Zhu, H., Wang, F., Lu, R., Liu, Z., Li, H.: PVD-FL: a privacy-preserving and verifiable decentralized federated learning framework. IEEE Trans. Inf. Forensics Secur. 17, 2059\u20132073 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4558_CR37","doi-asserted-by":"crossref","unstructured":"Wang, Y., Zhang, A., Wu, S., Yu, S.: Vosa: verifiable and oblivious secure aggregation for privacy-preserving federated learning. IEEE Trans. Depend. Secure Comput. (2022)","DOI":"10.1109\/TDSC.2022.3226508"},{"issue":"24","key":"4558_CR38","doi-asserted-by":"publisher","first-page":"24933","DOI":"10.1109\/JIOT.2022.3194930","volume":"9","author":"Y Ren","year":"2022","unstructured":"Ren, Y., Li, Y., Feng, G., Zhang, X.: Privacy-enhanced and verification-traceable aggregation for federated learning. IEEE Internet Things J. 9(24), 24933\u201324948 (2022)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"4558_CR39","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1109\/TNSE.2021.3050781","volume":"9","author":"Z Peng","year":"2021","unstructured":"Peng, Z., Xu, J., Chu, X., Gao, S., Yao, Y., Gu, R., Tang, Y.: VFChain: enabling verifiable and auditable federated learning via blockchain systems. IEEE Trans. Netw. Sci. Eng. 9(1), 173\u2013186 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"4558_CR40","doi-asserted-by":"publisher","first-page":"1736","DOI":"10.1109\/TIFS.2020.3043139","volume":"16","author":"X Guo","year":"2020","unstructured":"Guo, X., Liu, Z., Li, J., Gao, J., Hou, B., Dong, C., Baker, T.: VeriFL: communication-efficient and fast verifiable aggregation for federated learning. IEEE Trans. Inf. Forensics Secur. 16, 1736\u20131751 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4558_CR41","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1016\/j.future.2021.10.017","volume":"128","author":"Y Xu","year":"2022","unstructured":"Xu, Y., Peng, C., Tan, W., Tian, Y., Ma, M., Niu, K.: Non-interactive verifiable privacy-preserving federated learning. Future Gener. Comput. Syst. 128, 365\u2013380 (2022)","journal-title":"Future Gener. Comput. Syst."},{"issue":"11","key":"4558_CR42","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"4558_CR43","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1016\/j.ins.2019.12.063","volume":"516","author":"B Qin","year":"2020","unstructured":"Qin, B., Chen, Y., Huang, Q., Liu, X., Zheng, D.: Public-key authenticated encryption with keyword search revisited: security model and constructions. Inf. Sci. 516, 515\u2013528 (2020)","journal-title":"Inf. Sci."},{"key":"4558_CR44","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/BFb0024447","volume":"1355","author":"S Blake-Wilson","year":"1997","unstructured":"Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. Lect. Notes Comput. Sci. 1355, 30\u201345 (1997)","journal-title":"Lect. Notes Comput. Sci."},{"key":"4558_CR45","unstructured":"Krizhevsky, A., Hinton, G., et al.: Learning multiple layers of features from tiny images (2009)"},{"issue":"6","key":"4558_CR46","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/MSP.2012.2211477","volume":"29","author":"L Deng","year":"2012","unstructured":"Deng, L.: The mnist database of handwritten digit images for machine learning research [best of the web]. IEEE Signal Process. Mag. 29(6), 141\u2013142 (2012). https:\/\/doi.org\/10.1109\/MSP.2012.2211477","journal-title":"IEEE Signal Process. Mag."},{"key":"4558_CR47","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., y Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Artificial Intelligence and Statistics, pp. 1273\u20131282. PMLR (2017)"},{"issue":"14\u201315","key":"4558_CR48","doi-asserted-by":"publisher","first-page":"2627","DOI":"10.1016\/S1352-2310(97)00447-0","volume":"32","author":"MW Gardner","year":"1998","unstructured":"Gardner, M.W., Dorling, S.: Artificial neural networks (the multilayer perceptron)-a review of applications in the atmospheric sciences. Atmos. Environ. 32(14\u201315), 2627\u20132636 (1998)","journal-title":"Atmos. Environ."},{"key":"4558_CR49","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. Adv. Neural Inf. Process. Syst. 25 (2012)"},{"key":"4558_CR50","doi-asserted-by":"crossref","unstructured":"Menegatti, D., Giuseppi, A., Manfredi, S., Pietrabissa, A.: A discrete-time multi-hop consensus protocol for decentralized federated learning. IEEE Access (2023)","DOI":"10.1109\/ACCESS.2023.3299443"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04558-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04558-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04558-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T21:55:59Z","timestamp":1727301359000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04558-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,16]]},"references-count":50,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["4558"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04558-5","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2024,6,16]]},"assertion":[{"value":"21 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}]}}