{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T01:47:02Z","timestamp":1772934422733,"version":"3.50.1"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the National Key Research and Development Program of China","award":["2023YFC3303800"],"award-info":[{"award-number":["2023YFC3303800"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s10586-024-04788-7","type":"journal-article","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T19:14:20Z","timestamp":1732648460000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Federated learning incentivize with privacy-preserving for IoT in edge computing in the context of B5G"],"prefix":"10.1007","volume":"28","author":[{"given":"Nasir Ahmad","family":"Jalali","sequence":"first","affiliation":[]},{"given":"Chen","family":"Hongsong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,26]]},"reference":[{"key":"4788_CR1","doi-asserted-by":"crossref","first-page":"1604","DOI":"10.3390\/electronics11101604","volume":"11","author":"K Lakshmanna","year":"2022","unstructured":"Lakshmanna, K., Kaluri, R., Gundluru, N., et al.: A review on deep learning technologies for IoT data. Electronics 11, 1604 (2022)","journal-title":"Electronics"},{"issue":"3","key":"4788_CR2","first-page":"457","volume":"20","author":"SR Zahra","year":"2019","unstructured":"Zahra, S.R., Chishti, M.A.: Assessing the services, security threats, challenges and solutions in the internet of things. Scalable Comput. 20(3), 457\u2013484 (2019)","journal-title":"Scalable Comput."},{"key":"4788_CR3","doi-asserted-by":"crossref","unstructured":"Wu, Q., He, K., Chen, X.: Personalized federated learning for intelligent IoT applications: a cloud-edge based framework. IEEE Open J. Comput. Soc. 1:35\u201345 (2020)","DOI":"10.1109\/OJCS.2020.2993259"},{"key":"4788_CR4","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/978-3-030-57328-7_6","volume":"83","author":"Q Xia","year":"2021","unstructured":"Xia, Q., Tao, Z., Li, Q.: Privacy issues in edge computing. Fog\/Edge Comput. Secur. Privacy Appl. 83, 147\u2013169 (2021)","journal-title":"Fog\/Edge Comput. Secur. Privacy Appl."},{"key":"4788_CR5","doi-asserted-by":"crossref","first-page":"9124","DOI":"10.3390\/app12189124","volume":"12","author":"A Brecko","year":"2022","unstructured":"Brecko, A., Kajati, E., Koziorek, J., Zolotova, I.: Federated learning for edge computing: a survey. Appl. Sci. 12, 9124 (2022)","journal-title":"Appl. Sci."},{"issue":"4","key":"4788_CR6","doi-asserted-by":"crossref","first-page":"3347","DOI":"10.1109\/TKDE.2021.3124599","volume":"35","author":"Q Li","year":"2023","unstructured":"Li, Q., Wen, Z., Wu, Z., et al.: A survey on federated learning systme: vision, hype and reality for data privacy and protection. IEEE Trans. Knowl. Data Eng. 35(4), 3347\u20133367 (2023)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"4788_CR7","doi-asserted-by":"publisher","unstructured":"Yang, X., Tan, W., Peng, C., Xiang, S., Niu, K.: Federated learning incentive mechanism design via enhanced Shaply value method. Wirel. Commun. Mob. Comput. (2022). https:\/\/doi.org\/10.1155\/2022\/9690657","DOI":"10.1155\/2022\/9690657"},{"issue":"16","key":"4788_CR8","doi-asserted-by":"crossref","first-page":"12569","DOI":"10.1109\/JIOT.2020.3029248","volume":"8","author":"P Singh","year":"2021","unstructured":"Singh, P., Kaur, A., Aujla, G.S., et al.: DaaS: dew computing as a services for intelligent intrusion detection in edge-of-things ecosystem. IEEE Internet Things J. 8(16), 12569\u201312577 (2021)","journal-title":"IEEE Internet Things J."},{"key":"4788_CR9","doi-asserted-by":"crossref","unstructured":"Kaur, G., Batth, R.S.: Edge comptuing: classification, application and challenges. In: 2nd International Conference on Intelligent Engineering and Management (ICIEM) (2021)","DOI":"10.1109\/ICIEM51511.2021.9445331"},{"issue":"4","key":"4788_CR10","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1109\/MNET.006.2200651","volume":"37","author":"ZZ Zhang","year":"2023","unstructured":"Zhang, Z.Z., Wu, L., He, D., et al.: Communication-efficient and byzantine-robust federated learning for mobile edge comptuing. IEEE Netw. 37(4), 112\u2013119 (2023)","journal-title":"IEEE Netw."},{"key":"4788_CR11","doi-asserted-by":"crossref","unstructured":"Wen, J., Lan, Y., et al.: A survey on federated learning: challenges and applications. Int. J. Mach. Learn. Cybern. 14:513\u2013535 (2022)","DOI":"10.1007\/s13042-022-01647-y"},{"issue":"7358","key":"4788_CR12","first-page":"1","volume":"23","author":"M Asad","year":"2023","unstructured":"Asad, M., Shaukat, S., Hu, D., et al.: Limitations and future aspects of communication costs in federated learning: a survey. Sensors 23(7358), 1\u201331 (2023)","journal-title":"Sensors"},{"key":"4788_CR13","doi-asserted-by":"crossref","first-page":"1905","DOI":"10.1109\/TIFS.2022.3174394","volume":"17","author":"H Zhou","year":"2022","unstructured":"Zhou, H., Yang, G., Dai, H., Liu, G.: PFLF: privacy-preserving federated learning framework for edge computing. IEEE Trans. Inf. Forensics Secur. 17, 1905\u20131918 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4788_CR14","doi-asserted-by":"crossref","unstructured":"Qu, G., Wu, H., Cui, N.: Joint blockchain and federated learning-based offloading in harsh edge computing environemnts. In: Big Data in Emergent Distributed Environments (BiDEDE'21), New York (2021)","DOI":"10.1145\/3460866.3461765"},{"issue":"2","key":"4788_CR15","doi-asserted-by":"crossref","first-page":"570","DOI":"10.1109\/TCC.2018.2789446","volume":"8","author":"H Wu","year":"2019","unstructured":"Wu, H., Sun, Y., Wolter, K.: Energy-efficient decision making for mobile cloud offloading. IEEE Trans. Cloud Comput. 8(2), 570\u2013584 (2019)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"4788_CR16","doi-asserted-by":"crossref","unstructured":"Shi, Y., Zhang, Y., Xiao, Y., Niu, L.: Optimization strategies for client drift in federated learning: a review. In: 6th International Conference on Information Technology and Quantitative Management (2022)","DOI":"10.1016\/j.procs.2022.11.292"},{"key":"4788_CR17","doi-asserted-by":"crossref","unstructured":"Mo, F., Haddadi, H., Katevas, K., et al.: PPFL: privacy-preserving federated learning with trusted execution environments. In: The 19th Annual International Conference on Mobile System, Applications, and Services (MobiSys '21), New York, USA (2021)","DOI":"10.1145\/3458864.3466628"},{"key":"4788_CR18","doi-asserted-by":"crossref","unstructured":"Gong, X., Sharma, A., Karanam, S., et al.: Ensemble attention distillation for privacy-preserving federated learning. In: 2021 IEEE\/CVF International Conference on Computer Vision (ICCV), Montreal, QC, Canada (2022)","DOI":"10.1109\/ICCV48922.2021.01480"},{"key":"4788_CR19","doi-asserted-by":"crossref","unstructured":"Song, T., Tong, Y., Wei, S.: Profit allocation for federated learning. In: 2019 IEEE International Conference on Big Data (Big Data). IEEE (2019)","DOI":"10.1109\/BigData47090.2019.9006327"},{"issue":"10","key":"4788_CR20","doi-asserted-by":"crossref","first-page":"3034","DOI":"10.1109\/TMC.2020.2994639","volume":"20","author":"Y Jiao","year":"2021","unstructured":"Jiao, Y., Wang, P., Niyato, D., Lin, B., Kim, D.I.: Toward an automated auction framework for wireless federated learning services market. IEEE Trans. Mob. Comput. 20(10), 3034\u20133048 (2021)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"12","key":"4788_CR21","doi-asserted-by":"crossref","first-page":"3805","DOI":"10.1109\/JSAC.2021.3118354","volume":"39","author":"P Sun","year":"2021","unstructured":"Sun, P., Che, H., Wang, Z., et al.: Pain-FL: personalized privacy-preserving incentive for federated learning. IEEE J. Sel. Areas Commun. 39(12), 3805\u20133820 (2021)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"4788_CR22","doi-asserted-by":"publisher","unstructured":"Maray, M., Shuja, J.: Computation offloading in mobile cloud computing and mobile edge computing: survey, texonomy, and open issues. Hindawi Mob. Inf. Syst. (2022). https:\/\/doi.org\/10.1155\/2022\/1121822","DOI":"10.1155\/2022\/1121822"},{"key":"4788_CR23","volume-title":"Security and Privacy Challenges in Edge Computing","author":"I Mogilevskaia","year":"2022","unstructured":"Mogilevskaia, I.: Security and Privacy Challenges in Edge Computing. University of South-Eastern Norway, Notodden (2022)"},{"issue":"4","key":"4788_CR24","doi-asserted-by":"crossref","first-page":"2015","DOI":"10.1109\/TNSE.2021.3083263","volume":"9","author":"T Wang","year":"2021","unstructured":"Wang, T., Liu, Y., Zheng, X., et al.: Edge-based communication optimization for distributed federated learning. IEEE Trans. Netw. Sci. Eng. 9(4), 2015\u20132024 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"4788_CR25","unstructured":"Rehman, M.H., Salah, K., Damiani, E., Svetinovic, D.: Towards blockchain-based reputation-aware federated learning. In: Conjuction with IEEE Infocom, EdgeBlock 2020: International Symposium on Edge Computing Security and Blcokchain (2020)"},{"key":"4788_CR26","doi-asserted-by":"crossref","unstructured":"Song, T., Yongxin, S.W.: Profit allocation for federated learning. In: 2019 IEEE International Conference on Big Data, Los Angeles, USA (2019)","DOI":"10.1109\/BigData47090.2019.9006327"},{"key":"4788_CR27","doi-asserted-by":"crossref","first-page":"981","DOI":"10.1016\/j.dcan.2022.05.010","volume":"9","author":"J Zhang","year":"2023","unstructured":"Zhang, J., Liu, Y., Wu, D., et al.: VPFL: a verifiable privacy-preserving federated learning scheme for edge computing system. Digit. Commun. Netw. 9, 981\u2013989 (2023)","journal-title":"Digit. Commun. Netw."},{"key":"4788_CR28","volume":"19","author":"A Yo","year":"2023","unstructured":"Yo, A., Li, G., Li, X., et al.: Differential privacy in edge computing-based smart city application: security issues, solutions and future direction. Array 19, 100293 (2023)","journal-title":"Array"},{"key":"4788_CR29","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s10586-022-03813-x","volume":"27","author":"KN Mishra","year":"2022","unstructured":"Mishra, K.N., Bhattacharjee, V., Saket, S., Mishra, S.P.: Security provisions in smart edge computing device using blockchain and machine learning algorithms: a novel approach. Clust. Comput. 27, 27\u201355 (2022)","journal-title":"Clust. Comput."},{"key":"4788_CR30","volume":"245","author":"Y Sun","year":"2024","unstructured":"Sun, Y., Li, B., Yang, K., Bi, X., Zhao, X.: TiFLCS-MARP: client selection and model pricing for federated learning in data markets. Expert Syst. Appl. 245, 123071 (2024)","journal-title":"Expert Syst. Appl."},{"key":"4788_CR31","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/s11277-022-10107-3","volume":"129","author":"NA Jalali","year":"2022","unstructured":"Jalali, N.A., Chen, H.: Security issues and solutions in federate learning under IoT critical Infrastructure. Wirel. Personal Commun. 129, 475\u2013500 (2022)","journal-title":"Wirel. Personal Commun."},{"key":"4788_CR32","doi-asserted-by":"crossref","first-page":"2585","DOI":"10.1007\/s10586-021-03424-y","volume":"25","author":"D Li","year":"2022","unstructured":"Li, D., Luo, Z., Cao, B.: Blockchain-based federated learning methodologies in smart evnironments. Clust. Comput. 25, 2585\u20132599 (2022)","journal-title":"Clust. Comput."},{"key":"4788_CR33","doi-asserted-by":"crossref","unstructured":"Omoniwa, B., Hussian, R., Javed, M.A., Bouk, S.H.: Fog\/edge comptuing-based IoT (FECIoT): architecture, applications, and research issues. IEEE Internet Things 6(3), 4118 (2019)","DOI":"10.1109\/JIOT.2018.2875544"},{"issue":"2","key":"4788_CR34","doi-asserted-by":"crossref","first-page":"2241","DOI":"10.1109\/JIOT.2018.2887086","volume":"6","author":"B Li","year":"2019","unstructured":"Li, B., Fei, Z., Zhang, Y.: UAV communications for 6G and beyond: recent advances and future trends. IEEE Internet Things 6(2), 2241\u20132263 (2019)","journal-title":"IEEE Internet Things"},{"issue":"2","key":"4788_CR35","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/COMST.2020.2971781","volume":"22","author":"J Navarro-Ortiz","year":"2020","unstructured":"Navarro-Ortiz, J., Romero-Diaz, P., Sendra, S., et al.: A survey on 5G usage scenarios and traffic models. IEEE Commun. Surv. Tutor. 22(2), 905\u2013929 (2020)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"4788_CR36","doi-asserted-by":"crossref","unstructured":"Siddiqi, M.A., Yu, H., Joung, J.: 5G ultra-reliable low-latency communication implementation challenges and operational issues with IoT devices. MDPI (Electronics) 8, 981 (2019)","DOI":"10.3390\/electronics8090981"},{"issue":"5","key":"4788_CR37","first-page":"6213","volume":"14","author":"A Majid","year":"2021","unstructured":"Majid, A.: Challengs facing the implementation of 5G. J. Ambient. Intell. Humaniz. Comput. 14(5), 6213\u20136226 (2021)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"issue":"6","key":"4788_CR38","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MCOM.001.1900461","volume":"58","author":"S Niknam","year":"2020","unstructured":"Niknam, S., Dhillon, H.S., Reed, J.H.: Federated learning for wireless communications: motivation, opportunities, and challenges. IEEE Commun. Mag. 58(6), 46\u201351 (2020)","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"4788_CR39","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1109\/MNET.001.1900506","volume":"34","author":"C Ma","year":"2020","unstructured":"Ma, C., Li, J., Ding, M., et al.: On safeguarding privacy and security in the framework of federated learning. IEEE Netw. 34(4), 242\u2013248 (2020)","journal-title":"IEEE Netw."},{"issue":"2","key":"4788_CR40","doi-asserted-by":"crossref","first-page":"2103","DOI":"10.1109\/JIOT.2018.2869847","volume":"6","author":"Y Lu","year":"2019","unstructured":"Lu, Y., Xu, L.D.: Internet of things (IoT) cybersecurity research: a review of current research topics. IEEE Internet Things J. 6(2), 2103\u20132115 (2019)","journal-title":"IEEE Internet Things J."},{"key":"4788_CR41","first-page":"332","volume":"3","author":"E Fazeldehkordi","year":"2022","unstructured":"Fazeldehkordi, E., Gr\u00f8nli, T.M.: A survey of security architectures for edge computing-based IoT. Internet Things (IoT) 3, 332\u2013365 (2022)","journal-title":"Internet Things (IoT)"},{"key":"4788_CR42","doi-asserted-by":"crossref","unstructured":"Xia, Q., Tao, Z., Hao, Z., Li, Q.: FABA: an algorithms for fast aggregation against byzantine attacks in distributed neural network. In: Proceedings of the Twenty-Eighth International Joint Conference on Artificail Intelligence (IJCAI-19) (2019)","DOI":"10.24963\/ijcai.2019\/670"},{"key":"4788_CR43","doi-asserted-by":"crossref","unstructured":"Xiao, Y., Jia, Y., Liu, C., et al.: Edge computing security: state-of-the-art and challenges. In: Proccedings of the IEEE (2019)","DOI":"10.1109\/JPROC.2019.2918437"},{"key":"4788_CR44","volume":"24","author":"S Khan","year":"2023","unstructured":"Khan, S., Gomes, J., Jr., Rehman, M.H., Svetinovic, D.: Dynamic behavior assessment protocol for secure decentralized federated learning. Internet Thing 24, 100956 (2023)","journal-title":"Internet Thing"},{"key":"4788_CR45","volume":"21","author":"MAP Putra","year":"2023","unstructured":"Putra, M.A.P., Putri, A.R., Zainudin, A., Kim, D.-S., Lee, J.-M.: ACS: accuracy-based client selection mechanism for federated industrial IoT. Internet Things 21, 100657 (2023)","journal-title":"Internet Things"},{"key":"4788_CR46","doi-asserted-by":"crossref","unstructured":"Gao, L., Li, L., Chen, Y., et al.: FIFL: a fair incentive mechanism for federated learning. In: 50th International Conference on Parallel Processing (ICPP '21), New York, USA (2021)","DOI":"10.1145\/3472456.3472469"},{"key":"4788_CR47","doi-asserted-by":"crossref","unstructured":"Yu, H., Liu, Z., Liu, Y., et al.: A fairness-aware incentive scheme for federated learning. In: Proceedings of the 2020 AAAI\/ACM Conference on AI, Ethics, and Society (AIES'20), New York, USA (2020)","DOI":"10.1145\/3375627.3375840"},{"key":"4788_CR48","first-page":"1035","volume":"10","author":"Y Zhan","year":"2022","unstructured":"Zhan, Y., Zhang, J., Hong, Z., et al.: A survey of incentive mechanism design for federated learning. IEEE Trans. Emerg. Top. Comput. 10, 1035\u20131044 (2022)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"450","key":"4788_CR49","first-page":"1","volume":"22","author":"HG Abreha","year":"2022","unstructured":"Abreha, H.G., Hayajneh, M., Serhani, M.A.: Federated learning in edge computing: a systematic survey. Sensors 22(450), 1\u201345 (2022)","journal-title":"Sensors"},{"issue":"1","key":"4788_CR50","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/LCOMM.2023.3337320","volume":"28","author":"M Poposka","year":"2024","unstructured":"Poposka, M., Pejoski, S., Rakovic, V., et al.: Delay minimization of federated learning over wireless powered communication networks. IEEE Commun. Lett. 28(1), 108\u2013112 (2024)","journal-title":"IEEE Commun. Lett."},{"key":"4788_CR51","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1186\/s13677-022-00377-4","volume":"11","author":"G Bao","year":"2022","unstructured":"Bao, G., Guo, P.: Federated learning in cloud-edge collaborative architecture: key techologies, applications and challenges. J. Cloud Comput. 11, 94 (2022)","journal-title":"J. Cloud Comput."},{"key":"4788_CR52","doi-asserted-by":"crossref","unstructured":"Li, Z., Ohtsuki, T., Gui, G.: Communication efficient heterogeneous federated learning based on model similarity. In: 2023 IEEE Wireless Communications and Networking Conference (WCNC), Glasgow, United Kindom (2023)","DOI":"10.1109\/WCNC55385.2023.10118862"},{"issue":"4","key":"4788_CR53","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MWC.01.1900525","volume":"27","author":"Y Liu","year":"2020","unstructured":"Liu, Y., Peng, J., Kang, J., Lliyasu, A.M., et al.: A secure federated learning framework for 5G network. IEEE Wirel. Commun. 27(4), 24\u201331 (2020)","journal-title":"IEEE Wirel. Commun."},{"key":"4788_CR54","doi-asserted-by":"crossref","first-page":"209191","DOI":"10.1109\/ACCESS.2020.3038287","volume":"8","author":"Y Ye","year":"2020","unstructured":"Ye, Y., Li, S., Liu, F., et al.: EdgeFed: optimized federated learning based on edge computing. IEEE Access 8, 209191\u2013209198 (2020)","journal-title":"IEEE Access"},{"key":"4788_CR55","doi-asserted-by":"crossref","unstructured":"Gottipati, A., Stewart, A., Song, J., Chen, Q.: FedRAN: federated mobile edge computing with differential privacy. In: Workshop on Flexible Networks Artificial Intelligence Supported Netwrok Flexibility and Agility (SIGCOMM '21), New York, USA (2021)","DOI":"10.1145\/3472735.3473392"},{"key":"4788_CR56","volume":"221","author":"H Du","year":"2023","unstructured":"Du, H., Chen, Y., Feng, X., et al.: An efficient federated learning framework for multi-channeled mobile edge network with layered gradient compression. Int. J. Comput. Telecommun. Netw. 221, 109517 (2023)","journal-title":"Int. J. Comput. Telecommun. Netw."},{"key":"4788_CR57","doi-asserted-by":"crossref","first-page":"2532","DOI":"10.3390\/s19112532","volume":"19","author":"JMN Auza","year":"2019","unstructured":"Auza, J.M.N., de Marca, J.R.B., Siqueira, G.L.: Design of a local information incentive mechanism for mobile crowdsensing. Sensors 19, 2532 (2019)","journal-title":"Sensors"},{"issue":"1","key":"4788_CR58","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/JAS.2023.123828","volume":"11","author":"C Tang","year":"2024","unstructured":"Tang, C., Yang, B., Xie, X., et al.: An incentive mechanism for federated learning: a continous zero-determinant strategy approach. IEEE\/CAA J. Autom. Sin. 11(1), 88\u2013103 (2024)","journal-title":"IEEE\/CAA J. Autom. Sin."},{"key":"4788_CR59","doi-asserted-by":"crossref","unstructured":"Chen, M., Yang, Z., Saad, V., et al.: Performance optimization of federated learning over wireless network. In: IEEE Global Communications Confernece (GLOBECOM 2019) (2019)","DOI":"10.1109\/GLOBECOM38437.2019.9013160"},{"key":"4788_CR60","volume":"19","author":"A Yao","year":"2023","unstructured":"Yao, A., Li, G., Li, X., et al.: Differential privacy in edge computing-based smart city applications: security issues, solutions and future directions. Array 19, 100293 (2023)","journal-title":"Array"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04788-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04788-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04788-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T16:47:51Z","timestamp":1743353271000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04788-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,26]]},"references-count":60,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["4788"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04788-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,26]]},"assertion":[{"value":"1 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"112"}}