{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T17:59:17Z","timestamp":1775671157442,"version":"3.50.1"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"industry-university Research Innovation Foundation of the Ministry of Education of China","award":["2021FNA02007"],"award-info":[{"award-number":["2021FNA02007"]}]},{"name":"industry-university Research Innovation Foundation of the Ministry of Education of China","award":["2021FNA02007"],"award-info":[{"award-number":["2021FNA02007"]}]},{"name":"industry-university Research Innovation Foundation of the Ministry of Education of China","award":["2021FNA02007"],"award-info":[{"award-number":["2021FNA02007"]}]},{"name":"Industry-university Research Innovation Foundation of the Ministry of Education of China","award":["2021FNA01001"],"award-info":[{"award-number":["2021FNA01001"]}]},{"name":"Industry-university Research Innovation Foundation of the Ministry of Education of China","award":["2021FNA01001"],"award-info":[{"award-number":["2021FNA01001"]}]},{"name":"Industry-university Research Innovation Foundation of the Ministry of Education of China","award":["2021FNA01001"],"award-info":[{"award-number":["2021FNA01001"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s10586-024-04845-1","type":"journal-article","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T19:21:38Z","timestamp":1732648898000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Sppdp-fl: adaptive client selection and dimensional projection for performance enhancement in personalized differential privacy federated learning"],"prefix":"10.1007","volume":"28","author":[{"given":"Junbi","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Jinhai","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,26]]},"reference":[{"issue":"23","key":"4845_CR1","doi-asserted-by":"crossref","first-page":"33127","DOI":"10.1007\/s11042-021-11751-w","volume":"81","author":"AK Singh","year":"2022","unstructured":"Singh, A.K., Gupta, R.: A privacy-preserving model based on differential approach for sensitive data in cloud environment. Multimedia Tools and Applications 81(23), 33127\u201333150 (2022)","journal-title":"Multimedia Tools and Applications"},{"key":"4845_CR2","doi-asserted-by":"crossref","unstructured":"Gao, H., Wang, X., Wei, W., Al-Dulaimi, A., Xu, Y.: Com-ddpg: Task offloading based on multiagent reinforcement learning for information-communication-enhanced mobile edge computing in the internet of vehicles. IEEE Transactions on Vehicular Technology (2023)","DOI":"10.1109\/TVT.2023.3309321"},{"issue":"4","key":"4845_CR3","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1109\/LNET.2022.3200724","volume":"4","author":"R Gupta","year":"2022","unstructured":"Gupta, R., Saxena, D., Gupta, I., Makkar, A., Singh, A.K.: Quantum machine learning driven malicious user prediction for cloud network communications. IEEE Networking Letters 4(4), 174\u2013178 (2022)","journal-title":"IEEE Networking Letters"},{"key":"4845_CR4","doi-asserted-by":"crossref","unstructured":"Ortega-Calvo, A.S., Morcillo-Jimenez, R., Fernandez-Basso, C., Guti\u00e9rrez-Batista, K., Vila, M.-A., Martin-Bautista, M.J.: Aimdp: An artificial intelligence modern data platform. use case for spanish national health service data silo. Future Generation Computer Systems 143, 248\u2013264 (2023)","DOI":"10.1016\/j.future.2023.02.002"},{"issue":"2","key":"4845_CR5","doi-asserted-by":"crossref","first-page":"2445","DOI":"10.1109\/JSYST.2022.3218894","volume":"17","author":"R Gupta","year":"2022","unstructured":"Gupta, R., Gupta, I., Singh, A.K., Saxena, D., Lee, C.-N.: An iot-centric data protection method for preserving security and privacy in cloud. IEEE Systems Journal 17(2), 2445\u20132454 (2022)","journal-title":"IEEE Systems Journal"},{"issue":"4","key":"4845_CR6","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1109\/LNET.2022.3215248","volume":"4","author":"R Gupta","year":"2022","unstructured":"Gupta, R., Saxena, D., Gupta, I., Singh, A.K.: Differential and triphase adaptive learning-based privacy-preserving model for medical data in cloud environment. IEEE Networking Letters 4(4), 217\u2013221 (2022)","journal-title":"IEEE Networking Letters"},{"key":"4845_CR7","unstructured":"McMahan, H.B., Moore, E., Ramage, D., Arcas, B.A.: Federated learning of deep networks using model averaging. arXiv preprint arXiv:1602.05629 2, 2 (2016)"},{"key":"4845_CR8","unstructured":"McMahan, H.B., Ramage, D., Talwar, K., Zhang, L.: Learning differentially private recurrent language models. arXiv preprint arXiv:1710.06963 (2017)"},{"key":"4845_CR9","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Artificial Intelligence and Statistics, pp. 1273\u20131282 (2017). PMLR"},{"key":"4845_CR10","unstructured":"Chen, Y., Li, W., Huang, J., Gao, H., Deng, S.: A differential evolution offloading strategy for latency and privacy sensitive tasks with federated local-edge-cloud collaboration. ACM Transactions on Sensor Networks"},{"key":"4845_CR11","doi-asserted-by":"crossref","unstructured":"Voigt, P., Bussche, A.: The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing 10(3152676), 10\u20135555 (2017)","DOI":"10.1007\/978-3-319-57959-7"},{"key":"4845_CR12","doi-asserted-by":"crossref","unstructured":"Melis, L., Song, C., De\u00a0Cristofaro, E., Shmatikov, V.: Exploiting unintended feature leakage in collaborative learning. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 691\u2013706 (2019). IEEE","DOI":"10.1109\/SP.2019.00029"},{"key":"4845_CR13","unstructured":"Zhu, L., Liu, Z., Han, S.: Deep leakage from gradients. Advances in neural information processing systems 32 (2019)"},{"key":"4845_CR14","doi-asserted-by":"crossref","unstructured":"Tolpegin, V., Truex, S., Gursoy, M.E., Liu, L.: Data poisoning attacks against federated learning systems. In: Computer Security\u2013ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14\u201318, 2020, Proceedings, Part I 25, pp. 480\u2013501 (2020). Springer","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"4845_CR15","doi-asserted-by":"crossref","unstructured":"Wang, Z., Song, M., Zhang, Z., Song, Y., Wang, Q., Qi, H.: Beyond inferring class representatives: User-level privacy leakage from federated learning. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 2512\u20132520 (2019). IEEE","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"4845_CR16","doi-asserted-by":"crossref","unstructured":"Pichler, G., Romanelli, M., Vega, L.R., Piantanida, P.: Perfectly accurate membership inference by a dishonest central server in federated learning. IEEE Transactions on Dependable and Secure Computing (2023)","DOI":"10.1109\/TDSC.2023.3326230"},{"issue":"7","key":"4845_CR17","doi-asserted-by":"crossref","first-page":"2044","DOI":"10.1109\/TMI.2023.3239391","volume":"42","author":"A Hatamizadeh","year":"2023","unstructured":"Hatamizadeh, A., Yin, H., Molchanov, P., Myronenko, A., Li, W., Dogra, P., Feng, A., Flores, M.G., Kautz, J., Xu, D., et al.: Do gradient inversion attacks make federated learning unsafe? IEEE Transactions on Medical Imaging 42(7), 2044\u20132056 (2023)","journal-title":"IEEE Transactions on Medical Imaging"},{"key":"4845_CR18","doi-asserted-by":"crossref","unstructured":"Shi, X., Wang, Z., Zhong, R., Ma, L., Chen, X., Yang, P.: Gethreplayer: a smart contract testing method based on transaction replay. International Journal of Web Information Systems (ahead-of-print) (2024)","DOI":"10.1108\/IJWIS-08-2023-0138"},{"issue":"3","key":"4845_CR19","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1108\/IJWIS-09-2023-0143","volume":"20","author":"Z Meng","year":"2024","unstructured":"Meng, Z., Lu, Y., Duan, H.: Pdmsc: privacy-preserving decentralized multi-skill spatial crowdsourcing. International Journal of Web Information Systems 20(3), 304\u2013323 (2024)","journal-title":"International Journal of Web Information Systems"},{"issue":"3","key":"4845_CR20","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1007\/s11235-022-00982-3","volume":"82","author":"Z Shi","year":"2023","unstructured":"Shi, Z., Yang, Z., Hassan, A., Li, F., Ding, X.: A privacy preserving federated learning scheme using homomorphic encryption and secret sharing. Telecommunication Systems 82(3), 419\u2013433 (2023)","journal-title":"Telecommunication Systems"},{"key":"4845_CR21","doi-asserted-by":"crossref","unstructured":"Truex, S., Baracaldo, N., Anwar, A., Steinke, T., Ludwig, H., Zhang, R., Zhou, Y.: A hybrid approach to privacy-preserving federated learning. In: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, pp. 1\u201311 (2019)","DOI":"10.1145\/3338501.3357370"},{"key":"4845_CR22","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy. In: International Colloquium on Automata, Languages, and Programming, pp. 1\u201312 (2006). Springer","DOI":"10.1007\/11787006_1"},{"issue":"3","key":"4845_CR23","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1007\/s00354-022-00185-z","volume":"40","author":"R Gupta","year":"2022","unstructured":"Gupta, R., Singh, A.K.: A differential approach for data and classification service-based privacy-preserving machine learning model in cloud environment. New Generation Computing 40(3), 737\u2013764 (2022)","journal-title":"New Generation Computing"},{"key":"4845_CR24","unstructured":"Geyer, R.C., Klein, T., Nabi, M.: Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557 (2017)"},{"key":"4845_CR25","doi-asserted-by":"crossref","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","volume":"15","author":"K Wei","year":"2020","unstructured":"Wei, K., Li, J., Ding, M., Ma, C., Yang, H.H., Farokhi, F., Jin, S., Quek, T.Q., Poor, H.V.: Federated learning with differential privacy: Algorithms and performance analysis. IEEE transactions on information forensics and security 15, 3454\u20133469 (2020)","journal-title":"IEEE transactions on information forensics and security"},{"key":"4845_CR26","doi-asserted-by":"crossref","unstructured":"Sun, L., Qian, J., Chen, X.: Ldp-fl: Practical private aggregation in federated learning with local differential privacy. arXiv preprint arXiv:2007.15789 (2020)","DOI":"10.24963\/ijcai.2021\/217"},{"key":"4845_CR27","doi-asserted-by":"crossref","unstructured":"Hu, R., Guo, Y., Gong, Y.: Federated learning with sparsified model perturbation: Improving accuracy under client-level differential privacy. IEEE Transactions on Mobile Computing (2023)","DOI":"10.1109\/TMC.2023.3343288"},{"key":"4845_CR28","doi-asserted-by":"crossref","unstructured":"Sun, L., Lyu, L.: Federated model distillation with noise-free differential privacy. arXiv preprint arXiv:2009.05537 (2020)","DOI":"10.24963\/ijcai.2021\/216"},{"key":"4845_CR29","unstructured":"Jayaraman, B., Evans, D.: Evaluating differentially private machine learning in practice. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 1895\u20131912 (2019)"},{"key":"4845_CR30","doi-asserted-by":"crossref","unstructured":"Abadi, M., Chu, A., Goodfellow, I., McMahan, H.B., Mironov, I., Talwar, K., Zhang, L.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308\u2013318 (2016)","DOI":"10.1145\/2976749.2978318"},{"issue":"3","key":"4845_CR31","first-page":"3411","volume":"45","author":"T Li","year":"2022","unstructured":"Li, T., Tan, L., Huang, Z., Tao, Q., Liu, Y., Huang, X.: Low dimensional trajectory hypothesis is true: Dnns can be trained in tiny subspaces. IEEE Transactions on Pattern Analysis and Machine Intelligence 45(3), 3411\u20133420 (2022)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"4845_CR32","doi-asserted-by":"crossref","unstructured":"Gao, H., Jiang, W., Ran, Q., Wang, Y.: Vision-language interaction via contrastive learning for surface anomaly detection in consumer electronics manufacturing. IEEE Transactions on Consumer Electronics (2024)","DOI":"10.1109\/TCE.2024.3378771"},{"key":"4845_CR33","doi-asserted-by":"crossref","unstructured":"Li, H., Xiong, L., Ji, Z., Jiang, X.: Partitioning-based mechanisms under personalized differential privacy. In: Advances in Knowledge Discovery and Data Mining: 21st Pacific-Asia Conference, PAKDD 2017, Jeju, South Korea, May 23-26, 2017, Proceedings, Part I 21, pp. 615\u2013627 (2017). Springer","DOI":"10.1007\/978-3-319-57454-7_48"},{"key":"4845_CR34","doi-asserted-by":"publisher","unstructured":"Niu, B., Chen, Y., Wang, B., Wang, Z., Li, F., Cao, J.: Adapdp: Adaptive personalized differential privacy. In: IEEE INFOCOM 2021 - IEEE Conference on Computer Communications (2021). https:\/\/doi.org\/10.1109\/infocom42981.2021.9488825 . http:\/\/dx.doi.org\/10.1109\/infocom42981.2021.9488825","DOI":"10.1109\/infocom42981.2021.9488825"},{"key":"4845_CR35","volume-title":"Heterogeneous differential privacy","author":"M Alaggan","year":"2015","unstructured":"Alaggan, M., Gambs, S., Kermarrec, A.-M.: Heterogeneous differential privacy. Cornell University - arXiv, Cornell University - arXiv (2015)"},{"key":"4845_CR36","doi-asserted-by":"crossref","unstructured":"Jorgensen, Z., Yu, T., Cormode, G.: Conservative or liberal? personalized differential privacy. In: 2015 IEEE 31St International Conference on Data Engineering, pp. 1023\u20131034 (2015). IEEE","DOI":"10.1109\/ICDE.2015.7113353"},{"key":"4845_CR37","unstructured":"Heo, G., Seo, J., Whang, S.E.: Personalized dp-sgd using sampling mechanisms. arXiv preprint arXiv:2305.15165 (2023)"},{"key":"4845_CR38","unstructured":"Boenisch, F., M\u00fchl, C., Dziedzic, A., Rinberg, R., Papernot, N.: Have it your way: Individualized privacy assignment for dp-sgd. Advances in Neural Information Processing Systems 36 (2024)"},{"key":"4845_CR39","unstructured":"Shi, W.: Personalized differential privacy for distributed deep learning with apache mxnet. USENIX Security (2022)"},{"key":"4845_CR40","doi-asserted-by":"crossref","unstructured":"Wei, K., Li, J., Ma, C., Ding, M., Chen, W., Wu, J., Tao, M., Poor, H.V.: Personalized federated learning with differential privacy and convergence guarantee. IEEE Transactions on Information Forensics and Security (2023)","DOI":"10.1109\/TIFS.2023.3293417"},{"key":"4845_CR41","unstructured":"YUN, C.-Y., QUE, R.: Federated learning with personalized differential privacy. Journal of Computer Applications, 0"},{"issue":"7","key":"4845_CR42","doi-asserted-by":"crossref","first-page":"4168","DOI":"10.3390\/app13074168","volume":"13","author":"X Wu","year":"2023","unstructured":"Wu, X., Xu, L., Zhu, L.: Local differential privacy-based federated learning under personalized settings. Applied Sciences 13(7), 4168 (2023)","journal-title":"Applied Sciences"},{"issue":"3","key":"4845_CR43","doi-asserted-by":"crossref","first-page":"485","DOI":"10.3390\/e25030485","volume":"25","author":"X Shen","year":"2023","unstructured":"Shen, X., Jiang, H., Chen, Y., Wang, B., Gao, L.: Pldp-fl: Federated learning with personalized local differential privacy. Entropy 25(3), 485 (2023)","journal-title":"Entropy"},{"key":"4845_CR44","doi-asserted-by":"crossref","unstructured":"Lee, J., Kifer, D.: Concentrated differentially private gradient descent with adaptive per-iteration privacy budget. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 1656\u20131665 (2018)","DOI":"10.1145\/3219819.3220076"},{"key":"4845_CR45","doi-asserted-by":"crossref","unstructured":"Liu, R., Cao, Y., Yoshikawa, M., Chen, H.: Fedsel: Federated sgd under local differential privacy with top-k dimension selection. In: Database Systems for Advanced Applications: 25th International Conference, DASFAA 2020, Jeju, South Korea, September 24\u201327, 2020, Proceedings, Part I 25, pp. 485\u2013501 (2020). Springer","DOI":"10.1007\/978-3-030-59410-7_33"},{"key":"4845_CR46","unstructured":"Amid, E., Ganesh, A., Mathews, R., Ramaswamy, S., Song, S., Steinke, T., Suriyakumar, V.M., Thakkar, O., Thakurta, A.: Public data-assisted mirror descent for private model training. In: International Conference on Machine Learning, pp. 517\u2013535 (2022). PMLR"},{"key":"4845_CR47","doi-asserted-by":"crossref","unstructured":"Shi, Y., Liu, Y., Wei, K., Shen, L., Wang, X., Tao, D.: Make landscape flatter in differentially private federated learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 24552\u201324562 (2023)","DOI":"10.1109\/CVPR52729.2023.02352"},{"key":"4845_CR48","unstructured":"Zhou, Y., Wu, Z.S., Banerjee, A.: Bypassing the ambient dimension: Private sgd with gradient subspace identification. arXiv preprint arXiv:2007.03813 (2020)"},{"key":"4845_CR49","unstructured":"Yu, D., Zhang, H., Chen, W., Liu, T.-Y.: Do not let privacy overbill utility: Gradient embedding perturbation for private learning. arXiv preprint arXiv:2102.12677 (2021)"},{"key":"4845_CR50","unstructured":"Kairouz, P., Diaz, M.R., Rush, K., Thakurta, A.: (nearly) dimension independent private erm with adagrad rates via publicly estimated subspaces. In: Conference on Learning Theory, pp. 2717\u20132746 (2021). PMLR"},{"issue":"4","key":"4845_CR51","doi-asserted-by":"crossref","first-page":"828","DOI":"10.14778\/3503585.3503592","volume":"15","author":"J Liu","year":"2021","unstructured":"Liu, J., Lou, J., Xiong, L., Liu, J., Meng, X.: Projected federated averaging with heterogeneous differential privacy. Proceedings of the VLDB Endowment 15(4), 828\u2013840 (2021)","journal-title":"Proceedings of the VLDB Endowment"},{"issue":"7","key":"4845_CR52","doi-asserted-by":"crossref","first-page":"7599","DOI":"10.1109\/TITS.2022.3169421","volume":"24","author":"H Gao","year":"2022","unstructured":"Gao, H., Huang, W., Liu, T., Yin, Y., Li, Y.: Ppo2: Location privacy-oriented task offloading to edge computing using reinforcement learning for intelligent autonomous transport systems. IEEE transactions on intelligent transportation systems 24(7), 7599\u20137612 (2022)","journal-title":"IEEE transactions on intelligent transportation systems"},{"key":"4845_CR53","volume-title":"Differentially private bagging: Improved utility and cheaper privacy than subsample-and-aggregate","author":"J Jordon","year":"2019","unstructured":"Jordon, J., Yoon, J., Schaar, M.: Differentially private bagging: Improved utility and cheaper privacy than subsample-and-aggregate. Neural Information Processing Systems, Neural Information Processing Systems (2019)"},{"key":"4845_CR54","unstructured":"Yu, D., Kamath, G., Kulkarni, J., Liu, T.-Y., Yin, J., Zhang, H.: Individual privacy accounting for differentially private stochastic gradient descent. arXiv preprint arXiv:2206.02617 (2022)"},{"key":"4845_CR55","first-page":"429","volume":"2","author":"T Li","year":"2020","unstructured":"Li, T., Sahu, A.K., Zaheer, M., Sanjabi, M., Talwalkar, A., Smith, V.: Federated optimization in heterogeneous networks. Proceed. Mach. Learn. Syst. 2, 429\u2013450 (2020)","journal-title":"Proceed. Mach. Learn. Syst."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04845-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04845-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04845-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T16:31:47Z","timestamp":1743352307000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04845-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,26]]},"references-count":55,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["4845"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04845-1","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,26]]},"assertion":[{"value":"9 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 October 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All authors agreed to participate.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"121"}}