{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T06:36:06Z","timestamp":1768286166918,"version":"3.49.0"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T00:00:00Z","timestamp":1755561600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T00:00:00Z","timestamp":1755561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10586-025-05609-1","type":"journal-article","created":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T11:50:38Z","timestamp":1755604238000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Differential privacy-enabled federated learning for secure neural synchronization in protecting industrial data streams"],"prefix":"10.1007","volume":"28","author":[{"given":"Feifei","family":"Niu","sequence":"first","affiliation":[]},{"given":"Arindam","family":"Sarkar","sequence":"additional","affiliation":[]},{"given":"Sarbajit","family":"Manna","sequence":"additional","affiliation":[]},{"given":"Soumya","family":"Chatterjee","sequence":"additional","affiliation":[]},{"given":"Abdulfattah","family":"Noorwali","sequence":"additional","affiliation":[]},{"given":"Kamal M.","family":"Othman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,19]]},"reference":[{"key":"5609_CR1","unstructured":"Banse, A., Kreischer, J., Oliva i J\u00fcrgens, X.: Federated Learning with Differential Privacy. arXiv (2024)"},{"key":"5609_CR2","doi-asserted-by":"crossref","first-page":"8066","DOI":"10.1109\/TIFS.2024.3414255","volume":"19","author":"C Chen","year":"2024","unstructured":"Chen, C., Cui, J., Qu, G., Zhang, J.: Write+sync: Software cache write covert channels exploiting memory-disk synchronization. IEEE Trans. Inf. Forensics Secur. 19, 8066\u20138078 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5609_CR3","unstructured":"Fang, M., Cao, X., Jia, J., Gong, N.: Local model poisoning attacks to Byzantine-Robust federated learning. 29th USENIX security symposium (USENIX Security 20), pages 1605\u20131622 (2020)"},{"key":"5609_CR4","doi-asserted-by":"crossref","DOI":"10.1016\/j.jclepro.2024.143681","volume":"476","author":"Q Gong","year":"2024","unstructured":"Gong, Q., Wu, J., Jiang, Z., Hu, M., Chen, J., Cao, Z.: An integrated design method for remanufacturing scheme considering carbon emission and customer demands. J. Clean. Prod. 476, 143681 (2024)","journal-title":"J. Clean. Prod."},{"issue":"9","key":"5609_CR5","doi-asserted-by":"crossref","first-page":"5532","DOI":"10.1109\/TCOMM.2024.3392795","volume":"72","author":"Y Gong","year":"2024","unstructured":"Gong, Y., Yao, H., Liu, X., Bennis, M., Nallanathan, A., Han, Z.: Computation and Privacy Protection for Satellite-Ground Digital Twin Networks. IEEE Trans. Commun. 72(9), 5532\u20135546 (2024)","journal-title":"IEEE Trans. Commun."},{"issue":"2","key":"5609_CR6","doi-asserted-by":"crossref","first-page":"2445","DOI":"10.1109\/JSYST.2022.3218894","volume":"17","author":"R Gupta","year":"2022","unstructured":"Gupta, R., Gupta, I., Singh, A. K., Saxena, D., Lee, C-N.: An iot-centric data protection method for preserving security and privacy in cloud. IEEE Syst. J. 17(2), 2445\u20132454 (2022)","journal-title":"IEEE Syst. J."},{"issue":"4","key":"5609_CR7","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1109\/LNET.2022.3200724","volume":"4","author":"R Gupta","year":"2022","unstructured":"Gupta, R., Saxena, D., Gupta, I., Makkar, A., Singh, A.K.: Quantum machine learning driven malicious user prediction for cloud network communications. IEEE Networking Letters 4(4), 174\u2013178 (2022)","journal-title":"IEEE Networking Letters"},{"issue":"4","key":"5609_CR8","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1109\/LNET.2022.3215248","volume":"4","author":"R Gupta","year":"2022","unstructured":"Gupta, R., Saxena, D., Gupta, I., Singh, A.K.: Differential and triphase adaptive learning-based privacy-preserving model for medical data in cloud environment. IEEE Networking Letters 4(4), 217\u2013221 (2022)","journal-title":"IEEE Networking Letters"},{"key":"5609_CR9","unstructured":"Gupta, R., Saxena, D., Singh, A.K.: Cryptography approach for secure outsourced data storage in cloud environment. arXiv preprint arXiv:2306.08322 (2023)"},{"issue":"3","key":"5609_CR10","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1007\/s00354-022-00185-z","volume":"40","author":"R Gupta","year":"2022","unstructured":"Gupta, R., Singh, A.K.: A differential approach for data and classification service-based privacy-preserving machine learning model in cloud environment. N. Gener. Comput. 40(3), 737\u2013764 (2022)","journal-title":"N. Gener. Comput."},{"issue":"4","key":"5609_CR11","volume":"62","author":"J Hao","year":"2025","unstructured":"Hao, J., Chen, P., Chen, J., Li, X.: Effectively detecting and diagnosing distributed multivariate time series anomalies via Unsupervised Federated Hypernetwork. Inf. Process. Manage. 62(4), 104107 (2025)","journal-title":"Inf. Process. Manage."},{"key":"5609_CR12","first-page":"1","volume":"74","author":"P Hao","year":"2025","unstructured":"Hao, P., Yan, Z., Wen, H.: Privacy-preserving nilm: A self-alignment source-aware domain adaptation approach. IEEE Trans. Instrum. Meas. 74, 1\u201312 (2025)","journal-title":"IEEE Trans. Instrum. Meas."},{"issue":"10","key":"5609_CR13","doi-asserted-by":"crossref","first-page":"2970","DOI":"10.1109\/JSAC.2024.3414597","volume":"42","author":"J Hu","year":"2024","unstructured":"Hu, J., Jiang, H., Chen, S., Zhang, Q., Xiao, Z., Liu, D., Li, B.: WiShield: Privacy Against Wi-Fi Human Tracking. IEEE J. Sel. Areas Commun. 42(10), 2970\u20132984 (2024)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"5609_CR14","doi-asserted-by":"crossref","first-page":"1434","DOI":"10.1109\/TEM.2025.3556944","volume":"72","author":"Z Huang","year":"2025","unstructured":"Huang, Z., Shi, Y., Liang, D.: Risk identification and prioritization in china\u2019s new energy vehicle supply chain: An integrated tanimoto similarity and fuzzy-dematel approach. IEEE Trans. Eng. Manage. 72, 1434\u20131439 (2025)","journal-title":"IEEE Trans. Eng. Manage."},{"key":"5609_CR15","volume":"262","author":"Z Huang","year":"2025","unstructured":"Huang, Z., Wang, Z.: Assessing the robustness of physical networks under attack uncertainty. Reliab. Eng. Syst. Saf. 262, 111231 (2025)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"5609_CR16","volume":"262","author":"Z Huang","year":"2025","unstructured":"Huang, Z., Wang, Z.: Robustness assessments under adversarial uncertainty and industrial topology-aware safety frameworks. Reliab. Eng. Syst. Saf. 262, 111232 (2025)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"5609_CR17","doi-asserted-by":"crossref","first-page":"115003","DOI":"10.1016\/j.sna.2023.115003","volume":"366","author":"W Jiang","year":"2024","unstructured":"Jiang, W., Zheng, B., Sheng, D., Li, X.: A compensation approach for magnetic encoder error based on improved deep belief network algorithm. Sens. Actuators, A: Physical 366, 115003\u2013115003 (2024)","journal-title":"Sens. Actuators, A: Physical"},{"key":"5609_CR18","unstructured":"Kairouz, P., McMahan, H. B., Avent, B. et al.: Advances and open problems in federated learning. arXiv:1912.04977v3 [cs.LG] 9 Mar 2021 (2021)"},{"key":"5609_CR19","unstructured":"Khodabakhs. MNIST Dataset, https:\/\/www.kaggle.com\/datasets\/hojjatk\/mnist-dataset (2019)"},{"issue":"1","key":"5609_CR20","first-page":"3044","volume":"17","author":"C Le","year":"2020","unstructured":"Le, C., Zincir-Heywood, N., Heywood, M.I.: Analyzing Data Granularity Levels for Insider Threat Detection Using Machine Learning. IEEE Trans. Netw. Serv. Manage. 17(1), 3044\u20133044 (2020)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"11","key":"5609_CR21","doi-asserted-by":"crossref","first-page":"16313","DOI":"10.1109\/TNNLS.2023.3293689","volume":"35","author":"H Li","year":"2024","unstructured":"Li, H., Xia, C., Wang, T., Wang, Z., Cui, P., Li, X.: GRASS: Learning Spatial-Temporal Properties From Chainlike Cascade Data for Microscopic Diffusion Prediction. IEEE Transactions on Neural Networks and Learning Systems 35(11), 16313\u201316327 (2024)","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"5609_CR22","volume-title":"and W Zhao","author":"Q Li","year":"2025","unstructured":"Li, Q., Li, L., Liu, Z., Sun, W., Li, W., Li, J.: and W Zhao. Scalable Neurocomputing and Rolling-Horizon Optimization. IEEE Internet of Things Journal, Cloud-edge Collaboration for Industrial Internet of Things (2025)"},{"key":"5609_CR23","first-page":"1","volume":"73","author":"X Li","year":"2024","unstructured":"Li, X., Lu, Z., Yuan, M., Liu, W., Wang, F., Yu, Y., Liu, P.: Tradeoff of code estimation error rate and terminal gain in scer attack. IEEE Trans. Instrum. Meas. 73, 1\u201312 (2024)","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"5609_CR24","doi-asserted-by":"crossref","first-page":"112445","DOI":"10.1016\/j.asoc.2024.112445","volume":"167","author":"L Lin","year":"2024","unstructured":"Lin, L., Liu, J., Huang, N., Li, S., Zhang, Y.: Multiscale spatio-temporal feature fusion based non-intrusive appliance load monitoring for multiple industrial industries. Appl. Soft Comput. 167, 112445\u2013112445 (2024)","journal-title":"Appl. Soft Comput."},{"issue":"8","key":"5609_CR25","doi-asserted-by":"crossref","first-page":"4817","DOI":"10.1007\/s42835-024-01933-5","volume":"19","author":"L Lin","year":"2024","unstructured":"Lin, L., Ma, X., Chen, C., Xu, J., Huang, N.: Imbalanced Industrial Load Identification Based on Optimized CatBoost with Entropy Features. Journal of Electrical Engineering and Technology 19(8), 4817\u20134832 (2024)","journal-title":"Journal of Electrical Engineering and Technology"},{"key":"5609_CR26","volume-title":"and Haifeng Qian","author":"X Ling","year":"2024","unstructured":"Ling, X., Gong, J., Jie, F., Wang, K., Li, H., Cheng, T., Chen, Z.: and Haifeng Qian. Fairness-Aware Federated Learning with Differential Privacy. arXiv, FedFDP (2024)"},{"issue":"6","key":"5609_CR27","doi-asserted-by":"crossref","first-page":"5372","DOI":"10.1109\/TNET.2024.3462539","volume":"32","author":"H Luo","year":"2024","unstructured":"Luo, H., Zhang, Q., Sun, G., Yu, H., Niyato, D.: Symbiotic blockchain consensus: Cognitive backscatter communications-enabled wireless blockchain consensus. IEEE\/ACM Trans. Networking 32(6), 5372\u20135387 (2024)","journal-title":"IEEE\/ACM Trans. Networking"},{"issue":"10","key":"5609_CR28","doi-asserted-by":"crossref","first-page":"420","DOI":"10.3390\/systems12100420","volume":"12","author":"S Lv","year":"2024","unstructured":"Lv, S., Yang, B., Wang, R., Lu, S., Tian, J., Zheng, W., Yin, L.: Dynamic multi-granularity translation system: Dag-structured multi-granularity representation and self-attention. Systems 12(10), 420 (2024)","journal-title":"Systems"},{"issue":"12","key":"5609_CR29","doi-asserted-by":"crossref","first-page":"3690","DOI":"10.1109\/TPDS.2022.3167434","volume":"33","author":"X Ma","year":"2022","unstructured":"Ma, X., Sun, X., Yuduo, W., Liu, Z., Chen, X., Dong, C.: Differentially private byzantine-robust federated learning. IEEE Trans. Parallel Distrib. Syst. 33(12), 3690\u20133701 (2022)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"5609_CR30","unstructured":"Moustafa, Dr\u00a0N.: and Intelligent Security Group UNSW Canberra, Australia. The Bot-IoT Dataset (2021)"},{"key":"5609_CR31","unstructured":"Moustafa, Dr\u00a0N.: and Intelligent Security Group UNSW Canberra, Australia. The UNSW-NB15 Dataset (2021)"},{"key":"5609_CR32","doi-asserted-by":"crossref","first-page":"112936","DOI":"10.1016\/j.asoc.2025.112936","volume":"173","author":"L Ni","year":"2025","unstructured":"Ni, L., Wang, H., Chen, G., Zhang, L., Yao, N., Wang, G.: An interpretable Dahl-LRN neural-network for accurately modelling the systems with rate-dependent asymmetric hysteresis. Appl. Soft Comput. 173, 112936\u2013112936 (2025)","journal-title":"Appl. Soft Comput."},{"key":"5609_CR33","doi-asserted-by":"crossref","unstructured":"Ning, L., Zhang, Z., Ding, W., Shao, D., Zhu, Y.: Multilevel distribution alignment for multisource universal domain adaptation. IEEE Transactions on Neural Networks and Learning Systems, pages 1\u201315 (2025)","DOI":"10.1109\/TNNLS.2025.3561401"},{"issue":"2","key":"5609_CR34","doi-asserted-by":"crossref","first-page":"2190","DOI":"10.1109\/TII.2023.3280337","volume":"20","author":"Y Qiao","year":"2024","unstructured":"Qiao, Y., L\u00fc, J., Wang, T., Liu, K., Zhang, B., Snoussi, H.: A Multihead Attention Self-Supervised Representation Model for Industrial Sensors Anomaly Detection. IEEE Trans. Industr. Inf. 20(2), 2190\u20132199 (2024)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"5609_CR35","doi-asserted-by":"crossref","first-page":"4015","DOI":"10.1007\/s10845-023-02298-8","volume":"35","author":"RL Rosero","year":"2024","unstructured":"Rosero, R. L., Silva, C., Ribeiro, B.: Label synchronization for Hybrid Federated Learning in manufacturing and predictive maintenance. J Intell Manuf 35, 4015\u20134034 (2024)","journal-title":"J Intell Manuf"},{"key":"5609_CR36","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1007\/s10462-024-10766-7","volume":"57","author":"S Saha","year":"2024","unstructured":"Saha, S., Hota, A.: Arup Kumar Chattopadhyay, Amitava Nag and Sukumar Nandi. \u201cA multifaceted survey on privacy pFreservation of federated learning: progress, challenges, and opportunities. Artif. Intell. Rev 57, 184\u2013184 (2024)","journal-title":"Artif. Intell. Rev"},{"issue":"10","key":"5609_CR37","doi-asserted-by":"crossref","first-page":"12781","DOI":"10.1109\/TIE.2023.3344854","volume":"71","author":"Y Shen","year":"2024","unstructured":"Shen, Y., Li, Z., Zeng, Z., Lu, Q., Lee, C.H.T.: Quantitative analysis of asymmetric flux reversal permanent magnet linear machine for long excursion application. IEEE Trans. Industr. Electron. 71(10), 12781\u201312792 (2024)","journal-title":"IEEE Trans. Industr. Electron."},{"issue":"5","key":"5609_CR38","doi-asserted-by":"crossref","first-page":"5074","DOI":"10.1109\/TIE.2022.3183278","volume":"70","author":"Y Shen","year":"2023","unstructured":"Shen, Y., Lu, Q., Li, Y.: Design criterion and analysis of hybrid-excited vernier reluctance linear machine with slot halbach pm arrays. IEEE Trans. Industr. Electron. 70(5), 5074\u20135084 (2023)","journal-title":"IEEE Trans. Industr. Electron."},{"key":"5609_CR39","doi-asserted-by":"crossref","unstructured":"Shen, Y., Zhu, X., Yang, H., Lu, Q., Lee, C.\u00a0H.\u00a0T.: Design and evaluation of dual excitation permanent magnet linear machine with optimal utilization of extended working harmonics. IEEE Transactions on Industrial Electronics, pages 1\u201313 (2025)","DOI":"10.1109\/TIE.2025.3563678"},{"issue":"8","key":"5609_CR40","doi-asserted-by":"crossref","first-page":"7057","DOI":"10.1109\/TCSVT.2023.3341840","volume":"34","author":"G Shi","year":"2024","unstructured":"Shi, G., Deng, S., Wang, B., Feng, C., Zhuang, Y., Wang, X.: One for all: A unified generative framework for image emotion classification. IEEE Trans. Circuits Syst. Video Technol. 34(8), 7057\u20137068 (2024)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"2","key":"5609_CR41","doi-asserted-by":"crossref","first-page":"742","DOI":"10.1007\/s11263-024-02171-y","volume":"133","author":"H Shi","year":"2025","unstructured":"Shi, H., Dao, S.D., Cai, J.: Llmformer: Large language model for open-vocabulary semantic segmentation. Int. J. Comput. Vision 133(2), 742\u2013759 (2025)","journal-title":"Int. J. Comput. Vision"},{"issue":"6","key":"5609_CR42","doi-asserted-by":"crossref","first-page":"5551","DOI":"10.1109\/TMC.2025.3533005","volume":"24","author":"L Song","year":"2025","unstructured":"Song, L., Sun, G., Yu, H., Niyato, D.: Espd-lp: Edge service pre-deployment based on location prediction in mec. IEEE Trans. Mob. Comput. 24(6), 5551\u20135568 (2025)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"3","key":"5609_CR43","doi-asserted-by":"crossref","first-page":"1357","DOI":"10.1109\/TMC.2024.3480983","volume":"24","author":"E Wang","year":"2025","unstructured":"Wang, E., Song, Z., Wu, M., Liu, W., Yang, B., Yang, Y., Wu, J.: A new data completion perspective on sparse crowdsensing: Spatiotemporal evolutionary inference approach. IEEE Trans. Mob. Comput. 24(3), 1357\u20131371 (2025)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"3","key":"5609_CR44","doi-asserted-by":"crossref","first-page":"1196","DOI":"10.1109\/TSC.2024.3355188","volume":"17","author":"P Wang","year":"2024","unstructured":"Wang, P., Song, W., Qi, H., Zhou, C., Li, F., Wang, Y., Zhang, Q.: Server-initiated federated unlearning to eliminate impacts of low-quality data. IEEE Trans. Serv. Comput. 17(3), 1196\u20131211 (2024)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"5609_CR45","doi-asserted-by":"crossref","first-page":"3481","DOI":"10.1109\/TIFS.2023.3331274","volume":"19","author":"J Wu","year":"2024","unstructured":"Wu, J., Zhang, W., Luo, F.: On the Security of \u201cLSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing\u2019\u2019. IEEE Trans. Inf. Forensics Secur. 19, 3481\u20133482 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5609_CR46","volume":"238","author":"G Xu","year":"2025","unstructured":"Xu, G., Lei, L., Mao, Y., Li, Z., Chen, X., Zhang, K.: Cbrfl: A framework for committee-based byzantine-resilient federated learning. J. Netw. Comput. Appl. 238, 104165 (2025)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"5609_CR47","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s11265-025-01954-x","volume":"97","author":"X Zenggang","year":"2025","unstructured":"Zenggang, X., Qiangqiang, L., Youfeng, L., Hao, C., Xuemin, Z., Yuan, L., Jing, L.: Ndlsc: A new deep learning-based approach to smart contract vulnerability detection. Journal of Signal Processing Systems 97(1), 49\u201368 (2025)","journal-title":"Journal of Signal Processing Systems"},{"key":"5609_CR48","doi-asserted-by":"crossref","first-page":"122023","DOI":"10.1016\/j.ins.2025.122023","volume":"708","author":"B Zhang","year":"2025","unstructured":"Zhang, B., Sang, H., Lu, C., Meng, L., Song, Y., Jiang, X.: Integrated heterogeneous graph and reinforcement learning enabled efficient scheduling for surface mount technology workshop. Inf. Sci. 708, 122023\u2013122023 (2025)","journal-title":"Inf. Sci."},{"issue":"2","key":"5609_CR49","doi-asserted-by":"crossref","first-page":"1300","DOI":"10.1109\/TIT.2023.3340147","volume":"70","author":"M Zhang","year":"2024","unstructured":"Zhang, M., Wei, E., Berry, R., Huang, J.: Age-Dependent Differential Privacy. IEEE Trans. Inf. Theory 70(2), 1300\u20131319 (2024)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"5609_CR50","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Feng, S., Wang, P., Tan, Z., Luo, X., Ji, Y., Cheung, Y.: Learning self-growth maps for fast and accurate imbalanced streaming data clustering. IEEE Transactions on Neural Networks and Learning Systems, pages 1\u201313 (2025)","DOI":"10.1109\/TNNLS.2025.3563769"},{"key":"5609_CR51","volume":"305","author":"H Zhao","year":"2024","unstructured":"Zhao, H., Gong, Z., Gan, K., Gan, Y., Xing, H., Wang, S.: Supervised kernel principal component analysis-polynomial chaos-kriging for high-dimensional surrogate modelling and optimization. Knowl.-Based Syst. 305, 112617 (2024)","journal-title":"Knowl.-Based Syst."},{"issue":"4","key":"5609_CR52","doi-asserted-by":"crossref","first-page":"6582","DOI":"10.1109\/TII.2023.3348823","volume":"20","author":"J Zheng","year":"2024","unstructured":"Zheng, J., Liang, Z., Li, Y., Li, Z., Wu, Q.: Multi-Agent Reinforcement Learning With Privacy Preservation for Continuous Double Auction-Based P2P Energy Trading. IEEE Trans. Industr. Inf. 20(4), 6582\u20136590 (2024)","journal-title":"IEEE Trans. Industr. Inf."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05609-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05609-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05609-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T19:06:18Z","timestamp":1757963178000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05609-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,19]]},"references-count":52,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5609"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05609-1","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,19]]},"assertion":[{"value":"4 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 June 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 June 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"534"}}