{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T09:58:38Z","timestamp":1768903118962,"version":"3.49.0"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,10,4]],"date-time":"2022-10-04T00:00:00Z","timestamp":1664841600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,10,4]],"date-time":"2022-10-04T00:00:00Z","timestamp":1664841600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003170","name":"Stiftelsen f\u00f6r Kunskaps- och Kompetensutveckling","doi-asserted-by":"publisher","award":["20160103"],"award-info":[{"award-number":["20160103"]}],"id":[{"id":"10.13039\/501100003170","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Data Min Knowl Disc"],"published-print":{"date-parts":[[2022,11]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In contextual anomaly detection, an object is only considered anomalous within a specific context. Most existing methods use a single context based on a set of user-specified contextual features. However, identifying the right context can be very challenging in practice, especially in datasets with a large number of attributes. Furthermore, in real-world systems, there might be multiple anomalies that occur in different contexts and, therefore, require a combination of several \u201cuseful\u201d contexts to unveil them. In this work, we propose a novel approach, called wisdom of the contexts (WisCon), to effectively detect complex contextual anomalies in situations where the true contextual and behavioral attributes are unknown. Our method constructs an ensemble of multiple contexts, with varying importance scores, based on the assumption that not all useful contexts are equally so. We estimate the importance of each context using an active learning approach with a novel query strategy. Experiments show that WisCon significantly outperforms existing baselines in different categories (i.e., active learning methods, unsupervised contextual and non-contextual anomaly detectors) on 18 datasets. Furthermore, the results support our initial hypothesis that there is no single perfect context that successfully uncovers all kinds of contextual anomalies, and leveraging the \u201cwisdom\u201d of multiple contexts is necessary.<\/jats:p>","DOI":"10.1007\/s10618-022-00868-7","type":"journal-article","created":{"date-parts":[[2022,10,4]],"date-time":"2022-10-04T07:03:00Z","timestamp":1664866980000},"page":"2410-2458","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Wisdom of the contexts: active ensemble learning for contextual anomaly detection"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6249-4144","authenticated-orcid":false,"given":"Ece","family":"Calikus","sequence":"first","affiliation":[]},{"given":"S\u0142awomir","family":"Nowaczyk","sequence":"additional","affiliation":[]},{"given":"Mohamed-Rafik","family":"Bouguelia","sequence":"additional","affiliation":[]},{"given":"Onur","family":"Dikmen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,4]]},"reference":[{"key":"868_CR1","doi-asserted-by":"crossref","unstructured":"Abe N, Zadrozny B, Langford J (2006) Outlier detection by active learning. In: Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 504\u2013509","DOI":"10.1145\/1150402.1150459"},{"issue":"2","key":"868_CR2","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/2481244.2481252","volume":"14","author":"CC Aggarwal","year":"2013","unstructured":"Aggarwal CC (2013) Outlier ensembles: position paper. ACM SIGKDD Explor Newsl 14(2):49\u201358","journal-title":"ACM SIGKDD Explor Newsl"},{"key":"868_CR3","doi-asserted-by":"crossref","unstructured":"Aggarwal CC (2015) Outlier analysis. In: Data mining. Springer, pp 237\u2013263","DOI":"10.1007\/978-3-319-14142-8_8"},{"issue":"1","key":"868_CR4","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/2830544.2830549","volume":"17","author":"CC Aggarwal","year":"2015","unstructured":"Aggarwal CC, Sathe S (2015) Theoretical foundations and algorithms for outlier ensembles. ACM SIGKDD Explor Newsl 17(1):24\u201347","journal-title":"ACM SIGKDD Explor Newsl"},{"key":"868_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54765-7","volume-title":"Outlier ensembles: an introduction","author":"CC Aggarwal","year":"2017","unstructured":"Aggarwal CC, Sathe S (2017) Outlier ensembles: an introduction. Springer, Berlin"},{"key":"868_CR6","doi-asserted-by":"crossref","unstructured":"Aggarwal CC, Yu PS (2001) Outlier detection for high dimensional data. In: Proceedings of the 2001 ACM SIGMOD international conference on management of data, pp 37\u201346","DOI":"10.1145\/376284.375668"},{"issue":"1","key":"868_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"key":"868_CR8","doi-asserted-by":"crossref","unstructured":"Breunig MM, Kriegel HP, Ng RT, Sander J (2000) Lof: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD international conference on Management of data, pp 93\u2013104","DOI":"10.1145\/335191.335388"},{"issue":"2","key":"868_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3086820","volume":"36","author":"W Cai","year":"2017","unstructured":"Cai W, Zhang Y, Zhang Y, Zhou S, Wang W, Chen Z, Ding C (2017) Active learning for classification with maximum model change. ACM Trans Inf Syst (TOIS) 36(2):1\u201328","journal-title":"ACM Trans Inf Syst (TOIS)"},{"key":"868_CR10","doi-asserted-by":"crossref","unstructured":"Calikus E, Fan Y, Nowaczyk S, Sant\u2019Anna A (2019) Interactive-cosmo: consensus self-organized models for fault detection with expert feedback. In: Proceedings of the workshop on interactive data mining, pp 1\u20139","DOI":"10.1145\/3304079.3310289"},{"key":"868_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113453","volume":"155","author":"E Calikus","year":"2020","unstructured":"Calikus E, Nowaczyk S, Sant\u2019Anna A, Dikmen O (2020) No free lunch but a cheaper supper: a general framework for streaming anomaly detection. Expert Syst Appl 155:113453","journal-title":"Expert Syst Appl"},{"key":"868_CR12","doi-asserted-by":"crossref","unstructured":"Campos GO, Zimek A, Meira W (2018) An unsupervised boosting strategy for outlier detection ensembles. In: Pacific-Asia conference on knowledge discovery and data mining. Springer, pp 564\u2013576","DOI":"10.1007\/978-3-319-93034-3_45"},{"issue":"3","key":"868_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv (CSUR) 41(3):1\u201358","journal-title":"ACM Comput Surv (CSUR)"},{"key":"868_CR14","doi-asserted-by":"crossref","unstructured":"Dagan I, Engelson SP (1995) Committee-based sampling for training probabilistic classifiers. In: Machine learning proceedings 1995. Elsevier, pp 150\u2013157","DOI":"10.1016\/B978-1-55860-377-6.50027-X"},{"key":"868_CR15","doi-asserted-by":"crossref","unstructured":"Das S, Wong WK, Dietterich T, Fern A, Emmott A (2016) Incorporating expert feedback into active anomaly discovery. In: 2016 IEEE 16th international conference on data mining (ICDM). IEEE, pp 853\u2013858","DOI":"10.1109\/ICDM.2016.0102"},{"key":"868_CR16","doi-asserted-by":"crossref","unstructured":"Das S, Wong WK, Fern A, Dietterich TG, Siddiqui MA (2017) Incorporating feedback into tree-based anomaly detection. arXiv:1708.09441","DOI":"10.1109\/ICDM.2016.0102"},{"key":"868_CR17","unstructured":"Das S, Islam MR, Jayakodi NK, Doppa JR (2019) Active anomaly detection via ensembles: insights, algorithms, and interpretability. arXiv:1901.08930"},{"issue":"4","key":"868_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3396608","volume":"14","author":"S Das","year":"2020","unstructured":"Das S, Wong WK, Dietterich T, Fern A, Emmott A (2020) Discovering anomalies by incorporating feedback from an expert. ACM Trans Knowl Discov Data (TKDD) 14(4):1\u201332","journal-title":"ACM Trans Knowl Discov Data (TKDD)"},{"key":"868_CR19","first-page":"1","volume":"7","author":"J Dem\u0161ar","year":"2006","unstructured":"Dem\u0161ar J (2006) Statistical comparisons of classifiers over multiple data sets. J Mach Learn Res 7:1\u201330","journal-title":"J Mach Learn Res"},{"issue":"1","key":"868_CR20","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1006\/jcss.1997.1504","volume":"55","author":"Y Freund","year":"1997","unstructured":"Freund Y, Schapire RE (1997) A decision-theoretic generalization of on-line learning and an application to boosting. J Comput Syst Sci 55(1):119\u2013139","journal-title":"J Comput Syst Sci"},{"key":"868_CR21","doi-asserted-by":"crossref","unstructured":"Gama J, Sebastiao R, Rodrigues PP (2009) Issues in evaluation of stream learning algorithms. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, pp 329\u2013338","DOI":"10.1145\/1557019.1557060"},{"key":"868_CR22","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1613\/jair.3623","volume":"46","author":"N G\u00f6rnitz","year":"2013","unstructured":"G\u00f6rnitz N, Kloft M, Rieck K, Brefeld U (2013) Toward supervised anomaly detection. J Artif Intell Res 46:235\u2013262","journal-title":"J Artif Intell Res"},{"key":"868_CR23","doi-asserted-by":"crossref","unstructured":"Keller F, Muller E, Bohm K (2012) Hics: high contrast subspaces for density-based outlier ranking. In: 2012 IEEE 28th international conference on data engineering. IEEE, pp 1037\u20131048","DOI":"10.1109\/ICDE.2012.88"},{"key":"868_CR24","doi-asserted-by":"crossref","unstructured":"Keller F, M\u00fcller E, Wixler A, B\u00f6hm K (2013) Flexible and adaptive subspace search for outlier analysis. In: Proceedings of the 22nd ACM international conference on information & knowledge management, pp 1381\u20131390","DOI":"10.1145\/2505515.2505560"},{"key":"868_CR25","doi-asserted-by":"crossref","unstructured":"Klementiev A, Roth D, Small K (2007) An unsupervised learning algorithm for rank aggregation. In: European conference on machine learning. Springer, pp 616\u2013623","DOI":"10.1007\/978-3-540-74958-5_60"},{"key":"868_CR26","doi-asserted-by":"crossref","unstructured":"Kou Y, Lu CT, Chen D (2006) Spatial weighted outlier detection. In: Proceedings of the 2006 SIAM international conference on data mining. SIAM, pp 614\u2013618","DOI":"10.1137\/1.9781611972764.71"},{"key":"868_CR27","doi-asserted-by":"crossref","unstructured":"Kriegel HP, Kr\u00f6ger P, Schubert E, Zimek A (2009) Outlier detection in axis-parallel subspaces of high dimensional data. In: Pacific-asia conference on knowledge discovery and data mining. Springer, pp 831\u2013838","DOI":"10.1007\/978-3-642-01307-2_86"},{"key":"868_CR28","doi-asserted-by":"crossref","unstructured":"Kriegel HP, Kroger P, Schubert E, Zimek A (2011) Interpreting and unifying outlier scores. In: Proceedings of the 2011 SIAM international conference on data mining. SIAM, pp 13\u201324","DOI":"10.1137\/1.9781611972818.2"},{"key":"868_CR29","doi-asserted-by":"crossref","unstructured":"Lamba H, Akoglu L (2019) Learning on-the-job to re-rank anomalies from top-1 feedback. In: Proceedings of the 2019 SIAM international conference on data mining. SIAM, pp 612\u2013620","DOI":"10.1137\/1.9781611975673.69"},{"key":"868_CR30","doi-asserted-by":"crossref","unstructured":"Lazarevic A, Kumar V (2005) Feature bagging for outlier detection. In: Proceedings of the eleventh ACM SIGKDD international conference on knowledge discovery in data mining, pp 157\u2013166","DOI":"10.1145\/1081870.1081891"},{"key":"868_CR31","doi-asserted-by":"crossref","unstructured":"Liang J, Parthasarathy S (2016) Robust contextual outlier detection: where context meets sparsity. In: Proceedings of the 25th ACM international on conference on information and knowledge management, pp 2167\u20132172","DOI":"10.1145\/2983323.2983660"},{"key":"868_CR32","doi-asserted-by":"crossref","unstructured":"Liu FT, Ting KM, Zhou ZH (2008) Isolation forest. In: 2008 eighth IEEE international conference on data mining. IEEE, pp 413\u2013422","DOI":"10.1109\/ICDM.2008.17"},{"key":"868_CR33","unstructured":"McCallumzy AK, Nigamy K (1998) Employing em and pool-based active learning for text classification. In: Proceedings of international conference on machine learning (ICML). Citeseer, pp 359\u2013367"},{"key":"868_CR34","doi-asserted-by":"crossref","unstructured":"Meghanath M, Pai D, Akoglu L (2018) Conout: con textual out lier detection with multiple contexts: application to ad fraud. In: Joint European conference on machine learning and knowledge discovery in databases. Springer, pp 139\u2013156","DOI":"10.1007\/978-3-030-10925-7_9"},{"key":"868_CR35","unstructured":"Micenkov\u00e1 B, McWilliams B, Assent I (2015) Learning representations for outlier detection on a budget. arXiv:1507.08104"},{"key":"868_CR36","doi-asserted-by":"crossref","unstructured":"M\u00fcller E, Schiffer M, Seidl T (2011) Statistical selection of relevant subspace projections for outlier ranking. In: 2011 IEEE 27th international conference on data engineering. IEEE, pp 434\u2013445","DOI":"10.1109\/ICDE.2011.5767916"},{"key":"868_CR37","unstructured":"Papadimitriou S, Sun J, Faloutsos C (2005) Streaming pattern discovery in multiple time-series. In: Proceedings of the 31st international conference on very large data bases, VLDB Endowment, VLDB \u201905, pp 697\u2013708"},{"key":"868_CR38","first-page":"727","volume":"1","author":"D Pelleg","year":"2000","unstructured":"Pelleg D, Moore AW et al (2000) X-means: extending k-means with efficient estimation of the number of clusters. Icml 1:727\u2013734","journal-title":"Icml"},{"issue":"2","key":"868_CR39","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s10994-015-5521-0","volume":"102","author":"T Pevn\u1ef3","year":"2016","unstructured":"Pevn\u1ef3 T (2016) Loda: lightweight on-line detector of anomalies. Mach Learn 102(2):275\u2013304","journal-title":"Mach Learn"},{"key":"868_CR40","unstructured":"Rayana S, Akoglu L (2014) An ensemble approach for event detection and characterization in dynamic graphs. In: ACM SIGKDD ODD Workshop"},{"issue":"4","key":"868_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2890508","volume":"10","author":"S Rayana","year":"2016","unstructured":"Rayana S, Akoglu L (2016) Less is more: building selective anomaly ensembles. Acm Trans Knowl Discov Data (TKDD) 10(4):1\u201333","journal-title":"Acm Trans Knowl Discov Data (TKDD)"},{"key":"868_CR42","doi-asserted-by":"crossref","unstructured":"Rayana S, Zhong W, Akoglu L (2016) Sequential ensemble learning for outlier detection: a bias-variance perspective. In: 2016 IEEE 16th international conference on data mining (ICDM). IEEE, pp 1167\u20131172","DOI":"10.1109\/ICDM.2016.0154"},{"key":"868_CR43","unstructured":"Salvador S, Chan P, Brodie J (2004) Learning states and rules for time series anomaly detection. In: FLAIRS conference, pp 306\u2013311"},{"key":"868_CR44","doi-asserted-by":"crossref","unstructured":"Sathe S, Aggarwal CC (2016) Subspace outlier detection in linear time with randomized hashing. In: 2016 IEEE 16th international conference on data mining (ICDM). IEEE, pp 459\u2013468","DOI":"10.1109\/ICDM.2016.0057"},{"key":"868_CR45","unstructured":"Sch\u00f6lkopf B, Williamson RC, Smola AJ, Shawe-Taylor J, Platt JC et al (1999) Support vector method for novelty detection. In: NIPS, Citeseer vol 12, pp 582\u2013588"},{"issue":"1","key":"868_CR46","first-page":"1","volume":"6","author":"B Settles","year":"2012","unstructured":"Settles B (2012) Active learning. Synth Lect Artif Intell Mach Learn 6(1):1\u2013114","journal-title":"Synth Lect Artif Intell Mach Learn"},{"key":"868_CR47","doi-asserted-by":"crossref","unstructured":"Seung HS, Opper M, Sompolinsky H (1992) Query by committee. In: Proceedings of the fifth annual workshop on computational learning theory, pp 287\u2013294","DOI":"10.1145\/130385.130417"},{"key":"868_CR48","doi-asserted-by":"crossref","unstructured":"Shekhar S, Lu CT, Zhang P (2001) Detecting graph-based spatial outliers: algorithms and applications (a summary of results). In: Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining, pp 371\u2013376","DOI":"10.1145\/502512.502567"},{"key":"868_CR49","doi-asserted-by":"crossref","unstructured":"Siddiqui MA, Fern A, Dietterich TG, Wright R, Theriault A, Archer DW (2018) Feedback-guided anomaly discovery via online optimization. In: Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery & data mining, pp 2200\u20132209","DOI":"10.1145\/3219819.3220083"},{"key":"868_CR50","doi-asserted-by":"publisher","unstructured":"Sindhwani V, Melville P, Lawrence RD (2009) Uncertainty sampling and transductive experimental design for active dual supervision. In: Proceedings of the 26th annual international conference on machine learning\u2014ICML \u201909. https:\/\/doi.org\/10.1145\/1553374.1553496","DOI":"10.1145\/1553374.1553496"},{"issue":"5","key":"868_CR51","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1109\/TKDE.2007.1009","volume":"19","author":"X Song","year":"2007","unstructured":"Song X, Wu M, Jermaine C, Ranka S (2007) Conditional anomaly detection. IEEE Trans Knowl Data Eng 19(5):631\u2013645","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"Nov","key":"868_CR52","first-page":"45","volume":"2","author":"S Tong","year":"2001","unstructured":"Tong S, Koller D (2001) Support vector machine active learning with applications to text classification. J Mach Learn Res 2(Nov):45\u201366","journal-title":"J Mach Learn Res"},{"issue":"04","key":"868_CR53","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1142\/S0129065795000251","volume":"6","author":"AS Weigend","year":"1995","unstructured":"Weigend AS, Mangeas M, Srivastava AN (1995) Nonlinear gated experts for time series: discovering regimes and avoiding overfitting. Int J Neural Syst 6(04):373\u2013399","journal-title":"Int J Neural Syst"},{"issue":"1\u20133","key":"868_CR54","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/0169-7439(87)80084-9","volume":"2","author":"S Wold","year":"1987","unstructured":"Wold S, Esbensen K, Geladi P (1987) Principal component analysis. Chemom Intell Lab Syst 2(1\u20133):37\u201352","journal-title":"Chemom Intell Lab Syst"},{"key":"868_CR55","doi-asserted-by":"crossref","unstructured":"Wu K, Zhang K, Fan W, Edwards A, Philip SY (2014) Rs-forest: A rapid density estimator for streaming anomaly detection. In: 2014 IEEE international conference on data mining. IEEE, pp 600\u2013609","DOI":"10.1109\/ICDM.2014.45"},{"key":"868_CR56","doi-asserted-by":"crossref","unstructured":"Zhao Y, Hryniewicki MK (2018) Xgbod: improving supervised outlier detection with unsupervised representation learning. In: 2018 international joint conference on neural networks (IJCNN). IEEE, pp 1\u20138","DOI":"10.1109\/IJCNN.2018.8489605"},{"issue":"96","key":"868_CR57","first-page":"1","volume":"20","author":"Y Zhao","year":"2019","unstructured":"Zhao Y, Nasrullah Z, Li Z (2019) Pyod: a python toolbox for scalable outlier detection. J Mach Learn Res 20(96):1\u20137","journal-title":"J Mach Learn Res"},{"key":"868_CR58","doi-asserted-by":"crossref","unstructured":"Zheng G, Brantley SL, Lauvaux T, Li Z (2017) Contextual spatial outlier detection with metric learning. In: Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining, pp 2161\u20132170","DOI":"10.1145\/3097983.3098143"},{"issue":"5","key":"868_CR59","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1002\/sam.11161","volume":"5","author":"A Zimek","year":"2012","unstructured":"Zimek A, Schubert E, Kriegel HP (2012) A survey on unsupervised outlier detection in high-dimensional numerical data. Stat Anal Data Min ASA Data Sci J 5(5):363\u2013387","journal-title":"Stat Anal Data Min ASA Data Sci J"},{"issue":"1","key":"868_CR60","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/2594473.2594476","volume":"15","author":"A Zimek","year":"2014","unstructured":"Zimek A, Campello RJ, Sander J (2014) Ensembles for unsupervised outlier detection: challenges and research questions a position paper. ACM SIGKDD Explor Newsl 15(1):11\u201322","journal-title":"ACM SIGKDD Explor Newsl"}],"container-title":["Data Mining and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-022-00868-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10618-022-00868-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-022-00868-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,16]],"date-time":"2022-11-16T12:18:30Z","timestamp":1668601110000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10618-022-00868-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,4]]},"references-count":60,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["868"],"URL":"https:\/\/doi.org\/10.1007\/s10618-022-00868-7","relation":{},"ISSN":["1384-5810","1573-756X"],"issn-type":[{"value":"1384-5810","type":"print"},{"value":"1573-756X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,4]]},"assertion":[{"value":"15 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 October 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}