{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:19:48Z","timestamp":1760487588649,"version":"build-2065373602"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:00:00Z","timestamp":1753401600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:00:00Z","timestamp":1753401600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10836-025-06185-3","type":"journal-article","created":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T02:38:44Z","timestamp":1753411124000},"page":"467-482","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["HT-Pred: An Extensive Methodology for Dataset Preparation and Hardware Trojan Prediction using Gate-Level Netlist"],"prefix":"10.1007","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0326-3282","authenticated-orcid":false,"given":"Vijaypal Singh","family":"Rathor","sequence":"first","affiliation":[]},{"given":"Akshat","family":"Rastogi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,25]]},"reference":[{"issue":"8","key":"6185_CR1","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1109\/JPROC.2014.2334493","volume":"102","author":"S Bhunia","year":"2014","unstructured":"Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware trojan attacks: Threat analysis and countermeasures. Proceedings of the IEEE. 102(8):1229\u20131247","journal-title":"Proceedings of the IEEE."},{"issue":"1","key":"6185_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2906147","volume":"22","author":"K Xiao","year":"2016","unstructured":"Xiao K, Forte D, Jin Y, Karri R, Bhunia S, Tehranipoor M (2016) Hardware trojans: Lessons learned after one decade of research. ACM Trans Des Autom Electron Syst 22(1):1\u201323","journal-title":"ACM Trans Des Autom Electron Syst"},{"key":"6185_CR3","first-page":"339","volume-title":"Hardware Trojan Detection","author":"S Narasimhan","year":"2012","unstructured":"Narasimhan S, Bhunia S (2012) Hardware Trojan Detection. Springer, New York, New York, NY, pp 339\u2013364"},{"key":"6185_CR4","unstructured":"S.\u00a0S. (2012) Hardware assurance and its importance to national security. [Online]. Available: http:\/\/www.cl.cam.ac.uk\/sps32\/secnews.html"},{"issue":"2","key":"6185_CR5","first-page":"286","volume":"6","author":"B Hutchings","year":"2018","unstructured":"Hutchings B, Skoric B (2018) Understanding and mitigating the security risks of integrated circuit counterfeiting. IEEE Trans Emerging Top Comput 6(2):286\u2013296","journal-title":"IEEE Trans Emerging Top Comput"},{"key":"6185_CR6","unstructured":"Merli D, Regazzoni F, Oliveri M, Zignani M, Ferrari A (2016) Trojan side-channel attacks on silicon physical unclonable functions. In: Proc. IEEE european test symposium (ETS). IEEE, pp 1\u20136"},{"key":"6185_CR7","unstructured":"Defense industrial base assessment: (2010) Counterfeit electronics. U.S. department of commerce"},{"key":"6185_CR8","doi-asserted-by":"crossref","unstructured":"Yang Y, Ye J, Cao Y, Zhang J, Li X, Li H, Hu Y (2020) Survey: Hardware trojan detection for netlist. In: Proc. IEEE 29th asian test symposium (ATS), pp 1\u20136","DOI":"10.1109\/ATS49688.2020.9301614"},{"key":"6185_CR9","doi-asserted-by":"crossref","unstructured":"Gubbi KI, Saber Latibari B, Srikanth A, Sheaves T, Beheshti-Shirazi SA, PD SM, Rafatirad S, Sasan A, Homayoun H, Salehi S (2023) Hardware trojan detection using machine learning: A tutorial. ACM Trans Embed Comput Syst 22(3):1\u201326","DOI":"10.1145\/3579823"},{"key":"6185_CR10","doi-asserted-by":"crossref","unstructured":"Cruz J, Hamlet J (2025) A survey on the design, detection, and prevention of pre-silicon hardware trojans. IEEE Access 13:58\u00a0509\u201358\u00a0547","DOI":"10.1109\/ACCESS.2025.3555166"},{"issue":"2","key":"6185_CR11","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1109\/TIFS.2016.2613842","volume":"12","author":"H Salmani","year":"2017","unstructured":"Salmani H (2017) Cotd: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans Inf Forensics Secur 12(2):338\u2013350","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6185_CR12","doi-asserted-by":"crossref","unstructured":"Bhatta NP, Giri U, Amsaad F (2024) Machine learning-based classification of hardware trojans using power side-channel signals. In: Proc. IEEE 67th international midwest symposium on circuits and systems (MWSCAS). IEEE, pp 990\u2013994","DOI":"10.1109\/MWSCAS60917.2024.10658778"},{"issue":"1","key":"6185_CR13","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10470-025-02351-x","volume":"123","author":"P Mohanraj","year":"2025","unstructured":"Mohanraj P, Paramasivam S, Sathyamoorthy P (2025) A power traces based hardware trojan detection using deep artificial neural network. Analog Integrated Circuits and Signal Processing 123(1):3","journal-title":"Analog Integrated Circuits and Signal Processing"},{"key":"6185_CR14","doi-asserted-by":"crossref","unstructured":"Hasegawa K, Yanagisawa M, Togawa N (2017) Trojan-feature extraction at gate-level netlists and its application to hardware-trojan detection using random forest classifier. In: Proc. IEEE international symposium on circuits and systems (ISCAS). IEEE, pp 1\u20134","DOI":"10.1109\/ISCAS.2017.8050827"},{"issue":"2","key":"6185_CR15","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s10836-018-5726-9","volume":"34","author":"R Elnaggar","year":"2018","unstructured":"Elnaggar R, Chakrabarty K (2018) Machine learning for hardware security: Opportunities and risks. J Electron Test Theory Appl 34(2):183\u2013201","journal-title":"J Electron Test Theory Appl"},{"key":"6185_CR16","unstructured":"C.\u00a0for Assurance\u00a0of Electronic\u00a0Systems (2024) Hardware trojan power & em side-channel dataset. https:\/\/cadforassurance.org\/tools\/reverse-engineering-and-visualization\/hardware-trojan-power-and-em-side-channel-dataset\/"},{"issue":"8","key":"6185_CR17","first-page":"1619","volume":"37","author":"R Shahid","year":"2017","unstructured":"Shahid R, Tehranipoor M, Plusquellic J (2017) Novel techniques for high-sensitivity hardware trojan detection using thermal and power maps. IEEE Trans Comput Des Integr Circuits Syst 37(8):1619\u20131632","journal-title":"IEEE Trans Comput Des Integr Circuits Syst"},{"issue":"1","key":"6185_CR18","first-page":"32","volume":"36","author":"S Razor","year":"2016","unstructured":"Razor S, Kumar A (2016) Razor: A framework for post-silicon validation of on-chip networks. IEEE Trans Comput Des Integr Circ Syst 36(1):32\u201345","journal-title":"IEEE Trans Comput Des Integr Circ Syst"},{"key":"6185_CR19","doi-asserted-by":"crossref","unstructured":"Rathor VS, Sharma GK (2023) A new atpg and online monitoring based technique for hardware trojan detection. Microprocessors and Microsystems 101:104903. [Online]. Available: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0141933123001473","DOI":"10.1016\/j.micpro.2023.104903"},{"issue":"3","key":"6185_CR20","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/s10836-023-06071-w","volume":"39","author":"VS Rathor","year":"2023","unstructured":"Rathor VS, Singh D, Singh S, Sajwan M (2023) Multi-objective optimization based test pattern generation for hardware trojan detection. Journal of Electronic Testing 39(3):371\u2013385","journal-title":"Journal of Electronic Testing"},{"issue":"2","key":"6185_CR21","first-page":"199","volume":"30","author":"Y Jin","year":"2011","unstructured":"Jin Y, Tehranipoor M, Plusquellic J (2011) Benchmarking the effectiveness of hardware trojan detection techniques. IEEE Trans Comput-Aided Des Integr Circ Syst 30(2):199\u2013211","journal-title":"IEEE Trans Comput-Aided Des Integr Circ Syst"},{"key":"6185_CR22","doi-asserted-by":"crossref","unstructured":"Oya M, Shi Y, Yanagisawa M, Togawa N (2015) A score-based classification method for identifying hardware-trojans at gate-level netlists. In: Proc. Design, Autom. Test Eur. DATE, vol. 2015-April. IEEE, pp. 465\u2013470","DOI":"10.7873\/DATE.2015.0352"},{"issue":"4","key":"6185_CR23","first-page":"543","volume":"7","author":"A Bhunia","year":"2019","unstructured":"Bhunia A, Banga M, Bhattacharya S (2019) Machine learning for hardware trojan detection: A comprehensive review. IEEE Trans Emerging Topics Comput 7(4):543\u2013557","journal-title":"IEEE Trans Emerging Topics Comput"},{"issue":"6","key":"6185_CR24","first-page":"1293","volume":"12","author":"Y Chen","year":"2017","unstructured":"Chen Y, Li B, Li L (2017) A general framework for hardware trojan detection in digital circuits by statistical learning algorithms. IEEE Trans Inf Forensics Secur 12(6):1293\u20131307","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6185_CR25","unstructured":"Dell report at techrepublic (2019) [Online]. Available: https:\/\/www.techrepublic.com\/article\/63-of-organizations-face-security-breaches-due-to-hardware-vulnerabilities\/"},{"key":"6185_CR26","unstructured":"Goodfellow I, Bengio Y, Courville A (2016) Deep Learning.MIT Press"},{"key":"6185_CR27","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s41635-017-0001-6","volume":"1","author":"B Shakya","year":"2017","unstructured":"Shakya B, He T, Salmani H, Forte D, Bhunia S, Tehranipoor M (2017) Benchmarking of hardware trojans and maliciously affected circuits. J Hardw Syst Secur 1:85\u2013102","journal-title":"J Hardw Syst Secur"},{"key":"6185_CR28","doi-asserted-by":"crossref","unstructured":"Salmani H, Tehranipoor M, Karri R (2013) On design vulnerability analysis and trust benchmarks development. In: Proc. IEEE 31st international conference on computer design (ICCD). IEEE, pp 471\u2013474","DOI":"10.1109\/ICCD.2013.6657085"},{"key":"6185_CR29","doi-asserted-by":"crossref","unstructured":"Bao C, Forte D, Srivastava A (2014) On application of one-class svm to reverse engineering-based hardware trojan detection. In: Proc. Int. Symp. Qual. Electron. Des. (ISQED). IEEE, pp 47\u201354","DOI":"10.1109\/ISQED.2014.6783305"},{"issue":"1","key":"6185_CR30","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/TCAD.2015.2488495","volume":"35","author":"C Bao","year":"2016","unstructured":"Bao C, Forte D, Srivastava A (2016) On reverse engineering-based hardware trojan detection. IEEE Trans Comput Des Integr Circ Syst 35(1):49\u201357","journal-title":"IEEE Trans Comput Des Integr Circ Syst"},{"issue":"3\u20134","key":"6185_CR31","first-page":"23","volume":"9","author":"NQM Noor","year":"2017","unstructured":"Noor NQM, Sjarif NNA, Azmi NHFM, Daud SM, Kamardin K (2017) \u201cHardware trojan identification using machine learning-based classification. J Telecommun Electron Comput Eng (JTEC) 9(3\u20134):23\u201327","journal-title":"J Telecommun Electron Comput Eng (JTEC)"},{"key":"6185_CR32","doi-asserted-by":"crossref","unstructured":"Xie X, Sun Y, Chen H, Ding Y (2017) Hardware trojans classification based on controllability and observability in gate-level netlist. IEICE Electronics Express 14(18):20\u00a0170\u00a0682\u201320\u00a0170\u00a0682","DOI":"10.1587\/elex.14.20170682"},{"key":"6185_CR33","doi-asserted-by":"crossref","unstructured":"Hasegawa K, Oya M, Yanagisawa M, Togawa N (2016) Hardware trojans classification for gate-level netlists based on machine learning. In: 2016 IEEE 22nd international symposium on on-line testing and robust system design (IOLTS), pp 203\u2013206","DOI":"10.1109\/IOLTS.2016.7604700"},{"key":"6185_CR34","doi-asserted-by":"crossref","unstructured":"Hasegawa K, Yanagisawa M, Togawa N (2017) Hardware trojans classification for gate-level netlists using multi-layer neural networks. In: Proc. IEEE 23rd international symposium on on-line testing and robust system design (IOLTS). IEEE, pp 227\u2013232","DOI":"10.1109\/IOLTS.2017.8046227"},{"key":"6185_CR35","doi-asserted-by":"crossref","unstructured":"Hu T, Wu L, Zhang X, Yin Y, Yang Y (2019) Hardware trojan detection combine with machine learning: an svm-based detection approach. In: Proc. IEEE 13th international conference on anti-counterfeiting, security, and identification (ASID), pp 202\u2013206","DOI":"10.1109\/ICASID.2019.8924992"},{"key":"6185_CR36","doi-asserted-by":"crossref","unstructured":"Dong C, Chen J, Guo W, Zou J (2019) A machine-learning-based hardware-trojan detection approach for chips in the internet of things. International Journal of Distributed Sensor Networks 15(12):1550147719888098. [Online]. Available: https:\/\/doi.org\/10.1177\/1550147719888098","DOI":"10.1177\/1550147719888098"},{"key":"6185_CR37","doi-asserted-by":"crossref","unstructured":"Maddineni RD, Ch D (2023) Consistent interpretation of ensemble classifiers in trojan-horse detection. IEEE Access 11:70\u00a0930\u201370\u00a0946","DOI":"10.1109\/ACCESS.2023.3294282"},{"key":"6185_CR38","doi-asserted-by":"crossref","unstructured":"Negishi R, Togawa N (2024) Evaluation of ensemble learning models for hardware-trojan identification at gate-level netlists. In: Proc. IEEE international conference on consumer electronics (ICCE). IEEE, pp 1\u20136","DOI":"10.1109\/ICCE59016.2024.10444240"},{"key":"6185_CR39","doi-asserted-by":"crossref","unstructured":"Rathor VS, Podder S, Dubey S (2025) An ensemble learning model for hardware trojan detection in integrated circuit design. Comput Electric Eng 123:110090. [Online]. Available: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0045790625000333","DOI":"10.1016\/j.compeleceng.2025.110090"},{"key":"6185_CR40","doi-asserted-by":"crossref","unstructured":"Wang S, Cui Y, Yu S, Gu C, Wang C, iu W (2024) Gatrojan: An efficient gate-level hardware trojan detection approach using graph attention networks. In: Proc. IEEE 37th international system-on-chip conference (SOCC). IEEE, pp 1\u20136","DOI":"10.1109\/SOCC62300.2024.10737769"},{"key":"6185_CR41","doi-asserted-by":"crossref","unstructured":"Imangholi A, Hashemi M, Momeni A, Mohammadi S, Carlson TE(2024) Fast-go: Fast, accurate, and scalable hardware trojan detection using graph convolutional networks. In: Proc. 25th international symposium on quality electronic design (ISQED). IEEE, pp 1\u20138","DOI":"10.1109\/ISQED60706.2024.10528759"},{"key":"6185_CR42","doi-asserted-by":"crossref","unstructured":"Pan Z, Mishra P (2024) Td-zero: Automatic golden-free hardware trojan detection using zero-shot learning. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","DOI":"10.1109\/TCAD.2024.3354889"},{"key":"6185_CR43","doi-asserted-by":"crossref","unstructured":"Vishwakarma R, Rezaei A (2024) Uncertainty-aware hardware trojan detection using multimodal deep learning. In: Proc. Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, pp 1\u20136","DOI":"10.23919\/DATE58400.2024.10546558"},{"key":"6185_CR44","doi-asserted-by":"crossref","unstructured":"Brayton R, Mishchenko A (2010) Abc: An academic industrial-strength verification tool. In: Computer Aided Verification, T.\u00a0Touili, B.\u00a0Cook, and P.\u00a0Jackson, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, pp 24\u201340","DOI":"10.1007\/978-3-642-14295-6_5"},{"issue":"3","key":"6185_CR45","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1109\/TETC.2018.2795706","volume":"8","author":"VS Rathor","year":"2020","unstructured":"Rathor VS, Garg B, Sharma GK (2020) A novel low complexity logic encryption technique for design-for-trust. IEEE Trans Emerging Topics Comput 8(3):688\u2013699","journal-title":"IEEE Trans Emerging Topics Comput"},{"key":"6185_CR46","unstructured":"HT-Pred (2024) A Complete Machine Learning Tool for Hardware Trojan Detection. Accessed: 2025-05-22. [Online]. Available: https:\/\/github.com\/AkshatRastogi-1nC0re\/HTPRED"},{"issue":"7553","key":"6185_CR47","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436\u2013444","journal-title":"Nature"},{"key":"6185_CR48","unstructured":"Li B, Pan S, Yuan X, Shu L, Chen Y (2018) Thermal-based hardware trojan detection using semi-supervised learning in wireless sensor networks. IEEE Access 6:21\u00a0607\u201321\u00a0616"},{"key":"6185_CR49","doi-asserted-by":"crossref","unstructured":"Hastie T, Tibshirani R, Friedman J (2009) The Elements of Statistical Learning. Springer","DOI":"10.1007\/978-0-387-84858-7"},{"key":"6185_CR50","unstructured":"Hsu C-W, Chang C-C, Lin C-J (2009) A practical guide to support vector classification. [Online]. Available: http:\/\/www.csie.ntu.edu.tw\/~cjlin"},{"issue":"1","key":"6185_CR51","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"issue":"9","key":"6185_CR52","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1109\/TKDE.2008.239","volume":"21","author":"H He","year":"2009","unstructured":"He H, Garcia EA (2009) Learning from imbalanced data. IEEE Trans Knowl Data Eng. 21(9):1263\u20131284","journal-title":"IEEE Trans Knowl Data Eng."},{"key":"6185_CR53","doi-asserted-by":"crossref","unstructured":"Albartus N, Hoffmann M, Temme S, Azriel L, Paar C (2020) Dana universal dataflow analysis for gate-level netlist reverse engineering. IACR Transactions on Cryptographic Hardware and Embedded Systems 2020(4):309\u2013336 [Online]. Available: https:\/\/cadforassurance.org\/tools\/reverse-engineering-and-visualization\/dana\/","DOI":"10.46586\/tches.v2020.i4.309-336"},{"issue":"3","key":"6185_CR54","first-page":"1742","volume":"69","author":"S Sun","year":"2021","unstructured":"Sun S, Zhang H, Cui X, Dong L, Fang X (2021) Electromagnetic side-channel hardware trojan detection based on transfer learning. IEEE Transactions on Circuits and Systems II: Express Briefs 69(3):1742\u20131746","journal-title":"IEEE Transactions on Circuits and Systems II: Express Briefs"},{"issue":"12","key":"6185_CR55","doi-asserted-by":"publisher","first-page":"155014771988809","DOI":"10.1177\/1550147719888098","volume":"15","author":"C Dong","year":"2019","unstructured":"Dong C, Chen J, Guo W, Zou J (2019) A machine-learning-based hardware-trojan detection approach for chips in the internet of things. International Journal of Distributed Sensor Networks. 15(12):1550147719888098","journal-title":"International Journal of Distributed Sensor Networks."},{"key":"6185_CR56","first-page":"516","volume":"74","author":"F Liu","year":"2018","unstructured":"Liu F, Zhou Z-H, Wang Z-H (2018) Clustering ensemble selection by random projection. Pattern Recogn 74:516\u2013528","journal-title":"Pattern Recogn"},{"key":"6185_CR57","doi-asserted-by":"crossref","unstructured":"Polikar R (2012) Ensemble learning. In: Ensemble machine learning. Springer, pp 1\u201334","DOI":"10.1007\/978-1-4419-9326-7_1"},{"key":"6185_CR58","unstructured":"Benchmark machine learning dataset (2020) [Online]. Available: https:\/\/caslab.e-ce.uth.gr\/ToolsandDatabases.html"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-025-06185-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-025-06185-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-025-06185-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T04:36:45Z","timestamp":1760416605000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-025-06185-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,25]]},"references-count":58,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["6185"],"URL":"https:\/\/doi.org\/10.1007\/s10836-025-06185-3","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2025,7,25]]},"assertion":[{"value":"17 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This publication has no known conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interests"}},{"value":"No competing interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}]}}