{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:26:02Z","timestamp":1740122762183,"version":"3.37.3"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T00:00:00Z","timestamp":1656547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T00:00:00Z","timestamp":1656547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Japan Science and Technology Agency (JST) SPRING","award":["JPMJSP2136"],"award-info":[{"award-number":["JPMJSP2136"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Intell Inf Syst"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10844-022-00722-8","type":"journal-article","created":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T19:03:08Z","timestamp":1656615788000},"page":"733-754","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["GIAD-ST: Detecting anomalies in human monitoring based on generative inpainting via self-supervised multi-task learning"],"prefix":"10.1007","volume":"59","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3045-9798","authenticated-orcid":false,"given":"Ning","family":"Dong","sequence":"first","affiliation":[]},{"given":"Einoshin","family":"Suzuki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,30]]},"reference":[{"key":"722_CR1","doi-asserted-by":"publisher","unstructured":"Akcay, S., Atapour-Abarghouei, A., & Breckon, T.P. (2018). Ganomaly: Semi-supervised anomaly detection via Adversarial training. In Asian conference on computer vision, ACCV\u00a0(pp. 622\u2013637). https:\/\/doi.org\/10.1007\/978-3-030-20893-6_39","DOI":"10.1007\/978-3-030-20893-6_39"},{"key":"722_CR2","doi-asserted-by":"publisher","unstructured":"Akcay, S., Atapour-Abarghouei, A., & Breckon, T. P. (2019). Skip-Ganomaly: Skip connected and adversarially trained encoder-decoder anomaly detection. In International joint conference on neural network, IJCNN\u00a0(pp. 1\u20138). https:\/\/doi.org\/10.1109\/IJCNN.2019.8851808","DOI":"10.1109\/IJCNN.2019.8851808"},{"key":"722_CR3","unstructured":"Arjovsky, M., & Bottou, L. (2017). Towards principled methods for training generative adversarial networks. In International conference on learning representations, ICLR."},{"issue":"3","key":"722_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys, 41(3), 1\u201358. https:\/\/doi.org\/10.1145\/1541880.1541882.","journal-title":"ACM Computing Surveys"},{"key":"722_CR5","doi-asserted-by":"publisher","unstructured":"Chen, T., Zhai, X., Ritter, M., & et al. (2019). Self-supervised GANs via auxiliary rotation loss. In Conference on computer vision and pattern recognition, CVPR\u00a0(pp. 12154\u201312163). https:\/\/doi.org\/10.1109\/CVPR.2019.01243","DOI":"10.1109\/CVPR.2019.01243"},{"issue":"7","key":"722_CR6","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1016\/j.patrec.2011.12.004","volume":"33","author":"MJ Choi","year":"2012","unstructured":"Choi, M.J., Torralba, A., & Willsky, A.S. (2012). Context models and out-of-context objects. Pattern Recognition Letters, 33(7), 853\u2013862. https:\/\/doi.org\/10.1016\/j.patrec.2011.12.004.","journal-title":"Pattern Recognition Letters"},{"issue":"1","key":"722_CR7","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s10844-015-0392-1","volume":"48","author":"Y Deguchi","year":"2017","unstructured":"Deguchi, Y., Takayama, D., Takano, S., & et al. (2017). Skeleton clustering by multi-robot monitoring for fall risk discovery. Journal of Intelligent Information Systems, 48(1), 75\u2013115. https:\/\/doi.org\/10.1007\/s10844-015-0392-1.","journal-title":"Journal of Intelligent Information Systems"},{"key":"722_CR8","doi-asserted-by":"publisher","unstructured":"Dong, N., Hatae, Y., Fadjrimiratno, M.F., & et al. (2020). Experimental evaluation of GAN-based one-class anomaly detection on office monitoring. In International symposium on methodologies for intelligent systems, ISMIS\u00a0(pp. 214\u2013224). https:\/\/doi.org\/10.1007\/978-3-030-59491-6_20","DOI":"10.1007\/978-3-030-59491-6_20"},{"key":"722_CR9","doi-asserted-by":"publisher","unstructured":"Dong, N., & Suzuki, E. (2021). GIAD: Generative inpainting-based anomaly detection via self-supervised learning for human monitoring. In Pacific Rim international conference on artificial intelligence, PRICAI, Part II\u00a0(pp. 418\u2013432). https:\/\/doi.org\/10.1007\/978-3-030-89363-7_32","DOI":"10.1007\/978-3-030-89363-7_32"},{"key":"722_CR10","doi-asserted-by":"publisher","unstructured":"Esterwood, C., & Robert, L.P. (2020). Personality in healthcare human robot interaction (H-HRI) a literature review and brief critique. In International conference on human-agent interaction, HAI\u00a0(pp. 87\u201395). https:\/\/doi.org\/10.1145\/3406499.3415075","DOI":"10.1145\/3406499.3415075"},{"key":"722_CR11","doi-asserted-by":"publisher","unstructured":"Fadjrimiratno, M.F., Hatae, Y., Matsukawa, T., & et al. (2021). Detecting anomalies from human activities by an autonomous mobile robot based on \u201cFast and Slow\u201d thinking. In International joint conference on computer vision, imaging and computer graphics theory and applications, VISIGRAPP, Subvolume for VISAPP\u00a0(Vol. 5 pp. 943\u2013953). https:\/\/doi.org\/10.5220\/0010313509430953","DOI":"10.5220\/0010313509430953"},{"key":"722_CR12","unstructured":"Gidaris, S., Singh, P., & Komodakis, N. (2018). Unsupervised representation learning by predicting image rotations. In International conference on learning representations, ICLR."},{"key":"722_CR13","doi-asserted-by":"publisher","unstructured":"Godard, C., Mac Aodha, O., & Brostow, G.J. (2017). Unsupervised monocular depth estimation with left-right consistency. In Conference on Computer Vision and Pattern Recognition, CVPR\u00a0(pp. 270\u2013279). https:\/\/doi.org\/10.1109\/CVPR.2017.699","DOI":"10.1109\/CVPR.2017.699"},{"key":"722_CR14","unstructured":"Goodfellow, I.J., Pouget-Abadie, J., Mirza, M., & et al. (2014). Generative adversarial nets. In Neural information processing systems, NIPS (pp. 2672\u20132680)."},{"key":"722_CR15","doi-asserted-by":"publisher","unstructured":"Hatae, Y., Yang, Q., Fadjrimiratno, M.F., & et al. (2020). Detecting anomalous regions from an image based on deep captioning. In International joint conference on computer vision, imaging and computer graphics theory and applications, VISIGRAPP, Subvolume for VISAPP\u00a0(Vol. 5 pp. 326\u2013335). https:\/\/doi.org\/10.5220\/0008949603260335","DOI":"10.5220\/0008949603260335"},{"key":"722_CR16","doi-asserted-by":"publisher","unstructured":"Johnson, J., Karpathy, A., & Fei-Fei, L. (2016). Densecap: Fully convolutional localization networks for dense captioning. In Conference on computer vision and pattern recognition, CVPR\u00a0(pp. 4565\u20134574). https:\/\/doi.org\/10.1109\/CVPR.2016.494","DOI":"10.1109\/CVPR.2016.494"},{"key":"722_CR17","volume-title":"Thinking, fast and slow","author":"D Kahneman","year":"2011","unstructured":"Kahneman, D. (2011). Thinking, fast and slow. New York: Macmillan."},{"key":"722_CR18","doi-asserted-by":"publisher","unstructured":"Kimura, D., Chaudhury, S., Narita, M., & et al. (2020). Adversarial discriminative attention for robust anomaly detection. In Winter conference on applications of computer vision, WACV\u00a0(pp. 2172\u20132181). https:\/\/doi.org\/10.1109\/WACV45572.2020.9093428","DOI":"10.1109\/WACV45572.2020.9093428"},{"key":"722_CR19","unstructured":"Kingma, D. P., & Ba, J. (2015). Adam: A method for stochastic optimization. In International conference on learning representations, ICLR."},{"issue":"1","key":"722_CR20","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/s11263-016-0981-7","volume":"123","author":"R Krishna","year":"2017","unstructured":"Krishna, R., Zhu, Y., Groth, O., & et al. (2017). Visual Genome: Connecting language and vision using crowdsourced dense image annotations. International Journal of Computer Vision, 123(1), 32\u201373. https:\/\/doi.org\/10.1007\/s11263-016-0981-7.","journal-title":"International Journal of Computer Vision"},{"key":"722_CR21","doi-asserted-by":"publisher","unstructured":"Lawson, W., Bekele, E., & Sullivan, K. (2017). Finding anomalies with generative adversarial networks for a Patrolbot. In Conference on computer vision and pattern recognition, CVPR Workshops\u00a0(pp. 12\u201313). https:\/\/doi.org\/10.1109\/CVPRW.2017.68","DOI":"10.1109\/CVPRW.2017.68"},{"key":"722_CR22","doi-asserted-by":"crossref","unstructured":"Li, C.-L., Sohn, K., Yoon, J., & et al. (2021). CutPaste: Self-supervised learning for anomaly detection and localization. In Conference on computer vision and pattern recognition, CVPR (pp. 9664\u20139674).","DOI":"10.1109\/CVPR46437.2021.00954"},{"key":"722_CR23","doi-asserted-by":"publisher","unstructured":"Liu, H., & Hoeber, O. (2011). A Luhn-inspired vector re-weighting approach for improving personalized web search. In International conferences on web intelligence and intelligent agent technology\u00a0(pp. 301\u2013305). https:\/\/doi.org\/10.1109\/WI-IAT.2011.130","DOI":"10.1109\/WI-IAT.2011.130"},{"key":"722_CR24","doi-asserted-by":"publisher","unstructured":"Liu, Z., Nie, Y., Long, C., & et al. (2021). A hybrid video anomaly detection framework via memory-augmented flow reconstruction and flow-guided frame prediction. In International conference on computer vision, ICCV\u00a0(pp. 13588\u201313597). https:\/\/doi.org\/10.1109\/ICCV48922.2021.01333","DOI":"10.1109\/ICCV48922.2021.01333"},{"key":"722_CR25","doi-asserted-by":"publisher","unstructured":"Liu, G., Reda, F.A., Shih, K.J., & et al. (2018). Image inpainting for irregular holes using partial convolutions. In European conference on computer vision, ECCV\u00a0(pp. 85\u2013100). https:\/\/doi.org\/10.1007\/978-3-030-01252-6_6","DOI":"10.1007\/978-3-030-01252-6_6"},{"issue":"12","key":"722_CR26","doi-asserted-by":"publisher","first-page":"7389","DOI":"10.1002\/int.22591","volume":"36","author":"G Liu","year":"2021","unstructured":"Liu, G., Zhang, Q., Cao, Y., & et al. (2021). Online human action recognition with spatial and temporal skeleton features using a distributed camera network. International Journal of Intelligent Systems, 36(12), 7389\u20137411. https:\/\/doi.org\/10.1002\/int.22591.","journal-title":"International Journal of Intelligent Systems"},{"key":"722_CR27","unstructured":"Miyato, T., Kataoka, T., Koyama, M., & et al. (2018). Spectral normalization for generative adversarial networks. In International conference on learning representations, ICLR."},{"key":"722_CR28","doi-asserted-by":"publisher","unstructured":"Nguyen, B., Feldman, A., Bethapudi, S., & et al. (2021). Unsupervised region-based anomaly detection in brain MRI with adversarial image inpainting. In International symposium on biomedical imaging, ISBI\u00a0(pp. 1127\u20131131). https:\/\/doi.org\/10.1109\/ISBI48211.2021.9434115","DOI":"10.1109\/ISBI48211.2021.9434115"},{"key":"722_CR29","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.patrec.2017.08.003","volume":"98","author":"J Oh","year":"2017","unstructured":"Oh, J., Kim, H.-I., & Park, R.-H. (2017). Context-based abnormal object detection using the fully-connected conditional random fields. Pattern Recognition Letters, 98, 16\u201325. https:\/\/doi.org\/10.1016\/j.patrec.2017.08.003.","journal-title":"Pattern Recognition Letters"},{"issue":"2","key":"722_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439950","volume":"54","author":"G Pang","year":"2021","unstructured":"Pang, G., Shen, C., Cao, L., & et al. (2021). Deep learning for anomaly detection: A review. ACM Computing Surveys, 54(2), 1\u201338. https:\/\/doi.org\/10.1145\/3439950.","journal-title":"ACM Computing Surveys"},{"key":"722_CR31","doi-asserted-by":"publisher","unstructured":"Pathak, D., Krahenbuhl, P., Donahue, J., & et al. (2016). Context encoders: Feature learning by inpainting. In Conference on computer vision and pattern recognition, CVPR\u00a0(pp. 2536\u20132544). https:\/\/doi.org\/10.1109\/CVPR.2016.278","DOI":"10.1109\/CVPR.2016.278"},{"key":"722_CR32","doi-asserted-by":"publisher","unstructured":"Ravanbakhsh, M., Nabi, M., Sangineto, E., & et al. (2017). Abnormal event detection in videos using generative adversarial nets. In International conference on image processing, ICIP\u00a0(pp. 1577\u20131581). https:\/\/doi.org\/10.1109\/ICIP.2017.8296547","DOI":"10.1109\/ICIP.2017.8296547"},{"key":"722_CR33","doi-asserted-by":"publisher","unstructured":"Ravanbakhsh, M., Sangineto, E., Nabi, M., & et al. (2019). Training adversarial discriminators for cross-channel abnormal event detection in crowds. In IEEE winter conference on applications of computer vision, WACV\u00a0(pp. 1896\u20131904). https:\/\/doi.org\/10.1109\/WACV.2019.00206","DOI":"10.1109\/WACV.2019.00206"},{"key":"722_CR34","doi-asserted-by":"publisher","unstructured":"Sabokrou, M., Khalooei, M., Fathy, M., & et al. (2018). Adversarially learned one-class classifier for novelty detection. In Conference on computer vision and pattern recognition, CVPR\u00a0(pp. 3379\u20133388). https:\/\/doi.org\/10.1109\/CVPR.2018.00356","DOI":"10.1109\/CVPR.2018.00356"},{"key":"722_CR35","doi-asserted-by":"publisher","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S.M., & et al. (2017). Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In Information processing in medical imaging, IPMI\u00a0(pp. 146\u2013157). https:\/\/doi.org\/10.1007\/978-3-319-59050-9_12","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"722_CR36","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.media.2019.01.010","volume":"54","author":"T Schlegl","year":"2019","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S.M., & et al. (2019). F-AnoGAN: Fast unsupervised anomaly detection with generative adversarial networks. Medical Image Analysis, 54, 30\u201344. https:\/\/doi.org\/10.1016\/j.media.2019.01.010.","journal-title":"Medical Image Analysis"},{"key":"722_CR37","doi-asserted-by":"publisher","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., & et al (2017). Grad-Cam: Visual explanations from deep networks via gradient-based localization. In International conference on computer vision, ICCV\u00a0(pp. 618\u2013626). https:\/\/doi.org\/10.1109\/ICCV.2017.74","DOI":"10.1109\/ICCV.2017.74"},{"key":"722_CR38","unstructured":"Simonyan, K., & Zisserman, A. (2015). Very deep convolutional networks for large-scale image recognition. In International conference on learning representations, ICLR."},{"issue":"13","key":"722_CR39","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1016\/j.patrec.2005.03.015","volume":"26","author":"M Singh","year":"2005","unstructured":"Singh, M., Mandal, M.K., & Basu, A. (2005). Gaussian and Laplacian of gaussian weighting functions for robust feature based tracking. Pattern Recognition Letters, 26(13), 1995\u20132005. https:\/\/doi.org\/10.1016\/j.patrec.2005.03.015.","journal-title":"Pattern Recognition Letters"},{"key":"722_CR40","doi-asserted-by":"publisher","unstructured":"Sultani, W., Chen, C., & Shah, M. (2018). Real-world anomaly detection in surveillance videos. In Conference on computer vision and pattern recognition, CVPR\u00a0(pp. 6479\u20136488). https:\/\/doi.org\/10.1109\/CVPR.2018.00678","DOI":"10.1109\/CVPR.2018.00678"},{"issue":"4","key":"722_CR41","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., & et al. (2004). Image quality assessment: From error visibility to structural similarity. IEEE Transactions on Image Processing, 13(4), 600\u2013612. https:\/\/doi.org\/10.1109\/TIP.2003.819861.","journal-title":"IEEE Transactions on Image Processing"},{"key":"722_CR42","doi-asserted-by":"publisher","unstructured":"Xie, C., Liu, S., Li, C., & et al. (2019). Image inpainting with learnable bidirectional attention maps. In International conference on computer vision, ICCV\u00a0(pp. 8858\u20138867). https:\/\/doi.org\/10.1109\/ICCV.2019.00895","DOI":"10.1109\/ICCV.2019.00895"},{"key":"722_CR43","doi-asserted-by":"publisher","unstructured":"Yu, J., Lin, Z., Yang, J., & et al. (2018). Generative image inpainting with contextual attention. In Conference on computer vision and pattern recognition, CVPR\u00a0(pp. 5505\u20135514). https:\/\/doi.org\/10.1109\/CVPR.2018.00577","DOI":"10.1109\/CVPR.2018.00577"},{"key":"722_CR44","doi-asserted-by":"publisher","unstructured":"Yu, J., Lin, Z., Yang, J., & et al. (2019). Free-form image inpainting with gated convolution. In International conference on computer vision, ICCV\u00a0(pp. 4471\u20134480). https:\/\/doi.org\/10.1109\/ICCV.2019.00457","DOI":"10.1109\/ICCV.2019.00457"},{"key":"722_CR45","doi-asserted-by":"publisher","unstructured":"Zaheer, M. Z., Lee, J.-H., Astrid, M., & et al. (2020). Old is Gold: Redefining the adversarially learned one-class classifier training paradigm. In Conference on computer vision and pattern recognition, CVP\u00a0(pp. 14183\u201314193). https:\/\/doi.org\/10.1109\/CVPR42600.2020.01419","DOI":"10.1109\/CVPR42600.2020.01419"},{"key":"722_CR46","doi-asserted-by":"publisher","unstructured":"Zavrtanik, V., Kristan, M., & Sko\u010daj, D. (2021). Reconstruction by inpainting for visual anomaly detection. Pattern Recognition, 112(107706). https:\/\/doi.org\/10.1016\/j.patcog.2020.107706.","DOI":"10.1016\/j.patcog.2020.107706"},{"issue":"6","key":"722_CR47","doi-asserted-by":"publisher","first-page":"1810","DOI":"10.1007\/s11263-020-01301-6","volume":"128","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y., Bai, Y., Ding, M., & et al. (2020). Multi-task generative adversarial network for detecting small objects in the wild. International Journal of Computer Vision, 128(6), 1810\u20131828. https:\/\/doi.org\/10.1007\/s11263-020-01301-6.","journal-title":"International Journal of Computer Vision"},{"key":"722_CR48","doi-asserted-by":"publisher","unstructured":"Zhang, K., Fadjrimiratno, M.F., & Suzuki, E. (2021). Context-based anomaly detection via spatial attributed graphs in human monitoring. In International conference on neural information processing, ICONIP\u00a0(pp. 450\u2013463). https:\/\/doi.org\/10.1007\/978-3-030-92185-9_37","DOI":"10.1007\/978-3-030-92185-9_37"},{"issue":"2","key":"722_CR49","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/235968.233324","volume":"25","author":"T Zhang","year":"1996","unstructured":"Zhang, T., Ramakrishnan, R., & Livny, M. (1996). BIRCH: An efficient data clustering method for very large databases. ACM Sigmod Record, 25(2), 103\u2013114. https:\/\/doi.org\/10.1145\/233269.233324.","journal-title":"ACM Sigmod Record"},{"key":"722_CR50","doi-asserted-by":"publisher","unstructured":"Zhang, M., Tseng, C., & Kreiman, G. (2020). Putting visual object recognition in context. In Conference on computer vision and pattern recognition, CVPR\u00a0(pp. 12985\u201312994). https:\/\/doi.org\/10.1109\/CVPR42600.2020.01300","DOI":"10.1109\/CVPR42600.2020.01300"},{"issue":"1","key":"722_CR51","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/TCI.2016.2644865","volume":"3","author":"H Zhao","year":"2017","unstructured":"Zhao, H., Gallo, O., Frosio, I., & et al. (2017). Loss functions for image restoration with neural networks. IEEE IEEE Transactions on Computational Imaging, 3(1), 47\u201357. https:\/\/doi.org\/10.1109\/TCI.2016.2644865.","journal-title":"IEEE IEEE Transactions on Computational Imaging"}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-022-00722-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10844-022-00722-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-022-00722-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T02:12:57Z","timestamp":1668737577000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10844-022-00722-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,30]]},"references-count":51,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["722"],"URL":"https:\/\/doi.org\/10.1007\/s10844-022-00722-8","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"type":"print","value":"0925-9902"},{"type":"electronic","value":"1573-7675"}],"subject":[],"published":{"date-parts":[[2022,6,30]]},"assertion":[{"value":"17 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 June 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No known competing financial interests or personal relationships have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}