{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T21:18:52Z","timestamp":1773263932734,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["H2020-956573"],"award-info":[{"award-number":["H2020-956573"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Intell Manuf"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10845-024-02415-1","type":"journal-article","created":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T22:01:27Z","timestamp":1716847287000},"page":"3527-3541","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Enhancing robustness to novel visual defects through StyleGAN latent space navigation: a manufacturing use case"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-3491-5682","authenticated-orcid":false,"given":"Spyros","family":"Theodoropoulos","sequence":"first","affiliation":[]},{"given":"Dimitrios","family":"Dardanis","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Makridis","sequence":"additional","affiliation":[]},{"given":"Patrik","family":"Zajec","sequence":"additional","affiliation":[]},{"given":"Jo\u017ee M.","family":"Ro\u017eanec","sequence":"additional","affiliation":[]},{"given":"Dimosthenis","family":"Kyriazis","sequence":"additional","affiliation":[]},{"given":"Panayiotis","family":"Tsanakas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,27]]},"reference":[{"key":"2415_CR1","doi-asserted-by":"publisher","unstructured":"Abdal, R., Qin, Y., & Wonka, P. (2019). Image2stylegan: How to embed images into the stylegan latent space? In 2019 IEEE\/CVF International Conference on Computer Vision, ICCV 2019, Seoul, Korea (South), October 27 - November 2, 2019, pp. 4431\u20134440. https:\/\/doi.org\/10.1109\/ICCV.2019.00453","DOI":"10.1109\/ICCV.2019.00453"},{"key":"2415_CR2","doi-asserted-by":"publisher","DOI":"10.1145\/3447648","author":"R Abdal","year":"2021","unstructured":"Abdal, R., Zhu, P., Mitra, N. J., & Wonka, P. (2021). Styleflow: Attribute-conditioned exploration of stylegan-generated images using conditional continuous normalizing flows. ACM Transactions on Graphics. https:\/\/doi.org\/10.1145\/3447648","journal-title":"ACM Transactions on Graphics"},{"key":"2415_CR3","doi-asserted-by":"publisher","unstructured":"Ahuja, N.A., Ndiour, I., Kalyanpur, T., & Tickoo, O. (2019). Probabilistic Modeling of Deep Features for Out-of-Distribution and Adversarial Detection. https:\/\/doi.org\/10.48550\/ARXIV.1909.11786. arXiv: 1909.11786","DOI":"10.48550\/ARXIV.1909.11786"},{"key":"2415_CR4","doi-asserted-by":"crossref","unstructured":"Akcay, S., Ameln, D., Vaidya, A., Lakshmanan, B., Ahuja, N., & Genc, U. (2022). Anomalib: A Deep Learning Library for Anomaly Detection.","DOI":"10.1109\/ICIP46576.2022.9897283"},{"key":"2415_CR5","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1007\/978-3-030-20893-6_39","volume-title":"Computer Vision - ACCV 2018","author":"S Akcay","year":"2019","unstructured":"Akcay, S., Atapour-Abarghouei, A., & Breckon, T. P. (2019). Ganomaly: Semi-supervised anomaly detection via adversarial training. In C. V. Jawahar, H. Li, G. Mori, & K. Schindler (Eds.), Computer Vision - ACCV 2018 (pp. 622\u2013637). Cham: Springer."},{"key":"2415_CR6","doi-asserted-by":"crossref","unstructured":"Araujo, A., Norris, W.D., & Sim, J. (2019). Computing receptive fields of convolutional neural networks. Distill","DOI":"10.23915\/distill.00021"},{"key":"2415_CR7","doi-asserted-by":"publisher","unstructured":"Babic, M., Farahani, M. A., & Wuest, T. (2021). Image based quality inspection in smart manufacturing systems: A literature review. Procedia CIRP, 103, 262\u2013267. https:\/\/doi.org\/10.1016\/j.procir.2021.10.042. 9th CIRP Global Web Conference on Sustainable, resilient, and agile manufacturing and service operations : Lessons from COVID-19.","DOI":"10.1016\/j.procir.2021.10.042"},{"key":"2415_CR8","doi-asserted-by":"publisher","unstructured":"Bendale, A., Boult, T.E. (2016). Towards open set deep networks. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1563\u20131572. IEEE Computer Society, Los Alamitos, CA, USA. https:\/\/doi.org\/10.1109\/CVPR.2016.173","DOI":"10.1109\/CVPR.2016.173"},{"issue":"2","key":"2415_CR9","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/335191.335388","volume":"29","author":"MM Breunig","year":"2000","unstructured":"Breunig, M. M., Kriegel, H.-P., Ng, R. T., & Sander, J. (2000). Lof: Identifying density-based local outliers. SIGMOD Record, 29(2), 93\u2013104. https:\/\/doi.org\/10.1145\/335191.335388","journal-title":"SIGMOD Record"},{"key":"2415_CR10","unstructured":"Brock, A., Donahue, J., & Simonyan, K. (2019). Large scale GAN training for high fidelity natural image synthesis. In 7th International Conference on Learning Representations, ICLR 2019, New Orleans, LA, USA, May 6\u20139."},{"key":"2415_CR11","doi-asserted-by":"publisher","unstructured":"Castillo, E. (1988). Extreme value theory in engineering. In Castillo, E. (ed.) Extreme Value Theory in Engineering, pp. 183\u2013209. Academic Press, San Diego. https:\/\/doi.org\/10.1016\/B978-0-08-091725-2.50010-5","DOI":"10.1016\/B978-0-08-091725-2.50010-5"},{"key":"2415_CR12","first-page":"3670","volume":"2021","author":"AV Cherepkov","year":"2020","unstructured":"Cherepkov, A. V., Voynov, A., & Babenko, A. (2020). Navigating the gan parameter space for semantic image editing. IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2021, 3670\u20133679.","journal-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"2415_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2020.101105","volume":"45","author":"JK Chow","year":"2020","unstructured":"Chow, J. K., Su, Z., Wu, J., Tan, P. S., Mao, X., & Wang, Y. H. (2020). Anomaly detection of defects on concrete structures with the convolutional autoencoder. Advanced Engineering Informatics, 45, 101105. https:\/\/doi.org\/10.1016\/j.aei.2020.101105","journal-title":"Advanced Engineering Informatics"},{"key":"2415_CR14","doi-asserted-by":"publisher","unstructured":"Cruz, S., Coleman, C., Rudd, E.M., & Boult, T.E. (2017). Open set intrusion recognition for fine-grained attack categorization. In 2017 IEEE International Symposium on Technologies for Homeland Security (HST), pp. 1\u20136. https:\/\/doi.org\/10.1109\/THS.2017.7943467","DOI":"10.1109\/THS.2017.7943467"},{"issue":"3","key":"2415_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1609\/aimag.v38i3.2756","volume":"38","author":"TG Dietterich","year":"2017","unstructured":"Dietterich, T. G. (2017). Steps toward robust artificial intelligence. AI Magazine, 38(3), 3\u201324. https:\/\/doi.org\/10.1609\/aimag.v38i3.2756","journal-title":"AI Magazine"},{"key":"2415_CR16","doi-asserted-by":"crossref","unstructured":"Ditria, L., Meyer, B.J., & Drummond, T. (2020). Opengan: Open set generative adversarial networks. In ACCV.","DOI":"10.1007\/978-3-030-69538-5_29"},{"key":"2415_CR17","doi-asserted-by":"publisher","first-page":"3614","DOI":"10.1109\/TPAMI.2020.2981604","volume":"43","author":"C Geng","year":"2021","unstructured":"Geng, C., Huang, S.-J., & Chen, S. (2021). Recent advances in open set recognition: A survey. IEEE Transactions on Pattern Analysis and Machine Intelligence, 43, 3614\u20133631.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"2415_CR18","unstructured":"H\u00e4rk\u00f6nen, E., Hertzmann, A., Lehtinen, J., & Paris, S. (2020). Ganspace: Discovering interpretable gan controls. In Proceedings of the 34th International Conference on Neural Information Processing Systems. NIPS\u201920. Curran Associates Inc., Red Hook, NY, USA"},{"key":"2415_CR19","doi-asserted-by":"publisher","unstructured":"Huang, X., & Belongie, S. (2017). Arbitrary style transfer in real-time with adaptive instance normalization. In 2017 IEEE International Conference on Computer Vision (ICCV), pp. 1510\u20131519. IEEE Computer Society, Los Alamitos, CA, USA. https:\/\/doi.org\/10.1109\/ICCV.2017.167","DOI":"10.1109\/ICCV.2017.167"},{"key":"2415_CR20","unstructured":"Jahanian, A., Chai, L., & Isola, P. (2020). On the \u201csteerability\u201d of generative adversarial networks. In 8th International Conference on Learning Representations, ICLR 2020, Addis Ababa, Ethiopia, April 26\u201330."},{"key":"2415_CR21","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-319-10578-9_26","volume-title":"Computer Vision - ECCV 2014","author":"LP Jain","year":"2014","unstructured":"Jain, L. P., Scheirer, W. J., & Boult, T. E. (2014). Multi-class open set recognition using probability of inclusion. In D. Fleet, T. Pajdla, B. Schiele, & T. Tuytelaars (Eds.), Computer Vision - ECCV 2014 (pp. 393\u2013409). Cham: Springer."},{"issue":"4","key":"2415_CR22","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1109\/TSM.2020.3012183","volume":"33","author":"J Jang","year":"2020","unstructured":"Jang, J., Seo, M., & Kim, C. O. (2020). Support weighted ensemble model for open set recognition of wafer map defects. IEEE Transactions on Semiconductor Manufacturing, 33(4), 635-643. https:\/\/doi.org\/10.1109\/TSM.2020.3012183","journal-title":"IEEE Transactions on Semiconductor Manufacturing"},{"issue":"8","key":"2415_CR23","doi-asserted-by":"publisher","first-page":"2679","DOI":"10.1109\/TIM.2018.2868490","volume":"68","author":"G Kang","year":"2019","unstructured":"Kang, G., Gao, S., Yu, L., & Zhang, D. (2019). Deep architecture for high-speed railway insulator surface defect detection: Denoising autoencoder with multitask learning. IEEE Transactions on Instrumentation and Measurement, 68(8), 2679\u20132690. https:\/\/doi.org\/10.1109\/TIM.2018.2868490","journal-title":"IEEE Transactions on Instrumentation and Measurement"},{"key":"2415_CR24","unstructured":"Karras, T., Aila, T., Laine, S., & Lehtinen, J. (2017). Progressive growing of gans for improved quality, stability, and variation. arxiv:abs\/1710.10196."},{"key":"2415_CR25","unstructured":"Karras, T., Aittala, M., Laine, S., H\u00e4rk\u00f6nen, E., Hellsten, J., Lehtinen, J., & Aila, T. (2021). Alias-free generative adversarial networks. In Proc. NeurIPS"},{"issue":"12","key":"2415_CR26","doi-asserted-by":"publisher","first-page":"4217","DOI":"10.1109\/TPAMI.2020.2970919","volume":"43","author":"T Karras","year":"2021","unstructured":"Karras, T., Laine, S., & Aila, T. (2021). A style-based generator architecture for generative adversarial networks. IEEE Trans. Pattern Anal. Mach. Intell., 43(12), 4217\u20134228. https:\/\/doi.org\/10.1109\/TPAMI.2020.2970919","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2415_CR27","doi-asserted-by":"publisher","unstructured":"Liu, F.T., Ting, K.M., & Zhou, Z.-H. (2008). Isolation forest. In 2008 Eighth IEEE International Conference on Data Mining, pp. 413\u2013422. https:\/\/doi.org\/10.1109\/ICDM.2008.17","DOI":"10.1109\/ICDM.2008.17"},{"key":"2415_CR28","doi-asserted-by":"crossref","unstructured":"Neal, L., Olson, M., Fern, X., Wong, W.-K., & Li, F. (2018). Open set learning with counterfactual images. In Proceedings of the European Conference on Computer Vision (ECCV).","DOI":"10.1007\/978-3-030-01231-1_38"},{"issue":"3","key":"2415_CR29","doi-asserted-by":"publisher","first-page":"24","DOI":"10.3390\/fi10030024","volume":"10","author":"V Pilloni","year":"2018","unstructured":"Pilloni, V. (2018). How data will transform industrial processes: Crowdsensing, crowdsourcing and big data as pillars of industry 4.0. Future Internet, 10(3), 24. https:\/\/doi.org\/10.3390\/fi10030024","journal-title":"Future Internet"},{"issue":"11","key":"2415_CR30","doi-asserted-by":"publisher","first-page":"2447","DOI":"10.1109\/TIFS.2015.2464772","volume":"10","author":"A Rattani","year":"2015","unstructured":"Rattani, A., Scheirer, W. J., & Ross, A. (2015). Open set fingerprint spoof detection across novel fabrication materials. IEEE Transactions on Information Forensics and Security, 10(11), 2447\u20132460. https:\/\/doi.org\/10.1109\/TIFS.2015.2464772","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2415_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-023-02098-0","author":"JM Rozanec","year":"2023","unstructured":"Rozanec, J. M., Bizjak, L., Trajkova, E., Zajec, P., Keizer, J., Fortuna, B., & Mladenic, D. (2023). Active learning and novel model calibration measurements for automated visual inspection in manufacturing. Journal of Intelligent Manufacturing. https:\/\/doi.org\/10.1007\/s10845-023-02098-0","journal-title":"Journal of Intelligent Manufacturing"},{"key":"2415_CR32","doi-asserted-by":"crossref","unstructured":"Rozsa, A., G\u00fcnther, M., Boult, T.E. (2017). Adversarial robustness: Softmax versus openmax. arXiv:abs\/1708.01697.","DOI":"10.5244\/C.31.156"},{"issue":"11","key":"2415_CR33","doi-asserted-by":"publisher","first-page":"2317","DOI":"10.1109\/TPAMI.2014.2321392","volume":"36","author":"WJ Scheirer","year":"2014","unstructured":"Scheirer, W. J., Jain, L. P., & Boult, T. E. (2014). Probability models for open set recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 36(11), 2317\u20132324. https:\/\/doi.org\/10.1109\/TPAMI.2014.2321392","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"2415_CR34","doi-asserted-by":"publisher","unstructured":"Scheirer, W. J., de Rezende Rocha, A., Sapkota, A., & Boult, T. E. (2013). Toward open set recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 35(7), 1757\u20131772. https:\/\/doi.org\/10.1109\/TPAMI.2012.256","DOI":"10.1109\/TPAMI.2012.256"},{"key":"2415_CR35","unstructured":"Scholkopf, B., Williamson, R.C., Smola, A., Shawe-Taylor, J., & Platt, J.C. (1999). Support vector method for novelty detection. In Neural Information Processing Systems."},{"key":"2415_CR36","doi-asserted-by":"publisher","unstructured":"Shen, Y., & Zhou, B. (2021). Closed-form factorization of latent semantics in gans. In 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1532\u20131540. IEEE Computer Society, Los Alamitos, CA, USA. https:\/\/doi.org\/10.1109\/CVPR46437.2021.00158","DOI":"10.1109\/CVPR46437.2021.00158"},{"key":"2415_CR37","doi-asserted-by":"publisher","unstructured":"Tao, X., Gong, X., Zhang, X., Yan, S., & Adak, C. (2022). Deep learning for unsupervised anomaly localization in industrial images: A survey. IEEE Transactions on Instrumentation and Measurement, 71, 1\u201321. https:\/\/doi.org\/10.1109\/TIM.2022.3196436","DOI":"10.1109\/TIM.2022.3196436"},{"key":"2415_CR38","doi-asserted-by":"publisher","unstructured":"Tercan, H., & Meisen, T. (2022). Machine learning and deep learning based predictive quality in manufacturing: a systematic review. Journal of Intelligent Manufacturing, 33(7), 1879\u20131905. https:\/\/doi.org\/10.1007\/s10845-022-01963-8","DOI":"10.1007\/s10845-022-01963-8"},{"issue":"2","key":"2415_CR39","doi-asserted-by":"publisher","first-page":"3738","DOI":"10.1016\/j.ifacol.2023.10.1542","volume":"56","author":"S Theodoropoulos","year":"2023","unstructured":"Theodoropoulos, S., Zajec, P., Rozanec, J. M., Dardanis, D., Makridis, G., Kyriazis, D., & Tsanakas, P. (2023). Identifying novel defects during ai-driven visual quality inspection. IFAC-PapersOnLine, 56(2), 3738\u20133743. https:\/\/doi.org\/10.1016\/j.ifacol.2023.10.1542. 22nd IFAC World Congress.","journal-title":"IFAC-PapersOnLine"},{"key":"2415_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106878","volume":"218","author":"ME Villa-Perez","year":"2021","unstructured":"Villa-Perez, M. E., Alvarez-Carmona, M. A., Loyola-Gonzalez, O., Medina-Perez, M. A., Velazco-Rossell, J. C., & Choo, K.-K.R. (2021). Semi-supervised anomaly detection algorithms: A comparative summary and future research directions. Knowledge-Based Systems, 218, 106878. https:\/\/doi.org\/10.1016\/j.knosys.2021.106878","journal-title":"Knowledge-Based Systems"},{"key":"2415_CR41","first-page":"12858","volume":"2021","author":"Z Wu","year":"2020","unstructured":"Wu, Z., Lischinski, D., & Shechtman, E. (2020). Stylespace analysis: Disentangled controls for stylegan image generation. IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2021, 12858\u201312867.","journal-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"2415_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TPAMI.2022.3181070","volume":"01","author":"W Xia","year":"2023","unstructured":"Xia, W., Zhang, Y., Yang, Y., Xue, J., Zhou, B., & Yang, M. (2023). Gan inversion: A survey. IEEE Transactions on Pattern Analysis & Machine Intelligence, 01, 1\u201317. https:\/\/doi.org\/10.1109\/TPAMI.2022.3181070","journal-title":"IEEE Transactions on Pattern Analysis & Machine Intelligence"},{"key":"2415_CR43","doi-asserted-by":"publisher","unstructured":"Youkachen, S., Ruchanurucks, M., Phatrapomnant, T., & Kaneko, H. (2019). Defect segmentation of hot-rolled steel strip surface by using convolutional auto-encoder and conventional image processing. In 2019 10th International Conference of Information and Communication Technology for Embedded Systems (IC-ICTES), pp. 1\u20135. https:\/\/doi.org\/10.1109\/ICTEmSys.2019.8695928","DOI":"10.1109\/ICTEmSys.2019.8695928"},{"key":"2415_CR44","doi-asserted-by":"crossref","unstructured":"Yu, Y., Qu, W.-Y., Li, N., & Guo, Z. (2017). Open-category classification by adversarial sample generation. IJCAI\u201917, pp. 3357\u20133363","DOI":"10.24963\/ijcai.2017\/469"},{"issue":"4","key":"2415_CR45","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1109\/TPAMI.2017.2700460","volume":"40","author":"S Zhang","year":"2018","unstructured":"Zhang, S., Benenson, R., Omran, M., Hosang, J., & Schiele, B. (2018). Towards reaching human performance in pedestrian detection. IEEE Transactions on Pattern Analysis and Machine Intelligence, 40(4), 973\u2013986. https:\/\/doi.org\/10.1109\/TPAMI.2017.2700460","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"2415_CR46","unstructured":"Zhu, P., Abdal, R., Qin, Y., & Wonka, P. (2020). Improved stylegan embedding: Where are the good latents? arXiv:abs\/2012.09036"},{"key":"2415_CR47","unstructured":"Zhuang, P., Koyejo, O., & Schwing, A.G. (2021). Enjoy your editing: Controllable gans for image editing via latent space navigation. arXiv:abs\/2102.01187"},{"key":"2415_CR48","doi-asserted-by":"publisher","unstructured":"Zongyuan\u00a0Ge, S.D., & Garnavi, R. (2017). Generative openmax for multi-class open set classification. In Kim, T.-K., Stefanos\u00a0Zafeiriou, G.B., Mikolajczyk, K. (eds.) Proceedings of the British Machine Vision Conference (BMVC), pp. 42\u201314212. BMVA Press. https:\/\/doi.org\/10.5244\/C.31.42","DOI":"10.5244\/C.31.42"}],"container-title":["Journal of Intelligent Manufacturing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10845-024-02415-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10845-024-02415-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10845-024-02415-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T20:51:09Z","timestamp":1747687869000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10845-024-02415-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":48,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["2415"],"URL":"https:\/\/doi.org\/10.1007\/s10845-024-02415-1","relation":{},"ISSN":["0956-5515","1572-8145"],"issn-type":[{"value":"0956-5515","type":"print"},{"value":"1572-8145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,27]]},"assertion":[{"value":"22 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 April 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All authors who participated in this study give the publisher the permission to publish this work.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}