{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T19:39:19Z","timestamp":1775677159576,"version":"3.50.1"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T00:00:00Z","timestamp":1736985600000},"content-version":"vor","delay-in-days":15,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"NUDT Research Project","award":["ZK22-56"],"award-info":[{"award-number":["ZK22-56"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62201600"],"award-info":[{"award-number":["62201600"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NUDT Innovation Science Foundation","award":["23-ZZCX-JDZ-08"],"award-info":[{"award-number":["23-ZZCX-JDZ-08"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mach Learn"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s10994-024-06706-9","type":"journal-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T16:18:00Z","timestamp":1737044280000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["SPA: A poisoning attack framework for graph neural networks through searching and pairing"],"prefix":"10.1007","volume":"114","author":[{"given":"Xiao","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jun-Jie","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Wentao","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Ziyue","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zihan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,16]]},"reference":[{"key":"6706_CR1","doi-asserted-by":"crossref","unstructured":"Adamic, L.A., Glance, N. (2005). The political blogosphere and the 2004 us election: Divided they blog. In: Proceedings of the 3rd International Workshop on Link Discovery, pp. 36\u201343.","DOI":"10.1145\/1134271.1134277"},{"key":"6706_CR2","unstructured":"Baltrunas, L., Church, K., Karatzoglou, A., Oliver, N. (2015). Frappe: Understanding the usage and perception of mobile app recommendations in-the-wild. arXiv preprint arXiv:1505.03014."},{"key":"6706_CR3","unstructured":"Bojchevski, A., G\u00fcnnemann, S. (2017). Deep gaussian embedding of graphs: Unsupervised inductive learning via ranking. arXiv preprint arXiv:1707.03815."},{"key":"6706_CR4","doi-asserted-by":"crossref","unstructured":"Cai, L., Ji, S. (2020). A multi-scale approach for graph link prediction. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 3308\u20133315.","DOI":"10.1609\/aaai.v34i04.5731"},{"key":"6706_CR5","first-page":"4499","volume":"35","author":"H Chang","year":"2022","unstructured":"Chang, H., Rong, Y., Xu, T., Huang, W., Zhang, H., Cui, P., Wang, X., Zhu, W., & Huang, J. (2022). Adversarial attack framework on graph embedding models with limited knowledge. IEEE Transactions on Knowledge and Data Engineering, 35, 4499.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"6706_CR6","doi-asserted-by":"crossref","unstructured":"Chen, Z., Wang, Z., Huang, J., Zhao, W., Liu, X., Guan, D. (2022). Imperceptible adversarial attack via invertible neural networks. arXiv preprint arXiv:2211.15030.","DOI":"10.1609\/aaai.v37i1.25115"},{"key":"6706_CR7","unstructured":"Chen, J., Wu, Y., Xu, X., Chen, Y., Zheng, H., Xuan, Q. (2018). Fast gradient attack on network embedding. arXiv preprint arXiv:1809.02797."},{"issue":"3","key":"6706_CR8","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/TCSS.2019.2912801","volume":"6","author":"J Chen","year":"2019","unstructured":"Chen, J., Chen, L., Chen, Y., Zhao, M., Yu, S., Xuan, Q., & Yang, X. (2019). Ga-based q-attack on community detection. IEEE Transactions on Computational Social Systems, 6(3), 491\u2013503.","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"6706_CR9","doi-asserted-by":"crossref","unstructured":"Collins, C.M., Sayeed, H., Darling, G., Claridge, J.B., Sparks, T.D., Rosseinsky, M.J. (2024). Integration of generative machine learning with the heuristic crystal structure prediction code fuse. Faraday Discussions.","DOI":"10.26434\/chemrxiv-2023-5b1ch"},{"key":"6706_CR10","unstructured":"Colorni, A., Dorigo, M., Maniezzo, V., et\u00a0al. (1991). Distributed optimization by ant colonies. In: Proceedings of the First European Conference on Artificial Life, vol. 142, pp. 134\u2013142. Paris, France."},{"key":"6706_CR11","unstructured":"Dai, H., Li, H., Tian, T., Huang, X., Wang, L., Zhu, J., Song, L. (2018). Adversarial attack on graph structured data. In: International Conference on Machine Learning, pp. 1115\u20131124. PMLR."},{"issue":"4","key":"6706_CR12","doi-asserted-by":"publisher","first-page":"3321","DOI":"10.1007\/s11063-022-10764-2","volume":"54","author":"J Dai","year":"2022","unstructured":"Dai, J., Zhu, W., & Luo, X. (2022). A targeted universal attack on graph convolutional network by using fake nodes. Neural Processing Letters, 54(4), 3321\u20133337.","journal-title":"Neural Processing Letters"},{"key":"6706_CR13","doi-asserted-by":"publisher","DOI":"10.3390\/app10103559","author":"X Du","year":"2020","unstructured":"Du, X., Yu, J., Yi, Z., Li, S., Ma, J., Tan, Y., & Wu, Q. (2020). A hybrid adversarial attack for different application scenarios. Applied Sciences-Basel. https:\/\/doi.org\/10.3390\/app10103559","journal-title":"Applied Sciences-Basel"},{"key":"6706_CR14","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C. (2014). Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572."},{"key":"6706_CR16","unstructured":"Gosch, L., Geisler, S., Sturm, D., Charpentier, B., Z\u00fcgner, D., G\u00fcnnemann, S. (2024). Adversarial training for graph neural networks: Pitfalls, solutions, and new directions. Advances in Neural Information Processing Systems 36."},{"key":"6706_CR17","doi-asserted-by":"crossref","unstructured":"Haoxi, Z., Xiaobing, P. (2021). Fha: Fast heuristic attack against graph convolutional networks. In: International Conference on Discovery Science, pp. 151\u2013165. Springer.","DOI":"10.1007\/978-3-030-88942-5_12"},{"issue":"4","key":"6706_CR18","first-page":"1","volume":"5","author":"FM Harper","year":"2015","unstructured":"Harper, F. M., & Konstan, J. A. (2015). The movielens datasets: History and context. Acm Transactions on Interactive Intelligent Systems (tiis), 5(4), 1\u201319.","journal-title":"Acm Transactions on Interactive Intelligent Systems (tiis)"},{"key":"6706_CR19","unstructured":"Kipf, T.N., Welling, M. (2016). Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907."},{"key":"6706_CR20","doi-asserted-by":"crossref","unstructured":"Li, Y., Jin, W., Xu, H., Tang, J. (2021). Deeprobust: A pytorch library for adversarial attacks and defenses. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, pp. 16078\u201316080.","DOI":"10.1609\/aaai.v35i18.18017"},{"key":"6706_CR21","doi-asserted-by":"crossref","unstructured":"Li, Z., Wang, J., Meng, M.Q.-H. (2021). Efficient heuristic generation for robot path planning with recurrent generative model. In: 2021 IEEE International Conference on Robotics and Automation (ICRA), pp. 7386\u20137392. IEEE.","DOI":"10.1109\/ICRA48506.2021.9561472"},{"key":"6706_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109042","volume":"133","author":"X Lin","year":"2023","unstructured":"Lin, X., Zhou, C., Wu, J., Yang, H., Wang, H., Cao, Y., & Wang, B. (2023). Exploratory adversarial attacks on graph neural networks for semi-supervised node classification. Pattern Recognition, 133, 109042.","journal-title":"Pattern Recognition"},{"key":"6706_CR23","doi-asserted-by":"crossref","unstructured":"Liu, X., Huang, J.-J., Zhao, W. (2024). Gcia: A black-box graph injection attack method via graph contrastive learning. In: ICASSP 2024\u20132024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 6570\u20136574. 10.1109\/ICASSP48485.2024.10446876.","DOI":"10.1109\/ICASSP48485.2024.10446876"},{"key":"6706_CR24","doi-asserted-by":"crossref","unstructured":"Liu, Z., Luo, Y., Wu, L., Li, S., Liu, Z., Li, S.Z. (2022). Are gradients on graph structure reliable in gray-box attacks? In: Proceedings of the 31st ACM International Conference on Information & Knowledge Management, pp. 1360\u20131368.","DOI":"10.1145\/3511808.3557238"},{"key":"6706_CR25","unstructured":"Liu, Z., Luo, Y., Wu, L., Liu, Z., Li, S.Z. (2023). Towards reasonable budget allocation in untargeted graph structure attacks via gradient debias. arXiv preprint arXiv:2304.00010."},{"key":"6706_CR26","unstructured":"Liu, X., Si, S., Zhu, X., Li, Y., Hsieh, C.-J. (2019). A unified framework for data poisoning attack to graph-based semi-supervised learning. arXiv preprint arXiv:1910.14147."},{"key":"6706_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3315414","author":"H Liu","year":"2023","unstructured":"Liu, H., Ge, Z., Zhou, Z., Shang, F., Liu, Y., & Jiao, L. (2023). Gradient correction for white-box adversarial attacks. IEEE Transactions on Neural Networks and Learning Systems. https:\/\/doi.org\/10.1109\/TNNLS.2023.3315414","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"6706_CR28","doi-asserted-by":"crossref","unstructured":"Luo, C., Lin, Q., Xie, W., Wu, B., Xie, J., Shen, L. (2022). Frequency-driven imperceptible adversarial attack on semantic similarity. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 15315\u201315324.","DOI":"10.1109\/CVPR52688.2022.01488"},{"issue":"2","key":"6706_CR29","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1023\/A:1009953814988","volume":"3","author":"AK McCallum","year":"2000","unstructured":"McCallum, A. K., Nigam, K., Rennie, J., & Seymore, K. (2000). Automating the construction of internet portals with machine learning. Information Retrieval, 3(2), 127\u2013163.","journal-title":"Information Retrieval"},{"key":"6706_CR30","doi-asserted-by":"crossref","unstructured":"Meng, Z., Liang, S., Bao, H., Zhang, X. (2019). Co-embedding attributed networks. In: Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, pp. 393\u2013401. ACM.","DOI":"10.1145\/3289600.3291015"},{"key":"6706_CR31","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.-M., Fawzi, A., Fawzi, O., Frossard, P. (2017). Universal adversarial perturbations. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1765\u20131773.","DOI":"10.1109\/CVPR.2017.17"},{"key":"6706_CR32","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.-M., Fawzi, A., Frossard, P. (2016). Deepfool: A simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2574\u20132582.","DOI":"10.1109\/CVPR.2016.282"},{"key":"6706_CR33","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z.B., Swami, A. (2016). The limitations of deep learning in adversarial settings. In: 2016 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 372\u2013387. IEEE.","DOI":"10.1109\/EuroSP.2016.36"},{"key":"6706_CR34","doi-asserted-by":"publisher","first-page":"1213","DOI":"10.1007\/s10994-016-5582-8","volume":"106","author":"G Rossetti","year":"2017","unstructured":"Rossetti, G., Pappalardo, L., Pedreschi, D., & Giannotti, F. (2017). Tiles: An online algorithm for community discovery in dynamic social networks. Machine Learning, 106, 1213\u20131241.","journal-title":"Machine Learning"},{"issue":"2","key":"6706_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3424672","volume":"15","author":"A Rossi","year":"2021","unstructured":"Rossi, A., Barbosa, D., Firmani, D., Matinata, A., & Merialdo, P. (2021). Knowledge graph embedding for link prediction: A comparative analysis. ACM Transactions on Knowledge Discovery from Data (TKDD), 15(2), 1\u201349.","journal-title":"ACM Transactions on Knowledge Discovery from Data (TKDD)"},{"issue":"3","key":"6706_CR36","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1609\/aimag.v29i3.2157","volume":"29","author":"P Sen","year":"2008","unstructured":"Sen, P., Namata, G., Bilgic, M., Getoor, L., Galligher, B., & Eliassi-Rad, T. (2008). Collective classification in network data. AI Magazine, 29(3), 93\u201393.","journal-title":"AI Magazine"},{"key":"6706_CR37","unstructured":"Sundararajan, M., Taly, A., Yan, Q. (2017).Axiomatic attribution for deep networks. In: International Conference on Machine Learning, pp. 3319\u20133328. PMLR."},{"issue":"5","key":"6706_CR38","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","volume":"23","author":"J Su","year":"2019","unstructured":"Su, J., Vargas, D. V., & Sakurai, K. (2019). One pixel attack for fooling deep neural networks. IEEE Transactions on Evolutionary Computation, 23(5), 828\u2013841.","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"6706_CR39","doi-asserted-by":"crossref","unstructured":"Wang, Z., Hao, Z., Wang, Z., Su, H., Zhu, J. (2021). Cluster attack: Query-based adversarial attacks on graphs with graph-dependent priors. arXiv e-prints, 2109 .","DOI":"10.24963\/ijcai.2022\/108"},{"key":"6706_CR40","doi-asserted-by":"crossref","unstructured":"Wang, B., Li, Y., Zhou, P. (2022). Bandits for structure perturbation-based black-box attacks to graph neural networks with theoretical guarantees. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 13379\u201313387.","DOI":"10.1109\/CVPR52688.2022.01302"},{"issue":"9","key":"6706_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101787","volume":"35","author":"Q Wang","year":"2023","unstructured":"Wang, Q., Hao, Y., & Zhang, J. (2023). Generative inverse reinforcement learning for learning 2-opt heuristics without extrinsic rewards in routing problems. Journal of King Saud University - Computer and Information Sciences, 35(9), 101787. https:\/\/doi.org\/10.1016\/j.jksuci.2023.101787","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"issue":"2","key":"6706_CR42","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1038\/s41562-017-0290-3","volume":"2","author":"M Waniek","year":"2018","unstructured":"Waniek, M., Michalak, T. P., Wooldridge, M. J., & Rahwan, T. (2018). Hiding individuals and communities in a social network. Nature Human Behaviour, 2(2), 139\u2013147.","journal-title":"Nature Human Behaviour"},{"key":"6706_CR43","doi-asserted-by":"crossref","unstructured":"Wu, J., Li, S., Li, J., Pan, Y., Xu, K. (2022) A simple yet effective method for graph classification. arXiv preprint arXiv:2206.02404.","DOI":"10.24963\/ijcai.2022\/497"},{"key":"6706_CR44","doi-asserted-by":"crossref","unstructured":"Wu, Y., Lian, D., Xu, Y., Wu, L., Chen, E. (2020). Graph convolutional networks with markov random field reasoning for social spammer detection. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 1054\u20131061.","DOI":"10.1609\/aaai.v34i01.5455"},{"key":"6706_CR45","doi-asserted-by":"crossref","unstructured":"Wu, H., Wang, C., Tyshetskiy, Y., Docherty, A., Lu, K., Zhu, L. (2019). Adversarial examples on graph data: Deep insights into attack and defense. arXiv preprint arXiv:1903.01610.","DOI":"10.24963\/ijcai.2019\/669"},{"key":"6706_CR46","doi-asserted-by":"crossref","unstructured":"Xie, T., Wang, B., Kuo, C.-C.J. (2022). Graphhop: An enhanced label propagation method for node classification. IEEE Transactions on Neural Networks and Learning Systems.","DOI":"10.1109\/TNNLS.2022.3157746"},{"key":"6706_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105578","volume":"194","author":"Y Xie","year":"2020","unstructured":"Xie, Y., Yao, C., Gong, M., Chen, C., & Qin, A. K. (2020). Graph convolutional networks with multi-level coarsening for graph classification. Knowledge-Based Systems, 194, 105578.","journal-title":"Knowledge-Based Systems"},{"key":"6706_CR48","doi-asserted-by":"crossref","unstructured":"Xu, K., Chen, H., Liu, S., Chen, P.-Y., Weng, T.-W., Hong, M., Lin, X. (2019). Topology attack and defense for graph neural networks: an optimization perspective. In: Proceedings of the 28th International Joint Conference on Artificial Intelligence, pp. 3961\u20133967.","DOI":"10.24963\/ijcai.2019\/550"},{"key":"6706_CR49","doi-asserted-by":"publisher","first-page":"693","DOI":"10.7717\/peerj-cs.693","volume":"7","author":"R Yang","year":"2021","unstructured":"Yang, R., & Long, T. (2021). Derivative-free optimization adversarial attacks for graph convolutional networks. PeerJ Computer Science, 7, 693.","journal-title":"PeerJ Computer Science"},{"key":"6706_CR50","doi-asserted-by":"publisher","DOI":"10.1142\/S021800142253007X","author":"Z Yi","year":"2022","unstructured":"Yi, Z., Li, S., Ma, J., Yu, J., Tan, Y., & Wu, Q. (2022). Towards an efficient and robust adversarial attack against neural text classifier. International Journal of Pattern Recognition and Artificial Intelligence. https:\/\/doi.org\/10.1142\/S021800142253007X","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"key":"6706_CR51","doi-asserted-by":"crossref","unstructured":"Yu, S., Zheng, J., Chen, J., Xuan, Q., Zhang, Q. (2020). Unsupervised euclidean distance attack on network embedding. In: 2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC), pp. 71\u201377. IEEE.","DOI":"10.1109\/DSC50466.2020.00019"},{"issue":"4","key":"6706_CR52","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1086\/jar.33.4.3629752","volume":"33","author":"WW Zachary","year":"1977","unstructured":"Zachary, W. W. (1977). An information flow model for conflict and fission in small groups. Journal of Anthropological Research, 33(4), 452\u2013473.","journal-title":"Journal of Anthropological Research"},{"key":"6706_CR53","unstructured":"Zhan, H., Pei, X. (2021). Black-box gradient attack on graph neural networks: Deeper insights in graph-based attack and defense. arXiv preprint arXiv:2104.15061."},{"issue":"1","key":"6706_CR54","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/JAS.2021.1004275","volume":"9","author":"T Zhang","year":"2021","unstructured":"Zhang, T., Wang, J., & Meng, M.Q.-H. (2021). Generative adversarial network based heuristics for sampling-based path planning. IEEE\/CAA Journal of Automatica Sinica, 9(1), 64\u201374.","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"key":"6706_CR55","first-page":"1","volume":"113","author":"H Zhan","year":"2022","unstructured":"Zhan, H., & Pei, X. (2022). Dealing with the unevenness: Deeper insights in graph-based attack and defense. Machine Learning, 113, 1\u201333.","journal-title":"Machine Learning"},{"key":"6706_CR56","doi-asserted-by":"crossref","unstructured":"Zhao, J., Wang, X., Shi, C., Hu, B., Song, G., Ye, Y. (2021). Heterogeneous graph structure learning for graph neural networks. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, pp. 4697\u20134705.","DOI":"10.1609\/aaai.v35i5.16600"},{"key":"6706_CR57","doi-asserted-by":"crossref","unstructured":"Zhou, F., Cao, C., Zhang, K., Trajcevski, G., Zhong, T., Geng, J. (2019). Meta-gnn: On few-shot node classification in graph meta-learning. In: Proceedings of the 28th ACM International Conference on Information and Knowledge Management, pp. 2357\u20132360.","DOI":"10.1145\/3357384.3358106"},{"key":"6706_CR58","doi-asserted-by":"crossref","unstructured":"Z\u00fcgner, D., Akbarnejad, A., G\u00fcnnemann, S. (2018). Adversarial attacks on neural networks for graph data. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2847\u20132856.","DOI":"10.1145\/3219819.3220078"},{"key":"6706_CR59","doi-asserted-by":"crossref","unstructured":"Z\u00fcgner, D., G\u00fcnnemann, S. (2019). Adversarial attacks on graph neural networks via meta learning. In: International Conference on Learning Representations (ICLR).","DOI":"10.24963\/ijcai.2019\/872"},{"issue":"5","key":"6706_CR60","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3394520","volume":"14","author":"D Z\u00fcgner","year":"2020","unstructured":"Z\u00fcgner, D., Borchert, O., Akbarnejad, A., & G\u00fcnnemann, S. (2020). Adversarial attacks on graph neural networks: Perturbations and their patterns. ACM Transactions on Knowledge Discovery from Data (TKDD), 14(5), 1\u201331.","journal-title":"ACM Transactions on Knowledge Discovery from Data (TKDD)"}],"container-title":["Machine Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-024-06706-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10994-024-06706-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-024-06706-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T16:17:44Z","timestamp":1738945064000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10994-024-06706-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":59,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["6706"],"URL":"https:\/\/doi.org\/10.1007\/s10994-024-06706-9","relation":{},"ISSN":["0885-6125","1573-0565"],"issn-type":[{"value":"0885-6125","type":"print"},{"value":"1573-0565","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"27 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 January 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"14"}}