{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:38:50Z","timestamp":1772642330806,"version":"3.50.1"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"27","license":[{"start":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T00:00:00Z","timestamp":1680739200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T00:00:00Z","timestamp":1680739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"national key technology r&d program of china","award":["2019YFC1605306"],"award-info":[{"award-number":["2019YFC1605306"]}]},{"DOI":"10.13039\/501100012325","name":"national office for philosophy and social sciences","doi-asserted-by":"publisher","award":["18BGL202"],"award-info":[{"award-number":["18BGL202"]}],"id":[{"id":"10.13039\/501100012325","id-type":"DOI","asserted-by":"publisher"}]},{"name":"beijing municipal philosophy and social science foundation","award":["19GLC091"],"award-info":[{"award-number":["19GLC091"]}]},{"DOI":"10.13039\/501100004733","name":"university of macau","doi-asserted-by":"crossref","award":["MYRG2019-00006-FST"],"award-info":[{"award-number":["MYRG2019-00006-FST"]}],"id":[{"id":"10.13039\/501100004733","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s11042-023-14592-x","type":"journal-article","created":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T12:04:27Z","timestamp":1680782667000},"page":"41669-41699","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A novel method using LSTM-RNN to generate smart contracts code templates for improved usability"],"prefix":"10.1007","volume":"82","author":[{"given":"Zhihao","family":"Hao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2497-9519","authenticated-orcid":false,"given":"Bob","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dianhui","family":"Mao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jerome","family":"Yen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhihua","family":"Zhao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Min","family":"Zuo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Haisheng","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cheng-Zhong","family":"Xu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,4,6]]},"reference":[{"key":"14592_CR1","doi-asserted-by":"crossref","unstructured":"Alexandru CV (2016) Guided code synthesis using deep neural networks. In: Proceedings of the 2016 24th ACM SIGSOFT international symposium on foundations of software engineering, pp 1068\u20131070","DOI":"10.1145\/2950290.2983951"},{"key":"14592_CR2","doi-asserted-by":"crossref","unstructured":"Alharby M, Van Moorsel A (2017) Blockchain-based smart contracts: a systematic mapping study. arXiv:1710.06372","DOI":"10.5121\/csit.2017.71011"},{"key":"14592_CR3","doi-asserted-by":"crossref","unstructured":"Almadhoun R, Kadadha M, Alhemeiri M et al (2018) A user authentication scheme of IoT devices using blockchain-enabled fog nodes. In: 2018 IEEE\/ACS 15th international conference on computer systems and applications (AICCSA), pp 1\u20138","DOI":"10.1109\/AICCSA.2018.8612856"},{"key":"14592_CR4","doi-asserted-by":"crossref","unstructured":"Atzei N, Bartoletti M, Cimoli T (2017) A survey of attacks on ethereum smart contracts (sok). In: International conference on principles of security and trust, pp 164\u2013186","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"14592_CR5","unstructured":"Bengio Y (2005) Hierarchical probabilistic neural network language model. In: International workshop on artificial intelligence and statistics, pp 246\u2013252"},{"key":"14592_CR6","doi-asserted-by":"crossref","unstructured":"Brabrand C, M?ller A, Schwartzbach MI (2008) Dual syntax for XML languages. Inf Syst 33(4-5):385\u2013406","DOI":"10.1016\/j.is.2008.01.006"},{"key":"14592_CR7","doi-asserted-by":"publisher","first-page":"101938","DOI":"10.1016\/j.cose.2020.101938","volume":"97","author":"AK Das","year":"2020","unstructured":"Das A K, Kalam S, Sahar N et al (2020) UCFL: user categorization using fuzzy logic towards PUF based two-phase authentication of fog assisted IoT devices. Comput Sec 97:101938","journal-title":"Comput Sec"},{"key":"14592_CR8","doi-asserted-by":"crossref","unstructured":"Datta S, Das AK, Kumar A, Sinha D (2019) Authentication and privacy preservation in IoT based forest fire detection by using blockchainCa review. In: International conference on internet of things and connected technologies, pp 133\u2013143","DOI":"10.1007\/978-3-030-39875-0_14"},{"issue":"5","key":"14592_CR9","doi-asserted-by":"publisher","first-page":"2479","DOI":"10.1007\/s12652-021-03591-1","volume":"13","author":"S Datta","year":"2022","unstructured":"Datta S, Kumar S, Sinha D, Das A K (2022) BSSFFS: blockchain-based sybil-secured smart forest fire surveillance. J Ambient Intell Humanized Comput 13(5):2479\u20132510","journal-title":"J Ambient Intell Humanized Comput"},{"issue":"3","key":"14592_CR10","doi-asserted-by":"publisher","first-page":"121","DOI":"10.2991\/ijndc.k.190710.003","volume":"7","author":"W Dingman","year":"2019","unstructured":"Dingman W, Cohen A, Ferrara N et al (2019) Defects and Vulnerabilities in smart contracts, a classification using the NIST bugs framework. Int J Netw Distributed Comput 7(3):121\u2013132","journal-title":"Int J Netw Distributed Comput"},{"key":"14592_CR11","doi-asserted-by":"crossref","unstructured":"Durieux T, Ferreira JF, Abreu R et al (2020) Empirical review of automated analysis tools on 47,587 ethereum smart contracts. In: Proceedings of the ACM\/IEEE 42nd international conference on software engineering, pp 530\u2013541","DOI":"10.1145\/3377811.3380364"},{"issue":"4","key":"14592_CR12","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1002\/bimj.200410135","volume":"47","author":"R Fluss","year":"2005","unstructured":"Fluss R, Faraggi D, Reiser B (2005) Estimation of the Youden Index and its associated cutoff point. Biometric J: J Math Methods Biosci 47(4):458\u2013472","journal-title":"Biometric J: J Math Methods Biosci"},{"key":"14592_CR13","doi-asserted-by":"crossref","unstructured":"Fotiou N, Pittaras I, Siris VA et al (2019) Secure IoT access at scale using blockchains and smart contracts. In: 2019 IEEE 20th international symposium on\u201c a world of wireless, mobile and multimedia networks\u201d(WoWMoM), pp 1\u20136","DOI":"10.1109\/WoWMoM.2019.8793047"},{"issue":"2","key":"14592_CR14","doi-asserted-by":"publisher","first-page":"1523","DOI":"10.1007\/s11042-021-11078-6","volume":"81","author":"MN Halgamuge","year":"2022","unstructured":"Halgamuge MN, Guruge D (2022) Fair rewarding mechanism in music industry using smart contracts on public-permissionless blockchain. Multimed Tools Appl 81(2):1523\u20131544","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"14592_CR15","doi-asserted-by":"publisher","first-page":"2300","DOI":"10.3390\/ijerph17072300","volume":"17","author":"Z Hao","year":"2020","unstructured":"Hao Z, Mao D, Zhang B et al (2020) A novel visual analysis method of food safety risk traceability based on blockchain. Int J Environ Res Public Health 17(7):2300","journal-title":"Int J Environ Res Public Health"},{"issue":"6","key":"14592_CR16","doi-asserted-by":"publisher","first-page":"1398","DOI":"10.3390\/foods10061398","volume":"10","author":"Z Hao","year":"2021","unstructured":"Hao Z, Wang G, Mao D et al (2021) A novel method for food market regulation by emotional tendencies predictions from food reviews based on blockchain and saes. Foods 10(6):1398","journal-title":"Foods"},{"key":"14592_CR17","doi-asserted-by":"publisher","first-page":"65439","DOI":"10.1109\/ACCESS.2018.2876971","volume":"6","author":"HR Hasan","year":"2018","unstructured":"Hasan H R, Salah K (2018) Proof of delivery of digital assets using blockchain and smart contracts. IEEE Access 6:65439\u201365448","journal-title":"IEEE Access"},{"key":"14592_CR18","unstructured":"Hou L, Zhu J, Kwok J et al (2019) Normalization helps training of quantized lstm. Adv Neural Inf Process Syst:32"},{"issue":"2","key":"14592_CR19","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/TSUSC.2018.2793284","volume":"5","author":"F Jiang","year":"2018","unstructured":"Jiang F, Fu Y, Gupta BB et al (2018) Deep learning based multi-channel intelligent attack detection for data security. IEEE Trans Sustain Comput 5(2):204\u2013212","journal-title":"IEEE Trans Sustain Comput"},{"key":"14592_CR20","doi-asserted-by":"crossref","unstructured":"Jiang B, Liu Y, Chan WK (2018) Contractfuzzer: fuzzing smart contracts for vulnerability detection. In: 2018 33rd IEEE\/ACM international conference on automated software engineering (ASE), pp 259\u2013269","DOI":"10.1145\/3238147.3238177"},{"key":"14592_CR21","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1016\/j.neucom.2017.05.046","volume":"266","author":"HK Kim","year":"2017","unstructured":"Kim H K, Kim H, Cho S (2017) Bag-of-concepts: comprehending document representation through clustering words in distributed representation. Neurocomputing 266:336\u2013352","journal-title":"Neurocomputing"},{"key":"14592_CR22","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.ins.2018.10.006","volume":"477","author":"D Kim","year":"2019","unstructured":"Kim D, Seo D, Cho S, Kang P (2019) Multi-co-training for document classification using various document representations: TF-IDF, LDA, and Doc2Vec. Inf Sci 477:15\u201329","journal-title":"Inf Sci"},{"key":"14592_CR23","unstructured":"Kim G, Yi H, Lee J, Paek Y, Yoon S (2016) LSTM-based system-call language modeling and robust ensemble method for designing host-based intrusion detection systems (2016). arXiv:1611.01726"},{"key":"14592_CR24","doi-asserted-by":"crossref","unstructured":"Kosba A, Miller A, Shi E et al (2016) Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE symposium on security and privacy (SP), pp 839\u2013858","DOI":"10.1109\/SP.2016.55"},{"key":"14592_CR25","doi-asserted-by":"crossref","unstructured":"Le P, Zuidema W (2015) Compositional distributional semantics with long short term memory. arXiv:1503.02510","DOI":"10.18653\/v1\/S15-1002"},{"key":"14592_CR26","doi-asserted-by":"publisher","first-page":"34517","DOI":"10.1007\/s11042-020-08776-y","volume":"80","author":"D Lee","year":"2021","unstructured":"Lee D, Park N (2021) Blockchain based privacy preserving multimedia intelligent video surveillance using secure Merkle tree. Multimed Tools Appl 80:34517\u201334534","journal-title":"Multimed Tools Appl"},{"key":"14592_CR27","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/j.knosys.2016.05.045","volume":"106","author":"J Li","year":"2016","unstructured":"Li J, Li J, Fu X et al (2016) Learning distributed word representation with multi-contextual mixed embedding. Knowl-Based Syst 106:220\u2013230","journal-title":"Knowl-Based Syst"},{"issue":"20","key":"14592_CR28","doi-asserted-by":"publisher","first-page":"30707","DOI":"10.1007\/s11042-021-10558-z","volume":"80","author":"Y Liu","year":"2021","unstructured":"Liu Y, Lu Q, Zhu C et al (2021) A blockchain-based platform architecture for multimedia data management. Multimed Tools Appl 80(20):30707\u201330723","journal-title":"Multimed Tools Appl"},{"key":"14592_CR29","doi-asserted-by":"crossref","unstructured":"Luu L, Chu DH, Olickel H et al (2016) Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp 254\u2013269","DOI":"10.1145\/2976749.2978309"},{"issue":"2","key":"14592_CR30","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1504\/IJSNET.2021.118486","volume":"37","author":"Z Ma","year":"2021","unstructured":"Ma Z, Zhu L, Yu F R et al (2021) Protection of surveillance recordings via blockchain-assisted multimedia security. Int J Sensor Netw 37(2):69\u201380","journal-title":"Int J Sensor Netw"},{"issue":"5","key":"14592_CR31","doi-asserted-by":"publisher","first-page":"703","DOI":"10.3390\/sym11050703","volume":"11","author":"D Mao","year":"2019","unstructured":"Mao D, Hao Z (2019) A novel sketch-based three-dimensional shape retrieval method using multi-view convolutional neural network. Symmetry 11 (5):703","journal-title":"Symmetry"},{"issue":"9","key":"14592_CR32","doi-asserted-by":"publisher","first-page":"3149","DOI":"10.3390\/su10093149","volume":"10","author":"D Mao","year":"2018","unstructured":"Mao D, Hao Z, Wang F et al (2018) Innovative blockchain-based approach for sustainable and credible environment in food trade: a case study in shandong province, china. Sustainability 10(9):3149","journal-title":"Sustainability"},{"issue":"4","key":"14592_CR33","doi-asserted-by":"publisher","first-page":"3439","DOI":"10.1007\/s13369-018-3537-z","volume":"44","author":"D Mao","year":"2019","unstructured":"Mao D, Hao Z, Wang F et al (2019) Novel automatic food trading system using consortium blockchain. Arab J Sci Eng 44(4):3439\u20133455","journal-title":"Arab J Sci Eng"},{"key":"14592_CR34","doi-asserted-by":"publisher","first-page":"73131","DOI":"10.1109\/ACCESS.2019.2920776","volume":"7","author":"D Mao","year":"2019","unstructured":"Mao D, Wang F, Wang Y, Hao Z (2019) Visual and user-defined smart contract designing system based on automatic coding. IEEE Access 7:73131\u201373143","journal-title":"IEEE Access"},{"key":"14592_CR35","doi-asserted-by":"crossref","unstructured":"McCorry P, Shahandashti SF, Hao F (2017) A smart contract for boardroom voting with maximum voter privacy. In: International conference on financial cryptography and data security, pp 357\u2013375","DOI":"10.1007\/978-3-319-70972-7_20"},{"issue":"1","key":"14592_CR36","doi-asserted-by":"publisher","first-page":"19","DOI":"10.4018\/JCIT.2019010102","volume":"21","author":"MI Mehar","year":"2019","unstructured":"Mehar M I et al (2019) Understanding a revolutionary and flawed grand experiment in blockchain: the DAO attack. J Cases Inf Technol (JCIT) 21(1):19\u201332","journal-title":"J Cases Inf Technol (JCIT)"},{"key":"14592_CR37","doi-asserted-by":"crossref","unstructured":"Mou L, Li G, Zhang L et al (2016) Convolutional neural networks over tree structures for programming language processing. Thirtieth AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v30i1.10139"},{"key":"14592_CR38","doi-asserted-by":"crossref","unstructured":"Nugaliyadde A, Sohel F, Wong KW et al (2019) Language modeling through Long-Term memory network. In: 2019 international joint conference on neural networks (IJCNN). pp 1\u20136","DOI":"10.1109\/IJCNN.2019.8851909"},{"key":"14592_CR39","doi-asserted-by":"crossref","unstructured":"Parizi RM, Dehghantanha A (2018) Smart contract programming languages on blockchains: an empirical evaluation of usability and security. In: International conference on Blockchain, pp 75\u201391","DOI":"10.1007\/978-3-319-94478-4_6"},{"issue":"7","key":"14592_CR40","first-page":"789","volume":"25","author":"TJ Parr","year":"1995","unstructured":"Parr TJ, Quong RW (1995) ANTLR: a predicated-LL (k) parser generator. Soft: Pract Exper 25(7):789\u2013810","journal-title":"Soft: Pract Exper"},{"key":"14592_CR41","doi-asserted-by":"crossref","unstructured":"Peng H, Mou L, Li G et al (2015) Building program vector representations for deep learning. In: International conference on knowledge science, engineering and management. Springer, pp 547\u2013553","DOI":"10.1007\/978-3-319-25159-2_49"},{"key":"14592_CR42","doi-asserted-by":"crossref","unstructured":"Prechtel D, Gro\u03b2 T, M\u00fcller T (2019) Evaluating spread of \u2018gasless send\u2019in ethereum smart contracts. In: 2019 10th IFIP international conference on new technologies, mobility and security (NTMS), pp 1\u20136","DOI":"10.1109\/NTMS.2019.8763848"},{"key":"14592_CR43","first-page":"1","volume":"18","author":"AM Rozario","year":"2018","unstructured":"Rozario AM, Vasarhelyi MA (2018) Auditing with smart contracts. Int J Digit Account Res 18:1\u201327","journal-title":"Int J Digit Account Res"},{"key":"14592_CR44","unstructured":"Somasundaram N (2019) UBS introduces smart contracts for structured products, https:\/\/www.risk.net\/derivatives\/6745731\/ubs-using-smart-contracts-for-some-structured-products. Accessed 18 June 2019"},{"issue":"1","key":"14592_CR45","doi-asserted-by":"publisher","first-page":"23","DOI":"10.3390\/s21010023","volume":"21","author":"N Tariq","year":"2020","unstructured":"Tariq N, Asim M, Khan F A et al (2020) A blockchain-based multi-mobile code-driven trust mechanism for detecting internal attacks in internet of things. Sensors 21(1):23","journal-title":"Sensors"},{"key":"14592_CR46","doi-asserted-by":"crossref","unstructured":"Tikhomirov S, Voskresenskaya E, Ivanitskiy I et al (2018) Smartcheck: static analysis of ethereum smart contracts. In: Proceedings of the 1st international workshop on emerging trends in software engineering for Blockchain, pp 9\u201316","DOI":"10.1145\/3194113.3194115"},{"key":"14592_CR47","doi-asserted-by":"crossref","unstructured":"Tsankov P, Dan A, Drachsler-Cohen D et al (2018) Securify: practical security analysis of smart contracts. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security. pp 67\u201382","DOI":"10.1145\/3243734.3243780"},{"key":"14592_CR48","doi-asserted-by":"crossref","unstructured":"Vukoli\u0107 M (2017) Rethinking permissioned blockchains. In: Proceedings of the ACM workshop on blockchain, cryptocurrencies and contracts, pp 3\u20137","DOI":"10.1145\/3055518.3055526"},{"key":"14592_CR49","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.ins.2021.12.039","volume":"588","author":"G Wang","year":"2022","unstructured":"Wang G, Hao Z, Zhang B et al (2022) Convergence and robustness of bounded recurrent neural networks for solving dynamic Lyapunov equations. Inf Sci 588:106\u2013123","journal-title":"Inf Sci"},{"key":"14592_CR50","doi-asserted-by":"crossref","unstructured":"White M, Vendome C, Linares-V\u00e1squez M et al (2015) Toward deep learning software repositories. In: 2015 IEEE\/ACM 12th working conference on mining software repositories, pp 334\u2013345","DOI":"10.1109\/MSR.2015.38"},{"issue":"3","key":"14592_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1361684.1361686","volume":"26","author":"HC Wu","year":"2008","unstructured":"Wu H C, Luk R W P, Wong K F et al (2008) Interpreting tf-idf term weights as making relevance decisions. ACM Trans Inf Syst (TOIS) 26(3):1\u201337","journal-title":"ACM Trans Inf Syst (TOIS)"},{"issue":"12","key":"14592_CR52","doi-asserted-by":"publisher","first-page":"3135","DOI":"10.1109\/TPDS.2014.2306193","volume":"25","author":"Y Xu","year":"2014","unstructured":"Xu Y, Qu W, Li Z, Min G, Li K, Liu Z (2014) Efficient k-Means++ approximation with MapReduce. IEEE Trans Parallel Distributed Syst 25(12):3135\u20133144","journal-title":"IEEE Trans Parallel Distributed Syst"},{"issue":"5","key":"14592_CR53","first-page":"052074","volume":"1187","author":"N Yang","year":"2019","unstructured":"Yang N, Li G, Ding H et al (2019) Study on tibetan word Vector based on word2vec. J Phys: Conf Series. IOP Publishing 1187(5):052074","journal-title":"J Phys: Conf Series. IOP Publishing"},{"key":"14592_CR54","unstructured":"Zen H, Acoustic modeling in statistical parametric speech synthesis-from HMM to LSTM-RNN (2015)"},{"issue":"1","key":"14592_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/jtaer17010001","volume":"17","author":"Z Zhao","year":"2021","unstructured":"Zhao Z, Hao Z, Wang G et al (2021) Sentiment analysis of review data using blockchain and LSTM to improve regulation for a sustainable market. J Theo Appl Electr Comm Res 17(1):1\u201319","journal-title":"J Theo Appl Electr Comm Res"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14592-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-14592-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14592-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T10:08:48Z","timestamp":1698314928000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-14592-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,6]]},"references-count":55,"journal-issue":{"issue":"27","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["14592"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-14592-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,6]]},"assertion":[{"value":"20 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 April 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}