{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T21:28:22Z","timestamp":1773350902019,"version":"3.50.1"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T00:00:00Z","timestamp":1773273600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T00:00:00Z","timestamp":1773273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-026-21448-7","type":"journal-article","created":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T10:51:54Z","timestamp":1773312714000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantum-inspired temporal modeling with WavLM for audio spoofing detection"],"prefix":"10.1007","volume":"85","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-3106-4995","authenticated-orcid":false,"given":"Atul","family":"Pandey","sequence":"first","affiliation":[]},{"given":"Bhawana","family":"Rudra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,12]]},"reference":[{"key":"21448_CR1","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1007\/978-3-642-30157-5_71","volume-title":"Advances in Computer Science, Engineering & Applications","author":"M Sridevi","year":"2012","unstructured":"Sridevi M, Mala C, Sanyam S (2012) Comparative study of image forgery and copy-move techniques. In: Wyld DC, Zizka J, Nagamalai D (eds) Advances in Computer Science, Engineering & Applications. Springer, Berlin, Heidelberg, pp 715\u2013723"},{"key":"21448_CR2","unstructured":"Goodfellow IJ, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative Adversarial Networks"},{"key":"21448_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2022.103525","volume":"223","author":"TT Nguyen","year":"2022","unstructured":"Nguyen TT, Nguyen QVH, Nguyen DT, Nguyen DT, Huynh-The T, Nahavandi S, Nguyen TT, Pham Q-V, Nguyen CM (2022) Deep learning for deepfakes creation and detection: A survey. Comput Vis Image Underst 223:103525. https:\/\/doi.org\/10.1016\/j.cviu.2022.103525","journal-title":"Comput Vis Image Underst"},{"key":"21448_CR4","unstructured":"Yi J, Wang C, Tao J, Zhang X, Zhang CY, Zhao Y (2023) Audio Deepfake Detection: A Survey"},{"key":"21448_CR5","doi-asserted-by":"publisher","unstructured":"Liu Y, Tian Y, He L, Liu J, Johnson M (2015) Simultaneous utilization of spectral magnitude and phase information to extract supervectors for speaker verification anti-spoofing. https:\/\/doi.org\/10.21437\/Interspeech.2015-471","DOI":"10.21437\/Interspeech.2015-471"},{"key":"21448_CR6","doi-asserted-by":"publisher","unstructured":"Villalba J, Miguel A, Ortega A, Lleida E (2015) Spoofing detection with dnn and one-class svm for the asvspoof 2015 challenge. https:\/\/doi.org\/10.21437\/Interspeech.2015-468","DOI":"10.21437\/Interspeech.2015-468"},{"key":"21448_CR7","doi-asserted-by":"publisher","unstructured":"Amin TB, German JS, Marziliano P (2013) Detecting voice disguise from speech variability: Analysis of three glottal and vocal tract measures. J Acoust Soc Am 134(5_Supplement):4068\u20134068. https:\/\/doi.org\/10.1121\/1.4830853","DOI":"10.1121\/1.4830853"},{"key":"21448_CR8","doi-asserted-by":"publisher","unstructured":"Sizov A, Khoury E, Kinnunen T, Wu Z, Marcel S (2015) Joint speaker verification and antispoofing in the -vector space. IEEE Trans Inf Forensics Secur 10:821\u2013832. https:\/\/doi.org\/10.1109\/TIFS.2015.2407362","DOI":"10.1109\/TIFS.2015.2407362"},{"key":"21448_CR9","doi-asserted-by":"publisher","unstructured":"Wu Z, Das RK, Yang J, Li H (2020) Light convolutional neural network with feature genuinization for detection of synthetic speech attacks. In: Proc. Interspeech 2020:1101\u20131105. https:\/\/doi.org\/10.21437\/Interspeech.2020-1810","DOI":"10.21437\/Interspeech.2020-1810"},{"key":"21448_CR10","doi-asserted-by":"publisher","unstructured":"Alshehri A, Almalki D, Alharbi E, Albaradei S (2024) Audio deep fake detection with sonic sleuth model. Computers 13(10). https:\/\/doi.org\/10.3390\/computers13100256","DOI":"10.3390\/computers13100256"},{"key":"21448_CR11","doi-asserted-by":"crossref","unstructured":"Alzantot MF, Wang Z, Srivastava MB (2019) Deep residual neural networks for audio spoofing detection. In: Interspeech","DOI":"10.21437\/Interspeech.2019-3174"},{"key":"21448_CR12","doi-asserted-by":"publisher","unstructured":"Liu X, Liu M, Wang L, Lee KA, Zhang H, Dang J (2023) Leveraging positional-related local-global dependency for synthetic speech detection. In: ICASSP 2023\u20132023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp 1\u20135. https:\/\/doi.org\/10.1109\/ICASSP49357.2023.10096278","DOI":"10.1109\/ICASSP49357.2023.10096278"},{"key":"21448_CR13","doi-asserted-by":"publisher","unstructured":"Alali A, Theodorakopoulos G (2024) Review of existing methods for generating and detecting fake and partially fake audio. In: Proceedings of the 10th ACM International Workshop on Security and Privacy Analytics. IWSPA \u201924, pp 35\u201336. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3643651.3659894","DOI":"10.1145\/3643651.3659894"},{"issue":"3","key":"21448_CR14","doi-asserted-by":"publisher","first-page":"289","DOI":"10.3390\/forensicsci4030021","volume":"4","author":"Z Akhtar","year":"2024","unstructured":"Akhtar Z, Pendyala TL, Athmakuri VS (2024) Video and audio deepfake datasets and open issues in deepfake technology: Being ahead of the curve. Forensic Sciences 4(3):289\u2013377. https:\/\/doi.org\/10.3390\/forensicsci4030021","journal-title":"Forensic Sciences"},{"key":"21448_CR15","unstructured":"Zaman K, Marchisio A, Hanif MA, Shafique M (2023) A survey on quantum machine learning: current trends, challenges, opportunities, and the road ahead"},{"key":"21448_CR16","doi-asserted-by":"crossref","unstructured":"Arute F, Arya K et al (2019) Quantum supremacy using a programmable superconducting processor. Nature 574:505\u2013510","DOI":"10.1038\/s41586-019-1666-5"},{"key":"21448_CR17","doi-asserted-by":"crossref","unstructured":"Cerezo M, Verdon G et al (2022a) Challenges and opportunities in quantum machine learning. Nat Comput Sci 2:567\u2013576","DOI":"10.1038\/s43588-022-00311-3"},{"key":"21448_CR18","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/11766247_37","volume-title":"Advances in Artificial Intelligence","author":"E A\u00efmeur","year":"2006","unstructured":"A\u00efmeur E, Brassard G, Gambs S (2006) Machine learning in a quantum world. In: Lamontagne L, Marchand M (eds) Advances in Artificial Intelligence. Springer, Berlin, Heidelberg, pp 431\u2013442"},{"key":"21448_CR19","doi-asserted-by":"publisher","unstructured":"Ji Z, Li Z-Y, Li P, An M, Gao S, Wu D, Zhao F (2017) Ensemble Learning for Countermeasure of Audio Replay Spoofing Attack in ASVspoof2017. In: Proc. Interspeech 2017, pp 87\u201391. https:\/\/doi.org\/10.21437\/Interspeech.2017-1246","DOI":"10.21437\/Interspeech.2017-1246"},{"issue":"11","key":"21448_CR20","doi-asserted-by":"publisher","first-page":"2884","DOI":"10.1109\/TIFS.2018.2833032","volume":"13","author":"X Wu","year":"2018","unstructured":"Wu X, He R, Sun Z, Tan T (2018) A light cnn for deep face representation with noisy labels. IEEE Trans Inf Forensics Secur 13(11):2884\u20132896. https:\/\/doi.org\/10.1109\/TIFS.2018.2833032","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"21448_CR21","doi-asserted-by":"crossref","unstructured":"Todisco M, Wang X, Vestman V, Sahidullah M, Lee KA (2019) Asvspoof 2019: Future horizons in spoofed and fake audio detection. In: Annual conference of the international speech communication association (Interspeech)","DOI":"10.21437\/Interspeech.2019-2249"},{"key":"21448_CR22","doi-asserted-by":"publisher","unstructured":"Yi J, Fu R, Tao J, Nie S, Ma H, Wang C, Wang T, Tian Z, Bai Y, Fan C, Liang S, Wang S, Zhang S, Yan X, Xu L, Wen Z, Li H (2022) Add 2022: the first audio deep synthesis detection challenge. In: ICASSP 2022\u20132022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp 9216\u20139220. https:\/\/doi.org\/10.1109\/ICASSP43922.2022.9746939","DOI":"10.1109\/ICASSP43922.2022.9746939"},{"key":"21448_CR23","doi-asserted-by":"crossref","unstructured":"Tomilov A, Svishchev AF, Volkova M, Chirkovskiy A, Kondratev AS, Lavrentyeva G (2021) Stc antispoofing systems for the asvspoof2021 challenge. In: 2021 edition of the automatic speaker verification and spoofing countermeasures challenge","DOI":"10.21437\/ASVSPOOF.2021-10"},{"key":"21448_CR24","doi-asserted-by":"publisher","unstructured":"Chen T, Khoury E, Phatak K, Sivaraman G (2021) Pindrop Labs\u2019 Submission to the ASVspoof 2021 Challenge. In: Proc. 2021 edition of the automatic speaker verification and spoofing countermeasures challenge, pp 89\u201393. https:\/\/doi.org\/10.21437\/ASVSPOOF.2021-14","DOI":"10.21437\/ASVSPOOF.2021-14"},{"key":"21448_CR25","doi-asserted-by":"crossref","unstructured":"Kwak I-Y, Kwag S, Lee J, Huh J-H, Lee C-H, Jeon Y-B, Hwang J-H, Yoon J-W (2021) Resmax: Detecting voice spoofing attacks with residual network and max feature map. In: 2020 25th International Conference on Pattern Recognition (ICPR), pp 4837\u20134844","DOI":"10.1109\/ICPR48806.2021.9412165"},{"key":"21448_CR26","doi-asserted-by":"publisher","unstructured":"Khochare J, Joshi C, Yenarkar B, Suratkar S (2021) A deep learning framework for audio deepfake detection. Arab J Sci Eng 47(2021). https:\/\/doi.org\/10.1007\/s13369-021-06297-w","DOI":"10.1007\/s13369-021-06297-w"},{"key":"21448_CR27","doi-asserted-by":"crossref","unstructured":"Muckenhirn H, Magimai.-Doss M, Marcel S (2017) End-to-end convolutional neural network-based voice presentation attack detection. In: 2017 IEEE International Joint Conference on Biometrics (IJCB), pp 335\u2013341. IEEE","DOI":"10.1109\/BTAS.2017.8272715"},{"key":"21448_CR28","doi-asserted-by":"crossref","unstructured":"Dinkel H, Chen N, Qian Y, Yu K (2017) End-to-end spoofing detection with raw waveform cldnns. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp 4860\u20134864. IEEE","DOI":"10.1109\/ICASSP.2017.7953080"},{"key":"21448_CR29","doi-asserted-by":"publisher","first-page":"1024","DOI":"10.1109\/JSTSP.2020.2999185","volume":"14","author":"A Chintha","year":"2020","unstructured":"Chintha A, Thai B, Sohrawardi SJ, Bhatt K, Hickerson A, Wright MK, Ptucha RW (2020) Recurrent convolutional structures for audio spoof and video deepfake detection. IEEE J Select Topics Signal Proc 14:1024\u20131037","journal-title":"IEEE J Select Topics Signal Proc"},{"key":"21448_CR30","doi-asserted-by":"crossref","unstructured":"Doan T-P, Nguyen-Vu L, Jung S, Hong K (2023) Bts-e: Audio deepfake detection using breathing-talking-silence encoder. ICASSP 2023\u20132023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 1\u20135","DOI":"10.1109\/ICASSP49357.2023.10095927"},{"key":"21448_CR31","doi-asserted-by":"publisher","unstructured":"Hua G, Teoh ABJ, Zhang H (2021) Towards end-to-end synthetic speech detection. IEEE Signal Proc Letters 28:1265\u20131269. https:\/\/doi.org\/10.1109\/lsp.2021.3089437","DOI":"10.1109\/lsp.2021.3089437"},{"key":"21448_CR32","unstructured":"Paul D, Sahidullah M, Saha G (2019) Generalization of Spoofing Countermeasures: a Case Study with ASVspoof 2015 and BTAS 2016 Corpora. arXiv:1901.08025"},{"key":"21448_CR33","doi-asserted-by":"crossref","unstructured":"Das RK, Yang J, Li H (2020) Assessing the scope of generalized countermeasures for anti-spoofing. ICASSP 2020\u20132020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp 6589\u20136593","DOI":"10.1109\/ICASSP40776.2020.9053086"},{"key":"21448_CR34","doi-asserted-by":"crossref","unstructured":"Yamagishi J, Wang X, Todisco M, Sahidullah M, Patino J, Nautsch A, Liu X, Lee KA, Kinnunen T, Evans N, Delgado H (2021) ASVspoof 2021: accelerating progress in spoofed and deepfake speech detection. arXiv:2109.00537","DOI":"10.21437\/ASVSPOOF.2021-8"},{"key":"21448_CR35","doi-asserted-by":"crossref","unstructured":"Schneider S, Baevski A, Collobert R, Auli M (2019) wav2vec: Unsupervised Pre-training for Speech Recognition. arXiv:1904.05862","DOI":"10.21437\/Interspeech.2019-1873"},{"key":"21448_CR36","unstructured":"Baevski A, Zhou H, Mohamed A, Auli M (2020) wav2vec 2.0: A Framework for Self-Supervised Learning of Speech Representations. arXiv:2006.11477"},{"key":"21448_CR37","doi-asserted-by":"crossref","unstructured":"Babu A, Wang C, Tjandra A, Lakhotia K, Xu Q, Goyal N, Singh K, Platen P, Saraf Y, Pino J, Baevski A, Conneau A, Auli M (2021) XLS-R: Self-supervised Cross-lingual Speech Representation Learning at Scale. arXiv:2111.09296","DOI":"10.21437\/Interspeech.2022-143"},{"issue":"6","key":"21448_CR38","doi-asserted-by":"publisher","first-page":"1505","DOI":"10.1109\/jstsp.2022.3188113","volume":"16","author":"S Chen","year":"2022","unstructured":"Chen S, Wang C, Chen Z, Wu Y, Liu S, Chen Z, Li J, Kanda N, Yoshioka T, Xiao X, Wu J, Zhou L, Ren S, Qian Y, Qian Y, Wu J, Zeng M, Yu X, Wei F (2022) Wavlm: Large-scale self-supervised pre-training for full stack speech processing. IEEE J Select Topics Signal Proc 16(6):1505\u20131518. https:\/\/doi.org\/10.1109\/jstsp.2022.3188113","journal-title":"IEEE J Select Topics Signal Proc"},{"key":"21448_CR39","doi-asserted-by":"crossref","unstructured":"Wang X, Yamagishi J (2022) Investigating self-supervised front ends for speech spoofing countermeasures. arXiv:2111.07725","DOI":"10.21437\/Odyssey.2022-14"},{"key":"21448_CR40","doi-asserted-by":"crossref","unstructured":"Mart\u00edn-Do\u00f1as JM, \u00c1lvarez A (2022) The Vicomtech Audio Deepfake Detection System based on Wav2Vec2 for the 2022 ADD Challenge. arXiv:2203.01573","DOI":"10.1109\/ICASSP43922.2022.9747768"},{"key":"21448_CR41","doi-asserted-by":"crossref","unstructured":"Wang C, Yi J, Tao J, Zhang C, Zhang S, Chen X (2023) Detection of Cross-Dataset Fake Audio Based on Prosodic and Pronunciation Features. arXiv:2305.13700","DOI":"10.21437\/Interspeech.2023-1254"},{"key":"21448_CR42","doi-asserted-by":"publisher","unstructured":"Fu J, Au Yeung S-K, Hung K (2025) A lightweight end-to-end anti-spoofing voice model based on wavlm. In: Proceedings of the 2024 8th International Conference on Algorithms, Computing and Systems. ICACS \u201924, pp 157\u2013160. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3708597.3708621","DOI":"10.1145\/3708597.3708621"},{"key":"21448_CR43","doi-asserted-by":"crossref","unstructured":"Lin C-HA, Liu C-Y, Chen SY-C, Chen K-C (2024) Quantum-Trained Convolutional Neural Network for Deepfake Audio Detection. arXiv:2410.09250","DOI":"10.1109\/ICASSPW65056.2025.11011133"},{"key":"21448_CR44","unstructured":"Kamal S, Chahar V, Sharma S (2022) Quantum machine learning-based detection of fake news and deep fake videos"},{"key":"21448_CR45","doi-asserted-by":"crossref","unstructured":"Mishra B, Samanta A (2022) Quantum transfer learning approach for deepfake detection. Sparklinglight Transactions on Artificial Intelligence and Quantum Computing","DOI":"10.55011\/STAIQC.2022.2103"},{"key":"21448_CR46","doi-asserted-by":"publisher","unstructured":"Bikku T, Thota S, Palanisamy S (2024) A novel quantum neural network approach to combating fake reviews. Int J Netw Distribut Comput 12:1\u201311. https:\/\/doi.org\/10.1007\/s44227-024-00028-x","DOI":"10.1007\/s44227-024-00028-x"},{"key":"21448_CR47","unstructured":"Chang SY, Thanasilp S, Le Saux B, Vallecorsa S, Grossi M (2024) Latent Style-based Quantum GAN for high-quality Image Generation. arXiv:2406.02668. [quant-ph]"},{"key":"21448_CR48","unstructured":"Salek PDMS, Engineer S, Li PDS, Chowdhury PM (2024) A hybrid quantum-classical ai-based detection strategy for generative adversarial network-based deepfake attacks on an autonomous vehicle traffic sign classification system. ArXiv.abs\/2409.17311"},{"key":"21448_CR49","doi-asserted-by":"publisher","unstructured":"Qu Z, Meng Y, Muhammad G, Tiwari P (2024) Qmfnd: A quantum multimodal fusion-based fake news detection model for social media. Inf Fusion 104:102172. https:\/\/doi.org\/10.1016\/j.inffus.2023.102172","DOI":"10.1016\/j.inffus.2023.102172"},{"key":"21448_CR50","doi-asserted-by":"publisher","unstructured":"Pandey A, Rudra B (2024) Deepfake audio detection using quantum learning models. In: 2024 IEEE Middle East Conference on Communications and Networking (MECOM), pp 1\u20136. https:\/\/doi.org\/10.1109\/MECOM61498.2024.10881096","DOI":"10.1109\/MECOM61498.2024.10881096"},{"key":"21448_CR51","doi-asserted-by":"crossref","unstructured":"Pandey A, Rudra B (2026) Hybrid classical quantum learning model framework for detection of deepfake audio. In: Proceedings of the 11th international conference on information systems security and privacy, vol 2, pp 231\u2013239","DOI":"10.5220\/0013258700003899"},{"issue":"4","key":"21448_CR52","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/ab4eb5","volume":"4","author":"M Benedetti","year":"2019","unstructured":"Benedetti M, Lloyd E, Sack S, Fiorentini M (2019) Parameterized quantum circuits as machine learning models. Quantum Science and Technology 4(4):043001","journal-title":"Quantum Science and Technology"},{"issue":"8","key":"21448_CR53","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780. https:\/\/doi.org\/10.1162\/neco.1997.9.8.1735","journal-title":"Neural Comput"},{"key":"21448_CR54","unstructured":"Chen SY-C, Yoo S, Fang Y-LL (2020) Quantum Long Short-Term Memory. arXiv:2009.01783"},{"key":"21448_CR55","doi-asserted-by":"crossref","unstructured":"Schuld M, Petruccione F (2018) Supervised Learning with Quantum Computers, 1st edn. Springer","DOI":"10.1007\/978-3-319-96424-9_1"},{"key":"21448_CR56","unstructured":"Bergholm V, Izaac J, Schuld M, Gogolin C, Ahmed S, Ajith V et al (2022) PennyLane: Automatic differentiation of hybrid quantum-classical computations. arXiv:1811.04968"},{"key":"21448_CR57","doi-asserted-by":"crossref","unstructured":"Jung J-W, Heo H-S, Tak H, Shim H-J, Chung JS, Lee B-J, Yu H-J, Evans N (2021) AASIST: Audio Anti-Spoofing using Integrated Spectro-Temporal Graph Attention Networks. arXiv:2110.01200","DOI":"10.1109\/ICASSP43922.2022.9747766"},{"key":"21448_CR58","doi-asserted-by":"crossref","unstructured":"Tak H, Patino J, Todisco M, Nautsch A, Evans N, Larcher A (2021) End-to-end anti-spoofing with RawNet2. arXiv:2011.01108","DOI":"10.1109\/ICASSP39728.2021.9414234"},{"key":"21448_CR59","doi-asserted-by":"publisher","unstructured":"Zhang Z, Yi X, Zhao X (2021) Fake speech detection using residual network with transformer encoder. In: Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security. IH&MMSec \u201921, pp 13\u201322. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3437880.3460408","DOI":"10.1145\/3437880.3460408"},{"key":"21448_CR60","doi-asserted-by":"crossref","unstructured":"Tak H, Todisco M, Wang X, Jung J-W, Yamagishi J, Evans N (2022) Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation. arXiv:2202.12233","DOI":"10.21437\/Odyssey.2022-16"},{"key":"21448_CR61","doi-asserted-by":"publisher","unstructured":"Guo Y, Huang H, Chen X, Zhao H, Wang Y (2025) Audio deepfake detection with self-supervised wavlm and multi-fusion attentive classifier, pp 12702\u201312706. https:\/\/doi.org\/10.1109\/ICASSP48485.2024.10447923","DOI":"10.1109\/ICASSP48485.2024.10447923"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21448-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-026-21448-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21448-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T10:52:54Z","timestamp":1773312774000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-026-21448-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,12]]},"references-count":61,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2026,3]]}},"alternative-id":["21448"],"URL":"https:\/\/doi.org\/10.1007\/s11042-026-21448-7","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,12]]},"assertion":[{"value":"2 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2026","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All authors agree with the content that will be published.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}],"article-number":"274"}}