{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T08:13:05Z","timestamp":1775808785649,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T00:00:00Z","timestamp":1766188800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T00:00:00Z","timestamp":1766188800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s11219-025-09734-3","type":"journal-article","created":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T10:17:25Z","timestamp":1766225845000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["OSEL: boosting vulnerability detection with opcode slicing-enhanced feature learning"],"prefix":"10.1007","volume":"34","author":[{"given":"Yanxiang","family":"Tong","sequence":"first","affiliation":[]},{"given":"Shengkai","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Mingyue","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ben","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shunhui","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Pengcheng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,20]]},"reference":[{"key":"9734_CR1","unstructured":"Alam, M. T., Halder, R., & Maiti, A. (2024). Detection made easy: Potentials of large language models for solidity vulnerabilities. arXiv:2409.10574"},{"key":"9734_CR2","doi-asserted-by":"crossref","unstructured":"Ashouri, M. (2020). Etherolic: A practical security analyzer for smart contracts. In Proceedings of the 35th Annual ACM Symposium on Applied Computing, (pp. 353\u2013356)","DOI":"10.1145\/3341105.3374226"},{"issue":"3","key":"9734_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3182657","volume":"51","author":"R Baldoni","year":"2018","unstructured":"Baldoni, R., Coppa, E., D\u2019elia, D. C., Demetrescu, C., & Finocchi, I. (2018). A survey of symbolic execution techniques. ACM Computing Surveys, 51(3), 1\u201339.","journal-title":"ACM Computing Surveys"},{"key":"9734_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100198","volume":"11","author":"S Bistarelli","year":"2020","unstructured":"Bistarelli, S., Mazzante, G., Micheletti, M., Mostarda, L., Sestili, D., & Tiezzi, F. (2020). Ethereum smart contracts: Analysis and statistics of their source code and opcodes. Internet of Things, 11, Article 100198.","journal-title":"Internet of Things"},{"issue":"37","key":"9734_CR5","first-page":"2","volume":"3","author":"V Buterin","year":"2014","unstructured":"Buterin, V. (2014). A next-generation smart contract and decentralized application platform. White Paper, 3(37), 2\u20131.","journal-title":"White Paper"},{"key":"9734_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111550","volume":"195","author":"J Cai","year":"2023","unstructured":"Cai, J., Li, B., Zhang, J., Sun, X., & Chen, B. (2023). Combine sliced joint graph with graph neural networks for smart contract vulnerability detection. Journal of Systems and Software, 195, Article 111550.","journal-title":"Journal of Systems and Software"},{"key":"9734_CR7","doi-asserted-by":"crossref","unstructured":"Chen, J., Shao, Z., Yang, S., Shen, Y., Wang, Y., Chen, T., Shan, Z., & Zheng, Z. (2025). Numscout: Unveiling numerical defects in smart contracts using llm-pruning symbolic execution. IEEE Transactions on Software Engineering","DOI":"10.1109\/TSE.2025.3555622"},{"issue":"1","key":"9734_CR8","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1017\/S1351324916000334","volume":"23","author":"KW Church","year":"2017","unstructured":"Church, K. W. (2017). Word2vec. Natural Language Engineering, 23(1), 155\u2013162.","journal-title":"Natural Language Engineering"},{"key":"9734_CR9","doi-asserted-by":"crossref","unstructured":"Dannen, C. (2017) Solidity programming. Introducing Ethereum and solidity: Foundations of cryptocurrency and blockchain programming for beginners, (pp. 69\u201388)","DOI":"10.1007\/978-1-4842-2535-6_4"},{"key":"9734_CR10","doi-asserted-by":"crossref","unstructured":"Destefanis, G., Marchesi, M., Ortu, M., Tonelli, R., Bracciali, A., & Hierons, R. (2018). Smart contracts vulnerabilities: A call for blockchain software engineering? In 2018 International workshop on blockchain oriented software engineering, IEEE, (pp. 19\u201325)","DOI":"10.1109\/IWBOSE.2018.8327567"},{"key":"9734_CR11","unstructured":"Diligence, C. (2020). Smart contract weakness classification registry. https:\/\/swcregistry.io"},{"key":"9734_CR12","doi-asserted-by":"crossref","unstructured":"Durieux, T., Ferreira, J. F., Abreu, R., & Cruz, P. (2020). Empirical review of automated analysis tools on 47,587 ethereum smart contracts. In Proceedings of the ACM\/IEEE 42nd international conference on software engineering, (pp. 530\u2013541)","DOI":"10.1145\/3377811.3380364"},{"key":"9734_CR13","doi-asserted-by":"crossref","unstructured":"Feist, J., Grieco, G., & Groce, A. (2019). Slither: A static analysis framework for smart contracts. In 2019 IEEE\/ACM 2nd International workshop on emerging trends in software engineering for blockchain, IEEE, (pp. 8\u201315)","DOI":"10.1109\/WETSEB.2019.00008"},{"issue":"3","key":"9734_CR14","doi-asserted-by":"publisher","DOI":"10.1088\/2633-1357\/abcd29","volume":"1","author":"AK Gogineni","year":"2020","unstructured":"Gogineni, A. K., Swayamjyoti, S., Sahoo, D., Sahu, K. K., & Kishore, R. (2020). Multi-class classification of vulnerabilities in smart contracts using awd-lstm, with pre-trained encoder inspired from natural language processing. IOP SciNotes, 1(3), Article 035002.","journal-title":"IOP SciNotes"},{"key":"9734_CR15","doi-asserted-by":"crossref","unstructured":"Hao, Z., Zhang, B., & Li, H. (2025). Dchm: Dynamic collaboration of heterogeneous models through isomerism learning in a blockchain-powered federated learning framework. In Proceedings of the AAAI conference on artificial intelligence, vol. 39, (pp. 17077\u201317084)","DOI":"10.1609\/aaai.v39i16.33877"},{"issue":"8","key":"9734_CR16","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., & Schmidhuber, J. (1997). Long short-term memory. Neural Computation, 9(8), 1735\u20131780.","journal-title":"Neural Computation"},{"key":"9734_CR17","doi-asserted-by":"crossref","unstructured":"Hu, S., Huang, T., \u0130lhan, F., Tekin, S. F., & Liu, L. (2023). Large language model-powered smart contract vulnerability detection: New perspectives. In Proceedings of the 5th IEEE international conference on trust, privacy and security in intelligent systems and applications, IEEE, (pp. 297\u2013306)","DOI":"10.1109\/TPS-ISA58951.2023.00044"},{"issue":"5","key":"9734_CR18","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.3390\/s22051829","volume":"22","author":"J Huang","year":"2022","unstructured":"Huang, J., Zhou, K., Xiong, A., & Li, D. (2022). Smart contract vulnerability detection model based on multi-task learning. Sensors, 22(5), 1829.","journal-title":"Sensors"},{"key":"9734_CR19","doi-asserted-by":"crossref","unstructured":"Ince, P., Luo, X., Yu, J., Liu, J. K., & Du, X. (2024). Detect llama-finding vulnerabilities in smart contracts using large language models. In Australasian conference on information security and privacy, Springer, (pp. 424\u2013443)","DOI":"10.1007\/978-981-97-5101-3_23"},{"key":"9734_CR20","doi-asserted-by":"crossref","unstructured":"Jiang, F., Cao, Y., Xiao, J., Yi, H., Lei, G., Liu, M., Deng, S., & Wang, H. (2022). Vddl: A deep learning-based vulnerability detection model for smart contracts. In International conference on machine learning for cyber security, Springer, (pp. 72\u201386)","DOI":"10.1007\/978-3-031-20096-0_6"},{"key":"9734_CR21","doi-asserted-by":"crossref","unstructured":"Jiang, B., Liu, Y., & Chan, W. K. (2018). Contractfuzzer: Fuzzing smart contracts for vulnerability detection. In Proceedings of the 33rd ACM\/IEEE international conference on automated software engineering, (pp. 259\u2013269)","DOI":"10.1145\/3238147.3238177"},{"key":"9734_CR22","doi-asserted-by":"crossref","unstructured":"Lan, M., Tan, C.-L., Low, H.-B., & Sung, S.-Y. (2005). A comprehensive comparative study on term weighting schemes for text categorization with support vector machines. In Special interest tracks and posters of the 14th international conference on world wide web, (pp. 1032\u20131033)","DOI":"10.1145\/1062745.1062854"},{"issue":"12","key":"9734_CR23","doi-asserted-by":"publisher","first-page":"6999","DOI":"10.1109\/TNNLS.2021.3084827","volume":"33","author":"Z Li","year":"2021","unstructured":"Li, Z., Liu, F., Yang, W., Peng, S., & Zhou, J. (2021). A survey of convolutional neural networks: analysis, applications, and prospects. IEEE Transactions on Neural Networks and Learning Systems, 33(12), 6999\u20137019.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"11","key":"9734_CR24","doi-asserted-by":"publisher","first-page":"4886","DOI":"10.1109\/TSE.2023.3317209","volume":"49","author":"Z Li","year":"2023","unstructured":"Li, Z., Lu, S., Zhang, R., Zhao, Z., Liang, R., Xue, R., Li, W., Zhang, F., & Gao, S. (2023). Vulhunter: Hunting vulnerable smart contracts at evm bytecode-level via multiple instance learning. IEEE Transactions on Software Engineering, 49(11), 4886\u20134916.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9734_CR25","doi-asserted-by":"crossref","unstructured":"Liu, C., Liu, H., Cao, Z., Chen, Z., Chen, B., & Roscoe, B. (2018). Reguard: Finding reentrancy bugs in smart contracts. In Proceedings of the 40th international conference on software engineering: companion proceeedings, (pp. 65\u201368)","DOI":"10.1145\/3183440.3183495"},{"key":"9734_CR26","doi-asserted-by":"crossref","unstructured":"Liu, H., Liu, C., Zhao, W., Jiang, Y., & Sun, J. (2018). S-gram: towards semantic-aware security auditing for ethereum smart contracts. In Proceedings of the 33rd ACM\/IEEE international conference on automated software engineering, (pp. 814\u2013819)","DOI":"10.1145\/3238147.3240728"},{"key":"9734_CR27","doi-asserted-by":"crossref","unstructured":"Liu, Z., Qian, P., Wang, X., Zhu, L., He, Q., & Ji, S. (2021b). Smart contract vulnerability detection: from pure neural network to interpretable graph feature and expert pattern fusion. arXiv:2106.09282","DOI":"10.24963\/ijcai.2021\/379"},{"key":"9734_CR28","doi-asserted-by":"crossref","unstructured":"Liu, C., Sang, Z., Duan, L., Ni, W., Wang, W., & Li, C. (2024). Tlscg: Transfer learning-based efficient anomalous smart contract generation to empower unknown vulnerability detection. In 2024 IEEE International conference on web services, IEEE, (pp. 468\u2013478)","DOI":"10.1109\/ICWS62655.2024.00068"},{"key":"9734_CR29","doi-asserted-by":"crossref","unstructured":"Liu, Y., Xue, Y., Wu, D., Sun, Y., Li, Y., Shi, M., & Liu, Y. (2024). Propertygpt: Llm-driven formal verification of smart contracts through retrieval-augmented property generation. arXiv:2405.02580","DOI":"10.14722\/ndss.2025.241357"},{"issue":"2","key":"9734_CR30","first-page":"1296","volume":"35","author":"Z Liu","year":"2021","unstructured":"Liu, Z., Qian, P., Wang, X., Zhuang, Y., Qiu, L., & Wang, X. (2021). Combining graph neural networks with expert knowledge for smart contract vulnerability detection. IEEE Transactions on Knowledge and Data Engineering, 35(2), 1296\u20131310.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"9734_CR31","doi-asserted-by":"crossref","unstructured":"Luo, F., Luo, R., Chen, T., Qiao, A., He, Z., Song, S., Jiang, Y., & Li, S. (2024). Scvhunter: Smart contract vulnerability detection based on heterogeneous graph attention network. In Proceedings of the IEEE\/ACM 46th international conference on software engineering, (pp. 1\u201313)","DOI":"10.1145\/3597503.3639213"},{"key":"9734_CR32","unstructured":"Lutz, O., Chen, H., Fereidooni, H., Sendner, C., Dmitrienko, A., Sadeghi, A. R., & Koushanfar, F. (2021). Escort: ethereum smart contracts vulnerability detection using deep neural network and transfer learning. arXiv:2103.12607"},{"key":"9734_CR33","doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D.-H., Olickel, H., Saxena, P., & Hobor, A. (2016). Making smart contracts smarter. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, (pp. 254\u2013269)","DOI":"10.1145\/2976749.2978309"},{"key":"9734_CR34","doi-asserted-by":"crossref","unstructured":"Ma, W., Wu, D., Sun, Y., Wang, T., Liu, S., Zhang, J., Xue, Y., & Liu, Y. (2024). Combining fine-tuning and llm-based agents for intuitive smart contract auditing with justifications. arXiv:2403.16073","DOI":"10.1109\/ICSE55347.2025.00027"},{"key":"9734_CR35","doi-asserted-by":"crossref","unstructured":"Mi, F., Wang, Z., Zhao, C., Guo, J., Ahmed, F., & Khan, L. (2021). Vscl: automating vulnerability detection in smart contracts with deep learning. In 2021 IEEE International conference on blockchain and cryptocurrency, IEEE, (pp. 1\u20139)","DOI":"10.1109\/ICBC51069.2021.9461050"},{"key":"9734_CR36","doi-asserted-by":"crossref","unstructured":"Mossberg, M., Manzano, F., Hennenfent, E., Groce, A., Grieco, G., Feist, J., Brunson, T., & Dinaburg, A. (2019). Manticore: A user-friendly symbolic execution framework for binaries and smart contracts. In Proceedings of the 34th IEEE\/ACM international conference on automated software engineering, IEEE, (pp. 1186\u20131189)","DOI":"10.1109\/ASE.2019.00133"},{"key":"9734_CR37","unstructured":"Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system"},{"key":"9734_CR38","doi-asserted-by":"crossref","unstructured":"Nikoli\u0107, I., Kolluri, A., Sergey, I., Saxena, P., & Hobor, A. (2018). Finding the greedy, prodigal, and suicidal contracts at scale. In Proceedings of the 34th annual computer security applications conference, (pp. 653\u2013663)","DOI":"10.1145\/3274694.3274743"},{"key":"9734_CR39","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.neucom.2021.03.091","volume":"452","author":"Z Niu","year":"2021","unstructured":"Niu, Z., Zhong, G., & Yu, H. (2021). A review on the attention mechanism of deep learning. Neurocomputing, 452, 48\u201362.","journal-title":"Neurocomputing"},{"key":"9734_CR40","unstructured":"Ponciano, J. (2021). More than $600 million stolen in ethereum and other cryptocurrencies-marking one of crypto\u2019s biggest hacks ever. Forbes"},{"key":"9734_CR41","doi-asserted-by":"publisher","first-page":"19685","DOI":"10.1109\/ACCESS.2020.2969429","volume":"8","author":"P Qian","year":"2020","unstructured":"Qian, P., Liu, Z., He, Q., Zimmermann, R., & Wang, X. (2020). Towards automated reentrancy detection for smart contracts based on sequential models. IEEE Access, 8, 19685\u201319695.","journal-title":"IEEE Access"},{"issue":"1","key":"9734_CR42","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/951787.951766","volume":"10","author":"G Salton","year":"1973","unstructured":"Salton, G., & Yu, C. T. (1973). On the construction of effective vocabularies for information retrieval. Acm Sigplan Notices, 10(1), 48\u201360.","journal-title":"Acm Sigplan Notices"},{"key":"9734_CR43","volume-title":"The DAO: A million dollar lesson in blockchain governance","author":"F Santos","year":"2018","unstructured":"Santos, F., & Kostakis, V. (2018). The DAO: A million dollar lesson in blockchain governance. Ragnar Nurkse Department of Innovation and Governance: School of Business and Governance."},{"issue":"75","key":"9734_CR44","first-page":"51003","volume":"13","author":"N Sharma","year":"2022","unstructured":"Sharma, N., & Sharma, S. (2022). A survey of mythril, a smart contract security analysis tool for evm bytecode. Indian Journal of Natural Sciences, 13(75), 51003\u201351010.","journal-title":"Indian Journal of Natural Sciences"},{"issue":"566","key":"9734_CR45","first-page":"7","volume":"182","author":"N Srivastava","year":"2013","unstructured":"Srivastava, N. (2013). Improving neural networks with dropout. University of Toronto, 182(566), 7.","journal-title":"University of Toronto"},{"key":"9734_CR46","doi-asserted-by":"crossref","unstructured":"Sun, Y., Wu, D., Xue, Y., Liu, H., Wang, H., Xu, Z., Xie, X., & Liu, Y. (2024). Gptscan: Detecting logic vulnerabilities in smart contracts by combining gpt with program analysis. In Proceedings of the IEEE\/ACM 46th international conference on software engineering, (pp. 1\u201313)","DOI":"10.1145\/3597503.3639117"},{"key":"9734_CR47","unstructured":"Tann, W. J.-W., Han, X. J., Gupta, S. S., & Ong, Y.-S. (2018). Towards safer smart contracts: A sequence learning approach to detecting security threats. arXiv:1811.06632"},{"key":"9734_CR48","doi-asserted-by":"crossref","unstructured":"Tikhomirov, S., Voskresenskaya, E., Ivanitskiy, I., Takhaviev, R., Marchenko, E., & Alexandrov, Y. (2018). Smartcheck: Static analysis of ethereum smart contracts. In Proceedings of the 1st international workshop on emerging trends in software engineering for blockchain, (pp. 9\u201316)","DOI":"10.1145\/3194113.3194115"},{"key":"9734_CR49","doi-asserted-by":"crossref","unstructured":"Tsankov, P., Dan, A., Drachsler-Cohen, D., Gervais, A., Buenzli, F., & Vechev, M. (2018). Securify: Practical security analysis of smart contracts. In 2018 ACM SIGSAC conference on computer and communications security, (pp. 67\u201382)","DOI":"10.1145\/3243734.3243780"},{"key":"9734_CR50","doi-asserted-by":"crossref","unstructured":"Wu, H., Zhang, Z., Wang, S., Lei, Y., Lin, B., Qin, Y., Zhang, H., & Mao, X. (2021). Peculiar: Smart contract vulnerability detection based on crucial data flow graph and pre-training techniques. In Proceedings of the 32nd international symposium on software reliability engineering, IEEE, (pp. 378\u2013389)","DOI":"10.1109\/ISSRE52982.2021.00047"},{"key":"9734_CR51","doi-asserted-by":"crossref","unstructured":"Yadav, S., & Shukla, S. (2016). Analysis of k-fold cross-validation over hold-out validation on colossal datasets for quality classification. In Proceedings of the 6th international conference on advanced computing, IEEE, (pp. 78\u201383)","DOI":"10.1109\/IACC.2016.25"},{"key":"9734_CR52","doi-asserted-by":"crossref","unstructured":"Yang, Z., Man, G., & Yue, S. (2023). Automated smart contract vulnerability detection using fine-tuned large language models. In Proceedings of the 2023 6th international conference on blockchain technology and applications, (pp. 19\u201323)","DOI":"10.1145\/3651655.3651658"},{"key":"9734_CR53","doi-asserted-by":"crossref","unstructured":"Yu, L., Huang, Z., Yuan, H., Cheng, S., Yang, L., Zhang, F., ... & Zuo, C. (2025). Smart-llama-dpo: Reinforced large language model for explainable smart contract vulnerability detection. In Proceedings of the ACM on software engineering, (pp. 182\u2013205)","DOI":"10.1145\/3728878"},{"key":"9734_CR54","doi-asserted-by":"crossref","unstructured":"Zeng, Q., He, J., Zhao, G., Li, S., Yang, J., Tang, H., & Luo, H. (2022). Ethergis: A vulnerability detection framework for ethereum smart contracts based on graph learning features. In Proceedings of the 46th annual computers, software, and applications conference, IEEE, (pp. 1742\u20131749)","DOI":"10.1109\/COMPSAC54236.2022.00277"},{"key":"9734_CR55","doi-asserted-by":"crossref","unstructured":"Zhang, M., Zhang, P., Luo, X., & Xiao, F. (2020). Source code obfuscation for smart contracts. In Proceedings of the 27th Asia-Pacific software engineering conference, IEEE, (pp. 513\u2013514)","DOI":"10.1109\/APSEC51365.2020.00069"},{"issue":"9","key":"9734_CR56","doi-asserted-by":"publisher","first-page":"4456","DOI":"10.1109\/TSE.2023.3298609","volume":"49","author":"P Zhang","year":"2023","unstructured":"Zhang, P., Yu, Q., Xiao, Y., Dong, H., Luo, X., Wang, X., & Zhang, M. (2023). Bian: Smart contract source code obfuscation. IEEE Transactions on Software Engineering, 49(9), 4456\u20134476.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9734_CR57","doi-asserted-by":"crossref","unstructured":"Zhong, Z., Zheng, Z., Dai, H.-N., Xue, Q., Chen, J., & Nan, Y. (2024). Prettysmart: Detecting permission re-delegation vulnerability for token behaviors in smart contracts. In Proceedings of the IEEE\/ACM 46th international conference on software engineering, (pp. 1\u201312)","DOI":"10.1145\/3597503.3639140"},{"key":"9734_CR58","doi-asserted-by":"crossref","unstructured":"Zhuang, Y., Liu, Z., Qian, P., Liu, Q., Wang, X., & He, Q. (2020). Smart contract vulnerability detection using graph neural networks. In Proceedings of the twenty-ninth international conference on international joint conferences on artificial intelligence, (pp. 3283\u20133290)","DOI":"10.24963\/ijcai.2020\/454"}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-025-09734-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11219-025-09734-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-025-09734-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T07:39:20Z","timestamp":1775806760000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11219-025-09734-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,20]]},"references-count":58,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["9734"],"URL":"https:\/\/doi.org\/10.1007\/s11219-025-09734-3","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"value":"0963-9314","type":"print"},{"value":"1573-1367","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,20]]},"assertion":[{"value":"16 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"1"}}