{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T08:57:27Z","timestamp":1772182647122,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T00:00:00Z","timestamp":1686873600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T00:00:00Z","timestamp":1686873600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s11227-023-05465-z","type":"journal-article","created":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T01:01:48Z","timestamp":1686877308000},"page":"20684-20711","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Multi-head attention-based model for reconstructing continuous missing time series data"],"prefix":"10.1007","volume":"79","author":[{"given":"Huafeng","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yuxuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Linian","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Xiaojun","family":"Mei","sequence":"additional","affiliation":[]},{"given":"Dezhi","family":"Han","sequence":"additional","affiliation":[]},{"given":"Bing","family":"Han","sequence":"additional","affiliation":[]},{"given":"Tien-Hsiung","family":"Weng","sequence":"additional","affiliation":[]},{"given":"Kuan-Ching","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,16]]},"reference":[{"issue":"9","key":"5465_CR1","doi-asserted-by":"crossref","first-page":"9280","DOI":"10.1109\/TVT.2019.2931312","volume":"68","author":"C Lin","year":"2019","unstructured":"Lin C, Han G, Guizani M, Bi Y, Du J (2019) A scheme for delay-sensitive spatiotemporal routing in SDN-enabled underwater acoustic sensor networks. IEEE Trans Veh Technol 68(9):9280\u20139292","journal-title":"IEEE Trans Veh Technol"},{"issue":"7","key":"5465_CR2","doi-asserted-by":"crossref","first-page":"6392","DOI":"10.1109\/JIOT.2020.2974281","volume":"7","author":"W Liang","year":"2020","unstructured":"Liang W, Huang W, Long J, Zhang K, Li K-C, Zhang D (2020) Deep reinforcement learning for resource protection and real-time detection in IoT environment. IEEE Internet Things J 7(7):6392\u20136401","journal-title":"IEEE Internet Things J"},{"issue":"10","key":"5465_CR3","doi-asserted-by":"crossref","first-page":"2080","DOI":"10.1109\/LWC.2022.3193579","volume":"11","author":"X Mei","year":"2022","unstructured":"Mei X, Han D, Saeed N, Wu H, Ma T, Xian J (2022) Range difference-based target localization under stratification effect and NLOS bias in UWSNs. IEEE Wirel Commun Lett 11(10):2080\u20132084","journal-title":"IEEE Wirel Commun Lett"},{"key":"5465_CR4","volume":"127","author":"C Wang","year":"2022","unstructured":"Wang C, Shen X, Wang H, Mei H (2022) Energy-efficient collection scheme based on compressive sensing in underwater wireless sensor networks for environment monitoring over fading channels. Digit Signal Process 127:103530","journal-title":"Digit Signal Process"},{"issue":"4","key":"5465_CR5","doi-asserted-by":"crossref","first-page":"155014771770555","DOI":"10.1177\/1550147717705552","volume":"13","author":"W Liang","year":"2017","unstructured":"Liang W, Huang Y, Xu J, Xie S (2017) A distributed data secure transmission scheme in wireless sensor network. Int J Distrib Sens Netw 13(4):1550147717705552","journal-title":"Int J Distrib Sens Netw"},{"issue":"7","key":"5465_CR6","doi-asserted-by":"crossref","first-page":"1477","DOI":"10.3390\/s17071477","volume":"17","author":"C-C Kao","year":"2017","unstructured":"Kao C-C, Lin Y-S, Wu G-D, Huang C-J (2017) A comprehensive study on the internet of underwater things: applications, challenges, and channel models. Sensors 17(7):1477","journal-title":"Sensors"},{"issue":"4","key":"5465_CR7","doi-asserted-by":"crossref","first-page":"1899","DOI":"10.1109\/TWC.2009.080195","volume":"8","author":"D Pompili","year":"2009","unstructured":"Pompili D, Melodia T, Akyildiz IF (2009) A CDMA-based medium access control for underwater acoustic sensor networks. IEEE Trans Wirel Commun 8(4):1899\u20131909","journal-title":"IEEE Trans Wirel Commun"},{"key":"5465_CR8","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.jpdc.2020.11.003","volume":"149","author":"Z Xu","year":"2021","unstructured":"Xu Z, Liang W, Li K-C, Xu J, Jin H (2021) A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles. J Parallel Distrib Comput 149:29\u201339","journal-title":"J Parallel Distrib Comput"},{"key":"5465_CR9","first-page":"1","volume":"126","author":"T Zhang","year":"2021","unstructured":"Zhang T, Han D, Marino MD, Wang L, Li K-C (2021) An evolutionary-based approach for low-complexity intrusion detection in wireless sensor networks. Wirel Pers Commun 126:1\u201324","journal-title":"Wirel Pers Commun"},{"key":"5465_CR10","doi-asserted-by":"crossref","first-page":"3646","DOI":"10.1109\/ACCESS.2017.2660770","volume":"5","author":"X Liu","year":"2017","unstructured":"Liu X, Li J, Dong Z, Xiong F (2017) Joint design of energy-efficient clustering and data recovery for wireless sensor networks. IEEE Access 5:3646\u20133656","journal-title":"IEEE Access"},{"issue":"4","key":"5465_CR11","doi-asserted-by":"crossref","first-page":"530","DOI":"10.3390\/jmse10040530","volume":"10","author":"G Qiao","year":"2022","unstructured":"Qiao G, Muhammad A, Muzzammil M, Shoaib Khan M, Tariq MO, Khan MS (2022) Addressing the directionality challenge through RSSI-based multilateration technique, to localize nodes in underwater WSNs by using magneto-inductive communication. J Mar Sci Eng 10(4):530","journal-title":"J Mar Sci Eng"},{"issue":"4","key":"5465_CR12","doi-asserted-by":"crossref","first-page":"2096","DOI":"10.3390\/s23042096","volume":"23","author":"R Zhang","year":"2023","unstructured":"Zhang R, Zhang J, Wang Q, Zhang H (2023) DOIDS: an intrusion detection scheme based on DBSCAN for opportunistic routing in underwater wireless sensor networks. Sensors 23(4):2096","journal-title":"Sensors"},{"key":"5465_CR13","volume":"63","author":"VJ Debastiani","year":"2021","unstructured":"Debastiani VJ, Bastazini VA, Pillar VD (2021) Using phylogenetic information to impute missing functional trait values in ecological databases. Eco Inform 63:101315","journal-title":"Eco Inform"},{"key":"5465_CR14","doi-asserted-by":"crossref","unstructured":"Yogeshwary B, Shivaprakasha K, Yashwanth N (2022) Node localization techniques in underwater sensor networks. In: 2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS). IEEE, pp 1042\u20131050","DOI":"10.1109\/ICSCDS53736.2022.9760936"},{"issue":"7","key":"5465_CR15","doi-asserted-by":"crossref","first-page":"6507","DOI":"10.1109\/JIOT.2022.3226953","volume":"10","author":"Y Gou","year":"2022","unstructured":"Gou Y, Zhang T, Yang T, Liu J, Song S, Cui J-H (2022) A deep MARL-based power management strategy for improving the fair reuse of UWSNs. IEEE Internet Things J\u00a010(7), 6507\u20136522","journal-title":"IEEE Internet Things J"},{"key":"5465_CR16","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/j.aej.2023.01.028","volume":"68","author":"X Mei","year":"2023","unstructured":"Mei X, Han D, Chen Y, Wu H, Ma T (2023) Target localization using information fusion in WSNs-based marine search and rescue. Alex Eng J 68:227\u2013238","journal-title":"Alex Eng J"},{"key":"5465_CR17","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2022.102933","volume":"135","author":"O Bello","year":"2022","unstructured":"Bello O, Zeadally S (2022) Internet of underwater things communication: architecture, technologies, research challenges and future opportunities. Ad Hoc Netw 135:102933","journal-title":"Ad Hoc Netw"},{"key":"5465_CR18","doi-asserted-by":"crossref","first-page":"25959","DOI":"10.1109\/ACCESS.2019.2899916","volume":"7","author":"X Wei","year":"2019","unstructured":"Wei X, Liu Y, Gao S, Wang X, Yue H (2019) An RNN-based delay-guaranteed monitoring framework in underwater wireless sensor networks. IEEE access 7:25959\u201325971","journal-title":"IEEE access"},{"issue":"4","key":"5465_CR19","doi-asserted-by":"crossref","first-page":"6618","DOI":"10.1109\/JIOT.2019.2909038","volume":"6","author":"Y-F Zhang","year":"2019","unstructured":"Zhang Y-F, Thorburn PJ, Xiang W, Fitch P (2019) SSIM-a deep learning approach for recovering missing time series sensor data. IEEE Internet Things J 6(4):6618\u20136628","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"5465_CR20","doi-asserted-by":"crossref","first-page":"124","DOI":"10.3390\/jmse11010124","volume":"11","author":"SAH Mohsan","year":"2023","unstructured":"Mohsan SAH, Li Y, Sadiq M, Liang J, Khan MA (2023) Recent advances, future trends, applications and challenges of internet of underwater things (iout): a comprehensive review. J Mar Sci Eng 11(1):124","journal-title":"J Mar Sci Eng"},{"key":"5465_CR21","doi-asserted-by":"crossref","first-page":"1421","DOI":"10.1007\/s10994-019-05815-0","volume":"108","author":"S-Y Shih","year":"2019","unstructured":"Shih S-Y, Sun F-K, Lee H (2019) Temporal pattern attention for multivariate time series forecasting. Mach Learn 108:1421\u20131441","journal-title":"Mach Learn"},{"issue":"1","key":"5465_CR22","doi-asserted-by":"crossref","first-page":"904","DOI":"10.1109\/TITS.2022.3140229","volume":"24","author":"C Diao","year":"2022","unstructured":"Diao C, Zhang D, Liang W, Li K-C, Hong Y, Gaudiot J-L (2023) A novel spatial-temporal multi-scale alignment graph neural network security model for vehicles prediction. IEEE Trans Intell Transp Syst 24(1):904\u2013914","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"5465_CR23","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.patrec.2017.08.019","volume":"139","author":"\u00c9P Caillault","year":"2020","unstructured":"Caillault \u00c9P, Lefebvre A, Bigand A et al (2020) Dynamic time warping-based imputation for univariate time series data. Pattern Recogn Lett 139:139\u2013147","journal-title":"Pattern Recogn Lett"},{"key":"5465_CR24","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3156266","author":"W Liang","year":"2022","unstructured":"Liang W, Li Y, Xie K, Zhang D, Li K-C, Souri A, Li K (2022) Spatial-temporal aware inductive graph neural network for C-ITS data recovery. IEEE Trans Intell Transp Syst (forthcoming). https:\/\/doi.org\/10.1109\/TITS.2022.3156266","journal-title":"IEEE Trans Intell Transp Syst (forthcoming)"},{"key":"5465_CR25","doi-asserted-by":"crossref","DOI":"10.1016\/j.compag.2021.106377","volume":"189","author":"Y Zhang","year":"2021","unstructured":"Zhang Y, Thorburn PJ (2021) A dual-head attention model for time series data imputation. Comput Electron Agric 189:106377","journal-title":"Comput Electron Agric"},{"issue":"21","key":"5465_CR26","doi-asserted-by":"crossref","first-page":"7426","DOI":"10.3390\/s21217426","volume":"21","author":"I Mitiche","year":"2021","unstructured":"Mitiche I, McGrail T, Boreham P, Nesbitt A, Morison G (2021) Data-driven anomaly detection in high-voltage transformer bushings with LSTM auto-encoder. Sensors 21(21):7426","journal-title":"Sensors"},{"issue":"4","key":"5465_CR27","doi-asserted-by":"crossref","first-page":"3696","DOI":"10.1109\/TITS.2020.3040268","volume":"23","author":"Z Xiao","year":"2020","unstructured":"Xiao Z, Fu X, Zhang L, Zhang W, Liu RW, Liu Z, Goh RSM (2020) Big data driven vessel trajectory and navigating state prediction with adaptive learning, motion modeling and particle filtering techniques. IEEE Trans Intell Transp Syst 23(4):3696\u20133709","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"5465_CR28","doi-asserted-by":"crossref","unstructured":"Habiba M, Pearlmutter BA (2020) Neural odes for informative missingess in multivariate time series. In: 2020 31st Irish Signals and Systems Conference (ISSC). IEEE, pp 1\u20136","DOI":"10.1109\/ISSC49989.2020.9180216"},{"key":"5465_CR29","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.neucom.2016.08.044","volume":"218","author":"KJ Nishanth","year":"2016","unstructured":"Nishanth KJ, Ravi V (2016) Probabilistic neural network based categorical data imputation. Neurocomputing 218:17\u201325","journal-title":"Neurocomputing"},{"key":"5465_CR30","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.ins.2021.09.001","volume":"581","author":"K Sun","year":"2021","unstructured":"Sun K, Qian T, Chen X, Zhong M (2021) Context-aware seq2seq translation model for sequential recommendation. Inf Sci 581:60\u201372","journal-title":"Inf Sci"},{"key":"5465_CR31","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser \u0141, Polosukhin I (2017) Attention is all you need. In: Advances in Neural Information Processing Systems, vol 30"},{"issue":"3","key":"5465_CR32","first-page":"197","volume":"16","author":"L Beretta","year":"2016","unstructured":"Beretta L, Santaniello A (2016) Nearest neighbor imputation algorithms: a critical evaluation. BMC Med Inform Decis Mak 16(3):197\u2013208","journal-title":"BMC Med Inform Decis Mak"},{"issue":"1","key":"5465_CR33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1471-2474-12-109","volume":"12","author":"HM Ghomrawi","year":"2011","unstructured":"Ghomrawi HM, Mandl LA, Rutledge J, Alexiades MM, Mazumdar M (2011) Is there a role for expectation maximization imputation in addressing missing data in research using WOMAC questionnaire? comparison to the standard mean approach and a tutorial. BMC Musculoskelet Disord 12(1):1\u20137","journal-title":"BMC Musculoskelet Disord"},{"issue":"1","key":"5465_CR34","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1002\/mpr.329","volume":"20","author":"MJ Azur","year":"2011","unstructured":"Azur MJ, Stuart EA, Frangakis C, Leaf PJ (2011) Multiple imputation by chained equations: what is it and how does it work? Int J Methods Psychiatr Res 20(1):40\u201349","journal-title":"Int J Methods Psychiatr Res"},{"issue":"15","key":"5465_CR35","doi-asserted-by":"crossref","first-page":"2429","DOI":"10.1002\/sim.1519","volume":"22","author":"J Shao","year":"2003","unstructured":"Shao J, Zhong B (2003) Last observation carry-forward and last observation analysis. Stat Med 22(15):2429\u20132441","journal-title":"Stat Med"},{"issue":"17","key":"5465_CR36","doi-asserted-by":"crossref","first-page":"4343","DOI":"10.3390\/rs14174343","volume":"14","author":"X Mei","year":"2022","unstructured":"Mei X, Han D, Saeed N, Wu H, Chang C-C, Han B, Ma T, Xian J (2022) Trajectory optimization of autonomous surface vehicles with outliers for underwater target localization. Remote Sens 14(17):4343","journal-title":"Remote Sens"},{"key":"5465_CR37","doi-asserted-by":"crossref","first-page":"36018","DOI":"10.1109\/ACCESS.2022.3163856","volume":"10","author":"F Andayani","year":"2022","unstructured":"Andayani F, Theng LB, Tsun MT, Chua C (2022) Hybrid LSTM-transformer model for emotion recognition from speech audio files. IEEE Access 10:36018\u201336027","journal-title":"IEEE Access"},{"issue":"1","key":"5465_CR38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3419106","volume":"2","author":"T Shi","year":"2021","unstructured":"Shi T, Keneshloo Y, Ramakrishnan N, Reddy CK (2021) Neural abstractive text summarization with sequence-to-sequence models. ACM Trans Data Sci 2(1):1\u201337","journal-title":"ACM Trans Data Sci"},{"key":"5465_CR39","doi-asserted-by":"crossref","unstructured":"Llugsi R, El\u00a0Yacoubi S, Fontaine A, Lupera P (2021) A novel encoder\u2013decoder structure for time series analysis based on Bayesian uncertainty reduction. In: 2021 IEEE Latin American Conference on Computational Intelligence (LA-CCI). IEEE, pp 1\u20136","DOI":"10.1109\/LA-CCI48322.2021.9769850"},{"key":"5465_CR40","doi-asserted-by":"crossref","unstructured":"Cho K, Van\u00a0Merri\u00ebnboer B, Bahdanau D, Bengio Y (2014) On the properties of neural machine translation: encoder\u2013decoder approaches. arXiv preprint arXiv:1409.1259","DOI":"10.3115\/v1\/W14-4012"},{"issue":"8","key":"5465_CR41","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780","journal-title":"Neural Comput"},{"key":"5465_CR42","doi-asserted-by":"crossref","unstructured":"Van\u00a0Zoest V, Liu X, Ngai E (2021) Data quality evaluation, outlier detection and missing data imputation methods for IoT in smart cities. In: Machine Intelligence and Data Analytics for Sustainable Future Smart Cities. Springer, pp 1\u201318","DOI":"10.1007\/978-3-030-72065-0_1"},{"key":"5465_CR43","doi-asserted-by":"crossref","first-page":"18207","DOI":"10.1109\/ACCESS.2020.2968492","volume":"8","author":"H Liu","year":"2020","unstructured":"Liu H, Han D, Li D (2020) Fabric-IoT: a blockchain-based access control system in IoT. IEEE Access 8:18207\u201318218","journal-title":"IEEE Access"},{"key":"5465_CR44","doi-asserted-by":"crossref","unstructured":"Li K-C, Gupta BB, Agrawal DP (2020) Recent advances in security, privacy, and trust for internet of things (IoT) and cyber-physical systems (CPS)","DOI":"10.1201\/9780429270567"},{"key":"5465_CR45","volume":"81","author":"D Li","year":"2022","unstructured":"Li D, Han D, Zheng Z, Weng T-H, Li H, Liu H, Castiglione A, Li K-C (2022) MOOCschain: a blockchain-based secure storage and sharing scheme for MOOCs learning. Comput Stand Interfaces 81:103597","journal-title":"Comput Stand Interfaces"},{"issue":"2","key":"5465_CR46","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1109\/TR.2022.3190932","volume":"72","author":"W Liang","year":"2023","unstructured":"Liang W, Yang Y, Yang C, Hu Y, Xie S, Li K-C, Cao J (2023) PDPchain: a consortium blockchain-based privacy protection scheme for personal data. IEEE Trans Reliab 72(2):586\u2013598","journal-title":"IEEE Trans Reliab"},{"key":"5465_CR47","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3232173","author":"H Liu","year":"2023","unstructured":"Liu H, Han D, Cui M, Li K-C, Souri A, Shojafar M (2023) IdenMultiSig: identity-based decentralized multi-signature in internet of things. IEEE Trans Comput Soc Syst (forthcoming). https:\/\/doi.org\/10.1109\/TCSS.2022.3232173","journal-title":"IEEE Trans Comput Soc Syst (forthcoming)"},{"key":"5465_CR48","volume":"109","author":"X Lei","year":"2021","unstructured":"Lei X, Fan Y, Li K-C, Castiglione A, Hu Q (2021) High-precision linearized interpretation for fully connected neural network. Appl Soft Comput 109:107572","journal-title":"Appl Soft Comput"},{"issue":"4","key":"5465_CR49","doi-asserted-by":"crossref","first-page":"2515","DOI":"10.1007\/s10586-021-03399-w","volume":"25","author":"J Xu","year":"2022","unstructured":"Xu J, Lin J, Liang W, Li K-C (2022) Privacy preserving personalized blockchain reliability prediction via federated learning in IoT environments. Clust Comput 25(4):2515\u20132526","journal-title":"Clust Comput"},{"issue":"1","key":"5465_CR50","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s11227-022-04655-5","volume":"79","author":"D Li","year":"2023","unstructured":"Li D, Han D, Crespi N, Minerva R, Li K-C (2023) A blockchain-based secure storage and access control scheme for supply chain finance. J Supercomput 79(1):109\u2013138","journal-title":"J Supercomput"}],"updated-by":[{"DOI":"10.1007\/s11227-023-05515-6","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T00:00:00Z","timestamp":1688601600000}}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05465-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05465-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05465-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T17:06:03Z","timestamp":1697821563000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05465-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,16]]},"references-count":50,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["5465"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05465-z","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s11227-023-05515-6","asserted-by":"object"}]},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,16]]},"assertion":[{"value":"31 May 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 July 2023","order":3,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":4,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11227-023-05515-6","URL":"https:\/\/doi.org\/10.1007\/s11227-023-05515-6","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}