{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T07:46:18Z","timestamp":1768722378517,"version":"3.49.0"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,7,28]],"date-time":"2024-07-28T00:00:00Z","timestamp":1722124800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,28]],"date-time":"2024-07-28T00:00:00Z","timestamp":1722124800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the National Key Research and Development Program of China","award":["2020AAA0106302"],"award-info":[{"award-number":["2020AAA0106302"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Vis"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s11263-024-02177-6","type":"journal-article","created":{"date-parts":[[2024,7,28]],"date-time":"2024-07-28T09:01:43Z","timestamp":1722157303000},"page":"353-371","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Face3DAdv: Exploiting Robust Adversarial 3D Patches on Physical Face Recognition"],"prefix":"10.1007","volume":"133","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9502-9962","authenticated-orcid":false,"given":"Xiao","family":"Yang","sequence":"first","affiliation":[]},{"given":"Longlong","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Tianyu","family":"Pang","sequence":"additional","affiliation":[]},{"given":"Yinpeng","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Yikai","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hang","family":"Su","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,28]]},"reference":[{"key":"2177_CR1","unstructured":"Athalye, A., Engstrom, L., Ilyas, A., & Kwok, K. (2018). Synthesizing robust adversarial examples. In International conference on machine learning (ICML)."},{"key":"2177_CR2","unstructured":"Brown, T. B., Man\u00e9, D., Roy, A., Abadi, M., & Gilmer, J. (2017). Adversarial patch. arXiv preprint arXiv:1712.09665."},{"key":"2177_CR3","doi-asserted-by":"crossref","unstructured":"Chan, E. R., Lin, C. Z., Chan, M. A., Nagano, K., Pan, B., De Mello, S., Gallo, O., Guibas, L. J., Tremblay, J., Khamis, S., & Karras T. (2022). Efficient geometry-aware 3d generative adversarial networks. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 16123\u201316133).","DOI":"10.1109\/CVPR52688.2022.01565"},{"key":"2177_CR4","doi-asserted-by":"crossref","unstructured":"Chen, S., Liu, Y., & Gao, X., & Han Z. (2018). MobileFaceNets: Efficient CNNs for accurate real-time face verification on mobile devices. In: Chinese conference on biometric recognition (pp. 428\u2013438). Springer.","DOI":"10.1007\/978-3-319-97909-0_46"},{"key":"2177_CR5","unstructured":"Cheng, Z., Choi, H., Liang, J., Feng, S., Tao, G., Liu, D., Zuzak, M., & Zhang, X. (2023). Fusion is not enough: Single modal attack on fusion models for 3D object detection. In The Twelfth International Conference on Learning Representations."},{"key":"2177_CR6","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., & Zafeiriou, S. (2019a). ArcFace: Additive angular margin loss for deep face recognition. In The IEEE conference on computer vision and pattern recognition (CVPR).","DOI":"10.1109\/CVPR.2019.00482"},{"key":"2177_CR7","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., & Zafeiriou, S. (2019b). ArcFace: Additive angular margin loss for deep face recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 4690\u20134699).","DOI":"10.1109\/CVPR.2019.00482"},{"key":"2177_CR8","doi-asserted-by":"crossref","unstructured":"Deng, Y., Yang, J., Chen, D., Wen, F., & Tong, X. (2020). Disentangled and controllable face image generation via 3D imitative-contrastive learning. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 5154\u20135163).","DOI":"10.1109\/CVPR42600.2020.00520"},{"key":"2177_CR9","doi-asserted-by":"crossref","unstructured":"Diao, Y., Shao, T., Yang, Y. L., Zhou, K., & Wang, H. (2021). BASAR: Black-box attack on skeletal action recognition. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 7597\u20137607).","DOI":"10.1109\/CVPR46437.2021.00751"},{"key":"2177_CR10","doi-asserted-by":"crossref","unstructured":"Dong, Y., Liao, F., Pang, T., Su, H., Zhu, J., Hu, X., & Li, J. (2018). Boosting adversarial attacks with momentum. In Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR).","DOI":"10.1109\/CVPR.2018.00957"},{"key":"2177_CR11","doi-asserted-by":"crossref","unstructured":"Dong, Y., Su, H., Wu, B., Li, Z., Liu, W., Zhang, T., & Zhu, J. (2019). Efficient decision-based black-box adversarial attacks on face recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR).","DOI":"10.1109\/CVPR.2019.00790"},{"key":"2177_CR12","doi-asserted-by":"crossref","unstructured":"Elmahmudi, A., & Ugail, H. (2018). Experiments on deep face recognition using partial faces. In 2018 international conference on cyberworlds (CW) (pp. 357\u2013362). IEEE.","DOI":"10.1109\/CW.2018.00071"},{"key":"2177_CR13","doi-asserted-by":"crossref","unstructured":"Eykholt, K., Evtimov, I., Fernandes, E., Fernandes, E., Li, B., Rahmati, A., Xiao, C., Prakash, A., Kohno, T., & Song, D. (2018). Robust physical-world attacks on deep learning visual classification. In Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR).","DOI":"10.1109\/CVPR.2018.00175"},{"key":"2177_CR14","doi-asserted-by":"publisher","first-page":"1535","DOI":"10.1109\/TIFS.2023.3337970","volume":"19","author":"H Fang","year":"2023","unstructured":"Fang, H., Liu, A., Wan, J., Escalera, S., Zhao, C., Zhang, X., Li, S. Z., & Lei, Z. (2023). Surveillance face anti-spoofing. IEEE Transactions on Information Forensics and Security, 19, 1535\u20131546.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2177_CR15","unstructured":"GeekPwn AFMC (2020). http:\/\/2020.geekpwn.org\/zh\/index.html Accessed: 2020-10-24."},{"key":"2177_CR16","unstructured":"Goodfellow, I. J., Shlens, J., & Szegedy, C. (2015). Explaining and harnessing adversarial examples. In International conference on learning representations (ICLR)."},{"key":"2177_CR17","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., & Sun, J. (2016). Deep residual learning for image recognition. In CVPR.","DOI":"10.1109\/CVPR.2016.90"},{"key":"2177_CR18","doi-asserted-by":"crossref","unstructured":"Henderson, P., Tsiminaki, V., & Lampert, C. H. (2020). Leveraging 2D data to learn textured 3D mesh generation. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 7498\u20137507).","DOI":"10.1109\/CVPR42600.2020.00752"},{"key":"2177_CR19","unstructured":"Huang, G. B., Mattar, M., Berg, T., & Learned-Miller, E. (2007). Labeled faces in the wild: A database forstudying face recognition in unconstrained environments. In Technical report."},{"key":"2177_CR20","doi-asserted-by":"crossref","unstructured":"Huh, M., Zhang, R., Zhu, J. Y., Paris, S., & Hertzmann, A. (2020). Transforming and projecting images into class-conditional generative networks. In European conference on computer vision (pp. 17\u201334). Springer.","DOI":"10.1007\/978-3-030-58536-5_2"},{"key":"2177_CR21","unstructured":"Karras, T., Aila, T., Laine, S., & Lehtinen, J. (2017). Progressive growing of GANs for improved quality, stability, and variation. arXiv preprint arXiv:1710.10196."},{"key":"2177_CR22","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., & Aila, T. (2019). A style-based generator architecture for generative adversarial networks. In Proceedings of the IEEE conference on computer vision and pattern recognition.","DOI":"10.1109\/CVPR.2019.00453"},{"key":"2177_CR23","unstructured":"Kingma, D., & Ba, J. (2015). Adam: A method for stochastic optimization. In International conference on learning representations (ICLR)."},{"key":"2177_CR24","unstructured":"Kingma, D. P., & Ba, J. (2014). Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980."},{"key":"2177_CR25","doi-asserted-by":"crossref","unstructured":"Knoche, M., Teepe, T., H\u00f6rmann, S., & Rigoll, G. (2023). Explainable model-agnostic similarity and confidence in face verification. In Proceedings of the IEEE\/CVF winter conference on applications of computer vision (pp. 711\u2013718).","DOI":"10.1109\/WACVW58289.2023.00078"},{"key":"2177_CR26","doi-asserted-by":"crossref","unstructured":"Komkov, S., & Petiushko, A. (2021). AdvDat: Real-world adversarial attack on ArcFace face ID system. In 2020 25th International conference on pattern recognition (ICPR) (pp. 819\u2013826). IEEE.","DOI":"10.1109\/ICPR48806.2021.9412236"},{"key":"2177_CR27","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I., & Bengio, S. (2017). Adversarial examples in the physical world. In International conference on learning representations (ICLR) workshops.","DOI":"10.1201\/9781351251389-8"},{"key":"2177_CR28","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., & Vladu, A. (2018). Towards deep learning models resistant to adversarial attacks. In International conference on learning representations (ICLR)."},{"key":"2177_CR29","doi-asserted-by":"crossref","unstructured":"Pautov, M., Melnikov, G., Kaziakhmedov, E., Kireev, K., & Petiushko, A. (2019). On adversarial patches: Real-world attack on ArcFace-100 face recognition system. In 2019 international multi-conference on engineering, computer and information sciences (SIBIRCON) (pp. 0391\u20130396). IEEE.","DOI":"10.1109\/SIBIRCON48586.2019.8958134"},{"key":"2177_CR30","unstructured":"Ravi, N., Reizenstein, J., Novotny, D., Gordon, T., Lo, W. Y., Johnson, J., & Gkioxari, G. (2020). Accelerating 3D deep learning with PyTorch3D. arXiv preprint arXiv:2007.08501."},{"key":"2177_CR31","doi-asserted-by":"crossref","unstructured":"Selvaraju, R. R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., & Batra, D. (2017). Grad-CAM: Visual explanations from deep networks via gradient-based localization. In Proceedings of the IEEE international conference on computer vision (pp. 618\u2013626).","DOI":"10.1109\/ICCV.2017.74"},{"key":"2177_CR32","doi-asserted-by":"crossref","unstructured":"Sharif, M., Bhagavatula, S., Bauer, L., & Reiter, M. K. (2016). Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security (pp. 1528\u20131540). ACM.","DOI":"10.1145\/2976749.2978392"},{"key":"2177_CR33","unstructured":"Sharif, M., Bhagavatula, S., Bauer, L., & Reiter, M. K. (2017). Adversarial generative nets: Neural network attacks on state-of-the-art face recognition. arXiv preprint arXiv:1801.00349."},{"key":"2177_CR34","doi-asserted-by":"publisher","first-page":"4063","DOI":"10.1109\/TIFS.2021.3102492","volume":"16","author":"M Shen","year":"2021","unstructured":"Shen, M., Yu, H., Zhu, L., Xu, K., Li, Q., & Hu, J. (2021). Effective and robust physical-world attacks on deep learning face recognition systems. IEEE Transactions on Information Forensics and Security, 16, 4063\u20134077.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2177_CR35","doi-asserted-by":"crossref","unstructured":"Shi, Y., Aggarwal, D., & Jain, A. K. (2021). Lifting 2D stylegan for 3D-aware face generation. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (pp. 6258\u20136266).","DOI":"10.1109\/CVPR46437.2021.00619"},{"key":"2177_CR36","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., & Fergus, R., (2014). Intriguing properties of neural networks. In International conference on learning representations (ICLR)."},{"key":"2177_CR37","unstructured":"Technologies, V. (2020). http:\/\/visagetechnologies.com\/face-recognition-in-cars\/ Accessed: 2020-10-9."},{"key":"2177_CR38","doi-asserted-by":"crossref","unstructured":"Tewari, A., Elgharib, M., Bharaj, G., Bernard, F., Seidel, H. P., P\u00e9rez, P., Zollhofer, M., & Theobalt, C. (2020). StyleRig: Rigging StyleGAN for 3D control over portrait images. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 6142\u20136151).","DOI":"10.1109\/CVPR42600.2020.00618"},{"key":"2177_CR39","doi-asserted-by":"crossref","unstructured":"Tong, L., Chen, Z., Ni, J., Cheng, W., Song, D., Chen, H., & Vorobeychik, Y.(2021). FaceSec: A fine-grained robustness evaluation framework for face recognition systems. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 13254\u201313263).","DOI":"10.1109\/CVPR46437.2021.01305"},{"key":"2177_CR40","doi-asserted-by":"crossref","unstructured":"Tuan\u00a0Tran, A., Hassner, T., Masi, I., & Medioni, G. (2017). Regressing robust and discriminative 3D morphable models with a very deep neural network. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 5163\u20135172).","DOI":"10.1109\/CVPR.2017.163"},{"key":"2177_CR41","doi-asserted-by":"crossref","unstructured":"Wang, H., Wang, Y., Zhou, Z., Ji, X., Gong, D., Zhou, J., Li, Z., & Liu, W. (2018). CosFace: Large margin cosine loss for deep face recognition. In CVPR.","DOI":"10.1109\/CVPR.2018.00552"},{"key":"2177_CR42","doi-asserted-by":"crossref","unstructured":"Wang, H., He, F., Peng, Z., Shao, T., Yang, Y. L., Zhou, K. & Hogg, D. (2021). Understanding the robustness of skeleton-based action recognition under adversarial attack. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 14656\u201314665).","DOI":"10.1109\/CVPR46437.2021.01442"},{"key":"2177_CR43","doi-asserted-by":"crossref","unstructured":"Wen, Y., Zhang, K., Li, Z., & Qiao, Y. (2016). A discriminative feature learning approach for deep face recognition. In ECCV.","DOI":"10.1007\/978-3-319-46478-7_31"},{"key":"2177_CR44","doi-asserted-by":"crossref","unstructured":"Xiao, C., Yang, D., Li, B., Deng, J., & Liu, M. (2019). MeshAdv: Adversarial meshes for visual recognition. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 6898\u20136907).","DOI":"10.1109\/CVPR.2019.00706"},{"key":"2177_CR45","doi-asserted-by":"crossref","unstructured":"Xiao, Z., Gao, X., Fu, C., Dong, Y., Gao, W., Zhang, X., Zhou, J. & Zhu, J. (2021). Improving transferability of adversarial patches on face recognition with generative models. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 11845\u201311854).","DOI":"10.1109\/CVPR46437.2021.01167"},{"key":"2177_CR46","doi-asserted-by":"crossref","unstructured":"Xie, C., Zhang, Z., Zhou, Y., Bai, S., Wang, J., Ren, Z. & Yuille, A. L. (2019). Improving transferability of adversarial examples with input diversity. In Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR).","DOI":"10.1109\/CVPR.2019.00284"},{"key":"2177_CR47","doi-asserted-by":"crossref","unstructured":"Xiong, X., Wen, X., & Huang, C. (2019). Improving RGB-D face recognition via transfer learning from a pretrained 2D network. In International symposium on benchmarking, measuring and optimization (pp. 141\u2013148). Springer.","DOI":"10.1007\/978-3-030-49556-5_14"},{"key":"2177_CR48","doi-asserted-by":"crossref","unstructured":"Xu, K., Zhang, G., Liu, S., Fan, Q., Sun, M., Chen, H., Chen, P. Y., Wang, Y. & Lin, X. (2020). Adversarial T-shirt! evading person detectors in a physical world. In European conference on computer vision (pp. 665\u2013681). Springer.","DOI":"10.1007\/978-3-030-58558-7_39"},{"key":"2177_CR49","doi-asserted-by":"crossref","unstructured":"Yang, X., Wei, F., Zhang, H., & Zhu, J. (2020a). Design and interpretation of universal adversarial patches in face detection. In Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part XVII 16 (pp. 174\u2013191).","DOI":"10.1007\/978-3-030-58520-4_11"},{"key":"2177_CR50","unstructured":"Yang, X., Yang, D., Dong, Y., Su, H., Yu, W., & Zhu, J. (2020b). RobFR: Benchmarking adversarial robustness on face recognition. arXiv preprint arXiv:2007.04118."},{"key":"2177_CR51","doi-asserted-by":"crossref","unstructured":"Yang, X., Dong, Y., Pang, T., Su, H., & Zhu, J. (2021a). Boosting transferability of targeted adversarial examples via hierarchical generative networks. arXiv preprint arXiv:2107.01809.","DOI":"10.1007\/978-3-031-19772-7_42"},{"key":"2177_CR52","doi-asserted-by":"crossref","unstructured":"Yang, X., Dong, Y., Pang, T., Su, H., Zhu, J., Chen, Y., & Xue, H. (2021b). Towards face encryption by generating adversarial identity masks. In Proceedings of the IEEE\/CVF international conference on computer vision (pp. 3897\u20133907).","DOI":"10.1109\/ICCV48922.2021.00387"},{"key":"2177_CR53","doi-asserted-by":"crossref","unstructured":"Yang, X., Liu, C., Xu, L., Wang, Y., Dong, Y., Chen, N., Su, H., & Zhu, J. (2023). Towards effective adversarial textured 3D meshes on physical face recognition. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 4119\u20134128).","DOI":"10.1109\/CVPR52729.2023.00401"},{"key":"2177_CR54","doi-asserted-by":"crossref","unstructured":"Yin, B., Tran, L., Li, H., Shen, X., & Liu, X. (2019). Towards interpretable face recognition. In Proceedings of the IEEE\/CVF international conference on computer vision (pp. 9348\u20139357).","DOI":"10.1109\/ICCV.2019.00944"},{"key":"2177_CR55","doi-asserted-by":"publisher","first-page":"102988","DOI":"10.1016\/j.cviu.2020.102988","volume":"197","author":"B Zhang","year":"2020","unstructured":"Zhang, B., Tondi, B., & Barni, M. (2020). Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability. Computer Vision and Image Understanding, 197, 102988.","journal-title":"Computer Vision and Image Understanding"},{"key":"2177_CR56","unstructured":"Zhang, J., Chen, L., Liu, B., Ouyang, B., Xie, Q., Zhu, J., Li, W., & Meng, Y. (2021). 3D adversarial attacks beyond point cloud. arXiv preprint arXiv:2104.12146."},{"key":"2177_CR57","doi-asserted-by":"crossref","unstructured":"Zhao, X., & Stamm, M. C. (2020). Defenses against multi-sticker physical domain attacks on classifiers. In European conference on computer vision (pp. 202\u2013219). Springer.","DOI":"10.1007\/978-3-030-66415-2_13"},{"key":"2177_CR58","unstructured":"Zheng, X., Fan, Y., Wu, B., Zhang, Y., Wang, J., & Pan, S. (2021). Robust physical-world attacks on face recognition. arXiv preprint arXiv:2109.09320."},{"key":"2177_CR59","doi-asserted-by":"crossref","unstructured":"Zhu, Z., Zhang, Y., Chen, H., Dong, Y., Zhao, S., Ding, W., Zhong, J., & Zheng, S. (2023). Understanding the robustness of 3D object detection with bird\u2019s-eye-view representations in autonomous driving. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 21600\u201321610).","DOI":"10.1109\/CVPR52729.2023.02069"},{"key":"2177_CR60","doi-asserted-by":"crossref","unstructured":"Zolfi, A., Kravchik, M., Elovici, Y., & Shabtai, A. (2021). The translucent patch: A physical and universal attack on object detectors. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 15232\u201315241).","DOI":"10.1109\/CVPR46437.2021.01498"}],"container-title":["International Journal of Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-024-02177-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11263-024-02177-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-024-02177-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T06:15:29Z","timestamp":1736230529000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11263-024-02177-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,28]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["2177"],"URL":"https:\/\/doi.org\/10.1007\/s11263-024-02177-6","relation":{},"ISSN":["0920-5691","1573-1405"],"issn-type":[{"value":"0920-5691","type":"print"},{"value":"1573-1405","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,28]]},"assertion":[{"value":"15 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors confirm that there are no known financial interests or personal relationships that could have perceivedly influenced the findings presented in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest."}}]}}