{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:31:42Z","timestamp":1767339102072,"version":"3.40.4"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T00:00:00Z","timestamp":1734480000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T00:00:00Z","timestamp":1734480000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62072482"],"award-info":[{"award-number":["62072482"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Vis"],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s11263-024-02323-0","type":"journal-article","created":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T20:27:20Z","timestamp":1734553640000},"page":"2927-2949","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Hard-Normal Example-Aware Template Mutual Matching for Industrial Anomaly Detection"],"prefix":"10.1007","volume":"133","author":[{"given":"Zixuan","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0310-4679","authenticated-orcid":false,"given":"Xiaohua","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Lingxiao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jian-Huang","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,18]]},"reference":[{"key":"2323_CR1","doi-asserted-by":"crossref","unstructured":"Akcay, S., Atapour-Abarghouei, A., Breckon, T.P., (2018). GANomaly: Semi-supervised anomaly detection via adversarial training. In Proceedings of the Asian Conference on Computer Vision (ACCV).","DOI":"10.1007\/978-3-030-20893-6_39"},{"issue":"2","key":"2323_CR2","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/304181.304187","volume":"28","author":"M Ankerst","year":"1999","unstructured":"Ankerst, M., Breunig, M. M., Kriegel, H. P., et al. (1999). OPTICS: Ordering points to identify the clustering structure. ACM Sigmod record, 28(2), 49\u201360.","journal-title":"ACM Sigmod record"},{"key":"2323_CR3","doi-asserted-by":"crossref","unstructured":"Bae, J., Lee, J.H., Kim, S. (2023). PNI: Industrial anomaly detection using position and neighborhood information. In Proceedings of the International Conference on Computer Vision (ICCV), (pp. 6373\u20136383).","DOI":"10.1109\/ICCV51070.2023.00586"},{"key":"2323_CR4","doi-asserted-by":"crossref","unstructured":"Banerjee, A., Burlina, P., Meth, R. (2007). Fast hyperspectral anomaly detection via SVDD. In Proceedings of the IEEE International Conference on Image Processing (ICIP), IEEE.","DOI":"10.1109\/ICIP.2007.4379964"},{"key":"2323_CR5","doi-asserted-by":"crossref","unstructured":"Batzner, K., Heckler, L., K\u00f6nig, R. (2024). EfficientAD: Accurate visual anomaly detection at millisecond-level latencies. In Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV), (pp. 128\u2013138).","DOI":"10.1109\/WACV57701.2024.00020"},{"key":"2323_CR6","doi-asserted-by":"crossref","unstructured":"Bergmann, P., Fauser, M., Sattlegger, D. et\u00a0al. (2020). Uninformed students: Student-teacher anomaly detection with discriminative latent embeddings. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), (pp 4183\u20134192).","DOI":"10.1109\/CVPR42600.2020.00424"},{"key":"2323_CR7","doi-asserted-by":"crossref","unstructured":"Bergmann, P., L\u00f6we, S., Fauser, M. et\u00a0al. (2018). Improving unsupervised defect segmentation by applying structural similarity to autoencoders. arXiv Preprint arXiv:1807.02011.","DOI":"10.5220\/0007364503720380"},{"issue":"4","key":"2323_CR8","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1007\/s11263-020-01400-4","volume":"129","author":"P Bergmann","year":"2021","unstructured":"Bergmann, P., Batzner, K., Fauser, M., et al. (2021). The MVTec anomaly detection dataset: A comprehensive real-world dataset for unsupervised anomaly detection. International Journal of Computer Vision (IJCV), 129(4), 1038\u20131059.","journal-title":"International Journal of Computer Vision (IJCV)"},{"issue":"4","key":"2323_CR9","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1007\/s11263-022-01578-9","volume":"130","author":"P Bergmann","year":"2022","unstructured":"Bergmann, P., Batzner, K., Fauser, M., et al. (2022). Beyond dents and scratches: Logical constraints in unsupervised anomaly detection and localization. International Journal of Computer Vision (IJCV), 130(4), 947\u2013969.","journal-title":"International Journal of Computer Vision (IJCV)"},{"issue":"2\u20133","key":"2323_CR10","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/0098-3004(84)90020-7","volume":"10","author":"JC Bezdek","year":"1984","unstructured":"Bezdek, J. C., Ehrlich, R., & Full, W. (1984). FCM: The fuzzy c-means clustering algorithm. Computers & Geosciences, 10(2\u20133), 191\u2013203.","journal-title":"Computers & Geosciences"},{"key":"2323_CR11","unstructured":"Chalapathy, R., & Chawla, S. (2019). Deep learning for anomaly detection: A survey. arXiv Preprint arXiv:1901.03407."},{"key":"2323_CR12","doi-asserted-by":"crossref","unstructured":"Cimpoi, M., Maji, S., Kokkinos, I., et\u00a0al. (2014). Describing textures in the wild. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 3606\u20133613).","DOI":"10.1109\/CVPR.2014.461"},{"key":"2323_CR13","unstructured":"Cohen, N., Hoshen, Y. (2020). Sub-image anomaly detection with deep pyramid correspondences. arXiv Preprint arXiv:2005.02357."},{"key":"2323_CR14","doi-asserted-by":"crossref","unstructured":"Defard, T., Setkov, A., Loesch, A., et\u00a0al. (2021). PaDiM: A patch distribution modeling framework for anomaly detection and localization. In Proceedings of the International Conference on Pattern Recognition (ICPR) (pp. 475\u2013489). Springer.","DOI":"10.1007\/978-3-030-68799-1_35"},{"key":"2323_CR15","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., et\u00a0al. (2009). ImageNet: A large-scale hierarchical image database. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR).","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"2323_CR16","doi-asserted-by":"crossref","unstructured":"Deng, H., Li, X. (2022). Anomaly detection via reverse distillation from one-class embedding. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 9737\u20139746).","DOI":"10.1109\/CVPR52688.2022.00951"},{"key":"2323_CR17","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., et\u00a0al. (2021). An image is worth 16x16 words: Transformers for image recognition at scale. In International Conference on Learning Representations (ICLR)."},{"issue":"5","key":"2323_CR18","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1007\/s10851-019-00885-0","volume":"61","author":"T Ehret","year":"2019","unstructured":"Ehret, T., Davy, A., Morel, J. M., et al. (2019). Image anomalies: A review and synthesis of detection methods. Journal of Mathematical Imaging and Vision, 61(5), 710\u2013743.","journal-title":"Journal of Mathematical Imaging and Vision"},{"key":"2323_CR19","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., et\u00a0al. (2014). Generative adversarial nets. In Proceedings of the Conference on Neural Information Processing Systems (NeurIPS)."},{"key":"2323_CR20","volume-title":"Deep learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning. MIT Press."},{"key":"2323_CR21","doi-asserted-by":"crossref","unstructured":"Guo, H., Ren, L., Fu, J., et\u00a0al. (2023) .Template-guided hierarchical feature restoration for anomaly detection. In Proceedings of the International Conference on Computer Vision (ICCV) (pp. 6447\u20136458).","DOI":"10.1109\/ICCV51070.2023.00593"},{"key":"2323_CR22","doi-asserted-by":"crossref","unstructured":"Har-Peled, S., Kushal, A. (2005). Smaller coresets for k-median and k-means clustering. In Proceedings of the Annual Symposium on Computational Geometry (pp. 126\u2013134).","DOI":"10.1145\/1064092.1064114"},{"key":"2323_CR23","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., et\u00a0al. (2016). Deep residual learning for image recognition. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR).","DOI":"10.1109\/CVPR.2016.90"},{"key":"2323_CR24","unstructured":"Ho, J., Jain, A., Abbeel, P. (2020). Denoising diffusion probabilistic models. In Proceedings of the Conference on Neural Information Processing Systems (NeurIPS), (pp. 6840\u20136851)."},{"issue":"1","key":"2323_CR25","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s00371-018-1588-5","volume":"36","author":"Y Huang","year":"2020","unstructured":"Huang, Y., Qiu, C., & Yuan, K. (2020). Surface defect saliency of magnetic tile. The Visual Computer, 36(1), 85\u201396.","journal-title":"The Visual Computer"},{"issue":"3","key":"2323_CR26","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1109\/TBDATA.2019.2921572","volume":"7","author":"J Johnson","year":"2019","unstructured":"Johnson, J., Douze, M., & J\u00e9gou, H. (2019). Billion-scale similarity search with GPUs. IEEE Transactions on Big Data (TBD), 7(3), 535\u2013547.","journal-title":"IEEE Transactions on Big Data (TBD)"},{"key":"2323_CR27","doi-asserted-by":"crossref","unstructured":"Li, C.L., Sohn, K., Yoon, J., et\u00a0al. (2021). CutPaste: Self-supervised learning for anomaly detection and localization. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 9664\u20139674).","DOI":"10.1109\/CVPR46437.2021.00954"},{"key":"2323_CR28","doi-asserted-by":"crossref","unstructured":"Liu, Z., Hu, H., Lin, Y., et\u00a0al. (2022a). Swin transformer V2: Scaling up capacity and resolution. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR).","DOI":"10.1109\/CVPR52688.2022.01170"},{"key":"2323_CR29","doi-asserted-by":"crossref","unstructured":"Liu, Z., Lin, Y., Cao, Y., et\u00a0al. (2021). Swin transformer: Hierarchical vision transformer using shifted windows. In Proceedings of the International Conference on Computer Vision (ICCV).","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"2323_CR30","doi-asserted-by":"crossref","unstructured":"Liu, W., Luo, W., Lian, D., & Gao, S. (2018). Future frame prediction for anomaly detection\u2014A new baseline. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR).","DOI":"10.1109\/CVPR.2018.00684"},{"key":"2323_CR31","doi-asserted-by":"crossref","unstructured":"Liu, Z., Mao, H., Wu, C.Y., et\u00a0al. (2022b). A convnet for the 2020s. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR).","DOI":"10.1109\/CVPR52688.2022.01167"},{"issue":"5","key":"2323_CR32","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1016\/j.patcog.2008.09.015","volume":"42","author":"M Liu","year":"2009","unstructured":"Liu, M., Jiang, X., & Kot, A. C. (2009). A multi-prototype clustering algorithm. Pattern Recognition (PR), 42(5), 689\u2013698.","journal-title":"Pattern Recognition (PR)"},{"issue":"1","key":"2323_CR33","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1109\/TPAMI.2020.3011148","volume":"44","author":"X Li","year":"2020","unstructured":"Li, X., Zhang, H., Wang, R., et al. (2020). Multiview clustering: A scalable and parameter-free bipartite graph fusion method. IEEE Transactions on Pattern Analysis and Machine Intelligence (IEEE TPAMI), 44(1), 330\u2013344.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence (IEEE TPAMI)"},{"key":"2323_CR34","unstructured":"Lu, R., Wu, Y., Tian, L., et\u00a0al. (2023). Hierarchical vector quantized transformer for multi-class unsupervised anomaly detection. In Proceedings of the Conference on Neural Information Processing Systems (NeurIPS) (pp. 8487\u20138500)."},{"key":"2323_CR35","unstructured":"MacQueen, J. (1967). Classification and analysis of multivariate observations. In Proceedings of the Berkeley Symp. Math. Statist. Probability, (pp. 281\u2013297)."},{"key":"2323_CR36","unstructured":"Paszke, A., Gross, S., Chintala, S, et\u00a0al. (2017). Automatic differentiation in pytorch. In Proceedings of the Conference on Neural Information Processing Systems Workshop (NeurIPSW)."},{"key":"2323_CR37","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., Varoquaux, G., Gramfort, A., et al. (2011). Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12, 2825\u20132830.","journal-title":"Journal of Machine Learning Research"},{"key":"2323_CR38","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.sigpro.2013.12.026","volume":"99","author":"MA Pimentel","year":"2014","unstructured":"Pimentel, M. A., Clifton, D. A., Clifton, L., et al. (2014). A review of novelty detection. Signal processing, 99, 215\u2013249.","journal-title":"Signal processing"},{"key":"2323_CR39","doi-asserted-by":"crossref","unstructured":"Reiss, T., Cohen, N., Bergman, L., et\u00a0al. (2021). PANDA: Adapting pretrained features for anomaly detection and segmentation. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR).","DOI":"10.1109\/CVPR46437.2021.00283"},{"key":"2323_CR40","unstructured":"Rezende, D., & Mohamed, S. (2015). Variational inference with normalizing flows. In Proceedings of the International Conference on Machine Learning (ICML) (pp. 1530\u20131538). PMLR."},{"key":"2323_CR41","doi-asserted-by":"crossref","unstructured":"Roth, K., Pemula, L., Zepeda, J., et\u00a0al. (2022). Towards total recall in industrial anomaly detection. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), (pp. 14,318\u201314,328).","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"2323_CR42","doi-asserted-by":"crossref","unstructured":"Rudolph, M., Wandt, B., Rosenhahn, B. (2021). Same same but differNet: Semi-supervised defect detection with normalizing flows. In Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV).","DOI":"10.1109\/WACV48630.2021.00195"},{"key":"2323_CR43","doi-asserted-by":"crossref","unstructured":"Rudolph, M., Wehrbein, T., Rosenhahn, B., et\u00a0al. (2022). Fully convolutional cross-scale-flows for image-based defect detection. In Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV).","DOI":"10.1109\/WACV51458.2022.00189"},{"key":"2323_CR44","unstructured":"Ruff, L., Vandermeulen, R., Goernitz, N., et\u00a0al. (2018). Deep one-class classification. In Proceedings of the International Conference on Machine Learning (ICML) (pp 4393\u20134402). PMLR."},{"key":"2323_CR45","doi-asserted-by":"crossref","unstructured":"Salehi, M., Sadjadi, N., Baselizadeh, S., et\u00a0al. (2021). Multiresolution knowledge distillation for anomaly detection. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR).","DOI":"10.1109\/CVPR46437.2021.01466"},{"key":"2323_CR46","doi-asserted-by":"crossref","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S.M., et\u00a0al. (2017). Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In Proceedings of the International Conference on Information Processing in Medical Imaging (pp. 146\u2013157). Springer.","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"2323_CR47","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.media.2019.01.010","volume":"54","author":"T Schlegl","year":"2019","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S. M., et al. (2019). f-AnoGAN: Fast unsupervised anomaly detection with generative adversarial networks. Meidcal Image Analysis (MIA), 54, 30\u201344.","journal-title":"Meidcal Image Analysis (MIA)"},{"issue":"1","key":"2323_CR48","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1023\/B:MACH.0000008084.60811.49","volume":"54","author":"DM Tax","year":"2004","unstructured":"Tax, D. M., & Duin, R. P. (2004). Support vector data description. Machine Learning, 54(1), 45\u201366.","journal-title":"Machine Learning"},{"key":"2323_CR49","unstructured":"Van\u00a0der Maaten, L., Hinton, G. (2008). Visualizing data using t-SNE. Journal of Machine Learning Research (JMLR), 9(11), 2579\u20132605. https:\/\/jmlr.org\/papers\/v9\/vandermaaten08a.html"},{"key":"2323_CR50","doi-asserted-by":"crossref","unstructured":"Venkataramanan, S., Peng, K.C., Singh, R.V., et\u00a0al. (2020). Attention guided anomaly localization in images. In Proceedings of the European Conference on Computer Vision (ECCV), (pp. 485\u2013503). Springer.","DOI":"10.1007\/978-3-030-58520-4_29"},{"key":"2323_CR51","doi-asserted-by":"crossref","unstructured":"Wang, S., Wu, L., Cui, L., et\u00a0al. (2021). Glancing at the patch: Anomaly localization with global and local feature comparison. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR).","DOI":"10.1109\/CVPR46437.2021.00032"},{"key":"2323_CR52","doi-asserted-by":"crossref","unstructured":"Xie, S., Girshick, R., Doll\u00e1r, P, et\u00a0al .(2017). Aggregated residual transformations for deep neural networks. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 1492\u20131500).","DOI":"10.1109\/CVPR.2017.634"},{"key":"2323_CR53","doi-asserted-by":"crossref","unstructured":"Yi, J., Yoon, S. (2020). Patch SVDD: Patch-level SVDD for anomaly detection and segmentation. In Proceedings of the Asian Conference on Computer Vision (ACCV).","DOI":"10.1007\/978-3-030-69544-6_23"},{"key":"2323_CR54","unstructured":"You, Z., Cui, L., Shen, Y., et\u00a0al. (2022). A unified model for multi-class anomaly detection. In Proceedings of the Conference on Neural Information Processing Systems (NeurIPS) (pp. 4571\u20134584)."},{"key":"2323_CR55","doi-asserted-by":"crossref","unstructured":"Zagoruyko, S., & Komodakis, N. (2016). Wide residual networks. arXiv Preprint arXiv:1605.07146.","DOI":"10.5244\/C.30.87"},{"key":"2323_CR56","doi-asserted-by":"crossref","unstructured":"Zavrtanik, V., Kristan, M., & Sko\u010daj, D. (2021). DRAEM\u2014A discriminatively trained reconstruction embedding for surface anomaly detection. In Proceedings of the International Conference on Computer Vision (ICCV).","DOI":"10.1109\/ICCV48922.2021.00822"},{"key":"2323_CR57","doi-asserted-by":"crossref","unstructured":"Zhang, X., Xu, M., & Zhou, X. (2024). RealNet: A feature selection network with realistic synthetic anomaly for anomaly detection. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 16,699\u201316,708).","DOI":"10.1109\/CVPR52733.2024.01580"},{"key":"2323_CR58","unstructured":"Zhao, H., Gallo, O., Frosio, I., et\u00a0al. (2015). Loss functions for neural networks for image processing. arXiv Preprint arXiv:1511.08861."},{"key":"2323_CR59","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3344118","author":"Y Zhou","year":"2024","unstructured":"Zhou, Y., Xu, X., Song, J., et al. (2024). Msflow: Multiscale flow-based framework for unsupervised anomaly detection. IEEE Transactions on Neural Networks and Learning Systems (IEEE TNNLS). https:\/\/doi.org\/10.1109\/TNNLS.2023.3344118","journal-title":"IEEE Transactions on Neural Networks and Learning Systems (IEEE TNNLS)"},{"key":"2323_CR60","doi-asserted-by":"crossref","unstructured":"Zou, Y., Jeong, J., Pemula, L., et\u00a0al. (2022). Spot-the-difference self-supervised pre-training for anomaly detection and segmentation. In Proceedings of the European Conference on Computer Vision (ECCV).","DOI":"10.1007\/978-3-031-20056-4_23"}],"container-title":["International Journal of Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-024-02323-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11263-024-02323-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-024-02323-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T06:03:23Z","timestamp":1744869803000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11263-024-02323-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,18]]},"references-count":60,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["2323"],"URL":"https:\/\/doi.org\/10.1007\/s11263-024-02323-0","relation":{},"ISSN":["0920-5691","1573-1405"],"issn-type":[{"type":"print","value":"0920-5691"},{"type":"electronic","value":"1573-1405"}],"subject":[],"published":{"date-parts":[[2024,12,18]]},"assertion":[{"value":"1 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}