{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:24:45Z","timestamp":1740122685395,"version":"3.37.3"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T00:00:00Z","timestamp":1663977600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T00:00:00Z","timestamp":1663977600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s11277-022-10029-0","type":"journal-article","created":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T10:03:01Z","timestamp":1664013781000},"page":"1985-2010","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Wi-ID: WiFi-Based Identification System Using Rock-Paper-Scissors Hand Gestures"],"prefix":"10.1007","volume":"128","author":[{"given":"Zhiwen","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Nan","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Jingyang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Haipeng","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Qingshan","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4264-0180","authenticated-orcid":false,"given":"Qi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,24]]},"reference":[{"key":"10029_CR1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2928303","author":"AA Yavuz","year":"2019","unstructured":"Yavuz, A. A., & Ozmen, M. O. (2019). Ultra lightweight multiple-time digital signature for the Internet of things devices. IEEE Transction Service Computing. https:\/\/doi.org\/10.1109\/TSC.2019.2928303.","journal-title":"IEEE Transction Service Computing"},{"issue":"7","key":"10029_CR2","doi-asserted-by":"publisher","first-page":"1501","DOI":"10.1109\/TIFS.2016.2639346","volume":"12","author":"AK Jain","year":"2017","unstructured":"Jain, A. K., & Arora, S. S. (2017). Fingerprint recognition of young children. IEEE Transction inform Forensics Security, 12(7), 1501\u20131514.","journal-title":"IEEE Transction inform Forensics Security"},{"issue":"7","key":"10029_CR3","doi-asserted-by":"publisher","first-page":"1761","DOI":"10.1109\/TPAMI.2018.2842770","volume":"41","author":"R He","year":"2019","unstructured":"He, R., Wu, X., Sun, Z. N., & Tan, T. N. (2019). Wasserstein cnn: learning invariant features for nir-vis face recognition. IEEE transactions on pattern analysis and machine intelligenct, 41(7), 1761\u20131773.","journal-title":"IEEE transactions on pattern analysis and machine intelligenct"},{"key":"10029_CR4","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s11277-016-3320-y","volume":"94","author":"TY Teh","year":"2017","unstructured":"Teh, T. Y., Lee, Y. S., & Cheah, Z. Y. (2017). IBI-Mobile Authentication: A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices. Wireless Personal Communications, 94, 127\u2013144.","journal-title":"Wireless Personal Communications"},{"key":"10029_CR5","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1007\/s11277-018-6033-6","volume":"104","author":"S Anandhi","year":"2019","unstructured":"Anandhi, S., Anitha, R., & Sureshkumar, V. (2019). IoT Enabled RFID Authentication and Secure Object Tracking System for Smart Logistics. Wireless Personal Communications, 104, 543\u2013560. https:\/\/doi.org\/10.1007\/s11277-018-6033-6.","journal-title":"Wireless Personal Communications"},{"key":"10029_CR6","doi-asserted-by":"publisher","first-page":"2351","DOI":"10.1007\/s11277-020-07153-0","volume":"112","author":"NW Lo","year":"2020","unstructured":"Lo, N. W., & Yohan, A. (2020). BLE-Based authentication Protocol for micropayment Using wearable device. Wireless Personal Communications., 112, 2351\u20132372. https:\/\/doi.org\/10.1007\/s11277-020-07153-0.","journal-title":"Wireless Personal Communications."},{"key":"10029_CR7","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s11277-020-07364-5","volume":"114","author":"J Ahn","year":"2020","unstructured":"Ahn, J., Lee, I. G., & Kim, M. (2020). Design and Implementation of Hardware-Based Remote Attestation for a Secure Internet of Things. Wireless Personal Communication, 114, 295\u2013327. https:\/\/doi.org\/10.1007\/s11277-020-07364-5.","journal-title":"Wireless Personal Communication"},{"key":"10029_CR8","doi-asserted-by":"publisher","first-page":"1593","DOI":"10.1007\/s11277-015-3008-8","volume":"86","author":"X Li","year":"2016","unstructured":"Li, X., Wen, Q., & Li, W. (2016). A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic Security and Personal Privacy for Wireless Communications. Wireless Personal Communication, 86, 1593\u20131610. https:\/\/doi.org\/10.1007\/s11277-015-3008-8.","journal-title":"Wireless Personal Communication"},{"key":"10029_CR9","doi-asserted-by":"crossref","unstructured":"Liu, J., Dong, Y. D., & Chen, Y. Y. (2018). Leveraging breathing for continuous user authentication. In 24th Annual International Conference on Mobile Computing & Networking (MobiCom). ACM.","DOI":"10.1145\/3241539.3267743"},{"key":"10029_CR10","doi-asserted-by":"crossref","unstructured":"Zimmermann, C., & Brox, T. (2017). Learning to estimate 3d hand pose from single rgb images. In IEEE International Conference on Computer Vision (ICCV) (pp. 4903-4911). IEEE.","DOI":"10.1109\/ICCV.2017.525"},{"issue":"5","key":"10029_CR11","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1109\/TBME.2018.2872593","volume":"66","author":"JY He","year":"2019","unstructured":"He, J. Y., & Luo, H. (2019). Wrist and finger gesture recognition with single-element ultrasound signals: a comparison with single-channel surface electromyogram. IEEE Transactions on Biomedical Engineering, 66(5), 1277\u20131284.","journal-title":"IEEE Transactions on Biomedical Engineering"},{"key":"10029_CR12","doi-asserted-by":"crossref","unstructured":"Zeng, Y. W., Wu, D, Xiong, J. Yi, E. & Gao, R. Y. (2019). Farsense: pushing the range limit of wifi-based respiration sensing with csi ratio of two antennas. In ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) (pp. 1-26). ACM.","DOI":"10.1145\/3351279"},{"issue":"7","key":"10029_CR13","doi-asserted-by":"publisher","first-page":"7930","DOI":"10.1109\/TVT.2020.2993901","volume":"69","author":"BY Sheng","year":"2020","unstructured":"Sheng, B. Y., Fang, Y. R., & Xiao, F. (2020). An accurate device-free action recognition system using two-stream network. IEEE Transction Vehicle Technology, 69(7), 7930\u20137939.","journal-title":"IEEE Transction Vehicle Technology"},{"issue":"3","key":"10029_CR14","doi-asserted-by":"publisher","first-page":"1676","DOI":"10.1109\/TWC.2017.2784431","volume":"17","author":"L Xiao","year":"2018","unstructured":"Xiao, L., Wan, X. Y., & Han, Z. (2018). PHY-layer authentication with multiple landmarks with reduced overhead. IEEE Transactions on Wireless Communications, 17(3), 1676\u20131687.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"10029_CR15","doi-asserted-by":"crossref","unstructured":"Hua, J., Sun, H., Shen, Z., Qian, Z., & Zhong, S. (2018). Accurate and efficient wireless device fingerprinting using channel state information. In International Conference on Computer Communications (INFOCOM) (pp. 1700-1708). IEEE.","DOI":"10.1109\/INFOCOM.2018.8485917"},{"issue":"1","key":"10029_CR16","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1109\/TCDS.2018.2884942","volume":"13","author":"F Duan","year":"2021","unstructured":"Duan, F., Ren, X., & Yang, Y. K. (2021). A gesture recognition system based on time domain features and linear discriminant analysis. IEEE Transactions Cognitive and Developmental Systems (TCDS), 13(1), 200\u2013208. https:\/\/doi.org\/10.1109\/TCDS.2018.2884942.","journal-title":"IEEE Transactions Cognitive and Developmental Systems (TCDS)"},{"key":"10029_CR17","doi-asserted-by":"crossref","unstructured":"Mantyjarvi, J., Lindholm, M., & Vildjiounaite, E. (2005). Identifying users of portable devices from gait pattern with accelerometers. In IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) (pp. 973-976). IEEE.","DOI":"10.1109\/ICASSP.2005.1415569"},{"key":"10029_CR18","doi-asserted-by":"publisher","unstructured":"Muhammad, I. K., Mian, A. J., Yar, M., Dinh, T. D., Ateeq, R., Constandinos, X. M., & Evangelos, P. (2021). Tracking vital signs of a patient using channel state information and machine learning for a smart healthcare system. Neural Comput. & Applic. Advance online publication.https:\/\/doi.org\/10.1007\/s00521-020-05631-x","DOI":"10.1007\/s00521-020-05631-x"},{"issue":"1","key":"10029_CR19","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/THMS.2014.2362520","volume":"45","author":"C Chen","year":"2015","unstructured":"Chen, C., Jafari, R., & Kehtarnavaz, N. (2015). Improving human action recognition using fusion of depth camera and inertial sensors. IEEE Transactions on Human-Machine Systems, 45(1), 51\u201361. https:\/\/doi.org\/10.1109\/THMS.2014.2362520.","journal-title":"IEEE Transactions on Human-Machine Systems"},{"issue":"2","key":"10029_CR20","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1109\/TAFFC.2018.2874986","volume":"12","author":"F Noroozi","year":"2018","unstructured":"Noroozi, F., Kaminska, D., & Corneanu, C. (2018). Survey on emotional body gesture recognition. IEEE transactions on affective computing, 12(2), 505\u2013523. https:\/\/doi.org\/10.1109\/TAFFC.2018.2874986.","journal-title":"IEEE transactions on affective computing"},{"key":"10029_CR21","doi-asserted-by":"crossref","unstructured":"Shotton, J., Fitzgibbon, A., & Cook, M. (2011). Real-time human pose recognition in parts from single depth images. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 1297-1304). IEEE.","DOI":"10.1109\/CVPR.2011.5995316"},{"issue":"8","key":"10029_CR22","doi-asserted-by":"publisher","first-page":"1692","DOI":"10.1109\/TPAMI.2015.2461544","volume":"38","author":"N Neverova","year":"2016","unstructured":"Neverova, N., Wolf, C., Taylor, G., & Nebout, F. (2016). Moddrop: adaptive multi-modal gesture recognition. IEEE Trans. Pattern Anal. Mach. Intell., 38(8), 1692\u20131706. https:\/\/doi.org\/10.1109\/TPAMI.2015.2461544.","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"4","key":"10029_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3365842","volume":"10","author":"V Mohanty","year":"2020","unstructured":"Mohanty, V., Thames, D., & Mehta, S. (2020). Photo Sleuth: Identifying Historical Portraits with Face Recognition and Crowdsourced Human Expertise. ACM Transactions on Interactive Intelligent Systems, 10(4), 1\u201336. https:\/\/doi.org\/10.1145\/3365842.","journal-title":"ACM Transactions on Interactive Intelligent Systems"},{"issue":"1","key":"10029_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2133366.2133371","volume":"2","author":"Y Song","year":"2012","unstructured":"Song, Y., Demirdjian, D., & Davis, R. (2012). Continuous body and hand gesture recognition for natural human-computer interaction. ACM Transactions on Interactive Intelligent Systems, 2(1), 1\u201328. https:\/\/doi.org\/10.1145\/2133366.2133371.","journal-title":"ACM Transactions on Interactive Intelligent Systems"},{"issue":"2","key":"10029_CR25","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1109\/TMC.2017.2718540","volume":"17","author":"H Liu","year":"2017","unstructured":"Liu, H., Wang, Y., Liu, J., Yang, J., Chen, Y., & Poor, H. V. (2017). Authenticating users through fine-grained channel information. IEEE transactions Mobile Computing, 17(2), 251\u2013264.","journal-title":"IEEE transactions Mobile Computing"},{"key":"10029_CR26","doi-asserted-by":"crossref","unstructured":"Chen, Y., Wang, W., & Zhang, Q. (2014). Privacy-preserving location authentication in WiFi with fine-grained physical layer information. In IEEE Global Communications Conference (GLOBECOM) (pp. 4827-4832). IEEE.","DOI":"10.1109\/GLOCOM.2014.7037570"},{"key":"10029_CR27","doi-asserted-by":"crossref","unstructured":"Bao, Y., Dong, L., Zheng, Y., & Liu, Y. (2019). WiSafe: a real-time system for intrusion detection based on wifi signals. In the ACM Turing Celebration Conference-China (TURC) (pp. 1-5). ACM.","DOI":"10.1145\/3321408.3321587"},{"issue":"2","key":"10029_CR28","doi-asserted-by":"publisher","first-page":"2035","DOI":"10.1109\/JIOT.2018.2871445","volume":"6","author":"FX Wang","year":"2018","unstructured":"Wang, F. X., & Gong, W. (2018). On spatial diversity in WiFi-based human activity recognition: A deep learning-based approach. IEEE Internet of Things Journal., 6(2), 2035\u20132047.","journal-title":"IEEE Internet of Things Journal."},{"key":"10029_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2994955","volume-title":"Continuous authentication through finger gesture interaction for smart homes using WiFi","author":"H Kong","year":"2020","unstructured":"Kong, H., Lu, L., Yu, J., Chen, Y., & Tang, F. (2020). Continuous authentication through finger gesture interaction for smart homes using WiFi. IEEE Trans: Mobile Comput. Advance online publication. https:\/\/doi.org\/10.1109\/TMC.2020.2994955."},{"issue":"1","key":"10029_CR30","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1109\/JSEN.2019.2938245","volume":"20","author":"H Yan","year":"2020","unstructured":"Yan, H., & Zhang, Y. (2020). WiAct: a passive WiFi-based human activity recognition system. IEEE Sensors Journal., 20(1), 296\u2013305. https:\/\/doi.org\/10.1109\/JSEN.2019.2938245.","journal-title":"IEEE Sensors Journal."},{"key":"10029_CR31","doi-asserted-by":"crossref","unstructured":"AliKhan, D., & Razak, S. (2019). Human behaviour recognition using Wifi channel state information. In 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 7625-7629). IEEE.","DOI":"10.1109\/ICASSP.2019.8682821"},{"issue":"2","key":"10029_CR32","doi-asserted-by":"publisher","first-page":"2263","DOI":"10.1109\/TVT.2019.2962803","volume":"69","author":"H Fei","year":"2020","unstructured":"Fei, H., Xiao, F., Han, J. S., Huang, H. P., & Sun, L. J. (2020). Multi-variations activity based gaits recognition using commodity WiFi. IEEE Trans. Veh. Technol., 69(2), 2263\u20132273.","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10029_CR33","doi-asserted-by":"crossref","unstructured":"Wang, W., Alex, X., & Shahzad, M. (2016). Gait recognition using wifi signals. In 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (IJCPUC) (pp. 363-373). ACM.","DOI":"10.1145\/2971648.2971670"},{"key":"10029_CR34","doi-asserted-by":"crossref","unstructured":"Yu, N., Wang, W., Alex, X., & Kong, L. T. (2018). Qgesture: quantifying gesture distance and direction with wifi signals. In the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) (pp. 1-23). ACM.","DOI":"10.1145\/3191783"},{"issue":"2","key":"10029_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3157677","volume":"17","author":"K Qian","year":"2018","unstructured":"Qian, K., Wu, C. S., & Yang, Z. (2018). Enabling contactless detection of moving humans with dynamic speeds using CSI. ACM Trans. Embed. Comput. Syst., 17(2), 1\u201318.","journal-title":"ACM Trans. Embed. Comput. Syst."},{"issue":"11","key":"10029_CR36","doi-asserted-by":"publisher","first-page":"2474","DOI":"10.1109\/TMC.2018.2879075","volume":"18","author":"H Abdelnasser","year":"2019","unstructured":"Abdelnasser, H., Harras, K., & Youssef, M. (2019). A ubiquitous WiFi-based fine-grained gesture recognition system. IEEE transactions Mobile Computing, 18(11), 2474\u20132487.","journal-title":"IEEE transactions Mobile Computing"},{"key":"10029_CR37","doi-asserted-by":"crossref","unstructured":"Li, C., Liu, M., & Cao, Z. (2020). WiHF: enable User Identified Gesture Recognition with WiFi. In IEEE Conf. Comput. Commun. (INFOCOM). IEEE.","DOI":"10.1109\/INFOCOM41043.2020.9155539"},{"issue":"1","key":"10029_CR38","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MPRV.2020.3041024","volume":"20","author":"Y Zeng","year":"2020","unstructured":"Zeng, Y., Wu, D., & Xiong, J. (2020). Boosting WiFi Sensing Performance via CSI Ratio. IEEE Pervasive Computing, 20(1), 62\u201370. https:\/\/doi.org\/10.1109\/MPRV.2020.3041024.","journal-title":"IEEE Pervasive Computing"},{"key":"10029_CR39","doi-asserted-by":"crossref","unstructured":"Wu, D., Gao, R., & Zeng, Y. (2020). Fingerdraw: Sub-wavelength level finger motion tracking with WiFi signals. In ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (pp. 1-27). ACM.","DOI":"10.1145\/3380981"},{"key":"10029_CR40","doi-asserted-by":"crossref","unstructured":"Cohn, G., Morris, D., & Patel, S. (2012). Humantenna: using the body as an antenna for real-time whole-body interaction. In the SIGCHI Conference on Human Factors in Computing Systems (CHI) (pp. 1901-1910). ACM.","DOI":"10.1145\/2207676.2208330"},{"key":"10029_CR41","unstructured":"Zimmermann, C., & Brox, T. (2014). 3D tracking via body radio reflections. In 14th Networked Systems Design and Implementation (NSDI) (pp. 317-329). ACM."},{"key":"10029_CR42","doi-asserted-by":"crossref","unstructured":"Pu, Q. F., Gupta, S., Gollakota, S., & Patel, S. (2013). Whole-home gesture recognition using wireless signals. In 19th Annual International Conference on Mobile Computing & Networking (MobiCom) (pp. 27-38). ACM.","DOI":"10.1145\/2500423.2500436"},{"key":"10029_CR43","unstructured":"Kellogg, B., Talla, V., & Gollakota, S. (2014). Bringing gesture recognition to all devices. In 14th Networked Systems Design and Implementation (NSDI) (pp. 303-316). ACM."},{"key":"10029_CR44","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Zhang, Y., & Qian, K. (2019). Zero-effort cross-domain gesture recognition with Wi-Fi. In 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys) (pp. 313-325). ACM.","DOI":"10.1145\/3307334.3326081"},{"key":"10029_CR45","doi-asserted-by":"crossref","unstructured":"Gu, Y., & Zhang, X. (2018). Your WiFi knows how you behave: leveraging WiFi channel data for behavior analysis. In IEEE Global Communications Conference (GLOBECOM) (pp. 1-6). IEEE.","DOI":"10.1109\/GLOCOM.2018.8647547"},{"issue":"11","key":"10029_CR46","doi-asserted-by":"publisher","first-page":"2714","DOI":"10.1109\/TMC.2018.2878233","volume":"18","author":"ZH Chen","year":"2019","unstructured":"Chen, Z. H., Zhang, L., & Jiang, C. Y. (2019). WiFi CSI based passive human activity recognition using attention based BLSTM. IEEE Trans. Mobile Comput., 18(11), 2714\u20132724.","journal-title":"IEEE Trans. Mobile Comput."},{"key":"10029_CR47","doi-asserted-by":"crossref","unstructured":"Abdelnasser, H., Youssef, M., & Harras, K. A. (2015). WiGest: a ubiquitous WiFi-based gesture recognition system. In International Conference on Computer Communications (INFOCOM) (pp. 1472-1480). IEEE.","DOI":"10.1109\/INFOCOM.2015.7218525"},{"issue":"2","key":"10029_CR48","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1109\/TMC.2016.2557792","volume":"16","author":"YX Wang","year":"2016","unstructured":"Wang, Y. X., Wu, K. S., & Ni, L. M. (2016). Wifall: device-free fall detection by wireless networks. IEEE Trans. Mobile Comput., 16(2), 581\u2013594.","journal-title":"IEEE Trans. Mobile Comput."},{"key":"10029_CR49","doi-asserted-by":"crossref","unstructured":"Wang, W., Liu, A. X., Shahzad, M., & Ling, K. (2015). Understanding and modeling of wifi signal based human activity recognition. In 21st Annual International Conference on Mobile Computing & Networking (MobiCom) (pp. 65-76). ACM.","DOI":"10.1145\/2789168.2790093"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-10029-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-022-10029-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-10029-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T16:39:14Z","timestamp":1675096754000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-022-10029-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,24]]},"references-count":49,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["10029"],"URL":"https:\/\/doi.org\/10.1007\/s11277-022-10029-0","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2022,9,24]]},"assertion":[{"value":"30 August 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}