{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:32:15Z","timestamp":1772119935341,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T00:00:00Z","timestamp":1683590400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T00:00:00Z","timestamp":1683590400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1805400"],"award-info":[{"award-number":["2020YFB1805400"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1805400"],"award-info":[{"award-number":["2020YFB1805400"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1805400"],"award-info":[{"award-number":["2020YFB1805400"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1805400"],"award-info":[{"award-number":["2020YFB1805400"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1805400"],"award-info":[{"award-number":["2020YFB1805400"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61876134"],"award-info":[{"award-number":["61876134"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61876134"],"award-info":[{"award-number":["61876134"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61876134"],"award-info":[{"award-number":["61876134"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61876134"],"award-info":[{"award-number":["61876134"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61876134"],"award-info":[{"award-number":["61876134"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s11280-023-01160-4","type":"journal-article","created":{"date-parts":[[2023,5,10]],"date-time":"2023-05-10T17:41:28Z","timestamp":1683740488000},"page":"2727-2748","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["GANAD: A GAN-based method for network anomaly detection"],"prefix":"10.1007","volume":"26","author":[{"given":"Jie","family":"Fu","sequence":"first","affiliation":[]},{"given":"Lina","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianpeng","family":"Ke","sequence":"additional","affiliation":[]},{"given":"Kang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Rongwei","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,9]]},"reference":[{"key":"1160_CR1","doi-asserted-by":"crossref","unstructured":"Lin, P., Ye, K., Xu, C.-Z.: Dynamic network anomaly detection system by using deep learning techniques. In: International Conference on Cloud Computing, pp. 161\u2013176. Springer (2019)","DOI":"10.1007\/978-3-030-23502-4_12"},{"issue":"9","key":"1160_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3472753","volume":"54","author":"D Chou","year":"2021","unstructured":"Chou, D., Jiang, M.: A survey on data-driven network intrusion detection. ACM Comput. Surveys (CSUR) 54(9), 1\u201336 (2021)","journal-title":"ACM Comput. Surveys (CSUR)"},{"key":"1160_CR3","doi-asserted-by":"crossref","unstructured":"Ahmim, A., Maglaras, L., Ferrag, M.A., Derdour, M., Janicke, H.: A novel hierarchical intrusion detection system based on decision tree and rules-based models. In: 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 228\u2013233. IEEE (2019)","DOI":"10.1109\/DCOSS.2019.00059"},{"issue":"4","key":"1160_CR4","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.1109\/TCYB.2018.2804940","volume":"49","author":"X Miao","year":"2018","unstructured":"Miao, X., Liu, Y., Zhao, H., Li, C.: Distributed online one-class support vector machine for anomaly detection over networks. IEEE Trans. Cybern. 49(4), 1475\u20131488 (2018)","journal-title":"IEEE Trans. Cybern."},{"key":"1160_CR5","doi-asserted-by":"crossref","unstructured":"Pang, G., Cao, L., Chen, L., Liu, H.: Learning representations of ultrahigh-dimensional data for random distance-based outlier detection. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2041\u20132050 (2018)","DOI":"10.1145\/3219819.3220042"},{"key":"1160_CR6","unstructured":"Pang, G., Shen, C., Jin, H., Hengel, A.v.d.: Deep weakly-supervised anomaly detection. arXiv:1910.13601 (2019)"},{"key":"1160_CR7","unstructured":"Ruff, L., Vandermeulen, R.A., G\u00f6rnitz, N., Binder, A., M\u00fcller, E., M\u00fcller, K.-R., Kloft, M.: Deep semi-supervised anomaly detection. In: International Conference on Learning Representations (2019)"},{"key":"1160_CR8","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial nets. Advances in neural information processing systems 27 (2014)"},{"key":"1160_CR9","doi-asserted-by":"crossref","unstructured":"Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350\u2013361 (2011)","DOI":"10.1145\/2018436.2018477"},{"key":"1160_CR10","doi-asserted-by":"crossref","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S.M., Schmidt-Erfurth, U., Langs, G.: Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: International Conference on Information Processing in Medical Imaging, pp. 146\u2013157. Springer (2017)","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"1160_CR11","doi-asserted-by":"crossref","unstructured":"Akcay, S., Atapour-Abarghouei, A., Breckon, T.P.: Ganomaly: Semi-supervised anomaly detection via adversarial training. In: Asian Conference on Computer Vision, pp. 622\u2013637. Springer (2018)","DOI":"10.1007\/978-3-030-20893-6_39"},{"issue":"2","key":"1160_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439950","volume":"54","author":"G Pang","year":"2021","unstructured":"Pang, G., Shen, C., Cao, L., Hengel, A.V.D.: Deep learning for anomaly detection: A review. ACM Comput. Surveys (CSUR) 54(2), 1\u201338 (2021)","journal-title":"ACM Comput. Surveys (CSUR)"},{"key":"1160_CR13","doi-asserted-by":"crossref","unstructured":"Li, D., Chen, D., Jin, B., Shi, L., Goh, J., Ng, S.-K.: Mad-gan: Multivariate anomaly detection for time series data with generative adversarial networks. In: International Conference on Artificial Neural Networks, pp. 703\u2013716. Springer (2019)","DOI":"10.1007\/978-3-030-30490-4_56"},{"key":"1160_CR14","unstructured":"Donahue, J., Kr\u00e4henb\u00fchl, P., Darrell, T.: Adversarial feature learning. arXiv:1605.09782 (2016)"},{"key":"1160_CR15","unstructured":"Xiong, L., P\u00f3czos, B., Schneider, J.: Group anomaly detection using flexible genre models. Advances in neural information processing systems 24 (2011)"},{"key":"1160_CR16","doi-asserted-by":"crossref","unstructured":"Blowers, M., Williams, J.: Machine learning applied to cyber operations. In: Network Science and Cybersecurity, pp. 155\u2013175 (2014)","DOI":"10.1007\/978-1-4614-7597-2_10"},{"issue":"8","key":"1160_CR17","doi-asserted-by":"publisher","first-page":"26","DOI":"10.5120\/2303-2914","volume":"18","author":"MSA Khan","year":"2011","unstructured":"Khan, M.S.A.: Rule based network intrusion detection using genetic algorithm. Int. J. Comput. Applic. 18(8), 26\u201329 (2011)","journal-title":"Int. J. Comput. Applic."},{"issue":"1","key":"1160_CR18","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","volume":"2","author":"N Shone","year":"2018","unstructured":"Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence 2(1), 41\u201350 (2018)","journal-title":"IEEE Transactions on Emerging Topics in Computational Intelligence"},{"issue":"3","key":"1160_CR19","doi-asserted-by":"publisher","first-page":"40","DOI":"10.5120\/758-993","volume":"3","author":"SA Mulay","year":"2010","unstructured":"Mulay, S.A., Devale, P., Garje, G.: Intrusion detection system using support vector machine and decision tree. Int. J. Comput. Applic. 3(3), 40\u201343 (2010)","journal-title":"Int. J. Comput. Applic."},{"key":"1160_CR20","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.ins.2019.05.040","volume":"497","author":"K Selvakumar","year":"2019","unstructured":"Selvakumar, K., Karuppiah, M., SaiRamesh, L., Islam, S.H., Hassan, M.M., Fortino, G., Choo, K.-K.R.: Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in wsns. Inform. Sci. 497, 77\u201390 (2019)","journal-title":"Inform. Sci."},{"key":"1160_CR21","doi-asserted-by":"crossref","unstructured":"Breunig, M.M., Kriegel, H.-P., Ng, R.T., Sander, J.: Lof: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp. 93\u2013104 (2000)","DOI":"10.1145\/342009.335388"},{"issue":"3","key":"1160_CR22","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1198\/004017001316975899","volume":"43","author":"D Pe\u00f1a","year":"2001","unstructured":"Pe\u00f1a, D., Prieto, F.J.: Multivariate outlier detection and robust covariance matrix estimation. Technometrics 43(3), 286\u2013310 (2001)","journal-title":"Technometrics"},{"key":"1160_CR23","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.-H.: Isolation forest. In: 2008 Eighth Ieee International Conference on Data Mining, pp. 413\u2013422. IEEE (2008)","DOI":"10.1109\/ICDM.2008.17"},{"key":"1160_CR24","doi-asserted-by":"crossref","unstructured":"Torres, P., Catania, C., Garcia, S., Garino, C.G.: An analysis of recurrent neural networks for botnet detection behavior. In: 2016 IEEE Biennial Congress of Argentina (ARGENCON), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ARGENCON.2016.7585247"},{"key":"1160_CR25","doi-asserted-by":"crossref","unstructured":"Deng, A., Hooi, B.: Graph neural network-based anomaly detection in multivariate time series. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, pp. 4027\u20134035 (2021)","DOI":"10.1609\/aaai.v35i5.16523"},{"key":"1160_CR26","doi-asserted-by":"crossref","unstructured":"Kwon, D., Natarajan, K., Suh, S.C., Kim, H., Kim, J.: An empirical study on network anomaly detection using convolutional neural networks. In: ICDCS, pp. 1595\u20131598 (2018)","DOI":"10.1109\/ICDCS.2018.00178"},{"key":"1160_CR27","doi-asserted-by":"crossref","unstructured":"Zhao, G., Zhang, C., Zheng, L.: Intrusion detection using deep belief network and probabilistic neural network. In: 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), vol. 1, pp. 639\u2013642. IEEE (2017)","DOI":"10.1109\/CSE-EUC.2017.119"},{"key":"1160_CR28","doi-asserted-by":"crossref","unstructured":"Pang, G., van den Hengel, A., Shen, C., Cao, L.: Toward deep supervised anomaly detection: Reinforcement learning from partially labeled anomaly data. In: Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, pp. 1298\u20131308 (2021)","DOI":"10.1145\/3447548.3467417"},{"key":"1160_CR29","doi-asserted-by":"crossref","unstructured":"Wang, H., Pang, G., Shen, C., Ma, C.: Unsupervised representation learning by predicting random distances. In: Proceedings of the Twenty-Ninth International Conference on International Joint Conferences on Artificial Intelligence, pp. 2950\u20132956 (2021)","DOI":"10.24963\/ijcai.2020\/408"},{"key":"1160_CR30","doi-asserted-by":"crossref","unstructured":"Pang, G., Shen, C., van den Hengel, A.: Deep anomaly detection with deviation networks. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 353\u2013362 (2019)","DOI":"10.1145\/3292500.3330871"},{"key":"1160_CR31","doi-asserted-by":"crossref","unstructured":"Zhou, C., Paffenroth, R.C.: Anomaly detection with robust deep autoencoders. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 665\u2013674 (2017)","DOI":"10.1145\/3097983.3098052"},{"issue":"1","key":"1160_CR32","first-page":"1","volume":"2","author":"J An","year":"2015","unstructured":"An, J., Cho, S.: Variational autoencoder based anomaly detection using reconstruction probability. Special Lecture on IE 2(1), 1\u201318 (2015)","journal-title":"Special Lecture on IE"},{"key":"1160_CR33","unstructured":"Zong, B., Song, Q., Min, M.R., Cheng, W., Lumezanu, C., Cho, D., Chen, H.: Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In: International Conference on Learning Representations (2018)"},{"key":"1160_CR34","unstructured":"Zhai, S., Cheng, Y., Lu, W., Zhang, Z.: Deep structured energy based models for anomaly detection. In: International Conference on Machine Learning, pp. 1100\u20131109. PMLR (2016)"},{"key":"1160_CR35","doi-asserted-by":"crossref","unstructured":"Mirsky, Y., Doitshman, T., Elovici, Y., Shabtai, A.: Kitsune: An ensemble of autoencoders for online network intrusion detection. In: Network and Distributed Systems Security (NDSS) Symposium (2018)","DOI":"10.14722\/ndss.2018.23204"},{"key":"1160_CR36","unstructured":"Zenati, H., Foo, C.S., Lecouat, B., Manek, G., Chandrasekhar, V.R.: Efficient gan-based anomaly detection. arXiv:1802.06222 (2018)"},{"key":"1160_CR37","doi-asserted-by":"crossref","unstructured":"Zenati, H., Romain, M., Foo, C.-S., Lecouat, B., Chandrasekhar, V.: Adversarially learned anomaly detection. In: 2018 IEEE International Conference on Data Mining (ICDM), pp. 727\u2013736. IEEE (2018)","DOI":"10.1109\/ICDM.2018.00088"},{"key":"1160_CR38","doi-asserted-by":"crossref","unstructured":"Mohammadi, B., Sabokrou, M.: End-to-end adversarial learning for intrusion detection in computer networks. In: 2019 IEEE 44th Conference on Local Computer Networks (LCN), pp. 270\u2013273. IEEE (2019)","DOI":"10.1109\/LCN44214.2019.8990759"},{"key":"1160_CR39","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.media.2019.01.010","volume":"54","author":"T Schlegl","year":"2019","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S.M., Langs, G., Schmidt-Erfurth, U.: f-anogan: Fast unsupervised anomaly detection with generative adversarial networks. Med. Image Anal. 54, 30\u201344 (2019)","journal-title":"Med. Image Anal."},{"issue":"8","key":"1160_CR40","doi-asserted-by":"publisher","first-page":"6247","DOI":"10.1109\/JIOT.2020.3024800","volume":"8","author":"PF de Araujo-Filho","year":"2020","unstructured":"de Araujo-Filho, P.F., Kaddoum, G., Campelo, D.R., Santos, A.G., Mac\u00eado, D., Zanchettin, C.: Intrusion detection for cyber-physical systems using generative adversarial networks in fog environment. IEEE Internet Things J. 8(8), 6247\u20136256 (2020)","journal-title":"IEEE Internet Things J."},{"key":"1160_CR41","doi-asserted-by":"crossref","unstructured":"Huang, S., Lei, K.: Igan-ids: An imbalanced generative adversarial network towards intrusion detection system in ad-hoc networks. Ad Hoc Netw. 105,(2020)","DOI":"10.1016\/j.adhoc.2020.102177"},{"key":"1160_CR42","doi-asserted-by":"crossref","unstructured":"Yuan, D., Ota, K., Dong, M., Zhu, X., Wu, T., Zhang, L., Ma, J.: Intrusion detection for smart home security based on data augmentation with edge computing. In: ICC 2020-2020 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/ICC40277.2020.9148632"},{"key":"1160_CR43","unstructured":"Flores, S.: Variational Autoencoders Are Beautiful. https:\/\/www.compthree.com\/blog\/autoencoder\/ (2019).\u00a0 Accessed 15 Apr 2019"},{"key":"1160_CR44","unstructured":"Miyato, T., Kataoka, T., Koyama, M., Yoshida, Y.: Spectral normalization for generative adversarial networks. arXiv:1802.05957 (2018)"},{"key":"1160_CR45","unstructured":"Gulrajani, I., Ahmed, F., Arjovsky, M., Dumoulin, V., Courville, A.C.: Improved training of wasserstein gans. Advances in neural information processing systems 30 (2017)"},{"key":"1160_CR46","unstructured":"Roth, K., Lucchi, A., Nowozin, S., Hofmann, T.: Stabilizing training of generative adversarial networks through regularization. Advances in neural information processing systems 30 (2017)"},{"key":"1160_CR47","unstructured":"Arjovsky, M., Chintala, S., Bottou, L.: Wasserstein generative adversarial networks. In: International Conference on Machine Learning, pp. 214\u2013223. PMLR (2017)"},{"key":"1160_CR48","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136. Ieee (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"1160_CR49","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"1160_CR50","unstructured":"Sch\u00f6lkopf, B., Williamson, R.C., Smola, A., Shawe-Taylor, J., Platt, J.: Support vector method for novelty detection. Advances in neural information processing systems 12 (1999)"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-023-01160-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11280-023-01160-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-023-01160-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,11]],"date-time":"2023-10-11T00:18:30Z","timestamp":1696983510000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11280-023-01160-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,9]]},"references-count":50,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["1160"],"URL":"https:\/\/doi.org\/10.1007\/s11280-023-01160-4","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2081269\/v1","asserted-by":"object"}]},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"value":"1386-145X","type":"print"},{"value":"1573-1413","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,9]]},"assertion":[{"value":"19 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors declare that there is no competing interest regarding the publication of this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}