{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:32:15Z","timestamp":1772119935277,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,10,4]],"date-time":"2023-10-04T00:00:00Z","timestamp":1696377600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,4]],"date-time":"2023-10-04T00:00:00Z","timestamp":1696377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62022077"],"award-info":[{"award-number":["62022077"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62022077"],"award-info":[{"award-number":["62022077"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62022077"],"award-info":[{"award-number":["62022077"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62022077"],"award-info":[{"award-number":["62022077"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s11280-023-01214-7","type":"journal-article","created":{"date-parts":[[2023,10,4]],"date-time":"2023-10-04T08:01:52Z","timestamp":1696406512000},"page":"3915-3943","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Securing recommender system via cooperative training"],"prefix":"10.1007","volume":"26","author":[{"given":"Qingyang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Chenwang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Defu","family":"Lian","sequence":"additional","affiliation":[]},{"given":"Enhong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,4]]},"reference":[{"key":"1214_CR1","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.knosys.2013.03.012","volume":"46","author":"J Bobadilla","year":"2013","unstructured":"Bobadilla, J., Ortega, F., Hernando, A., Guti\u00e9rrez, A.: Recommender systems survey. Knowl.-Based Syst. 46, 109\u2013132 (2013)","journal-title":"Knowl.-Based Syst."},{"key":"1214_CR2","doi-asserted-by":"publisher","first-page":"100439","DOI":"10.1016\/j.cosrev.2021.100439","volume":"43","author":"Y Himeur","year":"2022","unstructured":"Himeur, Y., Sayed, A., Alsalemi, A., Bensaali, F., Amira, A., Varlamis, I., Eirinaki, M., Sardianos, C., Dimitrakopoulos, G.: Blockchain-based recommender systems: Applications, challenges and future opportunities. Comput. Sci. Rev. 43, 100439 (2022)","journal-title":"Comput. Sci. Rev."},{"key":"1214_CR3","doi-asserted-by":"crossref","unstructured":"Lian, D., Wu, Y., Ge, Y., Xie, X., Chen, E.: Geography-aware sequential location recommendation. In: Proceedings of KDD\u201920, pp. 2009\u20132019. (2020)","DOI":"10.1145\/3394486.3403252"},{"issue":"3","key":"1214_CR4","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1509\/jmkr.43.3.345","volume":"43","author":"JA Chevalier","year":"2006","unstructured":"Chevalier, J.A., Mayzlin, D.: The effect of word of mouth on sales: Online book reviews. J. Mark. Res. 43(3), 345\u2013354 (2006)","journal-title":"J. Mark. Res."},{"key":"1214_CR5","doi-asserted-by":"crossref","unstructured":"Wu, C., Lian, D., Ge, Y., Zhu, Z., Chen, E.: Triple adversarial learning for influence based poisoning attack in recommender systems. In: Proceedings of KDD\u201921, pp. 1830\u20131840. (2021)","DOI":"10.1145\/3447548.3467335"},{"key":"1214_CR6","first-page":"1885","volume":"29","author":"B Li","year":"2016","unstructured":"Li, B., Wang, Y., Singh, A., Vorobeychik, Y.: Data poisoning attacks on factorization-based collaborative filtering. NIPS 29, 1885\u20131893 (2016)","journal-title":"NIPS"},{"key":"1214_CR7","doi-asserted-by":"crossref","unstructured":"Lin, C., Chen, S., Li, H., Xiao, Y., Li, Q. Lianyun and\u00a0Yang: Attacking recommender systems with augmented user profiles. In: CIKM, pp. 855\u2013864. (2020)","DOI":"10.1145\/3340531.3411884"},{"key":"1214_CR8","first-page":"156","volume":"56","author":"H Liu","year":"2014","unstructured":"Liu, H., Hu, Z., Mian, A., Tian, H., Zhu, X.: A new user similarity model to improve the accuracy of collaborative filtering. KBS 56, 156\u2013166 (2014)","journal-title":"KBS"},{"key":"1214_CR9","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv (2017)"},{"key":"1214_CR10","doi-asserted-by":"crossref","unstructured":"Wu, C., Lian, D., Ge, Y., Zhu, Z., Chen, E., Yuan, S.: Fight fire with fire: Towards robust recommender systems via adversarial poisoning training. In: SIGIR, pp. 1074\u20131083. (2021)","DOI":"10.1145\/3404835.3462914"},{"issue":"3","key":"1214_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3567420","volume":"41","author":"T Nguyen Thanh","year":"2023","unstructured":"Nguyen Thanh, T., Quach, N.D.K., Nguyen, T.T., Huynh, T.T., Vu, V.H., Nguyen, P.L., Jo, J., Nguyen, Q.V.H.: Poisoning GNN-based recommender systems with generative surrogate-based attacks. ACM Trans. Inf. Syst. 41(3), 1\u201324 (2023)","journal-title":"ACM Trans. Inf. Syst."},{"key":"1214_CR12","doi-asserted-by":"crossref","unstructured":"Lam, S.K., Riedl, J.: Shilling recommender systems for fun and profit. In: WWW, pp. 393\u2013402. (2004)","DOI":"10.1145\/988672.988726"},{"key":"1214_CR13","doi-asserted-by":"crossref","unstructured":"Burke, R., Mobasher, B., Williams, C., Bhaumik, R.: Classification features for attack detection in collaborative recommender systems. In: KDD, pp. 542\u2013547. (2006)","DOI":"10.1145\/1150402.1150465"},{"key":"1214_CR14","doi-asserted-by":"crossref","unstructured":"Cohen, R., Sar\u00a0Shalom, O., Jannach, D., Amir, A.: A black-box attack model for visually-aware recommender systems. In: Proceedings of the 14th ACM International Conference on Web Search and Data Mining, pp. 94\u2013102. (2021)","DOI":"10.1145\/3437963.3441757"},{"key":"1214_CR15","doi-asserted-by":"crossref","unstructured":"Yue, Z., He, Z., Zeng, H., McAuley, J.: Black-box attacks on sequential recommenders via data-free model extraction. In: Proceedings of the 15th ACM Conference on Recommender Systems, pp. 44\u201354. (2021)","DOI":"10.1145\/3460231.3474275"},{"key":"1214_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, S., Yin, H., Chen, T., Huang, Z., Nguyen, Q.V.H., Cui, L.: Pipattack: poisoning federated recommender systems for manipulating item promotion. In: Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining, pp. 1415\u20131423. (2022)","DOI":"10.1145\/3488560.3498386"},{"key":"1214_CR17","doi-asserted-by":"crossref","unstructured":"Fang, M., Yang, G., Gong, N.Z., Liu, J.: Poisoning attacks to graph-based recommender systems. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 381\u2013392. (2018)","DOI":"10.1145\/3274694.3274706"},{"key":"1214_CR18","doi-asserted-by":"crossref","unstructured":"Huang, H., Mu, J., Gong, N.Z., Li, Q., Liu, B., Xu, M.: Data poisoning attacks to deep learning based recommender systems. http:\/\/arxiv.org\/abs\/2101.02644 (2021)","DOI":"10.14722\/ndss.2021.24525"},{"key":"1214_CR19","doi-asserted-by":"crossref","unstructured":"Wang, Q., Lian, D., Wu, C., Chen, E.: Towards robust recommender systems via triple cooperative defense. In: Web Information Systems Engineering\u2013WISE 2022: 23rd International Conference, Biarritz, France, November 1\u20133, 2022, Proceedings, pp. 564\u2013578. Springer (2022)","DOI":"10.1007\/978-3-031-20891-1_40"},{"issue":"3","key":"1214_CR20","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1109\/TMM.2018.2887018","volume":"21","author":"Y Du","year":"2018","unstructured":"Du, Y., Fang, M., Yi, J., Xu, C., Cheng, J., Tao, D.: Enhancing the robustness of neural collaborative filtering systems under malicious attacks. IEEE Trans. Multimedia 21(3), 555\u2013565 (2018)","journal-title":"IEEE Trans. Multimedia"},{"issue":"1","key":"1214_CR21","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s10462-018-9655-x","volume":"53","author":"M Si","year":"2020","unstructured":"Si, M., Li, Q.: Shilling attacks against collaborative recommender systems: a review. Artif. Intell. Rev. 53(1), 291\u2013319 (2020)","journal-title":"Artif. Intell. Rev."},{"key":"1214_CR22","doi-asserted-by":"crossref","unstructured":"Ovaisi, Z., Heinecke, S., Li, J., Zhang, Y., Zheleva, E., Xiong, C.: Rgrecsys: A toolkit for robustness evaluation of recommender systems. arXiv (2022)","DOI":"10.1145\/3488560.3502192"},{"issue":"6","key":"1214_CR23","doi-asserted-by":"publisher","first-page":"3872","DOI":"10.1002\/ett.3872","volume":"32","author":"L Chen","year":"2021","unstructured":"Chen, L., Xu, Y., Xie, F., Huang, M., Zheng, Z.: Data poisoning attacks on neighborhood-based recommender systems. Trans. Emerg. Telecommun. Technol. 32(6), 3872 (2021)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"1214_CR24","doi-asserted-by":"crossref","unstructured":"Guo, H., Tang, R., Ye, Y., Li, Z., He, X.: DeepFM: a factorization-machine based neural network for CTR prediction. arXiv (2017)","DOI":"10.24963\/ijcai.2017\/239"},{"key":"1214_CR25","doi-asserted-by":"crossref","unstructured":"He, X., Liao, L., Zhang, H., Nie, L., Hu, X., Chua, T.-S.: Neural collaborative filtering. In: WWW, pp. 173\u2013182. (2017)","DOI":"10.1145\/3038912.3052569"},{"key":"1214_CR26","doi-asserted-by":"crossref","unstructured":"Fang, M., Gong, N.Z., Liu, J.: Influence function based data poisoning attacks to top-n recommender systems. In: Proceedings of The Web Conference 2020, pp. 3019\u20133025. (2020)","DOI":"10.1145\/3366423.3380072"},{"key":"1214_CR27","doi-asserted-by":"crossref","unstructured":"Tang, J., Wen, H., Wang, K.: Revisiting adversarially learned injection attacks against recommender systems. In: RecSys, pp. 318\u2013327. (2020)","DOI":"10.1145\/3383313.3412243"},{"key":"1214_CR28","first-page":"22629","volume":"33","author":"B Jin","year":"2020","unstructured":"Jin, B., Lian, D., Liu, Z., Liu, Q., Ma, J., Xie, X., Chen, E.: Sampling-decomposable generative adversarial recommender. Adv. Neur. In. 33, 22629\u201322639 (2020)","journal-title":"Adv. Neur. In."},{"key":"1214_CR29","doi-asserted-by":"crossref","unstructured":"Christakopoulou, K., Banerjee, A.: Adversarial attacks on an oblivious recommender. In: RecSys, pp. 322\u2013330. (2019)","DOI":"10.1145\/3298689.3347031"},{"key":"1214_CR30","unstructured":"Li, C., Xu, T., Zhu, J., Zhang, B.: Triple generative adversarial nets. Adv. Neural Inf. Proces. Syst. 30 (2017)"},{"key":"1214_CR31","doi-asserted-by":"crossref","unstructured":"Yang, G., Gong, N.Z., Cai, Y.: Fake co-visitation injection attacks to recommender systems. In: NDSS. (2017)","DOI":"10.14722\/ndss.2017.23020"},{"key":"1214_CR32","doi-asserted-by":"crossref","unstructured":"Oh, S., Kumar, S.: Robustness of deep recommendation systems to untargeted interaction perturbations. arXiv (2022)","DOI":"10.1145\/3511808.3557425"},{"key":"1214_CR33","doi-asserted-by":"crossref","unstructured":"Fan, W., Derr, T., Zhao, X., Ma, Y., Liu, H., Wang, J., Tang, J., Li, Q.: Attacking black-box recommendations via copying cross-domain user profiles. In: ICDE, pp. 1583\u20131594. IEEE (2021)","DOI":"10.1109\/ICDE51399.2021.00140"},{"key":"1214_CR34","doi-asserted-by":"crossref","unstructured":"Song, J., Li, Z., Hu, Z., Wu, Y., Li, Z., Li, J., Gao, J.: PoisonRec: an adaptive data poisoning framework for attacking black-box recommender systems. In: ICDE, pp. 157\u2013168. IEEE (2020)","DOI":"10.1109\/ICDE48307.2020.00021"},{"issue":"2","key":"1214_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439729","volume":"54","author":"Y Deldjoo","year":"2021","unstructured":"Deldjoo, Y., Noia, T.D., Merra, F.A.: A survey on adversarial recommender systems: from attack\/defense strategies to generative adversarial networks. CSUR 54(2), 1\u201338 (2021)","journal-title":"CSUR"},{"key":"1214_CR36","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.knosys.2016.02.008","volume":"100","author":"Z Yang","year":"2016","unstructured":"Yang, Z., Xu, L., Cai, Z., Xu, Z.: Re-scale AdaBoost for attack detection in collaborative filtering recommender systems. Knowl.-Based Syst. 100, 74\u201388 (2016)","journal-title":"Knowl.-Based Syst."},{"key":"1214_CR37","unstructured":"Ge, Y., Liu, S., Fu, Z., Tan, J., Li, Z., Xu, S., Li, Y., Xian, Y., Zhang, Y.: A survey on trustworthy recommender systems. http:\/\/arxiv.org\/abs\/2207.12515 (2022)"},{"key":"1214_CR38","unstructured":"Zhang, Y., Tan, Y., Zhang, M., Liu, Y., Chua, T.-S., Ma, S.: Catch the black sheep: unified framework for shilling attack detection based on fraudulent action propagation. In: Twenty-fourth International Joint Conference on Artificial Intelligence. (2015)"},{"key":"1214_CR39","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.knosys.2018.02.032","volume":"148","author":"F Zhang","year":"2018","unstructured":"Zhang, F., Zhang, Z., Zhang, P., Wang, S.: UD-HMM: an unsupervised method for shilling attack detection based on hidden Markov model and hierarchical clustering. Knowl.-Based Syst. 148, 146\u2013166 (2018)","journal-title":"Knowl.-Based Syst."},{"key":"1214_CR40","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Kulkarni, S.R.: Detection of shilling attacks in recommender systems via spectral clustering. In: FUSION, pp. 1\u20138. IEEE (2014)","DOI":"10.1109\/MLSP.2013.6661953"},{"issue":"5\u20136","key":"1214_CR41","first-page":"729","volume":"16","author":"J Cao","year":"2013","unstructured":"Cao, J., Wu, Z., Mao, B., Zhang, Y.: Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. WWW 16(5\u20136), 729\u2013748 (2013)","journal-title":"WWW"},{"key":"1214_CR42","doi-asserted-by":"crossref","unstructured":"Cheng, Z., Hurley, N.: Effective diverse and obfuscated attacks on model-based recommender systems. In: Proceedings of the Third ACM Conference on Recommender Systems, pp. 141\u2013148. (2009)","DOI":"10.1145\/1639714.1639739"},{"key":"1214_CR43","unstructured":"Athalye, A., Carlini, N., Wagner, D.: Obfuscated gradients give a false sense of security: circumventing defenses to adversarial examples. In: ICML, pp. 274\u2013283. PMLR (2018)"},{"key":"1214_CR44","doi-asserted-by":"crossref","unstructured":"Machado, G.R., Silva, E., Goldschmidt, R.R.: Adversarial machine learning in image classification: a survey toward the defender\u2019s perspective. CSUR (1), 1\u201338 (2021)","DOI":"10.1145\/3485133"},{"key":"1214_CR45","doi-asserted-by":"crossref","unstructured":"He, X., He, Z., Du, X., Chua, T.-S.: Adversarial personalized ranking for recommendation. In: SIGIR, pp. 355\u2013364. (2018)","DOI":"10.1145\/3209978.3209981"},{"key":"1214_CR46","doi-asserted-by":"crossref","unstructured":"Li, R., Wu, X., Wang, W.: Adversarial learning to compare: self-attentive prospective customer recommendation in location based social networks. In: WSDM, pp. 349\u2013357. (2020)","DOI":"10.1145\/3336191.3371841"},{"key":"1214_CR47","doi-asserted-by":"crossref","unstructured":"Park, D.H., Chang, Y.: Adversarial sampling and training for semi-supervised information retrieval. In: The World Wide Web Conference, pp. 1443\u20131453. (2019)","DOI":"10.1145\/3308558.3313416"},{"issue":"5","key":"1214_CR48","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1109\/TKDE.2019.2893638","volume":"32","author":"J Tang","year":"2019","unstructured":"Tang, J., Du, X., He, X., Yuan, F., Tian, Q., Chua, T.-S.: Adversarial training towards robust multimedia recommender system. IEEE Trans. Knowl. Data Eng. 32(5), 855\u2013867 (2019)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1214_CR49","doi-asserted-by":"crossref","unstructured":"Yue, Z., Zeng, H., Kou, Z., Shang, L., Wang, D.: Defending substitution-based profile pollution attacks on sequential recommenders. In: Proceedings of the 16th ACM Conference on Recommender Systems, pp. 59\u201370. (2022)","DOI":"10.1145\/3523227.3546770"},{"key":"1214_CR50","doi-asserted-by":"crossref","unstructured":"Hidano, S., Kiyomoto, S.: Recommender systems robust to data poisoning using trim learning. In: ICISSP, pp. 721\u2013724. (2020)","DOI":"10.5220\/0009180407210724"},{"key":"1214_CR51","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.knosys.2016.11.021","volume":"118","author":"F Zhang","year":"2017","unstructured":"Zhang, F., Lu, Y., Chen, J., Liu, S., Ling, Z.: Robust collaborative filtering based on non-negative matrix factorization and R1-norm. Knowl.-Based Syst. 118, 177\u2013190 (2017)","journal-title":"Knowl.-Based Syst."},{"issue":"3","key":"1214_CR52","doi-asserted-by":"publisher","first-page":"2101","DOI":"10.3233\/JIFS-161705","volume":"32","author":"H Yu","year":"2017","unstructured":"Yu, H., Gao, R., Wang, K., Zhang, F.: A novel robust recommendation method based on kernel matrix factorization. J. Intell. Fuzzy Syst. 32(3), 2101\u20132109 (2017)","journal-title":"J. Intell. Fuzzy Syst."},{"issue":"3","key":"1214_CR53","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MIC.2017.72","volume":"21","author":"B Smith","year":"2017","unstructured":"Smith, B., Linden, G.: Two decades of recommender systems at Amazon.com. IEEE Internet Comput. 21(3), 12\u201318 (2017)","journal-title":"IEEE Internet Comput."},{"issue":"4","key":"1214_CR54","first-page":"1","volume":"6","author":"CA Gomez-Uribe","year":"2015","unstructured":"Gomez-Uribe, C.A., Hunt, N.: The Netflix recommender system: algorithms, business value, and innovation. ACM Trans. Manag. Inf. Syst. (TMIS) 6(4), 1\u201319 (2015)","journal-title":"ACM Trans. Manag. Inf. Syst. (TMIS)"},{"issue":"7","key":"1214_CR55","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1360\/972012-1712","volume":"59","author":"Z Wu","year":"2014","unstructured":"Wu, Z., Wang, Y., Cao, J.: A survey on shilling attack models and detection techniques for recommender systems. Chinese Sci. Bull. 59(7), 551\u2013560 (2014)","journal-title":"Chinese Sci. Bull."},{"key":"1214_CR56","unstructured":"Zhang, J., Xu, X., Han, B., Niu, G., Cui, L., Sugiyama, M., Kankanhalli, M.: Attacks which do not kill training make adversarial learning stronger. In: ICML, pp. 11278\u201311287. PMLR (2020)"},{"key":"1214_CR57","doi-asserted-by":"crossref","unstructured":"Yuan, F., Yao, L., Benatallah, B.: Adversarial collaborative neural network for robust recommendation. In: SIGIR, pp. 1065\u20131068. (2019)","DOI":"10.1145\/3331184.3331321"},{"key":"1214_CR58","unstructured":"Raghunathan, A., Xie, S.M., Yang, F., Duchi, J.C., Liang, P.: Adversarial training can hurt generalization. http:\/\/arxiv.org\/abs\/1906.06032 (2019)"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-023-01214-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11280-023-01214-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-023-01214-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T22:16:29Z","timestamp":1703888189000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11280-023-01214-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,4]]},"references-count":58,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["1214"],"URL":"https:\/\/doi.org\/10.1007\/s11280-023-01214-7","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2761079\/v1","asserted-by":"object"}]},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"value":"1386-145X","type":"print"},{"value":"1573-1413","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,4]]},"assertion":[{"value":"31 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 October 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable. I declare that this paper does not involve any human or animal studies, so no ethical issues are involved.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}