{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T00:11:49Z","timestamp":1760746309936,"version":"build-2065373602"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T00:00:00Z","timestamp":1754956800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T00:00:00Z","timestamp":1754956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Huzhou Science and Technology Bureau of Zhejiang Province","award":["2024YZ08","2024YZ08"],"award-info":[{"award-number":["2024YZ08","2024YZ08"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12083-025-02093-7","type":"journal-article","created":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T11:47:19Z","timestamp":1754999239000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An efficient vehicular network anomaly detection framework based on encoder and dynamic threshold adjustment"],"prefix":"10.1007","volume":"18","author":[{"given":"Huibin","family":"Xu","sequence":"first","affiliation":[]},{"given":"Long","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Jingnan","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Jishui","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,12]]},"reference":[{"issue":"10","key":"2093_CR1","doi-asserted-by":"publisher","first-page":"10262","DOI":"10.1109\/TITS.2023.3305380","volume":"24","author":"F-Y Wang","year":"2023","unstructured":"Wang F-Y, Lin Y, Ioannou PA, Vlacic L, Liu X, Eskandarian A, Lv Y, Na X, Cebon D, Ma J, Li L, Olaverri-Monreal C (2023) Transportation 5.0: the dao to safe, secure, and sustainable intelligent transportation systems. IEEE Trans Intell Trans Syst 24(10):10262\u201310278. https:\/\/doi.org\/10.1109\/TITS.2023.3305380","journal-title":"IEEE Trans Intell Trans Syst"},{"issue":"1","key":"2093_CR2","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1109\/TIV.2022.3157049","volume":"7","author":"D Cao","year":"2022","unstructured":"Cao D, Wang X, Li L, Lv C, Na X, Xing Y, Li X, Li Y, Chen Y, Wang F-Y (2022) Future directions of intelligent vehicles: potentials, possibilities, and perspectives. IEEE Trans Intell Veh 7(1):7\u201310. https:\/\/doi.org\/10.1109\/TIV.2022.3157049","journal-title":"IEEE Trans Intell Veh"},{"issue":"1","key":"2093_CR3","doi-asserted-by":"publisher","first-page":"1000","DOI":"10.1109\/TITS.2022.3188671","volume":"24","author":"A Oseni","year":"2023","unstructured":"Oseni A, Moustafa N, Creech G, Sohrabi N, Strelzoff A, Tari Z, Linkov I (2023) An explainable deep learning framework for resilient intrusion detection in iot-enabled transportation networks. IEEE Trans Intell Trans Syst 24(1):1000\u20131014. https:\/\/doi.org\/10.1109\/TITS.2022.3188671","journal-title":"IEEE Trans Intell Trans Syst"},{"issue":"1","key":"2093_CR4","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1109\/TVT.2024.3452513","volume":"74","author":"H Xu","year":"2025","unstructured":"Xu H, Fang L, Lv H, Xu S, Shen S, Yu S (2025) Maximizing vanets secrecy data rate using dueling double deep q-networks. IEEE Trans Veh Technol 74(1):1267\u20131279. https:\/\/doi.org\/10.1109\/TVT.2024.3452513","journal-title":"IEEE Trans Veh Technol"},{"key":"2093_CR5","doi-asserted-by":"publisher","first-page":"100547","DOI":"10.1016\/j.cosrev.2023.100547","volume":"48","author":"B Hildebrand","year":"2023","unstructured":"Hildebrand B, Baza M, Salman T, Tabassum S, Konatham B, Amsaad F, Razaque A (2023) A comprehensive review on blockchains for internet of vehicles: challenges and directions. Comput Sci Rev 48:100547","journal-title":"Comput Sci Rev"},{"key":"2093_CR6","doi-asserted-by":"crossref","unstructured":"Wang X, Zhu H, Ning Z, Guo L, Zhang Y (2023) Blockchain intelligence for internet of vehicles: Challenges and solutions. IEEE Commun Surv Tutor","DOI":"10.1109\/COMST.2023.3305312"},{"key":"2093_CR7","doi-asserted-by":"publisher","first-page":"110088","DOI":"10.1016\/j.cie.2024.110088","volume":"190","author":"F Onur","year":"2024","unstructured":"Onur F, G\u00f6nen S, Bar\u0131\u015fkan MA, Kubat C, Tunay M, Y\u0131lmaz EN (2024) Machine learning-based identification of cybersecurity threats affecting autonomous vehicle systems. Comput Ind Eng 190:110088","journal-title":"Comput Ind Eng"},{"issue":"15","key":"2093_CR8","doi-asserted-by":"publisher","first-page":"1765","DOI":"10.3390\/electronics10151765","volume":"10","author":"F Pascale","year":"2021","unstructured":"Pascale F, Adinolfi EA, Coppola S, Santonicola E (2021) Cybersecurity in automotive: an intrusion detection system in connected vehicles. Electronics 10(15):1765","journal-title":"Electronics"},{"key":"2093_CR9","doi-asserted-by":"publisher","first-page":"103107","DOI":"10.1016\/j.cose.2023.103107","volume":"127","author":"T Zoppi","year":"2023","unstructured":"Zoppi T, Ceccarelli A, Puccetti T, Bondavalli A (2023) Which algorithm can detect unknown attacks? comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection. Comput Secur 127:103107","journal-title":"Comput Secur"},{"issue":"4","key":"2093_CR10","doi-asserted-by":"publisher","first-page":"2761","DOI":"10.1007\/s11831-023-09884-2","volume":"30","author":"V Rani","year":"2023","unstructured":"Rani V, Nabi ST, Kumar M, Mittal A, Kumar K (2023) Self-supervised learning: a succinct review. Arch Comput Methods Eng 30(4):2761\u20132775","journal-title":"Arch Comput Methods Eng"},{"key":"2093_CR11","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.comcom.2021.08.026","volume":"180","author":"KN Rao","year":"2021","unstructured":"Rao KN, Rao KV, PVGD PR (2021) A hybrid intrusion detection system based on sparse autoencoder and deep neural network. Comput Commun 180:77\u201388","journal-title":"Comput Commun"},{"issue":"11","key":"2093_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3570954","volume":"55","author":"S Rajapaksha","year":"2023","unstructured":"Rajapaksha S, Kalutarage H, Al-Kadri MO, Petrovski A, Madzudzo G, Cheah M (2023) Ai-based intrusion detection systems for in-vehicle networks: a survey. ACM Comput Surv 55(11):1\u201340","journal-title":"ACM Comput Surv"},{"key":"2093_CR13","doi-asserted-by":"publisher","first-page":"110030","DOI":"10.1016\/j.knosys.2022.110030","volume":"258","author":"E Caville","year":"2022","unstructured":"Caville E, Lo WW, Layeghy S, Portmann M (2022) Anomal-e: a self-supervised network intrusion detection system based on graph neural networks. Knowl-Based Syst 258:110030","journal-title":"Knowl-Based Syst"},{"key":"2093_CR14","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1016\/j.future.2021.09.027","volume":"127","author":"S Roy","year":"2022","unstructured":"Roy S, Li J, Choi B-J, Bai Y (2022) A lightweight supervised intrusion detection mechanism for iot networks. Future Gener Comput Syst 127:276\u2013285","journal-title":"Future Gener Comput Syst"},{"issue":"1","key":"2093_CR15","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/JIOT.2021.3084796","volume":"9","author":"L Yang","year":"2021","unstructured":"Yang L, Moubayed A, Shami A (2021) Mth-ids: a multitiered hybrid intrusion detection system for internet of vehicles. IEEE Internet Things J 9(1):616\u2013632","journal-title":"IEEE Internet Things J"},{"key":"2093_CR16","doi-asserted-by":"publisher","first-page":"123439","DOI":"10.1016\/j.eswa.2024.123439","volume":"248","author":"C Nixon","year":"2024","unstructured":"Nixon C, Sedky M, Champion J, Hassan M (2024) Salad: A split active learning based unsupervised network data stream anomaly detection method using autoencoders. Expert Syst Appl 248:123439","journal-title":"Expert Syst Appl"},{"issue":"11","key":"2093_CR17","doi-asserted-by":"publisher","first-page":"12013","DOI":"10.1109\/TVT.2021.3113807","volume":"70","author":"T Alladi","year":"2021","unstructured":"Alladi T, Gera B, Agrawal A, Chamola V, Yu FR (2021) Deepadv: a deep neural network framework for anomaly detection in vanets. IEEE Trans Veh Technol 70(11):12013\u201312023","journal-title":"IEEE Trans Veh Technol"},{"issue":"12","key":"2093_CR18","doi-asserted-by":"publisher","first-page":"7114","DOI":"10.1109\/TNNLS.2021.3084249","volume":"33","author":"S Fu","year":"2021","unstructured":"Fu S, Zhong S, Lin L, Zhao M (2021) A novel time-series memory auto-encoder with sequentially updated reconstructions for remaining useful life prediction. IEEE Trans Neural Netw Learn Syst 33(12):7114\u20137125","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"2093_CR19","doi-asserted-by":"publisher","first-page":"107443","DOI":"10.1016\/j.asoc.2021.107443","volume":"108","author":"S Maleki","year":"2021","unstructured":"Maleki S, Maleki S, Jennings NR (2021) Unsupervised anomaly detection with lstm autoencoders using statistical data-filtering. Appl Soft Comput 108:107443","journal-title":"Appl Soft Comput"},{"issue":"6","key":"2093_CR20","doi-asserted-by":"publisher","first-page":"2623","DOI":"10.1021\/acs.jcim.1c00160","volume":"61","author":"C Esposito","year":"2021","unstructured":"Esposito C, Landrum GA, Schneider N, Stiefl N, Riniker S (2021) Ghost: adjusting the decision threshold to handle imbalanced data in machine learning. J Chem Inf Model 61(6):2623\u20132640","journal-title":"J Chem Inf Model"},{"issue":"5","key":"2093_CR21","doi-asserted-by":"publisher","first-page":"1287","DOI":"10.1109\/TFUZZ.2021.3057705","volume":"30","author":"Q Sun","year":"2021","unstructured":"Sun Q, Wu J, Chiclana F, Fujita H, Herrera-Viedma E (2021) A dynamic feedback mechanism with attitudinal consensus threshold for minimum adjustment cost in group decision making. IEEE Trans Fuzzy Syst 30(5):1287\u20131301","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"4","key":"2093_CR22","doi-asserted-by":"publisher","first-page":"3279","DOI":"10.1109\/TKDE.2021.3126456","volume":"35","author":"G Brauwers","year":"2021","unstructured":"Brauwers G, Frasincar F (2021) A general survey on attention mechanisms in deep learning. IEEE Trans Knowl Data Eng 35(4):3279\u20133298","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2093_CR23","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.neucom.2021.03.091","volume":"452","author":"Z Niu","year":"2021","unstructured":"Niu Z, Zhong G, Yu H (2021) A review on the attention mechanism of deep learning. Neurocomputing 452:48\u201362","journal-title":"Neurocomputing"},{"issue":"8","key":"2093_CR24","doi-asserted-by":"publisher","first-page":"6037","DOI":"10.1007\/s10462-022-10148-x","volume":"55","author":"A Santana Correia","year":"2022","unstructured":"Santana Correia A, Colombini EL (2022) Attention, please! a survey of neural attention models in deep learning. Artif Intell Rev 55(8):6037\u20136124","journal-title":"Artif Intell Rev"},{"key":"2093_CR25","doi-asserted-by":"publisher","first-page":"101209","DOI":"10.1016\/j.iot.2024.101209","volume":"26","author":"ECP Neto","year":"2024","unstructured":"Neto ECP, Taslimasa H, Dadkhah S, Iqbal S, Xiong P, Rahman T, Ghorbani AA (2024) Ciciov 2024: advancing realistic ids approaches against dos and spoofing attack in iov can bus. Int Things 26:101209. https:\/\/doi.org\/10.1016\/j.iot.2024.101209","journal-title":"Int Things"},{"key":"2093_CR26","first-page":"100198","volume":"21","author":"HM Song","year":"2020","unstructured":"Song HM, Woo J, Kim HK (2020) In-vehicle network intrusion detection using deep convolutional neural network. Veh Commun 21:100198","journal-title":"Veh Commun"},{"key":"2093_CR27","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.neucom.2019.10.118","volume":"408","author":"J Cervantes","year":"2020","unstructured":"Cervantes J, Garcia-Lamont F, Rodr\u00edguez-Mazahua L, Lopez A (2020) A comprehensive survey on support vector machine classification: applications, challenges and trends. Neurocomputing 408:189\u2013215","journal-title":"Neurocomputing"},{"key":"2093_CR28","doi-asserted-by":"crossref","unstructured":"Alshamy R, Ghurab M, Othman S, Alshami F (2021) Intrusion detection model for imbalanced dataset using smote and random forest algorithm. In: Advances in cyber security: third international conference, ACeS 2021, Penang, Malaysia, August 24\u201325, 2021, Revised Selected Papers 3. Springer, pp 361\u2013378","DOI":"10.1007\/978-981-16-8059-5_22"},{"key":"2093_CR29","doi-asserted-by":"publisher","first-page":"107810","DOI":"10.1016\/j.compeleceng.2022.107810","volume":"99","author":"T Saba","year":"2022","unstructured":"Saba T, Rehman A, Sadad T, Kolivand H, Bahaj SA (2022) Anomaly-based intrusion detection system for iot networks through deep learning model. Comput Electr Eng 99:107810","journal-title":"Comput Electr Eng"},{"issue":"4","key":"2093_CR30","doi-asserted-by":"publisher","first-page":"515","DOI":"10.3390\/electronics11040515","volume":"11","author":"A Meliboev","year":"2022","unstructured":"Meliboev A, Alikhanov J, Kim W (2022) Performance evaluation of deep learning based network intrusion detection system across multiple balanced and imbalanced datasets. Electronics 11(4):515","journal-title":"Electronics"},{"key":"2093_CR31","doi-asserted-by":"publisher","first-page":"103111","DOI":"10.1016\/j.jnca.2021.103111","volume":"187","author":"S-W Lee","year":"2021","unstructured":"Lee S-W, Mohammadi M, Rashidi S, Rahmani AM, Masdari M, Hosseinzadeh M et al (2021) Towards secure intrusion detection systems using deep learning techniques: comprehensive analysis and review. J Netw Comput Appl 187:103111","journal-title":"J Netw Comput Appl"},{"issue":"4","key":"2093_CR32","doi-asserted-by":"publisher","first-page":"948","DOI":"10.26599\/TST.2023.9010032","volume":"29","author":"A Eljialy","year":"2024","unstructured":"Eljialy A, Uddin MY, Ahmad S (2024) Novel framework for an intrusion detection system using multiple feature selection methods based on deep learning. Tsinghua Sci Technol 29(4):948\u2013958","journal-title":"Tsinghua Sci Technol"},{"key":"2093_CR33","doi-asserted-by":"publisher","first-page":"22351","DOI":"10.1109\/ACCESS.2021.3056614","volume":"9","author":"ZK Maseer","year":"2021","unstructured":"Maseer ZK, Yusof R, Bahaman N, Mostafa SA, Foozy CFM (2021) Benchmarking of machine learning for anomaly based intrusion detection systems in the cicids2017 dataset. IEEE Access 9:22351\u201322370","journal-title":"IEEE Access"},{"key":"2093_CR34","doi-asserted-by":"publisher","first-page":"107810","DOI":"10.1016\/j.compeleceng.2022.107810","volume":"99","author":"T Saba","year":"2022","unstructured":"Saba T, Rehman A, Sadad T, Kolivand H, Bahaj SA (2022) Anomaly-based intrusion detection system for iot networks through deep learning model. Comput Electr Eng 99:107810","journal-title":"Comput Electr Eng"},{"issue":"4","key":"2093_CR35","doi-asserted-by":"publisher","first-page":"4221","DOI":"10.1002\/ett.4221","volume":"32","author":"M Ramaiah","year":"2021","unstructured":"Ramaiah M, Chandrasekaran V, Ravi V, Kumar N (2021) An intrusion detection system using optimized deep neural network architecture. Trans Emerg Telecommun Technol 32(4):4221","journal-title":"Trans Emerg Telecommun Technol"},{"key":"2093_CR36","doi-asserted-by":"publisher","first-page":"102289","DOI":"10.1016\/j.cose.2021.102289","volume":"106","author":"J Liu","year":"2021","unstructured":"Liu J, Gao Y, Hu F (2021) A fast network intrusion detection system using adaptive synthetic oversampling and lightgbm. Comput Secu 106:102289","journal-title":"Comput Secu"},{"key":"2093_CR37","doi-asserted-by":"publisher","first-page":"110173","DOI":"10.1016\/j.asoc.2023.110173","volume":"137","author":"H Mohammadian","year":"2023","unstructured":"Mohammadian H, Ghorbani AA, Lashkari AH (2023) A gradient-based approach for adversarial attack on deep learning-based network intrusion detection systems. Appl Soft Comput 137:110173","journal-title":"Appl Soft Comput"},{"key":"2093_CR38","doi-asserted-by":"publisher","first-page":"107852","DOI":"10.1016\/j.knosys.2021.107852","volume":"238","author":"Q Liu","year":"2022","unstructured":"Liu Q, Wang D, Jia Y, Luo S, Wang C (2022) A multi-task based deep learning approach for intrusion detection. Knowl-Based Syst 238:107852","journal-title":"Knowl-Based Syst"},{"issue":"1","key":"2093_CR39","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/MCE.2021.3116923","volume":"12","author":"H Narasimhan","year":"2021","unstructured":"Narasimhan H, Ravi V, Mohammad N (2021) Unsupervised deep learning approach for in-vehicle intrusion detection system. IEEE Cons Electron Mag 12(1):103\u2013108","journal-title":"IEEE Cons Electron Mag"},{"issue":"10","key":"2093_CR40","doi-asserted-by":"publisher","first-page":"7094","DOI":"10.1007\/s10489-021-02205-9","volume":"51","author":"A Binbusayyis","year":"2021","unstructured":"Binbusayyis A, Vaiyapuri T (2021) Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class svm. Appl Intell 51(10):7094\u20137108","journal-title":"Appl Intell"},{"issue":"4","key":"2093_CR41","doi-asserted-by":"publisher","first-page":"4951","DOI":"10.1109\/TNSM.2023.3260039","volume":"20","author":"PF Araujo-Filho","year":"2023","unstructured":"Araujo-Filho PF, Naili M, Kaddoum G, Fapi ET, Zhu Z (2023) Unsupervised gan-based intrusion detection system using temporal convolutional networks and self-attention. IEEE Trans Netw Serv Manag 20(4):4951\u20134963","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"20","key":"2093_CR42","doi-asserted-by":"publisher","first-page":"8407","DOI":"10.3390\/s23208407","volume":"23","author":"Y Ren","year":"2023","unstructured":"Ren Y, Feng K, Hu F, Chen L, Chen Y (2023) A lightweight unsupervised intrusion detection model based on variational auto-encoder. Sensors 23(20):8407","journal-title":"Sensors"},{"key":"2093_CR43","doi-asserted-by":"publisher","first-page":"107086","DOI":"10.1016\/j.knosys.2021.107086","volume":"224","author":"Y Chen","year":"2021","unstructured":"Chen Y, Ashizawa N, Yeo CK, Yanai N, Yean S (2021) Multi-scale self-organizing map assisted deep autoencoding gaussian mixture model for unsupervised intrusion detection. Knowl-Based Syst 224:107086","journal-title":"Knowl-Based Syst"},{"key":"2093_CR44","unstructured":"Korba AA, Karabadji NE, Ghamri-Doudane Y (2025) Zero-day botnet attack detection in IoV: a modular approach using isolation forests and particle swarm optimization. arxiv:2504.18814"},{"issue":"9","key":"2093_CR45","doi-asserted-by":"publisher","first-page":"12399","DOI":"10.1109\/TVT.2024.3385916","volume":"73","author":"AA Korba","year":"2024","unstructured":"Korba AA, Boualouache A, Ghamri-Doudane Y (2024) Zero-x: a blockchain-enabled open-set federated learning framework for zero-day attack detection in IOV. IEEE Trans Veh Technol 73(9):12399\u201312414. https:\/\/doi.org\/10.1109\/TVT.2024.3385916","journal-title":"IEEE Trans Veh Technol"},{"key":"2093_CR46","doi-asserted-by":"publisher","unstructured":"Amara\u00a0Korba A, Boualouache A, Brik B, Rahal R, Ghamri-Doudane Y, Mohammed\u00a0Senouci S (2023) Federated learning for zero-day attack detection in 5g and beyond v2x networks. In: ICC 2023 - IEEE international conference on communications, pp 1137\u20131142. https:\/\/doi.org\/10.1109\/ICC45041.2023.10279368","DOI":"10.1109\/ICC45041.2023.10279368"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02093-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02093-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02093-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T06:38:58Z","timestamp":1760683138000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02093-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,12]]},"references-count":46,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2093"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02093-7","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,8,12]]},"assertion":[{"value":"20 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"265"}}