{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T09:36:56Z","timestamp":1773221816415,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T00:00:00Z","timestamp":1764892800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T00:00:00Z","timestamp":1764892800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Zhejiang Lingyan Research and Development Program","award":["2024C01164"],"award-info":[{"award-number":["2024C01164"]}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"crossref","award":["LZ25F020009"],"award-info":[{"award-number":["LZ25F020009"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Enterprise Commissioned Project","award":["KYY-HX-20220619"],"award-info":[{"award-number":["KYY-HX-20220619"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s12083-025-02133-2","type":"journal-article","created":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T13:28:47Z","timestamp":1764941327000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Maximizing secrecy rate for IRS-assisted UAV network with an aerial eavesdropper"],"prefix":"10.1007","volume":"19","author":[{"given":"Tingting","family":"Li","sequence":"first","affiliation":[]},{"given":"Yanjun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuzhe","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jianji","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Zhibo","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,5]]},"reference":[{"issue":"3","key":"2133_CR1","doi-asserted-by":"publisher","first-page":"4728","DOI":"10.1109\/TVT.2024.3486036","volume":"74","author":"L Wang","year":"2025","unstructured":"Wang L, Li Y, Chen Y, Li T, Yin Z (2025) Air\u2013ground coordinated mec: joint task, time allocation and trajectory design. IEEE Trans Veh Technol 74(3):4728\u20134743. https:\/\/doi.org\/10.1109\/TVT.2024.3486036","journal-title":"IEEE Trans Veh Technol"},{"issue":"5","key":"2133_CR2","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MCOM.2016.7470933","volume":"54","author":"Y Zeng","year":"2016","unstructured":"Zeng Y, Zhang R, Lim TJ (2016) Wireless communications with unmanned aerial vehicles: opportunities and challenges. IEEE Commun Mag 54(5):36\u201342. https:\/\/doi.org\/10.1109\/MCOM.2016.7470933","journal-title":"IEEE Commun Mag"},{"issue":"4","key":"2133_CR3","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCOM.2015.7081071","volume":"53","author":"N Yang","year":"2015","unstructured":"Yang N, Wang L, Geraci G, Elkashlan M, Yuan J, Renzo M (2015) Safeguarding 5g wireless communication networks using physical layer security. IEEE Commun Mag 53(4):20\u201327. https:\/\/doi.org\/10.1109\/MCOM.2015.7081071","journal-title":"IEEE Commun Mag"},{"issue":"10","key":"2133_CR4","doi-asserted-by":"publisher","first-page":"6402","DOI":"10.1109\/TWC.2021.3073746","volume":"20","author":"S Li","year":"2021","unstructured":"Li S, Duo B, Renzo M, Tao M, Yuan X (2021) Robust secure UAV communications with the aid of reconfigurable intelligent surfaces. IEEE Trans Wireless Commun 20(10):6402\u20136417. https:\/\/doi.org\/10.1109\/TWC.2021.3073746","journal-title":"IEEE Trans Wireless Commun"},{"issue":"1","key":"2133_CR5","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/MCOM.001.1900107","volume":"58","author":"Q Wu","year":"2019","unstructured":"Wu Q, Zhang R (2019) Towards smart and reconfigurable environment: intelligent reflecting surface aided wireless network. IEEE Commun Mag 58(1):106\u2013112. https:\/\/doi.org\/10.1109\/MCOM.001.1900107","journal-title":"IEEE Commun Mag"},{"issue":"5","key":"2133_CR6","doi-asserted-by":"publisher","first-page":"2905","DOI":"10.1109\/TWC.2020.2968317","volume":"19","author":"Z Sheng","year":"2020","unstructured":"Sheng Z, Tuan HD, Nasir AA, Duong TQ, Poor HV (2020) Secure uav-enabled communication using han\u2013kobayashi signaling. IEEE Trans Wireless Commun 19(5):2905\u20132919. https:\/\/doi.org\/10.1109\/TWC.2020.2968317","journal-title":"IEEE Trans Wireless Commun"},{"issue":"10","key":"2133_CR7","doi-asserted-by":"publisher","first-page":"11599","DOI":"10.1109\/TVT.2020.3014788","volume":"69","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Mou Z, Gao F, Jiang J, Ding R, Han Z (2020) Uav-enabled secure communications by multi-agent deep reinforcement learning. IEEE Trans Veh Technol 69(10):11599\u201311611. https:\/\/doi.org\/10.1109\/TVT.2020.3014788","journal-title":"IEEE Trans Veh Technol"},{"issue":"3","key":"2133_CR8","doi-asserted-by":"publisher","first-page":"1957","DOI":"10.1109\/TCOMM.2022.3141777","volume":"70","author":"L Zhai","year":"2022","unstructured":"Zhai L, Zou Y, Zhu J, Li B (2022) Improving physical layer security in IRS-aided WPCN multicast systems via stackelberg game. IEEE Trans Commun 70(3):1957\u20131970. https:\/\/doi.org\/10.1109\/TCOMM.2022.3141777","journal-title":"IEEE Trans Commun"},{"issue":"1","key":"2133_CR9","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/JSTSP.2022.3222910","volume":"17","author":"Y Ding","year":"2022","unstructured":"Ding Y, Feng Y, Lu W, Zheng S, Zhao N, Meng L, Nallanathan A, Yang X (2022) Online edge learning offloading and resource management for uav-assisted mec secure communications. IEEE J Sel Top Signal Process 17(1):54\u201365. https:\/\/doi.org\/10.1109\/JSTSP.2022.3222910","journal-title":"IEEE J Sel Top Signal Process"},{"issue":"5","key":"2133_CR10","doi-asserted-by":"publisher","first-page":"3364","DOI":"10.1109\/TCOMM.2022.3159703","volume":"70","author":"W Lu","year":"2022","unstructured":"Lu W, Ding Y, Gao Y, Chen Y, Zhao N, Ding Z, Nallanathan A (2022) Secure NOMA-based UAV-MEC network towards a flying eavesdropper. IEEE Trans Commun 70(5):3364\u20133376. https:\/\/doi.org\/10.1109\/TCOMM.2022.3159703","journal-title":"IEEE Trans Commun"},{"issue":"4","key":"2133_CR11","doi-asserted-by":"publisher","first-page":"6006","DOI":"10.1109\/TVT.2023.3335210","volume":"73","author":"Y Ding","year":"2024","unstructured":"Ding Y, Han H, Lu W, Wang Y, Zhao N, Wang X, Yang X (2024) Ddqn-based trajectory and resource optimization for uav-aided mec secure communications. IEEE Trans Veh Technol 73(4):6006\u20136011. https:\/\/doi.org\/10.1109\/TVT.2023.3335210","journal-title":"IEEE Trans Veh Technol"},{"issue":"3","key":"2133_CR12","doi-asserted-by":"publisher","first-page":"3670","DOI":"10.1109\/JSYST.2022.3214813","volume":"17","author":"T Cheng","year":"2023","unstructured":"Cheng T, Wang B, Cao K, Dong R, Diao D (2023) Irs-enabled secure G2A communications for UAV system with aerial eavesdropping. IEEE Syst J 17(3):3670\u20133681. https:\/\/doi.org\/10.1109\/JSYST.2022.3214813","journal-title":"IEEE Syst J"},{"issue":"10","key":"2133_CR13","doi-asserted-by":"publisher","first-page":"15601","DOI":"10.1109\/TWC.2024.3432186","volume":"23","author":"X Yu","year":"2024","unstructured":"Yu X, Xu J, Zhao N, Wang X, Niyato D (2024) Security enhancement of ISAC via IRS-UAV. IEEE Trans Wireless Commun 23(10):15601\u201315612. https:\/\/doi.org\/10.1109\/TWC.2024.3432186","journal-title":"IEEE Trans Wireless Commun"},{"key":"2133_CR14","doi-asserted-by":"publisher","unstructured":"Wang X, Wu P, Yuan X, Hu Y, Zhang Y (2024) Joint trajectory and user scheduling design for UAV-assisted secure communication. In: 19th International symposium on wireless communication systems (ISWCS), pp 1\u20136. https:\/\/doi.org\/10.1109\/ISWCS61526.2024.10639179","DOI":"10.1109\/ISWCS61526.2024.10639179"},{"key":"2133_CR15","doi-asserted-by":"publisher","unstructured":"Zhang J (2022) A Q-learning based method for secure UAV communication against malicious eavesdropping. In: 14th International conference on computer and automation engineering (ICCAE), pp 168\u2013172. https:\/\/doi.org\/10.1109\/ICCAE55086.2022.9762433","DOI":"10.1109\/ICCAE55086.2022.9762433"},{"issue":"10","key":"2133_CR16","doi-asserted-by":"publisher","first-page":"15843","DOI":"10.1109\/TVT.2024.3412805","volume":"73","author":"Y Liu","year":"2024","unstructured":"Liu Y, Liu X, Liu Z, Yu Y, Jia M, Na Z, Durrani TS (2024) Secure rate maximization for isac-uav assisted communication amidst multiple eavesdroppers. IEEE Trans Veh Technol 73(10):15843\u201315847. https:\/\/doi.org\/10.1109\/TVT.2024.3412805","journal-title":"IEEE Trans Veh Technol"},{"issue":"10","key":"2133_CR17","doi-asserted-by":"publisher","first-page":"14908","DOI":"10.1109\/TVT.2024.3403099","volume":"73","author":"K Yu","year":"2024","unstructured":"Yu K, Feng Z, Yu J, Chen T, Peng J, Li D (2024) Secure ultra-reliable and low latency communication in UAV-enabled NOMA wireless networks. IEEE Trans Veh Technol 73(10):14908\u201314922. https:\/\/doi.org\/10.1109\/TVT.2024.3403099","journal-title":"IEEE Trans Veh Technol"},{"issue":"4","key":"2133_CR18","doi-asserted-by":"publisher","first-page":"1892","DOI":"10.1109\/TGCN.2021.3095315","volume":"5","author":"Z Zhang","year":"2021","unstructured":"Zhang Z, Zhang Q, Miao J, Yu FR, Fu F, Du J, Wu T (2021) Energy-efficient secure video streaming in uav-enabled wireless networks: a safe-dqn approach. IEEE Trans Green Commun Netw 5(4):1892\u20131905. https:\/\/doi.org\/10.1109\/TGCN.2021.3095315","journal-title":"IEEE Trans Green Commun Netw"},{"issue":"10","key":"2133_CR19","doi-asserted-by":"publisher","first-page":"12900","DOI":"10.1109\/TVT.2023.3271817","volume":"72","author":"S Wang","year":"2023","unstructured":"Wang S, Li L, Ruby R, Ruan X, Zhang J, Zhang Y (2023) Secrecy-energy-efficiency maximization for uav-enabled two-way relay systems. IEEE Trans Veh Technol 72(10):12900\u201312911. https:\/\/doi.org\/10.1109\/TVT.2023.3271817","journal-title":"IEEE Trans Veh Technol"},{"key":"2133_CR20","doi-asserted-by":"publisher","unstructured":"Mao H, Liu Y, Xiao Z, Han Z, Xia X-G (2024) Energy efficient defense against cooperative hostile detection and eavesdropping attacks for UAV-aided short-packet transmissions. IEEE Trans Veh Technol pp 1\u201314. https:\/\/doi.org\/10.1109\/TVT.2024.3483256","DOI":"10.1109\/TVT.2024.3483256"},{"key":"2133_CR21","doi-asserted-by":"publisher","unstructured":"Dai M, Chang S, Su Z (2024) Secrecy oriented slicing resource allocation in 6G green vehicular networks: An energy-efficient design. In: GLOBECOM 2024 - 2024 IEEE Global communications conference, pp 1077\u20131082. https:\/\/doi.org\/10.1109\/GLOBECOM52923.2024.10901395","DOI":"10.1109\/GLOBECOM52923.2024.10901395"},{"issue":"4","key":"2133_CR22","doi-asserted-by":"publisher","first-page":"2995","DOI":"10.1109\/TMC.2024.3505206","volume":"24","author":"Q Wang","year":"2025","unstructured":"Wang Q, Tang S, Sun W, Zhang Y, Sun G, Dai H-N, Guizani M (2025) Smart shield: prevent aerial eavesdropping via cooperative intelligent jamming based on multi-agent reinforcement learning. IEEE Trans Mob Comput 24(4):2995\u20133011. https:\/\/doi.org\/10.1109\/TMC.2024.3505206","journal-title":"IEEE Trans Mob Comput"},{"issue":"11","key":"2133_CR23","doi-asserted-by":"publisher","first-page":"7536","DOI":"10.1109\/TCOMM.2022.3208341","volume":"70","author":"H Han","year":"2022","unstructured":"Han H, Cao Y, Sheng M, Zhao N, Liu J, Niyato D (2022) Irs-aided secure noma networks against internal and external eavesdropping. IEEE Trans Commun 70(11):7536\u20137548. https:\/\/doi.org\/10.1109\/TCOMM.2022.3208341","journal-title":"IEEE Trans Commun"},{"key":"2133_CR24","doi-asserted-by":"publisher","unstructured":"Fang K, Ouyang Y, Zheng B, Huang L, Wang G, Chen Z (2024) Security enhancement for RIS-aided MEC systems with deep reinforcement learning. IEEE Trans Commun pp 1\u20131. https:\/\/doi.org\/10.1109\/TCOMM.2024.3476139","DOI":"10.1109\/TCOMM.2024.3476139"},{"issue":"3","key":"2133_CR25","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1109\/TWC.2021.3104856","volume":"21","author":"W Wang","year":"2021","unstructured":"Wang W, Liu X, Tang J, Zhao N, Chen Y, Ding Z, Wang X (2021) Beamforming and jamming optimization for irs-aided secure noma networks. IEEE Trans Wireless Commun 21(3):1557\u20131569. https:\/\/doi.org\/10.1109\/TWC.2021.3104856","journal-title":"IEEE Trans Wireless Commun"},{"issue":"10","key":"2133_CR26","doi-asserted-by":"publisher","first-page":"6445","DOI":"10.1109\/TWC.2023.3243270","volume":"22","author":"S Han","year":"2023","unstructured":"Han S, Wang J, Xiao L, Li C (2023) Broadcast secrecy rate maximization in uav-empowered irs backscatter communications. IEEE Trans Wireless Commun 22(10):6445\u20136458. https:\/\/doi.org\/10.1109\/TWC.2023.3243270","journal-title":"IEEE Trans Wireless Commun"},{"issue":"6","key":"2133_CR27","doi-asserted-by":"publisher","first-page":"3528","DOI":"10.1109\/TCOMM.2023.3257387","volume":"71","author":"W Wei","year":"2023","unstructured":"Wei W, Pang X, Tang J, Zhao N, Wang X, Nallanathan A (2023) Secure transmission design for aerial IRS assisted wireless networks. IEEE Trans Commun 71(6):3528\u20133540. https:\/\/doi.org\/10.1109\/TCOMM.2023.3257387","journal-title":"IEEE Trans Commun"},{"key":"2133_CR28","doi-asserted-by":"publisher","unstructured":"Qi Y, Su Z, Xu Q, Fang D (2023) Joint beamforming and trajectory optimization for UAV-assisted double IRS secure transmission system: A deep reinforcement learning approach. In: IEEE International conference on metaverse computer, network and application (MetaCom), pp 504\u2013509. https:\/\/doi.org\/10.1109\/MetaCom57706.2023.00092","DOI":"10.1109\/MetaCom57706.2023.00092"},{"issue":"1","key":"2133_CR29","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1109\/TVT.2022.3203008","volume":"72","author":"X Fan","year":"2023","unstructured":"Fan X, Liu M, Chen Y, Sun S, Li Z, Guo X (2023) Ris-assisted uav for fresh data collection in 3d urban environments: a deep reinforcement learning approach. IEEE Trans Veh Technol 72(1):632\u2013647. https:\/\/doi.org\/10.1109\/TVT.2022.3203008","journal-title":"IEEE Trans Veh Technol"},{"issue":"10","key":"2133_CR30","doi-asserted-by":"publisher","first-page":"6607","DOI":"10.1109\/TWC.2020.3004330","volume":"19","author":"Z Wang","year":"2020","unstructured":"Wang Z, Liu L, Cui S (2020) Channel estimation for intelligent reflecting surface assisted multiuser communications: framework, algorithms, and analysis. IEEE Trans Wireless Commun 19(10):6607\u20136620. https:\/\/doi.org\/10.1109\/TWC.2020.3004330","journal-title":"IEEE Trans Wireless Commun"},{"key":"2133_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2009\/752895","volume":"2009","author":"W Zhou","year":"2009","unstructured":"Zhou W, Lam WH (2009) A fast lmmse channel estimation method for ofdm systems. EURASIP J Wirel Commun Netw 2009:1\u201313. https:\/\/doi.org\/10.1155\/2009\/752895","journal-title":"EURASIP J Wirel Commun Netw"},{"issue":"10","key":"2133_CR32","doi-asserted-by":"publisher","first-page":"6607","DOI":"10.1109\/TWC.2020.3004330","volume":"19","author":"Z Wang","year":"2020","unstructured":"Wang Z, Liu L, Cui S (2020) Channel estimation for intelligent reflecting surface assisted multiuser communications: framework, algorithms, and analysis. IEEE Trans Wireless Commun 19(10):6607\u20136620. https:\/\/doi.org\/10.1109\/TWC.2020.3004330","journal-title":"IEEE Trans Wireless Commun"},{"issue":"5","key":"2133_CR33","doi-asserted-by":"publisher","first-page":"6626","DOI":"10.1109\/TVT.2023.3339968","volume":"73","author":"Q Li","year":"2024","unstructured":"Li Q, El-Hajjar M, Hemadeh I, Shojaeifard A, Hanzo L (2024) Low-overhead channel estimation for RIS-aided multi-cell networks in the presence of phase quantization errors. IEEE Trans Veh Technol 73(5):6626\u20136641. https:\/\/doi.org\/10.1109\/TVT.2023.3339968","journal-title":"IEEE Trans Veh Technol"},{"issue":"3","key":"2133_CR34","doi-asserted-by":"publisher","first-page":"2376","DOI":"10.1109\/TMC.2024.3495015","volume":"24","author":"Y Chen","year":"2025","unstructured":"Chen Y, Li Y, Chen CS, Chi K (2025) Exploring long-term commensalism: throughput maximization for symbiotic radio networks. IEEE Trans Mob Comput 24(3):2376\u20132393. https:\/\/doi.org\/10.1109\/TMC.2024.3495015","journal-title":"IEEE Trans Mob Comput"},{"key":"2133_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110604","volume":"250","author":"X An","year":"2024","unstructured":"An X, Li Y, Chen Y, Li T (2024) Joint task offloading and resource allocation for multi-user collaborative mobile edge computing. Comput Netw 250:110604. https:\/\/doi.org\/10.1016\/j.comnet.2024.110604","journal-title":"Comput Netw"},{"issue":"12","key":"2133_CR36","doi-asserted-by":"publisher","first-page":"11207","DOI":"10.1109\/TWC.2022.3190563","volume":"21","author":"Z Zhang","year":"2022","unstructured":"Zhang Z, Chen J, Liu Y, Wu Q, He B, Yang L (2022) On the secrecy design of star-RIS assisted uplink NOMA networks. IEEE Trans Wireless Commun 21(12):11207\u201311221. https:\/\/doi.org\/10.1109\/TWC.2022.3190563","journal-title":"IEEE Trans Wireless Commun"},{"issue":"3","key":"2133_CR37","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1109\/LCOMM.2023.3323537","volume":"28","author":"Y Li","year":"2024","unstructured":"Li Y, Zou Y, Zhu J, Ning B, Zhai L, Hui H, Lou Y, Qin C (2024) Sum secrecy rate maximization for active RIS-assisted uplink SIMO-NOMA networks. IEEE Commun Lett 28(3):722\u2013726. https:\/\/doi.org\/10.1109\/LCOMM.2023.3323537","journal-title":"IEEE Commun Lett"},{"key":"2133_CR38","doi-asserted-by":"publisher","unstructured":"Haarnoja T, Zhou A, Hartikainen K, Tucker G, Ha S, Tan J, Kumar V, Zhu H, Gupta A, Abbeel P et al. (2018) Soft actor-critic algorithms and applications. arXiv preprint arXiv:1812.05905. https:\/\/doi.org\/10.48550\/arXiv.1812.05905","DOI":"10.48550\/arXiv.1812.05905"},{"issue":"3","key":"2133_CR39","doi-asserted-by":"publisher","first-page":"2333","DOI":"10.1109\/TVT.2022.3141935","volume":"71","author":"A Al-Hilo","year":"2022","unstructured":"Al-Hilo A, Samir M, Elhattab M, Assi C, Sharafeddine S (2022) Reconfigurable intelligent surface enabled vehicular communication: joint user scheduling and passive beamforming. IEEE Trans Veh Technol 71(3):2333\u20132345. https:\/\/doi.org\/10.1109\/TVT.2022.3141935","journal-title":"IEEE Trans Veh Technol"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02133-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02133-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02133-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T12:19:01Z","timestamp":1773145141000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02133-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,5]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["2133"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02133-2","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,5]]},"assertion":[{"value":"7 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This study did not involve any ethical issues.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All authors have read and agreed to the version of this manuscript.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"23"}}