{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:22:34Z","timestamp":1774966954138,"version":"3.50.1"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s13042-024-02384-0","type":"journal-article","created":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T12:03:10Z","timestamp":1729166590000},"page":"2161-2180","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Reinforced multi-modal cyberbullying detection with subgraph neural networks"],"prefix":"10.1007","volume":"16","author":[{"given":"Kai","family":"Luo","sequence":"first","affiliation":[]},{"given":"Ce","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Guan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,17]]},"reference":[{"issue":"1","key":"2384_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TAFFC.2017.2761757","volume":"11","author":"S Salawu","year":"2017","unstructured":"Salawu S, He Y, Lumsden J (2017) Approaches to automated detection of cyberbullying: a survey. IEEE Trans Affect Comput 11(1):3\u201324","journal-title":"IEEE Trans Affect Comput"},{"issue":"3","key":"2384_CR2","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1177\/02724316211036740","volume":"42","author":"JW Patchin","year":"2022","unstructured":"Patchin JW, Hinduja S (2022) Cyberbullying among tweens in the united states: prevalence, impact, and helping behaviors. J Early Adolesc 42(3):414\u2013430","journal-title":"J Early Adolesc"},{"key":"2384_CR3","doi-asserted-by":"crossref","unstructured":"Dani H, Li J, Liu H (2017) Sentiment informed cyberbullying detection in social media. In: Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18\u201322, 2017, Proceedings, Part I 10, pp. 52\u201367. Springer","DOI":"10.1007\/978-3-319-71249-9_4"},{"key":"2384_CR4","doi-asserted-by":"crossref","unstructured":"Mangaonkar A, Hayrapetian A, Raje R (2015) Collaborative detection of cyberbullying behavior in twitter data. In: 2015 IEEE International Conference on Electro\/information Technology (EIT), pp. 611\u2013616. IEEE","DOI":"10.1109\/EIT.2015.7293405"},{"key":"2384_CR5","doi-asserted-by":"crossref","unstructured":"Dani H, Li J, Liu H (2017) Sentiment informed cyberbullying detection in social media. In: ECML\/PKDD. https:\/\/api.semanticscholar.org\/CorpusID:40987224","DOI":"10.1007\/978-3-319-71249-9_4"},{"issue":"1","key":"2384_CR6","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/TKDE.2016.2598561","volume":"29","author":"C Shi","year":"2016","unstructured":"Shi C, Li Y, Zhang J, Sun Y, Philip SY (2016) A survey of heterogeneous information network analysis. IEEE Trans Knowl Data Eng 29(1):17\u201337","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2384_CR7","unstructured":"Vashishth S, Sanyal S, Nitin V, Talukdar P (2019) Composition-based multi-relational graph convolutional networks. arXiv preprint arXiv:1911.03082"},{"key":"2384_CR8","first-page":"1","volume":"12","author":"V Konda","year":"1999","unstructured":"Konda V, Tsitsiklis J (1999) Actor-critic algorithms. Adv Neural Inf Proc Syst 12:1","journal-title":"Adv Neural Inf Proc Syst"},{"issue":"6","key":"2384_CR9","doi-asserted-by":"publisher","first-page":"3290","DOI":"10.1109\/TIT.2016.2555904","volume":"62","author":"A Li","year":"2016","unstructured":"Li A, Pan Y (2016) Structural information and dynamical complexity of networks. IEEE Trans Inf Theory 62(6):3290\u20133339","journal-title":"IEEE Trans Inf Theory"},{"issue":"1","key":"2384_CR10","doi-asserted-by":"publisher","first-page":"980","DOI":"10.1109\/TPAMI.2022.3144993","volume":"45","author":"H Peng","year":"2022","unstructured":"Peng H, Zhang R, Li S, Cao Y, Pan S, Philip SY (2022) Reinforced, incremental and cross-lingual event detection from social messages. IEEE Trans Pattern Anal Mach Intell 45(1):980\u2013998","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"2384_CR11","unstructured":"Wu J, Chen X, Xu K, Li S (2022) Structural entropy guided graph hierarchical pooling. In: International Conference on Machine Learning, pp. 24017\u201324030. PMLR"},{"key":"2384_CR12","doi-asserted-by":"crossref","unstructured":"Hosseinmardi H, Mattson SA, Rafiq RI, Han RO, Lv Q, Mishra S (2015) Detection of cyberbullying incidents on the instagram social network. ArXiv arXiv:1503.03909","DOI":"10.1007\/978-3-319-27433-1_4"},{"key":"2384_CR13","doi-asserted-by":"crossref","unstructured":"Rafiq RI, Hosseinmardi H, Han R, Lv Q, Mishra S, Mattson SA (2015) Careful what you share in six seconds: Detecting cyberbullying instances in vine. In: Proceedings of the 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, pp. 617\u2013622","DOI":"10.1145\/2808797.2809381"},{"key":"2384_CR14","doi-asserted-by":"crossref","unstructured":"Hosseinmardi H, Mattson SA, Ibn Rafiq R, Han R, Lv Q, Mishra S (2015) Analyzing labeled cyberbullying incidents on the instagram social network. In: Social Informatics: 7th International Conference, SocInfo 2015, Beijing, China, December 9-12, 2015, Proceedings 7, pp. 49\u201366. Springer","DOI":"10.1007\/978-3-319-27433-1_4"},{"key":"2384_CR15","unstructured":"Gordon S. Apps used for sexting and cyberbullying parents should know about,\u201d. Cyberbullying\/fl\/4-Apps-Used-for-Sexting-and-Cyberbullying-Parents-Should-Know-About. htm (4)"},{"issue":"1","key":"2384_CR16","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1177\/0261927X09351676","volume":"29","author":"YR Tausczik","year":"2010","unstructured":"Tausczik YR, Pennebaker JW (2010) The psychological meaning of words: liwc and computerized text analysis methods. J Lang Soc Psychol 29(1):24\u201354","journal-title":"J Lang Soc Psychol"},{"key":"2384_CR17","first-page":"2001","volume":"71","author":"JW Pennebaker","year":"2001","unstructured":"Pennebaker JW, Francis ME, Booth RJ (2001) Linguistic inquiry and word count: liwc 2001. Mahway Lawrence Erlbaum Assoc 71:2001","journal-title":"Mahway Lawrence Erlbaum Assoc"},{"key":"2384_CR18","doi-asserted-by":"crossref","unstructured":"Zheng W, Zhao P, Huang K, Chen G (2021) Understanding the property of long term memory for the lstm with attention mechanism. In: Proceedings of the 30th ACM international conference on information and knowledge management, pp. 2708\u20132717","DOI":"10.1145\/3459637.3482399"},{"key":"2384_CR19","unstructured":"Chen Y (2015) Convolutional neural network for sentence classification. Master\u2019s thesis, University of Waterloo"},{"key":"2384_CR20","doi-asserted-by":"crossref","unstructured":"Cheng L, Guo R, Silva Y, Hall D, Liu H (2019) Hierarchical attention networks for cyberbullying detection on the instagram social network. In: Proceedings of the 2019 SIAM International Conference on Data Mining, pp. 235\u2013243. SIAM","DOI":"10.1137\/1.9781611975673.27"},{"key":"2384_CR21","unstructured":"Xu J-M, Jun K-S, Zhu X, Bellmore A (2012) Learning from bullying traces in social media. In: Fosler-Lussier, E., Riloff, E., Bangalore, S. (eds.) Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 656\u2013666. Association for Computational Linguistics, Montr\u00e9al, Canada. https:\/\/aclanthology.org\/N12-1084"},{"key":"2384_CR22","doi-asserted-by":"crossref","unstructured":"Wang K, Xiong Q, Wu C, Gao M, Yu Y (2020) Multi-modal cyberbullying detection on social networks. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138. IEEE","DOI":"10.1109\/IJCNN48605.2020.9206663"},{"key":"2384_CR23","doi-asserted-by":"crossref","unstructured":"Cao S, Lu W, Xu Q (2015) Grarep: Learning graph representations with global structural information. In: Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, pp. 891\u2013900","DOI":"10.1145\/2806416.2806512"},{"key":"2384_CR24","doi-asserted-by":"crossref","unstructured":"Grover A, Leskovec J (2016) node2vec: Scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 855\u2013864","DOI":"10.1145\/2939672.2939754"},{"key":"2384_CR25","doi-asserted-by":"crossref","unstructured":"Perozzi B, Al-Rfou R, Skiena S (2014) Deepwalk: Online learning of social representations. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 701\u2013710","DOI":"10.1145\/2623330.2623732"},{"key":"2384_CR26","unstructured":"Kipf TN, Welling M (2016) Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907"},{"key":"2384_CR27","unstructured":"Veli\u010dkovi\u0107 P, Cucurull G, Casanova A, Romero A, Li\u00f2 P, Bengio Y (2018) Graph Attention Networks. International Conference on Learning Representations. accepted as poster"},{"key":"2384_CR28","unstructured":"Xu K, Hu W, Leskovec J, Jegelka S (2018) How powerful are graph neural networks? arXiv preprint arXiv:1810.00826"},{"key":"2384_CR29","unstructured":"Oh J, Cho K, Bruna J (2019) Advancing graphsage with a data-driven node sampling. arXiv preprint arXiv:1904.12935"},{"issue":"3","key":"2384_CR30","doi-asserted-by":"publisher","first-page":"1839","DOI":"10.1007\/s00530-020-00701-5","volume":"29","author":"C Iwendi","year":"2023","unstructured":"Iwendi C, Srivastava G, Khan S, Maddikunta PKR (2023) Cyberbullying detection solutions based on deep learning architectures. Multimed Syst 29(3):1839\u20131852","journal-title":"Multimed Syst"},{"issue":"3","key":"2384_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2362394.2362400","volume":"2","author":"K Dinakar","year":"2012","unstructured":"Dinakar K, Jones B, Havasi C, Lieberman H, Picard R (2012) Common sense reasoning for detection, prevention, and mitigation of cyberbullying. ACM Trans Interact Intell Syst (TiiS) 2(3):1\u201330","journal-title":"ACM Trans Interact Intell Syst (TiiS)"},{"key":"2384_CR32","doi-asserted-by":"crossref","unstructured":"Wu S, Hofman JM, Mason WA, Watts DJ (2011) Who says what to whom on twitter. In: Proceedings of the 20th International Conference on World Wide Web, pp. 705\u2013714","DOI":"10.1145\/1963405.1963504"},{"key":"2384_CR33","unstructured":"Xu J-M, Jun K-S, Zhu X, Bellmore A (2012) Learning from bullying traces in social media. In: Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 656\u2013666"},{"key":"2384_CR34","doi-asserted-by":"crossref","unstructured":"Cheng L, Li J, Silva YN, Hall DL, Liu H (2019) Xbully: Cyberbullying detection within a multi-modal context. In: Proceedings of the Twelfth Acm International Conference on Web Search and Data Mining, pp. 339\u2013347","DOI":"10.1145\/3289600.3291037"},{"key":"2384_CR35","doi-asserted-by":"crossref","unstructured":"Chen H-Y, Li C-T (2020) Henin: Learning heterogeneous neural interaction networks for explainable cyberbullying detection on social media. arXiv preprint arXiv:2010.04576","DOI":"10.18653\/v1\/2020.emnlp-main.200"},{"key":"2384_CR36","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1016\/j.chb.2016.05.051","volume":"63","author":"MA Al-garadi","year":"2016","unstructured":"Al-garadi MA, Varathan KD, Ravana SD (2016) Cybercrime detection in online communications: the experimental case of cyberbullying detection in the twitter network. Comput Hum Behav 63:433\u2013443. https:\/\/doi.org\/10.1016\/j.chb.2016.05.051","journal-title":"Comput Hum Behav"},{"key":"2384_CR37","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.ins.2017.02.008","volume":"394","author":"Z Zhang","year":"2017","unstructured":"Zhang Z, Gu Q, Yue T, Su S (2017) Identifying the same person across two similar social networks in a unified way: globally and locally. Inf Sci 394:53\u201367","journal-title":"Inf Sci"},{"key":"2384_CR38","doi-asserted-by":"crossref","unstructured":"Cheng L, Li J, Silva YN, Hall DL, Liu H (2019) Xbully: Cyberbullying detection within a multi-modal context. Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining","DOI":"10.1145\/3289600.3291037"},{"key":"2384_CR39","unstructured":"Joachims T (1998) Making large-scale svm learning practical. Technical report, Technical report"},{"key":"2384_CR40","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45:5\u201332","journal-title":"Mach Learn"},{"key":"2384_CR41","doi-asserted-by":"crossref","unstructured":"Sun L, Zhang Z, Wen J, Wang F, Ji P, Su S, Yu P (2022) Aligning dynamic social networks: An optimization over dynamic graph autoencoder. IEEE Transactions on Knowledge and Data Engineering","DOI":"10.1109\/TKDE.2022.3152502"},{"issue":"3","key":"2384_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3580509","volume":"17","author":"L Sun","year":"2023","unstructured":"Sun L, Du Y, Gao S, Ye J, Wang F, Ren F, Liang M, Wang Y, Wang S (2023) Groupaligner: a deep reinforcement learning with domain adaptation for social group alignment. ACM Trans Web 17(3):1\u201330","journal-title":"ACM Trans Web"},{"issue":"3","key":"2384_CR43","doi-asserted-by":"publisher","first-page":"1117","DOI":"10.1109\/TKDE.2020.2993870","volume":"34","author":"X Wang","year":"2020","unstructured":"Wang X, Lu Y, Shi C, Wang R, Cui P, Mou S (2020) Dynamic heterogeneous information network embedding with meta-path based proximity. IEEE Trans Knowl Data Eng 34(3):1117\u20131132","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2384_CR44","unstructured":"Shang J, Qu M, Liu J, Kaplan LM, Han J, Peng J (2016) Meta-path guided embedding for similarity search in large-scale heterogeneous information networks. arXiv preprint arXiv:1610.09769"},{"key":"2384_CR45","doi-asserted-by":"crossref","unstructured":"Dong Y, Chawla NV, Swami A (2017) metapath2vec: Scalable representation learning for heterogeneous networks. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 135\u2013144","DOI":"10.1145\/3097983.3098036"},{"key":"2384_CR46","doi-asserted-by":"crossref","unstructured":"Fu T-y, Lee W-C, Lei Z (2017) Hin2vec: Explore meta-paths in heterogeneous information networks for representation learning. In: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, pp. 1797\u20131806","DOI":"10.1145\/3132847.3132953"},{"key":"2384_CR47","doi-asserted-by":"crossref","unstructured":"Lu Y, Fang Y, Shi C (2020) Meta-learning on heterogeneous information networks for cold-start recommendation. In: Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 1563\u20131573","DOI":"10.1145\/3394486.3403207"},{"key":"2384_CR48","doi-asserted-by":"crossref","unstructured":"He Y, Song Y, Li J, Ji C, Peng J, Peng H (2019) Hetespaceywalk: A heterogeneous spacey random walk for heterogeneous information network embedding. In: Proceedings of the 28th ACM International Conference on Information and Knowledge Management, pp. 639\u2013648","DOI":"10.1145\/3357384.3358061"},{"key":"2384_CR49","doi-asserted-by":"crossref","unstructured":"Peng H, Zhang R, Dou Y, Yang R, Zhang J, Yu PS (2021) Reinforced neighborhood selection guided multi-relational graph neural networks. ACM Transactions on Information Systems (TOIS)","DOI":"10.1145\/3490181"},{"key":"2384_CR50","doi-asserted-by":"crossref","unstructured":"Sun Q, Li J, Peng H, Wu J, Fu X, Ji C, Philip SY (2022) Graph structure learning with variational information bottleneck. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 36, pp. 4165\u20134174","DOI":"10.1609\/aaai.v36i4.20335"},{"issue":"1","key":"2384_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3616377","volume":"18","author":"L Kaibiao","year":"2023","unstructured":"Kaibiao L, Chen J, Ruicong C, Fan Y, Yang Z, Min L, Ping L (2023) Adaptive neighbor graph aggregated graph attention network for heterogeneous graph embedding. ACM Trans Knowl Discov Data 18(1):1\u201321","journal-title":"ACM Trans Knowl Discov Data"},{"key":"2384_CR52","first-page":"22523","volume":"34","author":"C Shan","year":"2021","unstructured":"Shan C, Shen Y, Zhang Y, Li X, Li D (2021) Reinforcement learning enhanced explainer for graph neural networks. Adv Neural Inf Proc Syst 34:22523\u201322533","journal-title":"Adv Neural Inf Proc Syst"},{"key":"2384_CR53","doi-asserted-by":"crossref","unstructured":"Xiong W, chen W, Yan X, Wang W (2018) Variational knowledge graph reasoning. arXiv preprint arXiv:1803.06581","DOI":"10.18653\/v1\/N18-1165"},{"key":"2384_CR54","doi-asserted-by":"crossref","unstructured":"Zhong C, Gursoy MC, Velipasalar S (2018) A deep reinforcement learning-based framework for content caching. In: 2018 52nd annual conference on information sciences and systems (CISS), pp. 1\u20136. IEEE","DOI":"10.1109\/CISS.2018.8362276"},{"key":"2384_CR55","doi-asserted-by":"crossref","unstructured":"Lai L, Jiang H, Poor HV (2008) Medium access in cognitive radio networks: A competitive multi-armed bandit framework. In: 2008 42nd asilomar conference on signals, systems and computers, pp. 98\u2013102. IEEE","DOI":"10.1109\/ACSSC.2008.5074370"},{"issue":"7","key":"2384_CR56","doi-asserted-by":"publisher","first-page":"3034","DOI":"10.1109\/TNNLS.2020.3009214","volume":"32","author":"N Wang","year":"2020","unstructured":"Wang N, Gao Y, Zhao H, Ahn CK (2020) Reinforcement learning-based optimal tracking control of an unknown unmanned surface vehicle. IEEE Trans Neural Netw Learn Syst 32(7):3034\u20133045","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"1","key":"2384_CR57","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/18.61115","volume":"37","author":"J Lin","year":"1991","unstructured":"Lin J (1991) Divergence measures based on the shannon entropy. IEEE Trans Inf Theory 37(1):145\u2013151","journal-title":"IEEE Trans Inf Theory"},{"key":"2384_CR58","doi-asserted-by":"crossref","unstructured":"Zou D, Wang S, Li X, Peng H, Wang Y, Liu C, Sheng K, Zhang B (2024) Multispans: A multi-range spatial-temporal transformer network for traffic forecast via structural entropy optimization. In: Proceedings of the 17th ACM International Conference on Web Search and Data Mining, pp. 1032\u20131041","DOI":"10.1145\/3616855.3635820"},{"key":"2384_CR59","doi-asserted-by":"publisher","DOI":"10.1145\/3660522","author":"H Peng","year":"2024","unstructured":"Peng H, Zhang J, Huang X, Hao Z, Li A, Yu Z, Yu PS (2024) Unsupervised social bot detection via structural information theory. ACM Trans Inf Syst. https:\/\/doi.org\/10.1145\/3660522","journal-title":"ACM Trans Inf Syst"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02384-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-024-02384-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02384-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T18:28:53Z","timestamp":1739989733000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-024-02384-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":59,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["2384"],"URL":"https:\/\/doi.org\/10.1007\/s13042-024-02384-0","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"25 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}