{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T11:30:56Z","timestamp":1775302256302,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T00:00:00Z","timestamp":1772841600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T00:00:00Z","timestamp":1772841600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["Nos. 62261060"],"award-info":[{"award-number":["Nos. 62261060"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Yunnan Province Expert Workstations","award":["202305AF150078"],"award-info":[{"award-number":["202305AF150078"]}]},{"name":"Graduate Research Innovation Project of Yunnan University","award":["No. ZC-24248511"],"award-info":[{"award-number":["No. ZC-24248511"]}]},{"name":"Yunnan Province Special Project","award":["Grant No.202403AP140021"],"award-info":[{"award-number":["Grant No.202403AP140021"]}]},{"name":"Yunnan Fundamental Research Projects","award":["Nos. 202503AG380006, 202301AW070007, 202301AU070210, 202401AT070470"],"award-info":[{"award-number":["Nos. 202503AG380006, 202301AW070007, 202301AU070210, 202401AT070470"]}]},{"name":"Xingdian Talent Project in Yunnan Province of China"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s13042-026-03018-3","type":"journal-article","created":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T06:03:34Z","timestamp":1772863414000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A universal adversarial example generation method for object detection system coupled with multi-focus image fusion model"],"prefix":"10.1007","volume":"17","author":[{"given":"Xin","family":"Jin","sequence":"first","affiliation":[]},{"given":"Bo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xueshuai","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Xing","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Haorui","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shin-Jye","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,7]]},"reference":[{"key":"3018_CR1","doi-asserted-by":"crossref","unstructured":"Kothala LP, Guntur SR (2024) Tl-lff net: transfer learning based lighter, faster, and frozen network for the detection of multi-scale mixed intracranial hemorrhages through genetic optimization algorithm. Int J Mach Learn Cybern pp. 1\u201327","DOI":"10.1007\/s13042-024-02324-y"},{"key":"3018_CR2","doi-asserted-by":"crossref","unstructured":"Sun L, Li M, Yang Y, Li X, Liu L, Zhang P, Du H (2024) Rcoco: contrastive collective link prediction across multiplex network in riemannian space. Int J Mach Learn Cybern pp. 1\u201323","DOI":"10.21203\/rs.3.rs-3693551\/v1"},{"key":"3018_CR3","first-page":"21","volume":"2016","author":"W Liu","year":"2016","unstructured":"Liu W, Anguelov D, Erhan D, Szegedy C, Reed S, Fu C-Y, Berg AC, Ssd: Single shot multibox detector, in Computer Vision-ECCV, (2016) 14th European Conference, Amsterdam, The Netherlands, October 11\u201314, 2016, Proceedings, Part I 14. Springer 2016:21\u201337","journal-title":"Springer"},{"key":"3018_CR4","unstructured":"Redmon J, Farhadi A (2018) Yolov3: An incremental improvement, arXiv preprint arXiv:1804.02767"},{"key":"3018_CR5","unstructured":"Ren S, He K, Girshick R, Sun J (2015) Faster r-cnn: Towards real-time object detection with region proposal networks. Adv Neural Inf Process Syst 28"},{"key":"3018_CR6","doi-asserted-by":"crossref","unstructured":"Papageorgiou CP, Oren M, Poggio T (1998) A general framework for object detection. Sixth International Conference on Computer Vision (IEEE Cat No 98CH36271) IEEE pp. 555\u2013562","DOI":"10.1109\/ICCV.1998.710772"},{"key":"3018_CR7","doi-asserted-by":"crossref","unstructured":"Simon M, Amende K, Kraus A, Honer J, Samann T, Kaulbersch H, Milz S, Michael\u00a0Gross H (2019) Complexer-yolo: Real-time 3d object detection and tracking on semantic point clouds, In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, pp. 0\u20130","DOI":"10.1109\/CVPRW.2019.00158"},{"key":"3018_CR8","doi-asserted-by":"crossref","unstructured":"Gajjar V, Gurnani A, Khandhediya Y (2017) Human detection and tracking for video surveillance: A cognitive science approach, In: Proceedings of the IEEE international conference on computer vision workshops, pp. 2805\u20132809","DOI":"10.1109\/ICCVW.2017.330"},{"key":"3018_CR9","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.inffus.2016.12.001","volume":"36","author":"Y Liu","year":"2017","unstructured":"Liu Y, Chen X, Peng H, Wang Z (2017) Multi-focus image fusion with a deep convolutional neural network. Information Fusion 36:191\u2013207","journal-title":"Information Fusion"},{"issue":"4","key":"3018_CR10","first-page":"2188","volume":"44","author":"S Chen","year":"2020","unstructured":"Chen S, He Z, Sun C, Yang J, Huang X (2020) Universal adversarial attack on attention and the resulting dataset damagenet. IEEE Trans Pattern Anal Mach Intell 44(4):2188\u20132197","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"3018_CR11","doi-asserted-by":"crossref","unstructured":"Du X, Pun C-M (2020) Adversarial image attacks using multi-sample and most-likely ensemble methods, In: Proceedings of the 28th ACM International Conference on Multimedia, pp. 1634\u20131642","DOI":"10.1145\/3394171.3413808"},{"key":"3018_CR12","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli S-M, Fawzi A, Fawzi O, Frossard P (2017) Universal adversarial perturbations,\u201d In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 1765\u20131773","DOI":"10.1109\/CVPR.2017.17"},{"issue":"2","key":"3018_CR13","doi-asserted-by":"publisher","first-page":"2332","DOI":"10.1007\/s10489-022-03469-5","volume":"53","author":"B Yang","year":"2023","unstructured":"Yang B, Zhang H, Li Z, Zhang Y, Xu K, Wang J (2023) Adversarial example generation with adabelief optimizer and crop invariance. Appl Intell 53(2):2332\u20132347","journal-title":"Appl Intell"},{"issue":"7","key":"3018_CR14","doi-asserted-by":"publisher","first-page":"7408","DOI":"10.1007\/s10489-022-03838-0","volume":"53","author":"Z He","year":"2023","unstructured":"He Z, Lan X, Yuan J, Cao W (2023) Multi-layer noise reshaping and perceptual optimization for effective adversarial attack of images. Appl Intell 53(7):7408\u20137422","journal-title":"Appl Intell"},{"issue":"1","key":"3018_CR15","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1007\/s10489-022-03437-z","volume":"53","author":"J Zhang","year":"2023","unstructured":"Zhang J, Qian W, Nie R, Cao J, Xu D (2023) Generate adversarial examples by adaptive moment iterative fast gradient sign method. Appl Intell 53(1):1101\u20131114","journal-title":"Appl Intell"},{"key":"3018_CR16","doi-asserted-by":"crossref","unstructured":"Schwinn L, Raab R, Nguyen A, Zanca D, Eskofier B (2023) Exploring misclassifications of robust neural networks to enhance adversarial attacks, Applied Intelligence, pp. 1\u201317","DOI":"10.1007\/s10489-023-04532-5"},{"issue":"2","key":"3018_CR17","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1007\/s10489-021-02371-w","volume":"52","author":"X Fang","year":"2022","unstructured":"Fang X, Li Z, Yang G (2022) A novel approach to generating high-resolution adversarial examples. Appl Intell 52(2):1289\u20131305","journal-title":"Appl Intell"},{"key":"3018_CR18","doi-asserted-by":"crossref","unstructured":"Jiang Q, Zhou T, Yu D, Song Y, Yao S, Wang P, Jin X (2025) Gsu-fusion: A text-guided symmetric u-net framework for infrared and visible image fusion, Information Fusion, p. 103894","DOI":"10.1016\/j.inffus.2025.103894"},{"key":"3018_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2025.131865","volume":"660","author":"W Ma","year":"2026","unstructured":"Ma W, Jiang Q, Wang Q, Yu D, Huang Y, He B, Jin X (2026) Ycsc-unet: A y-shaped composite spatial channel network based on u-net for breast lesion ultrasound image segmentation. Neurocomputing 660:131865","journal-title":"Neurocomputing"},{"key":"3018_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2025.113105","volume":"163","author":"Q Jiang","year":"2026","unstructured":"Jiang Q, Yu H, Jin X, Wang P, Lee S-J, Yao S, Jiang H, Lan W, Zhou W (2026) Attention-guided network for infrared unmanned aerial vehicle target detection. Eng Appl Artif Intell 163:113105","journal-title":"Eng Appl Artif Intell"},{"key":"3018_CR21","unstructured":"Li Y, Tian D, Chang M-C, Bian X, Lyu S (2018) Robust adversarial perturbation on deep proposal-based models, arXiv preprint arXiv:1809.05962"},{"key":"3018_CR22","doi-asserted-by":"crossref","unstructured":"Xie C, Wang J, Zhang Z, Zhou Y, Xie L, Yuille A (2017) Adversarial examples for semantic segmentation and object detection, In: Proceedings of the IEEE international conference on computer vision, pp. 1369\u20131378","DOI":"10.1109\/ICCV.2017.153"},{"key":"3018_CR23","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/TPAMI.1986.4767851","volume":"6","author":"J Canny","year":"1986","unstructured":"Canny J (1986) A computational approach to edge detection. IEEE Trans Pattern Anal Mach Intell 6:679\u2013698","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"9","key":"3018_CR24","first-page":"4819","volume":"44","author":"X Zhang","year":"2021","unstructured":"Zhang X (2021) Deep learning-based multi-focus image fusion: A survey and a comparative study. IEEE Trans Pattern Anal Mach Intell 44(9):4819\u20134838","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"2","key":"3018_CR25","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1109\/TCI.2018.2889959","volume":"5","author":"Y Yang","year":"2019","unstructured":"Yang Y, Nie Z, Huang S, Lin P, Wu J (2019) Multilevel features convolutional neural network for multifocus image fusion. IEEE Transactions on Computational Imaging 5(2):262\u2013273","journal-title":"IEEE Transactions on Computational Imaging"},{"key":"3018_CR26","doi-asserted-by":"publisher","first-page":"5793","DOI":"10.1007\/s00521-020-05358-9","volume":"33","author":"B Ma","year":"2021","unstructured":"Ma B, Zhu Y, Yin X, Ban X, Huang H, Mukeshimana M (2021) Sesf-fuse: An unsupervised deep model for multi-focus image fusion. Neural Comput Appl 33:5793\u20135804","journal-title":"Neural Comput Appl"},{"key":"3018_CR27","doi-asserted-by":"crossref","unstructured":"Xiao B, Wu H, Bi X (2021) Dtmnet: a discrete tchebichef moments-based deep neural network for multi-focus image fusion,\u201d in Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 43\u201351","DOI":"10.1109\/ICCV48922.2021.00011"},{"key":"3018_CR28","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/TIP.2020.3033158","volume":"30","author":"B Xiao","year":"2020","unstructured":"Xiao B, Xu B, Bi X, Li W (2020) Global-feature encoding u-net (geu-net) for multi-focus image fusion. IEEE Trans Image Process 30:163\u2013175","journal-title":"IEEE Trans Image Process"},{"issue":"22","key":"3018_CR29","doi-asserted-by":"publisher","first-page":"6647","DOI":"10.3390\/s20226647","volume":"20","author":"X Yan","year":"2020","unstructured":"Yan X, Gilani SZ, Qin H, Mian A (2020) Structural similarity loss for learning to fuse multi-focus images. Sensors 20(22):6647","journal-title":"Sensors"},{"key":"3018_CR30","doi-asserted-by":"publisher","first-page":"15 119","DOI":"10.1007\/s00521-020-04863-1","volume":"32","author":"J Huang","year":"2020","unstructured":"Huang J, Le Z, Ma Y, Mei X, Fan F (2020) A generative adversarial network with adaptive constraints for multi-focus image fusion. Neural Comput Appl 32:15 119-15 129","journal-title":"Neural Comput Appl"},{"key":"3018_CR31","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks, arXiv preprint arXiv:1312.6199"},{"key":"3018_CR32","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples, arXiv preprint arXiv:1412.6572"},{"key":"3018_CR33","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli S-M, Fawzi A, Frossard P (2016) Deepfool: a simple and accurate method to fool deep neural networks, In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2574\u20132582","DOI":"10.1109\/CVPR.2016.282"},{"key":"3018_CR34","first-page":"372","volume":"2016","author":"N Papernot","year":"2016","unstructured":"Papernot N, McDaniel P, Jha S, Fredrikson M, Celik ZB, Swami A, The limitations of deep learning in adversarial settings, In, (2016) IEEE European symposium on security and privacy (EuroS&P). IEEE 2016:372\u2013387","journal-title":"IEEE"},{"key":"3018_CR35","first-page":"39","volume":"2017","author":"N Carlini","year":"2017","unstructured":"Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. Ieee Symposium on Security and Privacy (sp) Ieee 2017:39\u201357","journal-title":"Ieee Symposium on Security and Privacy (sp) Ieee"},{"key":"3018_CR36","doi-asserted-by":"crossref","unstructured":"Papernot N, McDaniel P, Goodfellow I, Jha S, Celik ZB, Swami A (2017) Practical black-box attacks against machine learning,\u201d In: Proceedings of the 2017 ACM on Asia conference on computer and communications security, pp. 506\u2013519","DOI":"10.1145\/3052973.3053009"},{"key":"3018_CR37","doi-asserted-by":"crossref","unstructured":"Lu J, Issaranon T, Forsyth D (2017) Safetynet: Detecting and rejecting adversarial examples robustly, In: Proceedings of the IEEE international conference on computer vision, pp. 446\u2013454","DOI":"10.1109\/ICCV.2017.56"},{"key":"3018_CR38","doi-asserted-by":"crossref","unstructured":"Chen P-Y, Zhang H, Sharma Y, Yi J, Hsieh C-J (2017) Zoo: Zeroth order optimization based black-box attacks to deep neural networks without training substitute models, In: Proceedings of the 10th ACM workshop on artificial intelligence and security, pp. 15\u201326","DOI":"10.1145\/3128572.3140448"},{"key":"3018_CR39","unstructured":"Ru B, Cobb A, Blaas A, Gal Y (2019) Bayesopt adversarial attack,\u201d In: International Conference on Learning Representations"},{"key":"3018_CR40","unstructured":"Geirhos R, Rubisch P, Michaelis C, Bethge M, Wichmann FA, Brendel W (2018) Imagenet-trained cnns are biased towards texture; increasing shape bias improves accuracy and robustness, arXiv preprint arXiv:1811.12231"},{"key":"3018_CR41","unstructured":"Bao J, Liu B, Ren K, Yu J (2024) Glow: Global layout aware attacks on object detection, In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 12\u00a0057\u201312\u00a0066"},{"key":"3018_CR42","unstructured":"Zhang Y, Foroosh H, David P, Gong B (2019) Camou: Learning physical vehicle camouflages to adversarially attack detectors in the wild, In: International Conference on Learning Representations"},{"key":"3018_CR43","doi-asserted-by":"crossref","unstructured":"He K, Gkioxari G, Doll\u00e1r P, Girshick R (2017) Mask r-cnn, In: Proceedings of the IEEE international conference on computer vision, pp. 2961\u20132969","DOI":"10.1109\/ICCV.2017.322"},{"key":"3018_CR44","doi-asserted-by":"crossref","unstructured":"Huang L, Gao C, Zhou Y, Xie C, Yuille AL, Zou C, Liu N (2020) Universal physical camouflage attacks on object detectors, In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 720\u2013729","DOI":"10.1109\/CVPR42600.2020.00080"},{"key":"3018_CR45","unstructured":"Brown TB, Man\u00e9 D, Roy A, Abadi M, Gilmer J (2017) Adversarial patch,\u201d arXiv preprint arXiv:1712.09665"},{"key":"3018_CR46","unstructured":"Liu X, Yang H, Liu Z, Song L, Li H, Chen Y (2018) Dpatch: An adversarial patch attack on object detectors, arXiv preprint arXiv:1806.02299"},{"key":"3018_CR47","doi-asserted-by":"crossref","unstructured":"Chow K-H, Liu L, Loper M, Bae J, Gursoy ME, Truex S, Wei W, Wu Y (2020) Adversarial objectness gradient attacks in real-time object detection systems, In: 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). IEEE, pp. 263\u2013272","DOI":"10.1109\/TPS-ISA50397.2020.00042"},{"key":"3018_CR48","unstructured":"Li Y, Bian X, Chang M-C, Lyu S (2018) Exploring the vulnerability of single shot module in object detectors via imperceptible background patches, arXiv preprint arXiv:1809.05966"},{"key":"3018_CR49","doi-asserted-by":"crossref","unstructured":"Kurakin A, Goodfellow IJ, Bengio S (2018) Adversarial examples in the physical world, In: Artificial intelligence safety and security. Chapman and Hall\/CRC, pp. 99\u2013112","DOI":"10.1201\/9781351251389-8"},{"key":"3018_CR50","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2017) Towards deep learning models resistant to adversarial attacks, arXiv preprint arXiv:1706.06083"},{"key":"3018_CR51","unstructured":"Chaturvedi SS, Zhang L, Zhang W, He P, Yuan X (2024) Badfusion: 2d-oriented backdoor attacks against 3d object detection, arXiv preprint arXiv:2405.03884"},{"key":"3018_CR52","doi-asserted-by":"crossref","unstructured":"Sun J, Yao W, Jiang T, Li C, Chen X (2025) $${A^{3}D}$$a3d: A platform of searching for robust neural architectures and efficient adversarial attacks,\u201d IEEE Transactions on Pattern Analysis and Machine Intelligence","DOI":"10.1109\/TPAMI.2025.3535933"},{"key":"3018_CR53","doi-asserted-by":"crossref","unstructured":"Li X, Yang Y, Wang Q, Yuan Z, Xu C, Li L, Zhang L (2023) A distributed multi-vehicle pursuit scheme: generative multi-adversarial reinforcement learning, Intelligence & Robotics, 3,(3), [Online]. Available: https:\/\/www.oaepublish.com\/articles\/ir.2023.25","DOI":"10.20517\/ir.2023.25"},{"key":"3018_CR54","doi-asserted-by":"crossref","unstructured":"Jiang Q, Zhou T, He Y, Ma W, Hou J, Abdul\u00a0Ghani A, Miao S, Jin X (2025) Cmmf-net: a generative network based on clip-guided multi-modal feature fusion for thermal infrared image colorization,","DOI":"10.20517\/ir.2025.03"},{"key":"3018_CR55","unstructured":"Everingham M, Van\u00a0Gool L, Williams CKI, Winn J, Zisserman A (2012) The PASCAL Visual Object Classes Challenge 2012 (VOC2012) Results, http:\/\/www.pascal-network.org\/challenges\/VOC\/voc2012\/workshop\/index.html"},{"key":"3018_CR56","doi-asserted-by":"publisher","first-page":"4816","DOI":"10.1109\/TIP.2020.2976190","volume":"29","author":"J Li","year":"2020","unstructured":"Li J, Guo X, Lu G, Zhang B, Xu Y, Wu F, Zhang D (2020) Drpl: Deep regression pair learning for multi-focus image fusion. IEEE Trans Image Process 29:4816\u20134831","journal-title":"IEEE Trans Image Process"},{"key":"3018_CR57","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.neucom.2021.10.115","volume":"470","author":"B Ma","year":"2022","unstructured":"Ma B, Yin X, Wu D, Shen H, Ban X, Wang Y (2022) End-to-end learning for simultaneously generating decision map and multi-focus image fusion result. Neurocomputing 470:204\u2013216","journal-title":"Neurocomputing"},{"issue":"4","key":"3018_CR58","doi-asserted-by":"publisher","first-page":"524","DOI":"10.20517\/ir.2024.30","volume":"4","author":"X Tian","year":"2024","unstructured":"Tian X, Xianyu X, Li Z, Xu T, Jia Y (2024) Infrared and visible image fusion based on multi-level detail enhancement and generative adversarial network. Intelligence & Robotics 4(4):524\u2013543","journal-title":"Intelligence & Robotics"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-026-03018-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-026-03018-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-026-03018-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T06:03:44Z","timestamp":1772863424000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-026-03018-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,7]]},"references-count":58,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["3018"],"URL":"https:\/\/doi.org\/10.1007\/s13042-026-03018-3","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,7]]},"assertion":[{"value":"1 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"186"}}