{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T16:52:17Z","timestamp":1771260737296,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,12,16]],"date-time":"2023-12-16T00:00:00Z","timestamp":1702684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,16]],"date-time":"2023-12-16T00:00:00Z","timestamp":1702684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"\"Ayudas Cervera para Centros Tecnologicos\" grant of the Spanish Centre for the Development of Industrial Technology (CDTI) under the project EGIDA","award":["CER-201910"],"award-info":[{"award-number":["CER-201910"]}]},{"name":"\"Ayudas Cervera para Centros Tecnologicos\" grant of the Spanish Centre for the Development of Industrial Technology (CDTI) under the project EGIDA","award":["CER-201910"],"award-info":[{"award-number":["CER-201910"]}]},{"name":"\"Ayudas Cervera para Centros Tecnologicos\" grant of the Spanish Centre for the Development of Industrial Technology (CDTI) under the project EGIDA","award":["CER-201910"],"award-info":[{"award-number":["CER-201910"]}]},{"name":"ELKARTEK program, project REMEDY - Real Time Control And Embedded Security","award":["KK- 2021\/0009"],"award-info":[{"award-number":["KK- 2021\/0009"]}]},{"name":"ELKARTEK program, project REMEDY - Real Time Control And Embedded Security","award":["KK- 2021\/0009"],"award-info":[{"award-number":["KK- 2021\/0009"]}]},{"name":"ELKARTEK program, project REMEDY - Real Time Control And Embedded Security","award":["KK- 2021\/0009"],"award-info":[{"award-number":["KK- 2021\/0009"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s13389-023-00342-0","type":"journal-article","created":{"date-parts":[[2023,12,16]],"date-time":"2023-12-16T16:02:16Z","timestamp":1702742536000},"page":"499-511","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Keep it unbiased: a comparison between estimation of distribution algorithms and deep learning for human interaction-free side-channel analysis"],"prefix":"10.1007","volume":"14","author":[{"given":"Unai","family":"Rioja","sequence":"first","affiliation":[]},{"given":"Lejla","family":"Batina","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Armendariz","sequence":"additional","affiliation":[]},{"given":"Jose Luis","family":"Flores","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,16]]},"reference":[{"key":"342_CR1","doi-asserted-by":"crossref","unstructured":"Azouaoui, M., Bellizia, D., Buhan, I., Debande, N., Duval, S., Giraud, C., Jaulmes, E., Koeune, F., Oswald, E., Standaert, F.-X., Whitnall, C.: A systematic appraisal of side channel evaluation strategies. IACR Cryptol. ePrint Arch (2020)","DOI":"10.1007\/978-3-030-64357-7_3"},{"key":"342_CR2","doi-asserted-by":"crossref","unstructured":"Balasch, J., Gierlichs, B., Grosso, V., Reparaz, O., Standaert, F.-X.: On the cost of lazy engineering for masked software implementations, Vol 8968, pp. 64\u201381. Joye, Marc, Springer (2014)","DOI":"10.1007\/978-3-319-16763-3_5"},{"key":"342_CR3","doi-asserted-by":"publisher","first-page":"06","DOI":"10.1007\/s13389-019-00220-8","volume":"10","author":"Ryad Benadjila","year":"2020","unstructured":"Benadjila, Ryad, Prouff, Emmanuel, Strullu, R\u00e9mi., Cagli, Eleonora, Dumas, C\u00e9cile.: Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptogr. Eng. 10, 06 (2020)","journal-title":"J. Cryptogr. Eng."},{"key":"342_CR4","doi-asserted-by":"crossref","unstructured":"Bhasin, S., Chattopadhyay, A., Heuser, A., Jap, D., Picek, S., Shrivastwa, R.R.: Mind the portability: a warriors guide through realistic profiled side-channel analysis. In: NDSS Symposium (2020)","DOI":"10.14722\/ndss.2020.24390"},{"issue":"3","key":"342_CR5","doi-asserted-by":"publisher","first-page":"202","DOI":"10.46586\/tches.v2021.i3.202-234","volume":"2021","author":"Olivier Bronchain","year":"2021","unstructured":"Bronchain, Olivier, Standaert, Fran\u00e7ois-Xavier.: Breaking masked implementations with many shares on 32-bit software platforms: or when the security order does not matter. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 202\u2013234 (2021)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"342_CR6","doi-asserted-by":"crossref","unstructured":"Cagli, E., Dumas, C., Prouff, E.: Convolutional neural networks with data augmentation against jitter-based countermeasures. In: Fischer, W., Homma, N. (eds.) CHES 2017, pp. 45\u201368, Springer (2017)","DOI":"10.1007\/978-3-319-66787-4_3"},{"key":"342_CR7","doi-asserted-by":"publisher","first-page":"27","DOI":"10.46586\/tches.v2021.i4.27-56","volume":"2021","author":"Pei Cao","year":"2021","unstructured":"Cao, Pei, Zhang, Chi, Xiangjun, Lu., Dawu, Gu.: Cross-device profiled side-channel attack with unsupervised domain adaptation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021, 27\u201356 (2021)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"2","key":"342_CR8","doi-asserted-by":"publisher","first-page":"132","DOI":"10.46586\/tches.v2019.i2.132-161","volume":"2019","author":"Mathieu Carbone","year":"2019","unstructured":"Carbone, Mathieu, Conin, Vincent, Corn\u00e9lie, Marie-Angela., Dassance, Fran\u00e7ois, Dufresne, Guillaume, Dumas, C\u00e9cile., Prouff, Emmanuel, Venelli, Alexandre: Deep learning to evaluate secure RSA implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2), 132\u2013161 (2019)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"342_CR9","doi-asserted-by":"crossref","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Cryptographic hardware and embedded systems\u2014CHES 2002, pp. 13\u201328. Springer (2002)","DOI":"10.1007\/3-540-36400-5_3"},{"key":"342_CR10","doi-asserted-by":"crossref","unstructured":"Chen, Z., Haider, S., Schaumont, P.: Side-channel leakage in masked circuits caused by higher-order circuit effects. In: Park, J.\u00a0H., Chen, H.-H., Atiquzzaman, M., Lee, C., Kim, T., Yeo, S.-S. (eds.), Advances in information security and assurance, pp. 327\u2013336, Berlin, Heidelberg (2009)","DOI":"10.1007\/978-3-642-02617-1_34"},{"issue":"2","key":"342_CR11","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1109\/TIFS.2017.2757440","volume":"13","author":"MO Choudary","year":"2018","unstructured":"Choudary, M.O., Kuhn, M.G.: Efficient, portable template attacks. IEEE Trans. Inf. Forensics Secur. 13(2), 490\u2013501 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"342_CR12","doi-asserted-by":"crossref","unstructured":"Choudary, O., Kuhn, M.G.: Template attacks on different devices. In: Constructive side-channel analysis and secure design, COSADE, pp. 179\u2013198. Springer (2014)","DOI":"10.1007\/978-3-319-10175-0_13"},{"key":"342_CR13","doi-asserted-by":"crossref","unstructured":"Danial, J., Das, D., Golder, A., Ghosh, S., Raychowdhury, A., Sen, S.: EM-X-DL: efficient cross-device deep learning side-channel attack with noisy EM signatures. CoRR. arXiv:2011.06139 (2020)","DOI":"10.1145\/3465380"},{"key":"342_CR14","doi-asserted-by":"crossref","unstructured":"Das, D., Golder, A., Danial, J., Ghosh, S.K., Raychowdhury, A., Sen, S.: X-deepsca: Cross-device deep learning side channel attack*. In: 2019 56th ACM\/IEEE Design Automation Conference (DAC), pp 1\u20136 (2019)","DOI":"10.1145\/3316781.3317934"},{"issue":"1","key":"342_CR15","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s13389-012-0030-6","volume":"2","author":"Sylvain Elaabid","year":"2012","unstructured":"Elaabid, Sylvain, Abdelazizand Guilley, M.: Portability of templates. J. Cryptogr. Eng. 2(1), 63\u201374 (2012)","journal-title":"J. Cryptogr. Eng."},{"key":"342_CR16","unstructured":"Federal Information Processing Standard. FIPS 197: Announcing the advanced encryption standard (AES) (2001). https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.197.pdf (2001)"},{"key":"342_CR17","unstructured":"Kasper F.: Computational complexity of neural networks. https:\/\/kasperfred.com\/series\/introduction-to-neural-networks\/computational-complexity-of-neural-networks (2020)"},{"key":"342_CR18","doi-asserted-by":"crossref","unstructured":"Gilmore, R., Hanley, N., O\u2019Neill, M.: Neural network based attack on a masked implementation of AES. In: Proceedings of the 2015 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2015, pp. 106\u2013111 (2015)","DOI":"10.1109\/HST.2015.7140247"},{"key":"342_CR19","unstructured":"Gohr, A., Jacob, S., Schindler, W.: CHES 2018 side channel contest CTF\u2013solution of the AES challenges. IACR Cryptol. ePrint Arch (2019)"},{"issue":"12","key":"342_CR20","doi-asserted-by":"publisher","first-page":"2720","DOI":"10.1109\/TVLSI.2019.2926324","volume":"27","author":"Anupam Golder","year":"2019","unstructured":"Golder, Anupam, Das, Debayan, Danial, Josef, Ghosh, Santosh, Sen, Shreyas, Raychowdhury, Arijit: Practical approaches toward deep-learning-based cross-device power side-channel attack. IEEE Trans. Very Large Scale Integr. VLSI Syst. 27(12), 2720\u20132733 (2019)","journal-title":"IEEE Trans. Very Large Scale Integr. VLSI Syst."},{"issue":"3","key":"342_CR21","doi-asserted-by":"publisher","first-page":"148","DOI":"10.46586\/tches.v2019.i3.148-179","volume":"2019","author":"Jaehun Kim","year":"2019","unstructured":"Kim, Jaehun, Picek, Stjepan, Heuser, Annelie, Bhasin, Shivam, Hanjalic, Alan: Make some noise unleashing the power of convolutional neural networks for profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(3), 148\u2013179 (2019)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"342_CR22","unstructured":"Kim, Taewon, Kim, Kwonyoup, Kim, Tae Hyun, Ryu, Sangryeol: AES wireless keyboard: Template attack for eavesdropping. In: Black Hat Asia, Singapore (2018)"},{"key":"342_CR23","first-page":"11","volume":"8","author":"Liran Lerman","year":"2018","unstructured":"Lerman, Liran, Poussier, Romain, Markowitch, Olivier, Standaert, Fran\u00e7ois-Xavier.: Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version. J. Cryptogr. Eng. 8, 11 (2018)","journal-title":"J. Cryptogr. Eng."},{"key":"342_CR24","unstructured":"Maghrebi, Houssem: Deep learning based side-channel attack: a new profiling methodology based on multi-label classification. IACR Cryptol. ePrint Arch (2020)"},{"key":"342_CR25","doi-asserted-by":"crossref","unstructured":"Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: SPACE 2016 (2016)","DOI":"10.1007\/978-3-319-49445-6_1"},{"key":"342_CR26","doi-asserted-by":"crossref","unstructured":"Mangard, S., Popp, T., Gammel, B.M.: Side-channel leakage of masked CMOS gates. In: Menezes, A. (ed.), Topics in Cryptology\u2014CT-RSA 2005, pp. 351\u2013365, Springer, Berlin (2005)","DOI":"10.1007\/978-3-540-30574-3_24"},{"key":"342_CR27","doi-asserted-by":"crossref","unstructured":"Martinasek, Z., Malina, L.: Comparison of profiling power analysis attacks using templates and multi-layer perceptron network (2014)","DOI":"10.1007\/978-3-319-15765-8_18"},{"key":"342_CR28","doi-asserted-by":"crossref","unstructured":"Oswald, E., Mangard, S.: Template attacks on masking-resistance is futile. In: CT-RSA 2007: Topics in Cryptology, vol. 4377, pp. 243\u2013256 (2007)","DOI":"10.1007\/11967668_16"},{"key":"342_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108230","volume":"196","author":"Servio Paguada","year":"2021","unstructured":"Paguada, Servio, Batina, Lejla, Armendariz, Igor: Toward practical autoencoder-based side-channel analysis evaluations. Comput. Netw. 196, 108230 (2021)","journal-title":"Comput. Netw."},{"key":"342_CR30","doi-asserted-by":"crossref","unstructured":"Paguada, S., Rioja, U., Armendariz, I.: Controlling the deep learning-based side-channel analysis: a way to leverage from heuristics. In: ACNS Workshops (2020)","DOI":"10.1007\/978-3-030-61638-0_7"},{"issue":"4","key":"342_CR31","doi-asserted-by":"publisher","first-page":"337","DOI":"10.46586\/tches.v2020.i4.337-364","volume":"2020","author":"Guilherme Perin","year":"2020","unstructured":"Perin, Guilherme, Chmielewski, Lukasz, Picek, Stjepan: Strength in numbers: improving generalization with ensembles in machine learning-based profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4), 337\u2013364 (2020)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"342_CR32","unstructured":"Perin, G., Ege, B.: Lowering the bar: deep learning for side-channel analysis (whitepaper ). In: Proc. BlackHat, pp. 1\u201315 (2018)"},{"issue":"4","key":"342_CR33","doi-asserted-by":"publisher","first-page":"828","DOI":"10.46586\/tches.v2022.i4.828-861","volume":"2022","author":"Guilherme Perin","year":"2022","unstructured":"Perin, Guilherme, Lichao, Wu., Picek, Stjepan: Exploring feature selection scenarios for deep learning-based side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4), 828\u2013861 (2022)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"342_CR34","doi-asserted-by":"crossref","unstructured":"Picek, S., Heuser, A., Jovic, A., Batina, L.: A systematic evaluation of profiling through focused feature selection. IEEE Trans. Very Large Scale Integr. (VLSI) Syst., pp. 1\u201314 (2019)","DOI":"10.1109\/TVLSI.2019.2937365"},{"key":"342_CR35","doi-asserted-by":"crossref","unstructured":"Picek, S., Samiotis, I.\u00a0P., Kim, J., Heuser, A., Bhasin, S., Legay, A.: On the performance of convolutional neural networks for side-channel analysis. In: Chattopadhyay, A., Rebeiro, C., Yarom, Y. (eds.) Security, Privacy, and Applied Cryptography Engineering, pp. 157\u2013176, Springer, Cham (2018)","DOI":"10.1007\/978-3-030-05072-6_10"},{"key":"342_CR36","doi-asserted-by":"crossref","unstructured":"Rechberger, C., Oswald, E.: Practical template attacks. In: Lim, C.\u00a0H., Yung, M. (eds.) Information Security Applications, pp. 440\u2013456, Springer, Berlin (2005)","DOI":"10.1007\/978-3-540-31815-6_35"},{"key":"342_CR37","doi-asserted-by":"crossref","unstructured":"Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N., Kamel, D., Flandre, D.: A formal study of power variability issues and side-channel attacks for nanoscale devices. In: Advances in Cryptology\u2014EUROCRYPT 2011, pp. 109\u2013128. Springer, Heidelberg (2011)","DOI":"10.1007\/978-3-642-20465-4_8"},{"issue":"3","key":"342_CR38","doi-asserted-by":"publisher","first-page":"677","DOI":"10.46586\/tches.v2021.i3.677-707","volume":"2021","author":"Jorai Rijsdijk","year":"2021","unstructured":"Rijsdijk, Jorai, Lichao, Wu., Perin, Guilherme, Picek, Stjepan: Reinforcement learning for hyperparameter tuning in deep learning-based side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 677\u2013707 (2021)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"342_CR39","doi-asserted-by":"crossref","unstructured":"Rioja, U., Batina, L., Armendariz, I., Flores, J.L.: Towards human dependency elimination: AI approach to SCA robustness assessment. IEEE Trans. Inf. Forensics Secur. (2022)","DOI":"10.1109\/TIFS.2022.3176189"},{"key":"342_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108405","volume":"198","author":"Unai Rioja","year":"2021","unstructured":"Rioja, Unai, Batina, Lejla, Flores, Jose Luis, Armendariz, Igor: Auto-tune pois: estimation of distribution algorithms for efficient side-channel analysis. Comput. Netw. 198, 108405 (2021)","journal-title":"Comput. Netw."},{"key":"342_CR41","doi-asserted-by":"crossref","unstructured":"Shelton, M., Samwel, N., Batina, L., Regazzoni, F., Wagner, M., Yarom, Y.: Rosita: towards automatic elimination of power-analysis leakage in ciphers. In: NDSS Symposium (2021)","DOI":"10.14722\/ndss.2021.23137"},{"key":"342_CR42","doi-asserted-by":"crossref","unstructured":"Standaert, F.-X., Archambeau, C.: Using subspace-based template attacks to compare and combine power and electromagnetic information leakages. In: Oswald, E., Rohatgi, P. (eds.) Cryptographic Hardw Embed Syst\u2014CHES 2008, pp. 411\u2013425. Springer, Heidelberg (2008)","DOI":"10.1007\/978-3-540-85053-3_26"},{"key":"342_CR43","doi-asserted-by":"crossref","unstructured":"Thapar, D., Alam, M., Mukhopadhyay, D.: Deep learning assisted cross-family profiled side-channel attacks using transfer learning. In: 2021 22nd International Symposium on Quality Electronic Design (ISQED), pp. 178\u2013185 (2021)","DOI":"10.1109\/ISQED51717.2021.9424254"},{"issue":"3","key":"342_CR44","doi-asserted-by":"publisher","first-page":"147","DOI":"10.46586\/tches.v2020.i3.147-168","volume":"2020","author":"Lennert Wouters","year":"2020","unstructured":"Wouters, Lennert, Arribas, Victor, Gierlichs, Benedikt, Preneel, Bart: Revisiting a methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3), 147\u2013168 (2020)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"342_CR45","unstructured":"Wu, L., Perin, G., Picek, S.: I choose you: automated hyperparameter tuning for deep learning-based side-channel analysis. IACR Cryptol. ePrint Arch., p. 1293 (2020)"},{"key":"342_CR46","doi-asserted-by":"crossref","unstructured":"Yang, S., Zhou, Y., Liu, J., Chen, D.: Back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations, pp. 169\u2013185 (2011)","DOI":"10.1007\/978-3-642-31912-9_12"},{"key":"342_CR47","doi-asserted-by":"crossref","unstructured":"Yu, H., Shan, H., Panoff, M., Jin, Y.: Cross-device profiled side-channel attacks using meta-transfer learning. In: 2021 58th ACM\/IEEE Design Automation Conference (DAC), pp. 703\u2013708 (2021)","DOI":"10.1109\/DAC18074.2021.9586100"},{"key":"342_CR48","doi-asserted-by":"crossref","unstructured":"Zaid, G., Bossuet, L., Habrard, A., Venelli, A.: Methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst., Vol. 2020 (2019)","DOI":"10.46586\/tches.v2020.i1.1-36"},{"key":"342_CR49","doi-asserted-by":"publisher","first-page":"04","DOI":"10.1007\/s13389-019-00209-3","volume":"10","author":"Yuanyuan Zhou","year":"2020","unstructured":"Zhou, Yuanyuan, Standaert, Fran\u00e7ois-Xavier.: Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks. J. Cryptogr. Eng. 10, 04 (2020)","journal-title":"J. Cryptogr. Eng."},{"key":"342_CR50","unstructured":"Zotkin, Y., Olivier, F., Bourbao, E.: Deep learning vs template attacks in front of fundamental targets: experimental study. IACR Cryptol. ePrint Arch., pp. 1213 (2018)"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-023-00342-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13389-023-00342-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-023-00342-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T13:05:47Z","timestamp":1726319147000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13389-023-00342-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,16]]},"references-count":50,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["342"],"URL":"https:\/\/doi.org\/10.1007\/s13389-023-00342-0","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"value":"2190-8508","type":"print"},{"value":"2190-8516","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,16]]},"assertion":[{"value":"14 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We have a conflict of interest to disclose, as one of the guest editors of the special issue shares an affiliation with some authors (Stjepan Picek, Radboud University, The Netherlands).","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}