{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T03:26:44Z","timestamp":1768706804083,"version":"3.49.0"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T00:00:00Z","timestamp":1723593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T00:00:00Z","timestamp":1723593600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["42075142"],"award-info":[{"award-number":["42075142"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["42130608"],"award-info":[{"award-number":["42130608"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012542","name":"Sichuan Province Science and Technology Support Program","doi-asserted-by":"publisher","award":["23NSFSC2224"],"award-info":[{"award-number":["23NSFSC2224"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012542","name":"Sichuan Province Science and Technology Support Program","doi-asserted-by":"publisher","award":["2020JDTD0020"],"award-info":[{"award-number":["2020JDTD0020"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012542","name":"Sichuan Province Science and Technology Support Program","doi-asserted-by":"publisher","award":["23ZHSF0169"],"award-info":[{"award-number":["23ZHSF0169"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012542","name":"Sichuan Province Science and Technology Support Program","doi-asserted-by":"publisher","award":["2022YFG0026"],"award-info":[{"award-number":["2022YFG0026"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012542","name":"Sichuan Province Science and Technology Support Program","doi-asserted-by":"publisher","award":["2021YFG0018"],"award-info":[{"award-number":["2021YFG0018"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s40747-024-01580-3","type":"journal-article","created":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T09:02:16Z","timestamp":1723626136000},"page":"8095-8108","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["MFPIDet: improved YOLOV7 architecture based on multi-scale feature fusion for prohibited item detection in complex environment"],"prefix":"10.1007","volume":"10","author":[{"given":"Lang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zhan Ao","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Canghong","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Hongjiang","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3341-4034","authenticated-orcid":false,"given":"Xiaojie","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xi","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,14]]},"reference":[{"issue":"21","key":"1580_CR1","doi-asserted-by":"publisher","first-page":"6297","DOI":"10.1364\/AO.461627","volume":"61","author":"Y Zhang","year":"2022","unstructured":"Zhang Y, Xu W, Yang S, Xu Y, Yu X (2022) Improved yolox detection algorithm for contraband in x-ray images. Appl Opt 61(21):6297\u20136310","journal-title":"Appl Opt"},{"issue":"23","key":"1580_CR2","doi-asserted-by":"publisher","first-page":"18195","DOI":"10.1007\/s00500-023-09278-3","volume":"27","author":"Q Wu","year":"2023","unstructured":"Wu Q, Li X, Wang K, Bilal H (2023) Regional feature fusion for on-road detection of objects using camera and 3d-lidar in high-speed autonomous vehicles. Soft Comput 27(23):18195\u201318213","journal-title":"Soft Comput"},{"key":"1580_CR3","first-page":"74","volume":"16","author":"T Liang","year":"2021","unstructured":"Liang T, Zhang N, Zhang Y, Yuan J, Gao X (2021) Summary of research progress on application of prohibited item detection in x-ray images. Comput Eng Appl 16:74\u201382","journal-title":"Comput Eng Appl"},{"issue":"21","key":"1580_CR4","doi-asserted-by":"publisher","first-page":"16373","DOI":"10.1007\/s00500-023-09164-y","volume":"27","author":"H Dou","year":"2023","unstructured":"Dou H, Liu Y, Chen S, Zhao H, Bilal H (2023) A hybrid ceemd-gmm scheme for enhancing the detection of traffic flow on highways. Soft Comput 27(21):16373\u201316388","journal-title":"Soft Comput"},{"issue":"7","key":"1580_CR5","doi-asserted-by":"publisher","first-page":"4029","DOI":"10.1007\/s00500-023-07923-5","volume":"27","author":"H Bilal","year":"2023","unstructured":"Bilal H, Yin B, Kumar A, Ali M, Zhang J, Yao J (2023) Jerk-bounded trajectory planning for rotary flexible joint manipulator: an experimental approach. Soft Comput 27(7):4029\u20134039","journal-title":"Soft Comput"},{"issue":"5","key":"1580_CR6","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.1049\/ipr2.13013","volume":"18","author":"H Zhang","year":"2024","unstructured":"Zhang H, Zhao Z, Yang J (2024) Attention-based prohibited item detection in x-ray images during security checking. IET Image Process 18(5):1119\u20131131","journal-title":"IET Image Process"},{"key":"1580_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2024.3394483","author":"T Jia","year":"2024","unstructured":"Jia T, Ma B, Wang H, Li M, Lin S, Chen D (2024) Forknet: overlapping image disentanglement for accurate prohibited item detection. IEEE Trans Instrum Meas. https:\/\/doi.org\/10.1109\/TIM.2024.3394483","journal-title":"IEEE Trans Instrum Meas"},{"key":"1580_CR8","doi-asserted-by":"crossref","unstructured":"Wei Y, Tao R, Wu Z, Ma Y, Zhang L, Liu X (2020) Occluded prohibited items detection: an x-ray security inspection benchmark and de-occlusion attention module, pp 138\u2013146","DOI":"10.1145\/3394171.3413828"},{"key":"1580_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108261","volume":"122","author":"F Shao","year":"2022","unstructured":"Shao F, Liu J, Wu P, Yang Z, Wu Z (2022) Exploiting foreground and background separation for prohibited item detection in overlapping x-ray images. Pattern Recogn 122:108261","journal-title":"Pattern Recogn"},{"key":"1580_CR10","first-page":"1","volume":"2020","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Kong W, Li D, Liu X (2020) On using xmc r-cnn model for contraband detection within x-ray baggage security images. Math Prob Eng 2020:1\u201314","journal-title":"Math Prob Eng"},{"issue":"1","key":"1580_CR11","first-page":"2050793","volume":"2022","author":"M Wang","year":"2022","unstructured":"Wang M, Zhu Y, Liu Y, Deng H (2022) X-ray small target security inspection based on tb-yolov5. Secur Commun Netw 2022(1):2050793","journal-title":"Secur Commun Netw"},{"issue":"9","key":"1580_CR12","doi-asserted-by":"publisher","first-page":"26485","DOI":"10.1007\/s11042-023-16628-8","volume":"83","author":"B Wang","year":"2023","unstructured":"Wang B, Ding H, Chen C (2023) Ac-yolov4: an object detection model incorporating attention mechanism and atrous convolution for contraband detection in x-ray images. Multimed Tools Appl 83(9):26485\u201326504","journal-title":"Multimed Tools Appl"},{"key":"1580_CR13","doi-asserted-by":"publisher","first-page":"0810012","DOI":"10.3788\/LOP202158.0810012","volume":"58","author":"Y Wang","year":"2021","unstructured":"Wang Y, Zhang L (2021) Dangerous goods detection based on multi-scale feature fusion in security images. Laser Optoelectron Prog 58:0810012","journal-title":"Laser Optoelectron Prog"},{"key":"1580_CR14","doi-asserted-by":"crossref","unstructured":"Wang C-Y, Bochkovskiy A, Liao H-YM (2023) Yolov7: trainable bag-of-freebies sets new state-of-the-art for real-time object detectors. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 7464\u20137475","DOI":"10.1109\/CVPR52729.2023.00721"},{"key":"1580_CR15","doi-asserted-by":"crossref","unstructured":"Hu J, Shen L, Sun G (2018) Squeeze-and-excitation networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 7132\u20137141","DOI":"10.1109\/CVPR.2018.00745"},{"key":"1580_CR16","doi-asserted-by":"crossref","unstructured":"Wang B, Zhang L, Wen L, Liu X, Wu Y (2021) Towards real-world prohibited item detection: a large-scale x-ray benchmark. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 5412\u20135421","DOI":"10.1109\/ICCV48922.2021.00536"},{"key":"1580_CR17","doi-asserted-by":"crossref","unstructured":"Girshick R, Donahue J, Darrell T, Malik J (2014) Rich feature hierarchies for accurate object detection and semantic segmentation. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 580\u2013587","DOI":"10.1109\/CVPR.2014.81"},{"key":"1580_CR18","doi-asserted-by":"crossref","unstructured":"Girshick R (2015) Fast R-CNN. In: Proceedings of the IEEE international conference on computer vision, pp 1440\u20131448","DOI":"10.1109\/ICCV.2015.169"},{"key":"1580_CR19","unstructured":"Ren S, He K, Girshick R, Sun J (2015) Faster r-cnn: towards real-time object detection with region proposal networks. Adv Neural Inf Process Syst 28"},{"key":"1580_CR20","doi-asserted-by":"crossref","unstructured":"Redmon J, Divvala S, Girshick R, Farhadi A (2016) You only look once: unified, real-time object detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 779\u2013788","DOI":"10.1109\/CVPR.2016.91"},{"key":"1580_CR21","doi-asserted-by":"crossref","unstructured":"Liu W, Anguelov D, Erhan D, Szegedy C, Reed S, Fu C-Y, Berg AC (2016) Ssd: single shot multibox detector. In: Computer vision\u2013ECCV 2016: 14th European conference, Amsterdam, The Netherlands, October 11\u201314, 2016, Proceedings, Part I 14, pp 21\u201337. Springer","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"1580_CR22","doi-asserted-by":"crossref","unstructured":"Lin T-Y, Goyal P, Girshick R, He K, Doll\u00e1r P (2017) Focal loss for dense object detection. In: Proceedings of the IEEE international conference on computer vision, pp 2980\u20132988","DOI":"10.1109\/ICCV.2017.324"},{"key":"1580_CR23","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556"},{"key":"1580_CR24","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"1580_CR25","doi-asserted-by":"crossref","unstructured":"Huang G, Liu Z, Van Der\u00a0Maaten L, Weinberger KQ (2017) Densely connected convolutional networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 4700\u20134708","DOI":"10.1109\/CVPR.2017.243"},{"key":"1580_CR26","doi-asserted-by":"crossref","unstructured":"Wang C-Y, Liao H-YM, Wu Y-H, Chen P-Y, Hsieh J-W, Yeh I-H (2020) Cspnet: a new backbone that can enhance learning capability of cnn. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops, pp 390\u2013391","DOI":"10.1109\/CVPRW50498.2020.00203"},{"key":"1580_CR27","doi-asserted-by":"crossref","unstructured":"Lin T-Y, Doll\u00e1r P, Girshick R, He K, Hariharan B, Belongie S (2017) Feature pyramid networks for object detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2117\u20132125","DOI":"10.1109\/CVPR.2017.106"},{"key":"1580_CR28","doi-asserted-by":"crossref","unstructured":"Liu S, Qi L, Qin H, Shi J, Jia J (2018) Path aggregation network for instance segmentation. In: Proceedings of the ieee conference on computer vision and pattern recognition, pp 8759\u20138768","DOI":"10.1109\/CVPR.2018.00913"},{"key":"1580_CR29","doi-asserted-by":"crossref","unstructured":"Tan M, Pang R, Le QV (2020) Efficientdet: scalable and efficient object detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 10781\u201310790","DOI":"10.1109\/CVPR42600.2020.01079"},{"key":"1580_CR30","doi-asserted-by":"crossref","unstructured":"Ak\u00e7ay S, Kundegorski ME, Devereux M, Breckon TP (2016) Transfer learning using convolutional neural networks for object classification within x-ray baggage security imagery. In: 2016 IEEE international conference on image processing (ICIP), pp 1057\u20131061. IEEE","DOI":"10.1109\/ICIP.2016.7532519"},{"key":"1580_CR31","doi-asserted-by":"crossref","unstructured":"Bastan M, Yousefi MR, Breuel TM (2011) Visual words on baggage x-ray images. In: International conference on computer analysis of images and patterns","DOI":"10.1007\/978-3-642-23672-3_44"},{"issue":"4","key":"1580_CR32","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1109\/TSMC.2016.2628381","volume":"47","author":"D Mery","year":"2016","unstructured":"Mery D, Svec E, Arias M, Riffo V, Saavedra JM, Banerjee S (2016) Modern computer vision techniques for x-ray testing in baggage inspection. IEEE Trans Syst Man Cybern Syst 47(4):682\u2013692","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"1580_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10921-015-0315-7","volume":"34","author":"D Mery","year":"2015","unstructured":"Mery D, Riffo V, Zscherpel U, Mondrag\u00f3n G, Lillo I, Zuccar I, Lobel H, Carrasco M (2015) Gdxray: the database of x-ray images for nondestructive testing. J Nondestr Eval 34:1\u201312","journal-title":"J Nondestr Eval"},{"key":"1580_CR34","doi-asserted-by":"crossref","unstructured":"Miao C, Xie L, Wan F, Su C, Liu H, Jiao J, Ye Q (2019) Sixray: a large-scale security inspection x-ray benchmark for prohibited item discovery in overlapping images. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 2119\u20132128","DOI":"10.1109\/CVPR.2019.00222"},{"key":"1580_CR35","first-page":"17","volume":"14","author":"T Hassan","year":"2019","unstructured":"Hassan T, Khan SH, Akcay S, Bennamoun M, Werghi N (2019) Deep cmst framework for the autonomous recognition of heavily occluded and cluttered baggage items from multivendor security radiographs. CoRR 14:17","journal-title":"CoRR"},{"key":"1580_CR36","doi-asserted-by":"crossref","unstructured":"Tao R, Wei Y, Jiang X, Li H, Qin H, Wang J, Ma Y, Zhang L, Liu X (2021) Towards real-world x-ray security inspection: a high-quality benchmark and lateral inhibition module for prohibited items detection. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 10923\u201310932","DOI":"10.1109\/ICCV48922.2021.01074"},{"key":"1580_CR37","unstructured":"Wang C-Y, Liao H-YM, Yeh I-H (2022) Designing network design strategies through gradient path analysis. arXiv preprint arXiv:2211.04800"},{"key":"1580_CR38","unstructured":"Ramachandran P, Zoph B, Le QV (2017) Swish: a self-gated activation function. Neural and evolutionary computing arXiv:1710.05941"},{"key":"1580_CR39","doi-asserted-by":"crossref","unstructured":"Ding X, Zhang X, Ma N, Han J, Ding G, Sun J (2021) Repvgg: making vgg-style convnets great again. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 13733\u201313742","DOI":"10.1109\/CVPR46437.2021.01352"},{"key":"1580_CR40","unstructured":"Ge Z, Liu S, Wang F, Li Z, Sun J (2021) Yolox: exceeding yolo series in 2021. arXiv preprint arXiv:2107.08430"},{"key":"1580_CR41","doi-asserted-by":"crossref","unstructured":"Wang C-Y, Bochkovskiy A, Liao H-YM (2021) Scaled-yolov4: scaling cross stage partial network. In: Proceedings of the IEEE\/cvf conference on computer vision and pattern recognition, pp 13029\u201313038","DOI":"10.1109\/CVPR46437.2021.01283"},{"key":"1580_CR42","doi-asserted-by":"crossref","unstructured":"Yu J, Jiang Y, Wang Z, Cao Z, Huang T (2016) Unitbox: an advanced object detection network. In: Proceedings of the 24th ACM international conference on multimedia, pp 516\u2013520","DOI":"10.1145\/2964284.2967274"},{"key":"1580_CR43","doi-asserted-by":"crossref","unstructured":"Rezatofighi H, Tsoi N, Gwak J, Sadeghian A, Reid I, Savarese S (2019) Generalized intersection over union: a metric and a loss for bounding box regression. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 658\u2013666","DOI":"10.1109\/CVPR.2019.00075"},{"key":"1580_CR44","doi-asserted-by":"crossref","unstructured":"Zheng Z, Wang P, Liu W, Li J, Ye R, Ren D (2020) Distance-iou loss: faster and better learning for bounding box regression. In: Proceedings of the AAAI conference on artificial intelligence, vol 34, pp 12993\u201313000","DOI":"10.1609\/aaai.v34i07.6999"},{"key":"1580_CR45","doi-asserted-by":"crossref","unstructured":"Du S, Zhang B, Zhang P, Xiang P (2021) An improved bounding box regression loss function based on ciou loss for multi-scale object detection. In: 2021 IEEE 2nd international conference on pattern recognition and machine learning (PRML), pp 92\u201398. IEEE","DOI":"10.1109\/PRML52754.2021.9520717"},{"key":"1580_CR46","first-page":"1140","volume":"35","author":"M-H Guo","year":"2022","unstructured":"Guo M-H, Lu C-Z, Hou Q, Liu Z, Cheng M-M, Hu S-M (2022) Segnext: rethinking convolutional attention design for semantic segmentation. Adv Neural Inf Process Syst 35:1140\u20131156","journal-title":"Adv Neural Inf Process Syst"},{"key":"1580_CR47","doi-asserted-by":"crossref","unstructured":"Xue Z, Chen W, Li J (2020) Enhancement and fusion of multi-scale feature maps for small object detection. In: 2020 39th Chinese control conference (CCC), pp 7212\u20137217","DOI":"10.23919\/CCC50068.2020.9189352"},{"key":"1580_CR48","unstructured":"Liu S, Huang D, Wang Y (2019) Learning spatial fusion for single-shot object detection. arXiv preprint arXiv:1911.09516"},{"key":"1580_CR49","unstructured":"Zhang H, Cisse M, Dauphin YN, Lopez-Paz D (2018) Mixup: beyond empirical risk minimization. In: International conference on learning representations"},{"key":"1580_CR50","doi-asserted-by":"crossref","unstructured":"Tian Z, Shen C, Chen H, He T (2019) Fcos: fully convolutional one-stage object detection. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 9627\u20139636","DOI":"10.1109\/ICCV.2019.00972"},{"key":"1580_CR51","doi-asserted-by":"crossref","unstructured":"Feng C, Zhong Y, Gao Y, Scott MR, Huang W (2021) Tood: task-aligned one-stage object detection. In: 2021 IEEE\/CVF international conference on computer vision (ICCV), pp 3490\u20133499. IEEE computer society","DOI":"10.1109\/ICCV48922.2021.00349"},{"key":"1580_CR52","doi-asserted-by":"crossref","unstructured":"Chen Z, Yang C, Li Q, Zhao F, Zha Z-J, Wu F (2021) Disentangle your dense object detector. In: Proceedings of the 29th ACM international conference on multimedia, pp 4939\u20134948","DOI":"10.1145\/3474085.3475351"},{"key":"1580_CR53","unstructured":"Bochkovskiy A, Wang C-Y, Liao H-YM (2020) Yolov4: optimal speed and accuracy of object detection. arXiv:2004.10934"},{"key":"1580_CR54","doi-asserted-by":"crossref","unstructured":"Wang C-Y, Yeh I-H, Liao H-YM (2024) YOLOv9: learning what you want to learn using programmable gradient information","DOI":"10.1007\/978-3-031-72751-1_1"},{"key":"1580_CR55","doi-asserted-by":"crossref","unstructured":"Zhao Y, Lv W, Xu S, Wei J, Wang G, Dang Q, Liu Y, Chen J (2023) DETRs beat YOLOs on real-time object detection","DOI":"10.1109\/CVPR52733.2024.01605"},{"key":"1580_CR56","doi-asserted-by":"crossref","unstructured":"Lin T-Y, Maire M, Belongie S, Hays J, Perona P, Ramanan D, Doll\u00e1r P, Zitnick CL (2014) Microsoft coco: Common objects in context. In: Computer vision\u2013ECCV 2014: 13th European conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part V 13, pp 740\u2013755. Springer","DOI":"10.1007\/978-3-319-10602-1_48"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01580-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-024-01580-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01580-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T18:19:16Z","timestamp":1732645156000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-024-01580-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,14]]},"references-count":56,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["1580"],"URL":"https:\/\/doi.org\/10.1007\/s40747-024-01580-3","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,14]]},"assertion":[{"value":"24 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}}]}}