{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:14:05Z","timestamp":1772043245553,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T00:00:00Z","timestamp":1750118400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T00:00:00Z","timestamp":1750118400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program","doi-asserted-by":"crossref","award":["2018YFA0704703"],"award-info":[{"award-number":["2018YFA0704703"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972073"],"award-info":[{"award-number":["61972073"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972215"],"award-info":[{"award-number":["61972215"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172238"],"award-info":[{"award-number":["62172238"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006606","name":"Natural Science Foundation of Tianjin","doi-asserted-by":"crossref","award":["20JCZDJC00640"],"award-info":[{"award-number":["20JCZDJC00640"]}],"id":[{"id":"10.13039\/501100006606","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Key Specialized Research and Development Program of Henan Province","award":["252102210172"],"award-info":[{"award-number":["252102210172"]}]},{"name":"Key Specialized Research and Development Program of Henan Province","award":["252102210245"],"award-info":[{"award-number":["252102210245"]}]},{"name":"Basic Higher Educational Key Scientific Research Program of Henan Province","award":["22A413004"],"award-info":[{"award-number":["22A413004"]}]},{"name":"High Level Talent International Training Program of Henan Province","award":["GCC2025010"],"award-info":[{"award-number":["GCC2025010"]}]},{"name":"Innovation Training Program for College Students of Henan province","award":["202410475024"],"award-info":[{"award-number":["202410475024"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s40747-025-01968-9","type":"journal-article","created":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T04:33:36Z","timestamp":1750134816000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cryptographic hardness assumptions identification based on discrete wavelet transform"],"prefix":"10.1007","volume":"11","author":[{"given":"Ke","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Yu","family":"Du","sequence":"additional","affiliation":[]},{"given":"Yizheng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Rongjin","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Bowen","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Gaojuan","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Chunfu","family":"Jia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,17]]},"reference":[{"key":"1968_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121514","volume":"237","author":"H Wen","year":"2024","unstructured":"Wen H, Lin Y (2024) Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Syst Appl 237:121514. https:\/\/doi.org\/10.1016\/j.eswa.2023.121514","journal-title":"Expert Syst Appl"},{"key":"1968_CR2","doi-asserted-by":"publisher","first-page":"1131","DOI":"10.1007\/s40747-023-01212-2","volume":"10","author":"K Yuan","year":"2024","unstructured":"Yuan K, Huang Y, Du Z et al (2024) A multi-layer composite identification scheme of cryptographic algorithm based on hybrid random forest and logistic regression model. Complex Intell. Syst 10:1131\u20131147. https:\/\/doi.org\/10.1007\/s40747-023-01212-2","journal-title":"Complex Intell. Syst"},{"key":"1968_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101159","volume":"26","author":"A Aldosary","year":"2024","unstructured":"Aldosary A, Tanveer M (2024) PAAF-SHS: PUF and authenticated encryption based authentication framework for the IoT-enabled smart healthcare system. Internet Things 26:101159. https:\/\/doi.org\/10.1016\/j.iot.2024.101159","journal-title":"Internet Things"},{"issue":"9","key":"1968_CR4","doi-asserted-by":"publisher","first-page":"14025","DOI":"10.1109\/TITS.2021.3131668","volume":"23","author":"K-A Shim","year":"2022","unstructured":"Shim K-A (2022) A survey on post-quantum public-key signature schemes for secure vehicular communications. IEEE Trans Intell Transp Syst 23(9):14025\u201314042. https:\/\/doi.org\/10.1109\/TITS.2021.3131668","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"7","key":"1968_CR5","doi-asserted-by":"publisher","first-page":"95","DOI":"10.31449\/inf.v46i7.4279","volume":"46","author":"LA Muhalhal","year":"2022","unstructured":"Muhalhal LA, Alshawi IS (2022) Improved Salsa20 stream cipher diffusion based on random chaotic maps. Informatica (Slovenia) 46(7):95\u2013102. https:\/\/doi.org\/10.31449\/inf.v46i7.4279","journal-title":"Informatica (Slovenia)"},{"issue":"229","key":"1968_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.48550\/arXiv.2110.05861","volume":"22","author":"V Biscione","year":"2021","unstructured":"Biscione V, Bowers JS (2021) Convolutional neural networks are not invariant to translation, but they can learn to be. J Mach Learn Res 22(229):1\u201328. https:\/\/doi.org\/10.48550\/arXiv.2110.05861","journal-title":"J Mach Learn Res"},{"key":"1968_CR7","doi-asserted-by":"publisher","unstructured":"Anderson C, Vandenberg B, Hauser C, et al (2024) Semantic coherence dynamics in large language models through layered syntax-aware memory retention mechanism. Authorea. https:\/\/doi.org\/10.22541\/au.173016320.04754825\/v1","DOI":"10.22541\/au.173016320.04754825\/v1"},{"key":"1968_CR8","doi-asserted-by":"publisher","unstructured":"Dileep AD, Sekhar CC (2006) Identification of block ciphers using support vector machines. In: 2006 IEEE International Joint Conference on Neural Network Proceedings, Vancouver, BC, Canada, pp. 2696\u20132701. https:\/\/doi.org\/10.1109\/IJCNN.2006.247172","DOI":"10.1109\/IJCNN.2006.247172"},{"key":"1968_CR9","doi-asserted-by":"publisher","unstructured":"Sharif SO, Kuncheva LI, Mansoor SP (2010) Classifying encryption algorithms using pattern recognition techniques. In: 2010 IEEE International Conference on Information Theory and Information Security, Beijing, China, pp. 1168\u20131172. https:\/\/doi.org\/10.1109\/ICITIS.2010.5689769","DOI":"10.1109\/ICITIS.2010.5689769"},{"key":"1968_CR10","doi-asserted-by":"publisher","unstructured":"Wu Y, Wang T, Xing M, Li J-D (2015) Block ciphers identification scheme based on the distribution character of randomness test values of ciphertext. J Commun 36. https:\/\/doi.org\/10.11959\/j.issn.1000-436x.2015107","DOI":"10.11959\/j.issn.1000-436x.2015107"},{"issue":"2","key":"1968_CR11","doi-asserted-by":"publisher","first-page":"177","DOI":"10.13868\/j.cnki.jcr.000293","volume":"6","author":"ZC Zhao","year":"2019","unstructured":"Zhao ZC, Zhao YQ, Liu FM (2019) Scheme of block ciphers recognition based on randomness test. J Cryptol Res 6(2):177\u2013190. https:\/\/doi.org\/10.13868\/j.cnki.jcr.000293","journal-title":"J Cryptol Res"},{"key":"1968_CR12","doi-asserted-by":"publisher","first-page":"8875864","DOI":"10.1155\/2020\/8875864","volume":"2020","author":"W Zhang","year":"2020","unstructured":"Zhang W, Zhao Y, Fan S (2020) Cryptosystem identification scheme based on ASCII code statistics. Secur Commun Netw 2020:8875864. https:\/\/doi.org\/10.1155\/2020\/8875864","journal-title":"Secur Commun Netw"},{"issue":"4","key":"1968_CR13","doi-asserted-by":"publisher","first-page":"472","DOI":"10.3969\/j.issn.1671-0673.2024.04.016","volume":"25","author":"JT Zhang","year":"2024","unstructured":"Zhang JT, Li XY, Gu CX (2024) A block cipher identification scheme based on entropy source verification. J Inf Eng Univ 25(4):472\u2013477. https:\/\/doi.org\/10.3969\/j.issn.1671-0673.2024.04.016","journal-title":"J Inf Eng Univ"},{"key":"1968_CR14","doi-asserted-by":"publisher","unstructured":"Chou J-W, Lin S-D, Cheng C-M (2012) On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 105\u2013110. https:\/\/doi.org\/10.1145\/2381896.2381912","DOI":"10.1145\/2381896.2381912"},{"issue":"4","key":"1968_CR15","doi-asserted-by":"publisher","first-page":"42","DOI":"10.13140\/2.1.4498.1768","volume":"2","author":"SO Sharif","year":"2011","unstructured":"Sharif SO, Mansoor SP (2011) Performance evaluation of classifiers used for identification of encryption algorithms. ACEEE Int J Netw Secur 2(4):42\u201345. https:\/\/doi.org\/10.13140\/2.1.4498.1768","journal-title":"ACEEE Int J Netw Secur"},{"key":"1968_CR16","doi-asserted-by":"publisher","unstructured":"Hu X, Zhao Y (2018) One to one identification of cryptosystem using fisher\u2019s discriminant analysis. In: Proceedings of the 6th ACM\/ACIS International Conference on Applied Computing and Information Technology, pp. 7\u201312. https:\/\/doi.org\/10.1145\/3265007.3265009","DOI":"10.1145\/3265007.3265009"},{"key":"1968_CR17","doi-asserted-by":"publisher","first-page":"3185","DOI":"10.1007\/s11063-022-11005-2","volume":"55","author":"K Yuan","year":"2023","unstructured":"Yuan K, Huang Y, Li J et al (2023) A block cipher algorithm identification scheme based on hybrid random forest and logistic regression model. Neural Process Lett 55:3185\u20133203. https:\/\/doi.org\/10.1007\/s11063-022-11005-2","journal-title":"Neural Process Lett"},{"key":"1968_CR18","doi-asserted-by":"publisher","first-page":"21364","DOI":"10.1109\/ACCESS.2023.3249753","volume":"11","author":"L Zhao","year":"2023","unstructured":"Zhao L, Chi Y, Xu Z, Yue Z (2023) Block cipher identification scheme based on hamming weight distribution. IEEE Access 11:21364\u201321373. https:\/\/doi.org\/10.1109\/ACCESS.2023.3249753","journal-title":"IEEE Access"},{"key":"1968_CR19","doi-asserted-by":"publisher","first-page":"3228","DOI":"10.1109\/ACCESS.2022.3140342","volume":"10","author":"E Ahmadzadeh","year":"2022","unstructured":"Ahmadzadeh E, Kim H, Jeong O, Kim N, Moon I (2022) A deep bidirectional LSTM-GRU network model for automated ciphertext classification. IEEE Access 10:3228\u20133237. https:\/\/doi.org\/10.1109\/ACCESS.2022.3140342","journal-title":"IEEE Access"},{"issue":"6","key":"1968_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.irbm.2024.100860","volume":"45","author":"D Ling","year":"2024","unstructured":"Ling D, Jiang T, Sun J, Wang Y, Wang Y, Wang L (2024) An ensemble learning system based on stacking strategy for survival risk prediction of patients with esophageal cancer. IRBM 45(6):100860. https:\/\/doi.org\/10.1016\/j.irbm.2024.100860","journal-title":"IRBM"},{"key":"1968_CR21","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1515\/comp-2019-0018","volume":"9","author":"G Arome","year":"2019","unstructured":"Arome G, Boniface A, Adebayo A, Olumide A, Oluwafemi S (2019) Post-quantum crystography system for secure electronic voting. Open Comput Sci 9:292\u2013298. https:\/\/doi.org\/10.1515\/comp-2019-0018","journal-title":"Open Comput Sci"},{"key":"1968_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72536-9_6","volume-title":"Cybercryptography: applicable cryptography for cyberspace security","author":"S Yan","year":"2019","unstructured":"Yan S (2019) Cybercryptography: applicable cryptography for cyberspace security. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-72536-9_6"},{"key":"1968_CR23","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1080\/09720529.2017.1390845","volume":"21","author":"MK Chande","year":"2018","unstructured":"Chande MK, Lee CC, Li CT (2018) Cryptanalysis and improvement of a ECDLP based proxy blind signature scheme. J Discret Math Sci Cryptogr 21:23\u201334. https:\/\/doi.org\/10.1080\/09720529.2017.1390845","journal-title":"J Discret Math Sci Cryptogr"},{"key":"1968_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107832","volume":"131","author":"X Song","year":"2024","unstructured":"Song X, Wu C, Song S, Stojanovic V, Tejado I (2024) Fuzzy wavelet neural adaptive finite-time self-triggered fault-tolerant control for a quadrotor unmanned aerial vehicle with scheduled performance. Eng Appl Artif Intell 131:107832. https:\/\/doi.org\/10.1016\/j.engappai.2023.107832","journal-title":"Eng Appl Artif Intell"},{"issue":"B","key":"1968_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.109402","volume":"138","author":"Y Sun","year":"2024","unstructured":"Sun Y, Tao H, Stojanovic V (2024) Autoregressive data generation method based on wavelet packet transform and cascaded stochastic quantization for bearing fault diagnosis under unbalanced samples. Eng Appl Artif Intell 138(B):109402. https:\/\/doi.org\/10.1016\/j.engappai.2024.109402","journal-title":"Eng Appl Artif Intell"},{"key":"1968_CR26","doi-asserted-by":"publisher","first-page":"1323","DOI":"10.1007\/s11760-012-0362-9","volume":"8","author":"Y Kumar","year":"2014","unstructured":"Kumar Y, Dewal ML, Anand RS (2014) Epileptic seizures detection in EEG using DWT-based ApEn and artificial neural network. SIViP 8:1323\u20131334. https:\/\/doi.org\/10.1007\/s11760-012-0362-9","journal-title":"SIViP"},{"key":"1968_CR27","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s40745-021-00344-x","volume":"10","author":"A Kurani","year":"2023","unstructured":"Kurani A, Doshi P, Vakharia A et al (2023) A comprehensive comparative study of artificial neural network (ANN) and support vector machines (SVM) on stock forecasting. Ann Data Sci 10:183\u2013208. https:\/\/doi.org\/10.1007\/s40745-021-00344-x","journal-title":"Ann Data Sci"},{"key":"1968_CR28","doi-asserted-by":"publisher","first-page":"1937","DOI":"10.1007\/s10462-020-09896-5","volume":"54","author":"C Bent\u00e9jac","year":"2021","unstructured":"Bent\u00e9jac C, Csrg\u00f6rg\u0151 A, Martnez-Mu\u00f1oz G (2021) A comparative analysis of gradient boosting algorithms. Artif Intell Rev 54:1937\u20131967. https:\/\/doi.org\/10.1007\/s10462-020-09896-5","journal-title":"Artif Intell Rev"},{"key":"1968_CR29","doi-asserted-by":"publisher","unstructured":"Costa VG, Pedreira CE (2023) Recent advances in decision trees: an updated survey. Artif Intell Rev 56:4765\u20134800. https:\/\/doi.org\/10.1007\/s10462-022-10275-5","DOI":"10.1007\/s10462-022-10275-5"},{"key":"1968_CR30","doi-asserted-by":"publisher","unstructured":"Liru C (2021) Research on recognition of cryptographic algorithms based on deep learning. PhD thesis, University of Electronic Science and Technology. https:\/\/doi.org\/10.27005\/d.cnki.gdzku.2021.004921","DOI":"10.27005\/d.cnki.gdzku.2021.004921"},{"key":"1968_CR31","doi-asserted-by":"publisher","unstructured":"Pudjihartono N, Fadason T, Kempa-Liehr AW, O\u2019Sullivan JM (2022) A review of feature selection methods for machine learning-based disease risk prediction. Front Bioinform 2:927312. https:\/\/doi.org\/10.3389\/fbinf.2022.927312","DOI":"10.3389\/fbinf.2022.927312"},{"issue":"3","key":"1968_CR32","doi-asserted-by":"publisher","first-page":"240","DOI":"10.3390\/min15030240","volume":"15","author":"S Peng","year":"2025","unstructured":"Peng S, Feng C, Qiu Z, Zhang Q, Liu W, Feng J, Hu Z (2025) Prediction of lithofacies in heterogeneous shale reservoirs based on a robust stacking machine learning model. Minerals 15(3):240. https:\/\/doi.org\/10.3390\/min15030240","journal-title":"Minerals"},{"key":"1968_CR33","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/3-540-48910-X_17","volume":"1592","author":"D Pointcheval","year":"1999","unstructured":"Pointcheval D (1999) New public key cryptosystems based on the dependent-RSA problems. Lect Notes Comput Sci 1592:239\u2013254. https:\/\/doi.org\/10.1007\/3-540-48910-X_17","journal-title":"Lect Notes Comput Sci"},{"key":"1968_CR34","doi-asserted-by":"publisher","unstructured":"Nguyen MT, Nguyen B (2014) Some hybrid crypto systems constructed on discrete logarithm problem. In: Proceedings of the 2014 International Conference on Advanced Technologies for Communications (ATC), Hanoi, Vietnam, pp. 232\u2013234. https:\/\/doi.org\/10.1109\/ATC.2014.7043389","DOI":"10.1109\/ATC.2014.7043389"},{"key":"1968_CR35","doi-asserted-by":"publisher","unstructured":"Kumar A, Kakarla J, Hussain M (2020) Asymmetric key cryptosystem and digital signature algorithm built on discrete logarithm problem (DLP). In: Intelligent Systems Design and Applications (ISDA 2018), Vellore, India, pp. 401\u2013410. https:\/\/doi.org\/10.1007\/978-3-030-16657-1_37","DOI":"10.1007\/978-3-030-16657-1_37"},{"key":"1968_CR36","doi-asserted-by":"publisher","unstructured":"Ajeena RKK, Yaqoob SJ (2017) The integer sub-decomposition method to improve the elliptic ElGamal digital signature algorithm. In: 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT), Sulaymaniyah, Iraq, pp. 14\u201320. https:\/\/doi.org\/10.1109\/CRCSIT.2017.7965554","DOI":"10.1109\/CRCSIT.2017.7965554"},{"key":"1968_CR37","doi-asserted-by":"publisher","unstructured":"Zhang Q, Li Z, Song C (2011) The improvement of digital signature algorithm based on elliptic curve cryptography. In: 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), Dengleng, China, pp. 1689\u20131691. https:\/\/doi.org\/10.1109\/AIMSEC.2011.6010590","DOI":"10.1109\/AIMSEC.2011.6010590"},{"issue":"1","key":"1968_CR38","doi-asserted-by":"publisher","first-page":"143","DOI":"10.19363\/J.cnki.cn10-1380\/tn.2025.01.11","volume":"10","author":"RQ Xia","year":"2025","unstructured":"Xia RQ, Li MM, Chen SZ (2025) Identification and analysis of cryptography algorithms based on machine learning. J Cyber Secur 10(1):143\u2013159. https:\/\/doi.org\/10.19363\/J.cnki.cn10-1380\/tn.2025.01.11","journal-title":"J Cyber Secur"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-01968-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-025-01968-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-01968-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,17]],"date-time":"2025-07-17T19:04:09Z","timestamp":1752779049000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-025-01968-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":38,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["1968"],"URL":"https:\/\/doi.org\/10.1007\/s40747-025-01968-9","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"4 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare the following financial interests\/personal relationships which may be considered as potential Conflict of interest. Chunfu Jia reports financial support was provided by the National Key Research and Development Program, National Natural Science Foundation of China, and Natural Science Foundation of Tianjin. Ke Yuan and Gaojuan Fan report financial support was provided by Key Specialized Research and Development Program of Henan Province. Ke Yuan also reports financial support was provided by Basic Higher Educational Key Scientific Research Program of Henan Province. Rongjin Feng reports financial support was provided by Innovation Training Program for College Students of Henan Province. If there are other authors, they declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"341"}}