{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T04:23:59Z","timestamp":1774239839837,"version":"3.50.1"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T00:00:00Z","timestamp":1752019200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T00:00:00Z","timestamp":1752019200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100008868","name":"Jiangsu Provincial Department of Science and Technology","doi-asserted-by":"publisher","award":["ZL042401"],"award-info":[{"award-number":["ZL042401"]}],"id":[{"id":"10.13039\/501100008868","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s40747-025-02006-4","type":"journal-article","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:20:22Z","timestamp":1752139222000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["BDEKD: mitigating backdoor attacks in NLP models via ensemble knowledge distillation"],"prefix":"10.1007","volume":"11","author":[{"given":"Zijie","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5730-9330","authenticated-orcid":false,"given":"Xinyuan","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Chenyu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Chenming","family":"Shang","sequence":"additional","affiliation":[]},{"given":"Xi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xianglong","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,9]]},"reference":[{"key":"2006_CR1","unstructured":"Gu T, Dolan-Gavitt B, Garg S (2017) Badnets: identifying vulnerabilities in the machine learning model supply chain. arXiv:1708.06733"},{"key":"2006_CR2","doi-asserted-by":"crossref","unstructured":"Liu Y, Ma S, Aafer Y, Lee W-C, Zhai J, Wang W, Zhang X (2018) Trojaning attack on neural networks. In: Network and distributed system security symposium","DOI":"10.14722\/ndss.2018.23291"},{"key":"2006_CR3","doi-asserted-by":"publisher","first-page":"138872","DOI":"10.1109\/ACCESS.2019.2941376","volume":"7","author":"J Dai","year":"2019","unstructured":"Dai J, Chen C, Li Y (2019) A backdoor attack against LSTM-based text classification systems. IEEE Access 7:138872\u2013138878","journal-title":"IEEE Access"},{"key":"2006_CR4","doi-asserted-by":"crossref","unstructured":"Chen X, Salem A, Chen D, Backes M, Ma S, Shen Q, Wu Z, Zhang Y (2020) BadNL: backdoor attacks against NLP models with semantic-preserving improvements. In: Proceedings of the 37th Annual Computer Security Applications Conference","DOI":"10.1145\/3485832.3485837"},{"key":"2006_CR5","doi-asserted-by":"crossref","unstructured":"Garg S, Kumar A, Goel V, Liang Y (2020) Can adversarial weight perturbations inject neural backdoors. In: Proceedings of the 29th ACM international conference on information & knowledge management","DOI":"10.1145\/3340531.3412130"},{"key":"2006_CR6","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9:1735\u20131780","journal-title":"Neural Comput"},{"key":"2006_CR7","unstructured":"Devlin J, Chang M-W, Lee K, Toutanova K (2019) Bert: pre-training of deep bidirectional transformers for language understanding. In: North American chapter of the Association for Computational Linguistics"},{"key":"2006_CR8","doi-asserted-by":"crossref","unstructured":"Li L, Song D, Li X, Zeng J, Ma R, Qiu X (2021) Backdoor attacks on pre-trained models by layerwise weight poisoning. arXiv preprint arXiv:2108.13888","DOI":"10.18653\/v1\/2021.emnlp-main.241"},{"key":"2006_CR9","unstructured":"Villarreal-Vasquez M, Bhargava B (2020) Confoc: content-focus protection against trojan attacks on neural networks. arXiv preprint arXiv:2007.00711"},{"key":"2006_CR10","doi-asserted-by":"crossref","unstructured":"Zhu M, Wei S, Shen L, Fan Y, Wu B (2023) Enhancing fine-tuning based backdoor defense with sharpness-aware minimization. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 4466\u20134477","DOI":"10.1109\/ICCV51070.2023.00412"},{"key":"2006_CR11","doi-asserted-by":"crossref","unstructured":"Liu K, Dolan-Gavitt B, Garg S (2018) Fine-pruning: defending against backdooring attacks on deep neural networks. arXiv:1805.12185","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"2006_CR12","doi-asserted-by":"crossref","unstructured":"Yan Z, Li S, Zhao R, Tian Y, Zhao Y (2023) Dhbe: data-free holistic backdoor erasing in deep neural networks via restricted adversarial distillation. In: Proceedings of the 2023 ACM Asia conference on computer and communications security, pp 731\u2013745","DOI":"10.1145\/3579856.3582822"},{"key":"2006_CR13","unstructured":"Li Y, Lyu X, Koren N, Lyu L, Li B, Ma X (2021) Neural attention distillation: erasing backdoor triggers from deep neural networks. arXiv preprint arXiv:2101.05930"},{"key":"2006_CR14","doi-asserted-by":"crossref","unstructured":"Le\u00a0Roux Q, Bourbao E, Teglia Y, Kallas K (2024) A comprehensive survey on backdoor attacks and their defenses in face recognition systems. IEEE Access","DOI":"10.1109\/ACCESS.2024.3382584"},{"key":"2006_CR15","first-page":"103","volume":"16","author":"L Xiaojuan","year":"2023","unstructured":"Xiaojuan L, Mudassir K, Dilshad Mohd A (2023) Design and development of a data structure visualisation system using the ant colony algorithm. Recent Adv Electr Electron Eng 16:103\u2013109","journal-title":"Recent Adv Electr Electron Eng"},{"key":"2006_CR16","first-page":"670","volume":"37","author":"A Kiran","year":"2025","unstructured":"Kiran A, Bashier A, Elseed G, Khan M, Babu JC, Santosh Kumar BP (2025) An efficient method for privacy protection in big data analytics using oppositional fruit fly algorithm. Indones J Electr Eng Comput Sci 37:670\u2013679","journal-title":"Indones J Electr Eng Comput Sci"},{"key":"2006_CR17","unstructured":"Ram\u00e9 A, Cord M (2021) Dice: diversity in deep ensembles via conditional redundancy adversarial estimation. arXiv:2101.05544"},{"key":"2006_CR18","doi-asserted-by":"crossref","unstructured":"Agarwal C, Nguyen A, Schonfeld D (2019) Improving robustness to adversarial examples by encouraging discriminative features. In: 2019 IEEE international conference on image processing (ICIP), pp 3801\u20133505","DOI":"10.1109\/ICIP.2019.8803601"},{"key":"2006_CR19","unstructured":"Pang T, Xu K, Du C, Chen N, Zhu J (2019) Improving adversarial robustness via promoting ensemble diversity"},{"key":"2006_CR20","volume-title":"Artificial intelligence and machine learning for smart community","author":"TV Ramana","year":"2024","unstructured":"Ramana TV, Ghantasala GS, Sathiyaraj R, Khan M (2024) Artificial intelligence and machine learning for smart community. CRC\/Taylor and Francis Group, London"},{"key":"2006_CR21","doi-asserted-by":"publisher","first-page":"123776","DOI":"10.1016\/j.eswa.2024.123776","volume":"249","author":"H Nie","year":"2024","unstructured":"Nie H, Lu S (2024) Fedcrmw: federated model ownership verification with compression-resistant model watermarking. Expert Syst Appl 249:123776","journal-title":"Expert Syst Appl"},{"key":"2006_CR22","doi-asserted-by":"publisher","first-page":"126576","DOI":"10.1016\/j.neucom.2023.126576","volume":"554","author":"F Craighero","year":"2021","unstructured":"Craighero F, Angaroni F, Stella F, Damiani C, Antoniotti M, Graudenzi A (2021) Unity is strength: improving the detection of adversarial examples with ensemble approaches. Neurocomputing 554:126576","journal-title":"Neurocomputing"},{"key":"2006_CR23","doi-asserted-by":"publisher","first-page":"3362","DOI":"10.1109\/TAI.2024.3351116","volume":"5","author":"H Nie","year":"2024","unstructured":"Nie H, Lu S, Wu J, Zhu J (2024) Deep model intellectual property protection with compression-resistant model watermarking. IEEE Trans Artif Intell 5:3362\u20133373","journal-title":"IEEE Trans Artif Intell"},{"key":"2006_CR24","doi-asserted-by":"publisher","first-page":"111675","DOI":"10.1016\/j.knosys.2024.111675","volume":"293","author":"H Nie","year":"2024","unstructured":"Nie H, Lu S (2024) Persistverify: federated model ownership verification with spatial attention and boundary sampling. Knowl. Based Syst. 293:111675","journal-title":"Knowl. Based Syst."},{"key":"2006_CR25","doi-asserted-by":"publisher","first-page":"6858","DOI":"10.1109\/TNNLS.2024.3388424","volume":"36","author":"Z Wang","year":"2024","unstructured":"Wang Z, Yu D, Shen S, Zhang S, Liu H, Yao S, Guo M (2024) Select your own counterparts: Self-supervised graph contrastive learning with positive sampling. IEEE Trans Neural Netw Learn Syst 36:6858\u20136872","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"2006_CR26","doi-asserted-by":"publisher","first-page":"112616","DOI":"10.1016\/j.asoc.2024.112616","volume":"169","author":"W Yu","year":"2025","unstructured":"Yu W, Fu J, Zhao Y, Shi H, Chen X, Shen S, Gao X-Z (2025) Link prediction in bipartite networks via deep autoencoder-like nonnegative matrix factorization. Appl Soft Comput 169:112616","journal-title":"Appl Soft Comput"},{"key":"2006_CR27","doi-asserted-by":"crossref","unstructured":"Kurita K, Michel P, Neubig G (2020) Weight poisoning attacks on pretrained models. ArXiv, arXiv:2004.06660","DOI":"10.18653\/v1\/2020.acl-main.249"},{"key":"2006_CR28","doi-asserted-by":"crossref","unstructured":"Qi F, Li M, Chen Y, Zhang Z, Liu Z, Wang Y, Sun M (2021) Hidden killer: invisible textual backdoor attacks with syntactic trigger. In: Annual meeting of the Association for computational linguistics","DOI":"10.18653\/v1\/2021.acl-long.37"},{"key":"2006_CR29","doi-asserted-by":"crossref","unstructured":"Qi F, Chen Y,Zhang X, Li M, Liu Z, Sun M (2021) Mind the style of text! Adversarial and backdoor attacks based on text style transfer. arXiv:2110.07139","DOI":"10.18653\/v1\/2021.emnlp-main.374"},{"key":"2006_CR30","doi-asserted-by":"crossref","unstructured":"Yang W, Lin Y, Li P, Zhou J, Sun X (2021) Rethinking stealthiness of backdoor attack against NLP models. In: Annual meeting of the Association for Computational Linguistics","DOI":"10.18653\/v1\/2021.acl-long.431"},{"key":"2006_CR31","unstructured":"Huang X, Alzantot MF, Srivastava MB (2019) Neuroninspect: detecting backdoors in neural networks via output explanations. arXiv:1911.07399"},{"key":"2006_CR32","doi-asserted-by":"crossref","unstructured":"Wang B, Yao Y, Shan S, Li H, Viswanath B, Zheng H, Zhao BY (2019) Neural cleanse: identifying and mitigating backdoor attacks in neural networks. In: 2019 IEEE Symposium on Security and Privacy (SP), pp 707\u2013723","DOI":"10.1109\/SP.2019.00031"},{"key":"2006_CR33","unstructured":"Du M, Jia R, Song DX (2019) Robust anomaly detection and backdoor attack detection via differential privacy. arXiv:1911.07116"},{"key":"2006_CR34","doi-asserted-by":"publisher","first-page":"10455","DOI":"10.1007\/s10489-024-05746-x","volume":"54","author":"H Nie","year":"2024","unstructured":"Nie H, Lu S (2024) Securing IP in edge AI: neural network watermarking for multimodal models. Appl Intell 54:10455\u201310472","journal-title":"Appl Intell"},{"key":"2006_CR35","doi-asserted-by":"crossref","unstructured":"Chen C, Dai J (2020) Mitigating backdoor attacks in lstm-based text classification systems by backdoor keyword identification. arXiv:2007.12070","DOI":"10.1016\/j.neucom.2021.04.105"},{"key":"2006_CR36","doi-asserted-by":"crossref","unstructured":"Qi F, Chen Y, Li M, Liu Z, Sun M (2020) Onion: A simple and effective defense against textual backdoor attacks. arXiv:2011.10369","DOI":"10.18653\/v1\/2021.emnlp-main.752"},{"key":"2006_CR37","doi-asserted-by":"crossref","unstructured":"Le T, Park N, Lee D (2020) A sweet rabbit hole by Darcy: using honeypots to detect universal trigger\u2019s adversarial attacks. In: Annual meeting of the Association for Computational Linguistics","DOI":"10.18653\/v1\/2021.acl-long.296"},{"key":"2006_CR38","doi-asserted-by":"crossref","unstructured":"Gao Y, Xu C, Wang D, Chen S, Ranasinghe DC, Nepal S (2019) Strip: a defence against trojan attacks on deep neural networks. In: Proceedings of the 35th Annual Computer Security Applications Conference","DOI":"10.1145\/3359789.3359790"},{"key":"2006_CR39","doi-asserted-by":"crossref","unstructured":"Yang W, Lin Y, Li P, Zhou J, Sun X (2021) Rap: robustness-aware perturbations for defending against backdoor attacks on NLP models. In: Conference on empirical methods in natural language processing","DOI":"10.18653\/v1\/2021.emnlp-main.659"},{"key":"2006_CR40","doi-asserted-by":"crossref","unstructured":"Nie H, Lu S, Wang M, Xiao J, Lu Z, Yi Z (2024) Verichroma: ownership verification for federated models via RGB filters. In: European conference on parallel processing","DOI":"10.1007\/978-3-031-69766-1_23"},{"key":"2006_CR41","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/s11633-022-1377-5","volume":"20","author":"Z Zhang","year":"2021","unstructured":"Zhang Z, Xiao G, Li Y, Lv T, Qi F, Wang Y, Jiang X, Liu Z, Sun M (2021) Red alarm for pre-trained models: universal vulnerability to neuron-level backdoor attacks. Mach Intell Res 20:180\u2013193","journal-title":"Mach Intell Res"},{"key":"2006_CR42","unstructured":"Li Y, Koren N, Lyu L, Lyu X, Li B, Ma X (2021) Neural attention distillation: erasing backdoor triggers from deep neural networks. arXiv:2101.05930"},{"key":"2006_CR43","doi-asserted-by":"crossref","unstructured":"Bucila C, Caruana R, Niculescu-Mizil A (2006) Model compression. In: Knowledge discovery and data mining","DOI":"10.1145\/1150402.1150464"},{"key":"2006_CR44","unstructured":"Hinton GE, Vinyals O, Dean J (2015) Distilling the knowledge in a neural network. arXiv:1503.02531"},{"key":"2006_CR45","unstructured":"Tang R, Lu Y, Liu L, Mou L, Vechtomova O, Lin JJ (2019) Distilling task-specific knowledge from BERT into simple neural networks. arXiv:1903.12136"},{"key":"2006_CR46","doi-asserted-by":"crossref","unstructured":"Sun S, Cheng Y, Gan Z, Liu J (2019) Patient knowledge distillation for BERT model compression. In: Conference on empirical methods in natural language processing","DOI":"10.18653\/v1\/D19-1441"},{"key":"2006_CR47","unstructured":"Sanh V, Debut L, Chaumond J, Wolf T (2019) DistilBERT, a distilled version of BERT: Smaller, faster, cheaper and lighter. arxiv 2019. arXiv preprint arXiv:1910.01108"},{"key":"2006_CR48","doi-asserted-by":"crossref","unstructured":"Jiao X, Yin Y,Shang L, Jiang X, Chen X, Li L, Wang F, Liu Q (2019) Tinybert: distilling BERT for natural language understanding. arXiv preprint arXiv:1909.10351","DOI":"10.18653\/v1\/2020.findings-emnlp.372"},{"key":"2006_CR49","unstructured":"Zagoruyko S, Komodakis N (2016) Paying more attention to attention: improving the performance of convolutional neural networks via attention transfer. arXiv:1612.03928"},{"key":"2006_CR50","unstructured":"Kim J, Park S, Kwak N (2018) Paraphrasing complex network: network compression via factor transfer. arXiv:1802.04977"},{"key":"2006_CR51","doi-asserted-by":"crossref","unstructured":"Papernot N, Mcdaniel P, Wu X, Jha S, Swami A (2015) Distillation as a defense to adversarial perturbations against deep neural networks. In: 2016 IEEE Symposium on Security and Privacy (SP), pp 582\u2013597","DOI":"10.1109\/SP.2016.41"},{"key":"2006_CR52","unstructured":"Bagherinezhad H, Horton M, Rastegari M, Farhadi A (2018) Label refinery: improving imagenet classification through label progression. arXiv:1805.02641"},{"key":"2006_CR53","unstructured":"Chen D, Mei J-P, Wang C, Feng Y, Chen C (2019) Online knowledge distillation with diverse peers. arXiv:1912.00350"},{"key":"2006_CR54","unstructured":"Lan X, Zhu X, Gong S (2018) Knowledge distillation by on-the-fly native ensemble. arXiv:1806.04606"},{"key":"2006_CR55","doi-asserted-by":"crossref","unstructured":"Guo Q, Wang X, Wu Y, Yu Z, Liang D, Hu X, Luo P (2020) Online knowledge distillation via collaborative learning. In: 2020 IEEE\/CVF conference on computer vision and pattern recognition (CVPR), pp 11017\u201311026","DOI":"10.1109\/CVPR42600.2020.01103"},{"key":"2006_CR56","unstructured":"Ge Y, Choi CL, Zhang X, Zhao P, Zhu F, Zhao, Li H (2021) Self-distillation with batch knowledge ensembling improves imagenet classification. arXiv:2104.13298"},{"key":"2006_CR57","doi-asserted-by":"crossref","unstructured":"Svete A, Cotterell R (2024) Transformers can represent n-gram language models. arXiv:2404.14994","DOI":"10.18653\/v1\/2024.emnlp-main.550"},{"key":"2006_CR58","unstructured":"Pagliardini M, Jaggi M, Fleuret F, Karimireddy SP (2022) Agree to disagree: diversity through disagreement for better transferability. arXiv:2202.04414"},{"key":"2006_CR59","unstructured":"Wu B, Chen H, Zhang M, Zhu Z, Wei S, Yuan D, Shen C, Zha H (2022) Backdoorbench: a comprehensive benchmark of backdoor learning. arXiv:2206.12654"},{"key":"2006_CR60","doi-asserted-by":"crossref","unstructured":"Bai H, Wu J, King I, Lyu MR (2019) Few shot network compression via cross distillation. arXiv:1911.09450","DOI":"10.1609\/aaai.v34i04.5718"},{"key":"2006_CR61","doi-asserted-by":"crossref","unstructured":"Wei J, Zou K (2019) EDA: easy data augmentation techniques for boosting performance on text classification tasks. In: Conference on empirical methods in natural language processing","DOI":"10.18653\/v1\/D19-1670"},{"key":"2006_CR62","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/219717.219748","volume":"38","author":"GA Miller","year":"1995","unstructured":"Miller GA (1995) Wordnet: a lexical database for English. Commun ACM 38:39\u201341","journal-title":"Commun ACM"},{"key":"2006_CR63","doi-asserted-by":"crossref","unstructured":"Socher R, Perelygin A, Wu J, Chuang J, Manning CD, Ng A, Potts C (2013) Recursive deep models for semantic compositionality over a sentiment treebank. In: Conference on empirical methods in natural language processing","DOI":"10.18653\/v1\/D13-1170"},{"key":"2006_CR64","doi-asserted-by":"crossref","unstructured":"de\u00a0Gibert O, P\u00e9rez N, Garc\u00eda-Pablos A, Cuadros M (2018) Hate speech dataset from a white supremacy forum. arXiv:1809.04444","DOI":"10.18653\/v1\/W18-5102"},{"key":"2006_CR65","doi-asserted-by":"crossref","unstructured":"Zampieri M, Malmasi S, Nakov P, Rosenthal S, Farra N, Kumar R (2019) Predicting the type and target of offensive posts in social media. In: North American Chapter of the Association for Computational Linguistics","DOI":"10.18653\/v1\/N19-1144"},{"key":"2006_CR66","unstructured":"Zhang X, Zhao JJ, LeCun Y (2015) Character-level convolutional networks for text classification. In: Neural information processing systems"},{"key":"2006_CR67","doi-asserted-by":"crossref","unstructured":"Ribeiro MT, Singh S, Guestrin C (2016) \u201cWhy should i trust you?\u201d: Explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","DOI":"10.1145\/2939672.2939778"},{"key":"2006_CR68","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s10710-017-9314-z","volume":"19","author":"J Heaton","year":"2018","unstructured":"Heaton J (2018) Ian goodfellow, yoshua bengio, and aaron courville: deep learning\u2014the mit press, 2016, 800 pp, isbn: 0262035618. Genet Program Evol Mach 19:305\u2013307","journal-title":"Genet Program Evol Mach"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-02006-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-025-02006-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-02006-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T01:41:30Z","timestamp":1757209290000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-025-02006-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,9]]},"references-count":68,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2006"],"URL":"https:\/\/doi.org\/10.1007\/s40747-025-02006-4","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,9]]},"assertion":[{"value":"28 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"378"}}