{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T04:35:36Z","timestamp":1774067736918,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T00:00:00Z","timestamp":1750464000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T00:00:00Z","timestamp":1750464000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Data Sci Anal"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s41060-025-00850-8","type":"journal-article","created":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T04:38:23Z","timestamp":1750480703000},"page":"6157-6182","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A systematic review of machine learning approaches for detecting deceptive activities on social media: methods, challenges, and biases"],"prefix":"10.1007","volume":"20","author":[{"given":"Yunchong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xiaorui","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Yeyubei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhongyan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yexin","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Jianglai","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Yuchen","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,21]]},"reference":[{"key":"850_CR1","unstructured":"Aaron\u00a0Smith, M.A.: Social media use in 2018. https:\/\/www.pewresearch.org\/internet\/2018\/03\/01\/social-media-use-in-2018\/ (2018)"},{"issue":"6380","key":"850_CR2","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1126\/science.aap9559","volume":"359","author":"S Vosoughi","year":"2018","unstructured":"Vosoughi, S., Roy, D., Aral, S.: The spread of true and false news online. Science 359(6380), 1146\u20131151 (2018). https:\/\/doi.org\/10.1126\/science.aap9559","journal-title":"Science"},{"key":"850_CR3","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1257\/jep.31.2.211","volume":"31","author":"H Allcott","year":"2017","unstructured":"Allcott, H., Gentzkow, M.: Social media and fake news in the 2016 election. J. Econ. Perspect. 31, 211\u2013236 (2017). https:\/\/doi.org\/10.1257\/jep.31.2.211","journal-title":"J. Econ. Perspect."},{"issue":"10225","key":"850_CR4","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1016\/s0140-6736(20)30461-x","volume":"395","author":"J Zarocostas","year":"2020","unstructured":"Zarocostas, J.: How to fight an infodemic. Lancet 395(10225), 676 (2020). https:\/\/doi.org\/10.1016\/s0140-6736(20)30461-x","journal-title":"Lancet"},{"key":"850_CR5","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1057\/s41599-024-03409-3","volume":"11","author":"O Ulu\u015fan","year":"2024","unstructured":"Ulu\u015fan, O., \u00d6zejder, \u0130: Faking the war: fake posts on Turkish social media during the Russia\u2013Ukraine war. Humanit. Soc. Sci. Commun. 11, 891 (2024). https:\/\/doi.org\/10.1057\/s41599-024-03409-3","journal-title":"Humanit. Soc. Sci. Commun."},{"issue":"5","key":"850_CR6","doi-asserted-by":"publisher","first-page":"26933","DOI":"10.2196\/26933","volume":"23","author":"MK Himelein-Wachowiak","year":"2021","unstructured":"Himelein-Wachowiak, M.K., Giorgi, S., Devoto, A., Rahman, M., Ungar, L., Schwartz, H.A., Epstein, D.H., Leggio, L., Curtis, B.: Bots and misinformation spread on social media: implications for COVID-19. J. Med. Internet Res. 23(5), 26933 (2021). https:\/\/doi.org\/10.2196\/26933","journal-title":"J. Med. Internet Res."},{"issue":"1","key":"850_CR7","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/3137597.3137600","volume":"19","author":"K Shu","year":"2017","unstructured":"Shu, K., Sliva, A., Wang, S., Tang, J., Liu, H.: Fake news detection on social media: a data mining perspective. SIGKDD Explor. Newsl. 19(1), 22\u201336 (2017). https:\/\/doi.org\/10.1145\/3137597.3137600","journal-title":"SIGKDD Explor. Newsl."},{"key":"850_CR8","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/s43681-021-00068-x","volume":"1","author":"D Lauer","year":"2021","unstructured":"Lauer, D.: Facebook\u2019s ethical failures are not accidental; they are part of the business model. AI Ethics 1, 395\u2013403 (2021). https:\/\/doi.org\/10.1007\/s43681-021-00068-x","journal-title":"AI Ethics"},{"key":"850_CR9","doi-asserted-by":"publisher","first-page":"1094","DOI":"10.1126\/science.aao2998","volume":"359","author":"D Lazer","year":"2018","unstructured":"Lazer, D., Baum, M., Benkler, Y., Berinsky, A., Greenhill, K., Menczer, F., Metzger, M., Nyhan, B., Pennycook, G., Rothschild, D., Schudson, M., Sloman, S., Sunstein, C., Thorson, E., Watts, D., Zittrain, J.: The science of fake news. Science 359, 1094\u20131096 (2018). https:\/\/doi.org\/10.1126\/science.aao2998","journal-title":"Science"},{"issue":"5","key":"850_CR10","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1145\/3395046","volume":"53","author":"X Zhou","year":"2020","unstructured":"Zhou, X., Zafarani, R.: A survey of fake news: fundamental theories, detection methods, and opportunities. ACM Comput. Surv. 53(5), 109 (2020). https:\/\/doi.org\/10.1145\/3395046","journal-title":"ACM Comput. Surv."},{"key":"850_CR11","doi-asserted-by":"crossref","unstructured":"Conroy, N., Rubin, V., Chen, Y.: Automatic deception detection: methods for finding fake news. In: Proceedings of the Association for Information Science and Technology, pp. 1\u20134 (2015)","DOI":"10.1002\/pra2.2015.145052010082"},{"key":"850_CR12","unstructured":"Chen, Y., Zhao, C., Xu, Y., Nie, C.: Year-over-year developments in financial fraud detection via deep learning: a systematic literature review. arXiv:2502.00201 (2025)"},{"key":"850_CR13","doi-asserted-by":"publisher","unstructured":"Ruchansky, N., Seo, S., Liu, Y.: Csi: a hybrid deep model for fake news detection. In: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management (2017). https:\/\/doi.org\/10.1145\/3132847.3132877","DOI":"10.1145\/3132847.3132877"},{"key":"850_CR14","unstructured":"Liu, D., Waleffe, R., Jiang, M., Venkataraman, S.: GraphSnapShot: caching local structure for fast graph learning. arXiv:2406.17918 (2025)"},{"issue":"7","key":"850_CR15","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/2818717","volume":"59","author":"E Ferrara","year":"2016","unstructured":"Ferrara, E., Varol, O., Davis, C., Menczer, F., Flammini, A.: The rise of social bots. Commun. ACM 59(7), 96\u2013104 (2016). https:\/\/doi.org\/10.1145\/2818717","journal-title":"Commun. ACM"},{"key":"850_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2019.03.004","volume":"57","author":"X Zhang","year":"2020","unstructured":"Zhang, X., Ghorbani, A.: An overview of online fake news: characterization, detection, and discussion. Inf. Process. Manag. 57, 102025 (2020). https:\/\/doi.org\/10.1016\/j.ipm.2019.03.004","journal-title":"Inf. Process. Manag."},{"key":"850_CR17","unstructured":"Lu, Y., Sato, K., Wang, J.: Deep learning based multi-label image classification of protest activities. arXiv preprint arXiv:2301.04212 (2023)"},{"key":"850_CR18","doi-asserted-by":"crossref","unstructured":"Xu, K., Chen, L., Wang, S.: Data-driven kernel subspace clustering with local manifold preservation. In: 2022 IEEE International Conference on Data Mining Workshops (ICDMW), pp. 876\u2013884. IEEE (2022)","DOI":"10.1109\/ICDMW58026.2022.00116"},{"key":"850_CR19","doi-asserted-by":"publisher","unstructured":"Shu, K., Mahudeswaran, D., Wang, S., Liu, H.: Beyond news contents: the role of social context for fake news detection. In: Proceedings of the 12th ACM International Conference on Web Search and Data Mining (WSDM), pp. 312\u2013320 (2019). https:\/\/doi.org\/10.1145\/3289600.3290994","DOI":"10.1145\/3289600.3290994"},{"key":"850_CR20","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.bushor.2009.09.003","volume":"53","author":"A Kaplan","year":"2010","unstructured":"Kaplan, A., Haenlein, M.: Users of the world, unite! the challenges and opportunities of social media. Bus. Horiz. 53, 59\u201368 (2010). https:\/\/doi.org\/10.1016\/j.bushor.2009.09.003","journal-title":"Bus. Horiz."},{"key":"850_CR21","unstructured":"Liu, D., Pister, K.: LLMEasyQuant\u2013an easy to use toolkit for LLM quantization. arXiv:2406.19657 (2024)"},{"key":"850_CR22","doi-asserted-by":"publisher","unstructured":"Li, P., Yang, Q., Geng, X., Zhou, W., Ding, Z., Nian, Y.: Exploring diverse methods in visual question answering. In: 2024 5th International Conference on Electronic Communication and Artificial Intelligence (ICECAI), pp. 681\u2013685. IEEE (2024). https:\/\/doi.org\/10.1109\/icecai62591.2024.10674838","DOI":"10.1109\/icecai62591.2024.10674838"},{"key":"850_CR23","doi-asserted-by":"publisher","unstructured":"Gupta, A., Kumaraguru, P.: Credibility ranking of tweets during high impact events. In: Proceedings of the 1st Workshop on Privacy and Security in Online Social Media (2012). https:\/\/doi.org\/10.1145\/2185354.2185356","DOI":"10.1145\/2185354.2185356"},{"key":"850_CR24","doi-asserted-by":"crossref","unstructured":"Ding, Z., Wang, Z., Zhang, Y., Cao, Y., Liu, Y., Shen, X., Tian, Y., Dai, J.: Efficient or powerful? Trade-offs between machine learning and deep learning for mental illness detection on social media. arXiv:2503.01082 (2025)","DOI":"10.1038\/s41598-025-99167-6"},{"key":"850_CR25","doi-asserted-by":"crossref","unstructured":"Xu, K., Chen, L., Wang, S.: Towards robust nonlinear subspace clustering: a kernel learning approach. arXiv preprint arXiv:2501.06368 (2025)","DOI":"10.1109\/TAI.2025.3578585"},{"issue":"11","key":"850_CR26","first-page":"14","volume":"21","author":"A Bessi","year":"2016","unstructured":"Bessi, A., Ferrara, E.: Social bots distort the 2016 us presidential election online discussion. First Mon. 21(11), 14 (2016)","journal-title":"First Mon."},{"key":"850_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1007730.1007733","volume":"6","author":"N Chawla","year":"2004","unstructured":"Chawla, N., Japkowicz, N., Ko\u0142cz, A.: Editorial: special issue on learning from imbalanced data sets. SIGKDD Explor. 6, 1\u20136 (2004). https:\/\/doi.org\/10.1145\/1007730.1007733","journal-title":"SIGKDD Explor."},{"key":"850_CR28","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1109\/TKDE.2008.239","volume":"21","author":"H He","year":"2009","unstructured":"He, H., Garcia, E.A.: Learning from imbalanced data. IEEE Trans. Knowl. Data Eng. 21, 1263\u20131284 (2009). https:\/\/doi.org\/10.1109\/TKDE.2008.239","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"04","key":"850_CR29","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1142\/s0218001409007326","volume":"23","author":"Y Sun","year":"2009","unstructured":"Sun, Y., Wong, A.K.C., Kamel, M.S.: Classification of imbalanced data: a review. Int. J. Pattern Recognit. Artif. Intell. 23(04), 687\u2013719 (2009). https:\/\/doi.org\/10.1142\/s0218001409007326","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"issue":"1","key":"850_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.35566\/jbds\/caoyc","volume":"5","author":"Y Cao","year":"2025","unstructured":"Cao, Y., Dai, J., Wang, Z., Zhang, Y., Shen, X., Liu, Y., Tian, Y.: Machine learning approaches for depression detection on social media: a systematic review of biases and methodological challenges. J. Behav. Data Sci. 5(1), 1\u201336 (2025). https:\/\/doi.org\/10.35566\/jbds\/caoyc","journal-title":"J. Behav. Data Sci."},{"key":"850_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Wang, Z., Ding, Z., Tian, Y., Dai, J., Shen, X., Liu, Y., Cao, Y.: Tutorial on using machine learning and deep learning models for mental illness detection. arXiv:2502.04342 (2025)","DOI":"10.3390\/computation13080186"},{"key":"850_CR32","unstructured":"Bay, Y.Y., Yearick, K.A.: Machine learning vs deep learning: the generalization problem. arXiv:2403.01621 (2024)"},{"issue":"7","key":"850_CR33","doi-asserted-by":"publisher","first-page":"1000097","DOI":"10.1371\/journal.pmed.1000097","volume":"6","author":"Moher, D., Liberati, A., Tetzlaff, J., Altman, D.G., Group, T.P.","year":"2009","unstructured":"Moher, D., Liberati, A., Tetzlaff, J., Altman, D.G., Group, T.P.: Preferred reporting items for systematic reviews and meta-analyses: the Prisma statement. PLOS Med. 6(7), 1000097 (2009). https:\/\/doi.org\/10.1371\/journal.pmed.1000097","journal-title":"PLOS Med."},{"issue":"1","key":"850_CR34","doi-asserted-by":"publisher","first-page":"51","DOI":"10.7326\/M18-1376","volume":"170","author":"RF Wolff","year":"2019","unstructured":"Wolff, R.F., Moons, K.G.M., Riley, R.D., Whiting, P.F., Westwood, M., Collins, G.S., Reitsma, J.B., Kleijnen, J., Mallett, S.: Probast: a tool to assess the risk of bias and applicability of prediction model studies. Ann. Internal Med. 170(1), 51\u201358 (2019). https:\/\/doi.org\/10.7326\/M18-1376","journal-title":"Ann. Internal Med."},{"key":"850_CR35","volume-title":"Deep Learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press, Cambridge, MA (2016)"},{"issue":"8","key":"850_CR36","doi-asserted-by":"publisher","first-page":"1060","DOI":"10.1108\/IJSE-04-2022-0261","volume":"50","author":"J Singh","year":"2022","unstructured":"Singh, J., Singh, M.: Does financial inclusion impact socio-economic stability? A study of social safety net in Indian slums. Int. J. Soc. Econ. 50(8), 1060\u20131084 (2022)","journal-title":"Int. J. Soc. Econ."},{"issue":"1\u20132","key":"850_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/1500000011","volume":"2","author":"B Pang","year":"2008","unstructured":"Pang, B., Lee, L.: Opinion mining and sentiment analysis. Found. Trends Inf. Retr. 2(1\u20132), 1\u2013135 (2008). https:\/\/doi.org\/10.1561\/1500000011","journal-title":"Found. Trends Inf. Retr."},{"key":"850_CR38","unstructured":"Kaushik, D., Hovy, E., Lipton, Z.C.: Learning the difference that makes a difference with counterfactually-augmented data. In: International Conference on Learning Representations (ICLR) (2020)"},{"issue":"3","key":"850_CR39","doi-asserted-by":"publisher","first-page":"1434","DOI":"10.3390\/en16031434","volume":"16","author":"N Bacanin","year":"2023","unstructured":"Bacanin, N., Stoean, C., Zivkovic, M., Rakic, M., Strulak-W\u00f3jcikiewicz, R., Stoean, R.: On the benefits of using metaheuristics in the hyperparameter tuning of deep learning models for energy load forecasting. Energies 16(3), 1434 (2023). https:\/\/doi.org\/10.3390\/en16031434","journal-title":"Energies"},{"issue":"13","key":"850_CR40","doi-asserted-by":"publisher","first-page":"18797","DOI":"10.1007\/s11227-024-06186-7","volume":"80","author":"B Jlifi","year":"2024","unstructured":"Jlifi, B., Medini, M., Duvallet, C.: A guided genetic algorithm-based ensemble voting of polynomial regression and LSTM (GGA-PolReg-LSTM) for congestion prediction using IoT and air quality data in sustainable cities. J. Supercomput. 80(13), 18797\u201318837 (2024). https:\/\/doi.org\/10.1007\/s11227-024-06186-7","journal-title":"J. Supercomput."},{"key":"850_CR41","volume-title":"Hands-on Machine Learning with Scikit-Learn, Keras, and TensorFlow","author":"A G\u00e9ron","year":"2022","unstructured":"G\u00e9ron, A.: Hands-on Machine Learning with Scikit-Learn, Keras, and TensorFlow. O\u2019Reilly Media, Sebastopol, CA (2022)"},{"key":"850_CR42","unstructured":"Kohavi, R.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: Proceedings of the 14th International Joint Conference on Artificial Intelligence, pp. 1137\u20131143. Morgan Kaufmann, San Francisco, CA (1995)"},{"issue":"3","key":"850_CR43","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1145\/212094.212114","volume":"27","author":"T Dietterich","year":"1995","unstructured":"Dietterich, T.: Overfitting and undercomputing in machine learning. ACM Comput. Surv. (CSUR) 27(3), 326\u2013327 (1995)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"850_CR44","first-page":"76","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations","author":"IH Witten","year":"2002","unstructured":"Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations, vol. 31, pp. 76\u201377. ACM Sigmod Record, San Francisco, CA (2002)"},{"issue":"1","key":"850_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1021\/ci0342472","volume":"44","author":"DM Hawkins","year":"2004","unstructured":"Hawkins, D.M.: The problem of overfitting. J. Chem. Inf. Comput. Sci. 44(1), 1\u201312 (2004)","journal-title":"J. Chem. Inf. Comput. Sci."},{"issue":"1","key":"850_CR46","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929\u20131958 (2014)","journal-title":"J. Mach. Learn. Res."},{"key":"850_CR47","first-page":"2079","volume":"11","author":"GC Cawley","year":"2010","unstructured":"Cawley, G.C., Talbot, N.L.C.: On over-fitting in model selection and subsequent selection bias in performance evaluation. J. Mach. Learn. Res. 11, 2079\u20132107 (2010)","journal-title":"J. Mach. Learn. Res."},{"key":"850_CR48","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1186\/1471-2105-7-91","volume":"7","author":"S Varma","year":"2006","unstructured":"Varma, S., Simon, R.: Bias in error estimation when using cross-validation for model selection. BMC Bioinform. 7, 71 (2006). https:\/\/doi.org\/10.1186\/1471-2105-7-91","journal-title":"BMC Bioinform."},{"key":"850_CR49","volume-title":"Pattern Recognition and Machine Learning (Information Science and Statistics)","author":"CM Bishop","year":"2006","unstructured":"Bishop, C.M.: Pattern Recognition and Machine Learning (Information Science and Statistics). Springer, Berlin, Heidelberg (2006)"},{"issue":"1","key":"850_CR50","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s10844-022-00769-7","volume":"61","author":"B Jlifi","year":"2022","unstructured":"Jlifi, B., Sakrani, C., Duvallet, C.: Towards a soft three-level voting model (Soft T-LVM) for fake news detection. J. Intell. Inf. Syst. 61(1), 249\u2013269 (2022). https:\/\/doi.org\/10.1007\/s10844-022-00769-7","journal-title":"J. Intell. Inf. Syst."},{"key":"850_CR51","doi-asserted-by":"crossref","unstructured":"Al-Tashi, Q., Rais, H.M., Abdulkadir, S.J., Mirjalili, S., Alhussian, H.: A review of grey wolf optimizer-based feature selection methods for classification. In: Evolutionary Machine Learning Techniques: Algorithms and Applications, pp. 273\u2013286 (2020)","DOI":"10.1007\/978-981-32-9990-0_13"},{"issue":"Part C","key":"850_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2025.110185","volume":"123","author":"B Jlifi","year":"2025","unstructured":"Jlifi, B., Ferjani, S., Duvallet, C.: A genetic algorithm based three hyperparameter optimization of deep long short term memory (GA3P-DLSTM) for predicting electric vehicles energy consumption. Comput. Electr. Eng. 123(Part C), 110185 (2025). https:\/\/doi.org\/10.1016\/j.compeleceng.2025.110185","journal-title":"Comput. Electr. Eng."},{"key":"850_CR53","doi-asserted-by":"publisher","first-page":"8903","DOI":"10.1007\/s00521-023-08352-z","volume":"35","author":"K Hayawi","year":"2023","unstructured":"Hayawi, K., Saha, S., Masud, M.M.R., Mathew, S.S., Kaosar, M.: Social media bot detection with deep learning methods: a systematic review. Neural Comput. Appl. 35, 8903\u20138918 (2023). https:\/\/doi.org\/10.1007\/s00521-023-08352-z","journal-title":"Neural Comput. Appl."},{"issue":"1","key":"850_CR54","doi-asserted-by":"publisher","first-page":"14497","DOI":"10.1038\/s41598-025-14497-8","volume":"15","author":"Z Ding","year":"2025","unstructured":"Ding, Z., Wang, Z., Zhang, Y., Cao, Y., Liu, Y., Shen, X., Tian, Y., Dai, J.: Trade-offs between machine learning and deep learning for mental illness detection on social media. Sci. Rep. 15(1), 14497 (2025). https:\/\/doi.org\/10.1038\/s41598-025-14497-8","journal-title":"Sci. Rep."}],"container-title":["International Journal of Data Science and Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-025-00850-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41060-025-00850-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-025-00850-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T12:00:08Z","timestamp":1758974408000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41060-025-00850-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,21]]},"references-count":54,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["850"],"URL":"https:\/\/doi.org\/10.1007\/s41060-025-00850-8","relation":{},"ISSN":["2364-415X","2364-4168"],"issn-type":[{"value":"2364-415X","type":"print"},{"value":"2364-4168","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,21]]},"assertion":[{"value":"1 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All authors consent to the publication of this manuscript.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}