{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:19:04Z","timestamp":1759335544792},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,3,15]],"date-time":"2024-03-15T00:00:00Z","timestamp":1710460800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,15]],"date-time":"2024-03-15T00:00:00Z","timestamp":1710460800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"National Science Foundation","award":["2139034"],"award-info":[{"award-number":["2139034"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s41635-024-00146-6","type":"journal-article","created":{"date-parts":[[2024,3,15]],"date-time":"2024-03-15T04:50:56Z","timestamp":1710478256000},"page":"61-78","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Guarding Against the Unknown: Deep Transfer Learning for Hardware Image-Based Malware Detection"],"prefix":"10.1007","volume":"8","author":[{"given":"Zhangying","family":"He","sequence":"first","affiliation":[]},{"given":"Houman","family":"Homayoun","sequence":"additional","affiliation":[]},{"given":"Hossein","family":"Sayadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,15]]},"reference":[{"key":"146_CR1","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/SP.2019.00021","volume-title":"2019 IEEE Symposium on Security and Privacy (SP)","author":"S Das","year":"2019","unstructured":"Das S, Werner J, Antonakakis M, Polychronakis M, Monrose F (2019) Sok: The challenges, pitfalls, and perils of using hardware performance counters for security. In: 2019 IEEE Symposium on Security and Privacy (SP), pp 20\u201338. https:\/\/doi.org\/10.1109\/SP.2019.00021"},{"key":"146_CR2","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1145\/2485922.2485970","volume-title":"Proceedings of the 40th Annual International Symposium on Computer Architecture. ISCA \u201913","author":"J Demme","year":"2013","unstructured":"Demme J, Maycock M, Schmitz J, Tang A, Waksman A, Sethumadhavan S, Stolfo S (2013) On the feasibility of online malware detection with performance counters. In: Proceedings of the 40th Annual International Symposium on Computer Architecture. ISCA \u201913. Association for Computing Machinery, New York, pp 559\u2013570. https:\/\/doi.org\/10.1145\/2485922.2485970"},{"key":"146_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/DAC.2018.8465828","volume-title":"2018 55th ACM\/ESDA\/IEEE design automation conference (DAC)","author":"H Sayadi","year":"2018","unstructured":"Sayadi H, Patel N, Sai Manoj PD, Sasan A, Rafatirad S, Homayoun H (2018) Ensemble learning for effective run-time hardware-based malware detection: A comprehensive analysis and classification. In: 2018 55th ACM\/ESDA\/IEEE design automation conference (DAC), pp 1\u20136. https:\/\/doi.org\/10.1109\/DAC.2018.8465828"},{"key":"146_CR4","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-319-11379-1_6","volume-title":"Research in attacks, intrusions and defenses","author":"A Tang","year":"2014","unstructured":"Tang A, Sethumadhavan S, Stolfo SJ (2014) Unsupervised anomaly-based malware detection using hardware features. In: Stavrou A, Bos H, Portokalidis G (eds) Research in attacks, intrusions and defenses. Springer, Cham, pp 109\u2013129"},{"key":"146_CR5","doi-asserted-by":"publisher","DOI":"10.1145\/3526241.3530326","volume-title":"Proceedings of the great lakes symposium on VLSI 2022. GLSVLSI \u201922, pp. 27\u201332","author":"Z He","year":"2022","unstructured":"He Z, Rezaei A, Homayoun H, Sayadi H (2022) Deep neural network and transfer learning for accurate hardware-based zero-day malware detection. In: Proceedings of the great lakes symposium on VLSI 2022. GLSVLSI \u201922, pp 27\u201332. Association for Computing Machinery, New York. https:\/\/doi.org\/10.1145\/3526241.3530326"},{"key":"146_CR6","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1145\/3052973.3052999","volume-title":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. ASIA CCS \u201917","author":"B Singh","year":"2017","unstructured":"Singh B, Evtyushkin D, Elwell J, Riley R, Cervesato I (2017) On the detection of kernel-level rootkits using hardware performance counters. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. ASIA CCS \u201917. Association for Computing Machinery, New York, pp 483\u2013493. https:\/\/doi.org\/10.1145\/3052973.3052999"},{"key":"146_CR7","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1109\/HPCA.2015.7056070","volume-title":"2015 IEEE 21st international symposium on high performance computer architecture (HPCA)","author":"M Ozsoy","year":"2015","unstructured":"Ozsoy M, Donovick C, Gorelik I, AbuGhazaleh N, Ponomarev D (2015) Malware -aware processors: A framework for efficient online malware detection. In: 2015 IEEE 21st international symposium on high performance computer architecture (HPCA), pp 651\u2013661. https:\/\/doi.org\/10.1109\/HPCA.2015.7056070"},{"key":"146_CR8","doi-asserted-by":"publisher","first-page":"728","DOI":"10.23919\/DATE.2019.8715080","volume-title":"2019 design, automation test in europe conference exhibition (DATE)","author":"H Sayadi","year":"2019","unstructured":"Sayadi H, Makrani HM, Pudukotai Dinakarrao SM, Mohsenin T, Sasan A, Rafatirad S, Homayoun H (2019) 2smart: A two-stage machine learning-based approach for run-time specialized hardware-assisted malware detection. In: 2019 design, automation test in europe conference exhibition (DATE), pp 728\u2013733. https:\/\/doi.org\/10.23919\/DATE.2019.8715080"},{"key":"146_CR9","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1109\/TIFS.2019.2923577","volume":"15","author":"P Krishnamurthy","year":"2020","unstructured":"Krishnamurthy P, Karri R, Khorrami F (2020) Anomaly detection in real-time multithreaded processes using hardware performance counters. IEEE Trans Inf Forensics Secur 15:666\u2013680. https:\/\/doi.org\/10.1109\/TIFS.2019.2923577","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"146_CR10","doi-asserted-by":"publisher","unstructured":"Basu K, Krishnamurthy P, Khorrami F, Karri R (2020) A theoretical study of hardware performance counters-based malware detection. IEEE Trans Inf Forensics Secur 15(512\u2013525). https:\/\/doi.org\/10.1109\/TIFS.2019.2924549","DOI":"10.1109\/TIFS.2019.2924549"},{"key":"146_CR11","doi-asserted-by":"publisher","unstructured":"Sayadi H, Gao Y, Mohammadi Makrani H, Lin J, Costa PC, Rafatirad S, Homayoun H (2021) Towards accurate runtime hardware assisted stealthy malware detection: A lightweight, yet effective time series CNN-based approach. Cryptography 5(4). https:\/\/doi.org\/10.3390\/cryptography5040028","DOI":"10.3390\/cryptography5040028"},{"key":"146_CR12","first-page":"833","volume-title":"Proceedings of the 2012 ACM Conference on CCS. CCS \u201912","author":"L Bilge","year":"2012","unstructured":"Bilge L, Dumitras T (2012) Before we knew it: An empirical study of zero-day attacks in the real world. In: Proceedings of the 2012 ACM Conference on CCS. CCS \u201912. ACM, New York, pp 833\u2013844"},{"key":"146_CR13","doi-asserted-by":"publisher","first-page":"2022","DOI":"10.1109\/INFCOM.2013.6567003","volume-title":"2013 Proceedings IEEE INFO COM","author":"PM Comar","year":"2013","unstructured":"Comar PM, Liu L, Saha S, Tan P-N, Nucci A (2013) Combining supervised and unsupervised learning for zero-day malware detection. In: 2013 Proceedings IEEE INFO COM, pp 2022\u20132030. https:\/\/doi.org\/10.1109\/INFCOM.2013.6567003"},{"key":"146_CR14","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1109\/ISED.2016.7977076","volume-title":"2016 sixth international symposium on embedded computing and system design (ISED)","author":"E Gandotra","year":"2016","unstructured":"Gandotra E, Bansal D, Sofat S (2016) Zero-day malware detection. In: 2016 sixth international symposium on embedded computing and system design (ISED), pp 171\u2013175. https:\/\/doi.org\/10.1109\/ISED.2016.7977076"},{"key":"146_CR15","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1109\/ISVLSI49217.2020.00-15","volume-title":"2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","author":"AP Kuruvila","year":"2020","unstructured":"Kuruvila AP, Kundu S, Basu K (2020) Analyzing the efficiency of machine learning classifiers in hardware-based malware detectors. In: 2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp 452\u2013457. https:\/\/doi.org\/10.1109\/ISVLSI49217.2020.00-15"},{"key":"146_CR16","unstructured":"Perf tools support for Intel Processor Trace. https:\/\/perf.wiki.kernel.org\/index.php\/Perf_tools_support_for_Intel%C2%AE_Processor_Trace. Accessed 1 Feb 2024"},{"key":"146_CR17","unstructured":"Perf: Linux Profiling with Performance Counters (2017). https:\/\/perf.wiki.kernel.org\/index.php"},{"key":"146_CR18","first-page":"22","volume-title":"Proceedings of the 2004 workshop on computer architecture education: held in conjunction with the 31st international symposium on computer architecture","author":"VJ Reddi","year":"2004","unstructured":"Reddi VJ, Settle A, Connors DA, Cohn RS (2004) Pin: a binary instrumentation tool for computer architecture research and education. In: Proceedings of the 2004 workshop on computer architecture education: held in conjunction with the 31st international symposium on computer architecture, p 22"},{"key":"146_CR19","volume-title":"Proceedings of the department of defense HPCMP users group conference","author":"PJ Mucci","year":"1999","unstructured":"Mucci PJ, Browne S, Deane C, Ho G (1999) Papi: A portable interface to hardware performance counters. In: Proceedings of the department of defense HPCMP users group conference, vol 710"},{"key":"146_CR20","volume-title":"VTune Performance analyzer essentials: measurement and tuning techniques for software developers","author":"J Reinders","year":"2005","unstructured":"Reinders J (2005) VTune Performance analyzer essentials: measurement and tuning techniques for software developers. Intel Press, Engineer to Engineer Series"},{"key":"146_CR21","unstructured":"Performance monitoring events - intel. https:\/\/perfmon-events.intel.com\/. Accessed 1 May 2023"},{"key":"146_CR22","unstructured":"Dementieve R, Willhalm T, Bruggeman O, Fay P, Ungerer P, Ott A, Lu P, Harris J, Kerly P, Konsor P, Semin A, Kanaly M, Brazones R, Shah R, Dobkins J (2022) Intel\u00ae performance counter monitor - a better way to measure CPU utilization. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/intel-performance-counter-monitor.html. Accessed 1 May 2023"},{"key":"146_CR23","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1145\/3196494.3196515","volume-title":"Proceedings of the 2018 on Asia conference on computer and communications security. ASIACCS \u201918","author":"B Zhou","year":"2018","unstructured":"Zhou B, Gupta A, Jahanshahi R, Egele M, Joshi A (2018) Hardware performance counters can detect malware: Myth or fact? In: Proceedings of the 2018 on Asia conference on computer and communications security. ASIACCS \u201918. Association for Computing Machinery, New York, pp 457\u2013468. https:\/\/doi.org\/10.1145\/3196494.3196515"},{"key":"146_CR24","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/WWC.2001.990739","volume-title":"Proceedings of the fourth annual IEEE International Workshop on workload characterization. WWC-4 (Cat. No.01EX538)","author":"MR Guthaus","year":"2001","unstructured":"Guthaus MR, Ringenberg JS, Ernst D, Austin TM, Mudge T, Brown RB (2001) Mibench: A free, commercially representative embedded benchmark suite. In: Proceedings of the fourth annual IEEE International Workshop on workload characterization. WWC-4 (Cat. No.01EX538), pp 3\u201314. https:\/\/doi.org\/10.1109\/WWC.2001.990739"},{"issue":"4","key":"146_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1186736.1186737","volume":"34","author":"JL Henning","year":"2006","unstructured":"Henning JL (2006) Spec cpu2006 benchmark descriptions. SIGARCH Comput. Archit. News 34(4):1\u201317","journal-title":"SIGARCH Comput. Archit. News"},{"issue":"null","key":"146_CR26","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay E (2011) Scikit-learn: Machine learning in python. J Mach Learn Res 12(null):2825\u20132830","journal-title":"J Mach Learn Res"},{"key":"146_CR27","doi-asserted-by":"crossref","unstructured":"Kraskov A, St\u00f6gbauer H, Grassberger P (2003) Estimating mutual information. Physical review. E, Statistical, nonlinear and soft matter physics 69 6 Pt 2:066138","DOI":"10.1103\/PhysRevE.69.066138"},{"key":"146_CR28","unstructured":"Pandas: User Guide. https:\/\/pandas.pydata.org\/docs\/index.html. Accessed 1 May 2023"},{"key":"146_CR29","doi-asserted-by":"publisher","first-page":"56","DOI":"10.25080\/Majora-92bf1922-00a","volume-title":"Proceedings of the 9th python in science conference","author":"McKinney","year":"2010","unstructured":"McKinney (2010) Data structures for statistical computing in python. In: Walt M (ed) Proceedings of the 9th python in science conference, pp 56\u201361. https:\/\/doi.org\/10.25080\/Majora-92bf1922-00a"},{"key":"146_CR30","volume-title":"Malware detection by eating a whole EXE","author":"E Raff","year":"2017","unstructured":"Raff E, Barker J, Sylvester J, Brandon R, Catanzaro B, Nicholas C (2017) Malware detection by eating a whole EXE"},{"key":"146_CR31","first-page":"1","volume-title":"2019 International Conference on Compliers, Architectures and Synthesis for Embedded Systems (CASES)","author":"S Shukla","year":"2019","unstructured":"Shukla S, Kolhe G, Sai Manoj P, Rafatirad S (2019) Work-in-progress: Microarchitectural events and image processing-based hybrid approach for robust malware detection. In: 2019 International Conference on Compliers, Architectures and Synthesis for Embedded Systems (CASES), pp 1\u20132"},{"issue":"2","key":"146_CR32","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1007\/s00500-019-03940-5","volume":"24","author":"A Pekta\u015f","year":"2020","unstructured":"Pekta\u015f A, Acarman T (2020) Deep learning for effective android malware detection using API call graph embeddings. Soft Comput 24(2):1027\u20131043. https:\/\/doi.org\/10.1007\/s00500-019-03940-5","journal-title":"Soft Comput"},{"key":"146_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107703","volume":"98","author":"AG Kakisim","year":"2022","unstructured":"Kakisim AG, Gulmez S, Sogukpinar I (2022) Sequential opcode embedding-based malware detection method. Comput Electr Eng 98:107703. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107703","journal-title":"Comput Electr Eng"},{"key":"146_CR34","doi-asserted-by":"publisher","first-page":"2656","DOI":"10.1109\/CVPR.2019.00277","volume-title":"2019 IEEE\/CVF conference on computer vision and pattern recognition (CVPR)","author":"S Kornblith","year":"2019","unstructured":"Kornblith S, Shlens J, Le QV (2019) Do better ImageNet models transfer better? In: 2019 IEEE\/CVF conference on computer vision and pattern recognition (CVPR), pp 2656\u20132666. https:\/\/doi.org\/10.1109\/CVPR.2019.00277"},{"key":"146_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TNNLS.2022.3229161","volume":"21","author":"V Borisov","year":"2022","unstructured":"Borisov V, Leemann T, Se\u00dfler K, Haug J, Pawelczyk M, Kasneci G (2022) Deep neural networks and tabular data: A survey. IEEE Trans Neural Netw Learn Syst 21:1. https:\/\/doi.org\/10.1109\/TNNLS.2022.3229161","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"C","key":"146_CR36","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.inffus.2021.11.011","volume":"81","author":"R Shwartz-Ziv","year":"2022","unstructured":"Shwartz-Ziv R, Armon A (2022) Tabular data: Deep learning is not all you need. Inf Fusion 81(C):84\u201390. https:\/\/doi.org\/10.1016\/j.inffus.2021.11.011","journal-title":"Inf Fusion"},{"key":"146_CR37","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-030-01424-7_27","volume-title":"Artificial neural networks and machine learning \u2013 ICANN 2018","author":"C Tan","year":"2018","unstructured":"Tan C, Sun F, Kong T, Zhang W, Yang C, Liu C (2018) A survey on deep transfer learning. In: Kurkova V, Manolopoulos Y, Hammer B, Iliadis L, Maglogiannis I (eds) Artificial neural networks and machine learning \u2013 ICANN 2018. Springer, Cham, pp 270\u2013279"},{"key":"146_CR38","doi-asserted-by":"publisher","first-page":"2973","DOI":"10.1109\/CVPRW.2019.00360","volume-title":"2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","author":"B Sun","year":"2019","unstructured":"Sun B, Yang L, Zhang W, Lin M, Dong P, Young C, Dong J (2019) Supertml: Two-dimensional word embedding for the precognition on structured tabular data. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp 2973\u20132981. https:\/\/doi.org\/10.1109\/CVPRW.2019.00360"},{"key":"146_CR39","unstructured":"Bradski G (2000) The OpenCV Library. Dr. Dobb\u2019s Journal of Software Tools"},{"key":"146_CR40","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1109\/CVPR.2016.90","volume-title":"2016 IEEE conference on computer vision and pattern recognition (CVPR)","author":"K He","year":"2016","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: 2016 IEEE conference on computer vision and pattern recognition (CVPR), pp 770\u2013778. https:\/\/doi.org\/10.1109\/CVPR.2016.90"},{"key":"146_CR41","unstructured":"Howard J et al (2021) fastai. GitHub. https:\/\/github.com\/fastai\/fastai. Accessed 10 Oct 2023"},{"key":"146_CR42","unstructured":"Yosinski J, Clune J, Bengio Y, Lipson H (2014) How transferable are features in deep neural networks? In: Proceedings of the 27th international conference on neural information processing systems - Volume 2. NIPS\u201914, MIT Press, Cambridge, pp 3320\u20133328"},{"key":"146_CR43","doi-asserted-by":"publisher","first-page":"101501","DOI":"10.1103\/PhysRevD.97.101501","volume":"97","author":"D George","year":"2018","unstructured":"George D, Shen H, Huerta EA (2018) Classification and unsupervised clustering of LIGO data with deep transfer learning. Phys Rev D 97:101501. https:\/\/doi.org\/10.1103\/PhysRevD.97.101501","journal-title":"Phys Rev D"},{"key":"146_CR44","volume-title":"A disciplined approach to neural network hyper-parameters: Part 1 \u2013 learning rate, batch size, momentum, and weight decay","author":"LN Smith","year":"2018","unstructured":"Smith LN (2018) A disciplined approach to neural network hyper-parameters: Part 1 \u2013 learning rate, batch size, momentum, and weight decay"},{"key":"146_CR45","doi-asserted-by":"publisher","unstructured":"Wang E, Davis JJ, Moro D, Zielinski P, Lim JJ, Coelho C, Chatterjee S, Cheung PYK, Constantinides GA (2023) Enabling binary neural network training on the edge. ACM Trans Embed Comput Syst 22(6). https:\/\/doi.org\/10.1145\/3626100","DOI":"10.1145\/3626100"},{"issue":"86","key":"146_CR46","first-page":"2579","volume":"9","author":"L Maaten","year":"2008","unstructured":"Maaten L, Hinton G (2008) Visualizing data using t-sne. J Mach Learn Res 9(86):2579\u20132605","journal-title":"J Mach Learn Res"},{"key":"146_CR47","unstructured":"Tran D, Liu JZ, Dusenberry MW, Phan D, Collier M, Ren JJ, Han K, Wang Z, Mariet ZE, Hu H, Band N, Rudner TGJ, Singhal K, Nado Z, Amersfoort JR, Kirsch A, Jenatton R, Thain N, Yuan H et al (2022) Plex: Towards reliability using pretrained large model extensions. ArXiv abs\/2207.07411"},{"key":"146_CR48","first-page":"7167","volume-title":"Proceedings of the 32nd international conference on neural information processing systems. NIPS\u201918","author":"K Lee","year":"2018","unstructured":"Lee K, Lee K, Lee H, Shin J (2018) A simple unified framework for detecting out-of-distribution samples and adversarial attacks. In: Proceedings of the 32nd international conference on neural information processing systems. NIPS\u201918. Curran Associates Inc, Red Hook, pp 7167\u20137177"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-024-00146-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41635-024-00146-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-024-00146-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T09:24:41Z","timestamp":1726910681000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41635-024-00146-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,15]]},"references-count":48,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["146"],"URL":"https:\/\/doi.org\/10.1007\/s41635-024-00146-6","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"type":"print","value":"2509-3428"},{"type":"electronic","value":"2509-3436"}],"subject":[],"published":{"date-parts":[[2024,3,15]]},"assertion":[{"value":"11 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 February 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 March 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This work is supported by the National Science Foundation under Award No. 2139034.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Funding"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"All authors contributed to the study conception and design. He and Sayadi prepared the main manuscript and performed the method, experimental setup, and analysis. Sayadi carried out the supervision of the work. All authors reviewed and revised the method and manuscript.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Author Contribution"}},{"value":"Available upon request.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Data Availability"}},{"value":"Not applicable.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}]}}