{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T14:30:07Z","timestamp":1762785007526,"version":"build-2065373602"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T00:00:00Z","timestamp":1762732800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T00:00:00Z","timestamp":1762732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["2020.04714.BD"],"award-info":[{"award-number":["2020.04714.BD"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Rep"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The widespread availability of wireless networking, such as Wi-Fi, has led to the pervasiveness of always connected mobile devices. These devices are provided with several sensors that allow the collection of large amounts of data, which pose a threat to personal privacy. It is well known that Wi-Fi connectivity information (e.g. BSSID) can be used for inferring user locations. This has caused the imposition of limitations to the access to such data in mobile devices. However, other sources of information about wireless connectivity are available, such as the Received Signal Strength Indicator (RSSI). In this work, we show that RSSI can be used to infer the presence of a user at common locations throughout time. This information can be correlated with other features, such as the hour of the day, to further learn semantic context about such locations with a prediction performance above 90%. Our analysis shows the privacy implications of inferring user locations through Wi-Fi RSSI, but also emphasizes the fingerprinting risk that results from the lack of protection when accessing RSSI measurements.<\/jats:p>","DOI":"10.1038\/s41598-025-22799-1","type":"journal-article","created":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T14:27:28Z","timestamp":1762784848000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Compromising location privacy through Wi-Fi RSSI tracking"],"prefix":"10.1038","volume":"15","author":[{"given":"Mariana","family":"Cunha","sequence":"first","affiliation":[]},{"given":"Ricardo","family":"Mendes","sequence":"additional","affiliation":[]},{"given":"Yves-Alexandre","family":"de Montjoye","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o P.","family":"Vilela","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,10]]},"reference":[{"key":"22799_CR1","doi-asserted-by":"publisher","DOI":"10.1145\/3510579","author":"P Delgado-Santos","year":"2022","unstructured":"Delgado-Santos, P. et al. A survey of privacy vulnerabilities of mobile device sensors. ACM Comput. Surv. https:\/\/doi.org\/10.1145\/3510579 (2022).","journal-title":"ACM Comput. Surv."},{"key":"22799_CR2","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/SURV.2009.090103","volume":"11","author":"Y Gu","year":"2009","unstructured":"Gu, Y., Lo, A. & Niemegeers, I. A survey of indoor positioning systems for wireless personal networks. IEEE Commun. Surv. Tutor. 11, 13\u201332 (2009).","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"22799_CR3","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1109\/COMST.2015.2464084","volume":"18","author":"S He","year":"2015","unstructured":"He, S. & Chan, S.-H.G. Wi-fi fingerprint-based indoor positioning: Recent advances and comparisons. IEEE Commun. Surv. Tutor. 18, 466\u2013490 (2015).","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"22799_CR4","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/s11277-021-08209-5","volume":"119","author":"H Obeidat","year":"2021","unstructured":"Obeidat, H., Shuaieb, W., Obeidat, O. & Abd-Alhameed, R. A review of indoor localization techniques and wireless technologies. Wirel. Pers. Commun. 119, 289\u2013327 (2021).","journal-title":"Wirel. Pers. Commun."},{"key":"22799_CR5","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1049\/cmu2.12386","volume":"16","author":"S Shang","year":"2022","unstructured":"Shang, S. & Wang, L. Overview of wifi fingerprinting-based indoor positioning. IET Commun. 16, 725\u2013733 (2022).","journal-title":"IET Commun."},{"key":"22799_CR6","doi-asserted-by":"publisher","first-page":"3335","DOI":"10.1109\/JIOT.2018.2882610","volume":"6","author":"MN Aman","year":"2018","unstructured":"Aman, M. N., Basheer, M. H. & Sikdar, B. Two-factor authentication for iot with location information. IEEE Internet Things J. 6, 3335\u20133351 (2018).","journal-title":"IEEE Internet Things J."},{"key":"22799_CR7","doi-asserted-by":"publisher","unstructured":"Shi, C., Liu, J., Liu, H. & Chen, Y. Smart user authentication through actuation of daily activities leveraging wifi-enabled iot. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Mobihoc \u201917, 1\u201310. https:\/\/doi.org\/10.1145\/3084041.3084061 (ACM, 2017).","DOI":"10.1145\/3084041.3084061"},{"key":"22799_CR8","doi-asserted-by":"publisher","unstructured":"Shakiba-Herfeh, M., Chorti, A. & Vincent Poor, H. Physical layer security: Authentication, integrity, and confidentiality. In Physical Layer Security (ed. Le, K.\u00a0N.) 129\u2013150. https:\/\/doi.org\/10.1007\/978-3-030-55366-1_6 (Springer International Publishing, 2021).","DOI":"10.1007\/978-3-030-55366-1_6"},{"key":"22799_CR9","doi-asserted-by":"crossref","unstructured":"Zeng, Y., Pathak, P.\u00a0H. & Mohapatra, P. Wiwho: Wifi-based person identification in smart spaces. In 2016 15th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN), 1\u201312 (IEEE, 2016).","DOI":"10.1109\/IPSN.2016.7460727"},{"key":"22799_CR10","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1109\/TNET.2018.2886411","volume":"27","author":"L Cheng","year":"2019","unstructured":"Cheng, L. & Wang, J. Walls have no ears: A non-intrusive wifi-based user identification system for mobile devices. IEEE\/ACM Trans. Netw. 27, 245\u2013257 (2019).","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"22799_CR11","doi-asserted-by":"crossref","unstructured":"Dharmadasa, I., Weerasekara, M., Keppitiyagama, C.\u00a0I. & Gamage, C. RSSI based Device-free Human Identification. Int. J. Adv. ICT Emerg. Reg. 16 (2023).","DOI":"10.4038\/icter.v16i1.7244"},{"key":"22799_CR12","doi-asserted-by":"publisher","first-page":"1629","DOI":"10.1109\/COMST.2019.2934489","volume":"22","author":"J Liu","year":"2019","unstructured":"Liu, J., Liu, H., Chen, Y., Wang, Y. & Wang, C. Wireless sensing for human activity: A survey. IEEE Commun. Surv. Tutor. 22, 1629\u20131645 (2019).","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"22799_CR13","doi-asserted-by":"crossref","unstructured":"Thammachote, P. et al. Contactless monitoring of human behaviors in bed using rssi signals. Med. Biol. Eng. Comput. 1\u201319 (2023).","DOI":"10.1007\/s11517-023-02847-6"},{"key":"22799_CR14","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7313","volume":"35","author":"F Qi","year":"2022","unstructured":"Qi, F. et al. Unauthorized and privacy-intrusive human activity watching through wi-fi signals: An emerging cybersecurity threat. Concurr. Comput. Pract. Exp. 35, e7313 (2022).","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"22799_CR15","doi-asserted-by":"crossref","unstructured":"Farshad, A., Li, J., Marina, M.\u00a0K. & Garcia, F.\u00a0J. A microscopic look at wifi fingerprinting for indoor mobile phone localization in diverse environments. In International Conference on Indoor Positioning and Indoor Navigation, 1\u201310 (IEEE, 2013).","DOI":"10.1109\/IPIN.2013.6817920"},{"key":"22799_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3432699","volume":"4","author":"B Baron","year":"2020","unstructured":"Baron, B. & Musolesi, M. Where you go matters: a study on the privacy implications of continuous location tracking. Proc. ACM Interact. Mob. Wear. Ubiq. Technol. 4, 1\u201332 (2020).","journal-title":"Proc. ACM Interact. Mob. Wear. Ubiq. Technol."},{"key":"22799_CR17","doi-asserted-by":"publisher","first-page":"17832","DOI":"10.1109\/JIOT.2022.3164569","volume":"9","author":"S Tan","year":"2022","unstructured":"Tan, S., Ren, Y., Yang, J. & Chen, Y. Commodity wifi sensing in ten years: Status, challenges, and opportunities. IEEE Internet Things J. 9, 17832\u201317843. https:\/\/doi.org\/10.1109\/JIOT.2022.3164569 (2022).","journal-title":"IEEE Internet Things J."},{"key":"22799_CR18","doi-asserted-by":"publisher","unstructured":"Sigg, S., Shi, S., Buesching, F., Ji, Y. & Wolf, L. Leveraging RF-channel fluctuation for activity recognition: active and passive systems, continuous and RSSI-based signal features. In Proceedings of International Conference on Advances in Mobile Computing & Multimedia, MoMM \u201913, 43\u201352, https:\/\/doi.org\/10.1145\/2536853.2536873 (ACM, 2013).","DOI":"10.1145\/2536853.2536873"},{"key":"22799_CR19","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1109\/JIOT.2015.2511805","volume":"3","author":"Y Gu","year":"2015","unstructured":"Gu, Y., Ren, F. & Li, J. Paws: Passive human activity recognition based on wifi ambient signals. IEEE Internet Things J. 3, 796\u2013805 (2015).","journal-title":"IEEE Internet Things J."},{"key":"22799_CR20","doi-asserted-by":"publisher","unstructured":"Wang, W., Liu, A.\u00a0X., Shahzad, M., Ling, K. & Lu, S. Understanding and modeling of wifi signal based human activity recognition. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, MobiCom \u201915, 65\u201376. https:\/\/doi.org\/10.1145\/2789168.2790093 (ACM, 2015).","DOI":"10.1145\/2789168.2790093"},{"key":"22799_CR21","doi-asserted-by":"publisher","first-page":"2071","DOI":"10.1109\/JIOT.2018.2822818","volume":"5","author":"J Liu","year":"2018","unstructured":"Liu, J. et al. Monitoring vital signs and postures during sleep using wifi signals. IEEE Internet Things J. 5, 2071\u20132084 (2018).","journal-title":"IEEE Internet Things J."},{"key":"22799_CR22","doi-asserted-by":"crossref","unstructured":"Tan, S., Zhang, L. & Yang, J. Sensing fruit ripeness using wireless signals. In 2018 27th International Conference on Computer Communication and Networks (ICCCN), 1\u20139 (IEEE, 2018).","DOI":"10.1109\/ICCCN.2018.8487344"},{"key":"22799_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3380996","volume":"4","author":"Y Ren","year":"2020","unstructured":"Ren, Y. et al. Liquid level sensing using commodity wifi in a smart home environment. Proc. ACM Interact. Mob. Wear. Ubiq. Technol. 4, 1\u201330 (2020).","journal-title":"Proc. ACM Interact. Mob. Wear. Ubiq. Technol."},{"key":"22799_CR24","doi-asserted-by":"publisher","unstructured":"Li, C. et al. Wi-Fi See It All: Generative adversarial network-augmented versatile Wi-Fi imaging. In Proceedings of the 18th Conference on Embedded Networked Sensor Systems, SenSys \u201920, 436\u2013448. https:\/\/doi.org\/10.1145\/3384419.3430725 (ACM, 2020).","DOI":"10.1145\/3384419.3430725"},{"key":"22799_CR25","doi-asserted-by":"publisher","first-page":"1347","DOI":"10.1109\/COMST.2016.2637663","volume":"19","author":"P Davidson","year":"2016","unstructured":"Davidson, P. & Pich\u00e9, R. A survey of selected indoor positioning methods for smartphones. IEEE Commun. Surv. Tutor. 19, 1347\u20131370 (2016).","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"22799_CR26","doi-asserted-by":"publisher","first-page":"4507","DOI":"10.3390\/s19204507","volume":"19","author":"GM Mendoza-Silva","year":"2019","unstructured":"Mendoza-Silva, G. M., Torres-Sospedra, J. & Huerta, J. A meta-review of indoor positioning systems. Sensors 19, 4507 (2019).","journal-title":"Sensors"},{"key":"22799_CR27","doi-asserted-by":"publisher","first-page":"1372","DOI":"10.1049\/iet-com.2019.1059","volume":"14","author":"F Liu","year":"2020","unstructured":"Liu, F. et al. Survey on wifi-based indoor positioning techniques. IET Commun. 14, 1372\u20131383 (2020).","journal-title":"IET Commun."},{"key":"22799_CR28","doi-asserted-by":"publisher","first-page":"127150","DOI":"10.1109\/ACCESS.2021.3111083","volume":"9","author":"N Singh","year":"2021","unstructured":"Singh, N., Choe, S. & Punmiya, R. Machine learning based indoor localization using Wi-Fi RSSI fingerprints: An overview. IEEE Access 9, 127150\u2013127174 (2021).","journal-title":"IEEE Access"},{"key":"22799_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, J., Wei, B., Hu, W. & Kanhere, S.\u00a0S. Wifi-id: Human identification using wifi signal. In 2016 International Conference on Distributed Computing in Sensor Systems (DCOSS), 75\u201382 (IEEE, 2016).","DOI":"10.1109\/DCOSS.2016.30"},{"key":"22799_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2543581.2543592","volume":"46","author":"Z Yang","year":"2013","unstructured":"Yang, Z., Zhou, Z. & Liu, Y. From RSSI to CSI: Indoor localization via channel response. ACM Comput. Surv. CSUR 46, 1\u201332 (2013).","journal-title":"ACM Comput. Surv. CSUR"},{"key":"22799_CR31","unstructured":"Sonny, A., Kumar, A. & Cenkeramaddi, L.\u00a0R. A survey of application of machine learning in wireless indoor positioning systems. arXiv preprint arXiv:2403.04333 (2024)."},{"key":"22799_CR32","doi-asserted-by":"crossref","unstructured":"Mendes, R., Brand\u00e3o, A., Vilela, J.\u00a0P. & Beresford, A.\u00a0R. Effect of user expectation on mobile app privacy: a field study. In 2022 IEEE International Conference on Pervasive Computing and Communications (PerCom), 207\u2013214 (IEEE, 2022).","DOI":"10.1109\/PerCom53586.2022.9762379"},{"key":"22799_CR33","doi-asserted-by":"crossref","unstructured":"Mendes, R., Cunha, M., Vilela, J.\u00a0P. & Beresford, A.\u00a0R. Enhancing user privacy in mobile devices through prediction of privacy preferences. In 27th European Symposium on Research in Computer Security, 153\u2013172 (Springer, 2022).","DOI":"10.1007\/978-3-031-17140-6_8"},{"key":"22799_CR34","doi-asserted-by":"publisher","first-page":"822","DOI":"10.1109\/OJCS.2025.3569437","volume":"6","author":"M Cunha","year":"2025","unstructured":"Cunha, M., Mendes, R., Montjoye, Y.-A. & Vilela, J. P. Wifi-based location tracking: A still open door on laptops. IEEE Open J. Comput. Soc. 6, 822\u2013833. https:\/\/doi.org\/10.1109\/OJCS.2025.3569437 (2025).","journal-title":"IEEE Open J. Comput. Soc."},{"key":"22799_CR35","doi-asserted-by":"publisher","unstructured":"Cunha, M., Mendes, R., de Montjoye, Y.-A. & Vilela, J.\u00a0a.\u00a0P. On the Difficulty of NOT being Unique: Fingerprinting Users from Wi-Fi Data in Mobile Devices. In Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing, SAC \u201925, 1335\u20131344, https:\/\/doi.org\/10.1145\/3672608.3707966 (Association for Computing Machinery, 2025).","DOI":"10.1145\/3672608.3707966"},{"key":"22799_CR36","doi-asserted-by":"publisher","unstructured":"Achara, J.\u00a0P., Cunche, M., Roca, V. & Francillon, A. Short paper: Wifileaks: Underestimated privacy implications of the access_wifi_state android permission. In Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, WiSec \u201914, 231\u2013236, https:\/\/doi.org\/10.1145\/2627393.2627399 (ACM, New York, NY, USA, 2014).","DOI":"10.1145\/2627393.2627399"},{"key":"22799_CR37","unstructured":"Reardon, J. et al. 50 ways to leak your data: An exploration of apps\u2019 circumvention of the android permissions system. In 28th USENIX Security Symposium (USENIX Security 19), 603\u2013620 (USENIX Association, 2019)."},{"key":"22799_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100403","volume":"41","author":"M Cunha","year":"2021","unstructured":"Cunha, M., Mendes, R. & Vilela, J. P. A survey of privacy-preserving mechanisms for heterogeneous data types. Comput. Sci. Rev. 41, 100403 (2021).","journal-title":"Comput. Sci. Rev."},{"key":"22799_CR39","doi-asserted-by":"crossref","unstructured":"Boutet, A. & Ben Mokhtar, S. Uniqueness assessment of human mobility on multi-sensor datasets. In Proceedings of the 16th International Conference on Availability, Reliability and Security, 1\u201310 (ACM, 2021).","DOI":"10.1145\/3465481.3470474"},{"key":"22799_CR40","doi-asserted-by":"crossref","unstructured":"Musa, A. & Eriksson, J. Tracking unmodified smartphones using wi-fi monitors. In Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 281\u2013294 (ACM, 2012).","DOI":"10.1145\/2426656.2426685"},{"key":"22799_CR41","doi-asserted-by":"publisher","unstructured":"Freudiger, J. How talkative is your mobile device? an experimental study of wi-fi probe requests. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec \u201915. https:\/\/doi.org\/10.1145\/2766498.2766517 (Association for Computing Machinery, 2015).","DOI":"10.1145\/2766498.2766517"},{"key":"22799_CR42","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.compenvurbsys.2018.07.006","volume":"72","author":"MW Traunmueller","year":"2018","unstructured":"Traunmueller, M. W., Johnson, N., Malik, A. & Kontokosta, C. E. Digital footprints: Using wifi probe and locational data to analyze human mobility trajectories in cities. Comput. Environ. Urban Syst. 72, 4\u201312 (2018).","journal-title":"Comput. Environ. Urban Syst."},{"key":"22799_CR43","doi-asserted-by":"crossref","unstructured":"Cunche, M., Kaafar, M.\u00a0A. & Boreli, R. I know who you will meet this evening! linking wireless devices using wi-fi probe requests. In 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), 1\u20139 (IEEE, 2012).","DOI":"10.1109\/WoWMoM.2012.6263700"},{"key":"22799_CR44","doi-asserted-by":"crossref","unstructured":"Ryan, F. & Schukat, M. Wi-fi user profiling via access point honeynets. In 2019 30th Irish Signals and Systems Conference (ISSC), 1\u20134 (IEEE, 2019).","DOI":"10.1109\/ISSC.2019.8904968"},{"key":"22799_CR45","unstructured":"Developers, A. Request permission to access nearby wi-fi devices (2023). https:\/\/developer.android.com\/guide\/topics\/connectivity\/wifi-permissions (accessed 07 Mar 2024)."},{"key":"22799_CR46","unstructured":"Developers, A. Request location permissions (2023). https:\/\/developer.android.com\/develop\/sensors-and-location\/location\/permissions (accessed Apr 2024)."},{"key":"22799_CR47","unstructured":"Media, U. Wifi dominates android mobile data usage (2017). https:\/\/ustelecom.org\/wifi-dominates-android-mobile-data-usage\/ (accessed Apr 2024)."},{"key":"22799_CR48","unstructured":"Mendes, R. COP-MODE Dataset Guide (2021). https:\/\/cop-mode.dei.uc.pt\/dataset (accessed 07 Mar 2024)."},{"key":"22799_CR49","unstructured":"Developers, A. Permissions on android (2023). https:\/\/developer.android.com\/guide\/topics\/permissions\/overview (accessed 07 Mar 2024)."},{"key":"22799_CR50","unstructured":"3Roam. Wi-Fi Range and RSSI Calculator (2024). https:\/\/3roam.com\/wi-fi-range-calculator\/ (accessed Mar 2024)."},{"key":"22799_CR51","doi-asserted-by":"crossref","unstructured":"Pei, C. et al. Why it takes so long to connect to a wifi access point. In IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1\u20139 (IEEE, 2017).","DOI":"10.1109\/INFOCOM.2017.8057164"},{"key":"22799_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-021-82294-1","volume":"11","author":"V Sekara","year":"2021","unstructured":"Sekara, V., Alessandretti, L., Mones, E. & Jonsson, H. Temporal and cultural limits of privacy in smartphone app usage. Sci. Rep. 11, 1\u20139 (2021).","journal-title":"Sci. Rep."},{"key":"22799_CR53","first-page":"1","volume":"9","author":"S Lee","year":"2019","unstructured":"Lee, S., Kim, J. & Moon, N. Random forest and wifi fingerprint-based indoor location recognition system using smart watch. HCIS 9, 1\u201314 (2019).","journal-title":"HCIS"},{"key":"22799_CR54","doi-asserted-by":"publisher","unstructured":"Swargam, B.\u00a0K., Yadav, R.\u00a0N. & Chaturvedi, M. Two level wi-fi fingerprinting based indoor localization using machine learning. In Proceedings of the 24th International Conference on Distributed Computing and Networking, ICDCN \u201923, 324\u2013329, https:\/\/doi.org\/10.1145\/3571306.3571429 (ACM, 2023).","DOI":"10.1145\/3571306.3571429"},{"key":"22799_CR55","unstructured":"Balaji, A. & Allen, A. Benchmarking automatic machine learning frameworks. arXiv preprint arXiv:1808.06492 (2018)."},{"key":"22799_CR56","doi-asserted-by":"publisher","DOI":"10.1016\/j.artmed.2020.101822","volume":"104","author":"J Waring","year":"2020","unstructured":"Waring, J., Lindvall, C. & Umeton, R. Automated machine learning: Review of the state-of-the-art and opportunities for healthcare. Artif. Intell. Med. 104, 101822 (2020).","journal-title":"Artif. Intell. Med."},{"key":"22799_CR57","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/s10462-024-10726-1","volume":"57","author":"M Baratchi","year":"2024","unstructured":"Baratchi, M. et al. Automated machine learning: past, present and future. Artif. Intell. Rev. 57, 122 (2024).","journal-title":"Artif. Intell. Rev."},{"key":"22799_CR58","first-page":"11936","volume":"23","author":"M Feurer","year":"2022","unstructured":"Feurer, M., Eggensperger, K., Falkner, S., Lindauer, M. & Hutter, F. Auto-sklearn 2.0: Hands-free automl via meta-learning. J. Mach. Learn. Res. 23, 11936\u201311996 (2022).","journal-title":"J. Mach. Learn. Res."}],"container-title":["Scientific Reports"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.nature.com\/articles\/s41598-025-22799-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s41598-025-22799-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s41598-025-22799-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T14:27:34Z","timestamp":1762784854000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.nature.com\/articles\/s41598-025-22799-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,10]]},"references-count":58,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["22799"],"URL":"https:\/\/doi.org\/10.1038\/s41598-025-22799-1","relation":{},"ISSN":["2045-2322"],"issn-type":[{"value":"2045-2322","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,10]]},"assertion":[{"value":"6 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"39238"}}