{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T21:31:57Z","timestamp":1771882317825,"version":"3.50.1"},"reference-count":16,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62201487"],"award-info":[{"award-number":["62201487"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["12426306"],"award-info":[{"award-number":["12426306"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Provincial Key Laboratory of Future Networks of Intelligence","award":["2022B1212010001"],"award-info":[{"award-number":["2022B1212010001"]}]},{"name":"Shenzhen Science and Technology Program","award":["RCBS20221008093108032"],"award-info":[{"award-number":["RCBS20221008093108032"]}]},{"DOI":"10.13039\/501100017610","name":"Shenzhen Science and Technology Stable Support Program","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100017610","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Sel. Areas Inf. Theory"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/jsait.2025.3617251","type":"journal-article","created":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T17:27:29Z","timestamp":1759512449000},"page":"394-402","source":"Crossref","is-referenced-by-count":2,"title":["Coding Methods for String Reconstruction From Erroneous Prefix-Suffix Compositions"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0570-0770","authenticated-orcid":false,"given":"Zitan","family":"Chen","sequence":"first","affiliation":[{"name":"School of Science and Engineering, Future Networks of Intelligence Institute, The Chinese University of Hong Kong (Shenzhen), Shenzhen, Guangdong, P.R. China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-017-01104-3"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/ange.202010171"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/ijms21082873"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1137\/140962486"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2023.3267620"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2023.3252045"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2024.3493762"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3222341"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2023.3315784"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/e27010039"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT54713.2023.10206632"},{"key":"ref12","volume":"16","author":"MacWilliams","year":"1977","journal-title":"The\n                        Theory of Error-correcting Codes"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/BF02835890"},{"key":"ref14","volume-title":"Concatenated Codes","author":"Forney","year":"1965"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/18.910593"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1966.1053873"}],"container-title":["IEEE Journal on Selected Areas in Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8700143\/10852562\/11192538.pdf?arnumber=11192538","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T20:50:36Z","timestamp":1771879836000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11192538\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/jsait.2025.3617251","relation":{},"ISSN":["2641-8770"],"issn-type":[{"value":"2641-8770","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}