{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T04:16:56Z","timestamp":1774066616877,"version":"3.50.1"},"reference-count":166,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1109\/tcss.2023.3322002","type":"journal-article","created":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T18:00:07Z","timestamp":1698429607000},"page":"3550-3579","source":"Crossref","is-referenced-by-count":14,"title":["A Review of Deep Learning Models for Twitter Sentiment Analysis: Challenges and Opportunities"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7255-5804","authenticated-orcid":false,"given":"Laxmi","family":"Chaudhary","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Jaypee Institute of Information Technology, Noida, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1009-3875","authenticated-orcid":false,"given":"Nancy","family":"Girdhar","sequence":"additional","affiliation":[{"name":"Laboratoire Informatique, Image et Interaction (L3i), University of La Rochelle, La Rochelle, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6132-1719","authenticated-orcid":false,"given":"Deepak","family":"Sharma","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Christian-Albrechts-Universit&#x00E4;t zu Kiel, Kiel, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7421-4808","authenticated-orcid":false,"given":"Javier","family":"Andreu-Perez","sequence":"additional","affiliation":[{"name":"School of Computer Science and Electronic Engineering, University of Essex, Colchester, U.K"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6160-3356","authenticated-orcid":false,"given":"Antoine","family":"Doucet","sequence":"additional","affiliation":[{"name":"Laboratoire Informatique, Image et Interaction (L3i), University of La Rochelle, La Rochelle, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2024-7700","authenticated-orcid":false,"given":"Matthias","family":"Renz","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Christian-Albrechts-Universit&#x00E4;t zu Kiel, Kiel, Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5427-3_35"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.24164"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-03768-z"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8797-4_6"},{"key":"ref5","first-page":"225","article-title":"Friends recommender system based on status (StatusFRS) for users of overlapping communities in directed","volume":"698","author":"Girdhar","year":"2018","journal-title":"Applications of Artificial Intelligence Techniques in Engineering: SIGMA"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04021-5_28"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10222739"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2016.31"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.100"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20161-5_8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65636-6_8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/19331681.2016.1214094"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/s17-2088"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SCOPES.2016.7955659"},{"key":"ref15","article-title":"Using SentiWordNet and sentiment analysis for detecting radical content on web forums","author":"Chalothorn","year":"2012"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14257\/ijmue.2015.10.4.21"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1162\/COLI_a_00049"},{"key":"ref18","article-title":"Sentiment analysis of Twitter data: A survey of techniques","author":"Kharde","year":"2016","journal-title":"arXiv:1601.06971"},{"issue":"17","key":"ref19","first-page":"7459","article-title":"Terrorist affiliations identifying through Twitter social media analysis using data mining and web mapping techniques","volume":"13","author":"Al-Khalisy","year":"2018","journal-title":"J. Eng. Appl. Sci."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47874-6_3"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1218"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.10.297"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0104136"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2016.7752398"},{"issue":"3","key":"ref25","first-page":"691","article-title":"Terrorism detection based on sentiment analysis using machine learning","volume":"12","author":"Iskandar","year":"2017","journal-title":"J. Eng. Appl. Sci."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI.2016.0216"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.16984\/saufenbilder.711612"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106298"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102056"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.02.004"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.10.010"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-06569-5"},{"key":"ref33","volume-title":"Deep Learning","author":"Goodfellow","year":"2016"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/su12041660"},{"key":"ref35","first-page":"1229","article-title":"A review of convolutional neural networks","volume":"40","author":"Zhou","year":"2017","journal-title":"J. Comput."},{"issue":"11","key":"ref36","first-page":"29","article-title":"Text emotion analysis based on CNN and BiLSTM network feature fusion","volume":"38","author":"Li","year":"2018","journal-title":"Comput. Appl."},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2923275"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3085663"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909919"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.physd.2019.132306"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.01.078"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxaa117"},{"key":"ref43","volume-title":"A sentiment index of the housing market: Text mining of narratives on social media","author":"Zhu","year":"2018"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3027350"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3348445.3348466"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2932708"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3102254.3102282"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-09973-3"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10144-1"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3586075"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-019-09794-5"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1366"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2743065.2743077"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1142\/S2196888821300015"},{"key":"ref55","volume-title":"Sentiment identification using maximum entropy analysis of movie reviews","author":"Mehra","year":"2002"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11471-1"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03175-2"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.476"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare10030411"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3071393"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-019-0189-2"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.3390\/app9061123"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102372"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/1329281"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.3389\/fpubh.2021.812735"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3457206"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2018.10.001"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10212664"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxaa131"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12415"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1177\/1063293X211031485"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107440"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3068323"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2022.103706"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1162\/COLI_r_00312"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1080\/19312458.2018.1455817"},{"key":"ref77","article-title":"Efficient estimation of word representations in vector space","author":"Mikolov","year":"2013","journal-title":"arXiv:1301.3781"},{"key":"ref78","article-title":"word2vec explained: Deriving Mikolov et al.\u2019s negative-sampling word-embedding method","author":"Goldberg","year":"2014","journal-title":"arXiv:1402.3722"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1310.4546"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref81","article-title":"Linking GloVe with word2vec","author":"Shi","year":"2014","journal-title":"arXiv:1411.5595"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00051"},{"key":"ref83","article-title":"FastText.Zip: Compressing text classification models","author":"Joulin","year":"2016","journal-title":"arXiv:1612.03651"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2019.00234"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-1202"},{"key":"ref86","first-page":"417","article-title":"SentiWordNet: A publicly available lexical resource for opinion mining","volume-title":"Proc. 5th Int. Conf. Lang. Resour. Eval.","author":"Sebastiani"},{"key":"ref87","article-title":"A new ANEW: Evaluation of a word list for sentiment analysis in microblogs","author":"\u00c5. Nielsen","year":"2011","journal-title":"arXiv:1103.2903"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v8i1.14550"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2014.04.011"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1186\/s13388-015-0024-x"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/860435.860479"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.080603"},{"key":"ref93","first-page":"1","article-title":"Combining lexicon-based and learning-based methods for Twitter sentiment analysis","author":"Zhang","year":"2011"},{"key":"ref94","first-page":"543","article-title":"Serendio: Simple and practical lexicon based approach to sentiment analysis","volume-title":"Proc. 2nd Joint Conf. Lexical Comput. Semantics, 7th Int. Workshop Semantic Eval.","author":"Palanisamy"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-014-9316-6"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICCONS.2018.8662942"},{"key":"ref97","first-page":"365","article-title":"Sentiment analysis in Twitter using lexicon based and polarity multiplication","volume-title":"Proc. Int. Conf. Artif. Intell. Inf. Technol. (ICAIIT)","author":"Mashuri"},{"issue":"10","key":"ref98","first-page":"83","article-title":"Sentiment analysis of tweets using support vector machine","volume":"5","author":"Rani","year":"2017","journal-title":"Int. J. Comput. Sci. Mobile Appl."},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/2664551.2664561"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1201\/9781315210445-103"},{"key":"ref101","volume-title":"Using machine learning to identify Jihadist messages on Twitter","author":"Omer","year":"2015"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2015.9"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2019.8823548"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2021.101785"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ICATCCT.2016.7912076"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59569-6_40"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2020.012770"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.3390\/app9183723"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2020.101121"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref111","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018","journal-title":"arXiv:1810.04805"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1907.11692"},{"key":"ref113","first-page":"1","article-title":"XLNet: Generalized autoregressive pretraining for language understanding","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Yang"},{"key":"ref114","volume-title":"Improving language understanding by generative pre-training","author":"Radford","year":"2018"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.100.033308"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622019500305"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2934354"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.3390\/rs12020256"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.3390\/w11071387"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3064830"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3027979"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/78.650093"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.102918"},{"key":"ref124","article-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling","author":"Chung","year":"2014","journal-title":"arXiv:1412.3555"},{"key":"ref125","volume-title":"Deep Learning With Python","author":"Chollet","year":"2021"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-6581-4_21"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.3390\/s23010506"},{"key":"ref128","first-page":"1644","article-title":"Unified benchmark and comparative evaluation for tweet classification","volume-title":"Proc. Findings Assoc. Comput. Linguistics","author":"Barbieri"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-8991-9_13"},{"key":"ref130","article-title":"\u2018I think this is the most disruptive technology\u2019: Exploring sentiments of ChatGPT early adopters using Twitter data","author":"Ul Haque","year":"2022","journal-title":"arXiv:2212.05856"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1016\/j.yjbinx.2019.100057"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3111035"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107242"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.104048"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-021-06227-w"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.07.004"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.3390\/app12031030"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113065"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.3390\/s20247115"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.2196\/17478"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982538"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.3390\/app12083709"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3165226"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9030483"},{"key":"ref145","article-title":"Real-time sentiment analysis for detection of terrorist activities in Kenya","author":"Ngoge","year":"2016"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1515\/jisys-2019-0106"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-017-0469-6"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.3390\/info11020092"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107096"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0235596"},{"issue":"12","key":"ref151","first-page":"2009","article-title":"Twitter sentiment classification using distant supervision","volume":"1","author":"Go","year":"2009","journal-title":"Stanford"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1177\/001316446002000104"},{"key":"ref153","article-title":"Assessing agreement on classification tasks: The Kappa statistic","author":"Carletta","year":"1996","journal-title":"arXiv:preprint cmp-lg\/9602004"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.3354\/cr030079"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622018500128"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1093\/ije\/dyq191"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.2307\/2332226"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.39"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/0005-2795(75)90109-9"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.3390\/su12208683"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1108\/GKMC-04-2020-0056"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1093\/jjfinec\/nbz037"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68468-0"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/s40558-021-00196-4"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/CITS.2017.8035341"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1002\/9781119603849"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/10557215\/10298248.pdf?arnumber=10298248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T05:33:28Z","timestamp":1725341608000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10298248\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":166,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2023.3322002","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"value":"2329-924X","type":"electronic"},{"value":"2373-7476","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]}}}