{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T04:29:38Z","timestamp":1772166578850,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100014717","name":"National Outstanding Youth Science Fund Project of National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61901517"],"award-info":[{"award-number":["61901517"]}],"id":[{"id":"10.13039\/100014717","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771488"],"award-info":[{"award-number":["61771488"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62001514"],"award-info":[{"award-number":["62001514"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012152","name":"National Postdoctoral Program for Innovative Talents","doi-asserted-by":"crossref","award":["BX2021371"],"award-info":[{"award-number":["BX2021371"]}],"id":[{"id":"10.13039\/501100012152","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. Adv. Signal Process."],"published-print":{"date-parts":[[2021,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>This paper mainly investigates the energy-efficient and secure offloading problem in air-to-ground Mobile Edge Computing (MEC) networks. The proposed efficient offloading mechanism is as per the requirements of the heterogeneous tasks of ground users. Further, the optimizing offloading rate, offloading object, and channel access jointly formulate system energy consumption and eavesdropping rate minimization. A distributed two-stage offloading scheme is proposed for achieving the sub-optimal solution for the Mixed-integer Nonlinear Programming (MINLP) problem. Finally, simulation results demonstrate that the proposed scheme is superior to several benchmark schemes.<\/jats:p>","DOI":"10.1186\/s13634-021-00785-9","type":"journal-article","created":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T08:21:23Z","timestamp":1629188483000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Distributed energy-efficient and secure offloading in air-to-ground MEC networks"],"prefix":"10.1186","volume":"2021","author":[{"given":"Wanning","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yitao","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Ducheng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Haichao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xueqiang","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Xueqiang","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,17]]},"reference":[{"key":"785_CR1","doi-asserted-by":"publisher","first-page":"2322","DOI":"10.1109\/COMST.2017.2745201","volume":"19","author":"Y Mao","year":"2017","unstructured":"Y. Mao, C. You, J. Zhang, K. Huang, K.B. Letaief, A survey on mobile edge computing: the communication perspective. IEEE Commun. Surv. Tutor. 19, 2322\u20132358 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"785_CR2","doi-asserted-by":"publisher","first-page":"101213","DOI":"10.1109\/ACCESS.2019.2927538","volume":"7","author":"Y Zhao","year":"2019","unstructured":"Y. Zhao, W. Wang, Y. Li, C. Colman Meixner, M. Tornatore, J. Zhang, Edge computing and networking: a survey on infrastructures and applications. IEEE Access 7, 101213\u2013101230 (2019)","journal-title":"IEEE Access"},{"key":"785_CR3","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1109\/LWC.2017.2710045","volume":"6","author":"R Amorim","year":"2017","unstructured":"R. Amorim, H. Nguyen, P. Mogensen, I.Z. Kovacs, J. Wigard, T.B. Sorensen, Radio channel modeling for UAV communication over cellular networks. IEEE Wirel. Commun. Lett. 6, 514\u2013517 (2017)","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"785_CR4","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/LWC.2017.2755643","volume":"7","author":"A Al-Hourani","year":"2018","unstructured":"A. Al-Hourani, K. Gomez, Modeling cellular-to-UAV path-loss for suburban environments. IEEE Wirel. Commun. Lett. 7, 82\u201385 (2018)","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"785_CR5","doi-asserted-by":"publisher","first-page":"4576","DOI":"10.1109\/TWC.2019.2927313","volume":"18","author":"Z Yang","year":"2019","unstructured":"Z. Yang, C. Pan, K. Wang, M. Shikh-Bahaei, Energy efficient resource allocation in UAV-enabled mobile edge computing networks. IEEE Trans. Wirel. Commun. 18, 4576\u20134589 (2019)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"785_CR6","doi-asserted-by":"publisher","first-page":"48572","DOI":"10.1109\/ACCESS.2019.2909530","volume":"7","author":"Shakhatreh","year":"2019","unstructured":"Shakhatreh et al., Unmanned aerial vehicles (UAVs): a survey on civil applications and key research challenges. IEEE Access 7, 48572\u201348634 (2019)","journal-title":"IEEE Access"},{"key":"785_CR7","doi-asserted-by":"publisher","first-page":"1254","DOI":"10.1016\/j.adhoc.2012.12.004","volume":"11","author":"I Bekmezci","year":"2013","unstructured":"I. Bekmezci, O. Sahingoz, a Temel, Flying ad-hoc networks (FANETs): a survey. Ad Hoc Netw. 11, 1254\u20131270 (2013)","journal-title":"Ad Hoc Netw."},{"key":"785_CR8","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1109\/MWC.2017.1600279","volume":"24","author":"J Xu","year":"2017","unstructured":"J. Xu, L. Duan, R. Zhang, Surveillance and intervention of infrastructure-free mobile communications: a new wireless security paradigm. IEEE Wirel. Commun. 24, 152\u2013159 (2017)","journal-title":"IEEE Wirel. Commun."},{"key":"785_CR9","doi-asserted-by":"publisher","first-page":"1993","DOI":"10.1109\/TVT.2018.2889397","volume":"68","author":"H Lu","year":"2019","unstructured":"H. Lu, H. Zhang, H. Dai, W. Wu, B. Wang, Proactive eavesdropping in UAV-aided suspicious communication systems. IEEE Trans. Veh. Technol. 68, 1993\u20131997 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"785_CR10","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1109\/LWC.2018.2879842","volume":"8","author":"J Ye","year":"2019","unstructured":"J. Ye, C. Zhang, H. Lei, G. Pan, Z. Ding, Secure UAV-to-UAV systems with spatially random UAVs. IEEE Wirel. Commun. Lett. 8, 564\u2013567 (2019)","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"785_CR11","doi-asserted-by":"publisher","first-page":"6757","DOI":"10.1109\/ACCESS.2017.2685434","volume":"5","author":"S Wang","year":"2017","unstructured":"S. Wang, X. Zhang, Y. Zhang, L. Wang, J. Yang, W. Wang, A survey on mobile edge networks: convergence of computing, caching and communications. IEEE Access 5, 6757\u20136779 (2017)","journal-title":"IEEE Access"},{"key":"785_CR12","first-page":"166079","volume":"7","author":"M Mehrabi","year":"2019","unstructured":"M. Mehrabi, D. You, V. Latzko, H. Salah, M. Reisslein, F.H.P. Fitzek, Device-enhanced MEC: multi-access edge computing (MEC) aided by end device computation and caching\u2014a survey. IEEE Trans. Veh. Technol. 7, 166079\u2013166108 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"785_CR13","doi-asserted-by":"publisher","first-page":"10187","DOI":"10.1109\/TVT.2019.2935877","volume":"68","author":"Y Du","year":"2019","unstructured":"Y. Du, K. Yang, K. Wang, G. Zhang, Y. Zhao, D. Chen, Joint resources and workflow scheduling in UAV-enabled wirelessly-powered MEC for IoT systems. IEEE Trans. Veh. Technol. 68, 10187\u201310200 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"785_CR14","doi-asserted-by":"publisher","first-page":"3720","DOI":"10.1109\/TITS.2020.3034197","volume":"22","author":"X Xu","year":"2020","unstructured":"X. Xu et al., Secure service offloading for internet of vehicles in SDN-enabled mobile edge computing. IEEE Trans. Intell. Transp. Syst. 22, 3720\u20133729 (2020)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"785_CR15","doi-asserted-by":"crossref","unstructured":"H. Yang et al., Secure resource allocation in mobile edge computing systems, in 2019 IEEE Global Communications Conference (GLOBECOM) (2019), pp. 1\u20136","DOI":"10.1109\/GLOBECOM38437.2019.9014031"},{"key":"785_CR16","doi-asserted-by":"crossref","unstructured":"B. Li, T. Chen, X. Wang, G.B. Giannakis, Secure edge computing in IoT via online learning, in 2018 52nd Asilomar Conference on Signals, Systems, and Computers (2018), pp. 2149\u20132153","DOI":"10.1109\/ACSSC.2018.8645223"},{"key":"785_CR17","doi-asserted-by":"publisher","first-page":"5922","DOI":"10.1109\/TSP.2019.2949504","volume":"67","author":"B Li","year":"2019","unstructured":"B. Li, T. Chen, G.B. Giannakis, Secure mobile edge computing in IoT via collaborative online learning. IEEE Trans. Signal Process. 67, 5922\u20135935 (2019)","journal-title":"IEEE Trans. Signal Process."},{"key":"785_CR18","doi-asserted-by":"crossref","unstructured":"U. A. Khan, W. Khalid, S. Saifullah, Energy efficient resource allocation and computation offloading strategy in a UAV-enabled secure edge-cloud computing system, in 2020 IEEE International Conference on Smart Internet of Things (SmartIoT) (2020), pp. 58\u201363","DOI":"10.1109\/SmartIoT49966.2020.00018"},{"key":"785_CR19","doi-asserted-by":"publisher","first-page":"6074","DOI":"10.1109\/TVT.2019.2912227","volume":"68","author":"T Bai","year":"2019","unstructured":"T. Bai, J. Wang, Y. Ren, L. Hanzo, Energy-efficient computation offloading for secure UAV-edge-computing systems. IEEE Trans. Veh. Technol. 68, 6074\u20136087 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"785_CR20","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1109\/TCOMM.2019.2947921","volume":"68","author":"Y Zhou","year":"2020","unstructured":"Y. Zhou et al., Secure communications for UAV-enabled mobile edge computing systems. IEEE Trans. Commun. 68, 376\u2013388 (2020)","journal-title":"IEEE Trans. Commun."},{"key":"785_CR21","doi-asserted-by":"publisher","first-page":"2049","DOI":"10.1109\/TVT.2017.2706308","volume":"67","author":"S Jeong","year":"2018","unstructured":"S. Jeong, O. Simeone, J. Kang, Mobile edge computing via a UAV-mounted cloudlet: optimization of bit allocation and path planning. IEEE Trans. Veh. Technol. 67, 2049\u20132063 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"785_CR22","first-page":"7808","volume":"7","author":"C Zhan","year":"2020","unstructured":"C. Zhan, H. Hu, X. Sui, Z. Liu, D. Niyato, Completion time and energy optimization in the UAV-enabled mobile-edge computing system. IEEE IoT J. 7, 7808\u20137822 (2020)","journal-title":"IEEE IoT J."},{"key":"785_CR23","first-page":"5906","volume":"7","author":"H Mei","year":"2020","unstructured":"H. Mei, K. Yang, Q. Liu, K. Wang, Joint trajectory-resource optimization in UAV-enabled edge-cloud system with virtualized mobile clone. IEEE IoT J. 7, 5906\u20135921 (2020)","journal-title":"IEEE IoT J."},{"key":"785_CR24","first-page":"2777","volume":"7","author":"Y Liu","year":"2020","unstructured":"Y. Liu, K. Xiong, Q. Ni, P. Fan, K.B. Letaief, UAV-assisted wireless powered cooperative mobile edge computing: joint offloading, CPU control, and trajectory optimization. IEEE IoT J. 7, 2777\u20132790 (2020)","journal-title":"IEEE IoT J."},{"key":"785_CR25","doi-asserted-by":"publisher","first-page":"4919","DOI":"10.1109\/TCOMM.2020.2988278","volume":"68","author":"N Qi","year":"2020","unstructured":"N. Qi, N.I. Miridakis, M. Xiao et al., Traffic-aware two-stage queueing communication networks: queue analysis and energy saving. IEEE Trans. Commun. 68, 4919\u20134932 (2020)","journal-title":"IEEE Trans. Commun."},{"key":"785_CR26","doi-asserted-by":"publisher","first-page":"6335","DOI":"10.1109\/TWC.2017.2722438","volume":"16","author":"N Qi","year":"2017","unstructured":"N. Qi, M. Xiao, T.A. Tsiftsis et al., Efficient coded cooperative networks with energy harvesting and transferring. IEEE Trans. Wirel. Commun. 16, 6335\u20136349 (2017)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"785_CR27","doi-asserted-by":"publisher","first-page":"13018","DOI":"10.1109\/TVT.2020.3018121","volume":"69","author":"Y Xu","year":"2020","unstructured":"Y. Xu et al., Convert harm into benefit: a coordination-learning based dynamic spectrum anti-jamming approach. IEEE Trans. Veh. Technol. 69, 13018\u201313032 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"785_CR28","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.1109\/SURV.2013.030713.00189","volume":"15","author":"Y Xu","year":"2013","unstructured":"Y. Xu, A. Anpalagan, Q. Wu, L. Shen, Z. Gao, J. Wang, Decision-theoretic distributed channel selection for opportunistic spectrum access: strategies, challenges and solutions. IEEE Commun. Surv. Tutor. 15, 1689\u20131713 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"785_CR29","doi-asserted-by":"publisher","first-page":"5305","DOI":"10.1109\/TCOMM.2017.2734768","volume":"65","author":"Y Xu","year":"2017","unstructured":"Y. Xu, J. Wang, Q. Wu, J. Zheng, L. Shen, A. Anpalagan, Dynamic spectrum access in time-varying environment: distributed learning beyond expectation optimization. IEEE Trans. Commun. 65, 5305\u20135318 (2017)","journal-title":"IEEE Trans. Commun."},{"key":"785_CR30","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1109\/TVT.2021.3049653","volume":"70","author":"N Qi","year":"2021","unstructured":"N. Qi, W. Wang, M. Xiao et al., A learning-based spectrum access Stackelberg game: friendly jammer-assisted communication confrontation. IEEE Trans. Veh. Technol. 70, 700\u2013713 (2021)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"785_CR31","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1109\/JSTSP.2011.2176916","volume":"6","author":"Y Xu","year":"2011","unstructured":"Y. Xu, J. Wang, Q. Wu et al., Opportunistic spectrum access in cognitive radio networks: global optimization using local interaction games. IEEE J. Sel. Top. Signal Process. 6, 180\u2013194 (2011)","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"785_CR32","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441","volume-title":"Convex Optim.","author":"SP Boyd","year":"2004","unstructured":"S.P. Boyd, L. Vandenberghe, Convex Optim. (Cambridge University Press, London, 2004)"},{"key":"785_CR33","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/TAC.2008.2010885","volume":"54","author":"JR Marden","year":"2009","unstructured":"J.R. Marden, G. Arslan, J.S. Shamma, Joint strategy fictitious play with inertia for potential games. IEEE Trans. Autom. Control 54, 208\u2013220 (2009)","journal-title":"IEEE Trans. Autom. Control"},{"key":"785_CR34","doi-asserted-by":"publisher","first-page":"2357","DOI":"10.1109\/LCOMM.2019.2943461","volume":"23","author":"X Diao","year":"2019","unstructured":"X. Diao, J. Zheng, Y. Cai, Y. Wu, A. Anpalagan, Fair data allocation and trajectory optimization for UAV-assisted mobile edge computing. IEEE Commun. Lett. 23, 2357\u20132361 (2019)","journal-title":"IEEE Commun. Lett."},{"key":"785_CR35","doi-asserted-by":"publisher","first-page":"117448","DOI":"10.1109\/ACCESS.2019.2936437","volume":"7","author":"X Diao","year":"2019","unstructured":"X. Diao, J. Zheng, Y. Wu, Y. Cai, A. Anpalagan, Joint trajectory design, task data, and computing resource allocations for NOMA-based and UAV-assisted mobile edge computing. IEEE Access 7, 117448\u2013117459 (2019)","journal-title":"IEEE Access"},{"key":"785_CR36","doi-asserted-by":"publisher","first-page":"3984","DOI":"10.1109\/TCYB.2019.2935466","volume":"50","author":"Y Wang","year":"2020","unstructured":"Y. Wang, Z.-Y. Ru, K. Wang, P.-Q. Huang, Joint deployment and task scheduling optimization for large-scale mobile users in multi-UAV-enabled mobile edge computing. IEEE Trans. Cybern. 50, 3984\u20133997 (2020)","journal-title":"IEEE Trans. Cybern."},{"key":"785_CR37","doi-asserted-by":"crossref","unstructured":"H. Xiao, Z. Hu, K. Yang, Y. Du, D. Chen, An energy-aware joint routing and task allocation algorithm in MEC systems assisted by multiple UAVs, in 2020 International Wireless Communications and Mobile Computing (IWCMC): 2020 (2020), pp. 1654\u20131659","DOI":"10.1109\/IWCMC48107.2020.9148519"},{"key":"785_CR38","doi-asserted-by":"crossref","unstructured":"L. Wang, et al., RL-based user association and resource allocation for multi-UAV enabled MEC, in 2019 15th International Wireless Communications and Mobile Computing Conference (IWCMC), Tangier, Morocco (2019), pp. 741\u2013746","DOI":"10.1109\/IWCMC.2019.8766458"},{"key":"785_CR39","doi-asserted-by":"crossref","unstructured":"W. Liu, Y. Xu, N. Qi, K. Yao, Y. Zhang, W. He, Joint computation offloading and resource allocation in UAV swarms with multi-access edge computing, in 2020 International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing (2020), pp. 280\u2013285","DOI":"10.1109\/WCSP49889.2020.9299713"},{"key":"785_CR40","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1109\/COMST.2016.2631146","volume":"19","author":"X Wei","year":"2017","unstructured":"X. Wei, Q. Wang, T. Wang, J. Fan, Jammer localization in multi-hop wireless network: a comprehensive survey. IEEE Commun. Surv. Tutor. 19, 765\u2013799 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"785_CR41","doi-asserted-by":"publisher","first-page":"1991","DOI":"10.1109\/LCOMM.2016.2598808","volume":"20","author":"L Jia","year":"2016","unstructured":"L. Jia, F. Yao, Y. Sun, Y. Niu, Y. Zhu, Bayesian Stackelberg game for antijamming transmission with incomplete information. IEEE Commun. Lett. 20, 1991\u20131994 (2016)","journal-title":"IEEE Commun. Lett."},{"key":"785_CR42","doi-asserted-by":"publisher","first-page":"4193","DOI":"10.1109\/TCOMM.2019.2903088","volume":"67","author":"H Xing","year":"2019","unstructured":"H. Xing, L. Liu, J. Xu, A. Nallanathan, Joint task assignment and resource allocation for D2D-enabled mobile-edge computing. IEEE Trans. Commun. 67, 4193\u20134207 (2019)","journal-title":"IEEE Trans. Commun."},{"key":"785_CR43","doi-asserted-by":"crossref","unstructured":"G. Hu, Y. Jia, Z. Chen, Multi-user computation offloading with D2D for mobile edge computing, in 2018 IEEE Global Communications Conference (GLOBECOM) (2018)","DOI":"10.1109\/GLOCOM.2018.8647906"}],"container-title":["EURASIP Journal on Advances in Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13634-021-00785-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13634-021-00785-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13634-021-00785-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T08:31:08Z","timestamp":1629189068000},"score":1,"resource":{"primary":{"URL":"https:\/\/asp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13634-021-00785-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,17]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["785"],"URL":"https:\/\/doi.org\/10.1186\/s13634-021-00785-9","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-483638\/v1","asserted-by":"object"}]},"ISSN":["1687-6180"],"issn-type":[{"value":"1687-6180","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,17]]},"assertion":[{"value":"20 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The manuscript does not contain any individual person\u2019s data in any form (including individual details, images or videos) and therefore the consent to publish is not applicable to this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"71"}}