{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T05:03:26Z","timestamp":1766466206644,"version":"3.41.0"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,6,8]],"date-time":"2017-06-08T00:00:00Z","timestamp":1496880000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Tsinghua University Initiative Scientific Research Program","award":["2014z09102"],"award-info":[{"award-number":["2014z09102"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. on Info. Security"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1186\/s13635-017-0061-8","type":"journal-article","created":{"date-parts":[[2017,6,8]],"date-time":"2017-06-08T13:36:25Z","timestamp":1496928985000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Sensor Guardian: prevent privacy inference on Android sensors"],"prefix":"10.1186","volume":"2017","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7474-5908","authenticated-orcid":false,"given":"Xiaolong","family":"Bai","sequence":"first","affiliation":[]},{"given":"Jie","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Yu-Ping","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,8]]},"reference":[{"key":"61_CR1","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1145\/2185448.2185465","volume-title":"Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks","author":"Z Xu","year":"2012","unstructured":"Z Xu, K Bai, S Zhu, in Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks. Taplogger: inferring user inputs on smartphone touchscreens using on-board motion sensors (ACMNew York, 2012), pp. 113\u2013124."},{"key":"61_CR2","volume-title":"HotSec","author":"L Cai","year":"2011","unstructured":"L Cai, H Chen, in HotSec. Touchlogger: inferring keystrokes on touch screen from smartphone motion (USENIX Association, BerkeleySan Francisco, 2011)."},{"key":"61_CR3","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1145\/2046707.2046771","volume-title":"Proceedings of the 18th ACM Conference on Computer and Communications Security","author":"P Marquardt","year":"2011","unstructured":"P Marquardt, A Verma, H Carter, P Traynor, in Proceedings of the 18th ACM Conference on Computer and Communications Security. (sp) iphone: decoding vibrations from nearby keyboards using mobile phone accelerometers (ACMNew York, 2011), pp. 551\u2013562."},{"issue":"2","key":"61_CR4","first-page":"13","volume":"6","author":"S Reddy","year":"2010","unstructured":"S Reddy, M Mun, J Burke, D Estrin, M Hansen, M Srivastava, Using mobile phones to determine transportation modes. ACM Trans. Sens. Netw. (TOSN). 6(2), 13 (2010).","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"61_CR5","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.cose.2013.03.007","volume":"38","author":"A Mylonas","year":"2013","unstructured":"A Mylonas, V Meletiadis, L Mitrou, D Gritzalis, Smartphone sensor data as digital evidence. Comput. Secur.38:, 51\u201375 (2013).","journal-title":"Comput. Secur."},{"key":"61_CR6","first-page":"143","volume-title":"11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)","author":"S Chakraborty","year":"2014","unstructured":"S Chakraborty, C Shen, KR Raghavan, Y Shoukry, M Millar, M Srivastava, in 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14). ipshield: a framework for enforcing context-aware privacy (USENIX AssociationSeattle, 2014), pp. 143\u2013156."},{"key":"61_CR7","doi-asserted-by":"crossref","first-page":"1273","DOI":"10.1145\/2810103.2813668","volume-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","author":"X Liu","year":"2015","unstructured":"X Liu, Z Zhou, W Diao, Z Li, K Zhang, in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. When good becomes evil: keystroke inference with smartwatch (ACMNew York, 2015), pp. 1273\u20131285."},{"key":"61_CR8","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.cose.2015.06.013","volume":"53","author":"C Shen","year":"2015","unstructured":"C Shen, S Pei, Z Yang, X Guan, Input extraction via motion-sensor behavior analysis on smartphones. Comput. Secur.53:, 143\u2013155 (2015).","journal-title":"Comput. Secur."},{"key":"61_CR9","doi-asserted-by":"crossref","unstructured":"S Narain, TD Vo-Huu, K Block, G Noubir, in IEEE Symposium on Security and Privacy. Inferring user routes and locations using zero-permission mobile sensors. (IEEE, 2016).","DOI":"10.1109\/SP.2016.31"},{"key":"61_CR10","doi-asserted-by":"crossref","unstructured":"C Wang, X Guo, Y Wang, Y Chen, B Liu, in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. Friend or foe?: your wearable devices reveal your personal pin. (ACM, 2016), pp. 189\u2013200.","DOI":"10.1145\/2897845.2897847"},{"key":"61_CR11","unstructured":"Android Sensor. https:\/\/developer.android.com\/reference\/android\/hardware\/Sensor.html . Accessed 18 Nov 2016."},{"key":"61_CR12","unstructured":"iOS Sensor. https:\/\/developer.apple.com\/reference\/coremotion . Accessed 18 Nov 2016."},{"key":"61_CR13","unstructured":"Windows Sensor. https:\/\/msdn.microsoft.com\/windows\/uwp\/devices-sensors\/sensors . Accessed 18 Nov 2016."},{"key":"61_CR14","unstructured":"Sensors Overview. http:\/\/developer.android.com\/guide\/topics\/sensors\/sensors_overview.html . Accessed 18 Nov 2016."},{"key":"61_CR15","unstructured":"Android Binder. https:\/\/developer.android.com\/reference\/android\/os\/Binder.html . Accessed 18 Nov 2016."},{"key":"61_CR16","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1145\/2462456.2464462","volume-title":"Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services","author":"B Davis","year":"2013","unstructured":"B Davis, H Chen, in Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services. Retroskeleton: retrofitting Android apps. (ACMNew York, 2013), pp. 181\u2013192."},{"key":"61_CR17","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/2381934.2381938","volume-title":"Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices","author":"J Jeon","year":"2012","unstructured":"J Jeon, KK Micinski, JA Vaughan, A Fogel, N Reddy, JS Foster, T Millstein, in Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. Dr. Android and Mr. Hide: fine-grained permissions in android applications. (ACMNew York, 2012), pp. 3\u201314."},{"key":"61_CR18","unstructured":"R Xu, H Sa\u00efdi, R Anderson, in USENIX Security Symposium. Aurasium: practical policy enforcement for android applications (Bellevue, 2012), pp. 539\u2013552."},{"key":"61_CR19","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/2484313.2484317","volume-title":"Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security","author":"H Hao","year":"2013","unstructured":"H Hao, V Singh, W Du, in Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. On the effectiveness of api-level access control using bytecode rewriting in android. (ACMNew York, 2013), pp. 25\u201336."},{"key":"61_CR20","unstructured":"smali. https:\/\/github.com\/JesusFreke\/smali . Accessed 18 Nov 2016."},{"key":"61_CR21","unstructured":"apktool. http:\/\/ibotpeaches.github.io\/Apktool\/ . Accessed 18 Nov 2016."},{"key":"61_CR22","unstructured":"dexlib, 2. https:\/\/github.com\/JesusFreke\/smali\/tree\/master\/dexlib2 . Accessed 18 Nov 2016."},{"key":"61_CR23","unstructured":"Java Reflection. https:\/\/docs.oracle.com\/javase\/tutorial\/reflect\/member\/methodInvocation.html . Accessed 18 Nov 2016."},{"key":"61_CR24","unstructured":"Class Method. https:\/\/docs.oracle.com\/javase\/7\/docs\/api\/java\/lang\/reflect\/Method.html . Accessed 18 Nov 2016."},{"key":"61_CR25","unstructured":"libunity. http:\/\/docs.unity3d.com\/Manual\/android-GettingStarted.html . Accessed 18 Nov 2016."},{"key":"61_CR26","unstructured":"Java Random. https:\/\/docs.oracle.com\/javase\/7\/docs\/api\/java\/util\/Random.html . Accessed 18 Nov 2016."},{"key":"61_CR27","unstructured":"Google Play App Store. https:\/\/play.google.com\/store . Accessed 18 Nov 2016."},{"key":"61_CR28","doi-asserted-by":"crossref","unstructured":"K Zhao, D Zou, H Jin, Z Tian, W Qiang, W Dai, in Mobile Services (MS), 2015 IEEE International Conference On. Privacy protection for perceptual applications on smartphones. (IEEE, 2015), pp. 174\u2013181.","DOI":"10.1109\/MobServ.2015.33"},{"key":"61_CR29","unstructured":"Fragmentation. https:\/\/en.wikipedia.org\/wiki\/Fragmentation_(programming) . Accessed 18 Nov 2016."},{"key":"61_CR30","doi-asserted-by":"crossref","unstructured":"X Zhou, Y Lee, N Zhang, M Naveed, X Wang, in Security and Privacy (SP), 2014 IEEE Symposium On. The peril of fragmentation: security hazards in android device driver customizations. (IEEE, 2014), pp. 409\u2013423.","DOI":"10.1109\/SP.2014.33"},{"key":"61_CR31","doi-asserted-by":"crossref","unstructured":"L Xing, X Pan, R Wang, K Yuan, X Wang, in 2014 IEEE Symposium on Security and Privacy. Upgrading your android, elevating my malware: privilege escalation through mobile os updating. (IEEE, 2014), pp. 393\u2013408.","DOI":"10.1109\/SP.2014.32"},{"key":"61_CR32","unstructured":"S Poeplau, Y Fratantonio, A Bianchi, C Kruegel, G Vigna, in NDSS, 14. Execute this! Analyzing unsafe and malicious dynamic code loading in android applications, (2014), pp. 23\u201326."},{"key":"61_CR33","doi-asserted-by":"crossref","unstructured":"L Cai, S Machiraju, H Chen, in Proceedings of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds. Defending against sensor-sniffing attacks on mobile phones MobiHeld \u201909. (ACMNew York, 2009), pp. 31\u201336. doi: 10.1145\/1592606.1592614 . http:\/\/doi.acm.org\/10.1145\/1592606.1592614 .","DOI":"10.1145\/1592606.1592614"},{"issue":"2","key":"61_CR34","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/2619091","volume":"32","author":"W Enck","year":"2014","unstructured":"W Enck, P Gilbert, S Han, V Tendulkar, B-G Chun, LP Cox, J Jung, P McDaniel, AN Sheth, Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (TOCS). 32(2), 5 (2014).","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"61_CR35","doi-asserted-by":"crossref","unstructured":"P Hornyack, S Han, J Jung, S Schechter, D Wetherall, in Proceedings of the 18th ACM Conference on Computer and Communications Security. These aren\u2019t the droids you\u2019re looking for: retrofitting android to protect data from imperious applications (ACM, 2011), pp. 639\u2013652.","DOI":"10.1145\/2046707.2046780"},{"key":"61_CR36","first-page":"131","volume-title":"Presented as Part of the 22nd USENIX Security Symposium (USENIX Security 13)","author":"S Bugiel","year":"2013","unstructured":"S Bugiel, S Heuser, A-R Sadeghi, in Presented as Part of the 22nd USENIX Security Symposium (USENIX Security 13). Flexible and fine-grained mandatory access control on android for diverse security and privacy policies (USENIXWashington, 2013), pp. 131\u2013146."},{"key":"61_CR37","first-page":"11","volume-title":"Proceedings of the 14th Workshop on Mobile Computing Systems and Applications","author":"S Chakraborty","year":"2013","unstructured":"S Chakraborty, KR Raghavan, MP Johnson, MB Srivastava, in Proceedings of the 14th Workshop on Mobile Computing Systems and Applications. A framework for context-aware privacy of sensor data on mobile systems (ACMNew York, 2013), p. 11."},{"key":"61_CR38","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1145\/2699026.2699114","volume-title":"Proceedings of the 5th ACM Conference on Data and Application Security and Privacy","author":"Z Xu","year":"2015","unstructured":"Z Xu, S Zhu, in Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Semadroid: a privacy-aware sensor management framework for smartphones. (ACMNew York, 2015), pp. 61\u201372."},{"key":"61_CR39","unstructured":"Xposed. http:\/\/repo.xposed.info\/module\/de.robv.android.xposed.installer . Accessed 18 Nov 2016."},{"key":"61_CR40","doi-asserted-by":"crossref","unstructured":"B Li, Y Zhang, C Lyu, J Li, D Gu, in International Conference on Collaborative Computing: Networking, Applications and Worksharing. Ssg: sensor security guard for android smartphones (Springer, 2015), pp. 221\u2013233.","DOI":"10.1007\/978-3-319-28910-6_20"},{"key":"61_CR41","first-page":"17","volume-title":"Proceedings of the 6th International COnference","author":"M Mun","year":"2010","unstructured":"M Mun, S Hao, N Mishra, K Shilton, J Burke, D Estrin, M Hansen, R Govindan, in Proceedings of the 6th International COnference. Personal data vaults: a locus of control for personal data streams. (ACMNew York, 2010), p. 17."},{"key":"61_CR42","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/978-3-642-23556-6_6","volume-title":"Workshop on Secure Data Management","author":"H Choi","year":"2011","unstructured":"H Choi, S Chakraborty, ZM Charbiwala, MB Srivastava, in Workshop on Secure Data Management. Sensorsafe: a framework for privacy-preserving management of personal sensory information. (SpringerBerlin, 2011), pp. 85\u2013100."},{"key":"61_CR43","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1145\/1378600.1378624","volume-title":"Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services","author":"C Cornelius","year":"2008","unstructured":"C Cornelius, A Kapadia, D Kotz, D Peebles, M Shin, N Triandopoulos, in Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services. Anonysense: privacy-aware people-centric sensing (ACMNew York, 2008), pp. 211\u2013224."},{"issue":"5","key":"61_CR44","doi-asserted-by":"crossref","first-page":"980","DOI":"10.1109\/TIFS.2016.2515513","volume":"11","author":"Y Zhang","year":"2016","unstructured":"Y Zhang, Q Chen, S Zhong, Privacy-preserving data aggregation in mobile phone sensing. IEEE Trans Inf. Forensic Secur.11(5), 980\u2013992 (2016).","journal-title":"IEEE Trans Inf. Forensic Secur."},{"issue":"2","key":"61_CR45","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1145\/1964897.1964918","volume":"12","author":"JR Kwapisz","year":"2011","unstructured":"JR Kwapisz, GM Weiss, SA Moore, Activity recognition using cell phone accelerometers. SIGKDD Explor. Newsl.12(2), 74\u201382 (2011). doi: 10.1145\/1964897.1964918 .","journal-title":"SIGKDD Explor. Newsl."},{"key":"61_CR46","doi-asserted-by":"crossref","unstructured":"AJ Aviv, B Sapp, M Blaze, JM Smith, in Proceedings of the 28th Annual Computer Security Applications Conference. Practicality of accelerometer side channels on smartphones. (ACM, 2012), pp. 41\u201350.","DOI":"10.1145\/2420950.2420957"},{"key":"61_CR47","unstructured":"R Schlegel, K Zhang, X-y Zhou, M Intwala, A Kapadia, X Wang, in NDSS, 11. Soundcomber: a stealthy and context-aware sound trojan for smartphones, (2011), pp. 17\u201333."},{"key":"61_CR48","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.1145\/2508859.2516661","volume-title":"Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security","author":"X Zhou","year":"2013","unstructured":"X Zhou, S Demetriou, D He, M Naveed, X Pan, X Wang, CA Gunter, K Nahrstedt, in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. Identity, location, disease and more: inferring your secrets from android public resources (ACMNew York, 2013), pp. 1017\u20131028."},{"key":"61_CR49","doi-asserted-by":"crossref","unstructured":"C Shen, H Choi, S Chakraborty, M Srivastava, in 2014 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD). Towards a rich sensing stack for IoT devices. (IEEE, 2014), pp. 424\u2013427.","DOI":"10.1109\/ICCAD.2014.7001386"},{"key":"61_CR50","doi-asserted-by":"crossref","unstructured":"L Yang, K Ting, MB Srivastava, in Pervasive Computing and Communications (PerCom), 2014 IEEE International Conference On. Inferring occupancy from opportunistically available sensor data (IEEE, 2014), pp. 60\u201368.","DOI":"10.1109\/PerCom.2014.6813945"},{"key":"61_CR51","doi-asserted-by":"crossref","unstructured":"S Dey, N Roy, W Xu, RR Choudhury, S Nelakuditi, in NDSS. Accelprint: imperfections of accelerometers make smartphones trackable, (2014).","DOI":"10.14722\/ndss.2014.23059"},{"key":"61_CR52","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1145\/2307636.2307666","volume-title":"Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services","author":"E Miluzzo","year":"2012","unstructured":"E Miluzzo, A Varshavsky, S Balakrishnan, RR Choudhury, in Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services. Tapprints: your finger taps have fingerprints (ACMNew York, 2012), pp. 323\u2013336."},{"key":"61_CR53","doi-asserted-by":"crossref","unstructured":"J Han, E Owusu, LT Nguyen, A Perrig, J Zhang, in Communication Systems and Networks (COMSNETS), 2012 Fourth International Conference On. Accomplice: location inference using accelerometers on smartphones (IEEE, 2012), pp. 1\u20139.","DOI":"10.1109\/COMSNETS.2012.6151305"},{"key":"61_CR54","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1145\/2668332.2668348","volume-title":"Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems","author":"S Nawaz","year":"2014","unstructured":"S Nawaz, C Mascolo, in Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems. Mining users\u2019 significant driving routes with low-power sensors. (ACMNew York, 2014), pp. 236\u2013250."},{"key":"61_CR55","unstructured":"T Watanabe, M Akiyama, T Mori, in Proceedings of the 9th USENIX Conference on Offensive Technologies. Routedetector: sensor-based positioning system that exploits spatio-temporal regularity of human mobilty. WOOT\u201915. (USENIX AssociationBerkeley, 2015), pp. 6\u20136. http:\/\/dl.acm.org\/citation.cfm?id=2831211.2831217 ."},{"key":"61_CR56","first-page":"65","volume-title":"Proceedings of the 2nd ACM International Conference on Embedded Systems for Energy-Efficient Built Environments","author":"B-J Ho","year":"2015","unstructured":"B-J Ho, P Martin, P Swaminathan, M Srivastava, in Proceedings of the 2nd ACM International Conference on Embedded Systems for Energy-Efficient Built Environments. From pressure to path: barometer-based vehicle tracking. (ACMNew York, 2015), pp. 65\u201374."},{"key":"61_CR57","doi-asserted-by":"crossref","unstructured":"E Owusu, J Han, S Das, A Perrig, J Zhang, in Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications. Accessory: password inference using accelerometers on smartphones (ACMNew York, 2012), p. 9.","DOI":"10.1145\/2162081.2162095"},{"key":"61_CR58","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.pmcj.2015.12.001","volume":"25","author":"M Hussain","year":"2016","unstructured":"M Hussain, A Al-Haiqi, A Zaidan, B Zaidan, MM Kiah, NB Anuar, M Abdulnabi, The rise of keyloggers on smartphones: a survey and insight into motion-based tap inference attacks. Pervasive Mob. Comput.25:, 1\u201325 (2016).","journal-title":"Pervasive Mob. Comput."},{"key":"61_CR59","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/1978942.1978945","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"A Raij","year":"2011","unstructured":"A Raij, A Ghosh, S Kumar, M Srivastava, in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment (ACMNew York, 2011), pp. 11\u201320."},{"key":"61_CR60","unstructured":"Y Song, M Kukreti, R Rawat, U Hengartner, Two novel defenses against motion-based keystroke inference attacks. arXiv preprint arXiv:1410.7746 (2014)."}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-017-0061-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13635-017-0061-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-017-0061-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:37:23Z","timestamp":1750297043000},"score":1,"resource":{"primary":{"URL":"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/s13635-017-0061-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,8]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["61"],"URL":"https:\/\/doi.org\/10.1186\/s13635-017-0061-8","relation":{},"ISSN":["2510-523X"],"issn-type":[{"type":"electronic","value":"2510-523X"}],"subject":[],"published":{"date-parts":[[2017,6,8]]},"article-number":"10"}}