{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:48:51Z","timestamp":1778345331292,"version":"3.51.4"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-025-00762-9","type":"journal-article","created":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T08:31:00Z","timestamp":1751358660000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Energy-efficient deep learning-based intrusion detection system for edge computing: a novel DNN-KDQ model"],"prefix":"10.1186","volume":"14","author":[{"given":"Hafiz Gulfam Ahmad","family":"Umar","sequence":"first","affiliation":[]},{"given":"Iqra","family":"Yasmeen","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Aoun","sequence":"additional","affiliation":[]},{"given":"Tehseen","family":"Mazhar","sequence":"additional","affiliation":[]},{"given":"Muhammad Amir","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Ines Hilali","family":"Jaghdam","sequence":"additional","affiliation":[]},{"given":"Habib","family":"Hamam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,1]]},"reference":[{"key":"762_CR1","first-page":"100031","volume-title":"Integration of smart grid with industry 5.0: applications, challenges and solutions","author":"T Mazhar","year":"2024","unstructured":"Mazhar T et al (2024) Integration of smart grid with industry 5.0: applications, challenges and solutions. Energy, Measurement, p 100031"},{"issue":"1","key":"762_CR2","first-page":"8669348","volume":"2022","author":"M Shafiq","year":"2022","unstructured":"Shafiq M et al (2022) The rise of internet of things: review and open research issues related to detection and prevention of IoT-Based security attacks. Wirel Commun Mob Comput 2022(1):8669348","journal-title":"Wirel Commun Mob Comput"},{"key":"762_CR3","doi-asserted-by":"publisher","first-page":"106634","DOI":"10.1016\/j.compeleceng.2020.106634","volume":"84","author":"KN Qureshi","year":"2020","unstructured":"Qureshi KN, Hussain R, Jeon G (2020) A distributed software defined networking model to improve the scalability and quality of services for flexible green energy internet for smart grid systems. Comput Electr Eng 84:106634","journal-title":"Comput Electr Eng"},{"issue":"9","key":"762_CR4","doi-asserted-by":"publisher","first-page":"4549","DOI":"10.3390\/s23094549","volume":"23","author":"G Cicceri","year":"2023","unstructured":"Cicceri G et al (2023) A deep learning-driven self-conscious distributed cyber-physical system for renewable energy communities. Sensors 23(9):4549","journal-title":"Sensors"},{"issue":"11","key":"762_CR5","doi-asserted-by":"publisher","first-page":"4528","DOI":"10.3390\/app14114528","volume":"14","author":"M Aghahadi","year":"2024","unstructured":"Aghahadi M et al (2024) Digitalization processes in distribution grids: a comprehensive review of strategies and challenges. Appl Sci 14(11):4528","journal-title":"Appl Sci"},{"issue":"15","key":"762_CR6","doi-asserted-by":"publisher","first-page":"6666","DOI":"10.3390\/s23156666","volume":"23","author":"S Saeed","year":"2023","unstructured":"Saeed S et al (2023) Digital transformation and cybersecurity challenges for businesses resilience: issues and recommendations. Sensors 23(15):6666","journal-title":"Sensors"},{"issue":"6","key":"762_CR7","doi-asserted-by":"publisher","first-page":"7876","DOI":"10.1007\/s11227-023-05764-5","volume":"80","author":"BS Ali","year":"2024","unstructured":"Ali BS et al (2024) ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks. J Supercomputing 80(6):7876\u20137905","journal-title":"J Supercomputing"},{"key":"762_CR8","doi-asserted-by":"crossref","unstructured":"Abdiyeva-Aliyeva G, Hematyar M (2022) Statistic approached dynamically detecting security threats and updating a signature-based intrusion detection system\u2019s database in NGN. J Adv Inf Technol 13(5)","DOI":"10.12720\/jait.13.5.524-529"},{"issue":"3","key":"762_CR9","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s10922-021-09589-6","volume":"29","author":"Y Otoum","year":"2021","unstructured":"Otoum Y, Nayak A (2021) As-ids: anomaly and signature based Ids for the internet of things. J Netw Syst Manage 29(3):23","journal-title":"J Netw Syst Manage"},{"issue":"3","key":"762_CR10","doi-asserted-by":"publisher","first-page":"72","DOI":"10.3390\/bdcc6030072","volume":"6","author":"J Ktari","year":"2022","unstructured":"Ktari J et al (2022) Lightweight AI framework for industry 4.0 case study: water meter recognition. Big Data Cogn Comput 6(3):72","journal-title":"Big Data Cogn Comput"},{"issue":"4","key":"762_CR11","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MCE.2022.3181759","volume":"13","author":"C-H Wang","year":"2022","unstructured":"Wang C-H et al (2022) Lightweight deep learning: an overview. IEEE Consum Electron Mag 13(4):51\u201364","journal-title":"IEEE Consum Electron Mag"},{"key":"762_CR12","doi-asserted-by":"publisher","first-page":"169082","DOI":"10.1109\/ACCESS.2021.3138756","volume":"9","author":"J-C See","year":"2021","unstructured":"See J-C et al (2021) DoubleQExt: hardware and memory efficient CNN through two levels of quantization. IEEE Access 9:169082\u2013169091","journal-title":"IEEE Access"},{"key":"762_CR13","first-page":"102419","volume":"50","author":"MA Ferrag","year":"2020","unstructured":"Ferrag MA et al (2020) Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J Inform Secur Appl 50:102419","journal-title":"J Inform Secur Appl"},{"key":"762_CR14","doi-asserted-by":"publisher","first-page":"100068","DOI":"10.1016\/j.csa.2024.100068","volume":"3","author":"B Olanrewaju-George","year":"2025","unstructured":"Olanrewaju-George B, Pranggono B (2025) Federated learning-based intrusion detection system for the internet of things using unsupervised and supervised deep learning models. Cyber Secur Appl 3:100068","journal-title":"Cyber Secur Appl"},{"key":"762_CR15","first-page":"200189","volume":"17","author":"N Prazeres","year":"2023","unstructured":"Prazeres N et al (2023) Engineering the application of machine learning in an IDS based on IoT traffic flow. Intell Syst Appl 17:200189","journal-title":"Intell Syst Appl"},{"key":"762_CR16","doi-asserted-by":"publisher","first-page":"102597","DOI":"10.1016\/j.mex.2024.102597","volume":"12","author":"P Mahadevappa","year":"2024","unstructured":"Mahadevappa P et al (2024) A secure edge computing model using machine learning and IDS to detect and isolate intruders. MethodsX 12:102597","journal-title":"MethodsX"},{"key":"762_CR17","doi-asserted-by":"publisher","first-page":"1406","DOI":"10.1016\/j.procs.2022.12.339","volume":"217","author":"AR Muhammad","year":"2023","unstructured":"Muhammad AR, Sukarno P, Wardana AA (2023) Integrated security information and event management (siem) with intrusion detection system (ids) for live analysis based on machine learning. Procedia Comput Sci 217:1406\u20131415","journal-title":"Procedia Comput Sci"},{"key":"762_CR18","first-page":"104200","volume":"134","author":"Q Guo","year":"2024","unstructured":"Guo Q et al (2024) Robust multi-stage progressive autoencoder for hyperspectral anomaly detection. Int J Appl Earth Obs Geoinf 134:104200","journal-title":"Int J Appl Earth Obs Geoinf"},{"key":"762_CR19","doi-asserted-by":"publisher","first-page":"103784","DOI":"10.1016\/j.jnca.2023.103784","volume":"221","author":"S Latif","year":"2024","unstructured":"Latif S et al (2024) Dtl-ids: an optimized intrusion detection framework using deep transfer learning and genetic algorithm. J Netw Comput Appl 221:103784","journal-title":"J Netw Comput Appl"},{"issue":"6","key":"762_CR20","doi-asserted-by":"publisher","first-page":"7521","DOI":"10.1007\/s10586-024-04351-4","volume":"27","author":"A Heidari","year":"2024","unstructured":"Heidari A et al (2024) A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree. Cluster Comput 27(6):7521\u20137539","journal-title":"Cluster Comput"},{"issue":"15","key":"762_CR21","doi-asserted-by":"publisher","first-page":"e5886","DOI":"10.1002\/dac.5886","volume":"37","author":"K Zanbouri","year":"2024","unstructured":"Zanbouri K et al (2024) A GSO-based multi\u2010objective technique for performance optimization of blockchain\u2010based industrial internet of things. Int J Commun Syst 37(15):e5886","journal-title":"Int J Commun Syst"},{"issue":"10","key":"762_CR22","doi-asserted-by":"publisher","first-page":"8445","DOI":"10.1109\/JIOT.2023.3237661","volume":"10","author":"A Heidari","year":"2023","unstructured":"Heidari A, Navimipour NJ, Unal M (2023) A secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones. IEEE Internet Things J 10(10):8445\u20138454","journal-title":"IEEE Internet Things J"},{"issue":"11","key":"762_CR23","doi-asserted-by":"publisher","first-page":"e5056","DOI":"10.1002\/ett.5056","volume":"35","author":"M Asadi","year":"2024","unstructured":"Asadi M et al (2024) Botnets unveiled: A comprehensive survey on evolving threats and defense strategies. Trans Emerg Telecommunications Technol 35(11):e5056","journal-title":"Trans Emerg Telecommunications Technol"},{"key":"762_CR24","first-page":"100522","volume":"27","author":"K Sedhuramalingam","year":"2024","unstructured":"Sedhuramalingam K, Saravanakumar N (2024) A novel optimal deep learning approach for designing intrusion detection system in wireless sensor networks. Egypt Inf J 27:100522","journal-title":"Egypt Inf J"},{"issue":"1","key":"762_CR25","doi-asserted-by":"publisher","first-page":"3970","DOI":"10.1038\/s41598-025-88286-9","volume":"15","author":"S Kaushik","year":"2025","unstructured":"Kaushik S et al (2025) Robust machine learning based intrusion detection system using simple statistical techniques in feature selection. Sci Rep 15(1):3970","journal-title":"Sci Rep"},{"issue":"1","key":"762_CR26","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s43926-025-00095-8","volume":"5","author":"T Mazhar","year":"2025","unstructured":"Mazhar T et al (2025) Generative AI, iot, and blockchain in healthcare: application, issues, and solutions. Discover Internet Things 5(1):5","journal-title":"Discover Internet Things"},{"issue":"16","key":"762_CR27","doi-asserted-by":"publisher","first-page":"e8091","DOI":"10.1002\/cpe.8091","volume":"36","author":"A Vakili","year":"2024","unstructured":"Vakili A et al (2024) A new service composition method in the cloud-based internet of things environment using a grey Wolf optimization algorithm and mapreduce framework. Concurrency Computation: Pract Experience 36(16):e8091","journal-title":"Concurrency Computation: Pract Experience"},{"issue":"5","key":"762_CR28","doi-asserted-by":"publisher","first-page":"e6034","DOI":"10.1002\/dac.6034","volume":"38","author":"A Heidari","year":"2025","unstructured":"Heidari A, Jamali MAJ, Navimipour NJ (2025) Fuzzy logic multicriteria decision-making for broadcast storm resolution in vehicular ad hoc networks. Int J Commun Syst 38(5):e6034","journal-title":"Int J Commun Syst"},{"issue":"3","key":"762_CR29","doi-asserted-by":"publisher","first-page":"2603","DOI":"10.3390\/su15032603","volume":"15","author":"T Mazhar","year":"2023","unstructured":"Mazhar T et al (2023) Electric vehicle charging system in the smart grid using different machine learning methods. Sustainability 15(3):2603","journal-title":"Sustainability"},{"key":"762_CR30","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Habibi Lashkari A, Ghorbani AA. A detailed analysis of the cicids2017 data set. In Information Systems Security and Privacy: 4th International Conference, ICISSP 2018, Funchal-Madeira, Portugal, January 22-24, 2018, Revised Selected Papers 4 2019. Springer International Publishing,\u00a0pp 172\u2013188","DOI":"10.1007\/978-3-030-25109-3_9"},{"key":"762_CR31","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1016\/j.aej.2024.03.088","volume":"95","author":"A Kumar","year":"2024","unstructured":"Kumar A et al (2024) Novel imputation methods under stratified simple random sampling. Alexandria Eng J 95:236\u2013246","journal-title":"Alexandria Eng J"},{"key":"762_CR32","doi-asserted-by":"publisher","first-page":"112029","DOI":"10.1016\/j.jss.2024.112029","volume":"213","author":"D Romero-Organvidez","year":"2024","unstructured":"Romero-Organvidez D et al (2024) Data visualization guidance using a software product line approach. J Syst Softw 213:112029","journal-title":"J Syst Softw"},{"key":"762_CR33","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.procs.2024.09.193","volume":"246","author":"AA Wardana","year":"2024","unstructured":"Wardana AA et al (2024) Federated random forest with feature selection for collaborative intrusion detection in internet of things. Procedia Comput Sci 246:20\u201329","journal-title":"Procedia Comput Sci"},{"key":"762_CR34","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.patrec.2022.02.013","volume":"156","author":"E Balamurugan","year":"2022","unstructured":"Balamurugan E et al (2022) Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network (IDSGT-DNN). Pattern Recognit Lett 156:142\u2013151","journal-title":"Pattern Recognit Lett"},{"issue":"2","key":"762_CR35","first-page":"173","volume":"23","author":"M Al-Fawa\u2019reh","year":"2022","unstructured":"Al-Fawa\u2019reh M et al (2022) Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior. Egypt Inf J 23(2):173\u2013185","journal-title":"Egypt Inf J"},{"key":"762_CR36","doi-asserted-by":"publisher","first-page":"109683","DOI":"10.1016\/j.patcog.2023.109683","volume":"142","author":"MA Haghpanah","year":"2023","unstructured":"Haghpanah MA, Masouleh MT, Kalhor A (2023) Determining the trustworthiness of Dnns in classification tasks using generalized feature-based confidence metric. Pattern Recogn 142:109683","journal-title":"Pattern Recogn"},{"key":"762_CR37","first-page":"100746","volume":"35","author":"JK Samriya","year":"2022","unstructured":"Samriya JK et al (2022) Network intrusion detection using ACO-DNN model with DVFS based energy optimization in cloud framework. Sustainable Computing: Inf Syst 35:100746","journal-title":"Sustainable Computing: Inf Syst"},{"key":"762_CR38","doi-asserted-by":"crossref","unstructured":"Alrayes FS et al (2024) CNN channel attention intrusion detection system using NSL-KDD dataset. Comput Mater Con 79(3)","DOI":"10.32604\/cmc.2024.050586"},{"key":"762_CR39","doi-asserted-by":"publisher","first-page":"112473","DOI":"10.1016\/j.knosys.2024.112473","volume":"304","author":"T Yang","year":"2024","unstructured":"Yang T et al (2024) A lightweight intrusion detection algorithm for IoT based on data purification and a separable Convolution improved CNN. Knowl Based Syst 304:112473","journal-title":"Knowl Based Syst"},{"key":"762_CR40","first-page":"100501","volume":"27","author":"M Gamal","year":"2024","unstructured":"Gamal M et al (2024) Improving intrusion detection using LSTM-RNN to protect drones\u2019 networks. Egypt Inf J 27:100501","journal-title":"Egypt Inf J"},{"key":"762_CR41","first-page":"101046","volume-title":"Mitigation of attacks via improved network security in IOT network environment using RNN","author":"S Yadav","year":"2024","unstructured":"Yadav S, Hashmi H, Vekariya D (2024) Mitigation of attacks via improved network security in IOT network environment using RNN, vol 32. Sensors, Measurement, p 101046"},{"key":"762_CR42","doi-asserted-by":"publisher","first-page":"104146","DOI":"10.1016\/j.cose.2024.104146","volume":"148","author":"SS Bamber","year":"2025","unstructured":"Bamber SS et al (2025) A hybrid CNN-LSTM approach for intelligent cyber intrusion detection system. Computers Secur 148:104146","journal-title":"Computers Secur"},{"issue":"1","key":"762_CR43","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1186\/s13635-024-00155-6","volume":"2024","author":"K Saleem","year":"2024","unstructured":"Saleem K et al (2024) Intelligent multi-agent model for energy-efficient communication in wireless sensor networks. EURASIP J Inform Secur 2024(1):9","journal-title":"EURASIP J Inform Secur"},{"key":"762_CR44","doi-asserted-by":"publisher","first-page":"104015","DOI":"10.1016\/j.cag.2024.104015","volume":"123","author":"A Lopes","year":"2024","unstructured":"Lopes A et al (2024) Computer vision model compression techniques for embedded systems: A survey. Computers Graphics 123:104015","journal-title":"Computers Graphics"},{"key":"762_CR45","doi-asserted-by":"publisher","first-page":"111907","DOI":"10.1016\/j.asoc.2024.111907","volume":"163","author":"J Chen","year":"2024","unstructured":"Chen J et al (2024) Robust knowledge distillation based on feature variance against backdoored teacher model. Appl Soft Comput 163:111907","journal-title":"Appl Soft Comput"},{"key":"762_CR46","doi-asserted-by":"publisher","first-page":"126040","DOI":"10.1016\/j.eswa.2024.126040","volume":"265","author":"Y Wang","year":"2025","unstructured":"Wang Y, Wang J, Zhang X (2025) Parameter-efficient online knowledge distillation for pretrained Language models. Expert Syst Appl 265:126040","journal-title":"Expert Syst Appl"},{"key":"762_CR47","doi-asserted-by":"crossref","unstructured":"Moslemi A, Briskina A, Dang Z, Li J (2024) A survey on knowledge distillation: recent advancements. Mach Learn Appl 100605","DOI":"10.1016\/j.mlwa.2024.100605"},{"key":"762_CR48","doi-asserted-by":"publisher","first-page":"106533","DOI":"10.1016\/j.neunet.2024.106533","volume":"179","author":"Z Zhang","year":"2024","unstructured":"Zhang Z et al (2024) Joint dual feature distillation and gradient progressive pruning for BERT compression. Neural Netw 179:106533","journal-title":"Neural Netw"},{"key":"762_CR49","doi-asserted-by":"publisher","first-page":"124599","DOI":"10.1016\/j.eswa.2024.124599","volume":"255","author":"Y Zhu","year":"2024","unstructured":"Zhu Y et al (2024) Towards robustness evaluation of backdoor defense on quantized deep learning models. Expert Syst Appl 255:124599","journal-title":"Expert Syst Appl"},{"issue":"12","key":"762_CR50","doi-asserted-by":"publisher","first-page":"13079","DOI":"10.1016\/j.aej.2022.07.013","volume":"61","author":"A Ibrahim","year":"2022","unstructured":"Ibrahim A, Gebali F (2022) Compact hardware accelerator for field multipliers suitable for use in ultra-low power IoT edge devices. Alexandria Eng J 61(12):13079\u201313087","journal-title":"Alexandria Eng J"},{"key":"762_CR51","doi-asserted-by":"publisher","first-page":"101346","DOI":"10.1016\/j.iot.2024.101346","volume":"28","author":"S Hudda","year":"2024","unstructured":"Hudda S et al (2024) A WSN and vision based smart, energy efficient, scalable, and reliable parking surveillance system with optical verification at edge for resource constrained IoT devices. Internet Things 28:101346","journal-title":"Internet Things"},{"key":"762_CR52","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1016\/j.procs.2022.12.254","volume":"217","author":"D Dimoudis","year":"2023","unstructured":"Dimoudis D et al (2023) Utilizing an adaptive window rolling median methodology for time series anomaly detection. Procedia Comput Sci 217:584\u2013593","journal-title":"Procedia Comput Sci"},{"issue":"20","key":"762_CR53","doi-asserted-by":"publisher","first-page":"12","DOI":"10.3182\/20130902-3-CN-3020.00044","volume":"46","author":"Z Ding","year":"2013","unstructured":"Ding Z, Fei M (2013) An anomaly detection approach based on isolation forest algorithm for streaming data using sliding window. IFAC Proc Vol 46(20):12\u20137","journal-title":"IFAC Proc Vol"},{"key":"762_CR54","doi-asserted-by":"crossref","unstructured":"Liu X, Gu L, Gong X, An L, Gao X, Wu J (2024) A power data anomaly detection model based on deep learning with adaptive feature fusion. Comput Mater Con 79(3)","DOI":"10.32604\/cmc.2024.048442"},{"key":"762_CR55","doi-asserted-by":"publisher","first-page":"103942","DOI":"10.1016\/j.cviu.2024.103942","volume":"240","author":"P Wu","year":"2024","unstructured":"Wu P et al (2024) Cprnc: channels pruning via reverse neuron crowding for model compression. Comput Vis Image Underst 240:103942","journal-title":"Comput Vis Image Underst"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00762-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-025-00762-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00762-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T09:07:41Z","timestamp":1751360861000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-025-00762-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,1]]},"references-count":55,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["762"],"URL":"https:\/\/doi.org\/10.1186\/s13677-025-00762-9","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,1]]},"assertion":[{"value":"25 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"32"}}