{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:08:00Z","timestamp":1774541280487,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,4,26]],"date-time":"2025-04-26T00:00:00Z","timestamp":1745625600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,4,26]],"date-time":"2025-04-26T00:00:00Z","timestamp":1745625600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Shanghai Special Funds for Urban Digital Transformation \u201cO2O Integrated Immersive Teaching Platform Project based on 5G+AI Data-driven","award":["No. 202201026"],"award-info":[{"award-number":["No. 202201026"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"DOI":"10.1186\/s40537-025-01149-y","type":"journal-article","created":{"date-parts":[[2025,4,26]],"date-time":"2025-04-26T15:52:57Z","timestamp":1745682777000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Graph neural network approach with spatial structure to anomaly detection of network data"],"prefix":"10.1186","volume":"12","author":[{"given":"Hao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yun","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Huahu","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jiangang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Xinhua","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Yiqin","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,26]]},"reference":[{"key":"1149_CR1","doi-asserted-by":"publisher","first-page":"106463","DOI":"10.1016\/j.neunet.2024.106463","volume":"178","author":"Y Yang","year":"2024","unstructured":"Yang Y, Wang P, He X, Zou D. GRAM: an interpretable approach for graph anomaly detection using gradient attention maps. Neural Netw. 2024;178:106463.","journal-title":"Neural Netw"},{"key":"1149_CR2","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.neunet.2020.12.026","volume":"136","author":"Z Zhang","year":"2021","unstructured":"Zhang Z, Zheng M, Zhong S, Liu Y. Steganographer detection via a similarity accumulation graph convolutional network. Neural Netw. 2021;136:97\u2013111.","journal-title":"Neural Netw"},{"key":"1149_CR3","doi-asserted-by":"publisher","first-page":"106580","DOI":"10.1016\/j.neunet.2024.106580","volume":"179","author":"C Fan","year":"2024","unstructured":"Fan C, Zhang H, Huang W, Xue J, Tao J, Yi J, Lv Z, Wu X. DGSD: dynamical graph self-distillation for EEG-based auditory spatial attention detection. Neural Netw. 2024;179:106580.","journal-title":"Neural Netw"},{"key":"1149_CR4","doi-asserted-by":"publisher","first-page":"106285","DOI":"10.1016\/j.neunet.2024.106285","volume":"175","author":"S Li","year":"2024","unstructured":"Li S, Zhang R. A novel interactive deep cascade spectral graph convolutional network with multi-relational graphs for disease prediction. Neural Netw. 2024;175:106285.","journal-title":"Neural Netw"},{"key":"1149_CR5","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.patrec.2024.05.004","volume":"183","author":"C Tian","year":"2024","unstructured":"Tian C, Zhang F, Wang R. Adversarial regularized attributed network embedding for graph anomaly detection. Pattern Recogn Lett. 2024;183:111\u20136.","journal-title":"Pattern Recogn Lett"},{"key":"1149_CR6","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.neunet.2023.07.026","volume":"166","author":"D Guo","year":"2023","unstructured":"Guo D, Liu Z, Li R. RegraphGAN: a graph generative adversarial network model for dynamic network anomaly detection. Neural Netw. 2023;166:273\u201385.","journal-title":"Neural Netw"},{"key":"1149_CR7","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.neunet.2022.05.024","volume":"153","author":"B Jiang","year":"2022","unstructured":"Jiang B, Chen S, Wang B, Luo B. MGLNN: Semi-supervised learning via multiple graph cooperative learning neural networks. Neural Netw. 2022;153:204\u201314.","journal-title":"Neural Netw"},{"key":"1149_CR8","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.neunet.2023.09.018","volume":"168","author":"J Fan","year":"2023","unstructured":"Fan J, Wang Z, Wu H, Sun D, Wu J, Lu X. An adversarial time-frequency reconstruction network for unsupervised anomaly detection. Neural Netw. 2023;168:44\u201356.","journal-title":"Neural Netw"},{"key":"1149_CR9","doi-asserted-by":"publisher","first-page":"106395","DOI":"10.1016\/j.neunet.2024.106395","volume":"177","author":"B Xue","year":"2024","unstructured":"Xue B, Gao X, Li B, Zhai F, Lu J, Yu J, Fu S, Xiao C. A robust multi-scale feature extraction framework with dual memory module for multivariate time series anomaly detection. Neural Netw. 2024;177:106395.","journal-title":"Neural Netw"},{"key":"1149_CR10","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.isatra.2024.02.010","volume":"147","author":"R Hou","year":"2024","unstructured":"Hou R, Zhang Z, Chen J, Yang W, Liu F. Unsupervised graph anomaly detection with discriminative embedding similarity for viscoelastic sandwich cylindrical structures. ISA Trans. 2024;147:36\u201354.","journal-title":"ISA Trans"},{"issue":"4","key":"1149_CR11","doi-asserted-by":"publisher","first-page":"2645","DOI":"10.1007\/s11063-020-10404-7","volume":"54","author":"H Zhang","year":"2021","unstructured":"Zhang H, Lu G, Zhan M, Zhang B. Semi-supervised classification of graph convolutional networks with laplacian rank constraints. Neural Process Lett. 2021;54(4):2645\u201356.","journal-title":"Neural Process Lett"},{"key":"1149_CR12","doi-asserted-by":"crossref","unstructured":"Liu Z, Zhou J. Graph attention networks. In Synthesis lectures on artificial intelligence and machine learning. 2020. pp. 39\u201341.","DOI":"10.1007\/978-3-031-01587-8_7"},{"key":"1149_CR13","doi-asserted-by":"crossref","unstructured":"Grover A, Leskovec J. node2vec: scalable feature learning for networks. KDD. 2016.","DOI":"10.1145\/2939672.2939754"},{"key":"1149_CR14","doi-asserted-by":"crossref","unstructured":"Li J, Zhu J, Zhang B. Discriminative deep random walk for network classification. 2016.","DOI":"10.18653\/v1\/P16-1095"},{"key":"1149_CR15","first-page":"73","volume-title":"Generative adversarial nets","author":"R Labaca-Castro","year":"2023","unstructured":"Labaca-Castro R. Generative adversarial nets. Berlin: Springer eBooks; 2023. p. 73\u20136."},{"key":"1149_CR16","doi-asserted-by":"crossref","unstructured":"Sakurada M, Yairi T. Anomaly detection using autoencoders with nonlinear dimensionality reduction. MLSDA. 2014.","DOI":"10.1145\/2689746.2689747"},{"key":"1149_CR17","doi-asserted-by":"crossref","unstructured":"Ding K, Li J, Bhanushali R, Liu H. Deep anomaly detection on attributed networks. In: Society for Industrial and Applied Mathematics eBooks. 2019. pp. 594\u2013602.","DOI":"10.1137\/1.9781611975673.67"},{"key":"1149_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/1542657","volume":"2021","author":"IU Khan","year":"2021","unstructured":"Khan IU, Abdollahi A, Alturki R, Alshehri MD, Ikram MA, Alyamani HJ, Khan S. Intelligent detection system enabled attack probability using markov chain in aerial networks. Wirel Commun Mob Comput. 2021;2021:1\u20139.","journal-title":"Wirel Commun Mob Comput"},{"issue":"6","key":"1149_CR19","doi-asserted-by":"publisher","first-page":"867","DOI":"10.3390\/electronics11060867","volume":"11","author":"HY Kwon","year":"2022","unstructured":"Kwon HY, Kim T, Lee MK. Advanced intrusion detection combining signature-based and behavior-based detection methods. Electronics. 2022;11(6):867.","journal-title":"Electronics"},{"issue":"1","key":"1149_CR20","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/JSEN.2017.2771226","volume":"18","author":"S Zidi","year":"2018","unstructured":"Zidi S, Moulahi T, Alaya B. Fault detection in wireless sensor networks through SVM classifier. IEEE Sens J. 2018;18(1):340\u20137.","journal-title":"IEEE Sens J"},{"key":"1149_CR21","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.procs.2016.06.047","volume":"89","author":"N Farnaaz","year":"2016","unstructured":"Farnaaz N, Jabbar M. Random forest modeling for network intrusion detection system. Proced Computer Sci. 2016;89:213\u20137.","journal-title":"Proced Computer Sci"},{"issue":"5","key":"1149_CR22","doi-asserted-by":"publisher","first-page":"2264","DOI":"10.1007\/s40815-022-01269-0","volume":"24","author":"N Liao","year":"2022","unstructured":"Liao N, Li X. Traffic anomaly detection model using K-means and active learning method. Int J Fuzzy Syst. 2022;24(5):2264\u201382.","journal-title":"Int J Fuzzy Syst"},{"issue":"11","key":"1149_CR23","doi-asserted-by":"publisher","first-page":"155014771881447","DOI":"10.1177\/1550147718814471","volume":"14","author":"X Tao","year":"2018","unstructured":"Tao X, Peng Y, Zhao F, Zhao P, Wang Y. A parallel algorithm for network traffic anomaly detection based on isolation forest. Int J Distrib Sens Netw. 2018;14(11):155014771881447.","journal-title":"Int J Distrib Sens Netw"},{"key":"1149_CR24","unstructured":"Lazaris A, Prasanna VK. An LSTM framework for modeling network traffic. Immunotechnology. 2019. pp. 19\u201324."},{"issue":"3","key":"1149_CR25","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","volume":"29","author":"L Akoglu","year":"2014","unstructured":"Akoglu L, Tong H, Koutra D. Graph based anomaly detection and description: a survey. Data Min Knowl Disc. 2014;29(3):626\u201388.","journal-title":"Data Min Knowl Disc"},{"key":"1149_CR26","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.knosys.2018.03.022","volume":"151","author":"P Goyal","year":"2018","unstructured":"Goyal P, Ferrara E. Graph embedding techniques, applications, and performance: a survey. Knowl-Based Syst. 2018;151:78\u201394.","journal-title":"Knowl-Based Syst"},{"key":"1149_CR27","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.aiopen.2021.01.001","volume":"1","author":"J Zhou","year":"2020","unstructured":"Zhou J, Cui G, Zhang Z, Yang C, Liu Z, Wang L, Li C, Sun M. Graph neural networks: a review of methods and applications. AI Open. 2020;1:57\u201381.","journal-title":"AI Open"},{"key":"1149_CR28","unstructured":"Kipf TN, Welling M. Semi-supervised classification with graph convolutional networks. International Conference on Learning Representations (ICLR). 2017."},{"key":"1149_CR29","unstructured":"Kipf TN, Welling M. Variational graph auto-encoders. arXiv preprint arXiv:1611.07308. 2016."},{"key":"1149_CR30","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.dsm.2023.10.005","volume":"7","author":"W Khan","year":"2024","unstructured":"Khan W, Mohd A, Suaib M, Ishrat M, Shaikh AA, Faisal SM. Residual-enhanced graph convolutional networks with hypersphere mapping for anomaly detection in attributed networks. Data Sci Manag. 2024;7:89\u201398.","journal-title":"Data Sci Manag"},{"key":"1149_CR31","doi-asserted-by":"publisher","first-page":"91160","DOI":"10.1109\/ACCESS.2022.3201332","volume":"10","author":"W Khan","year":"2022","unstructured":"Khan W, Haroon M, Khan AN, Hasan MK, Mokhtar UA, Islam S. DVAEGMM: dual variational autoencoder with gaussian mixture model for anomaly detection on attributed networks. IEEE Access. 2022;10:91160\u201375.","journal-title":"IEEE Access"},{"key":"1149_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-020-0625-3","volume":"10","author":"IU Hewapathirana","year":"2020","unstructured":"Hewapathirana IU, Lee D, Moltchanova E, McLeod J. Change detection in noisy dynamic networks: a spectral embedding approach. Soc Netw Anal Min. 2020;10:1\u201322.","journal-title":"Soc Netw Anal Min"},{"key":"1149_CR33","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1016\/j.ins.2023.01.118","volume":"629","author":"Y Xie","year":"2023","unstructured":"Xie Y, Wang W, Shao M, Li T, Yu Y. Multi-view change point detection in dynamic networks. Inf Sci. 2023;629:344\u201357.","journal-title":"Inf Sci"},{"issue":"5","key":"1149_CR34","first-page":"4027","volume":"35","author":"A Deng","year":"2021","unstructured":"Deng A, Hooi B. Graph neural network-based anomaly detection in multivariate time series. Proc AAAI Conf Artif Intell. 2021;35(5):4027\u201335.","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"1149_CR35","doi-asserted-by":"crossref","unstructured":"Peng Z, Luo M, Li J, Liu H, Zheng Q. ANOMALOUS: a joint modeling approach for anomaly detection on attributed networks. 2018.","DOI":"10.24963\/ijcai.2018\/488"},{"issue":"6","key":"1149_CR36","doi-asserted-by":"publisher","first-page":"2378","DOI":"10.1109\/TNNLS.2021.3068344","volume":"33","author":"Y Liu","year":"2022","unstructured":"Liu Y, Li Z, Pan S, Gong C, Zhou C, Karypis G. Anomaly detection on attributed networks via contrastive self-supervised learning. IEEE Trans Neural Netw Learn Syst. 2022;33(6):2378\u201392.","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"1149_CR37","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.ymeth.2020.08.004","volume":"192","author":"Y Ding","year":"2021","unstructured":"Ding Y, Tian LP, Lei X, Liao B, Wu FX. Variational graph auto-encoders for miRNA-disease association prediction. Methods. 2021;192:25\u201334.","journal-title":"Methods"},{"key":"1149_CR38","doi-asserted-by":"crossref","unstructured":"Daniel GV, Venkatesan M. Robust graph based deep anomaly detection on attributed networks. 2021.","DOI":"10.1109\/Confluence51648.2021.9376881"},{"key":"1149_CR39","doi-asserted-by":"crossref","unstructured":"Zhang L, Yuan J, Liu Z, Pei Y, Wang L. A robust embedding method for anomaly detection on attributed networks. 2019.","DOI":"10.1109\/IJCNN.2019.8852354"},{"issue":"2","key":"1149_CR40","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1049\/iet-ifs.2018.5186","volume":"13","author":"W Han","year":"2019","unstructured":"Han W, Xue J, Yan H. Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine. IET Inf Secur. 2019;13(2):109\u201316.","journal-title":"IET Inf Secur"},{"key":"1149_CR41","doi-asserted-by":"crossref","unstructured":"Hassan W, Hosseini SE, Pervez S. Real-time anomaly detection in network traffic using graph neural networks and random forest. In: Lecture notes in computer science. 2024. pp. 194\u2013207.","DOI":"10.1007\/978-3-031-60994-7_16"},{"issue":"1","key":"1149_CR42","doi-asserted-by":"publisher","first-page":"297","DOI":"10.3390\/jtaer19010016","volume":"19","author":"S Wei","year":"2024","unstructured":"Wei S, Lee S. Financial anti-fraud based on dual-channel graph attention network. J Theor Appl Electron Commer Res. 2024;19(1):297\u2013314.","journal-title":"J Theor Appl Electron Commer Res"},{"key":"1149_CR43","doi-asserted-by":"crossref","unstructured":"Patel V, Rajasegarar S, Pan L, Liu J, Zhu L. EvAnGCN: evolving graph deep neural network based anomaly detection in Blockchain. In: Lecture notes in computer science. 2022. pp. 444\u201356.","DOI":"10.1007\/978-3-031-22064-7_32"},{"issue":"12","key":"1149_CR44","doi-asserted-by":"publisher","first-page":"9214","DOI":"10.1109\/JIOT.2021.3094295","volume":"9","author":"Y Wu","year":"2022","unstructured":"Wu Y, Dai HN, Tang H. Graph neural networks for anomaly detection in industrial Internet of Things. IEEE Internet Things J. 2022;9(12):9214\u201331.","journal-title":"IEEE Internet Things J"},{"issue":"10","key":"1149_CR45","doi-asserted-by":"publisher","first-page":"8432","DOI":"10.1109\/JIOT.2022.3188583","volume":"10","author":"R Yumlembam","year":"2023","unstructured":"Yumlembam R, Issac B, Jacob SM, Yang L. IoT-based android malware detection using graph neural network with adversarial defense. IEEE Internet Things J. 2023;10(10):8432\u201344.","journal-title":"IEEE Internet Things J"},{"key":"1149_CR46","unstructured":"Velickovic P, Fedus W, Hamilton WL, Li\u00f2 P, Bengio Y, Hjelm RD. Deep Graph Infomax. In: International Conference on Learning Representations. 2018."},{"issue":"1","key":"1149_CR47","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1504\/IJSNET.2023.133812","volume":"43","author":"L Chen","year":"2023","unstructured":"Chen L, Mao Y, Zhou H, Zhang B, Wang Z, Wu J. MTS-GAT: multivariate time series anomaly detection based on graph attention networks. Int J Sens Netw. 2023;43(1):38\u201349.","journal-title":"Int J Sens Netw"},{"key":"1149_CR48","doi-asserted-by":"publisher","first-page":"65555","DOI":"10.1109\/ACCESS.2024.3398555","volume":"12","author":"W Khan","year":"2024","unstructured":"Khan W, Ishrat M, Khan AN, Arif M, Shaikh AA, Khubrani MM, Alam S, Shuaib M, John R. Detecting anomalies in attributed networks through sparse canonical correlation analysis combined with random masking and padding. IEEE Access. 2024;12:65555\u201367.","journal-title":"IEEE Access"},{"key":"1149_CR49","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.dsm.2023.10.005","volume":"7","author":"W Khan","year":"2023","unstructured":"Khan W, Abidin S, Arif M, Ishrat M, Haleem M, Shaikh AA, Farooqui NA, Faisal SM. Anomalous node detection in attributed social networks using dual variational autoencoder with generative adversarial networks. Data Sci Manag. 2023;7:89\u201398.","journal-title":"Data Sci Manag"},{"key":"1149_CR50","first-page":"153","volume":"3","author":"W Khan","year":"2022","unstructured":"Khan W, Haroon M. An unsupervised deep learning ensemble model for anomaly detection in static attributed social networks. Int J Cognit Comput Eng. 2022;3:153\u201360.","journal-title":"Int J Cognit Comput Eng"},{"key":"1149_CR51","first-page":"3069","volume":"14","author":"W Khan","year":"2022","unstructured":"Khan W, Haroon M. An efficient framework for anomaly detection in attributed social networks. Int J Inf Technol. 2022;14:3069\u201376.","journal-title":"Int J Inf Technol"},{"key":"1149_CR52","doi-asserted-by":"crossref","unstructured":"Bhattacharyya S, Banerjee JS, K\u00f6ppen M. Human-centric smart computing: innovative graph-based approaches. In: Proceedings of the 10th International Conference on Smart Systems and AI. 2022; Springer. pp. 124\u201335.","DOI":"10.1007\/978-981-19-5403-0"},{"key":"1149_CR53","first-page":"185","volume-title":"Emerging trends in cybersecurity research","author":"W Khan","year":"2023","unstructured":"Khan W, Ishrat M, Haleem M, Khan AN, Hasan MK, Farooqui NA. An extensive study and review on dark web threats and detection techniques. In: Husain MS, Faisal M, Sadia H, Ahmad T, Shukla S, editors. Emerging trends in cybersecurity research. Hershey: IGI Global; 2023. p. 185\u2013210."},{"key":"1149_CR54","first-page":"75","volume-title":"Advances in artificial intelligence applications","author":"W Khan","year":"2024","unstructured":"Khan W, Ishrat M. Unveiling the depths of explainable AI: a comprehensive review. In: Sharma S, Prakash A, Sugumaran V, editors. Advances in artificial intelligence applications. Hershey: IGI Global; 2024. p. 75\u201398."},{"issue":"7","key":"1149_CR55","doi-asserted-by":"publisher","first-page":"4445","DOI":"10.1007\/s10994-023-06501-y","volume":"113","author":"P Mignone","year":"2024","unstructured":"Mignone P, Corizzo R, Ceci M. Distributed and explainable GHSOM for anomaly detection in sensor networks. Mach Learn. 2024;113(7):4445\u201386.","journal-title":"Mach Learn"},{"key":"1149_CR56","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3323274","author":"J Hu","year":"2023","unstructured":"Hu J, Xiao B, Jin H, Duan J, Wang S, Lv Z, Wang S, Liu X, Zhu E. SAMCL: subgraph-aligned multiview contrastive learning for graph anomaly detection. IEEE Trans Neural Netw Learn Syst. 2023. https:\/\/doi.org\/10.1109\/TNNLS.2023.3323274.","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"1149_CR57","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3488375","author":"R Wang","year":"2024","unstructured":"Wang R, Xi L, Zhang F, Fan H, Yu X, Liu L, Yu S, Leung VCM. Context correlation discrepancy analysis for graph anomaly detection. IEEE Trans Knowl Data Eng. 2024. https:\/\/doi.org\/10.1109\/TKDE.2024.3488375.","journal-title":"IEEE Trans Knowl Data Eng"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01149-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01149-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01149-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,26]],"date-time":"2025-04-26T15:53:07Z","timestamp":1745682787000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-025-01149-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,26]]},"references-count":57,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1149"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01149-y","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,26]]},"assertion":[{"value":"24 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This research did not contain any studies involving animal or human participants, nor did it take place in any private or protected areas.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"105"}}