{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:05:20Z","timestamp":1772643920915,"version":"3.50.1"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,5,3]],"date-time":"2023-05-03T00:00:00Z","timestamp":1683072000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,5,3]],"date-time":"2023-05-03T00:00:00Z","timestamp":1683072000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Applications such as autonomous vehicles and medical screening use deep learning models to localize and identify hundreds of objects in a single frame. In the past, it has been shown how an attacker can fool these models by placing an adversarial patch within a scene. However, these patches must be placed in the target location and do not explicitly alter the semantics elsewhere in the image. In this paper, we introduce a new type of adversarial patch which alters a model\u2019s perception of an image\u2019s semantics. These patches can be placed anywhere within an image to change the classification or semantics of locations far from the patch. We call this new class of adversarial examples \u2018remote adversarial patches\u2019 (RAP). We implement our own RAP called IPatch and perform an in-depth analysis on without pixel clipping on image segmentation RAP attacks using five state-of-the-art architectures with eight different encoders on the CamVid street view dataset. Moreover, we demonstrate that the attack can be extended to object recognition models with preliminary results on the popular YOLOv3 model. We found that the patch can change the classification of a remote target region with a success rate of up to 93% on average.<\/jats:p>","DOI":"10.1186\/s42400-023-00145-0","type":"journal-article","created":{"date-parts":[[2023,5,3]],"date-time":"2023-05-03T02:01:33Z","timestamp":1683079293000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["IPatch: a remote adversarial patch"],"prefix":"10.1186","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6367-2734","authenticated-orcid":false,"given":"Yisroel","family":"Mirsky","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,3]]},"reference":[{"key":"145_CR1","doi-asserted-by":"crossref","unstructured":"Arnab A, Miksik O, Torr PH (2018) On the robustness of semantic segmentation models to adversarial attacks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 888\u2013897","DOI":"10.1109\/CVPR.2018.00099"},{"key":"145_CR2","unstructured":"Athalye A, Engstrom L, Ilyas A, Kwok K (2018) Synthesizing robust adversarial examples. In: International conference on machine learning. PMLR, pp. 284\u2013293"},{"issue":"4","key":"145_CR3","doi-asserted-by":"publisher","first-page":"368","DOI":"10.3390\/rs9040368","volume":"9","author":"N Audebert","year":"2017","unstructured":"Audebert N, Le Saux B, Lef\u00e8vre S (2017) Segment-before-detect: vehicle detection and classification through semantic segmentation of aerial images. Remote Sens 9(4):368","journal-title":"Remote Sens"},{"key":"145_CR4","unstructured":"Autopilot ai-tesla (2021) https:\/\/www.tesla.com\/autopilotAI, (Accessed on 02\/04\/2021)"},{"key":"145_CR5","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.patcog.2018.07.023","volume":"84","author":"B Biggio","year":"2018","unstructured":"Biggio B, Roli F (2018) Wild patterns: ten years after the rise of adversarial machine learning. Pattern Recognit 84:317\u2013331","journal-title":"Pattern Recognit"},{"issue":"2","key":"145_CR6","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.patrec.2008.04.005","volume":"30","author":"GJ Brostow","year":"2009","unstructured":"Brostow GJ, Fauqueur J, Cipolla R (2009) Semantic object classes in video: a high-definition ground truth database. Pattern Recognit Lett 30(2):88\u201397","journal-title":"Pattern Recognit Lett"},{"key":"145_CR7","unstructured":"Brown TB, Man\u00e9 D, Roy A, Abadi M, Gilmer J (2017) Adversarial patch. arXiv preprint arXiv:1712.09665"},{"key":"145_CR8","doi-asserted-by":"crossref","unstructured":"Chaurasia A, Culurciello E (2017) Linknet: Exploiting encoder representations for efficient semantic segmentation. In: 2017 IEEE visual communications and image processing (VCIP). IEEE 2017:1\u20134","DOI":"10.1109\/VCIP.2017.8305148"},{"key":"145_CR9","doi-asserted-by":"crossref","unstructured":"Chen S-T, Cornelius C, Martin J, Chau DHP (2018) Shapeshifter: Robust physical adversarial attack on faster r-cnn object detector. In: Joint European conference on machine learning and knowledge discovery in databases. Springer, pp. 52\u201368","DOI":"10.1007\/978-3-030-10925-7_4"},{"key":"145_CR10","unstructured":"Chen Y, Li J, Xiao H, Jin X, Yan S, Feng J (2017) Dual path networks. arXiv preprint arXiv:1707.01629"},{"key":"145_CR11","doi-asserted-by":"crossref","unstructured":"Chow K-H, Liu L, Loper M, Bae J, Gursoy ME, Truex S, Wei W, Wu Y (2020) Adversarial objectness gradient attacks in real-time object detection systems. In: 2020 second IEEE international conference on trust, privacy and security in intelligent systems and applications (TPS-ISA). IEEE, pp. 263\u2013272","DOI":"10.1109\/TPS-ISA50397.2020.00042"},{"key":"145_CR12","doi-asserted-by":"crossref","unstructured":"den Hollander R, Adhikari A, Tolios I, van Bekkum M, Bal A, Hendriks S, Kruithof M, Gross D, Jansen N, Perez G et\u00a0al. (2020) Adversarial patch camouflage against aerial detection. In: Artificial intelligence and machine learning in defense applications II, vol. 11543. International society for optics and photonics, p. 115430F","DOI":"10.1117\/12.2575907"},{"key":"145_CR13","doi-asserted-by":"crossref","unstructured":"Deng J, Dong W, Socher R, Li L-J, Li K, Fei-Fei L (2009) Imagenet: a large-scale hierarchical image database. In: 2009 IEEE conference on computer vision and pattern recognition. Ieee 2009:248\u2013255","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"145_CR14","doi-asserted-by":"crossref","unstructured":"Deng R, Shen C, Liu S, Wang H, Liu X (2018) Learning to predict crisp boundaries. In: Proceedings of the European conference on computer vision (ECCV), pp. 562\u2013578","DOI":"10.1007\/978-3-030-01231-1_35"},{"key":"145_CR15","doi-asserted-by":"publisher","first-page":"179656","DOI":"10.1109\/ACCESS.2020.3025372","volume":"8","author":"T Fan","year":"2020","unstructured":"Fan T, Wang G, Li Y, Wang H (2020) Ma-net: a multi-scale attention network for liver and tumor segmentation. IEEE Access 8:179656\u2013179665","journal-title":"IEEE Access"},{"key":"145_CR16","unstructured":"Fischer V, Kumar MC, Metzen JH, Brox T (2017) Adversarial examples for semantic image segmentation. arXiv preprint arXiv:1703.01101"},{"key":"145_CR17","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.asoc.2018.05.018","volume":"70","author":"A Garcia-Garcia","year":"2018","unstructured":"Garcia-Garcia A, Orts-Escolano S, Oprea S, Villena-Martinez V, Martinez-Gonzalez P, Garcia-Rodriguez J (2018) A survey on deep learning techniques for image and video semantic segmentation. Appl Soft Comput 70:41\u201365","journal-title":"Appl Soft Comput"},{"key":"145_CR18","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572"},{"key":"145_CR19","doi-asserted-by":"crossref","unstructured":"Hendrik\u00a0Metzen J, Chaithanya\u00a0Kumar M, Brox T, Fischer V (2017) Universal adversarial perturbations against semantic image segmentation. In: Proceedings of the IEEE international conference on computer vision, pp. 2755\u20132764","DOI":"10.1109\/ICCV.2017.300"},{"key":"145_CR20","doi-asserted-by":"crossref","unstructured":"He J, Wu X, Yang J, Hu W (2020) Cpspnet: crowd counting via semantic segmentation framework. In: 2020 IEEE 32nd international conference on tools with artificial intelligence (ICTAI). IEEE, pp. 1104\u20131110","DOI":"10.1109\/ICTAI50040.2020.00168"},{"key":"145_CR21","unstructured":"Hoory S, Shapira T, Shabtai A, Elovici Y (2020) Dynamic adversarial patch for evading object detection models. arXiv preprint arXiv:2010.13070"},{"key":"145_CR22","doi-asserted-by":"crossref","unstructured":"Huang L, Gao C, Zhou Y, Xie C, Yuille AL, Zou C, Liu N (2020) Universal physical camouflage attacks on object detectors. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 720\u2013729","DOI":"10.1109\/CVPR42600.2020.00080"},{"key":"145_CR23","doi-asserted-by":"crossref","unstructured":"Huang Q, Katsman I, He H, Gu Z, Belongie S, Lim SN (2019) Enhancing adversarial example transferability with an intermediate level attack. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp. 4733\u20134742","DOI":"10.1109\/ICCV.2019.00483"},{"key":"145_CR24","unstructured":"Iglovikov V, Mushinskiy S, Osin V (2017) Satellite imagery feature detection using deep convolutional neural network: a kaggle competition. arXiv preprint arXiv:1706.06169"},{"key":"145_CR25","doi-asserted-by":"publisher","first-page":"31359","DOI":"10.1109\/ACCESS.2020.2973069","volume":"8","author":"X Kang","year":"2020","unstructured":"Kang X, Song B, Du X, Guizani M (2020) Adversarial attacks for image segmentation on multiple lightweight models. IEEE Access 8:31359\u201331370","journal-title":"IEEE Access"},{"key":"145_CR26","unstructured":"Lee M, Kolter Z (2019) On physical adversarial patches for object detection. arXiv preprint arXiv:1906.11897"},{"key":"145_CR27","unstructured":"Leetaru K (2019) Waymo reminds us: Successful complex ai combines deep learning and traditional code, https:\/\/www.forbes.com\/sites\/kalevleetaru\/2019\/04\/18\/waymo-reminds-us-successful-complex-ai -combines-deep-learning-and-traditional-code\/?sh=4eb596723a2c, (Accessed on 02\/04\/2021)"},{"issue":"8","key":"145_CR28","doi-asserted-by":"publisher","first-page":"6337","DOI":"10.1109\/JIOT.2020.3016145","volume":"8","author":"Y Li","year":"2020","unstructured":"Li Y, Xu X, Xiao J, Li S, Shen HT (2020) Adaptive square attack: fooling autonomous cars with adversarial traffic signs. IEEE Internet of Things J 8(8):6337\u20136347","journal-title":"IEEE Internet of Things J"},{"key":"145_CR29","doi-asserted-by":"crossref","unstructured":"Lin T.-Y., Doll\u00e1r P, R.\u00a0Girshick, K.\u00a0He, B.\u00a0Hariharan, and S.\u00a0Belongie (2017) Feature pyramid networks for object detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2117\u20132125","DOI":"10.1109\/CVPR.2017.106"},{"key":"145_CR30","unstructured":"Liu X, Yang H, Liu Z, Song L, Li H, Chen Y (2018) Dpatch: an adversarial patch attack on object detectors. arXiv preprint arXiv:1806.02299"},{"key":"145_CR31","unstructured":"Li H, Xiong P, An J, Wang L (2018) Pyramid attention network for semantic segmentation. arXiv preprint arXiv:1805.10180"},{"key":"145_CR32","doi-asserted-by":"crossref","unstructured":"Li Y, Xu G, Li W (2020) Fa: a fast method to attack real-time object detection systems. In: 2020 IEEE\/CIC international conference on communications in China (ICCC). IEEE, pp. 1268\u20131273","DOI":"10.1109\/ICCC49849.2020.9238807"},{"key":"145_CR33","unstructured":"Luo Y, Boix X, Roig G, Poggio T, Zhao Q (2015) Foveation-based mechanisms alleviate adversarial examples. arXiv preprint arXiv:1511.06292"},{"key":"145_CR34","unstructured":"Lu J, Sibai H, Fabry E, Forsyth D (2017) No need to worry about adversarial examples in object detection in autonomous vehicles. arXiv preprint arXiv:1707.03501"},{"key":"145_CR35","doi-asserted-by":"crossref","unstructured":"Milletari F, Navab N, Ahmadi S-A (2016) V-net: fully convolutional neural networks for volumetric medical image segmentation. In: 2016 fourth international conference on 3D vision (3DV). IEEE 2016:565\u2013571","DOI":"10.1109\/3DV.2016.79"},{"key":"145_CR36","doi-asserted-by":"crossref","unstructured":"Minaee S, Boykov Y, Porikli F, Plaza A, Kehtarnavaz N, Terzopoulos D (2020) Image segmentation using deep learning: a survey. arXiv preprint arXiv:2001.05566","DOI":"10.1109\/TPAMI.2021.3059968"},{"key":"145_CR37","unstructured":"Mirsky Y, Mahler T, Shelef I, Elovici Y (2019) Ct-gan: Malicious tampering of 3d medical imagery using deep learning. In: 28th USENIX security symposium (USENIX Security 19). Santa Clara, CA: USENIX Association. pp. 461\u2013478. [Online]. Available: https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/mirsky"},{"key":"145_CR38","doi-asserted-by":"crossref","unstructured":"Nguyen A, Yosinski J, Clune J (2015) Deep neural networks are easily fooled: High confidence predictions for unrecognizable images. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 427\u2013436","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"145_CR39","doi-asserted-by":"crossref","unstructured":"Ozbulak U, Van\u00a0Messem A, De\u00a0Neve W (2019) Impact of adversarial examples on deep learning models for biomedical image segmentation. In: International conference on medical image computing and computer-assisted intervention. Springer, pp. 300\u2013308","DOI":"10.1007\/978-3-030-32245-8_34"},{"key":"145_CR40","doi-asserted-by":"crossref","unstructured":"Prajna Y, Nath MK (2021) A survey of semantic segmentation on biomedical images using deep learning. In: Advances in VLSI, Communication, and Signal Processing. Springer, pp. 347\u2013357","DOI":"10.1007\/978-981-15-6840-4_27"},{"key":"145_CR41","unstructured":"Redmon J, Farhadi A (2018) Yolov3: an incremental improvement. arXiv preprint arXiv:1804.02767"},{"key":"145_CR42","unstructured":"Ren S, He K, Girshick R, Sun J (2015) Faster r-cnn: towards real-time object detection with region proposal networks. arXiv preprint arXiv:1506.01497"},{"key":"145_CR43","unstructured":"Sabour S, Frosst N, Hinton GE (2017) Dynamic routing between capsules. arXiv preprint arXiv:1710.09829"},{"key":"145_CR44","doi-asserted-by":"crossref","unstructured":"Siam M, Gamal M, Abdel-Razek M, Yogamani S, Jagersand M, Zhang H (2018) A comparative study of real-time semantic segmentation for autonomous driving. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp. 587\u2013597","DOI":"10.1109\/CVPRW.2018.00101"},{"key":"145_CR45","unstructured":"Siemens (2021) Deep resolve. https:\/\/www.siemens-healthineers.com\/en-us\/magnetic-resonance-imaging\/technologies-and-innovations\/deep-resolve, (Accessed on 02\/04\/2021)"},{"key":"145_CR46","unstructured":"Sitawarin C, Bhagoji AN, Mosenia A, Chiang M, Mittal P (2018) Darts: deceiving autonomous cars with toxic signs. arXiv preprint arXiv:1802.06430"},{"key":"145_CR47","unstructured":"Song D, Eykholt K, Evtimov I, Fernandes E, Li B, Rahmati A, Tramer F, Prakash A, Kohno T (2018) Physical adversarial examples for object detectors. In: 12th USENIX workshop on offensive technologies (WOOT 18)"},{"key":"145_CR48","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199"},{"key":"145_CR49","doi-asserted-by":"crossref","unstructured":"Teichmann M, Weber M, Zoellner M, Cipolla R, Urtasun R (2018) Multinet: real-time joint semantic reasoning for autonomous driving. In: 2018 IEEE intelligent vehicles symposium (IV). IEEE 2018:1013\u20131020","DOI":"10.1109\/IVS.2018.8500504"},{"key":"145_CR50","doi-asserted-by":"crossref","unstructured":"Thys S, Van\u00a0Ranst W, Goedem\u00e9 T (2019) Fooling automated surveillance cameras: adversarial patches to attack person detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"145_CR51","unstructured":"Vincent J (2018) Artificial intelligence is going to supercharge surveillance the verge. https:\/\/www.theverge.com\/2018\/1\/23\/16907238\/artificial-intelligence-surveillance-cameras-security, (Accessed on 02\/04\/2021)"},{"key":"145_CR52","doi-asserted-by":"crossref","unstructured":"Wei X, Liang S, Chen N, Cao X (2018) Transferable adversarial attacks for image and video object detection. arXiv preprint arXiv:1811.12641","DOI":"10.24963\/ijcai.2019\/134"},{"key":"145_CR53","doi-asserted-by":"crossref","unstructured":"Wu Z, Lim S-N, Davis LS, Goldstein T (2020) Making an invisibility cloak: Real world adversarial attacks on object detectors. In: European Conference on Computer Vision. Springer, pp. 1\u201317","DOI":"10.1007\/978-3-030-58548-8_1"},{"key":"145_CR54","unstructured":"Wu D, Wang Y, Xia ST, Bailey J, Ma X (2020) Skip connections matter: on the transferability of adversarial examples generated with resnets,\u201d arXiv preprint arXiv:2002.05990"},{"key":"145_CR55","doi-asserted-by":"crossref","unstructured":"Xie C, Wang J, Zhang Z, Zhou Y, Xie L, Yuille A (2017) Adversarial examples for semantic segmentation and object detection. In: Proceedings of the IEEE international conference on computer vision, pp. 1369\u20131378","DOI":"10.1109\/ICCV.2017.153"},{"key":"145_CR56","doi-asserted-by":"crossref","unstructured":"Xie C, Zhang Z, Zhou Y, Bai S, Wang J, Ren Z, Yuille AL (2019) Improving transferability of adversarial examples with input diversity. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 2730\u20132739","DOI":"10.1109\/CVPR.2019.00284"},{"key":"145_CR57","doi-asserted-by":"crossref","unstructured":"Yu F, Chen H, Wang X, Xian W, Chen Y, Liu F, Madhavan V, Darrell T (2020) Bdd100k: a diverse driving dataset for heterogeneous multitask learning. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 2636\u20132645","DOI":"10.1109\/CVPR42600.2020.00271"},{"key":"145_CR58","unstructured":"Yu F, Xian W, Chen Y, Liu F, Liao M, Madhavan V, Darrell T (2018) Bdd100k: a diverse driving video database with scalable annotation tooling. arXiv preprint arXiv:1805.04687, vol.\u00a02, no.\u00a05, p.\u00a06"},{"key":"145_CR59","doi-asserted-by":"crossref","unstructured":"Zhang H, Zhou W, Li H (2020) Contextual adversarial attacks for object detection. In: 2020 IEEE international conference on multimedia and expo (ICME). IEEE, pp. 1\u20136","DOI":"10.1109\/ICME46284.2020.9102805"},{"key":"145_CR60","doi-asserted-by":"crossref","unstructured":"Zhao H, Shi J, Qi X, Wang X, Jia J (2017) Pyramid scene parsing network. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2881\u20132890","DOI":"10.1109\/CVPR.2017.660"},{"key":"145_CR61","unstructured":"Zhao Y, Yan H, Wei X (2020) Object hider: Adversarial patch attack against object detectors. arXiv preprint arXiv:2010.14974"},{"key":"145_CR62","doi-asserted-by":"crossref","unstructured":"Zhao Y, Zhu H, Liang R, Shen Q, Zhang S, Chen K (2019) Seeing isn\u2019t believing: towards more robust adversarial attack against real world object detectors. In: Proceedings of the 2019 ACM SIGSAC conference on computer and communications security, pp. 1989\u20132004","DOI":"10.1145\/3319535.3354259"},{"key":"145_CR63","doi-asserted-by":"crossref","unstructured":"Zhou Z, Siddiquee MMR, Tajbakhsh N, Liang J (2018) Unet++: A nested u-net architecture for medical image segmentation. In: Deep learning in medical image analysis and multimodal learning for clinical decision support. Springer, pp. 3\u201311","DOI":"10.1007\/978-3-030-00889-5_1"},{"key":"145_CR64","doi-asserted-by":"crossref","unstructured":"Zolfi A, Kravchik M, Elovici Y, Shabtai A (2020) The translucent patch: a physical and universal attack on object detectors. arXiv preprint arXiv:2012.12528","DOI":"10.1109\/CVPR46437.2021.01498"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-023-00145-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-023-00145-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-023-00145-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,3]],"date-time":"2023-05-03T02:04:57Z","timestamp":1683079497000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-023-00145-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,3]]},"references-count":64,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["145"],"URL":"https:\/\/doi.org\/10.1186\/s42400-023-00145-0","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,3]]},"assertion":[{"value":"10 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"18"}}