{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T12:33:29Z","timestamp":1771504409465,"version":"3.50.1"},"reference-count":60,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2023,5,22]],"date-time":"2023-05-22T00:00:00Z","timestamp":1684713600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62076251"],"award-info":[{"award-number":["62076251"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Remote Sensing"],"abstract":"<jats:p>Adversarial example generation on Synthetic Aperture Radar (SAR) images is an important research area that could have significant impacts on security and environmental monitoring. However, most current adversarial attack methods on SAR images are designed for white-box situations by end-to-end means, which are often difficult to achieve in real-world situations. This article proposes a novel black-box targeted attack method, called Shallow-Feature Attack (SFA). Specifically, SFA assumes that the shallow features of the model are more capable of reflecting spatial and semantic information such as target contours and textures in the image. The proposed SFA generates ghost data packages for input images and generates critical features by extracting gradients and feature maps at shallow layers of the model. The feature-level loss is then constructed using the critical features from both clean images and target images, which is combined with the end-to-end loss to form a hybrid loss function. By fitting the critical features of the input image at specific shallow layers of the neural network to the target critical features, our attack method generates more powerful and transferable adversarial examples. Experimental results show that the adversarial examples generated by the SFA attack method improved the success rate of single-model attack under a black-box scenario by an average of 3.73%, and 4.61% after combining them with ensemble-model attack without victim models.<\/jats:p>","DOI":"10.3390\/rs15102699","type":"journal-article","created":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T01:36:48Z","timestamp":1684805808000},"page":"2699","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Boosting Adversarial Transferability with Shallow-Feature Attack on SAR Images"],"prefix":"10.3390","volume":"15","author":[{"given":"Gengyou","family":"Lin","sequence":"first","affiliation":[{"name":"Command and Control Engineering College, Army Engineering University of PLA, Nanjing 210007, China"}]},{"given":"Zhisong","family":"Pan","sequence":"additional","affiliation":[{"name":"Command and Control Engineering College, Army Engineering University of PLA, Nanjing 210007, China"}]},{"given":"Xingyu","family":"Zhou","sequence":"additional","affiliation":[{"name":"Communication Engineering College, Army Engineering University of PLA, Nanjing 210007, China"}]},{"given":"Yexin","family":"Duan","sequence":"additional","affiliation":[{"name":"Zhenjiang Campus, Army Military Transportation University of PLA, Zhenjiang 212000, China"}]},{"given":"Wei","family":"Bai","sequence":"additional","affiliation":[{"name":"Command and Control Engineering College, Army Engineering University of PLA, Nanjing 210007, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2766-3405","authenticated-orcid":false,"given":"Dazhi","family":"Zhan","sequence":"additional","affiliation":[{"name":"Command and Control Engineering College, Army Engineering University of PLA, Nanjing 210007, China"}]},{"given":"Leqian","family":"Zhu","sequence":"additional","affiliation":[{"name":"Command and Control Engineering College, Army Engineering University of PLA, Nanjing 210007, China"}]},{"given":"Gaoqiang","family":"Zhao","sequence":"additional","affiliation":[{"name":"Command and Control Engineering College, Army Engineering University of PLA, Nanjing 210007, China"}]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[{"name":"Command and Control Engineering College, Army Engineering University of PLA, Nanjing 210007, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,5,22]]},"reference":[{"key":"ref_1","first-page":"5215315","article-title":"Domain Knowledge Powered Two-Stream Deep Network for Few-Shot SAR Vehicle Recognition","volume":"60","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"ref_2","first-page":"1","article-title":"Multiscale CNN Based on Component Analysis for SAR ATR","volume":"60","author":"Li","year":"2022","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"ref_3","first-page":"5211212","article-title":"Attentional Feature Refinement and Alignment Network for Aircraft Detection in SAR Imagery","volume":"60","author":"Zhao","year":"2022","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"5205516","DOI":"10.1109\/TGRS.2023.3264231","article-title":"A Sidelobe-Aware Small Ship Detection Network for Synthetic Aperture Radar Imagery","volume":"61","author":"Zhou","year":"2023","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"5200817","DOI":"10.1109\/TGRS.2022.3231253","article-title":"What Catch Your Attention in SAR Images: Saliency Detection Based on Soft-Superpixel Lacunarity Cue","volume":"61","author":"Ma","year":"2023","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1184","DOI":"10.3390\/rs15051184","article-title":"An Unsupervised Saliency-Guided Deep Convolutional Neural Network for Accurate Burn Mapping from Sentinel-1 SAR Data","volume":"15","author":"Ali","year":"2023","journal-title":"Remote Sens."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Deng, B., Zhang, D., Dong, F., Zhang, J., Shafiq, M., and Gu, Z. (2023). Rust-Style Patch: A Physical and Naturalistic Camouflage Attacks on Object Detector for Remote Sensing Images. Remote Sens., 15.","DOI":"10.3390\/rs15040885"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Li, C., Ye, X., Xi, J., and Jia, Y. (2023). A Texture Feature Removal Network for Sonar Image Classification and Detection. Remote Sens., 15.","DOI":"10.3390\/rs15030616"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Xi, Y., Jia, W., Miao, Q., Liu, X., Fan, X., and Lou, J. (2022). DyCC-Net: Dynamic Context Collection Network for Input-Aware Drone-View Object Detection. Remote Sens., 14.","DOI":"10.3390\/rs14246313"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Yang, S., Peng, T., Liu, H., Yang, C., Feng, Z., and Wang, M. (2023). Radar Emitter Identification with Multi-View Adaptive Fusion Network (MAFN). Remote Sens., 15.","DOI":"10.3390\/rs15071762"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Zhao, K., Gao, Q., Hao, S., Sun, J., and Zhou, L. (2023). Credible Remote Sensing Scene Classification Using Evidential Fusion on Aerial-Ground Dual-View Images. Remote Sens., 15.","DOI":"10.3390\/rs15061546"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"538","DOI":"10.3390\/rs15020538","article-title":"Deep Network Architectures as Feature Extractors for Multi-Label Classification of Remote Sensing Images","volume":"15","author":"Marjan","year":"2023","journal-title":"Remote Sens."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Wang, B., Wang, H., and Song, D. (2022). A Filtering Method for LiDAR Point Cloud Based on Multi-Scale CNN with Attention Mechanism. Remote Sens., 14.","DOI":"10.3390\/rs14236170"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Jing, L., Dong, C., He, C., Shi, W., and Yin, H. (2022). Adaptive Modulation and Coding for Underwater Acoustic Communications Based on Data-Driven Learning Algorithm. Remote Sens., 14.","DOI":"10.3390\/rs14235959"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Wang, F., and Mitch, B. (2023). Tree Segmentation and Parameter Measurement from Point Clouds Using Deep and Handcrafted Features. Remote Sens., 15.","DOI":"10.3390\/rs15041086"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"4217","DOI":"10.3390\/rs14174217","article-title":"Real-Time Weed Control Application Using a Jetson Nano Edge Device and a Spray Mechanism","volume":"14","author":"Eduardo","year":"2022","journal-title":"Remote Sens."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"223","DOI":"10.3390\/rs14010223","article-title":"Flood Detection Using Real-Time Image Segmentation from Unmanned Aerial Vehicles on Edge-Computing Platform","volume":"14","author":"Daniel","year":"2022","journal-title":"Remote Sens."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Zou, Y., Holger, W., and Barbara, K. (2021). Towards Urban Scene Semantic Segmentation with Deep Learning from LiDAR Point Clouds: A Case Study in Baden-W\u00fcrttemberg, Germany. Remote Sens., 13.","DOI":"10.3390\/rs13163220"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Yang, N., and Tang, H. (2021). Semantic Segmentation of Satellite Images: A Deep Learning Approach Integrated with Geospatial Hash Codes. Remote Sens., 13.","DOI":"10.3390\/rs13142723"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Wu, B., Ma, C., Stefan, P., and David, R. (2021). An Adaptive Human Activity-Aided Hand-Held Smartphone-Based Pedestrian Dead Reckoning Positioning System. Remote Sens., 13.","DOI":"10.3390\/rs13112137"},{"key":"ref_21","unstructured":"Szegedy, C., Zaremba, W., and Sutskever, I. (2014, January 14\u201316). Intriguing Properties of Neural Networks. Proceedings of the International Conference on Learning Representations, Banff, AB, Canada."},{"key":"ref_22","unstructured":"Goodfellow, I.J., Shlens, J., and Szegedy, C. (2015, January 7\u20139). Explaining and Harnessing Adversarial Examples. Proceedings of the International Conference on Learning Representations, San Diego, CA, USA."},{"key":"ref_23","unstructured":"Madry, A., Makelov, A., and Schmidt, L. (May, January 30). Towards Deep Learning Models Resistant to Adversarial Attacks. Proceedings of the International Conference on Learning Representations, Vancouver, BC, Canada."},{"key":"ref_24","first-page":"5619815","article-title":"Universal Adversarial Examples in Remote Sensing: Methodology and Benchmark","volume":"60","author":"Xu","year":"2022","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"ref_25","unstructured":"Yosinski, J., Clune, J., Nguyen, A., Fuchs, T., and Lipson, H. (2015). Understanding Neural Networks through Deep Visualization. arXiv."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Wang, Z., Guo, H., Zhang, Z., Liu, W., Qin, Z., and Ren, K. (2021, January 10\u201317). Feature Importance-aware Transferable Adversarial Attacks. Proceedings of the International Conference on Computer Vision, Montreal, QC, Canada.","DOI":"10.1109\/ICCV48922.2021.00754"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Meng, D., and Chen, H. (November, January 30). MAGNET: A Two-Pronged Defense against Adversarial Examples. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA.","DOI":"10.1145\/3133956.3134057"},{"key":"ref_28","unstructured":"Alexey, K., Ian, J.G., and Samy, B. (2017, January 24\u201326). Adversarial examples in the physical world. Proceedings of the 5th International Conference on Learning Representations, Toulon, France."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Dong, Y., Liao, F., Pang, T., Su, H., Zhu, J., Hu, X., and Li, J. (2018, January 18\u201322). Boosting Adversarial Attacks with Momentum. Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA.","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref_30","unstructured":"Lin, J., Song, C., He, K., Wang, L., and John, E. (2020, January 26\u201330). Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks. Proceedings of the 8th International Conference on Learning Representations, Addis Ababa, Ethiopia."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Xie, C., Zhang, Z., Zhou, Y., Bai, S., Wang, J., Ren, Z., and Yuille, A.L. (2019, January 16\u201320). Improving Transferability of Adversarial Examples with Input Diversity. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Long Beach, CA, USA.","DOI":"10.1109\/CVPR.2019.00284"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Dong, Y., Pang, T., Su, H., and Zhu, J. (2019, January 16\u201320). Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Long Beach, CA, USA.","DOI":"10.1109\/CVPR.2019.00444"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I., Somesh, J., Berkay, C., and Ananthram, S. (2017, January 2\u20136). Practical Black-Box Attacks against Machine Learning. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates.","DOI":"10.1145\/3052973.3053009"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Zhou, W., Hou, X., Chen, Y., Tang, M., Huang, X., Gan, X., and Yang, Y. (2018, January 8\u201314). Transferable Adversarial Perturbations. Proceedings of the Computer Vision 15th European Conference, Munich, Germany.","DOI":"10.1007\/978-3-030-01264-9_28"},{"key":"ref_35","unstructured":"Qian, H., Isay, K., Zeqi, G., Horace, H., Serge, J.B., and Ser, N. (November, January 27). Enhancing adversarial example transferability with an intermediate level attack. Proceedings of the IEEE International Conference on Computer Vision, Seoul, Republic of Korea."},{"key":"ref_36","first-page":"2188","article-title":"Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet","volume":"44","author":"Chen","year":"2022","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"4509805","DOI":"10.1109\/LGRS.2022.3184311","article-title":"Speckle-Variant Attack: Toward Transferable Adversarial Attack to SAR Target Recognition","volume":"19","author":"Peng","year":"2022","journal-title":"IEEE Geosci. Remote Sens. Lett."},{"key":"ref_38","unstructured":"Seyed-Mohsen, M., Alhussein, F., and Pascal, F. (2016, January 27\u201330). DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks. Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA."},{"key":"ref_39","unstructured":"Liu, Y., Chen, X., and Liu, C. (2016). Delving into Transferable Adversarial Examples and Black-Box Attacks. arXiv."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Narodytska, N., and Kasiviswanathan, S.P. (2016). Simple Black-Box Adversarial Perturbations for Deep Networks. arXiv.","DOI":"10.1109\/CVPRW.2017.172"},{"key":"ref_41","unstructured":"Chen, P.Y., Zhang, H., Sharma, Y., Yi, J., and Cho-jui, H. (2017, January 3). ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models. Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, Dallas, TX, USA."},{"key":"ref_42","unstructured":"Brendel, W., Rauber, J., and Bethge, M. (30\u20133, January 30). Decision-Based Adversarial Attacks: Reliable Attacks against Black-Box Machine Learning Models. Proceedings of the 6th International Conference on Learning Representations, Vancouver, BC, Canada."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Ganeshan, A., Vivek, B.S., and Radhakrishnan, V.B. (November, January 27). FDA: Feature Disruptive Attack. Proceedings of the 2019 IEEE\/CVF International Conference on Computer Vision, Seoul, Republic of Korea.","DOI":"10.1109\/ICCV.2019.00816"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Meng, T., Zhang, F., and Ma, F. (2022, January 20\u201322). A Target-region-based SAR ATR Adversarial Deception Method. Proceedings of the 2022 7-th International Conference on Signal and Image Processing, Suzhou, China.","DOI":"10.1109\/ICSIP55141.2022.9887044"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"4507","DOI":"10.1109\/JSTARS.2022.3179171","article-title":"Adversarial Deception Against SAR Target Recognition Network","volume":"15","author":"Zhang","year":"2022","journal-title":"IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Czaja, W., Fendley, N., and Pekala, M. (2018, January 6\u20139). Adversarial Examples in Remote Sensing. Proceedings of the 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, Seattle, WA, USA.","DOI":"10.1145\/3274895.3274904"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"7419","DOI":"10.1109\/TGRS.2021.3051641","article-title":"An Empirical Study of Adversarial Examples on Remote Sensing Image Scene Classification","volume":"59","author":"Chen","year":"2021","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"8671","DOI":"10.1109\/TIP.2021.3118977","article-title":"Self-Attention Context Network: Addressing the Threat of Adversarial Attacks for Hyperspectral Image Classification","volume":"30","author":"Xu","year":"2021","journal-title":"IEEE Trans. Image Process."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"1333","DOI":"10.1109\/JSTARS.2020.3038683","article-title":"Adversarial Examples for CNN-Based SAR Image Classification: An Experience Study","volume":"14","author":"Li","year":"2021","journal-title":"IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Wang, Z., Wang, B., Zhang, C., and Liu, Y. (2023). Defense against Adversarial Patch Attacks for Aerial Image Semantic Segmentation by Robust Feature Extraction. Remote Sens., 15.","DOI":"10.3390\/rs15061690"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Rasol, J., Xu, Y., Zhang, Z., Zhang, F., Feng, W., Dong, L., Hui, T., and Tao, C. (2023). An Adaptive Adversarial Patch-Generating Algorithm for Defending against the Intelligent Low, Slow, and Small Target. Remote Sens., 15.","DOI":"10.3390\/rs15051439"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Wang, Z., Wang, B., Liu, Y., and Guo, J. (2023). Global Feature Attention Network: Addressing the Threat of Adversarial Attack for Aerial Image Semantic Segmentation. Remote Sens., 15.","DOI":"10.3390\/rs15051325"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Carlini, N., and Wagner, D. (2017, January 22\u201326). Towards Evaluating the Robustness of Neural Networks. Proceedings of the 2017 IEEE Symposium on Security and Privacy, San Jose, CA, USA.","DOI":"10.1109\/SP.2017.49"},{"key":"ref_54","first-page":"4010005","article-title":"Fast C&W: A Fast Adversarial Attack Algorithm to Fool SAR Target Recognition with Deep Convolutional Neural Networks","volume":"19","author":"Du","year":"2021","journal-title":"IEEE Geosci. Remote Sens. Lett."},{"key":"ref_55","unstructured":"Krizhevsky, A., Sutskever, I., and Hinton, G.E. (2012, January 3\u20136). Imagenet Classification with Deep Convolutional Neural Networks. Proceedings of the Advances in Neural Information Processing Systems 25: 26th Annual Conference on Neural Information Processing Systems, Lake Tahoe, NV, USA."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., and Sun, J. (2016, January 27\u201330). Deep Residual Learning for Image Recognition. Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Van Der Maaten, L., and Weinberger, K.Q. (2017, January 21\u201326). Densely Connected Convolutional Networks. Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Radosavovic, I., Kosaraju, R.P., Girshick, R., He, K., and Doll\u00e1r, P. (2020, January 13\u201319). Designing Network Design Spaces. Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.01044"},{"key":"ref_59","unstructured":"Simonyan, K., and Zisserman, A. (2015, January 7\u20139). Very Deep Convolutional Networks for Large-Scale Image Recognition. Proceedings of the 3rd International Conference on Learning Representations, San Diego, CA, USA."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., and Wojna, Z. (2016, January 27\u201330). Rethinking the Inception Architecture for Computer Vision. Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.308"}],"container-title":["Remote Sensing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2072-4292\/15\/10\/2699\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:40:14Z","timestamp":1760125214000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2072-4292\/15\/10\/2699"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,22]]},"references-count":60,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2023,5]]}},"alternative-id":["rs15102699"],"URL":"https:\/\/doi.org\/10.3390\/rs15102699","relation":{},"ISSN":["2072-4292"],"issn-type":[{"value":"2072-4292","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,22]]}}}