{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T15:33:55Z","timestamp":1725464035793},"reference-count":71,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2022,3,22]],"date-time":"2022-03-22T00:00:00Z","timestamp":1647907200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,22]],"date-time":"2022-03-22T00:00:00Z","timestamp":1647907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s11042-022-12900-5","type":"journal-article","created":{"date-parts":[[2022,3,22]],"date-time":"2022-03-22T22:02:16Z","timestamp":1647986536000},"page":"25029-25050","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Privacy-preserving federated learning for scalable and high data quality computational-intelligence-as-a-service in Society 5.0"],"prefix":"10.1007","volume":"81","author":[{"given":"Amirhossein","family":"Peyvandi","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6309-6407","authenticated-orcid":false,"given":"Babak","family":"Majidi","sequence":"additional","affiliation":[]},{"given":"Soodeh","family":"Peyvandi","sequence":"additional","affiliation":[]},{"given":"Jagdish C.","family":"Patra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,22]]},"reference":[{"key":"12900_CR1","doi-asserted-by":"crossref","unstructured":"Abbasi MH et al (2019) Deep visual privacy preserving for internet of robotic things. In: 2019 5th conference on knowledge based engineering and innovation (KBEI). IEEE","DOI":"10.1109\/KBEI.2019.8735033"},{"key":"12900_CR2","volume-title":"2018 9th IFIP international conference on new technologies, mobility and security (NTMS)","author":"T Abdellatif","year":"2018","unstructured":"Abdellatif T, Brousmiche K-L (2018) Formal verification of smart contracts based on users and blockchain behaviors models. In: 2018 9th IFIP international conference on new technologies, mobility and security (NTMS). IEEE"},{"key":"12900_CR3","doi-asserted-by":"publisher","first-page":"140699","DOI":"10.1109\/ACCESS.2020.3013541","volume":"8","author":"M Aledhari","year":"2020","unstructured":"Aledhari M, Razzak R, Parizi RM, Saeed F (2020) Federated learning: a survey on enabling technologies, protocols, and applications. IEEE Access 8:140699\u2013140725","journal-title":"IEEE Access"},{"key":"12900_CR4","volume-title":"International symposium on leveraging applications of formal methods","author":"L Alt","year":"2018","unstructured":"Alt L, Reitwie\u00dfner C (2018) SMT-based verification of solidity smart contracts. In: International symposium on leveraging applications of formal methods. Springer"},{"key":"12900_CR5","doi-asserted-by":"crossref","unstructured":"Bai X et al 2018 Formal modeling and verification of smart contracts. In: Proceedings of the 2018 7th International Conference on Software and Computer Applications","DOI":"10.1145\/3185089.3185138"},{"issue":"8","key":"12900_CR6","doi-asserted-by":"publisher","first-page":"723","DOI":"10.3390\/e21080723","volume":"21","author":"A Baldominos","year":"2019","unstructured":"Baldominos A, Saez Y (2019) Coin. AI: A proof-of-useful-work scheme for blockchain-based distributed deep learning. Entropy 21(8):723","journal-title":"Entropy"},{"key":"12900_CR7","doi-asserted-by":"crossref","unstructured":"Beillahi SM et al (2020) Behavioral simulation for smart contracts. In: Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation","DOI":"10.1145\/3385412.3386022"},{"key":"12900_CR8","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-319-25527-9_11","volume-title":"Programming languages with applications to biology and security","author":"G Bigi","year":"2015","unstructured":"Bigi G et al (2015) Validation of decentralised smart contracts through game theory and formal methods. In: Programming languages with applications to biology and security. Springer, pp 142\u2013161"},{"key":"12900_CR9","unstructured":"Blanchard P et al (2017) Machine learning with adversaries: Byzantine tolerant gradient descent. In: Proceedings of the 31st International Conference on Neural Information Processing Systems"},{"key":"12900_CR10","unstructured":"Borkowski AA et al (2019) Lung and colon cancer histopathological image dataset (lc25000). arXiv preprint arXiv:1912.12142"},{"issue":"3","key":"12900_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2633600","volume":"6","author":"Z Brakerski","year":"2014","unstructured":"Brakerski Z, Gentry C, Vaikuntanathan V (2014) (Leveled) fully homomorphic encryption without bootstrapping. ACM Trans Comput Theory 6(3):1\u201336","journal-title":"ACM Trans Comput Theory"},{"key":"12900_CR12","doi-asserted-by":"crossref","unstructured":"Briggs C, Fan Z, Andras P (2021) A review of privacy-preserving federated learning for the internet-of-things. Federated Learning Systems, p 21\u201350","DOI":"10.1007\/978-3-030-70604-3_2"},{"key":"12900_CR13","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.ijmedinf.2018.01.007","volume":"112","author":"TS Brisimi","year":"2018","unstructured":"Brisimi TS, Chen R, Mela T, Olshevsky A, Paschalidis IC, Shi W (2018) Federated learning of predictive models from federated electronic health records. Int J Med Inform 112:59\u201367","journal-title":"Int J Med Inform"},{"key":"12900_CR14","first-page":"139","volume":"4","author":"J Cabrero-Holgueras","year":"2021","unstructured":"Cabrero-Holgueras J, Pastrana S (2021) SoK: privacy-preserving computation techniques for deep learning. Proc Priv Enh Technol 4:139\u2013162","journal-title":"Proc Priv Enh Technol"},{"key":"12900_CR15","unstructured":"Dias JP et al (2018) Blockchain for access control in e-health scenarios. arXiv preprint arXiv:1805.12267"},{"issue":"3\u20134","key":"12900_CR16","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork C, Roth A (2014) The algorithmic foundations of differential privacy. Found Trends Theor Comput Sci 9(3\u20134):211\u2013407","journal-title":"Found Trends Theor Comput Sci"},{"key":"12900_CR17","unstructured":"Entriken W. Introduction to smart contracts. [cited 2020 November 30]; Available from: https:\/\/ethereum.org\/en\/developers\/docs\/smart-contracts\/."},{"key":"12900_CR18","doi-asserted-by":"publisher","first-page":"10354","DOI":"10.1007\/s11227-020-03251-9","volume":"76","author":"A Fadaeddini","year":"2020","unstructured":"Fadaeddini A, Majidi B, Eshghi M (2020) Secure decentralized peer-to-peer training of deep neural networks based on distributed ledger technology. J Supercomput 76:10354\u201310368","journal-title":"J Supercomput"},{"key":"12900_CR19","unstructured":"Ganache. [cited 2020 December 17]; Available from: https:\/\/www.trufflesuite.com\/ganache."},{"key":"12900_CR20","unstructured":"Ge S et al (2020) Fedner: Privacy-preserving medical named entity recognition with federated learning. arXiv preprint arXiv:2003.09288"},{"key":"12900_CR21","doi-asserted-by":"crossref","unstructured":"Gilad Y et al ( 2017) Algorand: scaling byzantine agreements for cryptocurrencies. In: Proceedings of the 26th symposium on operating systems principles","DOI":"10.1145\/3132747.3132757"},{"key":"12900_CR22","doi-asserted-by":"crossref","unstructured":"Goel A et al (2019) DeepRing: protecting deep neural network with blockchain. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops","DOI":"10.1109\/CVPRW.2019.00341"},{"key":"12900_CR23","volume-title":"Working conference on verified software: theories, tools, and experiments","author":"\u00c1 Hajdu","year":"2019","unstructured":"Hajdu \u00c1, Jovanovi\u0107 D (2019) Solc-verify: a modular verifier for solidity smart contracts. In: Working conference on verified software: theories, tools, and experiments. Springer"},{"key":"12900_CR24","doi-asserted-by":"publisher","first-page":"65439","DOI":"10.1109\/ACCESS.2018.2876971","volume":"6","author":"HR Hasan","year":"2018","unstructured":"Hasan HR, Salah K (2018) Proof of delivery of digital assets using blockchain and smart contracts. IEEE Access 6:65439\u201365448","journal-title":"IEEE Access"},{"key":"12900_CR25","doi-asserted-by":"crossref","unstructured":"Hitaj B, Ateniese G, Perez-Cruz F (2017) Deep models under the GAN: information leakage from collaborative deep learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","DOI":"10.1145\/3133956.3134012"},{"key":"12900_CR26","unstructured":"Infura. [cited 2020 December 15]; Available from: https:\/\/infura.io\/."},{"key":"12900_CR27","unstructured":"Kim JMJ (2014) Stellar. Available from: https:\/\/www.stellar.org\/"},{"issue":"6","key":"12900_CR28","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1038\/s42256-020-0186-1","volume":"2","author":"GA Kaissis","year":"2020","unstructured":"Kaissis GA, Makowski MR, R\u00fcckert D, Braren RF (2020) Secure, privacy-preserving and federated machine learning in medical imaging. Nat Mach Intell 2(6):305\u2013311","journal-title":"Nat Mach Intell"},{"key":"12900_CR29","unstructured":"Karki D. Can you guess how much data is generated every day? [cited 2021 Januray 7]; Available from: https:\/\/www.takeo.ai\/can-you-guess-how-much-data-is-generated-every-day\/"},{"key":"12900_CR30","doi-asserted-by":"crossref","unstructured":"Kasiviswanathan SP, Smith A (2014) On the'semantics' of differential privacy: a bayesian formulation. J Priv Confid 6(1)","DOI":"10.29012\/jpc.v6i1.634"},{"key":"12900_CR31","unstructured":"Keccak. Keccak Team. [cited 2021 August 28th]; Available from: https:\/\/keccak.team\/keccak.html."},{"key":"12900_CR32","unstructured":"Keydana. RStudio AI Blog: Hacking deep learning: model inversion attack by example. [cited 2020 December 14]; Available from: https:\/\/blogs.rstudio.com\/tensorflow\/posts\/2020-05-15-model-inversion-attacks\/."},{"issue":"3","key":"12900_CR33","doi-asserted-by":"publisher","first-page":"1759","DOI":"10.1109\/COMST.2021.3090430","volume":"23","author":"LU Khan","year":"2021","unstructured":"Khan LU, Saad W, Han Z, Hossain E, Hong CS (2021) Federated learning for internet of things: recent advances, taxonomy, and open challenges. IEEE Commun Surv Tutor 23(3):1759\u20131799","journal-title":"IEEE Commun Surv Tutor"},{"key":"12900_CR34","unstructured":"Kone\u010dn\u00fd J et al (2016) Federated optimization: distributed machine learning for on-device intelligence. arXiv preprint arXiv:1610.02527"},{"key":"12900_CR35","unstructured":"Kovan Testnet. [cited 2020 December 15]; Available from: https:\/\/kovan-testnet.github.io\/website\/."},{"key":"12900_CR36","unstructured":"Kumar R et al (2021) Blockchain based privacy-preserved federated learning for medical images: a case study of COVID-19 CT scans"},{"key":"12900_CR37","unstructured":"Kuo T-T, Ohno-Machado L (2018) Modelchain: decentralized privacy-preserving healthcare predictive modeling framework on private blockchain networks. arXiv preprint arXiv:1802.01746"},{"issue":"3","key":"12900_CR38","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2020.2975749","volume":"37","author":"T Li","year":"2020","unstructured":"Li T, Sahu AK, Talwalkar A, Smith V (2020) Federated learning: challenges, methods, and future directions. IEEE Signal Process Mag 37(3):50\u201360","journal-title":"IEEE Signal Process Mag"},{"key":"12900_CR39","unstructured":"Liu B et al (2020) Experiments of federated learning for covid-19 chest x-ray images. arXiv preprint arXiv:2007.05592"},{"key":"12900_CR40","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/978-3-030-52067-0_21","volume-title":"Enabling AI applications in data science","author":"B Majidi","year":"2021","unstructured":"Majidi B et al (2021) Geo-spatiotemporal intelligence for smart agricultural and environmental eco-cyber-physical systems. In: Enabling AI applications in data science. Springer, pp 471\u2013491"},{"key":"12900_CR41","doi-asserted-by":"crossref","unstructured":"Mallaki M, Majidi B, Peyvandi A, Movaghar A (2021) Off-chain management and state-tracking of smart programs on blockchain for secure and efficient decentralized computation. Int J Comput Appl:1\u20138","DOI":"10.1080\/1206212X.2021.1948170"},{"key":"12900_CR42","unstructured":"McMahan B et al (2017) Communication-efficient learning of deep networks from decentralized data. In artificial intelligence and statistics. PMLR"},{"key":"12900_CR43","unstructured":"McMahan HB et al (2018) A general approach to adding differential privacy to iterative training procedures. arXiv preprint arXiv:1812.06210"},{"key":"12900_CR44","unstructured":"Melis L et al (2018) Inference attacks against collaborative learning. arXiv preprint arXiv:1805.04049 13"},{"key":"12900_CR45","doi-asserted-by":"publisher","DOI":"10.1201\/9780429466335","volume-title":"Handbook of applied cryptography","author":"AJ Menezes","year":"2018","unstructured":"Menezes AJ, Van Oorschot PC, Vanstone SA (2018) Handbook of applied cryptography. CRC press"},{"key":"12900_CR46","unstructured":"MetaMask. [cited 2020 December 17]; Available from: https:\/\/metamask.io\/."},{"issue":"24","key":"12900_CR47","doi-asserted-by":"publisher","first-page":"7054","DOI":"10.3390\/su11247054","volume":"11","author":"M Naz","year":"2019","unstructured":"Naz M, al-zahrani FA, Khalid R, Javaid N, Qamar AM, Afzal MK, Shafiq M (2019) A secure data sharing platform using blockchain and interplanetary file system. Sustainability 11(24):7054","journal-title":"Sustainability"},{"issue":"1","key":"12900_CR48","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/JSAC.2020.3036952","volume":"39","author":"HT Nguyen","year":"2021","unstructured":"Nguyen HT, Sehwag V, Hosseinalipour S, Brinton CG, Chiang M, Vincent Poor H (2021) Fast-convergent federated learning. IEEE J Sel Areas Commun 39(1):201\u2013218","journal-title":"IEEE J Sel Areas Commun"},{"key":"12900_CR49","doi-asserted-by":"crossref","unstructured":"Norouzi A, Majidi B, Movaghar A (2018) Reliable and energy-efficient routing for green software defined networking. In: 2018 9th international symposium on telecommunications (IST). IEEE","DOI":"10.1109\/ISTEL.2018.8660986"},{"key":"12900_CR50","doi-asserted-by":"crossref","unstructured":"Peyvandi A et al (2021) Computer-aided-diagnosis as a service on decentralized medical cloud for efficient and rapid emergency response intelligence. N Gener Comput:1\u201324","DOI":"10.1007\/s00354-021-00131-5"},{"key":"12900_CR51","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/978-981-16-3783-4_19","volume-title":"Computational intelligence for covid-19 and future pandemics: emerging applications and strategies","author":"A Peyvandi","year":"2022","unstructured":"Peyvandi A, Majidi B, Peyvandi S (2022) Blockchain-based secure biomedical data-as-a-service for effective internet of health things enabled epidemic management. In: Kose U et al (eds) Computational intelligence for covid-19 and future pandemics: emerging applications and strategies. Springer Singapore, Singapore, pp 405\u2013424"},{"issue":"5","key":"12900_CR52","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1109\/TIFS.2017.2787987","volume":"13","author":"LT Phong","year":"2018","unstructured":"Phong LT, Aono Y, Hayashi T, Wang L, Moriai S (2018) Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans Inf Forensics Secur 13(5):1333\u20131345","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"12900_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1200\/CCI.20.00060","volume":"5","author":"S Rajendran","year":"2021","unstructured":"Rajendran S, Obeid JS, Binol H, D Agostino R Jr, Foley K, Zhang W, Austin P, Brakefield J, Gurcan MN, Topaloglu U (2021) Cloud-based federated learning implementation across medical centers. JCO Clin Cancer Inform 5:1\u201311","journal-title":"JCO Clin Cancer Inform"},{"key":"12900_CR54","unstructured":"Shayan M et al (2018) Biscotti: A ledger for private and secure peer-to-peer machine learning. arXiv preprint arXiv:1811.09904"},{"issue":"1","key":"12900_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-020-69250-1","volume":"10","author":"MJ Sheller","year":"2020","unstructured":"Sheller MJ, Edwards B, Reina GA, Martin J, Pati S, Kotrotsou A, Milchenko M, Xu W, Marcus D, Colen RR, Bakas S (2020) Federated learning in medicine: facilitating multi-institutional collaborations without sharing patient data. Sci Rep 10(1):1\u201312","journal-title":"Sci Rep"},{"key":"12900_CR56","doi-asserted-by":"crossref","unstructured":"Shokri R, Shmatikov V (2015) Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security","DOI":"10.1145\/2810103.2813687"},{"key":"12900_CR57","doi-asserted-by":"crossref","unstructured":"Shokri R et al (2017) Membership inference attacks against machine learning models. In: 2017 IEEE symposium on security and privacy (SP). IEEE","DOI":"10.1109\/SP.2017.41"},{"key":"12900_CR58","unstructured":"Solidity. [cited 2020 December 17]; Available from: https:\/\/docs.soliditylang.org\/en\/v0.5.0\/resources.html."},{"key":"12900_CR59","doi-asserted-by":"crossref","unstructured":"Song C, Ristenpart T, Shmatikov V (2017) Machine learning models that remember too much. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","DOI":"10.1145\/3133956.3134077"},{"key":"12900_CR60","unstructured":"Tan M, Le Q (2019) Efficientnet: rethinking model scaling for convolutional neural networks. In: International conference on machine learning. PMLR"},{"key":"12900_CR61","unstructured":"Truffle Suite. [cited 2020 December 17]; Available from: https:\/\/www.trufflesuite.com\/."},{"key":"12900_CR62","unstructured":"web3.js. [cited 2020 December 17]; Available from: https:\/\/web3js.readthedocs.io\/en\/v1.3.0\/."},{"key":"12900_CR63","doi-asserted-by":"crossref","unstructured":"Weng J et al (2019) Deepchain: Auditable and privacy-preserving deep learning with blockchain-based incentive. IEEE Trans Dependable Secure Comput","DOI":"10.1109\/TDSC.2019.2952332"},{"key":"12900_CR64","doi-asserted-by":"crossref","unstructured":"Yang Z, Lei H (2018) Formal process virtual machine for smart contracts verification. arXiv preprint arXiv:1805.00808","DOI":"10.23940\/ijpe.18.08.p9.17261734"},{"key":"12900_CR65","doi-asserted-by":"crossref","unstructured":"Zhang Y, Van der Schaar M (2012) Reputation-based incentive protocols in crowdsourcing applications. In: 2012 proceedings IEEE INFOCOM. IEEE","DOI":"10.1109\/INFCOM.2012.6195597"},{"key":"12900_CR66","doi-asserted-by":"crossref","unstructured":"Zhang Y et al (2020) The secret revealer: generative model-inversion attacks against deep neural networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"12900_CR67","doi-asserted-by":"publisher","first-page":"106775","DOI":"10.1016\/j.knosys.2021.106775","volume":"216","author":"C Zhang","year":"2021","unstructured":"Zhang C, Xie Y, Bai H, Yu B, Li W, Gao Y (2021) A survey on federated learning. Knowl-Based Syst 216:106775","journal-title":"Knowl-Based Syst"},{"key":"12900_CR68","doi-asserted-by":"crossref","unstructured":"Zhang W, Zhou T, Lu Q, Wang X, Zhu C, Sun H, Wang Z, Lo SK, Wang FY (2021) Dynamic Fusion-based Federated Learning for COVID-19 Detection. IEEE Internet Things J:1","DOI":"10.1109\/JIOT.2021.3056185"},{"issue":"3","key":"12900_CR69","doi-asserted-by":"publisher","first-page":"1817","DOI":"10.1109\/JIOT.2020.3017377","volume":"8","author":"Y Zhao","year":"2020","unstructured":"Zhao Y, Zhao J, Jiang L, Tan R, Niyato D, Li Z, Lyu L, Liu Y (2020) Privacy-preserving blockchain-based federated learning for IoT devices. IEEE Internet Things J 8(3):1817\u20131829","journal-title":"IEEE Internet Things J"},{"key":"12900_CR70","unstructured":"Zhou J et al (2021) A survey on federated learning and its applications for accelerating industrial internet of things. arXiv preprint arXiv:2104.10501"},{"key":"12900_CR71","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/978-3-319-62004-6_2","volume-title":"Differential privacy and applications","author":"T Zhu","year":"2017","unstructured":"Zhu T et al (2017) Preliminary of differential privacy. In: Differential privacy and applications. Springer, pp 7\u201316"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12900-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12900-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12900-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T07:12:41Z","timestamp":1656659561000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12900-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,22]]},"references-count":71,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["12900"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12900-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,22]]},"assertion":[{"value":"11 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}