{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T10:58:34Z","timestamp":1774522714898,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T00:00:00Z","timestamp":1771286400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T00:00:00Z","timestamp":1771286400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62466017\uff0c62066014"],"award-info":[{"award-number":["62466017\uff0c62066014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004479","name":"Natural Science Foundation of Jiangxi Province","doi-asserted-by":"crossref","award":["20232ACB202013"],"award-info":[{"award-number":["20232ACB202013"]}],"id":[{"id":"10.13039\/501100004479","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s13042-026-02988-8","type":"journal-article","created":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T11:16:25Z","timestamp":1771326985000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Improved three-way cluster oversampling method\u2014TWKO"],"prefix":"10.1007","volume":"17","author":[{"given":"Yueyang","family":"Wu","sequence":"first","affiliation":[]},{"given":"Jin","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Yongting","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Wentao","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,17]]},"reference":[{"issue":"8","key":"2988_CR1","doi-asserted-by":"publisher","first-page":"5059","DOI":"10.1016\/j.jksuci.2022.06.005","volume":"34","author":"A Arafa","year":"2022","unstructured":"Arafa A, El-Fishawy N, Badawy M et al (2022) Rn-smote: reduced noise smote based on dbscan for enhancing imbalanced data classification. J King Saud Univ-Comput Inform Sci 34(8):5059\u20135074. https:\/\/doi.org\/10.1016\/j.jksuci.2022.06.005","journal-title":"J King Saud Univ-Comput Inform Sci"},{"key":"2988_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45:5\u201332. https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach Learn"},{"key":"2988_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.111066","volume":"150","author":"W Cai","year":"2024","unstructured":"Cai W, Cai M, Li Q et al (2024) Three-way imbalanced learning based on fuzzy twin svm. Appl Soft Comput 150:111066. https:\/\/doi.org\/10.1016\/j.asoc.2023.111066","journal-title":"Appl Soft Comput"},{"key":"2988_CR4","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1007\/0-387-25465-X_40","volume-title":"Data mining for imbalanced datasets: an overview","author":"NV Chawla","year":"2005","unstructured":"Chawla NV (2005) Data mining for imbalanced datasets: an overview. Springer US, Boston, pp 853\u2013867. https:\/\/doi.org\/10.1007\/0-387-25465-X_40"},{"key":"2988_CR5","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.neucom.2022.05.017","volume":"498","author":"Q Chen","year":"2022","unstructured":"Chen Q, Zhang ZL, Huang WP et al (2022) Pf-smote: a novel parameter-free smote for imbalanced datasets. Neurocomputing 498:75\u201388. https:\/\/doi.org\/10.1016\/j.neucom.2022.05.017","journal-title":"Neurocomputing"},{"key":"2988_CR6","doi-asserted-by":"publisher","unstructured":"Chen T, Guestrin C (2016) Xgboost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, p 785\u2013794, https:\/\/doi.org\/10.1145\/2939672.2939785","DOI":"10.1145\/2939672.2939785"},{"issue":"1","key":"2988_CR7","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TIT.1967.1053964","volume":"13","author":"T Cover","year":"1967","unstructured":"Cover T, Hart P (1967) Nearest neighbor pattern classification. IEEE Trans Inf Theory 13(1):21\u201327. https:\/\/doi.org\/10.1109\/TIT.1967.1053964","journal-title":"IEEE Trans Inf Theory"},{"key":"2988_CR8","unstructured":"Elkan C (2001) The foundations of cost-sensitive learning. In: Proceedings of the 17th International Joint Conference on artificial intelligence-Volume 2. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, IJCAI\u201901, p 973\u2013978"},{"issue":"5","key":"2988_CR9","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1214\/AOS\/1013203451","volume":"29","author":"JH Friedman","year":"2001","unstructured":"Friedman JH (2001) Greedy function approximation: a gradient boosting machine. Ann Stat 29(5):1189\u20131232. https:\/\/doi.org\/10.1214\/AOS\/1013203451","journal-title":"Ann Stat"},{"issue":"4","key":"2988_CR10","first-page":"42","volume":"2","author":"V Ganganwar","year":"2012","unstructured":"Ganganwar V (2012) An overview of classification algorithms for imbalanced datasets. Int J Emerg Technol Adv Eng 2(4):42\u201347","journal-title":"Int J Emerg Technol Adv Eng"},{"key":"2988_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110986","volume":"150","author":"J Guo","year":"2024","unstructured":"Guo J, Wu H, Chen X et al (2024) Adaptive sv-borderline smote-svm algorithm for imbalanced data classification. Appl Soft Comput 150:110986. https:\/\/doi.org\/10.1016\/j.asoc.2023.110986","journal-title":"Appl Soft Comput"},{"key":"2988_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.125233","volume":"258","author":"Y Guo","year":"2024","unstructured":"Guo Y, Sun B, Bai J et al (2024) A new portfolio approach integrating three-way decision and encoder\u2013decoder network. Expert Syst Appl 258:125233. https:\/\/doi.org\/10.1016\/j.eswa.2024.125233","journal-title":"Expert Syst Appl"},{"key":"2988_CR13","doi-asserted-by":"publisher","unstructured":"Han H, Wang WY, Mao BH (2005) Borderline-smote: a new over-sampling method in imbalanced data sets learning. In: International Conference on intelligent computing, Springer, pp 878\u2013887, https:\/\/doi.org\/10.1007\/11538059_91","DOI":"10.1007\/11538059_91"},{"key":"2988_CR14","doi-asserted-by":"publisher","unstructured":"He H, Bai Y, Garcia EA, et\u00a0al (2008) Adasyn: Adaptive synthetic sampling approach for imbalanced learning. In: 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence), pp 1322\u20131328, https:\/\/doi.org\/10.1109\/IJCNN.2008.4633969","DOI":"10.1109\/IJCNN.2008.4633969"},{"issue":"4","key":"2988_CR15","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/5254.708428","volume":"13","author":"M Hearst","year":"1998","unstructured":"Hearst M, Dumais S, Osuna E et al (1998) Support vector machines. IEEE Intell Syst Appl 13(4):18\u201328. https:\/\/doi.org\/10.1109\/5254.708428","journal-title":"IEEE Intell Syst Appl"},{"key":"2988_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111368","volume":"154","author":"H Huang","year":"2024","unstructured":"Huang H, Liu B, Xue X et al (2024) Imbalanced credit card fraud detection data: a solution based on hybrid neural network and clustering-based undersampling technique. Appl Soft Comput 154:111368. https:\/\/doi.org\/10.1016\/j.asoc.2024.111368","journal-title":"Appl Soft Comput"},{"key":"2988_CR17","doi-asserted-by":"publisher","unstructured":"Japkowicz N, et\u00a0al (2000) Learning from imbalanced data sets: a comparison of various strategies. In: AAAI workshop on learning from imbalanced data sets, AAAI Press Menlo Park, pp 10\u201315, https:\/\/doi.org\/10.1007\/978-3-319-98074-4","DOI":"10.1007\/978-3-319-98074-4"},{"key":"2988_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-024-10337-6","author":"M Jerbi","year":"2024","unstructured":"Jerbi M, Dagdia ZC, Bechikh S et al (2024) Cognitively inspired three-way decision making and bi-level evolutionary optimization for mobile cybersecurity threats detection: A case study on android malware. Cogn Comput. https:\/\/doi.org\/10.1007\/s12559-024-10337-6","journal-title":"Cogn Comput"},{"issue":"12","key":"2988_CR19","doi-asserted-by":"publisher","first-page":"5105","DOI":"10.1016\/j.matpr.2021.07.270","volume":"16","author":"S Kannimuthu","year":"2019","unstructured":"Kannimuthu S, Bhuvaneshwari K, Bhanu D et al (2019) Performance evaluation of machine learning algorithms for dengue disease prediction. J Comput Theor Nanosci 16(12):5105\u20135110. https:\/\/doi.org\/10.1016\/j.matpr.2021.07.270","journal-title":"J Comput Theor Nanosci"},{"key":"2988_CR20","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.ins.2018.06.056","volume":"501","author":"F Last","year":"2019","unstructured":"Last F, Douzas G, Ba\u00e7\u00e3o F (2019) Oversampling for imbalanced learning based on k-means and smote. Inf Sci 501:118\u2013135. https:\/\/doi.org\/10.1016\/j.ins.2018.06.056","journal-title":"Inf Sci"},{"issue":"5","key":"2988_CR21","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1080\/00207721.2012.748105","volume":"45","author":"H Li","year":"2014","unstructured":"Li H, Yu JL, Yu LA et al (2014) The clustering-based case-based reasoning for imbalanced business failure prediction: a hybrid approach through integrating unsupervised process with supervised process. Int J Syst Sci 45(5):1225\u20131241. https:\/\/doi.org\/10.1080\/00207721.2012.748105","journal-title":"Int J Syst Sci"},{"key":"2988_CR22","doi-asserted-by":"publisher","first-page":"110867","DOI":"10.1016\/j.patcog.2024.110867","volume":"157","author":"T Li","year":"2025","unstructured":"Li T, Qiao J (2025) A novel q-rung orthopair fuzzy magdm method for healthcare waste treatment based on three-way decisions. Pattern Recogn 157:110867\u2013110867. https:\/\/doi.org\/10.1016\/j.patcog.2024.110867","journal-title":"Pattern Recogn"},{"key":"2988_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111695","volume":"160","author":"W Li","year":"2024","unstructured":"Li W, Wang X, Yang B (2024) Three-way decisions with dual hesitant fuzzy covering-based rough set and their applications in medical diagnosis. Appl Soft Comput 160:111695. https:\/\/doi.org\/10.1016\/j.asoc.2024.111695","journal-title":"Appl Soft Comput"},{"key":"2988_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.112127","volume":"165","author":"Y Li","year":"2024","unstructured":"Li Y, Gao F, Sha M et al (2024) Sequential three-way decision with automatic threshold learning for credit risk prediction. Appl Soft Comput 165:112127. https:\/\/doi.org\/10.1016\/j.asoc.2024.112127","journal-title":"Appl Soft Comput"},{"key":"2988_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116051","volume":"188","author":"D Liang","year":"2022","unstructured":"Liang D, Yi B, Cao W et al (2022) Exploring ensemble oversampling method for imbalanced keyword extraction learning in policy text based on three-way decisions and smote. Expert Syst Appl 188:116051. https:\/\/doi.org\/10.1016\/j.eswa.2021.116051","journal-title":"Expert Syst Appl"},{"key":"2988_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110978","volume":"149","author":"P Liang","year":"2023","unstructured":"Liang P, Cao W, Hu J (2023) A sequential three-way classification model based on risk preference and decision correction. Appl Soft Comput 149:110978. https:\/\/doi.org\/10.1016\/j.asoc.2023.110978","journal-title":"Appl Soft Comput"},{"key":"2988_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105845","volume":"196","author":"X Liang","year":"2020","unstructured":"Liang X, Jiang A, Li T et al (2020) Lr-smote\u2014an improved unbalanced data set oversampling based on k-means and svm. Knowl-Based Syst 196:105845. https:\/\/doi.org\/10.1016\/j.knosys.2020.105845","journal-title":"Knowl-Based Syst"},{"key":"2988_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.121193","volume":"686","author":"LCM Liaw","year":"2025","unstructured":"Liaw LCM, Tan SC, Goh PY et al (2025) A histogram smote-based sampling algorithm with incremental learning for imbalanced data classification. Inf Sci 686:121193. https:\/\/doi.org\/10.1016\/j.ins.2024.121193","journal-title":"Inf Sci"},{"key":"2988_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.108618","volume":"120","author":"D Meng","year":"2022","unstructured":"Meng D, Li Y (2022) An imbalanced learning method by combining smote with center offset factor. Appl Soft Comput 120:108618. https:\/\/doi.org\/10.1016\/j.asoc.2022.108618","journal-title":"Appl Soft Comput"},{"issue":"1","key":"2988_CR30","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"VC Nitesh","year":"2002","unstructured":"Nitesh VC (2002) Smote: synthetic minority over-sampling technique. J Artif Intell Res 16(1):321. https:\/\/doi.org\/10.1613\/jair.953","journal-title":"J Artif Intell Res"},{"key":"2988_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111538","volume":"157","author":"M Pang","year":"2024","unstructured":"Pang M, Wang F, Li Z (2024) Credit risk prediction based on an interpretable three-way decision method: evidence from Chinese smes. Appl Soft Comput 157:111538. https:\/\/doi.org\/10.1016\/j.asoc.2024.111538","journal-title":"Appl Soft Comput"},{"key":"2988_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122343","volume":"239","author":"J Qian","year":"2024","unstructured":"Qian J, Jiang H, Yu Y et al (2024) Multi-level personalized k-anonymity privacy-preserving model based on sequential three-way decisions. Expert Syst Appl 239:122343. https:\/\/doi.org\/10.1016\/j.eswa.2023.122343","journal-title":"Expert Syst Appl"},{"key":"2988_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.120487","volume":"667","author":"J Qian","year":"2024","unstructured":"Qian J, Wang D, Yu Y et al (2024) E3wd: a three-way decision model based on ensemble learning. Inf Sci 667:120487. https:\/\/doi.org\/10.1016\/j.ins.2024.120487","journal-title":"Inf Sci"},{"key":"2988_CR34","doi-asserted-by":"publisher","first-page":"121316","DOI":"10.1016\/j.ins.2024.121316","volume":"686","author":"J Qian","year":"2025","unstructured":"Qian J, Zheng M, Yu Y et al (2025) A dynamic anonymization privacy-preserving model based on hierarchical sequential three-way decisions. Inf Sci 686:121316\u2013121316. https:\/\/doi.org\/10.1016\/j.ins.2024.121316","journal-title":"Inf Sci"},{"key":"2988_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiolchem.2020.107233","volume":"85","author":"H Rawashdeh","year":"2020","unstructured":"Rawashdeh H, Awawdeh S, Shannag F et al (2020) Intelligent system based on data mining techniques for prediction of preterm birth for women with cervical cerclage. Comput Biol Chem 85:107233. https:\/\/doi.org\/10.1016\/j.compbiolchem.2020.107233","journal-title":"Comput Biol Chem"},{"key":"2988_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117023","volume":"200","author":"F Sa\u011flam","year":"2022","unstructured":"Sa\u011flam F, Cengiz MA (2022) A novel smote-based resampling technique trough noise detection and the boosting procedure. Expert Syst Appl 200:117023. https:\/\/doi.org\/10.1016\/j.eswa.2022.117023","journal-title":"Expert Syst Appl"},{"issue":"1","key":"2988_CR37","doi-asserted-by":"publisher","first-page":"5152","DOI":"10.1038\/s41598-024-55598-1","volume":"14","author":"AR Salehi","year":"2024","unstructured":"Salehi AR, Khedmati M (2024) A cluster-based smote both-sampling (csbboost) ensemble algorithm for classifying imbalanced data. Sci Rep 14(1):5152. https:\/\/doi.org\/10.1038\/s41598-024-55598-1","journal-title":"Sci Rep"},{"issue":"8","key":"2988_CR38","doi-asserted-by":"publisher","first-page":"2847","DOI":"10.1109\/TNNLS.2018.2884444","volume":"31","author":"T Shu","year":"2018","unstructured":"Shu T, Zhang B, Tang YY (2018) Sparse supervised representation-based classifier for uncontrolled and imbalanced classification. IEEE Trans Neural Netw Learn Syst 31(8):2847\u20132856. https:\/\/doi.org\/10.1109\/TNNLS.2018.2884444","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"2988_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.128492","volume":"609","author":"P Sun","year":"2024","unstructured":"Sun P, Du Y, Xiong S (2024) Nearest neighbors and density-based undersampling for imbalanced data classification with class overlap. Neurocomputing 609:128492. https:\/\/doi.org\/10.1016\/j.neucom.2024.128492","journal-title":"Neurocomputing"},{"issue":"11","key":"2988_CR40","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1109\/TSMC.1976.4309452","volume":"SMC\u20136","author":"I Tomek","year":"1976","unstructured":"Tomek I (1976) Two modifications of cnn. IEEE Trans Syst Man Cybern SMC\u20136(11):769\u2013772. https:\/\/doi.org\/10.1109\/TSMC.1976.4309452","journal-title":"IEEE Trans Syst Man Cybern"},{"issue":"1","key":"2988_CR41","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/s10489-022-03394-7","volume":"53","author":"X Wang","year":"2023","unstructured":"Wang X, Gong J, Song Y et al (2023) Adaptively weighted three-way decision oversampling: a cluster imbalanced-ratio based approach. Appl Intell 53(1):312\u2013335. https:\/\/doi.org\/10.1007\/s10489-022-03394-7","journal-title":"Appl Intell"},{"issue":"3","key":"2988_CR42","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1109\/TSMC.1972.4309137","volume":"SMC\u20132","author":"DL Wilson","year":"1972","unstructured":"Wilson DL (1972) Asymptotic properties of nearest neighbor rules using edited data. IEEE Trans Syst Man Cybern SMC\u20132(3):408\u2013421. https:\/\/doi.org\/10.1109\/TSMC.1972.4309137","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"2988_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111824","volume":"162","author":"Y Xiao","year":"2024","unstructured":"Xiao Y, Ma X, Alcantud JCR et al (2024) A group consensus method based on social network and three-way decision under multi-scale information systems. Appl Soft Comput 162:111824. https:\/\/doi.org\/10.1016\/j.asoc.2024.111824","journal-title":"Appl Soft Comput"},{"issue":"3","key":"2988_CR44","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/j.ins.2009.09.021","volume":"180","author":"Y Yao","year":"2010","unstructured":"Yao Y (2010) Three-way decisions with probabilistic rough sets. Inf Sci 180(3):341\u2013353. https:\/\/doi.org\/10.1016\/j.ins.2009.09.021","journal-title":"Inf Sci"},{"key":"2988_CR45","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.ins.2022.02.038","volume":"595","author":"A Zhang","year":"2022","unstructured":"Zhang A, Yu H, Huan Z et al (2022) Smote-rknn: a hybrid re-sampling method based on smote and reverse k-nearest neighbors. Inf Sci 595:70\u201388. https:\/\/doi.org\/10.1016\/j.ins.2022.02.038","journal-title":"Inf Sci"},{"key":"2988_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106526","volume":"212","author":"Q Zhang","year":"2021","unstructured":"Zhang Q, Huang Z, Wang G (2021) A novel sequential three-way decision model with autonomous error correction. Knowl-Based Syst 212:106526. https:\/\/doi.org\/10.1016\/j.knosys.2020.106526","journal-title":"Knowl-Based Syst"},{"issue":"10","key":"2988_CR47","doi-asserted-by":"publisher","first-page":"4742","DOI":"10.1109\/TNNLS.2020.3017528","volume":"32","author":"W Zhang","year":"2020","unstructured":"Zhang W, Chen Y, Yang W et al (2020) Class-variant margin normalized softmax loss for deep face recognition. IEEE Trans Neural Netw Learn Syst 32(10):4742\u20134747. https:\/\/doi.org\/10.1109\/TNNLS.2020.3017528","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"2988_CR48","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.asoc.2013.07.016","volume":"14","author":"M Zi\u0119ba","year":"2014","unstructured":"Zi\u0119ba M, Tomczak JM, Lubicz M et al (2014) Boosted svm for extracting rules from imbalanced data in application to prediction of the post-operative life expectancy in the lung cancer patients. Appl Soft Comput 14:99\u2013108. https:\/\/doi.org\/10.1016\/j.asoc.2013.07.016","journal-title":"Appl Soft Comput"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-026-02988-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-026-02988-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-026-02988-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T10:01:28Z","timestamp":1774519288000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-026-02988-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,17]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["2988"],"URL":"https:\/\/doi.org\/10.1007\/s13042-026-02988-8","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,17]]},"assertion":[{"value":"6 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The research is supported by the National Natural Science Foundation of China under Grant Nos. 62466017, Double Thousand Plan of Jiangxi Province of China, Jiangxi Province Natural Science Foundation of China under Grant Nos. 20232ACB202013.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Acknowledgments"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"132"}}