{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:11:19Z","timestamp":1776442279545,"version":"3.51.2"},"reference-count":106,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2024,10,7]],"date-time":"2024-10-07T00:00:00Z","timestamp":1728259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2025,1,31]]},"abstract":"<jats:p>Identity authentication is the process of verifying one\u2019s identity. Many identity authentication methods have been developed, from the conventional username-password systems to the recent electroencephalography-based authentication. Among them, biometric authentication shows particular importance due to its convenience and wide application in real-world scenarios. Face recognition is one of the most widely used biometric authentication methods, but simultaneously it receives various attacks. To overcome attacks, face presentation attack detection has been intensively studied in the last two decades regarding diverse domains of datasets, evaluation methods, and attack types. In this systematic literature review, we identify and categorise the state-of-the-art approaches in each domain to cover the challenges and solutions in a single place. We provide comparisons of representative methods on widely used datasets, discuss their pros and cons, and hope our insights can inspire future works.<\/jats:p>","DOI":"10.1145\/3687264","type":"journal-article","created":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T10:53:51Z","timestamp":1725274431000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Presentation Attack Detection: A Systematic Literature Review"],"prefix":"10.1145","volume":"57","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3413-6873","authenticated-orcid":false,"given":"Matineh","family":"Pooshideh","sequence":"first","affiliation":[{"name":"Computing, Macquarie University, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5988-5494","authenticated-orcid":false,"given":"Amin","family":"Beheshti","sequence":"additional","affiliation":[{"name":"Computing, Macquarie University, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4312-5682","authenticated-orcid":false,"given":"Yuankai","family":"Qi","sequence":"additional","affiliation":[{"name":"Computing, Macquarie University, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8213-2338","authenticated-orcid":false,"given":"Helia","family":"Farhood","sequence":"additional","affiliation":[{"name":"Computing, Macquarie University, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7398-7686","authenticated-orcid":false,"given":"Mike","family":"Simpson","sequence":"additional","affiliation":[{"name":"Locii Innovation Pty Ltd, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7132-3671","authenticated-orcid":false,"given":"Nick","family":"Gatland","sequence":"additional","affiliation":[{"name":"Locii Innovation Pty Ltd, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3371-2735","authenticated-orcid":false,"given":"Mehdi","family":"Soltany","sequence":"additional","affiliation":[{"name":"Locii Innovation Pty Ltd, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2024,10,7]]},"reference":[{"key":"e_1_3_3_2_2","unstructured":"2021. What is the Difference between Validation Verification and ... - Experian. Retrieved September 16 2024 from https:\/\/www.experian.co.uk\/blogs\/latest-thinking\/fraud-prevention\/what-is-the-difference-between-validation-verification-and-authentication\/"},{"key":"e_1_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791171"},{"key":"e_1_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/IDAP.2017.8090202"},{"key":"e_1_3_3_5_2","unstructured":"Mustafa Alahmid. 2020. Face Recognition System and Calculating FRR Far and EER for Biometric System Evaluation + Code. Retrieved September 16 2024 from https:\/\/medium.com\/@mustafaazzurri\/face-recognition-system-and-calculating-frrfar-and-eer-for-biometric-system-evaluation-code-2ac2bd4fd2e5"},{"key":"e_1_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117503"},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3046505"},{"key":"e_1_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2729161"},{"key":"e_1_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB48548.2020.9304935"},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2013.23"},{"key":"e_1_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"e_1_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2017.77"},{"key":"e_1_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10041-1"},{"key":"e_1_3_3_14_2","unstructured":"Cordenne Brewste. 2019. Applications of Facial Recognition Technology. Retrieved September 16 2024 from https:\/\/www.trio.dev\/blog\/facial-recognition-applications"},{"key":"e_1_3_3_15_2","unstructured":"Saptarshi Chakraborty and Dhrubajyoti Das. 2014. An overview of face liveness detection. arXiv:1405.2227. Retrieved from https:\/\/arxiv.org\/abs\/1405.2227"},{"key":"e_1_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2022.104428"},{"key":"e_1_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2955383"},{"key":"e_1_3_3_18_2","first-page":"1","volume-title":"Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG\u201912)","author":"Chingovska Ivana","year":"2012","unstructured":"Ivana Chingovska, Andr\u00e9 Anjos, and S\u00e9bastien Marcel. 2012. On the effectiveness of local binary patterns in face anti-spoofing. In Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG\u201912). IEEE, 1\u20137."},{"key":"e_1_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92627-8_20"},{"key":"e_1_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/BIOSIG.2016.7736936"},{"key":"e_1_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612981"},{"key":"e_1_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199761"},{"key":"e_1_3_3_23_2","unstructured":"Jeanette Dorazio. 2022. Council Post: Growing an Online Business: More than having the Right Digital Tools. Retrieved September 16 2024 from https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2021\/12\/13\/growing-an-online-business-more-than-having-the-right-digital-tools\/?sh=61b074c8700d"},{"key":"e_1_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107696"},{"key":"e_1_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08115-w"},{"key":"e_1_3_3_26_2","first-page":"121","volume-title":"Proceedings of the Asian Conference on Computer Vision","author":"Pereira Tiago de Freitas","year":"2012","unstructured":"Tiago de Freitas Pereira, Andr\u00e9 Anjos, Jos\u00e9 Mario De Martino, and S\u00e9bastien Marcel. 2012. LBP- TOP based countermeasure against face spoofing attacks. In Proceedings of the Asian Conference on Computer Vision. Springer, 121\u2013132."},{"issue":"1","key":"e_1_3_3_27_2","first-page":"1","article-title":"Face liveness detection using dynamic texture","volume":"2014","author":"Pereira Tiago de Freitas","year":"2014","unstructured":"Tiago de Freitas Pereira, Jukka Komulainen, Andr\u00e9 Anjos, Jos\u00e9 Mario De Martino, Abdenour Hadid, Matti Pietik\u00e4inen, and S\u00e9bastien Marcel. 2014. Face liveness detection using dynamic texture. EURASIP Journal on Image and Video Processing 2014, 1 (2014), 1\u201315.","journal-title":"EURASIP Journal on Image and Video Processing"},{"key":"e_1_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3013214"},{"key":"e_1_3_3_29_2","volume-title":"Proceedings of the Visual Impairment and Blindness-What We Know and What We Have to Know","author":"Guennouni Souhail","year":"2019","unstructured":"Souhail Guennouni, Anass Mansouri, and Ali Ahaitouf. 2019. Biometric systems and their applications. In Proceedings of the Visual Impairment and Blindness-What We Know and What We Have to Know. IntechOpen."},{"key":"e_1_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12008-021-00760-6"},{"key":"e_1_3_3_31_2","unstructured":"ISO. 2016. ISO\/IEC 30107-1:2016. Retrieved September 16 2023 from https:\/\/www.iso.org\/standard\/53227.html"},{"issue":"4","key":"e_1_3_3_32_2","first-page":"235","article-title":"Liveness detection for embedded face recognition system","volume":"1","author":"Jee Hyung-Keun","year":"2006","unstructured":"Hyung-Keun Jee, Sung-Uk Jung, and Jang-Hee Yoo. 2006. Liveness detection for embedded face recognition system. International Journal of Biological and Medical Sciences 1, 4 (2006), 235\u2013238.","journal-title":"International Journal of Biological and Medical Sciences"},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30754-7_5"},{"key":"e_1_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2021.01.021"},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3044986"},{"key":"e_1_3_3_36_2","volume-title":"Guidelines for Performing Systematic Literature Reviews in Software Engineering","year":"2007","unstructured":"Kitchenham Barbara and Stuart Charters. 2007. Guidelines for Performing Systematic Literature Reviews in Software Engineering. Technical Report. Technical report, ver. 2.3 ebse technical report. ebse."},{"key":"e_1_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2011.5955219"},{"key":"e_1_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2007.05.004"},{"key":"e_1_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612968"},{"key":"e_1_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-6067-5_39"},{"key":"e_1_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2013.6553761"},{"key":"e_1_3_3_42_2","doi-asserted-by":"publisher","DOI":"10.3390\/e21040423"},{"key":"e_1_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2013.6547310"},{"issue":"11","key":"e_1_3_3_44_2","first-page":"246","article-title":"A review of authentication methods","volume":"5","author":"Lal Nilesh A.","year":"2016","unstructured":"Nilesh A. Lal, Salendra Prasad, and Mohammed Farik. 2016. A review of authentication methods. International Journal of Scientific and Technology Research 5, 11 (2016), 246\u2013249.","journal-title":"International Journal of Scientific and Technology Research"},{"key":"e_1_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93000-8_29"},{"key":"e_1_3_3_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2801312"},{"key":"e_1_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1117\/12.541955"},{"key":"e_1_3_3_48_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.05.017"},{"key":"e_1_3_3_49_2","first-page":"4244","volume-title":"Proceedings of the 2016 23rd International Conference on Pattern Recognition (ICPR\u201916)","author":"Li Xiaobai","year":"2016","unstructured":"Xiaobai Li, Jukka Komulainen, Guoying Zhao, Pong-Chi Yuen, and Matti Pietik\u00e4inen. 2016. Generalized face anti-spoofing by detecting pulse from face videos. In Proceedings of the 2016 23rd International Conference on Pattern Recognition (ICPR\u201916). IEEE, 4244\u20134249."},{"key":"e_1_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7471800"},{"key":"e_1_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3035747"},{"key":"e_1_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/3345336.3345345"},{"key":"e_1_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAI48974.2019.9010495"},{"key":"e_1_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2016.193"},{"key":"e_1_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46478-7_6"},{"key":"e_1_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00048"},{"key":"e_1_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26972-2_8"},{"key":"e_1_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2020.01.002"},{"key":"e_1_3_3_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2971224"},{"key":"e_1_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"e_1_3_3_61_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2011.0009"},{"key":"e_1_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3349801.3349817"},{"key":"e_1_3_3_63_2","unstructured":"NEC. 2021. The Top 9 Common uses of Biometrics in Everyday Life - NEC NZ. Retrieved September 16 2024 from https:\/\/www.nec.co.nz\/market-leadership\/publications-media\/the-top-9-common-uses-of-biometrics-in-everyday-life\/"},{"key":"e_1_3_3_64_2","first-page":"1","volume-title":"Proceedings of the IEEE 6th International Conference on Biometrics: Theory, Applications and Systems (BTAS\u201913)","author":"Nesli Erdogmus","year":"2013","unstructured":"Erdogmus Nesli and S\u00e9bastien Marcel. 2013. Spoofing in 2d face recognition with 3d masks and anti-spoofing with kinect. In Proceedings of the IEEE 6th International Conference on Biometrics: Theory, Applications and Systems (BTAS\u201913). 1\u20138."},{"key":"e_1_3_3_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2957273"},{"key":"e_1_3_3_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2017.16"},{"key":"e_1_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2007.4409068"},{"key":"e_1_3_3_68_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46654-5_67"},{"key":"e_1_3_3_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578288"},{"key":"e_1_3_3_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2015.7139082"},{"key":"e_1_3_3_71_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2011.6116484"},{"key":"e_1_3_3_72_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4780-0"},{"key":"e_1_3_3_73_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2019.102746"},{"key":"e_1_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00201"},{"key":"e_1_3_3_75_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2466088"},{"key":"e_1_3_3_76_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6866"},{"key":"e_1_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/3038924"},{"key":"e_1_3_3_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3044723"},{"key":"e_1_3_3_79_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2019.103858"},{"key":"e_1_3_3_80_2","first-page":"3","volume-title":"Proceedings of the International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019)","author":"Rehman Yasar Abbas Ur","year":"2019","unstructured":"Yasar Abbas Ur Rehman, Lai-Man Po, Mengyang Liu, Zijie Zou, and Weifeng Ou. 2019. Perturbing convolutional feature maps with histogram of oriented gradients for face liveness detection. In Proceedings of the International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019). Springer, 3\u201313."},{"key":"e_1_3_3_81_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2019.02.014"},{"key":"e_1_3_3_82_2","doi-asserted-by":"publisher","DOI":"10.1145\/234313.234412"},{"key":"e_1_3_3_83_2","doi-asserted-by":"publisher","DOI":"10.2478\/v10178-012-0022-y"},{"key":"e_1_3_3_84_2","unstructured":"Mitch Strohm. 2022. Digital Banking Survey: How Americans Prefer to Bank. Retrieved September 16 2022 from https:\/\/www.forbes.com\/advisor\/banking\/digital-banking-survey-2022\/"},{"key":"e_1_3_3_85_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2985453"},{"key":"e_1_3_3_86_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15567-3_37"},{"key":"e_1_3_3_87_2","doi-asserted-by":"crossref","unstructured":"Di Tang Zhe Zhou Yinqian Zhang and Kehuan Zhang. 2018. Face flashing: A secure liveness detection protocol based on light reflections. 25th Annual Network and Distributed System Security Symposium. 2018.","DOI":"10.14722\/ndss.2018.23176"},{"key":"e_1_3_3_88_2","unstructured":"thalesgroup. 2022. Biometrics: Definition use Cases Latest News. Retrieved September 16 2024 from https:\/\/www.thalesgroup.com\/en\/markets\/digital-identity-and-security\/government\/inspired\/biometrics"},{"key":"e_1_3_3_89_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117522"},{"key":"e_1_3_3_90_2","doi-asserted-by":"publisher","DOI":"10.1145\/3402446"},{"key":"e_1_3_3_91_2","unstructured":"UCDS. 2001. Yale Face Database. Retrieved September 16 2022 from http:\/\/vision.ucsd.edu\/content\/yale-face-database"},{"key":"e_1_3_3_92_2","doi-asserted-by":"publisher","DOI":"10.23919\/SAIEE.2019.8732799"},{"key":"e_1_3_3_93_2","doi-asserted-by":"publisher","DOI":"10.3390\/sym9120305"},{"key":"e_1_3_3_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00509"},{"key":"e_1_3_3_95_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400395"},{"key":"e_1_3_3_96_2","doi-asserted-by":"publisher","DOI":"10.1145\/3330482.3330502"},{"key":"e_1_3_3_97_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV.2012.6485156"},{"key":"e_1_3_3_98_2","unstructured":"Jianwei Yang Zhen Lei and Stan Z. Li. 2014. Learn convolutional neural network for face anti-spoofing. arXiv:1408.5601. Retrieved from https:\/\/arxiv.org\/abs\/1408.5601"},{"key":"e_1_3_3_99_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2019.06.009"},{"key":"e_1_3_3_100_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58571-6_33"},{"key":"e_1_3_3_101_2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/177"},{"key":"e_1_3_3_102_2","volume-title":"Proceedings of the TPAMI","author":"Yu Zitong","year":"2020","unstructured":"Zitong Yu, Jun Wan, Yunxiao Qin, Xiaobai Li, Stan Z. Li, and Guoying Zhao. 2020. NAS-FAS: Static-dynamic central difference network search for face anti-spoofing. In Proceedings of the TPAMI."},{"key":"e_1_3_3_103_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"e_1_3_3_104_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58529-7_38"},{"key":"e_1_3_3_105_2","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2020.2973001"},{"key":"e_1_3_3_106_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199754"},{"key":"e_1_3_3_107_2","doi-asserted-by":"publisher","DOI":"10.1145\/3409073.3409087"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3687264","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3687264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:02Z","timestamp":1750294682000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3687264"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,7]]},"references-count":106,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,31]]}},"alternative-id":["10.1145\/3687264"],"URL":"https:\/\/doi.org\/10.1145\/3687264","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,7]]},"assertion":[{"value":"2022-12-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-07-19","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}