{"id":"https://openalex.org/W1987963139","doi":"https://doi.org/10.1109/tifs.2015.2422264","title":"MIO: Enhancing Wireless Communications Security Through Physical Layer Multiple Inter-Symbol Obfuscation","display_name":"MIO: Enhancing Wireless Communications Security Through Physical Layer Multiple Inter-Symbol Obfuscation","publication_year":2015,"publication_date":"2015-04-13","ids":{"openalex":"https://openalex.org/W1987963139","doi":"https://doi.org/10.1109/tifs.2015.2422264","mag":"1987963139"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2015.2422264","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2015.2422264","pdf_url":"https://ieeexplore.ieee.org/ielx7/10206/7127092/07084652.pdf","source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://ieeexplore.ieee.org/ielx7/10206/7127092/07084652.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036357996","display_name":"Tao Xiong","orcid":null},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]},{"id":"https://openalex.org/I182722699","display_name":"Shenzhen Polytechnic University","ror":"https://ror.org/00d2w9g53","country_code":"CN","type":"education","lineage":["https://openalex.org/I182722699"]}],"countries":["CN","HK"],"is_corresponding":true,"raw_author_name":"Tao Xiong","raw_affiliation_strings":["Hong Kong Polytechnic University Shenzhen Research Institute, Shenzhen, P. R. China","Department of Computing, The Hong Kong Polytechnic University, , Hong Kong"],"affiliations":[{"raw_affiliation_string":"Hong Kong Polytechnic University Shenzhen Research Institute, Shenzhen, P. R. China","institution_ids":["https://openalex.org/I182722699","https://openalex.org/I14243506"]},{"raw_affiliation_string":"Department of Computing, The Hong Kong Polytechnic University, , Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087959421","display_name":"Wei Lou","orcid":"https://orcid.org/0000-0002-9784-5741"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]},{"id":"https://openalex.org/I182722699","display_name":"Shenzhen Polytechnic University","ror":"https://ror.org/00d2w9g53","country_code":"CN","type":"education","lineage":["https://openalex.org/I182722699"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Wei Lou","raw_affiliation_strings":["Hong Kong Polytechnic University Shenzhen Research Institute, Shenzhen, P. R. China","Department of Computing, The Hong Kong Polytechnic University, , Hong Kong"],"affiliations":[{"raw_affiliation_string":"Hong Kong Polytechnic University Shenzhen Research Institute, Shenzhen, P. R. China","institution_ids":["https://openalex.org/I182722699","https://openalex.org/I14243506"]},{"raw_affiliation_string":"Department of Computing, The Hong Kong Polytechnic University, , Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078943947","display_name":"Jin Zhang","orcid":"https://orcid.org/0000-0002-7673-0996"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]},{"id":"https://openalex.org/I182722699","display_name":"Shenzhen Polytechnic University","ror":"https://ror.org/00d2w9g53","country_code":"CN","type":"education","lineage":["https://openalex.org/I182722699"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Jin Zhang","raw_affiliation_strings":["Hong Kong Polytechnic University Shenzhen Research Institute, Shenzhen, P. R. China","Department of Computing, The Hong Kong Polytechnic University, , Hong Kong"],"affiliations":[{"raw_affiliation_string":"Hong Kong Polytechnic University Shenzhen Research Institute, Shenzhen, P. R. China","institution_ids":["https://openalex.org/I182722699","https://openalex.org/I14243506"]},{"raw_affiliation_string":"Department of Computing, The Hong Kong Polytechnic University, , Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103471982","display_name":"Hailun Tan","orcid":null},"institutions":[{"id":"https://openalex.org/I2801453606","display_name":"Australian Government","ror":"https://ror.org/0314h5y94","country_code":"AU","type":"government","lineage":["https://openalex.org/I2801453606"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Hailun Tan","raw_affiliation_strings":["Australian Federal Government, Brisbane, QLD, Australia",", Australian Federal Government, Brisbane, QLD, Australia"],"affiliations":[{"raw_affiliation_string":"Australian Federal Government, Brisbane, QLD, Australia","institution_ids":["https://openalex.org/I2801453606"]},{"raw_affiliation_string":", Australian Federal Government, Brisbane, QLD, Australia","institution_ids":["https://openalex.org/I2801453606"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5036357996"],"corresponding_institution_ids":["https://openalex.org/I14243506","https://openalex.org/I182722699"],"apc_list":null,"apc_paid":null,"fwci":1.0037,"has_fulltext":true,"cited_by_count":22,"citation_normalized_percentile":{"value":0.79256102,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":"10","issue":"8","first_page":"1678","last_page":"1691"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8423148393630981},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.8320631980895996},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.6861755847930908},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.67034912109375},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.6597253084182739},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5944413542747498},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5825223326683044},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5579153895378113},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.47745659947395325},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.469315767288208},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.4456247091293335},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.415643572807312},{"id":"https://openalex.org/keywords/wireless-security","display_name":"Wireless security","score":0.41401752829551697},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4127349257469177},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39352500438690186},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.3729817271232605},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17141497135162354}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8423148393630981},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.8320631980895996},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.6861755847930908},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.67034912109375},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.6597253084182739},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5944413542747498},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5825223326683044},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5579153895378113},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.47745659947395325},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.469315767288208},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.4456247091293335},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.415643572807312},{"id":"https://openalex.org/C2776946656","wikidata":"https://www.wikidata.org/wiki/Q1655812","display_name":"Wireless security","level":4,"score":0.41401752829551697},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4127349257469177},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39352500438690186},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.3729817271232605},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17141497135162354}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2015.2422264","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2015.2422264","pdf_url":"https://ieeexplore.ieee.org/ielx7/10206/7127092/07084652.pdf","source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:ira.lib.polyu.edu.hk:10397/8264","is_oa":false,"landing_page_url":"http://hdl.handle.net/10397/8264","pdf_url":null,"source":{"id":"https://openalex.org/S4306400205","display_name":"PolyU Institutional Research Archive (Hong Kong Polytechnic University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I14243506","host_organization_name":"Hong Kong Polytechnic University","host_organization_lineage":["https://openalex.org/I14243506"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal/Magazine Article"}],"best_oa_location":{"id":"doi:10.1109/tifs.2015.2422264","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2015.2422264","pdf_url":"https://ieeexplore.ieee.org/ielx7/10206/7127092/07084652.pdf","source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7400000095367432,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1456191021","display_name":null,"funder_award_id":"PolyU-521312","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1569969891","display_name":null,"funder_award_id":"A-PL84","funder_id":"https://openalex.org/F4320322598","funder_display_name":"Hong Kong Polytechnic University"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3104183547","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321592","funder_display_name":"Research Grants Council, University Grants Committee"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4322347724","display_name":null,"funder_award_id":"61272463","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6036331434","display_name":null,"funder_award_id":"A-PL84","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6489809989","display_name":null,"funder_award_id":"4-BCB6","funder_id":"https://openalex.org/F4320322598","funder_display_name":"Hong Kong Polytechnic University"},{"id":"https://openalex.org/G7033253288","display_name":null,"funder_award_id":"Grants","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G882187262","display_name":null,"funder_award_id":"PolyU-521312","funder_id":"https://openalex.org/F4320321592","funder_display_name":"Research Grants Council, University Grants Committee"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321592","display_name":"Research Grants Council, University Grants Committee","ror":"https://ror.org/00djwmt25"},{"id":"https://openalex.org/F4320322598","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1987963139.pdf","grobid_xml":"https://content.openalex.org/works/W1987963139.grobid-xml"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W252932944","https://openalex.org/W949353694","https://openalex.org/W1528497439","https://openalex.org/W1584422250","https://openalex.org/W1588553798","https://openalex.org/W1874069312","https://openalex.org/W1981670729","https://openalex.org/W1982170863","https://openalex.org/W2007529001","https://openalex.org/W2011582944","https://openalex.org/W2043769961","https://openalex.org/W2055224708","https://openalex.org/W2072563372","https://openalex.org/W2078843752","https://openalex.org/W2091020476","https://openalex.org/W2096509667","https://openalex.org/W2100278976","https://openalex.org/W2102975076","https://openalex.org/W2103331800","https://openalex.org/W2106990489","https://openalex.org/W2119012490","https://openalex.org/W2128153585","https://openalex.org/W2128356550","https://openalex.org/W2128805726","https://openalex.org/W2133583242","https://openalex.org/W2141840384","https://openalex.org/W2142102521","https://openalex.org/W2144007657","https://openalex.org/W2156214717","https://openalex.org/W2156674444","https://openalex.org/W2157604883","https://openalex.org/W2157936671","https://openalex.org/W2171925660","https://openalex.org/W2354005007","https://openalex.org/W2984685535","https://openalex.org/W3102325276","https://openalex.org/W4214605592","https://openalex.org/W6631770944","https://openalex.org/W6675708947"],"related_works":["https://openalex.org/W1993671760","https://openalex.org/W2376754011","https://openalex.org/W3026778509","https://openalex.org/W4386561858","https://openalex.org/W2462883630","https://openalex.org/W4287776800","https://openalex.org/W4390045088","https://openalex.org/W3188430173","https://openalex.org/W3116845106","https://openalex.org/W4285103104"],"abstract_inverted_index":{"Communications":[0],"security":[1,174],"is":[2],"a":[3,37,91,99,151,211],"critical":[4],"and":[5,44,48,80,163,195,214],"increasingly":[6],"challenging":[7],"issue":[8],"in":[9,29,59,113,210,226],"wireless":[10,61,87,122,228],"networks.":[11],"A":[12],"well-known":[13],"approach":[14,35,209],"for":[15,41],"achieving":[16],"information-theoretic":[17,188],"secrecy":[18,189,197],"relies":[19],"on":[20],"deploying":[21],"artificial":[22,52,102,134],"noises":[23],"to":[24,46,73,107,220],"blind":[25],"the":[26,30,42,50,68,76,86,109,114,121,126,133,140,144,148,157,160,166,170,180,183,191,199,222],"intruders'":[27],"interception":[28],"physical":[31,115],"layer.":[32,116],"However,":[33],"this":[34,64],"requires":[36],"static":[38],"channel":[39],"condition":[40],"transmitter":[43],"receiver":[45,153],"generate":[47],"offset":[49],"controllable":[51],"noise,":[53],"which":[54,97],"can":[55,118,154,186],"hardly":[56],"be":[57],"implemented":[58,207],"real":[60],"environments.":[62],"In":[63],"paper,":[65],"we":[66,205],"explore":[67],"feasibility":[69],"of":[70,101,159,224],"symbol":[71],"obfuscation":[72,94],"defend":[74],"against":[75,190,198],"passive":[77,192],"eavesdropping":[78,193],"attack":[79,84,194],"fake":[81,167,200],"packet":[82,201],"injection":[83,202],"during":[85],"communications.":[88],"We":[89],"propose":[90],"multiple":[92],"inter-symbol":[93],"(MIO)":[95],"scheme,":[96],"utilizes":[98],"set":[100],"noisy":[103,135],"symbols":[104,112,142,161],"(symbols":[105],"key)":[106],"obfuscate":[108],"original":[110],"data":[111],"MIO":[117,184,225],"effectively":[119],"enhance":[120],"communications":[123,229],"security.":[124,230],"On":[125,147],"one":[127],"hand,":[128,150],"an":[129],"eavesdropper,":[130],"without":[131,178],"knowing":[132],"symbols,":[136],"cannot":[137],"correctly":[138],"decrypt":[139],"obfuscated":[141],"from":[143,169],"eavesdropped":[145],"packets.":[146,172],"other":[149],"legitimate":[152],"easily":[155],"check":[156],"integrity":[158],"key":[162],"then":[164],"reject":[165],"packets":[168],"received":[171],"The":[173],"analysis":[175],"reveals":[176],"that,":[177],"considering":[179],"initial":[181],"key,":[182],"scheme":[185],"achieve":[187],"computational":[196],"attack.":[203],"Moreover,":[204],"have":[206],"our":[208],"USRP2":[212],"testbed":[213],"conducted":[215],"simulations":[216],"with":[217],"Simulink":[218],"tools":[219],"validate":[221],"effectiveness":[223],"enhancing":[227]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
