{"id":"https://openalex.org/W2974383094","doi":"https://doi.org/10.1109/tip.2019.2940533","title":"Image Super-Resolution as a Defense Against Adversarial Attacks","display_name":"Image Super-Resolution as a Defense Against Adversarial Attacks","publication_year":2019,"publication_date":"2019-09-19","ids":{"openalex":"https://openalex.org/W2974383094","doi":"https://doi.org/10.1109/tip.2019.2940533","mag":"2974383094","pmid":"https://pubmed.ncbi.nlm.nih.gov/31545722"},"language":"en","primary_location":{"id":"doi:10.1109/tip.2019.2940533","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tip.2019.2940533","pdf_url":null,"source":{"id":"https://openalex.org/S4210173141","display_name":"IEEE Transactions on Image Processing","issn_l":"1057-7149","issn":["1057-7149","1941-0042"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Image Processing","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref","pubmed"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1901.01677","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Aamir Mustafa","orcid":null},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]},{"id":"https://openalex.org/I4210116052","display_name":"Inception Institute of Artificial Intelligence","ror":"https://ror.org/02664zk40","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210116052"]}],"countries":["AE","AU"],"is_corresponding":true,"raw_author_name":"Aamir Mustafa","raw_affiliation_strings":["Inception Institute of Artificial Intelligence, UAE","University of Canberra, Australia"],"affiliations":[{"raw_affiliation_string":"Inception Institute of Artificial Intelligence, UAE","institution_ids":["https://openalex.org/I4210116052"]},{"raw_affiliation_string":"University of Canberra, Australia","institution_ids":["https://openalex.org/I188329596"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Salman H. Khan","orcid":"https://orcid.org/0000-0002-9502-1749"},"institutions":[{"id":"https://openalex.org/I4210116052","display_name":"Inception Institute of Artificial Intelligence","ror":"https://ror.org/02664zk40","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210116052"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Salman H. Khan","raw_affiliation_strings":["ANU, Australia","Inception Institute of Artificial Intelligence, UAE"],"affiliations":[{"raw_affiliation_string":"ANU, Australia","institution_ids":[]},{"raw_affiliation_string":"Inception Institute of Artificial Intelligence, UAE","institution_ids":["https://openalex.org/I4210116052"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Munawar Hayat","orcid":"https://orcid.org/0000-0002-2706-5985"},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]},{"id":"https://openalex.org/I4210116052","display_name":"Inception Institute of Artificial Intelligence","ror":"https://ror.org/02664zk40","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210116052"]}],"countries":["AE","AU"],"is_corresponding":false,"raw_author_name":"Munawar Hayat","raw_affiliation_strings":["Inception Institute of Artificial Intelligence, UAE","University of Canberra, Australia"],"affiliations":[{"raw_affiliation_string":"Inception Institute of Artificial Intelligence, UAE","institution_ids":["https://openalex.org/I4210116052"]},{"raw_affiliation_string":"University of Canberra, Australia","institution_ids":["https://openalex.org/I188329596"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jianbing Shen","orcid":"https://orcid.org/0000-0003-2656-3082"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]},{"id":"https://openalex.org/I4210116052","display_name":"Inception Institute of Artificial Intelligence","ror":"https://ror.org/02664zk40","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210116052"]}],"countries":["AE","CN"],"is_corresponding":false,"raw_author_name":"Jianbing Shen","raw_affiliation_strings":["Beijing Laboratory of Intelligent Information Technology, School of Computer Science, Beijing Institute of Technology, Beijing, China","Inception Institute of Artificial Intelligence, UAE"],"affiliations":[{"raw_affiliation_string":"Beijing Laboratory of Intelligent Information Technology, School of Computer Science, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]},{"raw_affiliation_string":"Inception Institute of Artificial Intelligence, UAE","institution_ids":["https://openalex.org/I4210116052"]}]},{"author_position":"last","author":{"id":null,"display_name":"Ling Shao","orcid":"https://orcid.org/0000-0002-8264-6117"},"institutions":[{"id":"https://openalex.org/I4210116052","display_name":"Inception Institute of Artificial Intelligence","ror":"https://ror.org/02664zk40","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210116052"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Ling Shao","raw_affiliation_strings":["Inception Institute of Artificial Intelligence, UAE"],"affiliations":[{"raw_affiliation_string":"Inception Institute of Artificial Intelligence, UAE","institution_ids":["https://openalex.org/I4210116052"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I188329596","https://openalex.org/I4210116052"],"apc_list":null,"apc_paid":null,"fwci":7.6591,"has_fulltext":false,"cited_by_count":161,"citation_normalized_percentile":{"value":0.97794653,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"29","issue":null,"first_page":"1711","last_page":"1724"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9262999892234802,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9262999892234802,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11105","display_name":"Advanced Image Processing Techniques","score":0.055799998342990875,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.008500000461935997,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8615999817848206},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6886000037193298},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5622000098228455},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5134999752044678},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.45730000734329224},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4472000002861023},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.420199990272522},{"id":"https://openalex.org/keywords/image-restoration","display_name":"Image restoration","score":0.420199990272522},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4120999872684479}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8615999817848206},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7922999858856201},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6886000037193298},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6514000296592712},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5622000098228455},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5134999752044678},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.45730000734329224},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4472000002861023},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.420199990272522},{"id":"https://openalex.org/C106430172","wikidata":"https://www.wikidata.org/wiki/Q6002272","display_name":"Image restoration","level":4,"score":0.420199990272522},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4120999872684479},{"id":"https://openalex.org/C75294576","wikidata":"https://www.wikidata.org/wiki/Q5165192","display_name":"Contextual image classification","level":3,"score":0.4043000042438507},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3889999985694885},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.38690000772476196},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.3711000084877014},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3458999991416931},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.34439998865127563},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.34119999408721924},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.334199994802475},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.32989999651908875},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.32499998807907104},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.3199999928474426},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.3125},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.31200000643730164},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3066999912261963},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.30399999022483826},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.27070000767707825},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.26660001277923584},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2612000107765198},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.25999999046325684},{"id":"https://openalex.org/C191795146","wikidata":"https://www.wikidata.org/wiki/Q3878446","display_name":"Norm (philosophy)","level":2,"score":0.2581000030040741},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.25769999623298645}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/tip.2019.2940533","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tip.2019.2940533","pdf_url":null,"source":{"id":"https://openalex.org/S4210173141","display_name":"IEEE Transactions on Image Processing","issn_l":"1057-7149","issn":["1057-7149","1941-0042"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Image Processing","raw_type":"journal-article"},{"id":"pmid:31545722","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/31545722","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE transactions on image processing : a publication of the IEEE Signal Processing Society","raw_type":null},{"id":"pmh:oai:arXiv.org:1901.01677","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1901.01677","pdf_url":"https://arxiv.org/pdf/1901.01677","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:openresearch-repository.anu.edu.au:1885/309737","is_oa":false,"landing_page_url":"http://hdl.handle.net/1885/309737","pdf_url":null,"source":{"id":"https://openalex.org/S4306402539","display_name":"ANU Open Research (Australian National University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I118347636","host_organization_name":"Australian National University","host_organization_lineage":["https://openalex.org/I118347636"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Image Processing","raw_type":"Journal article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1901.01677","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1901.01677","pdf_url":"https://arxiv.org/pdf/1901.01677","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":62,"referenced_works":["https://openalex.org/W1536680647","https://openalex.org/W1880213544","https://openalex.org/W1903029394","https://openalex.org/W2097073572","https://openalex.org/W2108598243","https://openalex.org/W2125527601","https://openalex.org/W2194775991","https://openalex.org/W2243397390","https://openalex.org/W2295107390","https://openalex.org/W2412782625","https://openalex.org/W2543927648","https://openalex.org/W2617669016","https://openalex.org/W2618043096","https://openalex.org/W2620038827","https://openalex.org/W2741137940","https://openalex.org/W2754049786","https://openalex.org/W2757028014","https://openalex.org/W2774644650","https://openalex.org/W2790194629","https://openalex.org/W2795727551","https://openalex.org/W2804743778","https://openalex.org/W2962700793","https://openalex.org/W2962933288","https://openalex.org/W2963268689","https://openalex.org/W2963372104","https://openalex.org/W2963470893","https://openalex.org/W2963857521","https://openalex.org/W2964050365","https://openalex.org/W2964082701","https://openalex.org/W4210997624","https://openalex.org/W4214806317","https://openalex.org/W6637162671","https://openalex.org/W6637373629","https://openalex.org/W6638523607","https://openalex.org/W6640425456","https://openalex.org/W6688549366","https://openalex.org/W6719080892","https://openalex.org/W6722063826","https://openalex.org/W6725195833","https://openalex.org/W6729756640","https://openalex.org/W6733645847","https://openalex.org/W6734483310","https://openalex.org/W6734787559","https://openalex.org/W6736207377","https://openalex.org/W6736640963","https://openalex.org/W6736987314","https://openalex.org/W6737443998","https://openalex.org/W6738893770","https://openalex.org/W6739868092","https://openalex.org/W6741036071","https://openalex.org/W6745272055","https://openalex.org/W6746402973","https://openalex.org/W6746621119","https://openalex.org/W6748204703","https://openalex.org/W6748475379","https://openalex.org/W6749238303","https://openalex.org/W6752931940","https://openalex.org/W6753565081","https://openalex.org/W6756913348","https://openalex.org/W6757034617","https://openalex.org/W6760652986","https://openalex.org/W6864274290"],"related_works":[],"abstract_inverted_index":{"Convolutional":[0],"Neural":[1],"Networks":[2],"have":[3],"achieved":[4],"significant":[5],"success":[6],"across":[7,193],"multiple":[8],"computer":[9],"vision":[10],"tasks.":[11],"However,":[12],"they":[13],"are":[14,200],"vulnerable":[15],"to":[16,46,92,123,180],"carefully":[17],"crafted,":[18],"human-imperceptible":[19],"adversarial":[20,53,69,125],"noise":[21],"patterns":[22],"which":[23],"constrain":[24],"their":[25],"deployment":[26],"in":[27,90,145],"critical":[28],"security-sensitive":[29],"systems.":[30],"This":[31],"paper":[32],"proposes":[33],"a":[34,42,120,142],"computationally":[35],"efficient":[36],"image":[37,59,74,100],"enhancement":[38],"approach":[39,87],"that":[40,57,65],"provides":[41,190],"strong":[43,143],"defense":[44,144,174],"mechanism":[45,122],"effectively":[47],"mitigate":[48],"the":[49,72,110,116,130,155,181],"effect":[50],"of":[51,85,129],"such":[52],"perturbations.":[54],"We":[55],"show":[56],"deep":[58],"restoration":[60],"networks":[61],"learn":[62],"mapping":[63],"functions":[64],"can":[66],"bring":[67],"off-the-manifold":[68],"samples":[70],"onto":[71],"natural":[73],"manifold,":[75],"thus":[76],"restoring":[77],"classification":[78],"towards":[79],"correct":[80],"classes.":[81],"A":[82],"distinguishing":[83],"feature":[84],"our":[86],"is":[88,151,178],"that,":[89],"addition":[91],"providing":[93],"robustness":[94],"against":[95],"attacks,":[96],"it":[97,139,159,170,177,189],"simultaneously":[98],"enhances":[99],"quality":[101],"and":[102,153,184,187],"retains":[103],"models":[104],"performance":[105,192],"on":[106],"clean":[107],"images.":[108,126],"Furthermore,":[109],"proposed":[111,149],"method":[112],"does":[113,160],"not":[114,161],"modify":[115],"classifier":[117],"or":[118,166],"requires":[119],"separate":[121],"detect":[124],"The":[127,148],"effectiveness":[128],"scheme":[131,150],"has":[132,140,154],"been":[133],"demonstrated":[134],"through":[135],"extensive":[136],"experiments,":[137],"where":[138],"proven":[141],"gray-box":[146],"settings.":[147],"simple":[152],"following":[156],"advantages:":[157],"(1)":[158],"require":[162],"any":[163],"model":[164,183],"training":[165],"parameter":[167],"optimization,":[168],"(2)":[169],"complements":[171],"other":[172],"existing":[173],"mechanisms,":[175],"(3)":[176],"agnostic":[179],"attacked":[182],"attack":[185,196],"type":[186],"(4)":[188],"superior":[191],"all":[194],"popular":[195],"algorithms.":[197],"Our":[198],"codes":[199],"publicly":[201],"available":[202],"at":[203],"https://github.com/aamir-mustafa/super-resolution-adversarial-defense.":[204]},"counts_by_year":[{"year":2026,"cited_by_count":8},{"year":2025,"cited_by_count":37},{"year":2024,"cited_by_count":36},{"year":2023,"cited_by_count":27},{"year":2022,"cited_by_count":32},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":9}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2019-09-26T00:00:00"}
