Peer Review History

Original SubmissionDecember 18, 2023
Decision Letter - Giacomo Fiumara, Editor

PONE-D-23-41294Network disruption via continuous batch removal: The case of Sicilian MafiaPLOS ONE

Dear Dr. Jia,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

Please submit your revised manuscript by Apr 06 2024 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

Please include the following items when submitting your revised manuscript:

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.
  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.
  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'.

If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols.

We look forward to receiving your revised manuscript.

Kind regards,

Giacomo Fiumara, PhD

Academic Editor

PLOS ONE

Journal Requirements:

When submitting your revision, we need you to address these additional requirements.

1. Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at 

https://journals.plos.org/plosone/s/file?id=wjVg/PLOSOne_formatting_sample_main_body.pdf and 

https://journals.plos.org/plosone/s/file?id=ba62/PLOSOne_formatting_sample_title_authors_affiliations.pdf

2. Thank you for stating the following financial disclosure: 

"This work was supported by the Australian Research Council, Grant No. DP190101087: Dynamics and Control of Complex Social Networks."

Please state what role the funders took in the study.  If the funders had no role, please state: "The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript." 

If this statement is not correct you must amend it as needed. 

Please include this amended Role of Funder statement in your cover letter; we will change the online submission form on your behalf.

3. Thank you for stating the following in the Acknowledgments Section of your manuscript: 

"This work was supported by the Australian Research Council, Grant No. DP190101087: “Dynamics and Control of Complex Social Networks”. "

We note that you have provided funding information that is not currently declared in your Funding Statement. However, funding information should not appear in the Acknowledgments section or other areas of your manuscript. We will only publish funding information present in the Funding Statement section of the online submission form. 

Please remove any funding-related text from the manuscript and let us know how you would like to update your Funding Statement. Currently, your Funding Statement reads as follows: 

"This work was supported by the Australian Research Council, Grant No. DP190101087: Dynamics and Control of Complex Social Networks."

Please include your amended statements within your cover letter; we will change the online submission form on your behalf.

4. Thank you for uploading your study's underlying data set. Unfortunately, the repository you have noted in your Data Availability statement does not qualify as an acceptable data repository according to PLOS's standards.

At this time, please upload the minimal data set necessary to replicate your study's findings to a stable, public repository (such as figshare or Dryad) and provide us with the relevant URLs, DOIs, or accession numbers that may be used to access these data. For a list of recommended repositories and additional information on PLOS standards for data deposition, please see https://journals.plos.org/plosone/s/recommended-repositories.

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: No

Reviewer #2: Partly

**********

2. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: N/A

Reviewer #2: No

**********

3. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

Reviewer #2: Yes

**********

4. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

Reviewer #2: No

**********

5. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: The research article titled "Network disruption via continuous batch removal: The case of Sicilian Mafia" has no novelty in suggested research work. The issue is already resolved by researchers. I have recommended to work on different dataset instead of using a single dataset.

Reviewer #2: Overall, the study presents disruption strategies and evaluates their effectiveness on a real-world network, offering insights into how network structure influences disruption outcomes. Additionally, it highlights the potential for future research to delve deeper into understanding network dynamics and improving disruption strategies further. However, following things must be added in the revised paper.

The study begins by introducing a novel generalized robustness metric tailored for partial and continuous batch removal processes. It is noteworthy that all introduced nomenclature should be clearly defined either in the introduction or upon their first mention to facilitate understanding for readers unfamiliar with the terminology.

Subsequently, the authors evaluated several disruption strategies on a Sicilian Mafia network. While they claimed the robustness of their approach, there is a lack of comparative analysis with existing research to substantiate this assertion. To address this gap, a thorough comparison with other relevant works is warranted. This would involve examining how the proposed strategies fare against those from prior studies in terms of effectiveness, efficiency, and robustness under similar conditions.

Furthermore, the study proposed a within-LCC constraint simulating police raid operations. This constraint was found to impact the effectiveness of disruption strategies, favoring degree-based approaches with moderate batch sizes over betweenness-based ones. However, to provide a more comprehensive evaluation, additional statistical analysis of the results is necessary. This analysis should include measures such as confidence intervals, significance tests, and potentially sensitivity analyses to assess the robustness of the findings under different conditions.

Moreover, the authors introduced a structurally-filtered greedy disruption strategy based on the characteristics of nodes removed by a naive greedy approach. This strategy reportedly outperformed classic disruption strategies while maintaining similar time complexity to betweenness centrality. To strengthen the validity of this claim, it is essential to conduct a more rigorous comparison with existing approaches. This could involve assessing the performance of the proposed strategy against a wider range of benchmarks and providing a detailed discussion of the results.

In addition to addressing these points, future research directions could involve exploring how other structural characteristics of networks can offer valuable insights into network disruption. This could lead to a deeper understanding of network dynamics and the development of even more effective disruption strategies.

**********

6. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: No

Reviewer #2: Yes: Ankit shah

**********

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step.

Revision 1

Please find detailed reponse in the attached rebuttal letter.

Attachments
Attachment
Submitted filename: Rebuttal_Letter.pdf
Decision Letter - Giacomo Fiumara, Editor

PONE-D-23-41294R1Network disruption via continuous batch removal: The case of Sicilian MafiaPLOS ONE

Dear Dr. Jia,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

Please submit your revised manuscript by Sep 05 2024 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

Please include the following items when submitting your revised manuscript:

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.
  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.
  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'.
If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols.

We look forward to receiving your revised manuscript.

Kind regards,

Giacomo Fiumara, PhD

Academic Editor

PLOS ONE

Journal Requirements:

Please review your reference list to ensure that it is complete and correct. If you have cited papers that have been retracted, please include the rationale for doing so in the manuscript text, or remove these references and replace them with relevant current references. Any changes to the reference list should be mentioned in the rebuttal letter that accompanies your revised manuscript. If you need to cite a retracted article, indicate the article’s retracted status in the References list and also include a citation and full reference for the retraction notice.

Additional Editor Comments:

Dear authors,

The second round of the reviews of the manuscript "Network disruption via continuous batch removal: The case of Sicilian Mafia" has finally ended. My decision is that the manuscript has to undergo a minor revision before considering it for publication in PLOS ONE. The contribution of Reviewer 1 clearly refers to another manuscript. We tried to contact him and ask to change it, but with no success. The review of Reviewer 3 does not fully target the main goal of the paper and his suggestions must be considered only in part. In particular, I suggest to address the following comments:

1. Insufficient explanation of robustness

4. Dealing with NP-hardness

5. Relationship between noise removal and feature reduction

6. Validity of evaluation metrics

while the remaining comments could be useful for future works on this interesting theme. I also suggest to exclude the challenges proposed by Reviewer 3 as they do not exactly pertain to the research illustrated in the paper.

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation.

Reviewer #1: (No Response)

Reviewer #2: All comments have been addressed

Reviewer #3: All comments have been addressed

Reviewer #4: All comments have been addressed

**********

2. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Yes

Reviewer #2: Yes

Reviewer #3: Partly

Reviewer #4: Yes

**********

3. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: Yes

Reviewer #2: Yes

Reviewer #3: No

Reviewer #4: Yes

**********

4. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

Reviewer #2: Yes

Reviewer #3: Yes

Reviewer #4: Yes

**********

5. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: (No Response)

Reviewer #2: Yes

Reviewer #3: Yes

Reviewer #4: Yes

**********

6. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: Based on the abstract and key sections of the manuscript titled "G-Net: Implementing an Enhanced Brain Tumor Segmentation Framework using Semantic Segmentation Design," here are my review comments

1. Include comparisons with architectures that do not incorporate features like Self-Attention and Squeeze Excitation blocks to highlight G-Net’s unique contributions to brain tumor segmentation.

2. Quantify the model's precision improvement in tumor boundary localization and detail capture through metrics or visual examples, providing a clearer benchmark of novelty.

3. Add statistical analyses of the dataset’s diversity, including age distribution, tumor sizes, and imaging modalities, to demonstrate the model's robustness across varied cases.

4. .Cite below relevant articles in related work to improve . DOI: 10.1109/ICTC58733.2023.10392830 DOI: 10.1109/ACCESS.2023.3330919 https://doi.org/10.3390/math11194189 https://doi.org/10.3390/diagnostics13162650 https://itiis.org/digital-library/90390

5. Conduct a side-by-side performance evaluation with state-of-the-art methods using standard datasets, focusing on accuracy, sensitivity, and specificity.

6. Enhance clarity by providing flow diagrams or pseudocode, offering readers a visual understanding of the feature extraction process and block integration.

7. Detail a pilot study or case studies where G-Net has been integrated into diagnostic workflows, including any operational challenges and solutions.

8. Outline a specific roadmap for scalability, including preliminary experiments on other tumor types or explorations into transfer learning for adapting G-Net to other medical imaging tasks.

9. Include a section discussing alternative configurations tested during development, explaining why certain designs were favored over others based on performance metrics.

10. Discuss the impact of open-source contributions on the research community, mentioning any collaborative projects or external validations that have leveraged the work.

Reviewer #2: All the queries are addressed by the author. Comparative analysis is included in the revised manuscript.

Reviewer #3: Comments:

This Paper and Datasets are very interesting paper. However, I believe it could be further refined by not only focusing on the current method but also by incorporating new approaches and revisions. These would highlight important aspects of criminal network analysis.

1. Insufficient explanation of robustness:

The concept of robustness in network analysis methods is not sufficiently explained in this paper. In particular, it is necessary to clearly demonstrate, with theoretical justification, how the proposed Greedy Disruption Approach (GRD) improves robustness.

2. Lack of mathematical formalization:

The explanation of the proposed methods, including GRD, relies mainly on program code and lacks mathematical formalization. It is necessary to clearly show the theoretical basis of the algorithm using equations and analyze its properties (convergence, computational complexity, etc.).

3. Insufficient consideration of practicality:

There is insufficient discussion about the effectiveness of the proposed method against more complex criminal activities such as countering intelligent criminals, impersonation, and behaviors that induce attribution of crimes to general clusters. The strengths and limitations of how the proposed method can be applied to these real scenarios should be clearly shown.

4. Dealing with NP-hardness:

While it is stated that the network disruption task is NP-hard, the explanation of how this difficulty is addressed is insufficient. In particular, it is necessary to explain in detail how the proposed method mitigates this computational difficulty or how it efficiently obtains approximate solutions.

5. Relationship between noise removal and feature reduction:

There is a possibility that removing nodes from the network may simultaneously reduce potentially important features. Consideration of this point is lacking. The theoretical basis and experimental verification of how to balance noise removal and retention of important structural information should be shown.

6. Validity of evaluation metrics:

While the reduction in LCC size is used as the main evaluation metric, there is insufficient discussion about whether this metric appropriately reflects the vulnerability of actual criminal networks. It is necessary to explain in more detail the comparison with other possible evaluation metrics and the reason for choosing this metric.

7. Handling complex network structures:

Actual criminal networks are likely to have more complex structures, but there is insufficient explanation of how the proposed method deals with such complexity. In particular, the applicability to dynamically changing networks and multi-layer networks should be discussed.

Unless these points are appropriately improved, serious questions remain about both the theoretical foundation and practical value of the paper. In particular, it is strongly recommended to improve mathematical rigor, verify effectiveness against practical scenarios, and clarify the positioning of the proposed method in the context of broader criminal network analysis.

Within the scope of this paper, we propose the following analytical methods to address the challenge of detecting intelligent criminals who may mimic ordinary individuals or use patterns that are difficult to detect:

1. Temporal Community Structure Analysis:

a) Theoretical framework:

- Apply dynamic community detection algorithms to analyze evolving community structures over time.

- Identify and analyze differences between stable and temporary communities.

b) Methodology:

- Implement a temporal extension of the Louvain algorithm used in the paper.

- Quantify community persistence and variability.

c) Application examples:

- Analyze temporal change patterns in communities within phone communication and meeting graphs.

- Identify unnaturally stable or unstable communities that deviate from typical community patterns.

2. Multi-layer Network Analysis:

a) Theoretical framework:

- Treat phone communication and meeting graphs as separate layers and analyze inter-layer interactions.

- Detect discrepancies or abnormal matching patterns between layers.

b) Methodology:

- Apply multiplex network models.

- Conduct correlation analysis of centrality measures across layers.

- Perform cross-layer community detection.

c) Application examples:

- Detect unnatural matches or mismatches between phone communication and meeting patterns.

- Identify nodes with divergent roles across layers.

3. Similarity-based Anomaly Detection:

a) Theoretical framework:

- Define similarity metrics for nodes and subgraphs to detect overly similar patterns or unnaturally different patterns.

- Quantify structural similarities between subgraphs using graph kernel methods.

b) Methodology:

- Analyze subgraph similarity using graph edit distance or graph kernels.

- Analyze role similarity of nodes (extension of structural equivalence).

- Detect nodes or subgraphs with abnormally high similarity.

c) Application examples:

- Identify criminal patterns that are excessively similar to general communication patterns.

- Detect subnetworks with unnaturally uniform structures.

4. Entropy-based Anomaly Detection:

a) Theoretical framework:

- Calculate network structure entropy to identify areas with unnaturally low or high entropy.

- Compare local and global entropy.

b) Methodology:

- Compute graph entropy (degree distribution entropy, random walk entropy, etc.).

- Analyze temporal changes in local entropy.

c) Application examples:

- Detect excessively regular (low entropy) or disordered (high entropy) communication patterns.

- Identify subnetworks with unnatural entropy changes over time.

Regarding dataset splitting and validation methods:

The paper appears to treat the entire dataset as a single set for evaluating the proposed method. However, it is essential to split the dataset into training and test sets to confirm the generalizability of the method and avoid overfitting. This division should be made, and performance evaluation should be conducted on the test set. Also, it is strongly recommended to apply methods such as k-fold cross-validation to maximize the use of limited datasets. This can increase the reliability and reproducibility of the results.

It is recommended to compare the proposed method with existing methods using evaluation metrics other than LCC size reduction (e.g., network efficiency, changes in centrality metrics). This can more clearly demonstrate the relative advantage of the proposed method. It is also necessary to verify and report the statistical significance of the obtained results using appropriate statistical tests. Furthermore, it is strongly recommended to conduct a more detailed sensitivity analysis on the main parameters of the proposed method, especially the number of nodes to be removed. Specifically:

a) Provide graphs or tables quantitatively showing the relationship between the number of nodes removed and detection accuracy.

b) Propose a methodology for determining the optimal number of nodes to remove and explain its theoretical basis.

c) Analyze the differences in detection performance between cases with few and many nodes removed, and consider the reasons for these differences.

Please provide a detailed analysis of how effectively the proposed method can identify more sophisticated, difficult-to-detect anomaly patterns. Consider the following points:

a) Evaluate the ability to detect abnormal patterns that cleverly mimic general network structures.

b) Analyze the detection capability for temporally changing anomaly patterns or distributed anomaly patterns spanning multiple subnetworks.

c) Clearly distinguish the types of anomaly patterns that the proposed method can detect particularly effectively and those that are difficult to detect, and explain the reasons for this.

Evaluate the robustness of the proposed method against extreme network structures and special cases:

a) Analyze performance in very dense or very sparse networks.

b) Investigate behavior in networks with extremely high (or low) scale-free or small-world properties.

c) Compare performance in these edge cases with performance in typical cases, and clarify the limits of application of the method.

Reviewer #4: The authors made a carefully revision of their manuscript according to the Reviewers' comments. Therefore, I recommend it for publication in its current form.

**********

7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: No

Reviewer #2: No

Reviewer #3: Yes: Yasuko Kawahata

Reviewer #4: No

**********

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step.

Revision 2

Reponses are provided in the attached rebuttal letter.

Attachments
Attachment
Submitted filename: Rebuttal_letter_R2.pdf
Decision Letter - Giacomo Fiumara, Editor

Network disruption via continuous batch removal: The case of Sicilian Mafia

PONE-D-23-41294R2

Dear Dr. Mingshan Jia,

We’re pleased to inform you that your manuscript has been judged scientifically suitable for publication and will be formally accepted for publication once it meets all outstanding technical requirements.

Within one week, you’ll receive an e-mail detailing the required amendments. When these have been addressed, you’ll receive a formal acceptance letter and your manuscript will be scheduled for publication.

An invoice will be generated when your article is formally accepted. Please note, if your institution has a publishing partnership with PLOS and your article meets the relevant criteria, all or part of your publication costs will be covered. Please make sure your user information is up-to-date by logging into Editorial Manager at Editorial Manager® and clicking the ‘Update My Information' link at the top of the page. If you have any questions relating to publication charges, please contact our Author Billing department directly at authorbilling@plos.org.

If your institution or institutions have a press office, please notify them about your upcoming paper to help maximize its impact. If they’ll be preparing press materials, please inform our press team as soon as possible -- no later than 48 hours after receiving the formal acceptance. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

Kind regards,

Giacomo Fiumara, PhD

Academic Editor

PLOS ONE

Additional Editor Comments (optional):

The manuscript has been significantly improved in the various revisions. All concerns raised by the Reviewers have been fully addressed. The manuscript can be accepted for publication in PLOS ONE.

Reviewers' comments:

Formally Accepted
Acceptance Letter - Giacomo Fiumara, Editor

PONE-D-23-41294R2

PLOS ONE

Dear Dr. Jia,

I'm pleased to inform you that your manuscript has been deemed suitable for publication in PLOS ONE. Congratulations! Your manuscript is now being handed over to our production team.

At this stage, our production department will prepare your paper for publication. This includes ensuring the following:

* All references, tables, and figures are properly cited

* All relevant supporting information is included in the manuscript submission,

* There are no issues that prevent the paper from being properly typeset

If revisions are needed, the production department will contact you directly to resolve them. If no revisions are needed, you will receive an email when the publication date has been set. At this time, we do not offer pre-publication proofs to authors during production of the accepted work. Please keep in mind that we are working through a large volume of accepted articles, so please give us a few weeks to review your paper and let you know the next and final steps.

Lastly, if your institution or institutions have a press office, please let them know about your upcoming paper now to help maximize its impact. If they'll be preparing press materials, please inform our press team within the next 48 hours. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

If we can help with anything else, please email us at customercare@plos.org.

Thank you for submitting your work to PLOS ONE and supporting open access.

Kind regards,

PLOS ONE Editorial Office Staff

on behalf of

Dr. Giacomo Fiumara

Academic Editor

PLOS ONE

Open letter on the publication of peer review reports

PLOS recognizes the benefits of transparency in the peer review process. Therefore, we enable the publication of all of the content of peer review and author responses alongside final, published articles. Reviewers remain anonymous, unless they choose to reveal their names.

We encourage other journals to join us in this initiative. We hope that our action inspires the community, including researchers, research funders, and research institutions, to recognize the benefits of published peer review reports for all parts of the research system.

Learn more at ASAPbio .