Novel Aspects of Secure Medical Image Encryption using Block-Chain and Transformer-Based Deep Learning Model Article Swipe
The vulnerability of medical images is a significant challenge in state-of-the-art telemedicine and Internet of Things (IoT)-based healthcare systems. This paper aims to develop a more comprehensive framework for secure encryption of medical images that fuses blockchain technology into a Transformer-based deep learning model (EB-TDLM) to strengthen data security, privacy, and integrity. And because blockchain is decentralized, data can be securely and immutably contained — meaning less compromise with unauthorized access and data breaches. Moreover, the EB-TDLM model adopts Transformer-driven key generation and upgraded encryption methods, enhancing the encryption robustness greatly. We thoroughly evaluate the proposed framework with experimental analysis and show its effective performance on multiple security metrics. Model has obtained an entropy value of 16.99, which indicates that there is high randomness present in encrypted images. It is highly sensitive to pixel change, achieving 99.99% NPCR (Number of Pixels Change Rate) and UACI (Unified Average Changing Intensity) of 39.49%, and showing a high resistance to differential attack. Moreover, the encryption has very low MSE (0.05), which guarantees almost lossless reconstruction of medical images. Structural integrity, reflected by Structural Similarity Index (SSIM) of 1.0, is crucially maintained in reconstructed images. These findings position the EB-TDLM framework as an exceptionally reliable and efficient approach to safeguarding medical data in IoT-enabled healthcare environments. The proposed system serves as a scalable and effective mechanism for further securing sensitive medical images in contemporary healthcare networks by overcoming key challenges in telemedicine security.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.52783/jisem.v10i33s.5474
- https://jisem-journal.com/index.php/journal/article/download/5474/2583
- OA Status
- diamond
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4409432222
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4409432222Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.52783/jisem.v10i33s.5474Digital Object Identifier
- Title
-
Novel Aspects of Secure Medical Image Encryption using Block-Chain and Transformer-Based Deep Learning ModelWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-04-08Full publication date if available
- Authors
-
R. N. PatelList of authors in order
- Landing page
-
https://doi.org/10.52783/jisem.v10i33s.5474Publisher landing page
- PDF URL
-
https://jisem-journal.com/index.php/journal/article/download/5474/2583Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://jisem-journal.com/index.php/journal/article/download/5474/2583Direct OA link when available
- Concepts
-
Encryption, Computer science, Transformer, Image (mathematics), Block (permutation group theory), Artificial intelligence, Computer security, Engineering, Electrical engineering, Mathematics, Voltage, GeometryTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4409432222 |
|---|---|
| doi | https://doi.org/10.52783/jisem.v10i33s.5474 |
| ids.doi | https://doi.org/10.52783/jisem.v10i33s.5474 |
| ids.openalex | https://openalex.org/W4409432222 |
| fwci | 0.0 |
| type | article |
| title | Novel Aspects of Secure Medical Image Encryption using Block-Chain and Transformer-Based Deep Learning Model |
| biblio.issue | 33s |
| biblio.volume | 10 |
| biblio.last_page | 257 |
| biblio.first_page | 242 |
| topics[0].id | https://openalex.org/T11017 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.8689000010490417 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1707 |
| topics[0].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[0].display_name | Chaos-based Image/Signal Encryption |
| topics[1].id | https://openalex.org/T12357 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.8639000058174133 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1707 |
| topics[1].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[1].display_name | Digital Media Forensic Detection |
| topics[2].id | https://openalex.org/T10388 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.8474000096321106 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1707 |
| topics[2].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[2].display_name | Advanced Steganography and Watermarking Techniques |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C148730421 |
| concepts[0].level | 2 |
| concepts[0].score | 0.6221320629119873 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[0].display_name | Encryption |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.5904171466827393 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C66322947 |
| concepts[2].level | 3 |
| concepts[2].score | 0.5536450147628784 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q11658 |
| concepts[2].display_name | Transformer |
| concepts[3].id | https://openalex.org/C115961682 |
| concepts[3].level | 2 |
| concepts[3].score | 0.4604180157184601 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q860623 |
| concepts[3].display_name | Image (mathematics) |
| concepts[4].id | https://openalex.org/C2777210771 |
| concepts[4].level | 2 |
| concepts[4].score | 0.4477597773075104 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q4927124 |
| concepts[4].display_name | Block (permutation group theory) |
| concepts[5].id | https://openalex.org/C154945302 |
| concepts[5].level | 1 |
| concepts[5].score | 0.44712314009666443 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[5].display_name | Artificial intelligence |
| concepts[6].id | https://openalex.org/C38652104 |
| concepts[6].level | 1 |
| concepts[6].score | 0.2624211311340332 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[6].display_name | Computer security |
| concepts[7].id | https://openalex.org/C127413603 |
| concepts[7].level | 0 |
| concepts[7].score | 0.16950762271881104 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[7].display_name | Engineering |
| concepts[8].id | https://openalex.org/C119599485 |
| concepts[8].level | 1 |
| concepts[8].score | 0.15003588795661926 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q43035 |
| concepts[8].display_name | Electrical engineering |
| concepts[9].id | https://openalex.org/C33923547 |
| concepts[9].level | 0 |
| concepts[9].score | 0.14886432886123657 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[9].display_name | Mathematics |
| concepts[10].id | https://openalex.org/C165801399 |
| concepts[10].level | 2 |
| concepts[10].score | 0.06372764706611633 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q25428 |
| concepts[10].display_name | Voltage |
| concepts[11].id | https://openalex.org/C2524010 |
| concepts[11].level | 1 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q8087 |
| concepts[11].display_name | Geometry |
| keywords[0].id | https://openalex.org/keywords/encryption |
| keywords[0].score | 0.6221320629119873 |
| keywords[0].display_name | Encryption |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.5904171466827393 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/transformer |
| keywords[2].score | 0.5536450147628784 |
| keywords[2].display_name | Transformer |
| keywords[3].id | https://openalex.org/keywords/image |
| keywords[3].score | 0.4604180157184601 |
| keywords[3].display_name | Image (mathematics) |
| keywords[4].id | https://openalex.org/keywords/block |
| keywords[4].score | 0.4477597773075104 |
| keywords[4].display_name | Block (permutation group theory) |
| keywords[5].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[5].score | 0.44712314009666443 |
| keywords[5].display_name | Artificial intelligence |
| keywords[6].id | https://openalex.org/keywords/computer-security |
| keywords[6].score | 0.2624211311340332 |
| keywords[6].display_name | Computer security |
| keywords[7].id | https://openalex.org/keywords/engineering |
| keywords[7].score | 0.16950762271881104 |
| keywords[7].display_name | Engineering |
| keywords[8].id | https://openalex.org/keywords/electrical-engineering |
| keywords[8].score | 0.15003588795661926 |
| keywords[8].display_name | Electrical engineering |
| keywords[9].id | https://openalex.org/keywords/mathematics |
| keywords[9].score | 0.14886432886123657 |
| keywords[9].display_name | Mathematics |
| keywords[10].id | https://openalex.org/keywords/voltage |
| keywords[10].score | 0.06372764706611633 |
| keywords[10].display_name | Voltage |
| language | en |
| locations[0].id | doi:10.52783/jisem.v10i33s.5474 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2737791640 |
| locations[0].source.issn | 2468-4376 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2468-4376 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Journal of Information Systems Engineering & Management |
| locations[0].source.host_organization | https://openalex.org/P4310320063 |
| locations[0].source.host_organization_name | Lectito Journals |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310320063 |
| locations[0].source.host_organization_lineage_names | Lectito Journals |
| locations[0].license | |
| locations[0].pdf_url | https://jisem-journal.com/index.php/journal/article/download/5474/2583 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Journal of Information Systems Engineering and Management |
| locations[0].landing_page_url | https://doi.org/10.52783/jisem.v10i33s.5474 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5083581064 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-1630-7256 |
| authorships[0].author.display_name | R. N. Patel |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | None Rucha Patel |
| authorships[0].is_corresponding | True |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://jisem-journal.com/index.php/journal/article/download/5474/2583 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Novel Aspects of Secure Medical Image Encryption using Block-Chain and Transformer-Based Deep Learning Model |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11017 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.8689000010490417 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1707 |
| primary_topic.subfield.display_name | Computer Vision and Pattern Recognition |
| primary_topic.display_name | Chaos-based Image/Signal Encryption |
| related_works | https://openalex.org/W2100090372, https://openalex.org/W4361205702, https://openalex.org/W2385965183, https://openalex.org/W4289281780, https://openalex.org/W2013342653, https://openalex.org/W2901818815, https://openalex.org/W4237598585, https://openalex.org/W2375981391, https://openalex.org/W45120566, https://openalex.org/W2361408597 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.52783/jisem.v10i33s.5474 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2737791640 |
| best_oa_location.source.issn | 2468-4376 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2468-4376 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Journal of Information Systems Engineering & Management |
| best_oa_location.source.host_organization | https://openalex.org/P4310320063 |
| best_oa_location.source.host_organization_name | Lectito Journals |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310320063 |
| best_oa_location.source.host_organization_lineage_names | Lectito Journals |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://jisem-journal.com/index.php/journal/article/download/5474/2583 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Journal of Information Systems Engineering and Management |
| best_oa_location.landing_page_url | https://doi.org/10.52783/jisem.v10i33s.5474 |
| primary_location.id | doi:10.52783/jisem.v10i33s.5474 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2737791640 |
| primary_location.source.issn | 2468-4376 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2468-4376 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Journal of Information Systems Engineering & Management |
| primary_location.source.host_organization | https://openalex.org/P4310320063 |
| primary_location.source.host_organization_name | Lectito Journals |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310320063 |
| primary_location.source.host_organization_lineage_names | Lectito Journals |
| primary_location.license | |
| primary_location.pdf_url | https://jisem-journal.com/index.php/journal/article/download/5474/2583 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Journal of Information Systems Engineering and Management |
| primary_location.landing_page_url | https://doi.org/10.52783/jisem.v10i33s.5474 |
| publication_date | 2025-04-08 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 6, 24, 39, 153, 217 |
| abstract_inverted_index.It | 128 |
| abstract_inverted_index.We | 91 |
| abstract_inverted_index.an | 112, 198 |
| abstract_inverted_index.as | 197, 216 |
| abstract_inverted_index.be | 59 |
| abstract_inverted_index.by | 178, 232 |
| abstract_inverted_index.in | 9, 125, 188, 208, 228, 236 |
| abstract_inverted_index.is | 5, 55, 121, 129, 185 |
| abstract_inverted_index.of | 2, 14, 31, 115, 139, 149, 172, 183 |
| abstract_inverted_index.on | 105 |
| abstract_inverted_index.to | 22, 45, 132, 156, 204 |
| abstract_inverted_index.And | 52 |
| abstract_inverted_index.MSE | 165 |
| abstract_inverted_index.The | 0, 212 |
| abstract_inverted_index.and | 12, 50, 61, 71, 82, 100, 143, 151, 201, 219 |
| abstract_inverted_index.can | 58 |
| abstract_inverted_index.for | 28, 222 |
| abstract_inverted_index.has | 110, 162 |
| abstract_inverted_index.its | 102 |
| abstract_inverted_index.key | 80, 234 |
| abstract_inverted_index.low | 164 |
| abstract_inverted_index.the | 75, 87, 94, 160, 194 |
| abstract_inverted_index.— | 64 |
| abstract_inverted_index.1.0, | 184 |
| abstract_inverted_index.NPCR | 137 |
| abstract_inverted_index.This | 19 |
| abstract_inverted_index.UACI | 144 |
| abstract_inverted_index.aims | 21 |
| abstract_inverted_index.data | 47, 57, 72, 207 |
| abstract_inverted_index.deep | 41 |
| abstract_inverted_index.high | 122, 154 |
| abstract_inverted_index.into | 38 |
| abstract_inverted_index.less | 66 |
| abstract_inverted_index.more | 25 |
| abstract_inverted_index.show | 101 |
| abstract_inverted_index.that | 34, 119 |
| abstract_inverted_index.very | 163 |
| abstract_inverted_index.with | 68, 97 |
| abstract_inverted_index.Index | 181 |
| abstract_inverted_index.Model | 109 |
| abstract_inverted_index.Rate) | 142 |
| abstract_inverted_index.These | 191 |
| abstract_inverted_index.fuses | 35 |
| abstract_inverted_index.model | 43, 77 |
| abstract_inverted_index.paper | 20 |
| abstract_inverted_index.pixel | 133 |
| abstract_inverted_index.there | 120 |
| abstract_inverted_index.value | 114 |
| abstract_inverted_index.which | 117, 167 |
| abstract_inverted_index.(SSIM) | 182 |
| abstract_inverted_index.16.99, | 116 |
| abstract_inverted_index.99.99% | 136 |
| abstract_inverted_index.Change | 141 |
| abstract_inverted_index.Pixels | 140 |
| abstract_inverted_index.Things | 15 |
| abstract_inverted_index.access | 70 |
| abstract_inverted_index.adopts | 78 |
| abstract_inverted_index.almost | 169 |
| abstract_inverted_index.highly | 130 |
| abstract_inverted_index.images | 4, 33, 227 |
| abstract_inverted_index.secure | 29 |
| abstract_inverted_index.serves | 215 |
| abstract_inverted_index.system | 214 |
| abstract_inverted_index.(0.05), | 166 |
| abstract_inverted_index.(Number | 138 |
| abstract_inverted_index.39.49%, | 150 |
| abstract_inverted_index.Average | 146 |
| abstract_inverted_index.EB-TDLM | 76, 195 |
| abstract_inverted_index.attack. | 158 |
| abstract_inverted_index.because | 53 |
| abstract_inverted_index.change, | 134 |
| abstract_inverted_index.develop | 23 |
| abstract_inverted_index.entropy | 113 |
| abstract_inverted_index.further | 223 |
| abstract_inverted_index.images. | 127, 174, 190 |
| abstract_inverted_index.meaning | 65 |
| abstract_inverted_index.medical | 3, 32, 173, 206, 226 |
| abstract_inverted_index.present | 124 |
| abstract_inverted_index.showing | 152 |
| abstract_inverted_index.(Unified | 145 |
| abstract_inverted_index.Changing | 147 |
| abstract_inverted_index.Internet | 13 |
| abstract_inverted_index.analysis | 99 |
| abstract_inverted_index.approach | 203 |
| abstract_inverted_index.evaluate | 93 |
| abstract_inverted_index.findings | 192 |
| abstract_inverted_index.greatly. | 90 |
| abstract_inverted_index.learning | 42 |
| abstract_inverted_index.lossless | 170 |
| abstract_inverted_index.methods, | 85 |
| abstract_inverted_index.metrics. | 108 |
| abstract_inverted_index.multiple | 106 |
| abstract_inverted_index.networks | 231 |
| abstract_inverted_index.obtained | 111 |
| abstract_inverted_index.position | 193 |
| abstract_inverted_index.privacy, | 49 |
| abstract_inverted_index.proposed | 95, 213 |
| abstract_inverted_index.reliable | 200 |
| abstract_inverted_index.scalable | 218 |
| abstract_inverted_index.securely | 60 |
| abstract_inverted_index.securing | 224 |
| abstract_inverted_index.security | 107 |
| abstract_inverted_index.systems. | 18 |
| abstract_inverted_index.upgraded | 83 |
| abstract_inverted_index.(EB-TDLM) | 44 |
| abstract_inverted_index.Moreover, | 74, 159 |
| abstract_inverted_index.achieving | 135 |
| abstract_inverted_index.breaches. | 73 |
| abstract_inverted_index.challenge | 8 |
| abstract_inverted_index.contained | 63 |
| abstract_inverted_index.crucially | 186 |
| abstract_inverted_index.effective | 103, 220 |
| abstract_inverted_index.efficient | 202 |
| abstract_inverted_index.encrypted | 126 |
| abstract_inverted_index.enhancing | 86 |
| abstract_inverted_index.framework | 27, 96, 196 |
| abstract_inverted_index.immutably | 62 |
| abstract_inverted_index.indicates | 118 |
| abstract_inverted_index.mechanism | 221 |
| abstract_inverted_index.reflected | 177 |
| abstract_inverted_index.security, | 48 |
| abstract_inverted_index.security. | 238 |
| abstract_inverted_index.sensitive | 131, 225 |
| abstract_inverted_index.Intensity) | 148 |
| abstract_inverted_index.Similarity | 180 |
| abstract_inverted_index.Structural | 175, 179 |
| abstract_inverted_index.blockchain | 36, 54 |
| abstract_inverted_index.challenges | 235 |
| abstract_inverted_index.compromise | 67 |
| abstract_inverted_index.encryption | 30, 84, 88, 161 |
| abstract_inverted_index.generation | 81 |
| abstract_inverted_index.guarantees | 168 |
| abstract_inverted_index.healthcare | 17, 210, 230 |
| abstract_inverted_index.integrity, | 176 |
| abstract_inverted_index.integrity. | 51 |
| abstract_inverted_index.maintained | 187 |
| abstract_inverted_index.overcoming | 233 |
| abstract_inverted_index.randomness | 123 |
| abstract_inverted_index.resistance | 155 |
| abstract_inverted_index.robustness | 89 |
| abstract_inverted_index.strengthen | 46 |
| abstract_inverted_index.technology | 37 |
| abstract_inverted_index.thoroughly | 92 |
| abstract_inverted_index.(IoT)-based | 16 |
| abstract_inverted_index.IoT-enabled | 209 |
| abstract_inverted_index.performance | 104 |
| abstract_inverted_index.significant | 7 |
| abstract_inverted_index.contemporary | 229 |
| abstract_inverted_index.differential | 157 |
| abstract_inverted_index.experimental | 98 |
| abstract_inverted_index.safeguarding | 205 |
| abstract_inverted_index.telemedicine | 11, 237 |
| abstract_inverted_index.unauthorized | 69 |
| abstract_inverted_index.comprehensive | 26 |
| abstract_inverted_index.environments. | 211 |
| abstract_inverted_index.exceptionally | 199 |
| abstract_inverted_index.reconstructed | 189 |
| abstract_inverted_index.vulnerability | 1 |
| abstract_inverted_index.decentralized, | 56 |
| abstract_inverted_index.reconstruction | 171 |
| abstract_inverted_index.state-of-the-art | 10 |
| abstract_inverted_index.Transformer-based | 40 |
| abstract_inverted_index.Transformer-driven | 79 |
| cited_by_percentile_year | |
| corresponding_author_ids | https://openalex.org/A5083581064 |
| countries_distinct_count | 0 |
| institutions_distinct_count | 1 |
| citation_normalized_percentile.value | 0.11528161 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |