Secure Transactions in IoT Network Using PINN ‐Based Intrusion Detection System and HDPoA Blockchain Protocol
Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1002/ett.70116
IoT is a rapidly developing technology with a wealth of creative application possibilities. However, IoT wireless sensor networks are vulnerable to Denial of Service (DoS) attacks due to their insecure nature. Although network integrity and security have been ensured through the use of distributed ledger and blockchain technologies, privacy preservation concerns frequently arise with traditional approaches. So, deep learning‐based Physics‐informed neural networks (PINN) and Honesty‐based Distributed Proof‐of‐Authority (HDPoA) are developed to enhance transaction security and detect intrusions. Initially, the mobile nodes were deployed in different regions to gather transactions and an intrusion detection system to analyze attacks. First, the Intrusion Detection System (IDS) uses a deep learning approach for detecting the intrusion in the network. For that, the collected data from the deployed nodes are pre‐processed using Variational auto‐encoder and min‐max normalization to standardize input dataset values. Then the features are selected using wild horse optimization and classified using PINN to predict data attack or non‐attack. After that, Homomorphic variable tag generation is used for normal transactions with multiple copies in the same document, which are then converted into hash values using the Keccak hashing function. The miner validates transactions based on rank‐based priority. Honesty‐based Distributed Proof‐of‐Authority (HDPoA) was used for network security, making it suitable for deployment in blockchain‐based IoT applications. The proposed deep learning‐based PINN classifier reached 97.2% accuracy and 96.52% specificity. Homomorphic variable (HV) tag generation takes 0.4 s, while the Keccak algorithm takes 0.3 s for hash generation, and the HDPoA protocol has 420 s for block generation time.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1002/ett.70116
- https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/ett.70116
- OA Status
- bronze
- References
- 43
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4409241196
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4409241196Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1002/ett.70116Digital Object Identifier
- Title
-
Secure Transactions in
IoT Network UsingPINN ‐Based Intrusion Detection System andHDPoA Blockchain ProtocolWork title - Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-04-01Full publication date if available
- Authors
-
Sourav Mishra, Vijay Kumar ChaurasiyaList of authors in order
- Landing page
-
https://doi.org/10.1002/ett.70116Publisher landing page
- PDF URL
-
https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/ett.70116Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
bronzeOpen access status per OpenAlex
- OA URL
-
https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/ett.70116Direct OA link when available
- Concepts
-
Blockchain, Computer science, Computer network, Computer securityTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
43Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4409241196 |
|---|---|
| doi | https://doi.org/10.1002/ett.70116 |
| ids.doi | https://doi.org/10.1002/ett.70116 |
| ids.openalex | https://openalex.org/W4409241196 |
| fwci | 0.0 |
| type | article |
| title | Secure Transactions in |
| biblio.issue | 4 |
| biblio.volume | 36 |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9988999962806702 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T10270 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9965999722480774 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1710 |
| topics[1].subfield.display_name | Information Systems |
| topics[1].display_name | Blockchain Technology Applications and Security |
| topics[2].id | https://openalex.org/T13038 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9959999918937683 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Internet of Things and AI |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C2779687700 |
| concepts[0].level | 2 |
| concepts[0].score | 0.7138063907623291 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q20514253 |
| concepts[0].display_name | Blockchain |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.5684972405433655 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C31258907 |
| concepts[2].level | 1 |
| concepts[2].score | 0.5499715805053711 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[2].display_name | Computer network |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.22918865084648132 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| keywords[0].id | https://openalex.org/keywords/blockchain |
| keywords[0].score | 0.7138063907623291 |
| keywords[0].display_name | Blockchain |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.5684972405433655 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/computer-network |
| keywords[2].score | 0.5499715805053711 |
| keywords[2].display_name | Computer network |
| keywords[3].id | https://openalex.org/keywords/computer-security |
| keywords[3].score | 0.22918865084648132 |
| keywords[3].display_name | Computer security |
| language | en |
| locations[0].id | doi:10.1002/ett.70116 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306425600 |
| locations[0].source.issn | 2161-3915, 2161-5748 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2161-3915 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Transactions on Emerging Telecommunications Technologies |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | |
| locations[0].pdf_url | https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/ett.70116 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Transactions on Emerging Telecommunications Technologies |
| locations[0].landing_page_url | https://doi.org/10.1002/ett.70116 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5078625249 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-6169-2176 |
| authorships[0].author.display_name | Sourav Mishra |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I26072440 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Information Technology Indian Institute of Information Technology Prayagraj India |
| authorships[0].institutions[0].id | https://openalex.org/I26072440 |
| authorships[0].institutions[0].ror | https://ror.org/03rgjt374 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I26072440 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Indian Institute of Information Technology Allahabad |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Sourav Mishra |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Information Technology Indian Institute of Information Technology Prayagraj India |
| authorships[1].author.id | https://openalex.org/A5064240021 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-6146-7128 |
| authorships[1].author.display_name | Vijay Kumar Chaurasiya |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I26072440 |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Information Technology Indian Institute of Information Technology Prayagraj India |
| authorships[1].institutions[0].id | https://openalex.org/I26072440 |
| authorships[1].institutions[0].ror | https://ror.org/03rgjt374 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I26072440 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Indian Institute of Information Technology Allahabad |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Vijay Kumar Chaurasiya |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Department of Information Technology Indian Institute of Information Technology Prayagraj India |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/ett.70116 |
| open_access.oa_status | bronze |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Secure Transactions in |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9988999962806702 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2899084033, https://openalex.org/W2748952813, https://openalex.org/W4210406818, https://openalex.org/W4306779889, https://openalex.org/W3048554917, https://openalex.org/W3211706803, https://openalex.org/W4382775358, https://openalex.org/W4246942721, https://openalex.org/W3209862047 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1002/ett.70116 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306425600 |
| best_oa_location.source.issn | 2161-3915, 2161-5748 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 2161-3915 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Transactions on Emerging Telecommunications Technologies |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/ett.70116 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Transactions on Emerging Telecommunications Technologies |
| best_oa_location.landing_page_url | https://doi.org/10.1002/ett.70116 |
| primary_location.id | doi:10.1002/ett.70116 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306425600 |
| primary_location.source.issn | 2161-3915, 2161-5748 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2161-3915 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Transactions on Emerging Telecommunications Technologies |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | |
| primary_location.pdf_url | https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/ett.70116 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Transactions on Emerging Telecommunications Technologies |
| primary_location.landing_page_url | https://doi.org/10.1002/ett.70116 |
| publication_date | 2025-04-01 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W3042667087, https://openalex.org/W3202123766, https://openalex.org/W4210531685, https://openalex.org/W4402715890, https://openalex.org/W4309235938, https://openalex.org/W4321372786, https://openalex.org/W2923916638, https://openalex.org/W4399426617, https://openalex.org/W4401684930, https://openalex.org/W2889157463, https://openalex.org/W4285125998, https://openalex.org/W2792607730, https://openalex.org/W3146664580, https://openalex.org/W4386220610, https://openalex.org/W2989256138, https://openalex.org/W3010157558, https://openalex.org/W3080418411, https://openalex.org/W3162620147, https://openalex.org/W4312204616, https://openalex.org/W3048225388, https://openalex.org/W3200695110, https://openalex.org/W3173455696, https://openalex.org/W4309548460, https://openalex.org/W4283323958, https://openalex.org/W3011462710, https://openalex.org/W3006666625, https://openalex.org/W3037424985, https://openalex.org/W4288430950, https://openalex.org/W4385471846, https://openalex.org/W4316037971, https://openalex.org/W4293764577, https://openalex.org/W4389078271, https://openalex.org/W3012113472, https://openalex.org/W3134799368, https://openalex.org/W4386139752, https://openalex.org/W2969112344, https://openalex.org/W2793013392, https://openalex.org/W3168771234, https://openalex.org/W3158456479, https://openalex.org/W3136238191, https://openalex.org/W3096924870, https://openalex.org/W4400019200, https://openalex.org/W2984693664 |
| referenced_works_count | 43 |
| abstract_inverted_index.a | 3, 8, 105 |
| abstract_inverted_index.s | 239, 249 |
| abstract_inverted_index.an | 91 |
| abstract_inverted_index.in | 84, 113, 171, 209 |
| abstract_inverted_index.is | 2, 163 |
| abstract_inverted_index.it | 205 |
| abstract_inverted_index.of | 10, 23, 43 |
| abstract_inverted_index.on | 192 |
| abstract_inverted_index.or | 155 |
| abstract_inverted_index.s, | 232 |
| abstract_inverted_index.to | 21, 28, 71, 87, 95, 133, 151 |
| abstract_inverted_index.0.3 | 238 |
| abstract_inverted_index.0.4 | 231 |
| abstract_inverted_index.420 | 248 |
| abstract_inverted_index.For | 116 |
| abstract_inverted_index.IoT | 1, 15, 211 |
| abstract_inverted_index.So, | 57 |
| abstract_inverted_index.The | 187, 213 |
| abstract_inverted_index.and | 35, 46, 64, 75, 90, 130, 147, 222, 243 |
| abstract_inverted_index.are | 19, 69, 125, 141, 176 |
| abstract_inverted_index.due | 27 |
| abstract_inverted_index.for | 109, 165, 201, 207, 240, 250 |
| abstract_inverted_index.has | 247 |
| abstract_inverted_index.tag | 161, 228 |
| abstract_inverted_index.the | 41, 79, 99, 111, 114, 118, 122, 139, 172, 183, 234, 244 |
| abstract_inverted_index.use | 42 |
| abstract_inverted_index.was | 199 |
| abstract_inverted_index.(HV) | 227 |
| abstract_inverted_index.PINN | 150, 217 |
| abstract_inverted_index.Then | 138 |
| abstract_inverted_index.been | 38 |
| abstract_inverted_index.data | 120, 153 |
| abstract_inverted_index.deep | 58, 106, 215 |
| abstract_inverted_index.from | 121 |
| abstract_inverted_index.hash | 180, 241 |
| abstract_inverted_index.have | 37 |
| abstract_inverted_index.into | 179 |
| abstract_inverted_index.same | 173 |
| abstract_inverted_index.then | 177 |
| abstract_inverted_index.used | 164, 200 |
| abstract_inverted_index.uses | 104 |
| abstract_inverted_index.were | 82 |
| abstract_inverted_index.wild | 144 |
| abstract_inverted_index.with | 7, 54, 168 |
| abstract_inverted_index.(DoS) | 25 |
| abstract_inverted_index.(IDS) | 103 |
| abstract_inverted_index.97.2% | 220 |
| abstract_inverted_index.After | 157 |
| abstract_inverted_index.HDPoA | 245 |
| abstract_inverted_index.arise | 53 |
| abstract_inverted_index.based | 191 |
| abstract_inverted_index.block | 251 |
| abstract_inverted_index.horse | 145 |
| abstract_inverted_index.input | 135 |
| abstract_inverted_index.miner | 188 |
| abstract_inverted_index.nodes | 81, 124 |
| abstract_inverted_index.takes | 230, 237 |
| abstract_inverted_index.that, | 117, 158 |
| abstract_inverted_index.their | 29 |
| abstract_inverted_index.time. | 253 |
| abstract_inverted_index.using | 127, 143, 149, 182 |
| abstract_inverted_index.which | 175 |
| abstract_inverted_index.while | 233 |
| abstract_inverted_index.(PINN) | 63 |
| abstract_inverted_index.96.52% | 223 |
| abstract_inverted_index.Denial | 22 |
| abstract_inverted_index.First, | 98 |
| abstract_inverted_index.Keccak | 184, 235 |
| abstract_inverted_index.System | 102 |
| abstract_inverted_index.attack | 154 |
| abstract_inverted_index.copies | 170 |
| abstract_inverted_index.detect | 76 |
| abstract_inverted_index.gather | 88 |
| abstract_inverted_index.ledger | 45 |
| abstract_inverted_index.making | 204 |
| abstract_inverted_index.mobile | 80 |
| abstract_inverted_index.neural | 61 |
| abstract_inverted_index.normal | 166 |
| abstract_inverted_index.sensor | 17 |
| abstract_inverted_index.system | 94 |
| abstract_inverted_index.values | 181 |
| abstract_inverted_index.wealth | 9 |
| abstract_inverted_index.(HDPoA) | 68, 198 |
| abstract_inverted_index.Service | 24 |
| abstract_inverted_index.analyze | 96 |
| abstract_inverted_index.attacks | 26 |
| abstract_inverted_index.dataset | 136 |
| abstract_inverted_index.enhance | 72 |
| abstract_inverted_index.ensured | 39 |
| abstract_inverted_index.hashing | 185 |
| abstract_inverted_index.nature. | 31 |
| abstract_inverted_index.network | 33, 202 |
| abstract_inverted_index.predict | 152 |
| abstract_inverted_index.privacy | 49 |
| abstract_inverted_index.rapidly | 4 |
| abstract_inverted_index.reached | 219 |
| abstract_inverted_index.regions | 86 |
| abstract_inverted_index.through | 40 |
| abstract_inverted_index.values. | 137 |
| abstract_inverted_index.ABSTRACT | 0 |
| abstract_inverted_index.Although | 32 |
| abstract_inverted_index.However, | 14 |
| abstract_inverted_index.accuracy | 221 |
| abstract_inverted_index.approach | 108 |
| abstract_inverted_index.attacks. | 97 |
| abstract_inverted_index.concerns | 51 |
| abstract_inverted_index.creative | 11 |
| abstract_inverted_index.deployed | 83, 123 |
| abstract_inverted_index.features | 140 |
| abstract_inverted_index.insecure | 30 |
| abstract_inverted_index.learning | 107 |
| abstract_inverted_index.multiple | 169 |
| abstract_inverted_index.network. | 115 |
| abstract_inverted_index.networks | 18, 62 |
| abstract_inverted_index.proposed | 214 |
| abstract_inverted_index.protocol | 246 |
| abstract_inverted_index.security | 36, 74 |
| abstract_inverted_index.selected | 142 |
| abstract_inverted_index.suitable | 206 |
| abstract_inverted_index.variable | 160, 226 |
| abstract_inverted_index.wireless | 16 |
| abstract_inverted_index.Detection | 101 |
| abstract_inverted_index.Intrusion | 100 |
| abstract_inverted_index.algorithm | 236 |
| abstract_inverted_index.collected | 119 |
| abstract_inverted_index.converted | 178 |
| abstract_inverted_index.detecting | 110 |
| abstract_inverted_index.detection | 93 |
| abstract_inverted_index.developed | 70 |
| abstract_inverted_index.different | 85 |
| abstract_inverted_index.document, | 174 |
| abstract_inverted_index.function. | 186 |
| abstract_inverted_index.integrity | 34 |
| abstract_inverted_index.intrusion | 92, 112 |
| abstract_inverted_index.min‐max | 131 |
| abstract_inverted_index.priority. | 194 |
| abstract_inverted_index.security, | 203 |
| abstract_inverted_index.validates | 189 |
| abstract_inverted_index.Initially, | 78 |
| abstract_inverted_index.blockchain | 47 |
| abstract_inverted_index.classified | 148 |
| abstract_inverted_index.classifier | 218 |
| abstract_inverted_index.deployment | 208 |
| abstract_inverted_index.developing | 5 |
| abstract_inverted_index.frequently | 52 |
| abstract_inverted_index.generation | 162, 229, 252 |
| abstract_inverted_index.technology | 6 |
| abstract_inverted_index.vulnerable | 20 |
| abstract_inverted_index.Distributed | 66, 196 |
| abstract_inverted_index.Homomorphic | 159, 225 |
| abstract_inverted_index.Variational | 128 |
| abstract_inverted_index.application | 12 |
| abstract_inverted_index.approaches. | 56 |
| abstract_inverted_index.distributed | 44 |
| abstract_inverted_index.generation, | 242 |
| abstract_inverted_index.intrusions. | 77 |
| abstract_inverted_index.standardize | 134 |
| abstract_inverted_index.traditional | 55 |
| abstract_inverted_index.transaction | 73 |
| abstract_inverted_index.optimization | 146 |
| abstract_inverted_index.preservation | 50 |
| abstract_inverted_index.rank‐based | 193 |
| abstract_inverted_index.specificity. | 224 |
| abstract_inverted_index.transactions | 89, 167, 190 |
| abstract_inverted_index.applications. | 212 |
| abstract_inverted_index.non‐attack. | 156 |
| abstract_inverted_index.normalization | 132 |
| abstract_inverted_index.technologies, | 48 |
| abstract_inverted_index.auto‐encoder | 129 |
| abstract_inverted_index.possibilities. | 13 |
| abstract_inverted_index.Honesty‐based | 65, 195 |
| abstract_inverted_index.pre‐processed | 126 |
| abstract_inverted_index.learning‐based | 59, 216 |
| abstract_inverted_index.Physics‐informed | 60 |
| abstract_inverted_index.blockchain‐based | 210 |
| abstract_inverted_index.Proof‐of‐Authority | 67, 197 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 2 |
| citation_normalized_percentile.value | 0.11555564 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |