{"id":"https://openalex.org/W4389144910","doi":"https://doi.org/10.3390/a16120549","title":"Predicting the Impact of Data Poisoning Attacks in Blockchain-Enabled Supply Chain Networks","display_name":"Predicting the Impact of Data Poisoning Attacks in Blockchain-Enabled Supply Chain Networks","publication_year":2023,"publication_date":"2023-11-29","ids":{"openalex":"https://openalex.org/W4389144910","doi":"https://doi.org/10.3390/a16120549"},"language":"en","primary_location":{"id":"doi:10.3390/a16120549","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a16120549","pdf_url":"https://www.mdpi.com/1999-4893/16/12/549/pdf?version=1701246706","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-4893/16/12/549/pdf?version=1701246706","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027334588","display_name":"Usman Butt","orcid":"https://orcid.org/0000-0002-1703-8756"},"institutions":[{"id":"https://openalex.org/I193260172","display_name":"British University in Dubai","ror":"https://ror.org/00mc18523","country_code":"AE","type":"education","lineage":["https://openalex.org/I193260172"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Usman Javed Butt","raw_affiliation_strings":["Faculty of Engineering and IT, British University in Dubai, Dubai 345015, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering and IT, British University in Dubai, Dubai 345015, United Arab Emirates","institution_ids":["https://openalex.org/I193260172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092263831","display_name":"Osama Hussien","orcid":"https://orcid.org/0009-0009-0942-1112"},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Osama Hussien","raw_affiliation_strings":["Faculty of Engineering and Environment, Northumbria University, London NE1 8ST, UK"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering and Environment, Northumbria University, London NE1 8ST, UK","institution_ids":["https://openalex.org/I32394136"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093377265","display_name":"Krison Hasanaj","orcid":null},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Krison Hasanaj","raw_affiliation_strings":["Faculty of Engineering and Environment, Northumbria University, London NE1 8ST, UK"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering and Environment, Northumbria University, London NE1 8ST, UK","institution_ids":["https://openalex.org/I32394136"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066945309","display_name":"Khaled Shaalan","orcid":"https://orcid.org/0000-0003-0823-8390"},"institutions":[{"id":"https://openalex.org/I193260172","display_name":"British University in Dubai","ror":"https://ror.org/00mc18523","country_code":"AE","type":"education","lineage":["https://openalex.org/I193260172"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Khaled Shaalan","raw_affiliation_strings":["Faculty of Engineering and IT, British University in Dubai, Dubai 345015, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering and IT, British University in Dubai, Dubai 345015, United Arab Emirates","institution_ids":["https://openalex.org/I193260172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084524334","display_name":"Bilal Hassan","orcid":"https://orcid.org/0000-0002-1547-1134"},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Bilal Hassan","raw_affiliation_strings":["Faculty of Engineering and Environment, Northumbria University, London NE1 8ST, UK"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering and Environment, Northumbria University, London NE1 8ST, UK","institution_ids":["https://openalex.org/I32394136"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015951925","display_name":"Haider Al\u2010Khateeb","orcid":"https://orcid.org/0000-0001-8944-123X"},"institutions":[{"id":"https://openalex.org/I169199633","display_name":"Aston University","ror":"https://ror.org/05j0ve876","country_code":"GB","type":"education","lineage":["https://openalex.org/I169199633"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Haider al-Khateeb","raw_affiliation_strings":["Cyber Security Innovation (C.S.I.) Research Centre, Operations & Information Management, Aston University, Birmingham B4 7ET, UK"],"affiliations":[{"raw_affiliation_string":"Cyber Security Innovation (C.S.I.) Research Centre, Operations & Information Management, Aston University, Birmingham B4 7ET, UK","institution_ids":["https://openalex.org/I169199633"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5015951925"],"corresponding_institution_ids":["https://openalex.org/I169199633"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":2.3865,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.89618747,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"16","issue":"12","first_page":"549","last_page":"549"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7988419532775879},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6905715465545654},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.635090708732605},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.5939174890518188},{"id":"https://openalex.org/keywords/confusion-matrix","display_name":"Confusion matrix","score":0.5919107794761658},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.5810277462005615},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.5655885934829712},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5645022392272949},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45831555128097534},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4574763774871826},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4381493330001831},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.41157594323158264},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4075726270675659},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3897572457790375}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7988419532775879},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6905715465545654},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.635090708732605},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.5939174890518188},{"id":"https://openalex.org/C138602881","wikidata":"https://www.wikidata.org/wiki/Q2709591","display_name":"Confusion matrix","level":2,"score":0.5919107794761658},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.5810277462005615},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.5655885934829712},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5645022392272949},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45831555128097534},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4574763774871826},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4381493330001831},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.41157594323158264},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4075726270675659},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3897572457790375},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/a16120549","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a16120549","pdf_url":"https://www.mdpi.com/1999-4893/16/12/549/pdf?version=1701246706","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},{"id":"pmh:oai:publications.aston.ac.uk:45797","is_oa":true,"landing_page_url":"https://publications.aston.ac.uk/view/author/be583999fabcda3ce8bc22952e97362c.html>","pdf_url":"https://publications.aston.ac.uk/id/eprint/45797/1/algorithms-16-00549.pdf","source":{"id":"https://openalex.org/S4306400483","display_name":"Aston Publications Explorer (Aston University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I169199633","host_organization_name":"Aston University","host_organization_lineage":["https://openalex.org/I169199633"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:doaj.org/article:b03474174483478f9144fe52512515c8","is_oa":true,"landing_page_url":"https://doaj.org/article/b03474174483478f9144fe52512515c8","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Algorithms, Vol 16, Iss 12, p 549 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/a16120549","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a16120549","pdf_url":"https://www.mdpi.com/1999-4893/16/12/549/pdf?version=1701246706","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4389144910.pdf"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W1988251340","https://openalex.org/W2027968571","https://openalex.org/W2151298633","https://openalex.org/W2870670057","https://openalex.org/W2893123663","https://openalex.org/W2950204666","https://openalex.org/W2958119014","https://openalex.org/W3011235318","https://openalex.org/W3100068262","https://openalex.org/W3115360974","https://openalex.org/W3117572899","https://openalex.org/W3207326761","https://openalex.org/W3213330817","https://openalex.org/W3215107633","https://openalex.org/W3217417806","https://openalex.org/W4205093476","https://openalex.org/W4205569013","https://openalex.org/W4224068037","https://openalex.org/W4229015696","https://openalex.org/W4285404754","https://openalex.org/W4293195707","https://openalex.org/W4309503983","https://openalex.org/W4312337604","https://openalex.org/W4312767611","https://openalex.org/W4315486046","https://openalex.org/W4321243464","https://openalex.org/W4322736917","https://openalex.org/W4360841610","https://openalex.org/W4361019906","https://openalex.org/W4366815236","https://openalex.org/W4367310953","https://openalex.org/W4376630922","https://openalex.org/W4388288789"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W3157271777","https://openalex.org/W2377372927","https://openalex.org/W1495178644"],"abstract_inverted_index":{"As":[0],"computer":[1],"networks":[2,15],"become":[3],"increasingly":[4],"important":[5],"in":[6,20,50],"various":[7],"domains,":[8],"the":[9,21,51,84,181,192,215],"need":[10],"for":[11],"secure":[12],"and":[13,48,65,106,109,119,141,165],"reliable":[14],"becomes":[16],"more":[17,208],"pressing,":[18],"particularly":[19],"context":[22,193],"of":[23,86,139,152,173,183,194,218],"blockchain-enabled":[24,74,195],"supply":[25,75,196,221],"chain":[26,76,197,222],"networks.":[27,77,198,223],"One":[28],"way":[29],"to":[30,58,177,204,206,214],"ensure":[31],"network":[32,91,161],"security":[33],"is":[34,176],"by":[35],"using":[36,95,162],"intrusion":[37,92,210],"detection":[38,93,211],"systems":[39,55,212],"(IDSs),":[40],"which":[41,68],"are":[42,56],"specialised":[43],"devices":[44],"that":[45],"detect":[46],"anomalies":[47],"attacks":[49,88,147,186],"network.":[52],"However,":[53],"these":[54,87],"vulnerable":[57],"data":[59,184],"poisoning":[60,185],"attacks,":[61],"such":[62],"as":[63],"label":[64,134,145],"distance-based":[66,144],"flipping,":[67],"can":[69],"undermine":[70],"their":[71,114],"effectiveness":[72],"within":[73,191],"In":[78],"this":[79,155,174],"research":[80,156,175],"paper,":[81],"we":[82,202],"investigate":[83],"effect":[85,182],"on":[89,187],"a":[90,137,149,166],"system":[94],"several":[96],"machine":[97,188],"learning":[98,189],"models,":[99],"including":[100],"logistic":[101],"regression,":[102],"random":[103,133],"forest,":[104],"SVC,":[105],"XGB":[107],"Classifier,":[108],"evaluate":[110],"each":[111,123],"model":[112,124],"via":[113],"F1":[115],"Score,":[116],"confusion":[117],"matrix,":[118],"accuracy.":[120],"We":[121],"run":[122],"three":[125],"times:":[126],"once":[127,131,142],"without":[128],"any":[129],"attack,":[130],"with":[132,136,143,148],"flipping":[135,146],"randomness":[138],"20%,":[140],"distance":[150],"threshold":[151],"0.5.":[153],"Additionally,":[154],"tests":[157],"an":[158],"eight-layer":[159],"neural":[160],"accuracy":[163],"metrics":[164],"classification":[167],"report":[168],"library.":[169],"The":[170],"primary":[171],"goal":[172],"provide":[178],"insights":[179],"into":[180],"models":[190],"By":[199],"doing":[200],"so,":[201],"aim":[203],"contribute":[205],"developing":[207],"robust":[209],"tailored":[213],"specific":[216],"challenges":[217],"securing":[219],"blockchain-based":[220]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":11}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
