{"id":"https://openalex.org/W4223468676","doi":"https://doi.org/10.1145/3526241.3530833","title":"Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses","display_name":"Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses","publication_year":2022,"publication_date":"2022-06-02","ids":{"openalex":"https://openalex.org/W4223468676","doi":"https://doi.org/10.1145/3526241.3530833"},"language":"en","primary_location":{"id":"doi:10.1145/3526241.3530833","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3526241.3530833","pdf_url":null,"source":{"id":"https://openalex.org/S4363608736","display_name":"Proceedings of the Great Lakes Symposium on VLSI 2022","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Great Lakes Symposium on VLSI 2022","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2204.03625","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013754781","display_name":"Satwik Kundu","orcid":"https://orcid.org/0000-0002-2140-6486"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Satwik Kundu","raw_affiliation_strings":["The Pennsylvania State University, State College, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, State College, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085567454","display_name":"Swaroop Ghosh","orcid":"https://orcid.org/0000-0001-8753-490X"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Swaroop Ghosh","raw_affiliation_strings":["The Pennsylvania State University, State College, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, State College, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5013754781"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":1.3566,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.82464229,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"463","last_page":"468"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.865742027759552},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.669162392616272},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5955191850662231},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5878375172615051},{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.5224406123161316},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.49999451637268066},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.48804035782814026},{"id":"https://openalex.org/keywords/space","display_name":"Space (punctuation)","score":0.42966166138648987},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3927495777606964},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.18892517685890198}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.865742027759552},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.669162392616272},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5955191850662231},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5878375172615051},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.5224406123161316},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.49999451637268066},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.48804035782814026},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.42966166138648987},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3927495777606964},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.18892517685890198},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3526241.3530833","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3526241.3530833","pdf_url":null,"source":{"id":"https://openalex.org/S4363608736","display_name":"Proceedings of the Great Lakes Symposium on VLSI 2022","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Great Lakes Symposium on VLSI 2022","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2204.03625","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2204.03625","pdf_url":"https://arxiv.org/pdf/2204.03625","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2204.03625","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2204.03625","pdf_url":"https://arxiv.org/pdf/2204.03625","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3263384860","display_name":null,"funder_award_id":"2129675","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320333182","display_name":"Huck Institutes of the Life Sciences","ror":null},{"id":"https://openalex.org/F4320334254","display_name":"Institute for Computational and Data Sciences, Pennsylvania State University","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W1542886316","https://openalex.org/W2146502635","https://openalex.org/W2170608991","https://openalex.org/W2442112158","https://openalex.org/W2564834211","https://openalex.org/W2764347725","https://openalex.org/W2795151239","https://openalex.org/W2796293949","https://openalex.org/W2903221501","https://openalex.org/W2941001797","https://openalex.org/W2971805687","https://openalex.org/W3000698183","https://openalex.org/W3015189332","https://openalex.org/W3027746348","https://openalex.org/W3047634080","https://openalex.org/W3075559820","https://openalex.org/W3081750904","https://openalex.org/W3101427288","https://openalex.org/W3104553508","https://openalex.org/W3108277684","https://openalex.org/W3125913056","https://openalex.org/W3129458892","https://openalex.org/W3132743969","https://openalex.org/W3139047592","https://openalex.org/W3153074989","https://openalex.org/W3173713405","https://openalex.org/W3193478398","https://openalex.org/W3200507677","https://openalex.org/W3201525770","https://openalex.org/W3211416062","https://openalex.org/W4200392948","https://openalex.org/W4287214007","https://openalex.org/W4287905360","https://openalex.org/W4295312788"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W4312814274","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703"],"abstract_inverted_index":{"In":[0,65],"the":[1,26,47,60,70,77,84],"last":[2],"few":[3],"years,":[4],"quantum":[5,16,19],"computing":[6,17],"has":[7],"experienced":[8],"a":[9],"growth":[10],"spurt.":[11],"One":[12],"exciting":[13],"avenue":[14],"of":[15,63,74,87],"is":[18],"machine":[20],"learning":[21,44],"(QML)":[22],"which":[23],"can":[24,40],"exploit":[25],"high":[27],"dimensional":[28],"Hilbert":[29],"space":[30],"to":[31],"learn":[32],"richer":[33],"representations":[34],"from":[35],"limited":[36],"data":[37],"and":[38,89,93],"thus":[39],"efficiently":[41],"solve":[42],"complex":[43],"tasks.":[45],"Despite":[46],"increased":[48],"interest":[49],"in":[50,76],"QML,":[51],"there":[52],"have":[53],"not":[54],"been":[55],"many":[56],"studies":[57],"that":[58],"discuss":[59],"security":[61,79,85],"aspects":[62],"QML.":[64],"this":[66],"work,":[67],"we":[68],"explored":[69],"possible":[71],"future":[72],"applications":[73],"QML":[75,88],"hardware":[78],"domain.":[80],"We":[81],"also":[82],"expose":[83],"vulnerabilities":[86],"emerging":[90],"attack":[91],"models,":[92],"corresponding":[94],"countermeasures.":[95]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
