{"id":"https://openalex.org/W7087485688","doi":"https://doi.org/10.18420/inf2025_157","title":"Study of robustness of Quantum Machine Learning and its countermeasures against adversarial attacks when facing noise","display_name":"Study of robustness of Quantum Machine Learning and its countermeasures against adversarial attacks when facing noise","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W7087485688","doi":"https://doi.org/10.18420/inf2025_157"},"language":"en","primary_location":{"id":"doi:10.18420/inf2025_157","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2025_157","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/inf2025_157","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Mau\u00dfner, Marc","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mau\u00dfner, Marc","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Reers, Volker","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Reers, Volker","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.41339769,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T14423","display_name":"Military Technology and Strategies","score":0.0210999995470047,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14423","display_name":"Military Technology and Strategies","score":0.0210999995470047,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13154","display_name":"Legal and Regulatory Analysis","score":0.013100000098347664,"subfield":{"id":"https://openalex.org/subfields/3313","display_name":"Transportation"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T14235","display_name":"Linguistic, Cultural, and Literary Studies","score":0.01080000028014183,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.8302000164985657},{"id":"https://openalex.org/keywords/generalizability-theory","display_name":"Generalizability theory","score":0.7806000113487244},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.4634000062942505},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.45730000734329224},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.41260001063346863},{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.40720000863075256},{"id":"https://openalex.org/keywords/stochastic-gradient-descent","display_name":"Stochastic gradient descent","score":0.3898000121116638},{"id":"https://openalex.org/keywords/gradient-descent","display_name":"Gradient descent","score":0.32989999651908875}],"concepts":[{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.8302000164985657},{"id":"https://openalex.org/C27158222","wikidata":"https://www.wikidata.org/wiki/Q5532422","display_name":"Generalizability theory","level":2,"score":0.7806000113487244},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6807000041007996},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5475999712944031},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5285000205039978},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4634000062942505},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.45730000734329224},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.41260001063346863},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.40720000863075256},{"id":"https://openalex.org/C206688291","wikidata":"https://www.wikidata.org/wiki/Q7617819","display_name":"Stochastic gradient descent","level":3,"score":0.3898000121116638},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.33559998869895935},{"id":"https://openalex.org/C153258448","wikidata":"https://www.wikidata.org/wiki/Q1199743","display_name":"Gradient descent","level":3,"score":0.32989999651908875},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.30250000953674316},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.30149999260902405},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.28600001335144043},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2809000015258789},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.2761000096797943},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.266400009393692},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.2655999958515167},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2619999945163727},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.2533999979496002},{"id":"https://openalex.org/C190463098","wikidata":"https://www.wikidata.org/wiki/Q2081419","display_name":"Quantum technology","level":4,"score":0.2531000077724457}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/inf2025_157","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2025_157","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/inf2025_157","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2025_157","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[{"score":0.6130451560020447,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Quantum":[0,56],"computing":[1],"and":[2,25,58,70,110,128,167,174],"quantum":[3,91,118],"machine":[4,92,119],"learning":[5,93,120],"are":[6],"currently":[7],"providing":[8],"solid":[9],"first":[10],"results.":[11],"It":[12],"is":[13,42],"only":[14,65],"little":[15],"time":[16],"that":[17],"needs":[18],"to":[19,32,143,161],"go":[20],"by":[21],"when":[22],"these":[23,159],"techniques":[24],"technologies":[26],"will":[27],"transfer":[28],"from":[29,45,95],"being":[30,102],"emergent":[31],"facing":[33,154],"application":[34],"in":[35,90,117,140,171],"our":[36],"real-world":[37],"industry":[38],"use":[39],"cases.":[40],"This":[41],"also":[43,77],"emphasized":[44],"the":[46,52,66,73,96,123,169],"United":[47],"Nations":[48],"marking":[49],"2025":[50],"as":[51,135,137,146],"International":[53],"Year":[54],"of":[55,68,72,99,108],"Science":[57],"Technology.":[59],"Entering":[60],"industry,":[61],"we":[62],"face":[63],"not":[64],"goal":[67],"accuracy":[69],"generalizability":[71],"trained":[74],"models,":[75],"but":[76],"their":[78],"robustness":[79,145,170],"against":[80],"cybersecurity":[81],"attacks.":[82],"Therefore,":[83],"this":[84,100],"study":[85],"focuses":[86],"on":[87,149,164],"adversarial":[88,115],"attacks":[89,116,134],"(QML)":[94,121],"early":[97],"stages":[98],"technology":[101],"used.":[103],"We":[104,157],"provide":[105],"an":[106],"overview":[107],"already":[109],"successfully":[111],"conducted":[112],"experiments":[113,160],"for":[114],"using":[122,138],"Projected":[124],"Gradient":[125,130],"Descent":[126],"(PGD)":[127],"Fast":[129],"Sign":[131],"Method":[132],"(FGSM)":[133],"well":[136],"perturbations":[139],"training":[141,172,177],"data":[142],"increase":[144],"a":[147],"countermeasure":[148],"simulator":[150],"devices":[151],"\u2013":[152],"therefore,":[153],"no":[155],"noise.":[156],"extend":[158],"be":[162],"run":[163],"noisy":[165],"simulators":[166],"present":[168],"with":[173],"without":[175],"perturbed":[176],"data.":[178]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-11T00:00:00"}
