{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T07:15:47Z","timestamp":1773299747322,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T00:00:00Z","timestamp":1773187200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T00:00:00Z","timestamp":1773187200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100007065","name":"Universit\u00e0 degli Studi di Salerno","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100007065","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Mach. Intell."],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s42484-026-00379-4","type":"journal-article","created":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T13:11:26Z","timestamp":1773234686000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Benchmarking quantum machine learning methods for intrusion detection on noisy quantum computers"],"prefix":"10.1007","volume":"8","author":[{"given":"Franco","family":"Cirillo","sequence":"first","affiliation":[]},{"given":"Christian","family":"Esposito","sequence":"additional","affiliation":[]},{"given":"Jung","family":"Taek Seo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,11]]},"reference":[{"key":"379_CR1","doi-asserted-by":"crossref","unstructured":"Abreu D, Moura D, Rothenberg C, Abel\u00e9m A (2024). Quantum machine learning for network security, QuantumNetSec","DOI":"10.22541\/au.172540693.31989215\/v1"},{"issue":"2","key":"379_CR2","first-page":"1","volume":"1","author":"M Akrom","year":"2024","unstructured":"Akrom M (2024) Quantum support vector machine for classification task: A review. J Multiscale Mater Inf 1(2):1\u20138","journal-title":"J Multiscale Mater Inf"},{"key":"379_CR3","doi-asserted-by":"crossref","unstructured":"Anschuetz ER, Teo M, Yang W, Sud J, Kang C, Tomesh T, Chong FT (2024) Quantifying the limits of classical machine learning models using contextuality. In: 2024 IEEE international conference on quantum computing and engineering (QCE) Vol 2, pp 628\u2013630","DOI":"10.1109\/QCE60285.2024.10438"},{"key":"379_CR4","doi-asserted-by":"crossref","unstructured":"Bhattacharya P, Kumari A, Tanwar S, Budhiraja I, Patel S, Rodrigues JJ (2024) Quant-jack: quantum machine learning to detect cryptojacking attacks in IIoT Networks. 2024 IEEE international conference on communications workshops (ICC Workshops) pp 865\u2013870. (ISSN: 2694\u20132941)","DOI":"10.1109\/ICCWorkshops59551.2024.10615371"},{"key":"379_CR5","doi-asserted-by":"crossref","unstructured":"Bhavsar R, Jadav NK, Bodkhe U, Gupta R, Tanwar S, Sharma G, Sharma R (2023) Classification of potentially hazardous asteroids using supervised quantum machine learning. IEEE Access 11","DOI":"10.1109\/ACCESS.2023.3297498"},{"key":"379_CR6","doi-asserted-by":"crossref","unstructured":"Cao Z, Zhao Z, Shang W, Ai S, Shen S (2024). Using the ton-iot dataset to develop a new intrusion detection system for industrial iot devices. Multimed Tools Appl 1\u201329","DOI":"10.1007\/s11042-024-19695-7"},{"issue":"9","key":"379_CR7","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1038\/s43588-022-00311-3","volume":"2","author":"M Cerezo","year":"2022","unstructured":"Cerezo M, Verdon G, Huang H-Y, Cincio L, Coles PJ (2022) Challenges and opportunities in quantum machine learning. Nat Comput Sci 2(9):567\u2013576","journal-title":"Nat Comput Sci"},{"issue":"2","key":"379_CR8","doi-asserted-by":"publisher","first-page":"21308","DOI":"10.1007\/s11467-022-1249-z","volume":"18","author":"B Cheng","year":"2023","unstructured":"Cheng B, Deng X-H, Gu X, He Y, Hu G, Huang P et al (2023) Noisy intermediate-scale quantum computers. Front Phys 18(2):21308","journal-title":"Front Phys"},{"key":"379_CR9","doi-asserted-by":"crossref","unstructured":"Cirillo F, Esposito C (2025a) Federated quantum generative adversarial network for intrusion detection. In: 2025 IEEE 45th international conference on distributed computing systems workshops (icdcsw) pp 69\u201374","DOI":"10.1109\/ICDCSW63273.2025.00018"},{"key":"379_CR10","doi-asserted-by":"crossref","unstructured":"Cirillo F, Esposito C (2025b) Intrusion detection system based on quantum generative adversarial network. Proceedings of the 17th international conference on agents and artificial intelligence - volume 1: Qaio pp 830\u2013838. SciTePress","DOI":"10.5220\/0013397800003890"},{"key":"379_CR11","doi-asserted-by":"crossref","unstructured":"Cirillo F, Esposito C (2025c) Intrusion detection using quantum generative adversarial networks: a federated approach with noisy simulators. Iet conference proceedings cp925, Vol 2025, pp 31\u201335","DOI":"10.1049\/icp.2025.2226"},{"issue":"6","key":"379_CR12","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1140\/epjc\/s10052-025-14322-7","volume":"85","author":"HL Dao","year":"2025","unstructured":"Dao HL (2025) Exploring new variational quantum circuit ansatzes for solving su (2) matrix models. Eur Phys J C 85(6):705","journal-title":"Eur Phys J C"},{"key":"379_CR13","doi-asserted-by":"crossref","unstructured":"Das A, Chakrabarti A (2024) A comprehensive study of noise models simulation using various quantum simulators. In: 2024 International conference on trends in quantum computing and emerging business technologies, pp 1\u20136","DOI":"10.1109\/TQCEBT59414.2024.10545051"},{"key":"379_CR14","doi-asserted-by":"publisher","first-page":"142206","DOI":"10.1109\/ACCESS.2021.3120626","volume":"9","author":"AR Gad","year":"2021","unstructured":"Gad AR, Nashat AA, Barkat TM (2021) Intrusion detection system using machine learning for vehicular ad hoc networks based on ton-iot dataset. IEEE Access 9:142206\u2013142217","journal-title":"IEEE Access"},{"key":"379_CR15","doi-asserted-by":"crossref","unstructured":"Gautam K, Usha G, Nagar A, Patel S, Jain A (2024) Quantum assisted machine learning for intrusion detection systems. Kattankalathur, India, p 020280","DOI":"10.1063\/5.0217108"},{"issue":"15","key":"379_CR16","doi-asserted-by":"publisher","first-page":"16876","DOI":"10.1007\/s11227-022-04542-z","volume":"78","author":"C Gong","year":"2022","unstructured":"Gong C, Guan W, Gani A, Qi H (2022) Network attack detection scheme based on variational quantum neural network. J Supercomput 78(15):16876\u201316897. https:\/\/doi.org\/10.1007\/s11227-022-04542-z","journal-title":"J Supercomput"},{"issue":"9","key":"379_CR17","doi-asserted-by":"publisher","first-page":"12743","DOI":"10.1007\/s11227-024-05919-y","volume":"80","author":"C Gong","year":"2024","unstructured":"Gong C, Guan W, Zhu H, Gani A, Qi H (2024) Network intrusion detection based on variational quantum convolution neural network. J Supercomput 80(9):12743\u201312770. https:\/\/doi.org\/10.1007\/s11227-024-05919-y","journal-title":"J Supercomput"},{"key":"379_CR18","doi-asserted-by":"crossref","unstructured":"Gouveia A, Correia M (2020) Towards quantum-enhanced machine learning for network intrusion detection. In: 2020 IEEE 19th international symposium on network computing and applications (NCA) pp 1\u20138. ISSN: 2643\u20137929","DOI":"10.1109\/NCA51143.2020.9306691"},{"key":"379_CR19","doi-asserted-by":"crossref","unstructured":"Guo G, Pan X, Liu H, Li F, Pei L, Hu K (2023) An iot intrusion detection system based on ton iot network dataset. In: 2023 IEEE 13th annual computing and communication workshop and conference (CCWC) pp 0333\u20130338","DOI":"10.1109\/CCWC57344.2023.10099144"},{"issue":"1","key":"379_CR20","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/s42484-024-00163-2","volume":"6","author":"M Hdaib","year":"2024","unstructured":"Hdaib M, Rajasegarar S, Pan L (2024) Quantum deep learningbased anomaly detection for enhanced network security. Quantum Mach Intell 6(1):26. https:\/\/doi.org\/10.1007\/s42484-024-00163-2","journal-title":"Quantum Mach Intell"},{"key":"379_CR21","doi-asserted-by":"publisher","unstructured":"Houda ZAE, Moudoud H, Brik B, Adil M (2024) A privacy-preserving framework for efficient network intrusion detection in consumer network using quantum federated learning. IEEE Trans Consum Electron 1\u20131. https:\/\/doi.org\/10.1109\/TCE.2024.3458985","DOI":"10.1109\/TCE.2024.3458985"},{"key":"379_CR22","unstructured":"IBM Quantum (2021). https:\/\/quantum.ibm.com\/"},{"key":"379_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108214","volume":"102","author":"P Jayalaxmi","year":"2022","unstructured":"Jayalaxmi P, Kumar G, Saha R, Conti M, Kim T-H, Thomas R (2022) DeBot: A deep learning-based model for bot detection in industrial internet-of-things. Comput Electr Eng 102:108214. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108214","journal-title":"Comput Electr Eng"},{"issue":"1","key":"379_CR24","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s11416-022-00435-0","volume":"19","author":"M Kalinin","year":"2022","unstructured":"Kalinin M, Krundyshev V (2022) Security intrusion detection using quantum machine learning techniques. J Comput Virology Hacking Techn 19(1):125\u2013136. https:\/\/doi.org\/10.1007\/s11416-022-00435-0","journal-title":"J Comput Virology Hacking Techn"},{"issue":"3","key":"379_CR25","doi-asserted-by":"publisher","first-page":"033063","DOI":"10.1103\/PhysRevResearch.1.033063","volume":"1","author":"N Killoran","year":"2019","unstructured":"Killoran N, Bromley TR, Arrazola JM, Schuld M, Quesada N, Lloyd S (2019) Continuous-variable quantum neural networks. Phys Rev Res 1(3):033063","journal-title":"Phys Rev Res"},{"key":"379_CR26","unstructured":"Kingma DP (2014) Adam: A method for stochastic optimization. arXiv:1412.6980"},{"key":"379_CR27","doi-asserted-by":"crossref","unstructured":"K\u00fc\u00e7\u00fckkara MY, Atban F, Bay\u0131lm\u0131\u015f C (2024) Quantum-neural network model for platform independent ddos attack classification in cyber security. Adv Quantum Technol 2400084","DOI":"10.1002\/qute.202400084"},{"key":"379_CR28","doi-asserted-by":"publisher","unstructured":"Kukliansky A, Orescanin M, Bollmann C, Huffmire T (2024) Network anomaly detection using quantum neural networks on noisy quantum computers. IEEE Trans Quantum Eng 5:1\u201311. https:\/\/doi.org\/10.1109\/TQE.2024.3359574. Conference Name: IEEE Transactions on Quantum Engineering","DOI":"10.1109\/TQE.2024.3359574"},{"issue":"3","key":"379_CR29","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1007\/s11082-023-05854-x","volume":"56","author":"Z Liu","year":"2024","unstructured":"Liu Z, Jia X, Li B (2024) E-healthcare application cyber security analysis using quantum machine learning in malicious user detection. Opt Quant Electron 56(3):476. https:\/\/doi.org\/10.1007\/s11082-023-05854-x","journal-title":"Opt Quant Electron"},{"key":"379_CR30","doi-asserted-by":"publisher","first-page":"3705","DOI":"10.1109\/ACCESS.2021.3139323","volume":"10","author":"D Maheshwari","year":"2021","unstructured":"Maheshwari D, Sierra-Sosa D, Garcia-Zapirain B (2021) Variational quantum classifier for binary classification: Real vs synthetic dataset. IEEE Access 10:3705\u20133715","journal-title":"IEEE Access"},{"key":"379_CR31","doi-asserted-by":"crossref","unstructured":"Misra S, Rani P (2024) Quantum machine learning: A comprehensive overview and analysis. In: 2024 15th International conference on computing communication and networking technologies (ICCCNT) pp 1\u20135","DOI":"10.1109\/ICCCNT61001.2024.10724803"},{"issue":"1","key":"379_CR32","doi-asserted-by":"publisher","first-page":"3909173","DOI":"10.1155\/2024\/3909173","volume":"2024","author":"S Muneer","year":"2024","unstructured":"Muneer S, Farooq U, Athar A, Ahsan Raza M, Ghazal TM, Sakib S (2024) A critical review of artificial intelligence based approaches in intrusion detection: A comprehensive analysis. J Eng 2024(1):3909173","journal-title":"J Eng"},{"issue":"4","key":"379_CR33","doi-asserted-by":"publisher","first-page":"043158","DOI":"10.1103\/PhysRevResearch.2.043158","volume":"2","author":"KM Nakanishi","year":"2020","unstructured":"Nakanishi KM, Fujii K, Todo S (2020) Sequential minimal optimization for quantum-classical hybrid algorithms. Phys Rev Res 2(4):043158","journal-title":"Phys Rev Res"},{"key":"379_CR34","doi-asserted-by":"crossref","unstructured":"Peral-Garc\u00eda D, Cruz-Benito J, Garc\u00eda-Pe\u00f1alvo FJ (2024) Systematic literature review: Quantum machine learning and its applications. Comput Sci Rev 51:100619","DOI":"10.1016\/j.cosrev.2024.100619"},{"key":"379_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-8330-5_4","volume-title":"A direct search optimization method that models the objective and constraint functions by linear interpolation","author":"MJ Powell","year":"1994","unstructured":"Powell MJ (1994) A direct search optimization method that models the objective and constraint functions by linear interpolation. Springer"},{"key":"379_CR36","doi-asserted-by":"crossref","unstructured":"Rahman MA, Akter MS, Miller E, Timofti B, Shahriar H, Masum M, Wu F (2024) Fine-tuned variational quantum classifiers for cyber attacks detection based on parameterized quantum circuits and optimizers. 2024 IEEE 48th annual computers, software, and applications conference (COMPSAC), pp 1067\u20131072. ISSN: 2836\u20133795","DOI":"10.1109\/COMPSAC61105.2024.00144"},{"key":"379_CR37","doi-asserted-by":"crossref","unstructured":"Rahman MA, Shahriar H, Clincy V, Hossain MF, Rahman M, (2023). A quantum generative adversarial network-based intrusion detection system. In: 2023 IEEE 47th annual computers, software, and applications conference (COMPSAC). IEEE, Torino, Italy, pp 1810\u20131815","DOI":"10.1109\/COMPSAC57700.2023.00280"},{"key":"379_CR38","doi-asserted-by":"publisher","unstructured":"Raubitzek S, Mallinger K (2023) On the applicability of quantum machine learning. Entropy 25 (7). https:\/\/doi.org\/10.3390\/e25070992","DOI":"10.3390\/e25070992"},{"issue":"8","key":"379_CR39","doi-asserted-by":"publisher","first-page":"3572","DOI":"10.3390\/en16083572","volume":"16","author":"D Said","year":"2023","unstructured":"Said D (2023) Quantum computing and machine learning for cybersecurity: distributed denial of service (DDoS) attack detection on smart micro-grid. Energies 16(8):3572. https:\/\/doi.org\/10.3390\/en16083572","journal-title":"Energies"},{"key":"379_CR40","doi-asserted-by":"crossref","unstructured":"Shalev-Shwartz S, Singer Y, Srebro N (2007) Pegasos: Primal estimated subgradient solver for svm. In: Proceedings of the 24th international conference on machine learning pp 807\u2013814. New York, NY, USA: Association for Computing Machinery","DOI":"10.1145\/1273496.1273598"},{"key":"379_CR41","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.procs.2021.12.135","volume":"197","author":"H Suryotrisongko","year":"2022","unstructured":"Suryotrisongko H, Musashi Y (2022) Evaluating hybrid quantum-classical deep learning for cybersecurity botnet DGA detection. Proc Comput Sci 197:223\u2013229. https:\/\/doi.org\/10.1016\/j.procs.2021.12.135","journal-title":"Proc Comput Sci"},{"key":"379_CR42","doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the kdd cup 99 data set. 2009 ieee symposium on computational intelligence for security and defense applications, pp 1\u20136","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"1","key":"379_CR43","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/s42484-024-00142-7","volume":"6","author":"H Tezuka","year":"2024","unstructured":"Tezuka H, Uno S, Yamamoto N (2024) Generative model for learning quantum ensemble with optimal transport loss. Quantum Mach Intell 6(1):6. https:\/\/doi.org\/10.1007\/s42484-024-00142-7","journal-title":"Quantum Mach Intell"},{"issue":"7","key":"379_CR44","doi-asserted-by":"publisher","first-page":"4245","DOI":"10.1007\/s11831-023-09943-8","volume":"30","author":"A Thakkar","year":"2023","unstructured":"Thakkar A, Lohiya R (2023) A review on challenges and future research directions for machine learning-based intrusion detection system. Arch Comput Methods Eng 30(7):4245\u20134269","journal-title":"Arch Comput Methods Eng"},{"key":"379_CR45","unstructured":"UNSW Sydney (2024). TONIOT datasets. https:\/\/research.unsw.edu.au\/projects\/toniot-datasets. Accessed: 12 Nov 2024"},{"key":"379_CR46","doi-asserted-by":"crossref","unstructured":"Venkatachalam P, Liu DQ (2023) On hybrid artificial neural networks and variational quantum classifier for network intrusion detection. In: 2023 International conference on cyber-enabled distributed computing and knowledge discovery (CyberC), pp 410\u2013416. ISSN: 2833\u20138898","DOI":"10.1109\/CyberC58899.2023.00070"},{"key":"379_CR47","unstructured":"Yamasaki H, Isogai N, Murao M (2023) Advantage of quantum machine learning from general computational advantages"}],"container-title":["Quantum Machine Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42484-026-00379-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42484-026-00379-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42484-026-00379-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T13:11:35Z","timestamp":1773234695000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42484-026-00379-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,11]]},"references-count":47,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["379"],"URL":"https:\/\/doi.org\/10.1007\/s42484-026-00379-4","relation":{},"ISSN":["2524-4906","2524-4914"],"issn-type":[{"value":"2524-4906","type":"print"},{"value":"2524-4914","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,11]]},"assertion":[{"value":"4 November 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"27"}}