{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:36:38Z","timestamp":1766579798961},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["2312754,2245344"],"award-info":[{"award-number":["2312754,2245344"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/host55342.2024.10545404","type":"proceedings-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:21:52Z","timestamp":1717694512000},"page":"415-419","source":"Crossref","is-referenced-by-count":2,"title":["All Your Base Are Belong To Us: Stealing VRP Secrets from Quantum Circuit Structures"],"prefix":"10.1109","author":[{"given":"Jessie","family":"Chen","sequence":"first","affiliation":[{"name":"Yale University"}]},{"given":"Jakub","family":"Szefer","sequence":"additional","affiliation":[{"name":"Yale University"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3370748.3406570"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3172241"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1126\/science.aar3106"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/HOST55118.2023.10133711"},{"journal-title":"Financial portfolio management using D-wave quantum optimizer: The case of Abu Dhabi securities exchange","year":"2017","author":"Elsokkary","key":"ref5"},{"journal-title":"A quantum approximate optimization algorithm","year":"2014","author":"Farhi","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3389\/fict.2019.00013"},{"key":"ref8","first-page":"2000","volume-title":"Usa airport dataset","author":"Gordon","year":"2023"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-019-10988-2"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/a12020034"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3505253.3505261"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559380"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.revip.2019.100028"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2021.3077024"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.22331\/q-2018-08-06-79"},{"journal-title":"Qubit sensing: A new attack model for multi-programming quantum computing","year":"2021","author":"Ash Saki","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.23919\/date54114.2022.9774619"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3139085"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/00107514.2014.964942"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1103\/prxquantum.2.020310"},{"article-title":"Wikipedia contributors","volume-title":"All your base are belong to us - Wikipedia, the free encyclopedia","year":"2023","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623118"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevX.10.021067"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevResearch.4.033029"}],"event":{"name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2024,5,6]]},"location":"Tysons Corner, VA, USA","end":{"date-parts":[[2024,5,9]]}},"container-title":["2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10545333\/10545347\/10545404.pdf?arnumber=10545404","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T04:18:02Z","timestamp":1717906682000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10545404\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/host55342.2024.10545404","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}