{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:08:38Z","timestamp":1772039318008,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,5]]},"DOI":"10.1109\/host64725.2025.11050014","type":"proceedings-article","created":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T17:47:34Z","timestamp":1751910454000},"page":"67-77","source":"Crossref","is-referenced-by-count":5,"title":["E-LoQ: Enhanced Locking for Quantum Circuit IP Protection"],"prefix":"10.1109","author":[{"given":"Yuntao","family":"Liu","sequence":"first","affiliation":[{"name":"Lehigh University,Department of Electrical and Computer Engineering,PA,USA"}]},{"given":"Jayden","family":"John","sequence":"additional","affiliation":[{"name":"University of California,Department of Electrical Engineering,Merced,CA,USA"}]},{"given":"Qian","family":"Wang","sequence":"additional","affiliation":[{"name":"University of California,Department of Electrical Engineering,Merced,CA,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2018.2888987"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1021\/acs.chemrev.9b00829"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevResearch.3.013167"},{"key":"ref4","article-title":"Ibm quantum breaks the 100-qubit processor barrier","volume":"2","author":"Chow","year":"2021","journal-title":"IBM Research Blog"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s42354-021-0330-z"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-9530-9_16"},{"key":"ref7","volume-title":"Quantum computing with Qiskit","author":"Javadi-Abhari","year":"2024"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/j6030027"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2944586"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2008.4484823"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3446215"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140252"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2017.7951805"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3060403.3060469"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3008843"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3508352.3549349","article-title":"A combined logical and physical attack on logic obfuscation","volume-title":"Proceedings of the 41st IEEE\/ACM International Conference on Computer-Aided Design","author":"Zuzak","year":"2022"},{"key":"ref17","article-title":"Logic locking for secure outsourced chip fabrication: A new attack and provably secure defense mechanism","author":"Massad","year":"2017","journal-title":"arXiv preprint"},{"key":"ref18","article-title":"Trojannet: Detecting trojans in quantum circuits using machine learning","author":"Das","year":"2023","journal-title":"arXiv preprint"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED60706.2024.10528740"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3370748.3406570"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623118"},{"key":"ref22","article-title":"Hardware architecture for a quantum computer trusted execution environment","author":"Trochatos","year":"2023","journal-title":"arXiv preprint"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/QCE60285.2024.00099"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s40319-022-01209-3"},{"key":"ref25","article-title":"Randomized reversible gate-based obfuscation for secured compilation of quantum circuit","author":"Das","year":"2023","journal-title":"arXiv preprint"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3505253.3505260"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD51958.2021.9643478"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/ab9acb"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87568-8_4"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/ab8e92"},{"key":"ref31","volume-title":"Cirq: A python framework for creating, editing, and invoking quantum circuits.","author":"Hancock"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISMVL.2008.43"}],"event":{"name":"2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","location":"San Jose, CA, USA","start":{"date-parts":[[2025,5,5]]},"end":{"date-parts":[[2025,5,8]]}},"container-title":["2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11050019\/11050011\/11050014.pdf?arnumber=11050014","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T04:45:50Z","timestamp":1751949950000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11050014\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/host64725.2025.11050014","relation":{},"subject":[],"published":{"date-parts":[[2025,5,5]]}}}