{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:36:37Z","timestamp":1763202997954,"version":"3.41.2"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,5]]},"DOI":"10.1109\/host64725.2025.11050015","type":"proceedings-article","created":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T17:47:34Z","timestamp":1751910454000},"page":"78-87","source":"Crossref","is-referenced-by-count":1,"title":["STIQ: Safeguarding Training and Inferencing of Quantum Neural Networks from Untrusted Cloud"],"prefix":"10.1109","author":[{"given":"Satwik","family":"Kundu","sequence":"first","affiliation":[{"name":"Pennsylvania State University,University Park,USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Swaroop","family":"Ghosh","sequence":"additional","affiliation":[{"name":"Pennsylvania State University,University Park,USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"journal-title":"Press Release","article-title":"Quantum startup atom computing first to exceed 1,000 qubits","year":"2023","key":"ref1"},{"journal-title":"The hardware and software for the era of quantum utility is here","year":"2023","author":"Gambetta","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-023-06096-3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.113.130503"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.98.012324"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/s41567-019-0648-8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-014-0809-8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/s43588-021-00084-1"},{"journal-title":"A quantum approximate optimization algorithm","year":"2014","author":"Farhi","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1038\/nature23879"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.37686\/qrl.v1i2.80"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevResearch.4.023136"},{"key":"ref13","first-page":"1","article-title":"Quantum machine learning for material synthesis and hardware security","volume-title":"Proceedings of the 41st IEEE\/ACM International Conference on Computer-Aided Design","author":"Beaudoin"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3526241.3530833"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD51958.2021.9643478"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3505253.3505260"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3569562.3569569"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53015-3_1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms4074"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2009.36"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1126\/science.1214707"},{"journal-title":"Toward privacy in quantum program execution on untrusted quantum cloud computing machines for business-sensitive quantum needs","year":"2023","author":"Patel","key":"ref22"},{"key":"ref23","first-page":"646","article-title":"Securenets: Secure inference of deep neural networks on an untrusted cloud","volume-title":"Asian Conference on Machine Learning","author":"Chen"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427232"},{"key":"ref25","first-page":"1651","article-title":"{GAZELLE}: A low latency framework for secure neural network inference","volume-title":"27th USENIX security symposium (USENIX security 18)","author":"Juvekar"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.90.050303"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.111.230502"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3649476.3658806"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"journal-title":"Pennylane: Automatic differentiation of hybrid quantum-classical computations","year":"2018","author":"Bergholm","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/qute.201900070"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530495"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA53966.2022.00057"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN60899.2024.10651540"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD51958.2021.9643516"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/QCE57702.2023.00058"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-20403-3"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20807"},{"journal-title":"Improving quantum classifier performance in nisq computers by voting strategy from ensemble learning","year":"2022","author":"Qin","key":"ref39"}],"event":{"name":"2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2025,5,5]]},"location":"San Jose, CA, USA","end":{"date-parts":[[2025,5,8]]}},"container-title":["2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11050019\/11050011\/11050015.pdf?arnumber=11050015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T04:45:48Z","timestamp":1751949948000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11050015\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,5]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/host64725.2025.11050015","relation":{},"subject":[],"published":{"date-parts":[[2025,5,5]]}}}