{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:29:21Z","timestamp":1775838561756,"version":"3.50.1"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100004489","name":"Mitacs","doi-asserted-by":"publisher","award":["IT40176"],"award-info":[{"award-number":["IT40176"]}],"id":[{"id":"10.13039\/501100004489","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/ojcoms.2025.3537957","type":"journal-article","created":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T18:39:40Z","timestamp":1738348780000},"page":"1129-1148","source":"Crossref","is-referenced-by-count":9,"title":["An In-Depth Comparative Study of Quantum-Classical Encoding Methods for Network Intrusion Detection"],"prefix":"10.1109","volume":"6","author":[{"given":"Adam","family":"Kadi","sequence":"first","affiliation":[{"name":"INRS-EMT, UMR INRS-UQO, University of Quebec, Gatineau, QC, Canada"}]},{"given":"Aymene","family":"Selamnia","sequence":"additional","affiliation":[{"name":"INRS-EMT, UMR INRS-UQO, University of Quebec, Gatineau, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2893-1101","authenticated-orcid":false,"given":"Zakaria Abou El","family":"Houda","sequence":"additional","affiliation":[{"name":"INRS-EMT, UMR INRS-UQO, University of Quebec, Gatineau, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2979-0862","authenticated-orcid":false,"given":"Hajar","family":"Moudoud","sequence":"additional","affiliation":[{"name":"D&#x00E9;partement d&#x2019;informatique et d&#x2019;ing&#x00E9;nierie, Universit&#x00E9; du Qu&#x00E9;bec en Outaouais, Gatineau, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3267-5702","authenticated-orcid":false,"given":"Bouziane","family":"Brik","sequence":"additional","affiliation":[{"name":"Computer Science Department, College of Computing and Informatics, University of Sharjah, Sharjah, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1922-769X","authenticated-orcid":false,"given":"Lyes","family":"Khoukhi","sequence":"additional","affiliation":[{"name":"Computer Science Department, College of Computing and Informatics, University of Sharjah, Sharjah, UAE"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/technologies11060161"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/wocn.2013.6616255"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.111080"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3333903"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3406386"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2020.3024225"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3014870"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110372"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/jsan12040051"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974293"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-021-05947-3"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.012.2200295"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.91.045002"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3041719"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00815-1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3384460"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685643"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2100238"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.2017.0551"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-022-32550-3"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.22331\/q-2020-05-25-269"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1038\/s42005-024-01577-x"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.34133\/icomputing.0100"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/QCE60285.2024.00170"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.121.190501"},{"key":"ref26","article-title":"Convex optimization of programmable quantum computers","author":"Banchi","year":"2019","journal-title":"arXiv:1905.01316"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1038\/nature23474"},{"key":"ref28","article-title":"Quantum data encoding: A comparative analysis of classical-to-quantum mapping techniques and their impact on machine learning accuracy","author":"Rath","year":"2023","journal-title":"arXiv:2311.10375"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/NCA51143.2020.9306691"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC61673.2024.10733655"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TQE.2024.3359574"},{"key":"ref32","article-title":"Encoding techniques for quantum machine learning","author":"Tudisco","year":"2022"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s42484-024-00192-x"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3322723"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-69384-6"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.55662\/JST.2023.4102"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1117\/12.2593297"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1214\/009053604000001048"},{"key":"ref40","article-title":"A Quantum Approximate Optimization Algorithm for continuous problems","author":"Verdon","year":"2019","journal-title":"arXiv:1902.00409"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.101.032308"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3390\/s23135941"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3165809"},{"key":"ref44","article-title":"PennyLane: Automatic differentiation of hybrid quantum-classical computations","author":"Bergholm","year":"2018","journal-title":"arXiv:1811.04968"},{"key":"ref45","first-page":"4806","article-title":"Supervised learning with tensor networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Stoudenmire"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96424-9"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-019-0980-2"},{"key":"ref48","article-title":"Quantum embeddings for machine learning","author":"Lloyd","year":"2020","journal-title":"arXiv:2001.03622"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1002\/qute.201900070"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/10829557\/10869381.pdf?arnumber=10869381","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T17:44:31Z","timestamp":1744911871000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10869381\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2025.3537957","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}