{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:40:01Z","timestamp":1755841201812,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,2,18]],"date-time":"2020-02-18T00:00:00Z","timestamp":1581984000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,2,18]]},"DOI":"10.1145\/3384544.3384576","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T03:58:24Z","timestamp":1588564704000},"page":"67-73","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Hybrid \"Quantum and Classical\" Method for Outlier Detection"],"prefix":"10.1145","author":[{"given":"Rabah","family":"Mazouzi","sequence":"first","affiliation":[{"name":"Umanis, Rue Paul Vaillant Couturier, Levallois-Perret, France"}]},{"given":"Philippe","family":"Harel","sequence":"additional","affiliation":[{"name":"Umanis, Rue Paul Vaillant Couturier, Levallois-Perret, France"}]}],"member":"320","published-online":{"date-parts":[[2020,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Simulating physics with computers. j-INT-JTHEOR-PHYS, 21(6--7):467--488","author":"Feynman Richard P.","year":"1982","unstructured":"Richard P. Feynman. Simulating physics with computers. j-INT-JTHEOR-PHYS, 21(6--7):467--488, 1982."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01011339"},{"key":"e_1_3_2_1_3_1","unstructured":"Patrick J. Coles Stephan Eidenbenz Scott Pakin Adetokunbo Adedoyin John Ambrosiano Petr Anisimov William Casper Gopinath Chennupati Carleton Coffrin Hristo Djidjev David Gunter SatishKarra Nathan Lemons Shizeng Lin Andrey Lokhov Alexander Malyzhenkov David Mascarenas Susan"},{"key":"e_1_3_2_1_4_1","unstructured":"Mniszewski BalasubramanyaNadiga and Wei Zhu. Quantum algorithm implementations for beginners 04\/2018."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1972505"},{"key":"e_1_3_2_1_6_1","unstructured":"Seth Lloyd M Mohseni and Patrick Rebentrost. Quantum algorithms for supervised and unsupervised machine learning. 07\/2013."},{"key":"e_1_3_2_1_7_1","first-page":"2012","article-title":"Quantum algorithm for data fitting","volume":"109","author":"Wiebe Nathan","unstructured":"Nathan Wiebe, Daniel Braun, and Seth Lloyd. Quantum algorithm for data fitting. Physical Review Letters, 109, 08\/2012.","journal-title":"Physical Review Letters"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Jacob Biamonte Peter Wittek Nicola Pancotti Patrick Rebentrost Nathan Wiebe and Seth Lloyd. Quantum machine learning. Nature 549 11\/2016.","DOI":"10.1038\/nature23474"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Maria Schuld Ilya Sinayskiy and Francesco Petruccione. An introduction to quantum machine learning. Contemporary Physics 56 09\/2014.","DOI":"10.1080\/00107514.2014.964942"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/541177"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/3086742"},{"key":"e_1_3_2_1_12_1","unstructured":"Karanjit Singh and Shuchita Upadhyaya. Outlier detection: Applications and techniques. International Journal of Computer Science 01\/2012."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Varun Chandola and Vipin Kumar. Outlier detection: A survey. ACM Computing Surveys 41 01\/2009.","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_14_1","first-page":"2017","article-title":"Quantum algorithm for k-nearest classification based on the metric of hamming distance","volume":"56","author":"Ruan Yue","unstructured":"Yue Ruan, Xiling Xue, Heng Liu, Jianing Tan, and Xi Li. Quantum algorithm for k-nearest classification based on the metric of hamming distance. International Journal of Theoretical Physics, 56, 08\/2017.","journal-title":"International Journal of Theoretical Physics"},{"key":"e_1_3_2_1_15_1","first-page":"299","article-title":"Nearest neighbour based outlier detection techniques","volume":"3","author":"Shuchita U","year":"2012","unstructured":"U Shuchita and S Karanjit. Nearest neighbour based outlier detection techniques. International Journal of Computer Trends and Technology, 3:299--303, 01\/2012.","journal-title":"International Journal of Computer Trends and Technology"},{"key":"e_1_3_2_1_16_1","unstructured":"Christoph D\u00fcrr and Peter Hoyer. A quantum algorithm for finding the minimum. CoRR quant-ph\/9607014 07\/1996."},{"key":"e_1_3_2_1_17_1","first-page":"212","volume-title":"Proceedings, 28th Annual ACM Symposium on the Theory of Computing, (May 1996)","author":"Grover","unstructured":"Grover L.K.: A fast quantum mechanical algorithm for database search, Proceedings, 28th Annual ACM Symposium on the Theory of Computing, (May 1996) p. 212."},{"key":"e_1_3_2_1_18_1","article-title":"Algorithms and applications","volume":"02","author":"Knorr Edwin","unstructured":"Edwin Knorr, Raymond Ng and Vladimir Tucakov. Distance-based outliers: Algorithms and applications. VLDB Journal, 237--253, 02\/2000.","journal-title":"VLDB Journal, 237--253"},{"key":"e_1_3_2_1_19_1","unstructured":"Giacomo Nannicini. An introduction to quantum computing without the physics. 08\/2017."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024022632303"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Maria Schuld Ilya Sinayskiy and Francesco Petruccione. Quantum computing for pattern classification. 12\/2014.","DOI":"10.1142\/S0219749914610103"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of SPIE, 3076: 84--96","author":"Privman Vladimir","year":"1997","unstructured":"Vladimir Privman, Dima V. Mozyrsky, and Steven Hotaling. Hamiltonians for quantum computing. Proceedings of SPIE, 3076:84--96, 07\/1997."},{"issue":"1000","key":"e_1_3_2_1_23_1","first-page":"1010","article-title":"Synthesis of quantum logic circuits. Computer-Aided Design of Integrated Circuitsand Systems","volume":"25","author":"Shende Vivek","year":"2006","unstructured":"Vivek Shende, Stephen S. Bullock, and Igor Markov. Synthesis of quantum logic circuits. Computer-Aided Design of Integrated Circuitsand Systems, IEEE Transactions on, 25:1000 -- 1010, 07--2006.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_24_1","first-page":"309","volume":"808","author":"Kempe Julia","year":"2010","unstructured":"Julia Kempe and Thomas Vidick. Quantum Algorithms, volume 808, pages 309--342. 07\/2010.","journal-title":"Quantum Algorithms"},{"key":"e_1_3_2_1_25_1","unstructured":"Dawid Kopczyk. Quantum machine learning for data scientists 04\/2018."},{"key":"e_1_3_2_1_26_1","unstructured":"Gil Kalai. How quantum computers fail: Quantum codes correlations in physical systems and noise accumulation. 06\/2011."},{"key":"e_1_3_2_1_27_1","volume-title":"Basic concepts in quantum computation","author":"Ekert Artur","year":"2000","unstructured":"Artur Ekert, Patrick Hayden, and Hitoshi Inamori. Basic concepts in quantum computation, 2000."},{"key":"e_1_3_2_1_28_1","unstructured":"Dheeru Dua and Casey Graff. UCI machine learning repository - balloons dataset."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Daniel Pena and Francisco Prieto. Multivariate outlier detection and robust covariance matrix estimation.Technometrics 43 08\/2001.","DOI":"10.1198\/004017001316975899"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Fei Tony Liu Kai Ming Ting and Zhi-Hua Zhou. Isolation-based anomaly detection. ACM Transactions on Knowledge Discovery from Data - TKDD 6:1--39 03\/2012.","DOI":"10.1145\/2133360.2133363"},{"key":"e_1_3_2_1_32_1","unstructured":"Tri-Dung Nguyen. Robust estimation regression and ranking with applications in portfolio optimization. 03\/2010."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0165972"}],"event":{"name":"ICSCA 2020: 2020 9th International Conference on Software and Computer Applications","acronym":"ICSCA 2020","location":"Langkawi Malaysia"},"container-title":["Proceedings of the 2020 9th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3384544.3384576","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3384544.3384576","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:18:45Z","timestamp":1755839925000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3384544.3384576"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,18]]},"references-count":34,"alternative-id":["10.1145\/3384544.3384576","10.1145\/3384544"],"URL":"https:\/\/doi.org\/10.1145\/3384544.3384576","relation":{},"subject":[],"published":{"date-parts":[[2020,2,18]]},"assertion":[{"value":"2020-04-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}