{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T23:49:48Z","timestamp":1776728988933,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T00:00:00Z","timestamp":1667088000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CNS-17225577, CNS-2129675, CCF-2210963, CCF-1718474, OIA-2040667, DGE-1723687, DGE-1821766, DGE-2113839"],"award-info":[{"award-number":["CNS-17225577, CNS-2129675, CCF-2210963, CCF-1718474, OIA-2040667, DGE-1723687, DGE-1821766, DGE-2113839"]}]},{"DOI":"10.13039\/100011568","name":"Huck Institutes of the Life Sciences","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100011568","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Penn State ICDS"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,30]]},"DOI":"10.1145\/3508352.3561115","type":"proceedings-article","created":{"date-parts":[[2022,12,22]],"date-time":"2022-12-22T12:10:54Z","timestamp":1671711054000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Quantum Machine Learning for Material Synthesis and Hardware Security (Invited Paper)"],"prefix":"10.1145","author":[{"given":"Collin","family":"Beaudoin","sequence":"first","affiliation":[{"name":"The Pennsylvania State University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Satwik","family":"Kundu","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rasit Onur","family":"Topaloglu","sequence":"additional","affiliation":[{"name":"IBM Corporation"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Swaroop","family":"Ghosh","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2022,12,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Mart\u00edn Abadi et al. 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. https:\/\/www.tensorflow.org\/ Software available from tensorflow.org."},{"key":"e_1_3_2_1_2_1","unstructured":"Ville Bergholm et al. 2018. PennyLane: Automatic differentiation of hybrid quantum-classical computations. arXiv e-prints Article arXiv:1811.04968 (Nov. 2018) arXiv:1811.04968 pages. arXiv:1811.04968 [quant-ph]"},{"key":"e_1_3_2_1_3_1","volume-title":"Carsten Blank, Alain Delgado, Soran Jahangiri, et al.","author":"Bergholm Ville","year":"2018","unstructured":"Ville Bergholm, Josh Izaac, Maria Schuld, Christian Gogolin, M Sohaib Alam, Shahnawaz Ahmed, Juan Miguel Arrazola, Carsten Blank, Alain Delgado, Soran Jahangiri, et al. 2018. Pennylane: Automatic differentiation of hybrid quantum-classical computations. arXiv preprint arXiv:1811.04968 (2018)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747369"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.2017.0551"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41567-019-0648-8"},{"key":"e_1_3_2_1_7_1","volume-title":"Retrosynthesis prediction with conditional graph logic network. Advances in Neural Information Processing Systems 32","author":"Dai Hanjun","year":"2019","unstructured":"Hanjun Dai, Chengtao Li, Connor Coley, Bo Dai, and Le Song. 2019. Retrosynthesis prediction with conditional graph logic network. Advances in Neural Information Processing Systems 32 (2019)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747675"},{"key":"e_1_3_2_1_9_1","volume-title":"Adaptive Subgradient Methods for Online Learning and Stochastic Optimization. J. Mach. Learn. Res. 12, null (jul","author":"Duchi John","year":"2011","unstructured":"John Duchi, Elad Hazan, and Yoram Singer. 2011. Adaptive Subgradient Methods for Online Learning and Stochastic Optimization. J. Mach. Learn. Res. 12, null (jul 2011), 2121--2159."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Rafael G\u00f3mez-Bombarelli et al. 2016. Design of efficient molecular organic light-emitting diodes by a high-throughput virtual screening and experimental approach. Nature materials 15 10 (2016) 1120--1127.","DOI":"10.1038\/nmat4717"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Rafael G\u00f3mez-Bombarelli et al. 2018. Automatic chemical design using a data-driven continuous representation of molecules. ACS central science 4 2 (2018) 268--276.","DOI":"10.1021\/acscentsci.7b00572"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2017.8050827"},{"key":"e_1_3_2_1_13_1","volume-title":"Quantum neural computing. Advances in imaging and electron physics 94","author":"Kak Subhash C","year":"1995","unstructured":"Subhash C Kak. 1995. Quantum neural computing. Advances in imaging and electron physics 94 (1995), 259--313."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1412.6980"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the Great Lakes Symposium on VLSI","author":"Kundu Satwik","year":"2022","unstructured":"Satwik Kundu and Swaroop Ghosh. 2022. Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses. In Proceedings of the Great Lakes Symposium on VLSI 2022. 463--468."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACET48583.2019.8956251"},{"key":"e_1_3_2_1_17_1","volume-title":"Stephen Ho, Jack Sloane, Paul Wender, and Vijay Pande.","author":"Liu Bowen","year":"2017","unstructured":"Bowen Liu, Bharath Ramsundar, Prasad Kawthekar, Jade Shi, Joseph Gomes, Quang Luu Nguyen, Stephen Ho, Jack Sloane, Paul Wender, and Vijay Pande. 2017. Retrosynthetic reaction prediction using neural sequence-to-sequence models. ACS central science 3, 10 (2017), 1103--1113."},{"key":"e_1_3_2_1_19_1","unstructured":"Adam Paszke et al. 2019. PyTorch: An Imperative Style High-Performance Deep Learning Library. Curran Associates Inc. 8024--8035. http:\/\/papers.neurips.cc\/paper\/9015-pytorch-an-imperative-style-high-performance-deep-learning-library.pdf"},{"key":"e_1_3_2_1_20_1","first-page":"2825","article-title":"Scikit-learn: Machine Learning in Python","volume":"12","author":"F. Pedregosa","year":"2011","unstructured":"F. Pedregosa et al. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research 12 (2011), 2825--2830.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1021\/ct401004r"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0001-6"},{"key":"e_1_3_2_1_23_1","volume-title":"International Conference on Machine Learning. PMLR, 8818--8827","author":"Shi Chence","year":"2020","unstructured":"Chence Shi, Minkai Xu, Hongyu Guo, Ming Zhang, and Jian Tang. 2020. A graph to graphs framework for retrosynthesis prediction. In International Conference on Machine Learning. PMLR, 8818--8827."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/qute.201900070"},{"key":"e_1_3_2_1_25_1","volume-title":"ROBIA: a reaction prediction program. Organic letters 7, 16","author":"Socorro Ingrid M","year":"2005","unstructured":"Ingrid M Socorro, Keith Taylor, and Jonathan M Goodman. 2005. ROBIA: a reaction prediction program. Organic letters 7, 16 (2005), 3541--3544."},{"key":"e_1_3_2_1_26_1","volume-title":"Ruud Van Deursen, and Guillaume Godin","author":"Tetko Igor V","year":"2020","unstructured":"Igor V Tetko, Pavel Karpov, Ruud Van Deursen, and Guillaume Godin. 2020. State-of-the-art augmented NLP transformer models for direct and single-step retrosynthesis. Nature communications 11, 1 (2020), 1--11."},{"key":"e_1_3_2_1_27_1","article-title":"Visualizing data using t-SNE","volume":"9","author":"der Maaten Laurens Van","year":"2008","unstructured":"Laurens Van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research 9, 11 (2008).","journal-title":"Journal of machine learning research"},{"key":"e_1_3_2_1_28_1","volume-title":"Attention is all you need. Advances in neural information processing systems 30","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cej.2021.129845"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1021\/ci00057a005"},{"key":"e_1_3_2_1_31_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1504--1509","author":"Yasaei Rozhin","year":"2021","unstructured":"Rozhin Yasaei, Shih-Yuan Yu, and Mohammad Abdullah Al Faruque. 2021. Gnn4tj: Graph neural networks for hardware trojan detection at register transfer level. In 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1504--1509."},{"key":"e_1_3_2_1_32_1","volume-title":"NEQR: a novel enhanced quantum representation of digital images. Quantum information processing 12, 8","author":"Zhang Yi","year":"2013","unstructured":"Yi Zhang, Kai Lu, Yinghui Gao, and Mo Wang. 2013. NEQR: a novel enhanced quantum representation of digital images. Quantum information processing 12, 8 (2013), 2833--2860."}],"event":{"name":"ICCAD '22: IEEE\/ACM International Conference on Computer-Aided Design","location":"San Diego California","acronym":"ICCAD '22","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE-EDS Electronic Devices Society","IEEE CAS","IEEE CEDA"]},"container-title":["Proceedings of the 41st IEEE\/ACM International Conference on Computer-Aided Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508352.3561115","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508352.3561115","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508352.3561115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:36Z","timestamp":1750182576000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508352.3561115"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,30]]},"references-count":31,"alternative-id":["10.1145\/3508352.3561115","10.1145\/3508352"],"URL":"https:\/\/doi.org\/10.1145\/3508352.3561115","relation":{},"subject":[],"published":{"date-parts":[[2022,10,30]]},"assertion":[{"value":"2022-12-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}