{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T21:45:58Z","timestamp":1775771158894,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100011568","name":"Huck Institutes of the Life Sciences","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100011568","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018243","name":"Institute for Computational and Data Sciences, Pennsylvania State University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018243","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2129675"],"award-info":[{"award-number":["2129675"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,6]]},"DOI":"10.1145\/3526241.3530833","type":"proceedings-article","created":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T14:37:09Z","timestamp":1654180629000},"page":"463-468","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses"],"prefix":"10.1145","author":[{"given":"Satwik","family":"Kundu","sequence":"first","affiliation":[{"name":"The Pennsylvania State University, State College, PA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Swaroop","family":"Ghosh","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, State College, PA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2022,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1038\/s43588-021-00084-1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISLPED.2019.8824907"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD51958.2021.9643516"},{"key":"e_1_3_2_1_4_1","unstructured":"Martin Anthony and Peter L Bartlett. 2009. Neural network learning: Theoretical foundations. cambridge university press.  Martin Anthony and Peter L Bartlett. 2009. Neural network learning: Theoretical foundations. cambridge university press."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3370748.3406570"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.22331\/q-2021-01-25-386"},{"key":"e_1_3_2_1_7_1","volume-title":"TDD-Net: A Tiny Defect Detection Network for Printed Circuit Boards. CAAI Transactions on Intelligence Technology 4 (04","author":"Ding Runwei","year":"2019","unstructured":"Runwei Ding , Linhui Dai , Guangpeng Li , and Hong Liu . 2019. TDD-Net: A Tiny Defect Detection Network for Printed Circuit Boards. CAAI Transactions on Intelligence Technology 4 (04 2019 ). https:\/\/doi.org\/10.1049\/trit.2019.0019 10.1049\/trit.2019.0019 Runwei Ding, Linhui Dai, Guangpeng Li, and Hong Liu. 2019. TDD-Net: A Tiny Defect Detection Network for Printed Circuit Boards. CAAI Transactions on Intelligence Technology 4 (04 2019). https:\/\/doi.org\/10.1049\/trit.2019.0019"},{"key":"e_1_3_2_1_8_1","article-title":"Adaptive subgradient methods for online learning and stochastic optimization","volume":"12","author":"Duchi John","year":"2011","unstructured":"John Duchi , Elad Hazan , and Yoram Singer . 2011 . Adaptive subgradient methods for online learning and stochastic optimization . Journal of machine learning research 12 , 7 (2011). John Duchi, Elad Hazan, and Yoram Singer. 2011. Adaptive subgradient methods for online learning and stochastic optimization. Journal of machine learning research 12, 7 (2011).","journal-title":"Journal of machine learning research"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2018.8326247"},{"key":"e_1_3_2_1_10_1","volume-title":"Power of data in quantum machine learning. Nature communications 12, 1","author":"Huang Hsin-Yuan","year":"2021","unstructured":"Hsin-Yuan Huang , Michael Broughton , Masoud Mohseni , Ryan Babbush , Sergio Boixo , Hartmut Neven , and Jarrod R McClean . 2021. Power of data in quantum machine learning. Nature communications 12, 1 ( 2021 ), 1--9. Hsin-Yuan Huang, Michael Broughton, Masoud Mohseni, Ryan Babbush, Sergio Boixo, Hartmut Neven, and Jarrod R McClean. 2021. Power of data in quantum machine learning. Nature communications 12, 1 (2021), 1--9."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42484-021-00038-w"},{"key":"e_1_3_2_1_12_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba . 2014 . Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014). Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2827699"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/QCE49297.2020.00041"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586268"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TQE.2021.3104804"},{"key":"e_1_3_2_1_17_1","volume-title":"Quantum embeddings for machine learning. arXiv preprint arXiv:2001.03622","author":"Lloyd Seth","year":"2020","unstructured":"Seth Lloyd , Maria Schuld , Aroosa Ijaz , Josh Izaac , and Nathan Killoran . 2020. Quantum embeddings for machine learning. arXiv preprint arXiv:2001.03622 ( 2020 ). Seth Lloyd, Maria Schuld, Aroosa Ijaz, Josh Izaac, and Nathan Killoran. 2020. Quantum embeddings for machine learning. arXiv preprint arXiv:2001.03622 (2020)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378477"},{"key":"e_1_3_2_1_19_1","volume-title":"An Efficient Reverse Engineering Hardware Trojan Detector Using Histogram of Oriented Gradients. Journal of Electronic Testing 33 (02","author":"Nasr Abdurrahman","year":"2017","unstructured":"Abdurrahman Nasr and Mohamed Zaki . 2017. An Efficient Reverse Engineering Hardware Trojan Detector Using Histogram of Oriented Gradients. Journal of Electronic Testing 33 (02 2017 ). https:\/\/doi.org\/10.1007\/s10836-016--5631-z 10.1007\/s10836-016--5631-z Abdurrahman Nasr and Mohamed Zaki. 2017. An Efficient Reverse Engineering Hardware Trojan Detector Using Histogram of Oriented Gradients. Journal of Electronic Testing 33 (02 2017). https:\/\/doi.org\/10.1007\/s10836-016--5631-z"},{"key":"e_1_3_2_1_20_1","volume-title":"Quantum computation and quantum information","author":"Nielsen Michael A","unstructured":"Michael A Nielsen and Isaac Chuang . 2002. Quantum computation and quantum information . American Association of Physics Teachers . Michael A Nielsen and Isaac Chuang. 2002. Quantum computation and quantum information. American Association of Physics Teachers."},{"key":"e_1_3_2_1_21_1","volume-title":"et al","author":"Paszke Adam","year":"2019","unstructured":"Adam Paszke , Sam Gross , Francisco Massa , Adam Lerer , James Bradbury , Gregory Chanan , Trevor Killeen , Zeming Lin , Gimelshein , et al . 2019 . Pytorch : An imperative style, high-performance deep learning library. arXiv (2019). Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Gimelshein, et al . 2019. Pytorch: An imperative style, high-performance deep learning library. arXiv (2019)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2021.3077024"},{"key":"e_1_3_2_1_23_1","volume-title":"Split Compilation for Security of Quantum Circuits. In 2021 IEEE\/ACM International Conference On Computer Aided Design (ICCAD). 1--7. https:\/\/doi.org\/10","author":"Saki Abdullah Ash","year":"2021","unstructured":"Abdullah Ash Saki , Aakarshitha Suresh , Rasit Onur Topaloglu , and Swaroop Ghosh . 2021 . Split Compilation for Security of Quantum Circuits. In 2021 IEEE\/ACM International Conference On Computer Aided Design (ICCAD). 1--7. https:\/\/doi.org\/10 .1109\/ICCAD51958.2021.9643478 10.1109\/ICCAD51958.2021.9643478 Abdullah Ash Saki, Aakarshitha Suresh, Rasit Onur Topaloglu, and Swaroop Ghosh. 2021. Split Compilation for Security of Quantum Circuits. In 2021 IEEE\/ACM International Conference On Computer Aided Design (ICCAD). 1--7. https:\/\/doi.org\/10.1109\/ICCAD51958.2021.9643478"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.99.032331"},{"key":"e_1_3_2_1_25_1","volume-title":"Circuit-centric quantum classifiers. Physical Review A","author":"Schuld Maria","year":"2020","unstructured":"Maria Schuld , Alex Bocharov , Krysta M Svore , and Nathan Wiebe . 2020. Circuit-centric quantum classifiers. Physical Review A ( 2020 ). Maria Schuld, Alex Bocharov, Krysta M Svore, and Nathan Wiebe. 2020. Circuit-centric quantum classifiers. Physical Review A (2020)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.103.032430"},{"key":"e_1_3_2_1_27_1","volume-title":"Expressibility and entangling capability of parameterized quantum circuits for hybrid quantum-classical algorithms. Advanced Quantum Technologies","author":"Sim Sukin","year":"2019","unstructured":"Sukin Sim , Peter D Johnson , and Al\u00e1n Aspuru-Guzik . 2019. Expressibility and entangling capability of parameterized quantum circuits for hybrid quantum-classical algorithms. Advanced Quantum Technologies ( 2019 ). Sukin Sim, Peter D Johnson, and Al\u00e1n Aspuru-Guzik. 2019. Expressibility and entangling capability of parameterized quantum circuits for hybrid quantum-classical algorithms. Advanced Quantum Technologies (2019)."},{"key":"e_1_3_2_1_28_1","volume-title":"Mahabubul Alam, Rasit o Topalaglu, and Dr. Swaroop Ghosh.","author":"Suresh Aakarshitha","year":"2021","unstructured":"Aakarshitha Suresh , Abdullah Ash Saki , Mahabubul Alam, Rasit o Topalaglu, and Dr. Swaroop Ghosh. 2021 . A Quantum Circuit Obfuscation Methodology for Security and Privacy . https:\/\/doi.org\/10.48550\/ARXIV.2104.05943 10.48550\/ARXIV.2104.05943 Aakarshitha Suresh, Abdullah Ash Saki, Mahabubul Alam, Rasit o Topalaglu, and Dr. Swaroop Ghosh. 2021. A Quantum Circuit Obfuscation Methodology for Security and Privacy. https:\/\/doi.org\/10.48550\/ARXIV.2104.05943"}],"event":{"name":"GLSVLSI '22: Great Lakes Symposium on VLSI 2022","location":"Irvine CA USA","acronym":"GLSVLSI '22","sponsor":["SIGDA ACM Special Interest Group on Design Automation"]},"container-title":["Proceedings of the Great Lakes Symposium on VLSI 2022"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3526241.3530833","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3526241.3530833","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3526241.3530833","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3526241.3530833","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:17Z","timestamp":1750186937000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3526241.3530833"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,6]]},"references-count":28,"alternative-id":["10.1145\/3526241.3530833","10.1145\/3526241"],"URL":"https:\/\/doi.org\/10.1145\/3526241.3530833","relation":{},"subject":[],"published":{"date-parts":[[2022,6,6]]},"assertion":[{"value":"2022-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}