{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T20:23:09Z","timestamp":1777407789224,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natural Science Basic Research Program of Shaanxi, China","award":["2021JM-464"],"award-info":[{"award-number":["2021JM-464"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61971348"],"award-info":[{"award-number":["61971348"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,23]]},"DOI":"10.1145\/3573942.3574105","type":"proceedings-article","created":{"date-parts":[[2023,5,16]],"date-time":"2023-05-16T23:45:42Z","timestamp":1684280742000},"page":"852-859","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Full-Rotation Quantum Convolutional Neural Network for Abnormal Intrusion Detection System"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2061-7468","authenticated-orcid":false,"given":"Suya","family":"Chao","sequence":"first","affiliation":[{"name":"School of Communication and Information Engineering &amp; School of Artificial Intelligence, Xi'an University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9726-7742","authenticated-orcid":false,"given":"Guang","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering &amp; School of Artificial Intelligence, Xi'an University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6238-4167","authenticated-orcid":false,"given":"Min","family":"Nie","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering &amp; School of Artificial Intelligence, Xi'an University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8330-5250","authenticated-orcid":false,"given":"Yuanhua","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering &amp; School of Artificial Intelligence, Xi'an University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0882-1896","authenticated-orcid":false,"given":"Meiling","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering &amp; School of Artificial Intelligence, Xi'an University of Posts and Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2023,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.95.150501"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.113.210501"},{"key":"e_1_3_2_1_3_1","volume-title":"Machine Learning[M]","author":"Mitchell T M","year":"2003","unstructured":"Mitchell T M . Machine Learning[M]. McGraw-Hill, 2003."},{"issue":"1","key":"e_1_3_2_1_4_1","first-page":"1","volume":"2021","author":"Nooripour R","unstructured":"Nooripour R , Hosseinian S , Hussain A J , How Resiliency and Hope Can Predict Stress of Covid-19 by Mediating Role of Spiritual Well-being Based on Machine Learning[J]. Journal of Religion and Health, 2021(1):1-16.","journal-title":"Journal of Religion and Health"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1038\/nphys3029"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1088\/1612-202X\/abd23c"},{"key":"e_1_3_2_1_7_1","volume-title":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI).","author":"Sukumar J","year":"2018","unstructured":"Sukumar J , Pranav I , Neetish M M , Network Intrusion Detection Using Improved Genetic k-means Algorithm[C]\/\/ 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI). 2018.eley."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1034-4"},{"key":"e_1_3_2_1_9_1","volume-title":"Journal of Computer Applications","author":"Kang S","year":"2015","unstructured":"Kang S , Liu L , Liu C , Intrusion detection based on multiple layer extreme learning machine[J]. Journal of Computer Applications, 2015."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJMSTR.2015040103"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Mirza A H Cosan S . Computer network intrusion detection using sequential LSTM Neural Networks autoencoders[C]\/\/ 2018:1-4.","DOI":"10.1109\/SIU.2018.8404689"},{"issue":"06","key":"e_1_3_2_1_12_1","first-page":"33","volume":"22","author":"Li G.","year":"2019","unstructured":"Li G. Research on Network Intrusion Detection Model Based on Quantum Artificial Fish Swarm and Fuzzy Kernel Clustering Algorithm [J]. Software Engineering, 2019, 22(06): 33-37.","journal-title":"Software Engineering"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1087.2013.01357"},{"key":"e_1_3_2_1_14_1","volume-title":"Research of Intrusion Detection Based on Fuzzy Clustering and the Quantum Genetic Theory[J]","author":"Liu X M","year":"2011","unstructured":"Liu X M . Research of Intrusion Detection Based on Fuzzy Clustering and the Quantum Genetic Theory[J]. Journal of Kaifeng University, 2011."},{"key":"e_1_3_2_1_15_1","volume-title":"\u00a0Network Intrusion Detection Algorithm Based on Quantum Particle Swarm Optimization [J].\u00a0Computer Engineering and Applications","author":"Xu Lei","year":"2011","unstructured":"Xu Lei, Li Yongzhong, Li Zhengjie, \u00a0Network Intrusion Detection Algorithm Based on Quantum Particle Swarm Optimization [J].\u00a0Computer Engineering and Applications, 2011, 47(36):4."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.11.002"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevResearch.1.033063"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1088\/0256-307X\/38\/8\/080301"},{"key":"e_1_3_2_1_19_1","volume-title":"Efficient state preparation for a register of quantum bits[J]. Phys.rev.a","author":"Soklakov A N","year":"2006","unstructured":"Soklakov A N , Schack R . Efficient state preparation for a register of quantum bits[J]. Phys.rev.a, 2006, 73(1):5689-5693."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijdta.2013.6.5.03"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/1047\/1\/012082"},{"key":"e_1_3_2_1_22_1","volume-title":"Efficient decision tree training with new data structure for secure multi-party computation[J]","author":"Hamada K","year":"2021","unstructured":"Hamada K , Ikarashi D , Kikuchi R , Efficient decision tree training with new data structure for secure multi-party computation[J]. 2021."}],"event":{"name":"AIPR 2022: 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","location":"Xiamen China","acronym":"AIPR 2022"},"container-title":["Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573942.3574105","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3573942.3574105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:33Z","timestamp":1750186953000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573942.3574105"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":22,"alternative-id":["10.1145\/3573942.3574105","10.1145\/3573942"],"URL":"https:\/\/doi.org\/10.1145\/3573942.3574105","relation":{},"subject":[],"published":{"date-parts":[[2022,9,23]]},"assertion":[{"value":"2023-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}