{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T13:11:27Z","timestamp":1774703487226,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T00:00:00Z","timestamp":1714176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2023YFF0905200"],"award-info":[{"award-number":["2023YFF0905200"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Zhejiang Pioneer (Jianbing) Project","award":["2023C01036"],"award-info":[{"award-number":["2023C01036"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,27]]},"DOI":"10.1145\/3620666.3651360","type":"proceedings-article","created":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T12:08:21Z","timestamp":1713960501000},"page":"671-688","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["MorphQPV: Exploiting Isomorphism in Quantum Programs to Facilitate Confident Verification"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0634-8089","authenticated-orcid":false,"given":"Siwei","family":"Tan","sequence":"first","affiliation":[{"name":"Zhejiang university, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5333-6955","authenticated-orcid":false,"given":"Debin","family":"Xiang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3801-6847","authenticated-orcid":false,"given":"Liqiang","family":"Lu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6014-9419","authenticated-orcid":false,"given":"Junlin","family":"Lu","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6025-9343","authenticated-orcid":false,"given":"Qiuping","family":"Jiang","sequence":"additional","affiliation":[{"name":"Ningbo University, Ningbo, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9663-7441","authenticated-orcid":false,"given":"Mingshuai","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4703-7348","authenticated-orcid":false,"given":"Jianwei","family":"Yin","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST49551.2021.00014"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-019-1666-5"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.107.042408"},{"key":"e_1_3_2_1_4_1","series-title":"SIAM journal on Computing, 26(5):1510--1523","volume-title":"Strengths and weaknesses of quantum computing","author":"Bennett Charles H","year":"1997","unstructured":"Charles H Bennett, Ethan Bernstein, Gilles Brassard, and Umesh Vazirani. Strengths and weaknesses of quantum computing. SIAM journal on Computing, 26(5):1510--1523, 1997."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1038\/37539"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3081415"},{"key":"e_1_3_2_1_7_1","volume-title":"Tiffany Y Chen, Jana Lipkova, Ming Y Lu, Sharifa Sahai, and Faisal Mahmood. Algorithmic fairness in artificial intelligence for medicine and healthcare. Nature biomedical engineering, 7(6):719--742","author":"Chen Richard J","year":"2023","unstructured":"Richard J Chen, Judy J Wang, Drew FK Williamson, Tiffany Y Chen, Jana Lipkova, Ming Y Lu, Sharifa Sahai, and Faisal Mahmood. Algorithmic fairness in artificial intelligence for medicine and healthcare. Nature biomedical engineering, 7(6):719--742, 2023."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3591270"},{"key":"e_1_3_2_1_9_1","volume-title":"An approximate fourier transform useful in quantum factoring","author":"Coppersmith D.","year":"2002","unstructured":"D. Coppersmith. An approximate fourier transform useful in quantum factoring, 2002."},{"key":"e_1_3_2_1_10_1","volume-title":"Quantum overlapping tomographya. Physical review letters, 124(10):100401","author":"Cotler Jordan","year":"2020","unstructured":"Jordan Cotler and Frank Wilczek. Quantum overlapping tomographya. Physical review letters, 124(10):100401, 2020."},{"key":"e_1_3_2_1_11_1","volume-title":"Open quantum assembly language. arXiv preprint arXiv:1707.03429","author":"Cross Andrew W","year":"2017","unstructured":"Andrew W Cross, Lev S Bishop, John A Smolin, and Jay M Gambetta. Open quantum assembly language. arXiv preprint arXiv:1707.03429, 2017."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA53966.2022.00027"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3582016.3582039"},{"key":"e_1_3_2_1_14_1","volume-title":"Quantum random access memory. Physical review letters, 100(16):160501","author":"Giovannetti Vittorio","year":"2008","unstructured":"Vittorio Giovannetti, Seth Lloyd, and Lorenzo Maccone. Quantum random access memory. Physical review letters, 100(16):160501, 2008."},{"key":"e_1_3_2_1_15_1","volume-title":"Going beyond bell's theorem, in \"bell's theorem, quantum theory, and conceptions of the universe,\" m. kafakos","author":"Greenberger DM","year":"1989","unstructured":"DM Greenberger, MA Horne, and A Zeilinger. Going beyond bell's theorem, in \"bell's theorem, quantum theory, and conceptions of the universe,\" m. kafakos, editor, vol. 37 of. Fundamental Theories of Physics, 1989."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"e_1_3_2_1_17_1","volume-title":"Gurobi Optimizer Reference Manual","author":"Optimization Gurobi","year":"2023","unstructured":"Gurobi Optimization, LLC. Gurobi Optimizer Reference Manual, 2023."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589044"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3508352.3549382"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322213"},{"key":"e_1_3_2_1_21_1","volume-title":"An analysis and survey of the development of mutation testing","author":"Jia Yue","year":"2010","unstructured":"Yue Jia and Mark Harman. An analysis and survey of the development of mutation testing. IEEE transactions on software engineering, 37(5):649--678, 2010."},{"key":"e_1_3_2_1_22_1","volume-title":"Fidelity for mixed quantum states. Journal of modern optics, 41(12):2315--2323","author":"Jozsa Richard","year":"1994","unstructured":"Richard Jozsa. Fidelity for mixed quantum states. Journal of modern optics, 41(12):2315--2323, 1994."},{"key":"e_1_3_2_1_23_1","volume-title":"Advances in Imaging and Electron Physics","author":"Kak Subhash C.","year":"1995","unstructured":"Subhash C. Kak. Quantum neural computing. In Peter W. Hawkes, editor, Advances in Imaging and Electron Physics, volume 94. Elsevier, 1995."},{"key":"e_1_3_2_1_24_1","volume-title":"Sumit Singh Chauhan, and Vijay Kumar. A review on genetic algorithm: past, present, and future. Multimedia tools and applications, 80:8091--8126","author":"Katoch Sourabh","year":"2021","unstructured":"Sourabh Katoch, Sumit Singh Chauhan, and Vijay Kumar. A review on genetic algorithm: past, present, and future. Multimedia tools and applications, 80:8091--8126, 2021."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1021\/ja02231a009"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378500"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428218"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378488"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00025"},{"key":"e_1_3_2_1_30_1","volume-title":"Quantum-locked key distribution at nearly the classical capacity rate. Physical review letters, 113(16):160502","author":"Lupo Cosmo","year":"2014","unstructured":"Cosmo Lupo and Seth Lloyd. Quantum-locked key distribution at nearly the classical capacity rate. Physical review letters, 113(16):160502, 2014."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897518.2897544"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC41405.2020.00050"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530480"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3519939.3523713"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1038\/s43588-022-00351-9"},{"key":"e_1_3_2_1_36_1","first-page":"32","article-title":"A meta-analysis of overfitting in machine learning","author":"Roelofs Rebecca","year":"2019","unstructured":"Rebecca Roelofs, Vaishaal Shankar, Benjamin Recht, Sara Fridovich-Keil, Moritz Hardt, John Miller, and Ludwig Schmidt. A meta-analysis of overfitting in machine learning. Advances in Neural Information Processing Systems, 32, 2019.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/00107514.2019.1667078"},{"key":"e_1_3_2_1_38_1","volume-title":"Share","author":"Stack Exchange Inc.","year":"2023","unstructured":"Stack Exchange Inc. Stack Overflow - Where Developers Learn, Share, & Build Careers, 2023."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454029"},{"key":"e_1_3_2_1_40_1","volume-title":"Quantum logic locking for security. J, 6(3):411--420","author":"Topaloglu Rasit Onur","year":"2023","unstructured":"Rasit Onur Topaloglu. Quantum logic locking for security. J, 6(3):411--420, 2023."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-023-38332-9"},{"issue":"1","key":"e_1_3_2_1_42_1","first-page":"614","article-title":"Informed machine learning-a taxonomy and survey of integrating prior knowledge into learning systems","volume":"35","author":"Rueden Laura Von","year":"2021","unstructured":"Laura Von Rueden, Sebastian Mayer, Katharina Beckh, Bogdan Georgiev, Sven Giesselbach, Raoul Heese, Birgit Kirsch, Julius Pfrommer, Annika Pick, Rajkumar Ramamurthy, et al. Informed machine learning-a taxonomy and survey of integrating prior knowledge into learning systems. IEEE Transactions on Knowledge and Data Engineering, 35(1):614--633, 2021.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_1_43_1","volume-title":"A quantum algorithm for simulating non-sparse hamiltonians. arXiv preprint arXiv:1803.08273","author":"Wang Chunhao","year":"2018","unstructured":"Chunhao Wang and Leonard Wossnig. A quantum algorithm for simulating non-sparse hamiltonians. arXiv preprint arXiv:1803.08273, 2018."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1120725.1120963"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530495"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST49551.2021.00061"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678798"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530481"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3591254"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613424.3614270"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/3114204.3114741"},{"key":"e_1_3_2_1_52_1","volume-title":"Floyd-hoare logic for quantum programs. ACM Transactions on Programming Languages and Systems (TOPLAS), 33(6):1--49","author":"Ying Mingsheng","year":"2012","unstructured":"Mingsheng Ying. Floyd-hoare logic for quantum programs. ACM Transactions on Programming Languages and Systems (TOPLAS), 33(6):1--49, 2012."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/QCE52317.2021.00041"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454061"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3498691"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624183"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314584"}],"event":{"name":"ASPLOS '24: 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3","location":"La Jolla CA USA","acronym":"ASPLOS '24","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620666.3651360","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:43Z","timestamp":1750291423000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620666.3651360"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,27]]},"references-count":57,"alternative-id":["10.1145\/3620666.3651360","10.1145\/3620666"],"URL":"https:\/\/doi.org\/10.1145\/3620666.3651360","relation":{},"subject":[],"published":{"date-parts":[[2024,4,27]]},"assertion":[{"value":"2024-04-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}