{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:23:04Z","timestamp":1772119384375,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,22]]},"DOI":"10.1145\/3641584.3641740","type":"proceedings-article","created":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T22:44:43Z","timestamp":1718405083000},"page":"1049-1055","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Analysis of node anomaly detection in quantum communication networks based on AP clustering with Fibonacci-like lattices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-0012-4512","authenticated-orcid":false,"given":"Bochen","family":"Jin","sequence":"first","affiliation":[{"name":"Xi`an University of Posts &amp; Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9726-7742","authenticated-orcid":false,"given":"Guang","family":"Yang","sequence":"additional","affiliation":[{"name":"Xi`an University of Posts &amp; Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6238-4167","authenticated-orcid":false,"given":"Min","family":"Nie","sequence":"additional","affiliation":[{"name":"Xi`an University of Posts &amp; Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1119\/1.17781"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1038\/299802a0"},{"key":"e_1_3_2_1_3_1","first-page":"175","volume-title":"Brassard G 1984 Proceedings of IEEE International Conference on Computers, System and Signal Processing (Bangalore: IEEE)","author":"Bennett C H","unstructured":"Bennett C H,Brassard G 1984 Proceedings of IEEE International Conference on Computers, System and Signal Processing (Bangalore: IEEE) p175"},{"key":"e_1_3_2_1_4_1","volume-title":"Simple proof of security of the BB84 quantum key distribution protocol[J]. Physical review letters","author":"Shor P W","year":"2000","unstructured":"Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol[J]. Physical review letters, 2000, 85(2): 441."},{"key":"e_1_3_2_1_5_1","first-page":"246","article-title":"NFV memory for 5G communication networks resource management approach for 5G communication networks[J]","volume":"2020","author":"Su Chang","unstructured":"Su Chang, Zhang Dingquan, Xie Xianzhong, NFV memory for 5G communication networks resource management approach for 5G communication networks[J]. Computer Science,2020,47(9):246-251.","journal-title":"Computer Science"},{"issue":"6","key":"e_1_3_2_1_6_1","first-page":"21","article-title":"The practice of 5G communication network technology in media business[J]","volume":"2019","author":"Qi Yi","unstructured":"Qi Yi. The practice of 5G communication network technology in media business[J]. Television Research, 2019 (6): 21-22.","journal-title":"Television Research"},{"issue":"10","key":"e_1_3_2_1_7_1","first-page":"155","article-title":"An improved data anomaly detection method based on Isolation Forest[J]","volume":"45","author":"Xu D","year":"2018","unstructured":"Xu D, Wang YJ, Meng YL, An improved data anomaly detection method based on Isolation Forest[J]. Computer Science, 2018, 45(10): 155-159.","journal-title":"Computer Science"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.97.042315"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/ac0d4d"},{"key":"e_1_3_2_1_10_1","first-page":"2022","article-title":"Research on Security Anomaly Detection for Big Data Platforms Based on Quantum Optimization Clustering[J]","author":"Deng L","year":"2022","unstructured":"Deng L, Wan L, Guo J. Research on Security Anomaly Detection for Big Data Platforms Based on Quantum Optimization Clustering[J]. Mathematical Problems in Engineering, 2022, 2022.","journal-title":"Mathematical Problems in Engineering"},{"key":"e_1_3_2_1_11_1","first-page":"474","article-title":"A hybrid quantum long- and short-term memory neural network construction method for image classification[J]","volume":"2023","author":"Yang G","unstructured":"Yang G, Ban Sua, Nie M A hybrid quantum long- and short-term memory neural network construction method for image classification[J]. Journal of Physics,2023,72(05):474-487.","journal-title":"Journal of Physics"},{"issue":"11","key":"e_1_3_2_1_12_1","first-page":"1290","volume":"60","author":"Zhong J F","year":"2020","unstructured":"Zhong J F, Wang H J. Emergency Communication Technology Based on 5G and Drone Intelligent Networking[J]. Telecommunication Engineering, 2020, 60(11): 1290-1296.","journal-title":"Telecommunication Engineering"},{"issue":"12","key":"e_1_3_2_1_13_1","first-page":"2304","volume":"15","author":"Beiying Z","year":"2021","unstructured":"Beiying Z, Weifeng J I, Jiang W, Trusted Routing Protocol for Flying Ad Hoc Networks[J]. Journal of Frontiers of Computer Science & Technology, 2021, 15(12): 2304.","journal-title":"Journal of Frontiers of Computer Science & Technology"},{"key":"e_1_3_2_1_14_1","first-page":"24","article-title":"Strategies for constructing quantum air communication networks with geese-like flock arrays[J]","volume":"2022","author":"Yao M. F.","unstructured":"Yao M. F., Nie M., Yang G. Strategies for constructing quantum air communication networks with geese-like flock arrays[J]. Journal of Physics,2022,71(15):24-35.","journal-title":"Journal of Physics"},{"issue":"7","key":"e_1_3_2_1_15_1","first-page":"0727001","article-title":"Quantum multicast network routing strategy based on hyperentanglement relaying[J]","volume":"60","author":"Xing L","year":"2023","unstructured":"Xing L, Yang G, Nie M, Quantum multicast network routing strategy based on hyperentanglement relaying[J]. Laser & Optoelectronics Progress, 2023, 60(7): 0727001.","journal-title":"Laser & Optoelectronics Progress"},{"key":"e_1_3_2_1_16_1","first-page":"133","article-title":"Research on multi-hop entanglement exchange method for quantum networks based on polarization-space mode super entanglement[J]","volume":"2022","author":"Yang G","unstructured":"Yang G, Liu Q, Nie M Research on multi-hop entanglement exchange method for quantum networks based on polarization-space mode super entanglement[J]. Journal of Physics,2022,71(10):133-144.","journal-title":"Journal of Physics"},{"issue":"5","key":"e_1_3_2_1_17_1","first-page":"29","article-title":"A spiral datum-based navigation star selection method[J]","volume":"32","author":"Chen C","year":"2012","unstructured":"Chen C, Wang H-L, Lu J-H, A spiral datum-based navigation star selection method[J]. Journal of Ballistic Arrows and Guidance, 2012, 32(5): 29-32.","journal-title":"Journal of Ballistic Arrows and Guidance"},{"key":"e_1_3_2_1_18_1","volume-title":"Instrumentation Technology and Sensors","author":"Qubao-Hua","year":"2021","unstructured":"Qubao-Hua, Yang-Yang Wang, Tian-Heng Zhang, Fibonacci series-based dual-channel absolute time grid design[J]. Instrumentation Technology and Sensors, 2021."},{"key":"e_1_3_2_1_19_1","first-page":"41","article-title":"Background light suppression for free-space quantum key distribution[J]","volume":"2018","author":"Zhu Qiu-Li","unstructured":"Zhu Qiu-Li,Shi Lei,Wei Jia-Hua Background light suppression for free-space quantum key distribution[J]. Advances in Lasers and Optoelectronics,2018,55(06):41-48.","journal-title":"Advances in Lasers and Optoelectronics"}],"event":{"name":"AIPR 2023: 2023 6th International Conference on Artificial Intelligence and Pattern Recognition","location":"Xiamen China","acronym":"AIPR 2023"},"container-title":["2023 6th International Conference on Artificial Intelligence and Pattern Recognition (AIPR)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641584.3641740","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3641584.3641740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:12Z","timestamp":1750291392000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641584.3641740"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,22]]},"references-count":19,"alternative-id":["10.1145\/3641584.3641740","10.1145\/3641584"],"URL":"https:\/\/doi.org\/10.1145\/3641584.3641740","relation":{},"subject":[],"published":{"date-parts":[[2023,9,22]]},"assertion":[{"value":"2024-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}