{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T04:15:03Z","timestamp":1775880903418,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":81,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,2]],"date-time":"2024-11-02T00:00:00Z","timestamp":1730505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1718474, 1723687, 2113839, 2129675"],"award-info":[{"award-number":["1718474, 1723687, 2113839, 2129675"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,2]]},"DOI":"10.1145\/3696843.3696846","type":"proceedings-article","created":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T19:13:43Z","timestamp":1730229223000},"page":"28-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["SoK Paper: Security Concerns in Quantum Machine Learning as a Service"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2140-6486","authenticated-orcid":false,"given":"Satwik","family":"Kundu","sequence":"first","affiliation":[{"name":"The Pennsylvania State University, State College, Pennsylvania, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8753-490X","authenticated-orcid":false,"given":"Swaroop","family":"Ghosh","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, State College, Pennsylvania, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2024,11,2]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Amira Abbas et\u00a0al. 2021. The power of quantum neural networks. Nature Computational Science 1 6 (2021) 403\u2013409.","DOI":"10.1038\/s43588-021-00084-1"},{"key":"e_1_3_3_1_3_2","unstructured":"Josh Achiam et\u00a0al. 2023. Gpt-4 technical report. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2303.08774 (2023)."},{"key":"e_1_3_3_1_4_2","unstructured":"Amazon. 2024. Amazon Braket Pricing. https:\/\/aws.amazon.com\/braket\/pricing\/ Accessed: 08\/12\/2024."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3620665.3640354"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3370748.3406570"},{"key":"e_1_3_3_1_7_2","unstructured":"Ramin Ayanzadeh et\u00a0al. 2023. Enigma: Privacy-Preserving Execution of QAOA on Untrusted Quantum Computers. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2311.13546 (2023)."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Jan Balewski et\u00a0al. 2024. Quantum-parallel vectorized data encodings and computations on trapped-ion and transmon QPUs. Scientific Reports 14 1 (2024) 3435.","DOI":"10.1038\/s41598-024-53720-x"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Kishor Bharti et\u00a0al. 2022. Noisy intermediate-scale quantum algorithms. Reviews of Modern Physics 94 1 (2022) 015004.","DOI":"10.1103\/RevModPhys.94.015004"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Adrien Bonguet and Martine Bellaiche. 2017. A survey of denial-of-service and distributed denial of service attacks and defenses in cloud computing. Future Internet 9 3 (2017) 43.","DOI":"10.3390\/fi9030043"},{"key":"e_1_3_3_1_11_2","unstructured":"Joseph Bowles Shahnawaz Ahmed and Maria Schuld. 2024. Better than classical? the subtle art of benchmarking quantum machine learning models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2403.07059 (2024)."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Ross Brewer. 2016. Ransomware attacks: detection prevention and cure. Network security 2016 9 (2016) 5\u20139.","DOI":"10.1016\/S1353-4858(16)30086-1"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Vladimir Bu\u017eek and Mark Hillery. 1996. Quantum copying: Beyond the no-cloning theorem. Physical Review A 54 3 (1996) 1844.","DOI":"10.1103\/PhysRevA.54.1844"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Marco Cerezo et\u00a0al. 2021. Variational quantum algorithms. Nature Reviews Physics 3 9 (2021) 625\u2013644.","DOI":"10.1038\/s42254-021-00348-9"},{"key":"e_1_3_3_1_15_2","unstructured":"Atom Computing. 2023. Quantum startup Atom Computing first to exceed 1 000 qubits. Press Release. Accessed: Oct 28 (2023)."},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Iris Cong et\u00a0al. 2019. Quantum convolutional neural networks. Nature Physics 15 12 (2019) 1273\u20131278.","DOI":"10.1038\/s41567-019-0648-8"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Pierre-Luc Dallaire-Demers et\u00a0al. 2018. Quantum generative adversarial networks. Physical Review A 98 1 (2018) 012324.","DOI":"10.1103\/PhysRevA.98.012324"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Yuxuan Du Tao Huang Shan You Min-Hsiu Hsieh and Dacheng Tao. 2022. Quantum circuit architecture search for variational quantum algorithms. npj Quantum Information 8 1 (2022) 62.","DOI":"10.1038\/s41534-022-00570-y"},{"key":"e_1_3_3_1_19_2","unstructured":"Edward Farhi and Hartmut Neven. 2018. Classification with quantum neural networks on near term processors. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1802.06002 (2018)."},{"key":"e_1_3_3_1_20_2","unstructured":"Ji Feng Qi-Zhi Cai and Zhi-Hua Zhou. 2019. Learning to confuse: Generating training time adversarial data with auto-encoder. Advances in Neural Information Processing Systems 32 (2019)."},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_3_1_22_2","unstructured":"Zhenxiao Fu et\u00a0al. 2024. QuantumLeak: Stealing Quantum Neural Networks from Cloud-based NISQ Machines. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2403.10790 (2024)."},{"key":"e_1_3_3_1_23_2","unstructured":"Jay Gambetta. 2023. The hardware and software for the era of quantum utility is here."},{"key":"e_1_3_3_1_24_2","unstructured":"Jonas Geiping et\u00a0al. 2020. Witches\u2019 brew: Industrial scale data poisoning via gradient matching. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2009.02276 (2020)."},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"crossref","unstructured":"Weiyuan Gong et\u00a0al. 2024. Enhancing quantum adversarial robustness by randomized encodings. Physical Review Research 6 2 (2024) 023020.","DOI":"10.1103\/PhysRevResearch.6.023020"},{"key":"e_1_3_3_1_26_2","unstructured":"Google. 2024. Google Cloud. https:\/\/cloud.google.com\/compute\/gpus-pricing#gpu-pricing Accessed: 08\/12\/2024."},{"key":"e_1_3_3_1_27_2","unstructured":"Gian\u00a0Giacomo Guerreschi and Mikhail Smelyanskiy. 2017. Practical optimization for hybrid quantum-classical algorithms. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1701.01450 (2017)."},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"crossref","unstructured":"Yuhan Huang Qingyu Li Xiaokai Hou Rebing Wu Man-Hong Yung Abolfazl Bayat and Xiaoting Wang. 2022. Robust resource-efficient quantum variational ansatz through an evolutionary algorithm. Physical Review A 105 5 (2022) 052414.","DOI":"10.1103\/PhysRevA.105.052414"},{"key":"e_1_3_3_1_29_2","unstructured":"IBM. 2023. Qiskit Transpiler Documentation. https:\/\/docs.quantum.ibm.com\/api\/qiskit\/transpiler Accessed: 07\/18\/2024."},{"key":"e_1_3_3_1_30_2","unstructured":"IBM. 2024. IBM Quantum. https:\/\/quantum.ibm.com\/ Accessed: 08\/12\/2024."},{"key":"e_1_3_3_1_31_2","unstructured":"IonQ. 2024. IonQ Quantum Cloud. https:\/\/ionq.com\/quantum-cloud Accessed: 08\/15\/2024."},{"key":"e_1_3_3_1_32_2","unstructured":"IQM. 2024. IQM Radiance. https:\/\/www.meetiqm.com\/products\/iqm-radiance Accessed: 08\/15\/2024."},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3406477"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"crossref","unstructured":"Youngseok Kim et\u00a0al. 2023. Evidence for the utility of quantum computing before fault tolerance. Nature 618 7965 (2023) 500\u2013505.","DOI":"10.1038\/s41586-023-06096-3"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3649476.3658806"},{"key":"e_1_3_3_1_36_2","unstructured":"Satwik Kundu and Swaroop Ghosh. 2024. STIQ: Safeguarding Training and Inferencing of Quantum Neural Networks from Untrusted Cloud. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2405.18746 (2024)."},{"key":"e_1_3_3_1_37_2","unstructured":"Martin Larocca et\u00a0al. 2024. A review of barren plateaus in variational quantum computing. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2405.00781 (2024)."},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"crossref","unstructured":"Ryan LaRose and Brian Coyle. 2020. Robust data encodings for quantum classifiers. Physical Review A 102 3 (2020) 032420.","DOI":"10.1103\/PhysRevA.102.032420"},{"key":"e_1_3_3_1_39_2","unstructured":"Guangxi Li et\u00a0al. 2022. Concentration of data encoding in parameterized quantum circuits. Advances in Neural Information Processing Systems 35 (2022) 19456\u201319469."},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"crossref","unstructured":"Haoran Liao Ian Convy William\u00a0J Huggins and K\u00a0Birgitta Whaley. 2021. Robust in practice: Adversarial attacks on quantum machine learning. Physical Review A 103 4 (2021) 042427.","DOI":"10.1103\/PhysRevA.103.042427"},{"key":"e_1_3_3_1_41_2","unstructured":"Chao Lu et\u00a0al. 2024. Quantum Leak: Timing Side-Channel Attacks on Cloud-Based Quantum Services. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2401.01521 (2024)."},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"crossref","unstructured":"Yao Ma et\u00a0al. 2022. QEnclave-A practical solution for secure quantum cloud computing. npj Quantum Information 8 1 (2022) 128.","DOI":"10.1038\/s41534-022-00612-5"},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"crossref","unstructured":"Tasnuva Mahjabin et\u00a0al. 2017. A survey of distributed denial-of-service attack prevention and mitigation techniques. International Journal of Distributed Sensor Networks 13 12 (2017) 1550147717741463.","DOI":"10.1177\/1550147717741463"},{"key":"e_1_3_3_1_44_2","doi-asserted-by":"crossref","unstructured":"Jarrod\u00a0R McClean et\u00a0al. 2018. Barren plateaus in quantum neural network training landscapes. Nature communications 9 1 (2018) 4812.","DOI":"10.1038\/s41467-018-07090-4"},{"key":"e_1_3_3_1_45_2","unstructured":"Fatemehsadat Mireshghallah et\u00a0al. 2020. Privacy in deep learning: A survey. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2004.12254 (2020)."},{"key":"e_1_3_3_1_46_2","doi-asserted-by":"crossref","unstructured":"Kosuke Mitarai Makoto Negoro Masahiro Kitagawa and Keisuke Fujii. 2018. Quantum circuit learning. Physical Review A 98 3 (2018) 032309.","DOI":"10.1103\/PhysRevA.98.032309"},{"key":"e_1_3_3_1_47_2","unstructured":"Blaine Nelson et\u00a0al. 2008. Exploiting machine learning to subvert your spam filter. LEET 8 1-9 (2008) 16\u201317."},{"key":"e_1_3_3_1_48_2","unstructured":"OQC: Oxford\u00a0Quantum Circuits. 2024. OQC Toshiko. https:\/\/oqc.tech\/tech\/toshiko\/ Accessed: 08\/15\/2024."},{"key":"e_1_3_3_1_49_2","unstructured":"Tirthak Patel et\u00a0al. 2023. Toward privacy in quantum program execution on untrusted quantum cloud computing machines for business-sensitive quantum needs. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2307.16799 (2023)."},{"key":"e_1_3_3_1_50_2","doi-asserted-by":"crossref","unstructured":"Arthur Pesah et\u00a0al. 2021. Absence of barren plateaus in quantum convolutional neural networks. Physical Review X 11 4 (2021) 041011.","DOI":"10.1103\/PhysRevX.11.041011"},{"key":"e_1_3_3_1_51_2","doi-asserted-by":"crossref","unstructured":"Koustubh Phalak et\u00a0al. 2021. Quantum puf for security and trust in quantum computing. IEEE Journal on Emerging and Selected Topics in Circuits and Systems 11 2 (2021) 333\u2013342.","DOI":"10.1109\/JETCAS.2021.3077024"},{"key":"e_1_3_3_1_52_2","unstructured":"Koustubh Phalak and Swaroop Ghosh. 2024. QuaLITi: Quantum Machine Learning Hardware Selection for Inferencing with Top-Tier Performance. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2405.11194 (2024)."},{"key":"e_1_3_3_1_53_2","doi-asserted-by":"crossref","unstructured":"Patrick Rebentrost et\u00a0al. 2014. Quantum support vector machine for big data classification. Physical review letters 113 13 (2014) 130503.","DOI":"10.1103\/PhysRevLett.113.130503"},{"key":"e_1_3_3_1_54_2","unstructured":"Machel Reid et\u00a0al. 2024. Gemini 1.5: Unlocking multimodal understanding across millions of tokens of context. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2403.05530 (2024)."},{"key":"e_1_3_3_1_55_2","unstructured":"Rigetti. 2024. Rigetti Systems. https:\/\/qcs.rigetti.com\/qpus Accessed: 08\/15\/2024."},{"key":"e_1_3_3_1_56_2","doi-asserted-by":"crossref","unstructured":"Maria Schuld et\u00a0al. 2014. The quest for a quantum neural network. Quantum Information Processing 13 (2014) 2567\u20132586.","DOI":"10.1007\/s11128-014-0809-8"},{"key":"e_1_3_3_1_57_2","doi-asserted-by":"crossref","unstructured":"Maria Schuld et\u00a0al. 2021. Effect of data encoding on the expressive power of variational quantum-machine-learning models. Physical Review A 103 3 (2021) 032430.","DOI":"10.1103\/PhysRevA.103.032430"},{"key":"e_1_3_3_1_58_2","doi-asserted-by":"crossref","unstructured":"Maria Schuld Ville Bergholm Christian Gogolin Josh Izaac and Nathan Killoran. 2019. Evaluating analytic gradients on quantum hardware. Physical Review A 99 3 (2019) 032331.","DOI":"10.1103\/PhysRevA.99.032331"},{"key":"e_1_3_3_1_59_2","doi-asserted-by":"crossref","unstructured":"Maria Schuld Alex Bocharov Krysta\u00a0M Svore and Nathan Wiebe. 2020. Circuit-centric quantum classifiers. Physical Review A 101 3 (2020) 032308.","DOI":"10.1103\/PhysRevA.101.032308"},{"key":"e_1_3_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"e_1_3_3_1_61_2","doi-asserted-by":"crossref","unstructured":"Sukin Sim Peter\u00a0D Johnson and Al\u00e1n Aspuru-Guzik. 2019. Expressibility and entangling capability of parameterized quantum circuits for hybrid quantum-classical algorithms. Advanced Quantum Technologies 2 12 (2019) 1900070.","DOI":"10.1002\/qute.201900070"},{"key":"e_1_3_3_1_62_2","doi-asserted-by":"crossref","unstructured":"James\u00a0C Spall. 1997. A one-measurement form of simultaneous perturbation stochastic approximation. Automatica 33 1 (1997) 109\u2013112.","DOI":"10.1016\/S0005-1098(96)00149-5"},{"key":"e_1_3_3_1_63_2","doi-asserted-by":"crossref","unstructured":"James\u00a0C Spall. 1998. Implementation of the simultaneous perturbation algorithm for stochastic optimization. IEEE Transactions on aerospace and electronic systems 34 3 (1998) 817\u2013823.","DOI":"10.1109\/7.705889"},{"key":"e_1_3_3_1_64_2","unstructured":"James\u00a0C Spall. 1998. An overview of the simultaneous perturbation method for efficient optimization. Johns Hopkins apl technical digest 19 4 (1998) 482\u2013492."},{"key":"e_1_3_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/BICITS51482.2021.9509877"},{"key":"e_1_3_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/HOST55342.2024.10545385"},{"key":"e_1_3_3_1_67_2","doi-asserted-by":"crossref","unstructured":"Suryansh Upadhyay and Swaroop Ghosh. [n. d.]. Trustworthy and reliable computing using untrusted and unreliable quantum hardware. Frontiers in Computer Science 6 ([n. d.]) 1431788.","DOI":"10.3389\/fcomp.2024.1431788"},{"key":"e_1_3_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED60706.2024.10528769"},{"key":"e_1_3_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA53966.2022.00057"},{"key":"e_1_3_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530400"},{"key":"e_1_3_3_1_71_2","doi-asserted-by":"crossref","unstructured":"Zhibo Wang et\u00a0al. 2022. Threats to training: A survey of poisoning attacks and defenses on machine learning systems. Comput. Surveys 55 7 (2022) 1\u201336.","DOI":"10.1145\/3538707"},{"key":"e_1_3_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/QCE57702.2023.00123"},{"key":"e_1_3_3_1_73_2","doi-asserted-by":"crossref","unstructured":"Zhepeng Wang et\u00a0al. 2024. PristiQ: A Co-Design Framework for Preserving Data Security of Quantum Learning in the Cloud. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2404.13475 (2024).","DOI":"10.1109\/ISVLSI61997.2024.00079"},{"key":"e_1_3_3_1_74_2","doi-asserted-by":"crossref","unstructured":"Maxwell\u00a0T West et\u00a0al. 2023. Towards quantum enhanced adversarial robustness in machine learning. Nature Machine Intelligence 5 6 (2023) 581\u2013589.","DOI":"10.1038\/s42256-023-00661-1"},{"key":"e_1_3_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.1109\/QCE57702.2023.00058"},{"key":"e_1_3_3_1_76_2","doi-asserted-by":"crossref","unstructured":"William\u00a0K Wootters and Wojciech\u00a0H Zurek. 1982. A single quantum cannot be cloned. Nature 299 5886 (1982) 802\u2013803.","DOI":"10.1038\/299802a0"},{"key":"e_1_3_3_1_77_2","unstructured":"Jonathan Wurtz et\u00a0al. 2023. Aquila: QuEra\u2019s 256-qubit neutral-atom quantum computer. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2306.11727 (2023)."},{"key":"e_1_3_3_1_78_2","unstructured":"Xanadu. 2024. X-series. https:\/\/www.xanadu.ai\/products\/x-series\/ Accessed: 08\/15\/2024."},{"key":"e_1_3_3_1_79_2","unstructured":"Chuanqi Xu et\u00a0al. 2023. Classification of quantum computer fault injection attacks. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2309.05478 (2023)."},{"key":"e_1_3_3_1_80_2","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623118"},{"key":"e_1_3_3_1_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/HOST55342.2024.10545386"},{"key":"e_1_3_3_1_82_2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/551"}],"event":{"name":"HASP '24: International Workshop on Hardware and Architectural Support for Security and Privacy 2024","location":"Austin TX USA","acronym":"HASP '24"},"container-title":["Proceedings of the 13th International Workshop on Hardware and Architectural Support for Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696843.3696846","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696843.3696846","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696843.3696846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:57:45Z","timestamp":1750294665000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696843.3696846"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,2]]},"references-count":81,"alternative-id":["10.1145\/3696843.3696846","10.1145\/3696843"],"URL":"https:\/\/doi.org\/10.1145\/3696843.3696846","relation":{},"subject":[],"published":{"date-parts":[[2024,11,2]]},"assertion":[{"value":"2024-11-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}