{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T12:09:19Z","timestamp":1766491759086,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,17]]},"DOI":"10.1145\/3727967.3756822","type":"proceedings-article","created":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T11:53:17Z","timestamp":1766490797000},"page":"67-71","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Simulation of cybersecurity attacks on hybrid quantum systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0163-6786","authenticated-orcid":false,"given":"Vita Santa","family":"Barletta","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Bari Aldo Moro, Bari, BA, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5719-7447","authenticated-orcid":false,"given":"Danilo","family":"Caivano","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Bari Aldo Moro, Bari, BA, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9507-9940","authenticated-orcid":false,"given":"Miriana","family":"Calvano","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Bari Aldo Moro, Bari, BA, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6863-872X","authenticated-orcid":false,"given":"Antonio","family":"Curci","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Bari Aldo Moro, Bari, BA, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2048-9097","authenticated-orcid":false,"given":"Antonio","family":"Lopopolo","sequence":"additional","affiliation":[{"name":"Department of Informatics, University of Bari Aldo Moro, Bari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1561-7073","authenticated-orcid":false,"given":"Antonio","family":"Piccinno","sequence":"additional","affiliation":[{"name":"Department of Informatics, University of Bari Aldo Moro, Bari, Italy"}]}],"member":"320","published-online":{"date-parts":[[2025,12,23]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Herv\u00e9 Abdi and Lynne\u00a0J Williams. 2010. Principal component analysis. Wiley interdisciplinary reviews: computational statistics 2 4 (2010) 433\u2013459.","DOI":"10.1002\/wics.101"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3661167.3661278"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","unstructured":"Vita\u00a0Santa Barletta Danilo Caivano Mirko De Vincentiis Anibrata Pal and Michele Scalera. 2024. Hybrid quantum architecture for smart city security. Journal of Systems and Software 217 (2024) 112161. 10.1016\/j.jss.2024.112161","DOI":"10.1016\/j.jss.2024.112161"},{"key":"e_1_3_3_1_5_2","unstructured":"Himani Bhavsar and Mahesh\u00a0H Panchal. 2012. A review on support vector machine for data classification. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 1 10 (2012) 185\u2013189."},{"key":"e_1_3_3_1_6_2","unstructured":"Battista Biggio Blaine Nelson and Pavel Laskov. 2013. Poisoning Attacks against Support Vector Machines. arxiv:https:\/\/arXiv.org\/abs\/1206.6389\u00a0[cs.LG]"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","unstructured":"Mausam Bindhani Bikash Behera and Prasanta Panigrahi. 2020. Hand Written Digit Recognition Using Quantum Support Vector Machine. 10.13140\/RG.2.2.36253.74727","DOI":"10.13140\/RG.2.2.36253.74727"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","unstructured":"Sanjay Misra Victor Chukwudi Osamor Luis Fernandez-Sanz Blessing\u00a0Guembe Ambrose\u00a0Azeta and Vera Pospelova. 2022. The Emerging Threat of Ai-driven Cyber Attacks: A Review. Applied Artificial Intelligence 36 1 (2022) 2037254. 10.1080\/08839514.2022.2037254","DOI":"10.1080\/08839514.2022.2037254"},{"key":"e_1_3_3_1_9_2","unstructured":"Miriana Calvano Antonio Curci Rosa Lanzilotti and Antonio Piccinno. 2024. Symbiotic AI: What is the Role of Trustworthiness? CEUR Workshop Proceedings 3762 (2024) 77 \u2013 82."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Li Deng. 2012. The mnist database of handwritten digit images for machine learning research. IEEE Signal Processing Magazine 29 6 (2012) 141\u2013142.","DOI":"10.1109\/MSP.2012.2211477"},{"key":"e_1_3_3_1_11_2","unstructured":"Jennifer Faj Ivy Peng Jacob Wahlgren and Stefano Markidis. 2023. Quantum Computer Simulations at Warp Speed: Assessing the Impact of GPU Acceleration. arxiv:https:\/\/arXiv.org\/abs\/2307.14860\u00a0[cs.PF]"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Julien Gacon Christa Zoufal Giuseppe Carleo and Stefan Woerner. 2021. Simultaneous perturbation stochastic approximation of the quantum fisher information. Quantum 5 (2021) 567.","DOI":"10.22331\/q-2021-10-20-567"},{"key":"e_1_3_3_1_13_2","unstructured":"Jay Gambetta. 2020. IBM\u2019s roadmap for scaling quantum technology. IBM Research Blog (September 2020) (2020)."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Gian Gentinetta Arne Thomsen David Sutter and Stefan Woerner. 2024. The complexity of quantum support vector machines. Quantum 8 (2024) 1225.","DOI":"10.22331\/q-2024-01-11-1225"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Konstantinos Georgopoulos Clive Emary and Paolo Zuliani. 2021. Modeling and simulating the noisy behavior of near-term quantum computers. Physical Review A 104 6 (2021) 062432.","DOI":"10.1103\/PhysRevA.104.062432"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Vojt\u011bch Havl\u00ed\u010dek Antonio\u00a0D C\u00f3rcoles Kristan Temme Aram\u00a0W Harrow Abhinav Kandala Jerry\u00a0M Chow and Jay\u00a0M Gambetta. 2019. Supervised learning with quantum-enhanced feature spaces. Nature 567 7747 (2019) 209\u2013212.","DOI":"10.1038\/s41586-019-0980-2"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Jian hua Li. 2018. Cyber security meets artificial intelligence: a survey. Frontiers of Information Technology & Electronic Engineering 19 (2018) 1462\u20131474. https:\/\/api.semanticscholar.org\/CorpusID:57765528","DOI":"10.1631\/FITEE.1800573"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","unstructured":"R. Laishram and V. Phoha. 2016. Curie: a method for protecting svm classifier from poisoning attack. (2016). 10.48550\/arxiv.1606.01584","DOI":"10.48550\/arxiv.1606.01584"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","unstructured":"Y. Ma K. Jun L. Li and X. Zhu. 2018. Data poisoning attacks in contextual bandits. (2018) 186\u2013204. 10.1007\/978-3-030-01554-111","DOI":"10.1007\/978-3-030-01554-111"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","unstructured":"Masanao Ozawa. 2003. Universally valid reformulation of the Heisenberg uncertainty principle on noise and disturbance in measurement. Physical Review A 67 4 (April 2003). 10.1103\/physreva.67.042105","DOI":"10.1103\/physreva.67.042105"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3617570.3617867"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","unstructured":"E. Quiring and K. Rieck. 2020. Backdooring and poisoning neural networks with image-scaling attacks. (2020). 10.48550\/arxiv.2003.08633","DOI":"10.48550\/arxiv.2003.08633"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Salonik Resch and Ulya\u00a0R Karpuzcu. 2021. Benchmarking quantum computers and the impact of quantum noise. Comput. Surveys 54 7 (2021) 1\u201335.","DOI":"10.1145\/3464420"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Ulrich Schollw\u00f6ck. 2011. The density-matrix renormalization group in the age of matrix product states. Annals of Physics 326 1 (Jan. 2011) 96\u2013192.","DOI":"10.1016\/j.aop.2010.09.012"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","unstructured":"Manuel\u00a0A. Serrano Luis\u00a0E. S\u00e1nchez Antonio Santos-Olmo David Garc\u00eda-Rosado Carlos Blanco Vita\u00a0Santa Barletta Danilo Caivano and Eduardo Fern\u00e1ndez-Medina. 2024. Minimizing incident response time in real-world scenarios using quantum computing. Software Quality Journal 32 1 (2024) 163\u2013192. 10.1007\/s11219-023-09632-6","DOI":"10.1007\/s11219-023-09632-6"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273598"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","unstructured":"V. Shejwalkar and A. Houmansadr. 2021. Manipulating the byzantine: optimizing model poisoning attacks and defenses for federated learning. (2021). 10.14722\/ndss.2021.24498","DOI":"10.14722\/ndss.2021.24498"},{"key":"e_1_3_3_1_28_2","unstructured":"Gurmohan Singh Manjit Kaur Mandeep Singh and Yadwinder Kumar. 2022. Implementation of quantum support vector machine algorithm using a benchmarking dataset. Indian Journal of Pure & Applied Physics (IJPAP) 60 5 (2022)."},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","unstructured":"G. Sun Y. Cong J. Dong Q. Wang L. Lyu and J. Liu. 2022. Data poisoning attacks on federated machine learning. Ieee Internet of Things Journal 9 (2022) 11365\u201311375. Issue 13. 10.1109\/jiot.2021.3128646","DOI":"10.1109\/jiot.2021.3128646"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"crossref","unstructured":"Guifr\u00e9 Vidal. 2003. Efficient Classical Simulation of Slightly Entangled Quantum Computations. Physical Review Letters 91 14 (Oct. 2003).","DOI":"10.1103\/PhysRevLett.91.147902"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS53863.2021.00015"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","unstructured":"H. Yang D. Gu and J. He. 2024. A robust and efficient federated learning algorithm against adaptive model poisoning attacks. Ieee Internet of Things Journal 11 (2024) 16289\u201316302. Issue 9. 10.1109\/jiot.2024.3351371","DOI":"10.1109\/jiot.2024.3351371"}],"event":{"name":"EASE Companion '25: Evaluation and Assessment in Software Engineering","acronym":"EASE Companion '25","location":"Istanbul Turkiye"},"container-title":["Proceedings of the 2025 29th International Conference on Evaluation and Assessment in Software Engineering Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3727967.3756822","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T12:07:32Z","timestamp":1766491652000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3727967.3756822"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":31,"alternative-id":["10.1145\/3727967.3756822","10.1145\/3727967"],"URL":"https:\/\/doi.org\/10.1145\/3727967.3756822","relation":{},"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"2025-12-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}