{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T05:05:31Z","timestamp":1666674331204},"reference-count":34,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"2","license":[{"start":{"date-parts":[[2022,3,24]],"date-time":"2022-03-24T00:00:00Z","timestamp":1648080000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,3,24]],"date-time":"2022-03-24T00:00:00Z","timestamp":1648080000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Universit\u00e4tsgesellschaft Potsdam e.V."}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wirtsch Inform Manag"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1365\/s35764-022-00395-6","type":"journal-article","created":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T03:02:35Z","timestamp":1648177355000},"page":"144-152","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Sicherheit von Quantum Machine Learning"],"prefix":"10.1365","volume":"14","author":[{"given":"Eldar","family":"Sultanow","sequence":"first","affiliation":[]},{"given":"Christian","family":"Bauckhage","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Knopf","sequence":"additional","affiliation":[]},{"given":"Nico","family":"Piatkowski","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2022,3,24]]},"reference":[{"key":"395_CR1","unstructured":"Morgan, S. \u201cGlobal cybercrime damages predicted to reach  trillion annually by 2021,\u201d Cybersecurity ventures. https:\/\/cybersecurityventures.com\/annual-cybercrime-report-2020\/ (Erstellt: 26. Okt. 2020). Zugegriffen: 28. Feb. 2022."},{"key":"395_CR2","doi-asserted-by":"publisher","DOI":"10.1145\/3309074.3309092","volume-title":"Applications of machine learning in cryptography: a survey","author":"MM Alani","year":"2019","unstructured":"Alani, M.\u202fM. (2019). Applications of machine learning in cryptography: a survey. ICCSP \u201919. : Association for Computing Machinery."},{"key":"395_CR3","doi-asserted-by":"crossref","unstructured":"Liu, W., Huang, P., Peng, J., Fan, J., & Zeng, G. (2018). Integrating machine learning to achieve an automatic parameter prediction for practical continuous-variable quantum key distribution. Physical Review\u00a0A, 97. https:\/\/doi.org\/10.1103\/PhysRevA.97.022316","DOI":"10.1103\/PhysRevA.97.022316"},{"key":"395_CR4","doi-asserted-by":"crossref","unstructured":"Lau, H.-K, & Lo, H.-K. (2011). Insecurity of position-based quantum-cryptography protocols against entanglement attacks. Physical Review\u00a0A. https:\/\/doi.org\/10.1103\/PhysRevA.83.012322","DOI":"10.1103\/PhysRevA.83.012322"},{"key":"395_CR5","doi-asserted-by":"crossref","unstructured":"Beigi, R.\u202fK.\u202fS. (2011). Simplified instantaneous non-local quantum. New Journal of Physics. https:\/\/doi.org\/10.1088\/1367-2630\/13\/9\/093036","DOI":"10.1088\/1367-2630\/13\/9\/093036"},{"key":"395_CR6","doi-asserted-by":"crossref","unstructured":"Bykovsky, A.\u202fY. (2021). Multiple-valued logic and neural network in the position-based cryptography scheme. Journal of Russian Laser Research. https:\/\/doi.org\/10.1007\/s10946-021-10000-7","DOI":"10.1007\/s10946-021-10000-7"},{"key":"395_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34500-5_75","volume-title":"Neuro-cryptanalysis of des and triple-des","author":"MM Alani","year":"2012","unstructured":"Alani, M.\u202fM. (2012). Neuro-cryptanalysis of des and triple-des. International Conference on Neural Information Processing."},{"key":"395_CR8","volume-title":"Algorithms for quantum computation: discrete logarithms and factoring","author":"P Shor","year":"1994","unstructured":"Shor, P. (1994). Algorithms for quantum computation: discrete logarithms and factoring. Proc. Annual Symp. on Foundations of Computer Science."},{"key":"395_CR9","doi-asserted-by":"crossref","unstructured":"Keplinger, K. (2018). Is quantum computing becoming relevant to cyber-security? Network Security, 16\u201319. https:\/\/doi.org\/10.1016\/S1353-4858(18)30090-4","DOI":"10.1016\/S1353-4858(18)30090-4"},{"key":"395_CR10","unstructured":"Galer, S. (2020). Quantencomputer bedrohen die Unbezwingbarkeit von Blockchains. https:\/\/news.sap.com\/germany\/2020\/06\/quantencomputer-blockchain\/ Zugegriffen: 28. Feb. 2022."},{"key":"395_CR11","unstructured":"Krempl, S. (2021). \u201eAbh\u00f6rsicher: Erste quantengesicherte Videokonferenz zwischen Bundesbeh\u00f6rden,\u201c Heise online. https:\/\/www.heise.de\/news\/Abhoersicher-Erste-quantengesicherte-Videokonferenz-zwischen-Bundesbehoerden-6159925.html Zugegriffen: 28. Feb. 2022"},{"key":"395_CR12","doi-asserted-by":"crossref","unstructured":"Yiyu Mao, Wenti Huang, Hai Zhong, Yijun Wang, Hao Qin, Ying Guo, Duan Huang (2020). Detecting quantum attacks: a machine learning based defense strategy for practical continuous-variable quantum key distribution. New Journal of Physics. https:\/\/iopscience.iop.org\/article\/10.1088\/1367-2630\/aba8d4","DOI":"10.1088\/1367-2630\/aba8d4"},{"key":"395_CR13","volume-title":"Machine learning techniques for detecting attackers during quantum key distribution in IoT networks with application to railway scenarios","author":"\u201c Al-Mohammed","year":"2020","unstructured":"Al-Mohammed, , et al. (2020). Machine learning techniques for detecting attackers during quantum key distribution in IoT networks with application to railway scenarios. IEEE Access."},{"key":"395_CR14","unstructured":"N. I. o. S.\u202fa. Technology (2020). NIST\u2019s post-quantum cryptography program enters \u2018selection round\u2019. https:\/\/www.nist.gov\/news-events\/news\/2020\/07\/nists-post-quantum-cryptography-program-enters-selection-round Zugegriffen: 28. Feb. 2022."},{"key":"395_CR15","unstructured":"Gast, R. \u201e\u00dcberlegenheit der Quanten: F\u00fcnf Fragen zu Googles Quantencomputer,\u201c Spektrum.de. https:\/\/www.spektrum.de\/news\/ueberlegenheit-der-quanten-fuenf-fragen-zu-googles-quantencomputer\/1681398 (Erstellt: 23. Okt. 2019). Zugegriffen: 28. Feb. 2022."},{"key":"395_CR16","doi-asserted-by":"crossref","unstructured":"Arute, F. (2019). Quantum supremacy using a\u00a0programmable superconducting processor. Nature. https:\/\/doi.org\/10.1038\/s41586-019-1666-5","DOI":"10.1038\/s41586-019-1666-5"},{"key":"395_CR17","doi-asserted-by":"crossref","unstructured":"Lee, Y., Joo, J., & Lee, S. (2019). Hybrid quantum linear equation algorithm and its experimental test on IBM Quantum Experience. Scientific Reports. https:\/\/doi.org\/10.1038\/s41598-019-41324-9","DOI":"10.1038\/s41598-019-41324-9"},{"key":"395_CR18","volume-title":"Quantum machine learning","author":"P Wittek","year":"2014","unstructured":"Wittek, P. (2014). Supervised learning and support vector machines. In Quantum machine learning. : Academic Press."},{"key":"395_CR19","doi-asserted-by":"crossref","unstructured":"Rebentrost, P., Mohseni, M., & Lloyd, S. (2014). Quantum support vector machine for big data classification. Physical Review Letters. https:\/\/doi.org\/10.1103\/PhysRevLett.113.130503","DOI":"10.1103\/PhysRevLett.113.130503"},{"key":"395_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/AFRCON.2017.8095692","volume-title":"Privacy-preserving quantum machine learning using differential privacy","author":"M Senekane","year":"2017","unstructured":"Senekane, M., Mafu, M., & Taele, B. (2017). Privacy-preserving quantum machine learning using differential privacy. 2017 IEEE AFRICON."},{"key":"395_CR21","unstructured":"GPT-3 A robot wrote this entire article. Are you scared yet, human. https:\/\/www.theguardian.com\/commentisfree\/2020\/sep\/08\/robot-wrote-this-article-gpt-3 (Erstellt: 8. Sept. 2020). Zugegriffen: 28. Feb. 2022."},{"key":"395_CR22","doi-asserted-by":"crossref","unstructured":"Bosnjak, Z., Grljevic, O., & Bosnjak, S. CRISP-DM as a\u00a0framework for discovering knowledge in small and medium sized enterprises. SACI 2009. Published 28 May 2009.","DOI":"10.1109\/SACI.2009.5136302"},{"key":"395_CR23","doi-asserted-by":"crossref","unstructured":"Wang, X., Li, J., Kuang, X., Tan, Y.-A., & Li, J. (2019). The security of machine learning in an adversarial setting: a survey. Journal of Parallel and Distributed Computing. https:\/\/doi.org\/10.1016\/j.jpdc.2019.03.003","DOI":"10.1016\/j.jpdc.2019.03.003"},{"key":"395_CR24","volume-title":"Adversarial machine learning","author":"L Huang","year":"2011","unstructured":"Huang, L., Joseph, A.\u202fD., Nelson, B., Rubinstein, B.\u202fI.\u202fP., & Tygar, J.\u202fD. (2011). Adversarial machine learning. Proceedings of 4th ACM Workshop on Artificial Intelligence and Security."},{"key":"395_CR25","unstructured":"Bursztein, E. (2018). Attacks against machine learning\u2014an overview. https:\/\/elie.net\/blog\/ai\/attacks-against-machine-learning-an-overview Zugegriffen: 28. Feb. 2022."},{"key":"395_CR26","volume-title":"Stealing machine learning models","author":"F Tram\u00e8r","year":"2016","unstructured":"Tram\u00e8r, F., Zhang, F., Juels, A., Reiter, M.\u202fK., & Ristenpart, T. (2016). Stealing machine learning models. USENIX Security Symposium."},{"key":"395_CR27","doi-asserted-by":"crossref","unstructured":"Biggio, B., & Roli, F. (2018). Wild patterns: ten years after the rise of adversarial machine learning. Pattern Recognition. https:\/\/doi.org\/10.1016\/j.patcog.2018.07.023","DOI":"10.1145\/3243734.3264418"},{"key":"395_CR28","doi-asserted-by":"crossref","unstructured":"Lu, S., Duan, L.-M., & Deng, D.-L. (2020). Quantum adversarial machine learning. Phys. Rev. Research. https:\/\/doi.org\/10.1103\/PhysRevResearch.2.033212","DOI":"10.1103\/PhysRevResearch.2.033212"},{"key":"395_CR29","doi-asserted-by":"crossref","unstructured":"Liu, N., & Wittek, P. (2020). Vulnerability of quantum classification to adversarial perturbations. Phys. Rev.\u00a0A, 101. https:\/\/doi.org\/10.1103\/PhysRevA.101.062331","DOI":"10.1103\/PhysRevA.101.062331"},{"key":"395_CR30","doi-asserted-by":"crossref","unstructured":"Liao, H., Convy, I., Huggins, W.\u202fJ., & Whaley, K.\u202fB. (2021). Robust in practice: Adversarial attacks on quantum machine learning. Physical Review\u00a0A. https:\/\/doi.org\/10.1103\/PhysRevA.103.042427","DOI":"10.1103\/PhysRevA.103.042427"},{"key":"395_CR31","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/aae71a","volume-title":"Hardening quantum machine learning against adversaries","author":"N Wiebe","year":"2018","unstructured":"Wiebe, N., & Kumar, R.\u202fS.\u202fS. (2018). Hardening quantum machine learning against adversaries"},{"key":"395_CR32","doi-asserted-by":"crossref","unstructured":"Bang, J., Lee, S.-W., & Jeong, H. (2015). Protocol for secure quantum machine learning at a\u00a0distant place. Quantum Information Processing. https:\/\/doi.org\/10.1007\/s11128-015-1089-7","DOI":"10.1007\/s11128-015-1089-7"},{"key":"395_CR33","unstructured":"IBM (2021). Real quantum computers. https:\/\/quantum-computing.ibm.com\/ Zugegriffen: 28. Feb. 2022."},{"key":"395_CR34","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824","volume-title":"Can machine learning be secure?","author":"M Barreno","year":"2006","unstructured":"Barreno, M., Nelson, B., Sears, R., Joseph, A.\u202fD., & Tygar, J.\u202fD. (2006). Can machine learning be secure? ASIACCS\u201906."}],"container-title":["Wirtschaftsinformatik &amp; Management"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s35764-022-00395-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1365\/s35764-022-00395-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s35764-022-00395-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,24]],"date-time":"2022-10-24T13:23:56Z","timestamp":1666617836000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1365\/s35764-022-00395-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,24]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["395"],"URL":"https:\/\/doi.org\/10.1365\/s35764-022-00395-6","relation":{},"ISSN":["1867-5905","1867-5913"],"issn-type":[{"value":"1867-5905","type":"print"},{"value":"1867-5913","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,24]]},"assertion":[{"value":"4 January 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}