{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:58:38Z","timestamp":1760147918844,"version":"build-2065373602"},"reference-count":45,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T00:00:00Z","timestamp":1678752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National College Innovation Project","award":["2022105330245"],"award-info":[{"award-number":["2022105330245"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>There exist various attack strategies in continuous-variable quantum key distribution (CVQKD) system in practice. Due to the powerful information processing ability of neural networks, they are applied to the detection and classification of attack strategies in CVQKD systems. However, neural networks are vulnerable to adversarial attacks, resulting in the CVQKD system using neural networks also having security risks. To solve this problem, we propose a defense scheme for the CVQKD system. We first perform low-rank dimensionality reduction on the CVQKD system data through regularized self-representation-locality preserving projects (RSR-LPP) to filter out some adversarial disturbances, and then perform sparse coding reconstruction through dictionary learning to add data details and filter residual adversarial disturbances. We test the proposed defense algorithm in the CVQKD system. The results indicate that our proposed scheme has a good monitoring and alarm effect on CVQKD adversarial disturbances and has a better effect than other compared defense algorithms.<\/jats:p>","DOI":"10.3390\/e25030499","type":"journal-article","created":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T06:14:58Z","timestamp":1678774498000},"page":"499","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Dictionary Learning Based Scheme for Adversarial Defense in Continuous-Variable Quantum Key Distribution"],"prefix":"10.3390","volume":"25","author":[{"given":"Shimiao","family":"Li","sequence":"first","affiliation":[{"name":"School of Physics and Electronics, Central South University, Changsha 410017, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2062-3160","authenticated-orcid":false,"given":"Pengzhi","family":"Yin","sequence":"additional","affiliation":[{"name":"School of Automation, Central South University, Changsha 410017, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5485-5600","authenticated-orcid":false,"given":"Zehao","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Computer Science, Central South University, Changsha 410017, China"}]},{"given":"Jianheng","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Central South University, Changsha 410017, China"}]},{"given":"Duan","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Central South University, Changsha 410017, China"}]},{"given":"Ling","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Automation, Central South University, Changsha 410017, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,3,14]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","article-title":"The security of practicalquantum key distribution","volume":"81","author":"Scarani","year":"2009","journal-title":"Rev. Mod. Phys."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"032611","DOI":"10.1103\/PhysRevA.103.032611","article-title":"Practical security of a chip-based continuous-variable quantum-key-distribution system","volume":"103","author":"Li","year":"2021","journal-title":"Phys. Rev. A"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1038\/nphoton.2013.63","article-title":"Experimental demonstration of long-distance continuous-variable quantum key distribution","volume":"7","author":"Jouguet","year":"2013","journal-title":"Nat. Photon."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"eaaz4487","DOI":"10.1126\/sciadv.aaz4487","article-title":"Quantum key distribution with correlated sources","volume":"6","author":"Pereira","year":"2020","journal-title":"Sci. Adv."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"772","DOI":"10.1038\/nphoton.2015.206","article-title":"Discrete and continuous variables for measurement-device-independent quantum cryptography","volume":"9","author":"Xu","year":"2015","journal-title":"Nat. Photonics"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Li, Y., Wang, Y., Mao, Y., Peng, W., Jin, D., and Guo, Y. (2021). Continuous-Variable Quantum Key Distribution Based on Heralded Hybrid Linear Amplifier with a Local Local Oscillator. Entropy, 23.","DOI":"10.3390\/e23111395"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1103\/RevModPhys.84.621","article-title":"Gaussian quantum information","volume":"84","author":"Weedbrook","year":"2012","journal-title":"Rev. Mod. Phys."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"070501","DOI":"10.1103\/PhysRevLett.114.070501","article-title":"Composable Security Proof for Continuous-Variable Quantum Key Distribution with Coherent States","volume":"114","author":"Leverrier","year":"2015","journal-title":"Phys. Rev. Lett."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"062343","DOI":"10.1103\/PhysRevA.81.062343","article-title":"Finite-size analysis of a continuous-variable quantum key distribution","volume":"81","author":"Leverrier","year":"2010","journal-title":"Phys. Rev. A"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"14486","DOI":"10.1364\/OE.420583","article-title":"Continuous-variable quantum key distribution coexisting with classical signals on few-mode fiber","volume":"29","author":"Zhong","year":"2021","journal-title":"Opt. Express"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1012","DOI":"10.1364\/AOP.361502","article-title":"Advances in quantum cryptography","volume":"12","author":"Pirandola","year":"2020","journal-title":"Adv. Opt. Photon."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","article-title":"Quantum cryptography: Public key distribution and coin tossing","volume":"560","author":"Bennett","year":"2014","journal-title":"Theor. Comput. Sci."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"042333","DOI":"10.1103\/PhysRevA.78.042333","article-title":"Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems","volume":"78","author":"Zhao","year":"2008","journal-title":"Phys. Rev. A"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"022313","DOI":"10.1103\/PhysRevA.74.022313","article-title":"Effects of detector efficiency mismatch on security of quantum cryptosystems","volume":"74","author":"Makarov","year":"2006","journal-title":"Phys. Rev. A."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"110501","DOI":"10.1103\/PhysRevLett.107.110501","article-title":"Device calibration impacts security of quantum key distribution","volume":"107","author":"Jain","year":"2011","journal-title":"Phys. Rev. Lett."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"075006","DOI":"10.1088\/1367-2630\/11\/7\/075006","article-title":"Decoy-state quantum key distribution with both source errors and statistical fluctuations","volume":"11","author":"Wang","year":"2009","journal-title":"New J. Phys."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Huang, D., Liu, S., and Zhang, L. (2021). Secure Continuous-Variable Quantum Key Distribution with Machine Learning. Phtonics, 8.","DOI":"10.3390\/photonics8110511"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"062329","DOI":"10.1103\/PhysRevA.87.062329","article-title":"Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack","volume":"87","author":"Huang","year":"2013","journal-title":"Phys. Rev. A"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"19201","DOI":"10.1038\/srep19201","article-title":"Long-distance continuous-variable quantum key distribution by controlling excess noise","volume":"6","author":"Huang","year":"2016","journal-title":"Sci. Rep."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"083073","DOI":"10.1088\/1367-2630\/aba8d4","article-title":"Detecting quantum attacks: A machine learning based defense strategy for practical continuous-variable quantum key distribution","volume":"22","author":"Mao","year":"2020","journal-title":"New J. Phys."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"042411","DOI":"10.1103\/PhysRevA.105.042411","article-title":"Beyond universal attack detection for continuous-variable quantum key distribution via deep learning","volume":"105","author":"Luo","year":"2022","journal-title":"Phys. Rev. A"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Li, H., Xu, X., Zhang, X., Yang, S., and Li, B. (2020, January 13\u201319). Qeba: Queryefficient boundary-based blackbox attack. Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00130"},{"key":"ref_23","unstructured":"Liu, Y., Chen, X., Liu, C., and Song, D. (2017). Delving into transferable adversarial examples and black-box attacks. arXiv."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TEVC.2010.2059031","article-title":"Differential evolution: A survey of the state-of-the-art","volume":"15","author":"Das","year":"2011","journal-title":"IEEE Trans. Evol. Comput."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Duan, R., Ma, X., Wang, Y., Bailey, J., Qin, A.K., and Yang, Y. (2020, January 13\u201319). Adversarial camouflage: Hiding physical-world attacks with natural styles. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00108"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Li, Y., and Liu, S. (2023). The Threat of Adversarial Attack on a COVID-19 CT Image-Based Deep Learning System. Bioengineering, 10.","DOI":"10.3390\/bioengineering10020194"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Guo, Y., Yin, P., and Huang, D. (2023). One-Pixel Attack for Continuous-Variable Quantum Key Distribution Systems. Photonics, 10.","DOI":"10.3390\/photonics10020129"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.patrec.2021.03.011","article-title":"Adversarial robustness via attention transfer","volume":"146","author":"Li","year":"2021","journal-title":"Pattern Recognit. Lett."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"2805","DOI":"10.1109\/TNNLS.2018.2886017","article-title":"Adversarial examples: Attacks and defenses for deep learning","volume":"30","author":"Yuan","year":"2019","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","article-title":"One pixel attack for fooling deep neural networks","volume":"23","author":"Su","year":"2019","journal-title":"IEEE Trans. Evol. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"052302","DOI":"10.1103\/PhysRevA.95.052302","article-title":"Robust continuous-variable quantum key distribution against practical attacks","volume":"95","author":"Huang","year":"2017","journal-title":"Phys. Rev. A"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1088\/1674-1056\/ac2807","article-title":"Parameter estimation of continuous variable quantum key distribution system via artificial neural networks","volume":"31","author":"Luo","year":"2022","journal-title":"Chin. Phys. B"},{"key":"ref_33","first-page":"100224","article-title":"Study on artifificial intelligence: The state of the art and future prospects","volume":"23","author":"Zhang","year":"2021","journal-title":"J. Ind. Inf. Integr."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Maqsood, H., Maqsood, M., Yasmin, S., Mehmood, I., Moon, J., and Rho, S. (2022). Analyzing the Stock Exchange Markets of EU Nations: A Case Study of Brexit Social Media Sentiment. Systems, 10.","DOI":"10.3390\/systems10020024"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Madokoro, H., Yamamoto, S., Nishimura, Y., Nix, S., Woo, H., and Sato, K. (2021). Prototype Development of Small Mobile Robots for Mallard Navigation in Paddy Fields: Toward Realizing Remote Farming. Robotics, 10.","DOI":"10.3390\/robotics10020063"},{"key":"ref_36","unstructured":"Goodfellow, I.J., Shlens, J., and Szegedy, C. (2014). Explaining and Harnessing Adversarial Examples. arXiv."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Moosavidezfooli, S., Fawzi, A., and Frossard, P. (2016, January 27\u201330). Deepfool: A Simple and Accurate Method to Fool Deep Neural Networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Zheng, S., Song, Y., and Leung, T. (2016, January 27\u201330). Improving the robustness of deep neural networks via stability training. Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.485"},{"key":"ref_39","unstructured":"Metzen, J.H., Genewein, T., and Fischer, V. (2017, January 24\u201326). On detecting adversarial perturbations. Proceedings of the 5th International Conference on Learning Representations, Toulon, France."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Zantedeschi, V., Nicolae, M.I., and Rawat, A. (2017, January 3). Efficient defenses against adversarial attacks. Proceedings of the 10th ACM Workshop on Artificial, Intelligence and Security, Dallas, TX, USA.","DOI":"10.1145\/3128572.3140449"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Ross, A.S., and Doshi-Velez, F. (2018, January 2\u20137). Improving the adversarial robustness and interpretability of deep neural networks by regularizing their input gradients. Proceedings of the 2018 AAAI Conference on Artificial Intelligence, New Orleans, LA, USA.","DOI":"10.1609\/aaai.v32i1.11504"},{"key":"ref_42","unstructured":"Samangouei, P., Kabkab, M., and Chellappa, R. (May, January 30). Defense GAN: Protecting classifiers against adversarial attacks using generative models. Proceedings of the 6th International Conference on Learning Representations, Vancouver, BC, Canada."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Xu, W.L., Evans, D., and Qi, Y.J. (2018, January 18\u201321). Feature squeezing: Detecting adversarial examples in deep neural networks. Proceedings of the 25th Annual Network and Distributed System Security Symposium NDSS, San Diego, CA, USA.","DOI":"10.14722\/ndss.2018.23198"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"2651","DOI":"10.1109\/TPAMI.2013.88","article-title":"Label consistent k-svd: Learning a discriminative dictionary for recognition","volume":"35","author":"Jiang","year":"2013","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_45","first-page":"1","article-title":"Adaptive multimode process monitoring based on modematching and similarity-preserving dictionary learning","volume":"1","author":"Huang","year":"2022","journal-title":"IEEE Trans. Cybern."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/3\/499\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:54:34Z","timestamp":1760122474000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/3\/499"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,14]]},"references-count":45,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,3]]}},"alternative-id":["e25030499"],"URL":"https:\/\/doi.org\/10.3390\/e25030499","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2023,3,14]]}}}