EPJ Quantum Technology最新文献

筛选
英文 中文
Quantum algorithm for polynomial multiplication and its applications 多项式乘法的量子算法及其应用
IF 5.6 2区 物理与天体物理
EPJ Quantum Technology Pub Date : 2025-10-15 DOI: 10.1140/epjqt/s40507-025-00423-5
Shang Gao, Rui-Chen Huang, Bing-Xin Liu, Zhen-Wen Cheng, Hong-Lin Xie, Zhong-Xiang Zhang, Zhao-Qian Zhang, Guang-Bao Xu, Yu-Guang Yang
{"title":"Quantum algorithm for polynomial multiplication and its applications","authors":"Shang Gao,&nbsp;Rui-Chen Huang,&nbsp;Bing-Xin Liu,&nbsp;Zhen-Wen Cheng,&nbsp;Hong-Lin Xie,&nbsp;Zhong-Xiang Zhang,&nbsp;Zhao-Qian Zhang,&nbsp;Guang-Bao Xu,&nbsp;Yu-Guang Yang","doi":"10.1140/epjqt/s40507-025-00423-5","DOIUrl":"10.1140/epjqt/s40507-025-00423-5","url":null,"abstract":"<div><p>Polynomial multiplication is a fundamental operation in various fields of science and engineering. This paper proposes a quantum algorithm for polynomial multiplication that achieves improved efficiency over classical approaches. The core innovation is the use of a quantum Fourier transform with digital encoding. The practical utility and versatility of this algorithm are highlighted through its application to several related computational problems, including string matching, Toeplitz matrix-vector multiplication, and matrix decomposition algorithm. Furthermore, an enhanced version of the quantum polynomial multiplication algorithm is introduced, offering improvements in both execution process and time complexity.</p></div>","PeriodicalId":547,"journal":{"name":"EPJ Quantum Technology","volume":"12 1","pages":""},"PeriodicalIF":5.6,"publicationDate":"2025-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://epjquantumtechnology.springeropen.com/counter/pdf/10.1140/epjqt/s40507-025-00423-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145315755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robustness of continuous variable quantum key distribution under strong polarization drift 强极化漂移下连续可变量子密钥分布的鲁棒性
IF 5.6 2区 物理与天体物理
EPJ Quantum Technology Pub Date : 2025-10-15 DOI: 10.1140/epjqt/s40507-025-00417-3
Margarida Almeida, Armando N. Pinto, Nuno A. Silva
{"title":"Robustness of continuous variable quantum key distribution under strong polarization drift","authors":"Margarida Almeida,&nbsp;Armando N. Pinto,&nbsp;Nuno A. Silva","doi":"10.1140/epjqt/s40507-025-00417-3","DOIUrl":"10.1140/epjqt/s40507-025-00417-3","url":null,"abstract":"<div><p>The practical deployment of Continuous Variables Quantum Key Distribution (CV-QKD) systems benefits from existing optical fiber telecommunication infrastructures. However, optical fibers introduce random variations in the state of polarization, which degrades the system’s performance. We consider a CV-QKD system featuring a polarization diversity heterodyne receiver and the constant modulus algorithm (CMA) to compensate for the polarization drifts in the quantum channel. Our setup can effectively realign Alice’s quantum signal with Bob’s local oscillator for polarization drift variances below 10<sup>−10</sup>. This value is compatible with most experimental implementations, allowing for accurate estimation of the channel transmission and excess noise parameters. Our results establish operational limits for passive polarization drift compensation using a polarization diversity receiver combined with digital CMA, validating its use to compensate for the polarization drift in real-world implementations approximating the ideal scenario of no polarization drift, for polarization drift variances below 10<sup>−10</sup>. This enables long-term stability in CV-QKD systems, eliminating the need for active polarization controllers and manual adjustments.</p></div>","PeriodicalId":547,"journal":{"name":"EPJ Quantum Technology","volume":"12 1","pages":""},"PeriodicalIF":5.6,"publicationDate":"2025-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://epjquantumtechnology.springeropen.com/counter/pdf/10.1140/epjqt/s40507-025-00417-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145315748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stacking the odds: full-stack quantum system design space exploration 叠加概率:全栈量子系统设计空间探索
IF 5.6 2区 物理与天体物理
EPJ Quantum Technology Pub Date : 2025-10-02 DOI: 10.1140/epjqt/s40507-025-00413-7
Hila Safi, Medina Bandic, Christoph Niedermeier, Carmen G. Almudever, Sebastian Feld, Wolfgang Mauerer
{"title":"Stacking the odds: full-stack quantum system design space exploration","authors":"Hila Safi,&nbsp;Medina Bandic,&nbsp;Christoph Niedermeier,&nbsp;Carmen G. Almudever,&nbsp;Sebastian Feld,&nbsp;Wolfgang Mauerer","doi":"10.1140/epjqt/s40507-025-00413-7","DOIUrl":"10.1140/epjqt/s40507-025-00413-7","url":null,"abstract":"<div><p>Design space exploration (DSE) plays an important role in optimising quantum circuit execution by systematically evaluating different configurations of compilation strategies and hardware settings. In this paper, we conduct a comprehensive investigation into the impact of various layout methods, qubit routing techniques, and optimisation levels, as well as device-specific properties such as different variants and strengths of noise and imperfections, the topological structure of qubits, connectivity densities, and back-end sizes. By spanning through these dimensions, we aim to understand the interplay between compilation choices and hardware characteristics. A key question driving our exploration is whether the optimal selection of device parameters, mapping techniques, comprising of initial layout strategies and routing heuristics can mitigate device induced errors beyond standard error mitigation approaches. Our results show that carefully selecting software strategies (<i>e.g.</i>, mapping and routing algorithms) and tailoring hardware characteristics (such as minimising noise and leveraging topology and connectivity density) significantly improve the fidelity of circuit execution outcomes, and thus the expected correctness or success probability of the computational result. We provide estimates based on key metrics such as circuit depth, gate count and expected fidelity. Our results highlight the importance of hardware–software co-design, particularly as quantum systems scale to larger dimensions, and along the way towards fully error corrected quantum systems: Our study is based on computationally noisy simulations, but considers various implementations of quantum error correction (QEC) using the same approach as for other algorithms. The observed sensitivity of circuit fidelity to noise and connectivity suggests that co-design principles will be equally critical when integrating QEC in future systems. Our exploration provides practical guidelines for co-optimising physical mapping, qubit routing, and hardware configurations in realistic quantum computing scenarios.</p></div>","PeriodicalId":547,"journal":{"name":"EPJ Quantum Technology","volume":"12 1","pages":""},"PeriodicalIF":5.6,"publicationDate":"2025-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://epjquantumtechnology.springeropen.com/counter/pdf/10.1140/epjqt/s40507-025-00413-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145210331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum-classical synergy: enhancing quantum generative adversarial networks for lmage synthesis 量子经典协同:增强图像合成的量子生成对抗网络
IF 5.6 2区 物理与天体物理
EPJ Quantum Technology Pub Date : 2025-09-29 DOI: 10.1140/epjqt/s40507-025-00418-2
QuanGong Ma, ChaoLong Hao, NianWen Si, Geng Chen, JiaLe Zhang, JiaYi Zhang, Xiao Han, Dan Qu
{"title":"Quantum-classical synergy: enhancing quantum generative adversarial networks for lmage synthesis","authors":"QuanGong Ma,&nbsp;ChaoLong Hao,&nbsp;NianWen Si,&nbsp;Geng Chen,&nbsp;JiaLe Zhang,&nbsp;JiaYi Zhang,&nbsp;Xiao Han,&nbsp;Dan Qu","doi":"10.1140/epjqt/s40507-025-00418-2","DOIUrl":"10.1140/epjqt/s40507-025-00418-2","url":null,"abstract":"<div><p>Quantum Generative Adversarial Networks (QGANs), as a rising paradigm in Quantum Machine Learning, have shown promising potential in image generation and processing. However, their output quality remains suboptimal, and existing research is largely limited to small-scale, proof-of-concept studies. In this work, we propose a hybrid quantum-classical GAN architecture, where the generator integrates parameterized quantum circuits (PQCs) and classical neural networks. This integration significantly enhances the visual quality of generated images. Our model leverages the complementary strengths of quantum and classical components and outperforms existing methods (Tsang et al. in IEEE Trans. Quantum Eng. 4:1–19, 2023; Gulrajani et al. in Proceedings of the 31st international conference on neural information processing systems. NIPS’17, Red Hook, pp. 5769–5779, 2017), particularly in terms of image fidelity. Experiments conducted on the MNIST family of datasets show that our hybrid approach achieves a 20.26% average reduction in Fréchet Inception Distance. Furthermore, it improves the Structural Similarity Index Measure, Cosine Similarity, and Peak Signal-to-Noise Ratio by 26.04%, 2.22%, and 7.62%, respectively. These results highlight the effectiveness of combining quantum computing with machine learning, and underscore the potential of hybrid quantum-classical models in advancing generative tasks.</p></div>","PeriodicalId":547,"journal":{"name":"EPJ Quantum Technology","volume":"12 1","pages":""},"PeriodicalIF":5.6,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://epjquantumtechnology.springeropen.com/counter/pdf/10.1140/epjqt/s40507-025-00418-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145210919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security analysis and improvements of semi-quantum summation models without measurement 无测量的半量子求和模型的安全性分析与改进
IF 5.6 2区 物理与天体物理
EPJ Quantum Technology Pub Date : 2025-09-29 DOI: 10.1140/epjqt/s40507-025-00416-4
Chia-Wei Tsai, Chun-Hsiang Wang, Chun-Wei Yang, Jason Lin
{"title":"Security analysis and improvements of semi-quantum summation models without measurement","authors":"Chia-Wei Tsai,&nbsp;Chun-Hsiang Wang,&nbsp;Chun-Wei Yang,&nbsp;Jason Lin","doi":"10.1140/epjqt/s40507-025-00416-4","DOIUrl":"10.1140/epjqt/s40507-025-00416-4","url":null,"abstract":"<div><p>Tian et al. (EPJ Quantum Technol 11(1):35, 2024) proposed three semi-quantum summation protocols that enable resource-limited participants to securely compute the sum of their private inputs with assistance from a semi-honest third party (TP). In these protocols, participants do not need quantum measurement devices to achieve secure computation. Although the protocols have been analyzed against common attacks to demonstrate their robustness, this study identifies two significant issues in Tian et al.’s work: a security loophole and a design flaw. The security loophole permits a malicious participant to steal another participant’s private input without detection, while the design flaw prevents participants from obtaining the correct summation result when the number of participants is odd. To address these issues, this study proposes improved semi-quantum summation protocols under the same assumptions and environment.</p></div>","PeriodicalId":547,"journal":{"name":"EPJ Quantum Technology","volume":"12 1","pages":""},"PeriodicalIF":5.6,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://epjquantumtechnology.springeropen.com/counter/pdf/10.1140/epjqt/s40507-025-00416-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145210920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post-quantum AES encryption using ECC points derived from BB84 sifted keys 后量子AES加密使用ECC点衍生自BB84筛选密钥
IF 5.6 2区 物理与天体物理
EPJ Quantum Technology Pub Date : 2025-09-29 DOI: 10.1140/epjqt/s40507-025-00411-9
M. Manimozhi, R. K. Mugelan
{"title":"Post-quantum AES encryption using ECC points derived from BB84 sifted keys","authors":"M. Manimozhi,&nbsp;R. K. Mugelan","doi":"10.1140/epjqt/s40507-025-00411-9","DOIUrl":"10.1140/epjqt/s40507-025-00411-9","url":null,"abstract":"<div><p>Generating a secure key and securely communicating it are crucial aspects for ensuring information security during encryption and decryption processes. Quantum Key Distribution (QKD) is a promising technique for enabling secure communication in Industrial Internet of Things (IIoT) applications. This paper presents an enhanced BB84 protocol integrated with Elliptic Curve Cryptography (ECC) that improves efficiency, security, and practical implementation. Our enhanced BB84 protocol employs a basis reconciliation mechanism and introduces a depolarizing channel model to simulate realistic noise conditions and eavesdropping detections. The system effectively identifies potential eavesdroppers based on Quantum Bit Error Rate (QBER) thresholds, thereby ensuring a secure key exchange process. Unlike traditional ECC implementations, our approach dynamically extracts prime numbers from a sifted key to generate elliptic curve parameters. The extracted key is used for AES encryption, providing an additional security layer for data confidentiality. The performance evaluation demonstrates efficient key generation and computational time, making this approach practical for IIoT environments. The experimental results indicate successful key generation and privacy amplification with a final key derived from the matched measurement bases. Elliptic curve generation successfully computes valid points supporting secure cryptographic operations. The estimated QBER ranged from 0.0 to 0.25, ensuring a secure key exchange. The AES encryption and decryption processes validate the usability of the generated key in real-world applications, confirming the robustness of our integrated QKD-ECC framework. The average key generation time ranged from 0.0000297 s, while the computational time was 0.0000714 s.</p></div>","PeriodicalId":547,"journal":{"name":"EPJ Quantum Technology","volume":"12 1","pages":""},"PeriodicalIF":5.6,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://epjquantumtechnology.springeropen.com/counter/pdf/10.1140/epjqt/s40507-025-00411-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145210921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A transferable quantum anonymous ranking protocol without third party 一个可转移的量子匿名排名协议,没有第三方
IF 5.6 2区 物理与天体物理
EPJ Quantum Technology Pub Date : 2025-09-29 DOI: 10.1140/epjqt/s40507-025-00422-6
Xinyue Mao, Huixin Sun, Jiuru Wang, Kejia Zhang, Baomin Zhou
{"title":"A transferable quantum anonymous ranking protocol without third party","authors":"Xinyue Mao,&nbsp;Huixin Sun,&nbsp;Jiuru Wang,&nbsp;Kejia Zhang,&nbsp;Baomin Zhou","doi":"10.1140/epjqt/s40507-025-00422-6","DOIUrl":"10.1140/epjqt/s40507-025-00422-6","url":null,"abstract":"<div><p>Quantum Anonymous Multi-party Ranking (QAMR) enables quantum ranking operations to be performed on private datasets while concealing associations between participants and their private data. However, most existing protocols rely on semi-honest third parties and require the use of a large number of quantum states to ensure identity anonymity. Furthermore, they lack transferability due to inadequate modular design. To address these issues, a novel QAMR protocol is proposed, which eliminates the need for semi-honest third parties for the first time. The protocol achieves reduced quantum resource consumption while ensuring transferability. Moreover, the protocol’s correctness is proven by theoretical analysis, and its feasibility is confirmed via IBM Qiskit simulations. A thorough security analysis shows that the protocol is resistant to collusion, entanglement-measurement, and intercept-resend attacks. Besides, the comparison shows that the suggested approach uses fewer quantum resources while processing datasets with wider distributions and higher limits.</p></div>","PeriodicalId":547,"journal":{"name":"EPJ Quantum Technology","volume":"12 1","pages":""},"PeriodicalIF":5.6,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://epjquantumtechnology.springeropen.com/counter/pdf/10.1140/epjqt/s40507-025-00422-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145210918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum optimization for multi-target Active Debris Removal missions 多目标主动碎片清除任务的量子优化
IF 5.6 2区 物理与天体物理
EPJ Quantum Technology Pub Date : 2025-09-29 DOI: 10.1140/epjqt/s40507-025-00409-3
Michele Gagliardi, Mattia Boggio, Deborah Volpe, Carlo Novara
{"title":"Quantum optimization for multi-target Active Debris Removal missions","authors":"Michele Gagliardi,&nbsp;Mattia Boggio,&nbsp;Deborah Volpe,&nbsp;Carlo Novara","doi":"10.1140/epjqt/s40507-025-00409-3","DOIUrl":"10.1140/epjqt/s40507-025-00409-3","url":null,"abstract":"<div><p>The rapid accumulation of space debris in Low Earth Orbit (LEO) poses a significant challenge to the sustainability of space operations. While preventive measures limit new debris generation, they are insufficient to mitigate the growing population of defunct satellites, rocket stages, and collision fragments. Active Debris Removal (ADR) has emerged as a viable solution, which requires solving NP-hard combinatorial optimization problem similar to the Traveling Salesman Problem (TSP) to maximize mission efficiency by minimizing fuel and mission duration. This work explores the application of Quantum Annealing (QA) and Hybrid Quantum Annealing (HQA) for optimizing multi-target ADR missions. Specifically, it introduces a Quadratic Unconstrained Binary Optimization (QUBO) model for ADR, exploiting quantum computing to enhance solution efficiency. A novel quadratization method is developed to reduce computational complexity, enabling large-scale mission planning. Additionally, a novel constraint-handling strategy is proposed, integrating mission constraints into post-processing to enhance quantum solver efficiency. The proposed approach is validated using real-world satellite debris datasets and benchmarked against classical metaheuristic optimizers, including Simulated Annealing (SA), Tabu Search (TS), and Genetic Algorithms (GA). The obtained results demonstrate the advantages of quantum optimization for ADR mission planning, providing a scalable and computationally efficient solution.</p></div>","PeriodicalId":547,"journal":{"name":"EPJ Quantum Technology","volume":"12 1","pages":""},"PeriodicalIF":5.6,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://epjquantumtechnology.springeropen.com/counter/pdf/10.1140/epjqt/s40507-025-00409-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145210818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cavity gain enhanced slow light in a hybrid photonic molecule system 混合光子分子系统中腔增益增强的慢光
IF 5.6 2区 物理与天体物理
EPJ Quantum Technology Pub Date : 2025-09-29 DOI: 10.1140/epjqt/s40507-025-00420-8
Hua-Jun Chen, Gui-Xia Pan
{"title":"Cavity gain enhanced slow light in a hybrid photonic molecule system","authors":"Hua-Jun Chen,&nbsp;Gui-Xia Pan","doi":"10.1140/epjqt/s40507-025-00420-8","DOIUrl":"10.1140/epjqt/s40507-025-00420-8","url":null,"abstract":"<div><p>We propose a hybrid photonic molecule system, which includes a two-level system coupled to two optical cavities and the two cavities interact with each other by a phase-dependent photon-photon interaction. The absorption spectra of the two-level system manifest one or two transparent windows (zero absorption deeps) by the dark-mode effect or by breaking the dark-mode effect, which is accompanied by the rapid dispersion leading to the fast or slow light propagation effect. Combining the phased-dependent photon-photon coupling with the interactions between the two-level system and two optical cavities, the dark-mode effect is controllable due to the quantum interference effect, which together determine the process form fast to slow light effect. Moreover, we consider one optical cavity is loss and the other one can be loss, neutral, or gain. The manipulation and periodic switching of group index can be achieved by tuning the modulation phase, and the fast- and slow-light effects are particularly pronounced in the scenario of one optical cavity is active (gain), compared to those are loss or neutral. This study lays the foundation for the application of photon-mediated optical information storage and processing.</p></div>","PeriodicalId":547,"journal":{"name":"EPJ Quantum Technology","volume":"12 1","pages":""},"PeriodicalIF":5.6,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://epjquantumtechnology.springeropen.com/counter/pdf/10.1140/epjqt/s40507-025-00420-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145210816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A systematic review of anomaly detection in IoT security: towards quantum machine learning approach 物联网安全中异常检测的系统回顾:走向量子机器学习方法
IF 5.6 2区 物理与天体物理
EPJ Quantum Technology Pub Date : 2025-09-29 DOI: 10.1140/epjqt/s40507-025-00414-6
Andres J. Aparcana-Tasayco, Xianjun Deng, Jong Hyuk Park
{"title":"A systematic review of anomaly detection in IoT security: towards quantum machine learning approach","authors":"Andres J. Aparcana-Tasayco,&nbsp;Xianjun Deng,&nbsp;Jong Hyuk Park","doi":"10.1140/epjqt/s40507-025-00414-6","DOIUrl":"10.1140/epjqt/s40507-025-00414-6","url":null,"abstract":"<div><p>Integrating IoT into daily life generates massive data, enabling smart factories and driving advancements in related technologies like cloud/edge computing, ML, and AI. While ML has been used for data analysis and forecasting, challenges such as data complexity, security, and computing limitations persist, particularly in anomaly detection crucial for network security. Recent research indicates the potential of quantum computing and Quantum Machine Learning (QML) to outperform traditional methods in anomaly detection within IoT, an area lacking a comprehensive review. This paper presents a systematic review of Machine Learning-based anomaly detection techniques for IoT security. Despite previous reviews, this study includes the analysis of feature engineering and quantum machine learning techniques in literature. Our findings show that current models have high detection rates on known datasets, but face scalability, real-time processing, and generalization issues. Privacy and security concerns in federated learning (FL) and the effects of data drift also need to be addressed, along with the challenges of 5G and 6G-enabled IoT environments. Future directions include integrating Explainable AI into anomaly detection, exploring adaptive learning techniques, and combining blockchain with machine learning models. The study also highlights the potential of quantum computing to enhance threat detection through quantum machine learning models.</p></div>","PeriodicalId":547,"journal":{"name":"EPJ Quantum Technology","volume":"12 1","pages":""},"PeriodicalIF":5.6,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://epjquantumtechnology.springeropen.com/counter/pdf/10.1140/epjqt/s40507-025-00414-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145210817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信