{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T19:12:38Z","timestamp":1735585958830},"reference-count":90,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,3,31]],"date-time":"2023-03-31T00:00:00Z","timestamp":1680220800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100014440","name":"Government of Spain Ministry of Science and Innovation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100014440","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003086","name":"Eusko Jaurlaritza","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003086","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["PID2021-124054OB-C33"],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1016\/j.neucom.2023.03.060","type":"journal-article","created":{"date-parts":[[2023,3,31]],"date-time":"2023-03-31T19:18:48Z","timestamp":1680290328000},"page":"126199","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":9,"special_numbering":"C","title":["Let\u2019s do it right the first time: Survey on security concerns in the way to quantum software engineering"],"prefix":"10.1016","volume":"538","author":[{"given":"Danel","family":"Arias","sequence":"first","affiliation":[]},{"given":"Ignacio","family":"Garc\u00eda Rodr\u00edguez de Guzm\u00e1n","sequence":"additional","affiliation":[]},{"given":"Mois\u00e9s","family":"Rodr\u00edguez","sequence":"additional","affiliation":[]},{"given":"Erik B.","family":"Terres","sequence":"additional","affiliation":[]},{"given":"Borja","family":"Sanz","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9","family":"Gaviria de la Puerta","sequence":"additional","affiliation":[]},{"given":"Iker","family":"Pastor","sequence":"additional","affiliation":[]},{"given":"Agust\u00edn","family":"Zubillaga","sequence":"additional","affiliation":[]},{"given":"Pablo","family":"Garc\u00eda Bringas","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"7671","key":"10.1016\/j.neucom.2023.03.060_b0005","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1038\/nature23458","article-title":"Quantum computational supremacy","volume":"549","author":"Harrow","year":"2017","journal-title":"Nature"},{"key":"10.1016\/j.neucom.2023.03.060_b0010","doi-asserted-by":"crossref","unstructured":"L.K. Grover, A fast quantum mechanical algorithm for database search, in: STOC \u201996: Proceedings of the twenty-eighth annual ACM symposium on Theory of Computing, pp. 212\u2013219. doi: 10.1145\/237814.237866.","DOI":"10.1145\/237814.237866"},{"issue":"5","key":"10.1016\/j.neucom.2023.03.060_b0015","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1137\/S0097539795293172","article-title":"Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer","volume":"26","author":"Shor","year":"1997","journal-title":"SIAM J. Comput."},{"issue":"6918","key":"10.1016\/j.neucom.2023.03.060_b0020","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1038\/nature01336","article-title":"Implementation of the deutsch\u2013jozsa algorithm on an ion-trap quantum computer","volume":"421","author":"Gulde","year":"2003","journal-title":"Nature"},{"issue":"6660","key":"10.1016\/j.neucom.2023.03.060_b0025","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1038\/37539","article-title":"Experimental quantum teleportation","volume":"390","author":"Bouwmeester","year":"1997","journal-title":"Nature"},{"key":"10.1016\/j.neucom.2023.03.060_b0030","unstructured":"Rigetti, Welcome to the docs for the forest sdk!, Report (2019). https:\/\/pyquil-docs.rigetti.com\/en\/v2.7.2\/."},{"key":"10.1016\/j.neucom.2023.03.060_b0035","unstructured":"Qiskit: Open-source quantum development (2022) [cited accessed on 28 of November 2022]. https:\/\/qiskit.org."},{"key":"10.1016\/j.neucom.2023.03.060_b0040","unstructured":"Q# y el kit de desarrollo de quantum (2022) [cited accessed on 28 of November 2022]. https:\/\/azure.microsoft.com\/es-es\/resources\/development-kit\/quantum-computing\/#overview."},{"key":"10.1016\/j.neucom.2023.03.060_b0045","unstructured":"The multi hardware quantum technology platform (2022) [cited accessed on 28 of November 2022]. https:\/\/www.quantum-inspire.com."},{"key":"10.1016\/j.neucom.2023.03.060_b0050","unstructured":"Quantum computing playground (2022) [cited accessed on 28 of November 2022]. https:\/\/www.quantumplayground.net\/#\/home."},{"key":"10.1016\/j.neucom.2023.03.060_b0055","unstructured":"Qcware force (2022) [cited accessed on 28 of November 2022]. https:\/\/forge.qcware.com."},{"key":"10.1016\/j.neucom.2023.03.060_b0060","unstructured":"D. Wecker, K.M. Svore, Liqui\u2014\u3009: A software design architecture and domain-specific language for quantum computing, arXiv (2014). doi:10.48550\/ARXIV.1402.4467."},{"issue":"1","key":"10.1016\/j.neucom.2023.03.060_b0065","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MITP.2020.3019522","article-title":"Toward a quantum software engineering","volume":"23","author":"Piattini","year":"2021","journal-title":"IT Professional"},{"key":"10.1016\/j.neucom.2023.03.060_b0070","unstructured":"J. Verdugo, M. Rodr\u00edguez, M. Piattini, Software quality issues in quantum information systems."},{"issue":"3","key":"10.1016\/j.neucom.2023.03.060_b0075","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1016\/0022-0000(78)90014-4","article-title":"A theory of type polymorphism in programming","volume":"17","author":"Milner","year":"1978","journal-title":"J. Comput. Syst. Sci."},{"key":"10.1016\/j.neucom.2023.03.060_b0080","doi-asserted-by":"crossref","unstructured":"A.A.R. Angulo, X. Yang, Q. Niyaz, S. Paheding, A.Y. Javaid, A secure software engineering design framework for educational purpose, in: 2022 IEEE International Conference on Electro Information Technology (eIT), pp. 375\u2013381. doi:10.1109\/eIT53891.2022.9837112.","DOI":"10.1109\/eIT53891.2022.9837112"},{"key":"10.1016\/j.neucom.2023.03.060_b0085","doi-asserted-by":"crossref","unstructured":"S.M. Dhlamini, T. Mwakabaga, M.O. Kachienga, A holistic test procedure for security systems software: An experience report, in: AFRICON 2007, pp. 1\u20137. doi:10.1109\/AFRCON.2007.4401471.","DOI":"10.1109\/AFRCON.2007.4401471"},{"key":"10.1016\/j.neucom.2023.03.060_b0090","doi-asserted-by":"crossref","unstructured":"G. McGraw, Software security: Building security, in: 2006 17th International Symposium on Software Reliability Engineering, pp. 6\u20136. doi:10.1109\/ISSRE.2006.43.","DOI":"10.1109\/ISSRE.2006.43"},{"issue":"3","key":"10.1016\/j.neucom.2023.03.060_b0095","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/MSP.2006.64","article-title":"Dynamic software security testing","volume":"4","author":"Stytz","year":"2006","journal-title":"IEEE Secur. Privacy"},{"key":"10.1016\/j.neucom.2023.03.060_b0100","article-title":"Quantum software testing: State of the art","author":"Garc\u00eda de la Barrera","year":"2021","journal-title":"J. Software: Evol. Process"},{"key":"10.1016\/j.neucom.2023.03.060_b0105","doi-asserted-by":"crossref","unstructured":"A. Garc\u00eda de la Barrera, M. Serrano, I. Garc\u00eda-Rodr\u00edguez de Guzm\u00e1n, M. Polo, M. Piattini, Automatic generation of test circuits for the verification of quantum deterministic algorithms, in: 1st International Workshop on Quantum Programming for Software Engineering (QP4SE 2022), pp. 1\u20136.","DOI":"10.1145\/3549036.3562055"},{"issue":"3","key":"10.1016\/j.neucom.2023.03.060_b0110","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1007\/s002200200635","article-title":"Simulation of Topological Field Theories by Quantum Computers","volume":"227","author":"Freedman","year":"2002","journal-title":"Commun. Math. Phys."},{"key":"10.1016\/j.neucom.2023.03.060_b0115","doi-asserted-by":"crossref","unstructured":"P. Selinger, Towards a quantum programming language, Mathematical Structures in Computer Science 14 (4) (2004) 527\u2013586, publisher: Cambridge University Press. doi:10.1017\/S0960129504004256. https:\/\/www.cambridge.org\/core\/journals\/\/mathematical-structures-in-computer-science\/article\/abs\/\/towards-a-quantum-programming-language\/\/54D5BCF28724CA6BE38F98DC4B6803DF.","DOI":"10.1017\/S0960129504004256"},{"key":"10.1016\/j.neucom.2023.03.060_b0120","unstructured":"T. Altenkirch, J. Grattage, QML: Quantum data and control, Tech. rep. (2005)."},{"issue":"6","key":"10.1016\/j.neucom.2023.03.060_b0125","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1145\/2499370.2462177","article-title":"Quipper","volume":"48","author":"Green","year":"2013","journal-title":"ACM SIGPLAN Notices"},{"key":"10.1016\/j.neucom.2023.03.060_b0130","doi-asserted-by":"crossref","unstructured":"A. van Tonder, A Lambda Calculus for Quantum Computation, SIAM Journal on Computing 33 (5) (2004) 1109\u20131135, arXiv: quant-ph\/0307150. doi:10.1137\/S0097539703432165. http:\/\/arxiv.org\/abs\/quant-ph\/0307150.","DOI":"10.1137\/S0097539703432165"},{"key":"10.1016\/j.neucom.2023.03.060_b0135","unstructured":"A. van Tonder, M. Dorca, Quantum Computation, Categorical Semantics and Linear Logic, arXiv:quant-ph\/0312174ArXiv: quant-ph\/0312174 (May 2011). http:\/\/arxiv.org\/abs\/quant-ph\/0312174."},{"key":"10.1016\/j.neucom.2023.03.060_b0140","doi-asserted-by":"crossref","unstructured":"E. Knill, Conventions for quantum pseudocode, Tech. Rep. LA-UR-96-2724, Los Alamos National Lab. (LANL), Los Alamos, NM (United States) (Jun. 1996). doi:10.2172\/366453. https:\/\/www.osti.gov\/biblio\/366453.","DOI":"10.2172\/366453"},{"key":"10.1016\/j.neucom.2023.03.060_b0145","doi-asserted-by":"crossref","unstructured":"K. Svore, A. Aho, A. Cross, I. Chuang, I. Markov, A layered software architecture for quantum computing design tools, Computer 39 (1) (2006) 74\u201383, conference Name: Computer. doi:10.1109\/MC.2006.4.","DOI":"10.1109\/MC.2006.4"},{"key":"10.1016\/j.neucom.2023.03.060_b0150","unstructured":"B. \u00d6mer, Procedural Quantum Programming, AIP Conference Proceedings 627 (1) (2002) 276\u2013285, publisher: American Institute of Physics. doi:10.1063\/1.1503695. https:\/\/aip.scitation.org\/doi\/abs\/10.1063\/1.1503695."},{"key":"10.1016\/j.neucom.2023.03.060_b0155","unstructured":"B. \u00d6mer, Structured Quantum Programming (2003)."},{"issue":"2","key":"10.1016\/j.neucom.2023.03.060_b0160","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1140\/epjd\/e2003-00242-2","article-title":"Toward an architecture for quantum programming","volume":"25","author":"Bettelli","year":"2003","journal-title":"Eur. Phys. J. D"},{"key":"10.1016\/j.neucom.2023.03.060_b0165","series-title":"Quantum Programming, Mathematics of Program Construction","first-page":"80","author":"Sanders","year":"2000"},{"key":"10.1016\/j.neucom.2023.03.060_b0170","unstructured":"Azure Quantum Documentation, QDK & Q# API Reference. https:\/\/docs.microsoft.com\/en-us\/azure\/quantum\/."},{"key":"10.1016\/j.neucom.2023.03.060_b0175","unstructured":"S. Liu, X. Wang, L. Zhou, J. Guan, Y. Li, Y. He, R. Duan, M. Ying, Q\u2014SI\u3009) A Quantum Programming Environment, arXiv:1710.09500 [quant-ph]ArXiv: 1710.09500 (Oct. 2017). http:\/\/arxiv.org\/abs\/1710.09500."},{"key":"10.1016\/j.neucom.2023.03.060_b0180","unstructured":"Qiskit documentation. https:\/\/qiskit.org\/documentation\/."},{"key":"10.1016\/j.neucom.2023.03.060_b0185","series-title":"Scaffold: Quantum programming language","author":"Abhari","year":"2012"},{"issue":"6","key":"10.1016\/j.neucom.2023.03.060_b0190","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1023\/A:1021695125245","article-title":"Initializing the amplitude distribution of a quantum state","volume":"12","author":"Ventura","year":"1999","journal-title":"Foundations Phys. Lett."},{"key":"10.1016\/j.neucom.2023.03.060_b0195","unstructured":"R. Hiesgen, M. Nawrocki, T.C. Schmidt, M. W\u00e4hlisch, The race to the vulnerable: Measuring the log4j shell incident (2022). doi:10.48550\/ARXIV.2205.02544."},{"key":"10.1016\/j.neucom.2023.03.060_b0200","doi-asserted-by":"crossref","unstructured":"C.H. Bennett, G. Brassard, C. Cr\u00e9peau, R. Jozsa, A. Peres, W.K. Wootters, Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels, Phys. Rev. Lett. 70(13) (1993) 1895\u20131899, publisher: American Physical Society. doi:10.1103\/PhysRevLett.70.1895.","DOI":"10.1103\/PhysRevLett.70.1895"},{"key":"10.1016\/j.neucom.2023.03.060_b0205","series-title":"Quantum Computation and Quantum Information: 10th Anniversary Edition","author":"Nielsen","year":"2011"},{"key":"10.1016\/j.neucom.2023.03.060_b0210","doi-asserted-by":"crossref","unstructured":"C.H. Bennett, S.J. Wiesner, Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states, Phys. Rev. Lett. 69 (20) (1992) 2881\u20132884, publisher: American Physical Society. doi:10.1103\/PhysRevLett.69.2881.","DOI":"10.1103\/PhysRevLett.69.2881"},{"key":"10.1016\/j.neucom.2023.03.060_b0215","doi-asserted-by":"crossref","unstructured":"C. Wang, F.-G. Deng, Y.-S. Li, X.-S. Liu, G.L. Long, Quantum secure direct communication with high-dimension quantum superdense coding, Phys. Rev. A 71(4) (2005) 044305, publisher: American Physical Society. doi:10.1103\/PhysRevA.71.044305.","DOI":"10.1103\/PhysRevA.71.044305"},{"issue":"6","key":"10.1016\/j.neucom.2023.03.060_b0220","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1134\/S0021364020180095","article-title":"On a new attack on quantum key distribution: Joint unambiguous measurements of probe states and the pns attack on information states","volume":"112","author":"Molotkov","year":"2020","journal-title":"JETP Lett."},{"key":"10.1016\/j.neucom.2023.03.060_b0225","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TQE.2021.3094983","volume":"2","author":"Satoh","year":"2021","journal-title":"IEEE Trans. Quantum Eng."},{"issue":"1","key":"10.1016\/j.neucom.2023.03.060_b0230","doi-asserted-by":"crossref","first-page":"4283","DOI":"10.1038\/s41598-018-22700-3","article-title":"Quantum man-in-the-middle attack on the calibration process of quantum key distribution","volume":"8","author":"Fei","year":"2018","journal-title":"Scientific Rep."},{"issue":"4","key":"10.1016\/j.neucom.2023.03.060_b0235","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevA.78.042333","article-title":"Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems","volume":"78","author":"Zhao","year":"2008","journal-title":"Phys. Rev. A"},{"key":"10.1016\/j.neucom.2023.03.060_b0240","doi-asserted-by":"crossref","unstructured":"V.M. *, D.R. Hjelme, Faked states attack on quantum cryptosystems, J. Modern Opt. 52(5) (2005) 691\u2013705. doi:10.1080\/09500340410001730986.","DOI":"10.1080\/09500340410001730986"},{"issue":"3","key":"10.1016\/j.neucom.2023.03.060_b0245","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1080\/00107514.2016.1148333","article-title":"Attacks on practical quantum key distribution systems (and how to prevent them)","volume":"57","author":"Jain","year":"2016","journal-title":"Contemporary Phys."},{"key":"10.1016\/j.neucom.2023.03.060_b0250","author":"Oshurko","year":"2020","journal-title":"Quantum Mach. Learn."},{"key":"10.1016\/j.neucom.2023.03.060_b0255","doi-asserted-by":"crossref","unstructured":"M. Schuld, N. Killoran, Quantum machine learning in feature Hilbert spaces, Phys. Rev. Lett. 122(4) (2019) 040504, arXiv: 1803.07128. doi:10.1103\/PhysRevLett.122.040504.","DOI":"10.1103\/PhysRevLett.122.040504"},{"key":"10.1016\/j.neucom.2023.03.060_b0260","unstructured":"Y. Zhang, Q. Ni, Recent advances in quantum machine learning, Quantum Engineering 2 (1) (2020) e34, _eprint: https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/que2.34. doi:10.1002\/que2.34. https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/que2.34."},{"issue":"7747","key":"10.1016\/j.neucom.2023.03.060_b0265","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1038\/s41586-019-0980-2","article-title":"Supervised learning with quantum enhanced feature spaces","volume":"567","author":"Havlicek","year":"2019","journal-title":"Nature"},{"key":"10.1016\/j.neucom.2023.03.060_b0270","doi-asserted-by":"crossref","unstructured":"E.C. Behrman, J.E. Steck, A quantum neural network computes its own relative phase, arXiv:1301.2808 [quant-ph]ArXiv: 1301.2808 (Jan. 2013). http:\/\/arxiv.org\/abs\/1301.2808.","DOI":"10.1109\/SIS.2013.6615168"},{"key":"10.1016\/j.neucom.2023.03.060_b0275","unstructured":"S. Gupta, R.K.P. Zia, Quantum Neural Networks, arXiv:quant-ph\/0201144ArXiv: quant-ph\/0201144 (Jan. 2002). http:\/\/arxiv.org\/abs\/quant-ph\/0201144"},{"issue":"1","key":"10.1016\/j.neucom.2023.03.060_b0280","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42484-020-00013-x","article-title":"Quantum learning with noise and decoherence: a robust quantum neural network","volume":"2","author":"Nguyen","year":"2020","journal-title":"Quantum Mach. Intell."},{"issue":"3","key":"10.1016\/j.neucom.2023.03.060_b0285","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevResearch.2.033212","article-title":"Quantum adversarial machine learning","volume":"2","author":"Lu","year":"2020","journal-title":"Phys. Rev. Res."},{"issue":"4","key":"10.1016\/j.neucom.2023.03.060_b0290","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevA.103.042427","article-title":"Robust in practice: Adversarial attacks on quantum machine learning","volume":"103","author":"Liao","year":"2021","journal-title":"Phys. Rev. A"},{"key":"10.1016\/j.neucom.2023.03.060_b0295","unstructured":"A.B. Arrieta, N. D\u00edaz-Rodr\u00edguez, J. Del Ser, A. Bennetot, S. Tabik, A. Barbado, S. Garc\u00eda, S. Gil-L\u00f3pez, D. Molina, R. Benjamins, R. Chatila, F. Herrera, Explainable artificial intelligence (xai): Concepts, taxonomies, opportunities and challenges toward responsible ai (2019). doi:10.48550\/ARXIV.1910.10045."},{"key":"10.1016\/j.neucom.2023.03.060_b0300","doi-asserted-by":"crossref","unstructured":"J. Preskill, Quantum Computing in the NISQ era and beyond, Quantum 2 (2018) 79, publisher: Verein zur F\u00f6rderung des Open Access Publizierens in den Quantenwissenschaften. doi:10.22331\/q-2018-08-06-79. https:\/\/quantum-journal.org\/papers\/q-2018-08-06-79\/.","DOI":"10.22331\/q-2018-08-06-79"},{"key":"10.1016\/j.neucom.2023.03.060_b0305","doi-asserted-by":"crossref","unstructured":"C.G. Almudever, L. Lao, X. Fu, N. Khammassi, I. Ashraf, D. Iorga, S. Varsamopoulos, C. Eichler, A. Wallraff, L. Geck, A. Kruth, J. Knoch, H. Bluhm, K. Bertels, The engineering challenges in quantum computing, in: Design, Automation Test in Europe Conference Exhibition (DATE), 2017, 2017, pp. 836\u2013845, iSSN: 1558\u20131101. doi:10.23919\/DATE.2017.7927104.","DOI":"10.23919\/DATE.2017.7927104"},{"key":"10.1016\/j.neucom.2023.03.060_b0310","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.physrep.2019.10.001","article-title":"Quantum decoherence","volume":"831","author":"Schlosshauer","year":"2019","journal-title":"Phys. Rep."},{"key":"10.1016\/j.neucom.2023.03.060_b0315","doi-asserted-by":"crossref","unstructured":"P. Krantz, M. Kjaergaard, F. Yan, T.P. Orlando, S. Gustavsson, W.D. Oliver, A quantum engineer\u2019s guide to superconducting qubits, Appl. Phys. Rev. 6(2) (2019) 021318, publisher: American Institute of Physics. doi:10.1063\/1.5089550.","DOI":"10.1063\/1.5089550"},{"key":"10.1016\/j.neucom.2023.03.060_b0320","doi-asserted-by":"crossref","unstructured":"C.D. Bruzewicz, J. Chiaverini, R. McConnell, J.M. Sage, Trapped-ion quantum computing: Progress and challenges, Appl. Phys. Rev. 6 (2) (2019) 021314, publisher: American Institute of Physics. doi:10.1063\/1.5088164.","DOI":"10.1063\/1.5088164"},{"key":"10.1016\/j.neucom.2023.03.060_b0325","unstructured":"R. Iten, R. Moyard, T. Metger, D. Sutter, S. Woerner, Exact and practical pattern matching for quantum circuit optimization (2019). doi:10.48550\/ARXIV.1909.05270."},{"key":"10.1016\/j.neucom.2023.03.060_b0330","doi-asserted-by":"crossref","unstructured":"S.J. Devitt, W.J. Munro, K. Nemoto, Quantum error correction for beginners, Rep. Prog. Phys. 76(7) (2013) 076001, publisher: IOP Publishing. doi:10.1088\/0034-4885\/76\/7\/076001.","DOI":"10.1088\/0034-4885\/76\/7\/076001"},{"issue":"1","key":"10.1016\/j.neucom.2023.03.060_b0335","first-page":"1","article-title":"Lecture notes for physics 229: Quantum information and computation","volume":"16","author":"Preskill","year":"1998","journal-title":"California Institute of Technology"},{"key":"10.1016\/j.neucom.2023.03.060_b0340","doi-asserted-by":"crossref","unstructured":"J. Preskill, Reliable quantum computers, Proc. R. Soc. London Ser. A 454 (1969) (1998) 385\u2013410, publisher: Royal Society. doi:10.1098\/rspa.1998.0167.","DOI":"10.1098\/rspa.1998.0167"},{"issue":"3","key":"10.1016\/j.neucom.2023.03.060_b0345","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1080\/00107514.2019.1667078","article-title":"Quantum error correction: an introductory guide","volume":"60","author":"Roffe","year":"2019","journal-title":"Contemporary Phys."},{"key":"10.1016\/j.neucom.2023.03.060_b0350","doi-asserted-by":"crossref","unstructured":"E.T. Campbell, B.M. Terhal, C. Vuillot, Roads towards fault-tolerant universal quantum computation, Nature 549 (7671) (2017) 172\u2013179, bandiera_abtest: a Cg_type: Nature Research Journals Number: 7671 Primary_atype: Reviews Publisher: Nature Publishing Group Subject_term: Information theory and computation;Quantum information;Qubits Subject_term_id: information-theory-and-computation;quantum-information;qubits. doi:10.1038\/nature23460. https:\/\/www.nature.com\/articles\/nature23460.","DOI":"10.1038\/nature23460"},{"key":"10.1016\/j.neucom.2023.03.060_b0355","doi-asserted-by":"crossref","unstructured":"J. Preskill, Fault-tolerant quantum computation, in: Introduction to quantum computation and information, World Scientific, 1998, pp. 213\u2013269.","DOI":"10.1142\/9789812385253_0008"},{"key":"10.1016\/j.neucom.2023.03.060_b0360","doi-asserted-by":"crossref","unstructured":"A.A. Saki, M. Alam, K. Phalak, A. Suresh, R.O. Topaloglu, S. Ghosh, A Survey and Tutorial on Security and Resilience of Quantum Computing, arXiv:2106.06081 [quant-ph]ArXiv: 2106.06081 (Jun. 2021). http:\/\/arxiv.org\/abs\/2106.06081.","DOI":"10.1109\/ETS50041.2021.9465397"},{"key":"10.1016\/j.neucom.2023.03.060_b0365","doi-asserted-by":"crossref","unstructured":"A. Garc\u00eda de la Barrera, I. Garc\u00eda-Rodr\u00edguez de Guzm\u00e1n, M. Polo, M. Piattini, Quantum software testing: State of the art, Journal of Software: Evolution and Process n\/a (n\/a) e2419. doi: 10.1002\/smr.2419.","DOI":"10.1002\/smr.2419"},{"key":"10.1016\/j.neucom.2023.03.060_b0370","unstructured":"Y. Huang, M. Martonosi, QDB: From Quantum Algorithms Towards Correct Quantum Programs (2019) 14 pages doi:10.4230\/OASIcs.PLATEAU.2018.4."},{"key":"10.1016\/j.neucom.2023.03.060_b0375","doi-asserted-by":"crossref","unstructured":"Y. Huang, M. Martonosi, Statistical assertions for validating patterns and finding bugs in quantum programs, in: Proceedings of the 46th International Symposium on Computer Architecture, ISCA \u201919, Association for Computing Machinery, New York, NY, USA, 2019, pp. 541\u2013553. doi:10.1145\/3307650.3322213.","DOI":"10.1145\/3307650.3322213"},{"key":"10.1016\/j.neucom.2023.03.060_b0380","unstructured":"P. Zhao, J. Zhao, L. Ma, Identifying Bug Patterns in Quantum Programs, arXiv:2103.09069 [quant-ph]ArXiv: 2103.09069 (Mar. 2021). http:\/\/arxiv.org\/abs\/2103.09069."},{"key":"10.1016\/j.neucom.2023.03.060_b0385","doi-asserted-by":"crossref","unstructured":"J. Campos, A. Souto, QBugs: A Collection of Reproducible Bugs in Quantum Algorithms and a Supporting Infrastructure to Enable Controlled Quantum Software Testing and Debugging Experiments (Mar. 2021). doi:10.48550\/arXiv.2103.16968. http:\/\/arxiv.org\/abs\/2103.16968.","DOI":"10.1109\/Q-SE52541.2021.00013"},{"key":"10.1016\/j.neucom.2023.03.060_b0390","first-page":"1373","article-title":"Bugs4Q: A Benchmark of Real Bugs for Quantum Programs","author":"Zhao","year":"2021","journal-title":"IEEE Comput. Soc."},{"key":"10.1016\/j.neucom.2023.03.060_b0395","unstructured":"J. Wang, M. Gao, Y. Jiang, J. Lou, Y. Gao, D. Zhang, J. Sun, QuanFuzz: Fuzz Testing of Quantum Program (Oct. 2018). doi:10.48550\/arXiv.1810.10310."},{"key":"10.1016\/j.neucom.2023.03.060_b0400","doi-asserted-by":"crossref","unstructured":"S. Honarvar, M.R. Mousavi, R. Nagarajan, Property-based Testing of Quantum Programs in Q#, in: Proceedings of the IEEE\/ACM 42nd International Conference on Software Engineering Workshops, Association for Computing Machinery, New York, NY, USA, 2020, pp. 430\u2013435. doi: 10.1145\/3387940.3391459.","DOI":"10.1145\/3387940.3391459"},{"key":"10.1016\/j.neucom.2023.03.060_b0405","doi-asserted-by":"crossref","unstructured":"X. Wang, P. Arcaini, T. Yue, S. Ali, Generating Failing Test Suites for Quantum Programs With Search, in: Search-Based Software Engineering: 13th International Symposium, SSBSE 2021, Bari, Italy, October 11\u201312, 2021, Proceedings, Springer-Verlag, Berlin, Heidelberg, 2021, pp. 9\u201325. doi:10.1007\/978-3-030-88106-1_2.","DOI":"10.1007\/978-3-030-88106-1_2"},{"issue":"4","key":"10.1016\/j.neucom.2023.03.060_b0410","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevA.89.042338","article-title":"Debugging Quantum Processes Using Monitoring Measurements","volume":"89","author":"Li","year":"2014","journal-title":"Phys. Rev. A"},{"key":"10.1016\/j.neucom.2023.03.060_b0415","doi-asserted-by":"crossref","unstructured":"J. Liu, G.T. Byrd, H. Zhou, Quantum Circuits for Dynamic Runtime Assertions in Quantum Computation, in: Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS \u201920, Association for Computing Machinery, New York, NY, USA, 2020, pp. 1017\u20131030. doi:10.1145\/3373376.3378488.","DOI":"10.1145\/3373376.3378488"},{"key":"10.1016\/j.neucom.2023.03.060_b0420","series-title":"Quantum Hoare Type Theory","author":"Singhal","year":"2020"},{"key":"10.1016\/j.neucom.2023.03.060_b0425","first-page":"291","article-title":"Quantum Hoare Type Theory: Extended Abstract, Electronic Proceedings in Theoretical Computer","volume":"340","author":"Singhal","year":"2021","journal-title":"Science"},{"key":"10.1016\/j.neucom.2023.03.060_b0430","doi-asserted-by":"crossref","unstructured":"A.J. Abhari, S. Patil, D. Kudrow, J. Heckey, A. Lvov, F.T. Chong, M. Martonosi, ScaffCC: a framework for compilation and analysis of quantum computing programs, in: Proceedings of the 11th ACM Conference on Computing Frontiers, CF \u201914, Association for Computing Machinery, New York, NY, USA, 2014, pp. 1\u201310. doi:10.1145\/2597917.2597939.","DOI":"10.1145\/2597917.2597939"},{"key":"10.1016\/j.neucom.2023.03.060_b0435","unstructured":"A.W. Cross, L.S. Bishop, J.A. Smolin, J.M. Gambetta, Open Quantum Assembly Language, arXiv:1707.03429 [quant-ph]ArXiv: 1707.03429 (Jul. 2017). http:\/\/arxiv.org\/abs\/1707.03429."},{"key":"10.1016\/j.neucom.2023.03.060_b0440","doi-asserted-by":"crossref","unstructured":"S.-H. Hung, K. Hietala, S. Zhu, M. Ying, M. Hicks, X. Wu, Quantitative robustness analysis of quantum programs, Proceedings of the ACM on Programming Languages 3 (POPL) (2019) 31:1\u201331:29. doi:10.1145\/3290344.","DOI":"10.1145\/3290344"},{"key":"10.1016\/j.neucom.2023.03.060_b0445","unstructured":"M. Piattini, G. Peterssen Nodarse, R. P\u00e9rez-Castillo, J.L. Hevia Oliver, M. Serrano, G. Hern\u00e1ndez Gonz\u00e1lez, I. Guzm\u00e1n, C. Andr\u00e9s Paradela, M. Polo, E. Murina, L. Jim\u00e9nez Navajas, J. Marque\u00f1o, R. Gallego, J. Tura, F. Phillipson, J. Murillo, A. Ni\u00f1o, M. Rodr\u00edguez, The Talavera Manifesto for Quantum Software Engineering and Programming, 2020."},{"key":"10.1016\/j.neucom.2023.03.060_b0450","doi-asserted-by":"crossref","unstructured":"T. Patel, D. Tiwari, Veritas: Accurately estimating the correct output on noisy intermediate-scale quantum computers, in: SC20: International Conference for High Performance Computing, Networking, Storage and Analysis, 2020, pp. 1\u201316. doi:10.1109\/SC41405.2020.00019.","DOI":"10.1109\/SC41405.2020.00019"}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231223003041?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231223003041?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T13:51:22Z","timestamp":1706536282000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231223003041"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":90,"alternative-id":["S0925231223003041"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2023.03.060","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2023,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Let\u2019s do it right the first time: Survey on security concerns in the way to quantum software engineering","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2023.03.060","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"126199"}}