{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:20:26Z","timestamp":1730305226862,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,12]],"date-time":"2023-10-12T00:00:00Z","timestamp":1697068800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,12]],"date-time":"2023-10-12T00:00:00Z","timestamp":1697068800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,12]]},"DOI":"10.1109\/wf-iot58464.2023.10539417","type":"proceedings-article","created":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T17:38:40Z","timestamp":1717090720000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Machine Learning Based Attack Detection for Quantum Key Distribution"],"prefix":"10.1109","author":[{"given":"Hilal Sultan Duranoglu","family":"Tunc","sequence":"first","affiliation":[{"name":"TU Dresden,Deutsche Telekom Chair of Communication Networks,Germany"}]},{"given":"Yingjian","family":"Wang","sequence":"additional","affiliation":[{"name":"TU Dresden,Deutsche Telekom Chair of Communication Networks,Germany"}]},{"given":"Riccardo","family":"Bassoli","sequence":"additional","affiliation":[{"name":"TU Dresden,Deutsche Telekom Chair of Communication Networks,Germany"}]},{"given":"Frank H. P.","family":"Fitzek","sequence":"additional","affiliation":[{"name":"TU Dresden,Deutsche Telekom Chair of Communication Networks,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3232845"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","article-title":"Quantum cryptography: Public key distribution and coin tossing","volume":"560","author":"Bennett","year":"2014","journal-title":"Theoretical Computer Science"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/BF00191318"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2006.2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.13140\/RG.2.2.18893.74727"},{"key":"ref7","article-title":"Language models are few-shot learners","volume-title":"Pro-ceedings of the 34th International Conference on Neural Information Processing Systems, ser. NIPS20","author":"Brown","year":"2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2021.100224"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3078081"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3106659"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/OGC52961.2021.9654412"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3117405"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/aba8d4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1023\/a:1022627411411"},{"issue":"6","key":"ref16","doi-asserted-by":"crossref","first-page":"063043","DOI":"10.1088\/1367-2630\/11\/6\/063043","article-title":"High error-rate quantum key distribution for long-distance communication","volume":"11","author":"Khan","year":"2009","journal-title":"New Journal of Physics"}],"event":{"name":"2023 IEEE 9th World Forum on Internet of Things (WF-IoT)","start":{"date-parts":[[2023,10,12]]},"location":"Aveiro, Portugal","end":{"date-parts":[[2023,10,27]]}},"container-title":["2023 IEEE 9th World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10539362\/10539375\/10539417.pdf?arnumber=10539417","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T04:54:43Z","timestamp":1717131283000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10539417\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/wf-iot58464.2023.10539417","relation":{},"subject":[],"published":{"date-parts":[[2023,10,12]]}}}