iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.3390/FI15030094
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T16:59:14Z","timestamp":1726851554516},"reference-count":207,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2023,2,27]],"date-time":"2023-02-27T00:00:00Z","timestamp":1677456000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"In recent years, the interdisciplinary field of quantum computing has rapidly developed and garnered substantial interest from both academia and industry due to its ability to process information in fundamentally different ways, leading to hitherto unattainable computational capabilities. However, despite its potential, the full extent of quantum computing\u2019s impact on healthcare remains largely unexplored. This survey paper presents the first systematic analysis of the various capabilities of quantum computing in enhancing healthcare systems, with a focus on its potential to revolutionize compute-intensive healthcare tasks such as drug discovery, personalized medicine, DNA sequencing, medical imaging, and operational optimization. Through a comprehensive analysis of existing literature, we have developed taxonomies across different dimensions, including background and enabling technologies, applications, requirements, architectures, security, open issues, and future research directions, providing a panoramic view of the quantum computing paradigm for healthcare. Our survey aims to aid both new and experienced researchers in quantum computing and healthcare by helping them understand the current research landscape, identifying potential opportunities and challenges, and making informed decisions when designing new architectures and applications for quantum computing in healthcare.<\/jats:p>","DOI":"10.3390\/fi15030094","type":"journal-article","created":{"date-parts":[[2023,2,28]],"date-time":"2023-02-28T08:59:57Z","timestamp":1677574797000},"page":"94","source":"Crossref","is-referenced-by-count":52,"title":["Quantum Computing for Healthcare: A Review"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-9966-2466","authenticated-orcid":false,"given":"Raihan","family":"Ur Rasool","sequence":"first","affiliation":[{"name":"College of Engineering and Science, Victoria University, Melbourne, VIC 8001, Australia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8545-9771","authenticated-orcid":false,"given":"Hafiz Farooq","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Computer Science Department, College of Computer Sciences and Information Technology (CCSIT), King Faisal University, P.O. Box 400, Al-Ahsa 31982, Saudi Arabia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0162-6921","authenticated-orcid":false,"given":"Wajid","family":"Rafique","sequence":"additional","affiliation":[{"name":"Department of Electrical and Software Engineering, University of Calgary, Calgary, AB T2N 1N4, Canada"}]},{"given":"Adnan","family":"Qayyum","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Information Technology University (ITU), Lahore 40050, Pakistan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9466-2475","authenticated-orcid":false,"given":"Junaid","family":"Qadir","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, College of Engineering, Qatar University, Doha 2713, Qatar"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4608-4305","authenticated-orcid":false,"given":"Zahid","family":"Anwar","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Sheila and Robert Challey Institute for Global Innovation and Growth, North Dakota State University (NDSU), Fargo, ND 58108, USA"}]}],"member":"1968","published-online":{"date-parts":[[2023,2,27]]},"reference":[{"key":"ref_1","unstructured":"Fl\u00f6ther, F., Murphy, J., Murtha, J., and Sow, D. (2023, January 27). Exploring Quantum Computing Use Cases for Healthcare (IBM Expert Insights). Available online: https:\/\/www.ibm.com\/thought-leadership\/institute-business-value\/report\/quantum-healthcare#."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Devi, A., and Kalaivani, V. (2021). Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications. Pers. Ubiquitous Comput., 1\u201311.","DOI":"10.1007\/s00779-021-01546-z"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Sadki, S., and Bakkali, H.E. (2015, January 20\u201322). Towards negotiable privacy policies in mobile healthcare. Proceedings of the Fifth International Conference on the Innovative Computing Technology (INTECH 2015), Galcia, Spain.","DOI":"10.1109\/INTECH.2015.7173478"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1016\/j.drudis.2021.10.006","article-title":"Toward the institutionalization of quantum computing in pharmaceutical research","volume":"27","author":"Zinner","year":"2021","journal-title":"Drug Discov. Today"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"eaax1950","DOI":"10.1126\/sciadv.aax1950","article-title":"Molecular docking with Gaussian boson sampling","volume":"6","author":"Banchi","year":"2020","journal-title":"Sci. Adv."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1038\/s41534-018-0060-8","article-title":"Quantum annealing versus classical machine learning applied to a simplified computational biology problem","volume":"4","author":"Li","year":"2018","journal-title":"NPJ Quantum Inf."},{"key":"ref_7","unstructured":"Fedorov, V.V., and Leonov, S.L. (2018). Platform Trial Designs in Drug Development, Chapman and Hall\/CRC."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.cosrev.2018.11.002","article-title":"A survey on quantum computing technology","volume":"31","author":"Gyongyosi","year":"2019","journal-title":"Comput. Sci. Rev."},{"key":"ref_9","first-page":"6457","article-title":"From pre-quantum to post-quantum IoT security: A survey on quantum-resistant cryptosystems for the Internet of Things","volume":"7","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1109\/COMST.2017.2786748","article-title":"A survey on quantum channel capacities","volume":"20","author":"Gyongyosi","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/3106700.3106710","article-title":"Guest column: A survey of quantum learning theory","volume":"48","author":"Arunachalam","year":"2017","journal-title":"ACM SIGACT News"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"23568","DOI":"10.1109\/ACCESS.2020.2970105","article-title":"Quantum optimization and quantum learning: A survey","volume":"8","author":"Li","year":"2020","journal-title":"IEEE Access"},{"key":"ref_13","first-page":"1","article-title":"Survey on quantum information security","volume":"16","author":"Zhang","year":"2019","journal-title":"China Commun."},{"key":"ref_14","unstructured":"Shannon, K., Towe, E., and Tonguz, O.K. (2020). On the use of quantum entanglement in secure communications: A survey. arXiv."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MSP.2018.3761710","article-title":"Quantum computing: Codebreaking and beyond","volume":"16","author":"Roetteler","year":"2018","journal-title":"IEEE Secur. Priv."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Padamvathi, V., Vardhan, B.V., and Krishna, A. (2016, January 27\u201328). Quantum cryptography and quantum key distribution protocols: A survey. Proceedings of the 2016 IEEE 6th International Conference on Advanced Computing (IACC), Bhimavaram, India.","DOI":"10.1109\/IACC.2016.109"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Ramezani, S.B., Sommers, A., Manchukonda, H.K., Rahimi, S., and Amirlatifi, A. (2020, January 19\u201324). Machine learning algorithms in quantum computing: A survey. Proceedings of the 2020 International Joint Conference on Neural Networks (IJCNN), Glasgow, UK.","DOI":"10.1109\/IJCNN48605.2020.9207714"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"034101","DOI":"10.1116\/5.0007529","article-title":"Machine learning meets quantum foundations: A brief survey","volume":"2","author":"Bharti","year":"2020","journal-title":"AVS Quantum Sci."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Shaikh, T.A., and Ali, R. (2016, January 8\u201310). Quantum computing in big data analytics: A survey. Proceedings of the 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji.","DOI":"10.1109\/CIT.2016.79"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3402179","article-title":"A Survey of Quantum Theory Inspired Approaches to Information Retrieval","volume":"53","author":"Uprety","year":"2020","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"103016","DOI":"10.1088\/1367-2630\/aade06","article-title":"Implementation vulnerabilities in general quantum cryptography","volume":"20","author":"Huang","year":"2018","journal-title":"New J. Phys."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1209","DOI":"10.1109\/COMST.2018.2882385","article-title":"Quantum search algorithms for wireless communications","volume":"21","author":"Botsinis","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1049\/iet-qtc.2020.0002","article-title":"Towards a distributed quantum computing ecosystem","volume":"1","author":"Cuomo","year":"2020","journal-title":"IET Quantum Commun."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Egger, D.J., Gambella, C., Marecek, J., McFaddin, S., Mevissen, M., Raymond, R., Simonetto, A., Woerner, S., and Yndurain, E. (2020). Quantum computing for Finance: State of the art and future prospects. IEEE Trans. Quantum Eng., 1.","DOI":"10.1109\/TQE.2020.3030314"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/s10559-019-00107-w","article-title":"Quantum Computing: Survey and Analysis","volume":"55","author":"Savchuk","year":"2019","journal-title":"Cybern. Syst. Anal."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MC.2019.2908836","article-title":"Practical annealing-based quantum computing","volume":"52","author":"McGeoch","year":"2019","journal-title":"Computer"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1080\/02286203.2020.1738035","article-title":"A survey on quantum positioning system","volume":"4","author":"Duan","year":"2021","journal-title":"Int. J. Model. Simul."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"79","DOI":"10.22331\/q-2018-08-06-79","article-title":"Quantum Computing in the NISQ era and beyond","volume":"2","author":"Preskill","year":"2018","journal-title":"Quantum"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1090\/bull\/1605","article-title":"Mathematics of topological quantum computing","volume":"55","author":"Rowell","year":"2018","journal-title":"Bull. Am. Math. Soc."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3292548","article-title":"Post-quantum lattice-based cryptography implementations: A survey","volume":"51","author":"Nejatollahi","year":"2019","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Fingerhuth, M., Babej, T., and Wittek, P. (2018). Open source software in quantum computing. PLoS ONE, 13.","DOI":"10.1371\/journal.pone.0208561"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1324","DOI":"10.1038\/s41587-021-01116-x","article-title":"Quantum computers to explore precision oncology","volume":"39","author":"Abbott","year":"2021","journal-title":"Nat. Biotechnol."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1616725","DOI":"10.1155\/2021\/1616725","article-title":"Heart Failure Detection Using Quantum-Enhanced Machine Learning and Traditional Machine Learning Techniques for Internet of Artificially Intelligent Medical Things","volume":"2021","author":"Kumar","year":"2021","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_34","first-page":"1","article-title":"A quantum-enhanced precision medicine application to support data-driven clinical decisions for the personalized treatment of advanced knee osteoarthritis: Development and preliminary validation of precisionKNEE QNN","volume":"2021","author":"Olgiati","year":"2021","journal-title":"medRxiv"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"102544","DOI":"10.1016\/j.technovation.2022.102544","article-title":"Quantum computing led innovation for achieving a more sustainable COVID-19 healthcare industry","volume":"120","author":"Gupta","year":"2022","journal-title":"Technovation"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Kumar, A., Bhushan, B., Shriti, S., and Nand, P. (2022). Quantum Computing for Health Care: A Review on Implementation Trends and Recent Advances. Multimedia Technologies in the Internet of Things Environment, Volume 3, Springer.","DOI":"10.1007\/978-981-19-0924-5_2"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1016\/j.physleta.2017.12.042","article-title":"Computing with a single qubit faster than the computation quantum speed limit","volume":"382","author":"Sinitsyn","year":"2018","journal-title":"Phys. Lett. A"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1038\/nphys1453","article-title":"Realization of a programmable two-qubit quantum processor","volume":"6","author":"Hanneke","year":"2010","journal-title":"Nat. Phys."},{"key":"ref_39","unstructured":"Balaganur, S. (2019). Man\u2019s Race to Quantum Supremacy: The Complete Timeline, Analytics India Magazine."},{"key":"ref_40","unstructured":"Watabe, S., Serikow, M., Kawabata, S., and Zagoskin, A. (2021, January 15\u201319). Scaling Law in Large Quantum Devices with Dissipation. Proceedings of the APS March Meeting Abstracts, Virtual."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1038\/s41567-018-0124-x","article-title":"Characterizing quantum supremacy in near-term devices","volume":"14","author":"Boixo","year":"2018","journal-title":"Nat. Phys."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1460","DOI":"10.1126\/science.abe8770","article-title":"Quantum computational advantage using photons","volume":"370","author":"Zhong","year":"2020","journal-title":"Science"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"010503","DOI":"10.1103\/PhysRevLett.126.010503","article-title":"Long-distance entanglement purification for quantum communication","volume":"126","author":"Hu","year":"2021","journal-title":"Phys. Rev. Lett."},{"key":"ref_44","unstructured":"Porter, J. (2021, June 16). Google Confirms \u2019Quantum Supremacy\u2019 Breakthrough. Available online: https:\/\/www.theverge.com\/2019\/10\/23\/20928294\/google-quantum-supremacy-sycamore-computer-qubit-milestone."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Preskill, J. (1998). Introduction to Quantum Computation and Information, World Scientific.","DOI":"10.1142\/9789812385253_0008"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Moser, J.K. (2020). Lectures on Hamiltonian Systems, CRC Press.","DOI":"10.1201\/9781003069515-7"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"250505","DOI":"10.1103\/PhysRevLett.99.250505","article-title":"Experimental demonstration of a compiled version of Shor\u2019s algorithm with quantum entanglement","volume":"99","author":"Lanyon","year":"2007","journal-title":"Phys. Rev. Lett."},{"key":"ref_48","unstructured":"National Academies of Sciences, Engineering, and Medicine (2019). Quantum Computing: Progress and Prospects, The National Academies Press."},{"key":"ref_49","unstructured":"Childs, H. (2023, January 27). Applications of Cloud-Based Quantum Computers with Cognitive Computing Algorithms in Automated, Evidence-Based Virginia Geriatric Healthcare. Auctus J. Undergrad. Res. Creat. Available online: https:\/\/scholarscompass.vcu.edu\/cgi\/viewcontent.cgi?article=1075&context=auctus."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"e1481","DOI":"10.1002\/wcms.1481","article-title":"The prospects of quantum computing in computational molecular biology","volume":"11","author":"Outeiral","year":"2021","journal-title":"Wiley Interdiscip. Rev. Comput. Mol. Sci."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"3007","DOI":"10.1038\/s41467-019-10988-2","article-title":"An adaptive variational algorithm for exact molecular simulations on a quantum computer","volume":"10","author":"Grimsley","year":"2019","journal-title":"Nat. Commun."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"e12","DOI":"10.1002\/que2.12","article-title":"Quantum machine learning with D-wave quantum computer","volume":"1","author":"Hu","year":"2019","journal-title":"Quantum Eng."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"062612","DOI":"10.1103\/PhysRevA.102.062612","article-title":"Efficient quantum circuits for quantum computational chemistry","volume":"102","author":"Yordanov","year":"2020","journal-title":"Phys. Rev. A"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"56","DOI":"10.2174\/1874196702109010056","article-title":"Exploring potential of quantum computing in creating smart healthcare","volume":"9","author":"Malviya","year":"2022","journal-title":"Open Biol. J."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"e06079","DOI":"10.1016\/j.heliyon.2021.e06079","article-title":"Quantum computational investigations and molecular docking studies on amentoflavone","volume":"7","author":"Marinho","year":"2021","journal-title":"Heliyon"},{"key":"ref_56","unstructured":"Langione, M., Bobier, J.F., Meier, C., Hasenfuss, S., and Schulze, U. (2023, January 27). Will Quantum Computing Transform Biopharma R&D?. Available online: https:\/\/www.bcg.com\/publications\/2019\/quantum-computing-transform-biopharma-research-development."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Sarkar, A., Al-Ars, Z., and Bertels, K. (2021). Estimating algorithmic information using quantum computing for genomics applications. Appl. Sci., 11.","DOI":"10.20944\/preprints202102.0135.v1"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"1680","DOI":"10.1016\/j.drudis.2021.06.003","article-title":"Quantum computing\u2019s potential for drug discovery: Early stage industry dynamics","volume":"26","author":"Zinner","year":"2021","journal-title":"Drug Discov. Today"},{"key":"ref_59","unstructured":"Birtwistle, M. (2014). Saving Lives and Averting Costs? The Case for Earlier Diagnosis Just Got Stronger, Cancer Research UK."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1136\/bmjqs-2013-002627","article-title":"The frequency of diagnostic errors in outpatient care: Estimations from three large observational studies involving US adult populations","volume":"23","author":"Singh","year":"2014","journal-title":"BMJ Qual. Saf."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"23545","DOI":"10.1038\/s41598-021-02910-y","article-title":"Quantum deep reinforcement learning for clinical decision support in oncology: Application to adaptive radiotherapy","volume":"11","author":"Niraula","year":"2021","journal-title":"Sci. Rep."},{"key":"ref_62","unstructured":"Pakela, J. (2021). Quantum Inspired Machine Learning Algorithms for Adaptive Radiotherapy. [Ph.D. Thesis, University of Michiga]."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Fl\u00f6ther, F.F. (2023). The state of quantum computing applications in health and medicine. arXiv.","DOI":"10.1017\/qut.2023.4"},{"key":"ref_64","unstructured":"Garzia, J.M. (2023, January 27). How Quantum Computing Could Remake Chemistry. Available online: https:\/\/www.scientificamerican.com\/article\/how-quantum-computing-could-remake-chemistry\/."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"10856","DOI":"10.1021\/acs.chemrev.8b00803","article-title":"Quantum chemistry in the age of quantum computing","volume":"119","author":"Cao","year":"2019","journal-title":"Chem. Rev."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1038\/s41586-021-04351-z","article-title":"Unbiasing fermionic quantum Monte Carlo with a quantum computer","volume":"603","author":"Huggins","year":"2022","journal-title":"Nature"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"2136","DOI":"10.1109\/TC.2020.3038063","article-title":"Credit risk analysis using quantum computers","volume":"70","author":"Egger","year":"2020","journal-title":"IEEE Trans. Comput."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1038\/s41534-019-0130-6","article-title":"Quantum risk analysis","volume":"5","author":"Woerner","year":"2019","journal-title":"NPJ Quantum Inf."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1140\/epjqt\/s40507-021-00091-1","article-title":"Commercial applications of quantum computing","volume":"8","author":"Bova","year":"2021","journal-title":"EPJ Quantum Technol."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/s42979-021-00786-3","article-title":"Quantum computing opportunities in renewable energy","volume":"2","author":"Giani","year":"2021","journal-title":"SN Comput. Sci."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.comcom.2021.05.019","article-title":"Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography","volume":"176","author":"Chamola","year":"2021","journal-title":"Comput. Commun."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1080\/09500340008244040","article-title":"Grover\u2019s search algorithm: An optical approach","volume":"47","author":"Kwiat","year":"2000","journal-title":"J. Mod. Opt."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"010332","DOI":"10.1103\/PRXQuantum.3.010332","article-title":"Quantum communication with ultrafast time-bin qubits","volume":"3","author":"Bouchard","year":"2022","journal-title":"PRX Quantum"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TQE.2022.3143997","article-title":"Versatile and concurrent fpga-based architecture for practical quantum communication systems","volume":"3","author":"Stanco","year":"2022","journal-title":"IEEE Trans. Quantum Eng."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"eaam9288","DOI":"10.1126\/science.aam9288","article-title":"Quantum internet: A vision for the road ahead","volume":"362","author":"Wehner","year":"2018","journal-title":"Science"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1109\/MNET.001.1900092","article-title":"Quantum internet: Networking challenges in distributed quantum computing","volume":"34","author":"Cacciapuoti","year":"2019","journal-title":"IEEE Netw."},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Young, N. (1988). An Introduction to Hilbert Space, Cambridge University Press.","DOI":"10.1017\/CBO9781139172011"},{"key":"ref_78","unstructured":"Salakhutdinov, R., and Hinton, G. (2009, January 16\u201318). Deep Boltzmann Machines. Proceedings of the Artificial Intelligence and Statistics, PMLR, Clearwater Beach, FL, USA."},{"key":"ref_79","unstructured":"Neven, H., Denchev, V.S., Rose, G., and Macready, W.G. (2009). Training a large scale classifier with the quantum adiabatic algorithm. arXiv."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"025003","DOI":"10.1088\/2058-9565\/aa66eb","article-title":"Fault-tolerant, high-level quantum circuits: Form, compilation and description","volume":"2","author":"Paler","year":"2017","journal-title":"Quantum Sci. Technol."},{"key":"ref_81","unstructured":"Farhi, E., Goldstone, J., and Gutmann, S. (2014). A quantum approximate optimization algorithm. arXiv."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"14220","DOI":"10.1038\/s41598-020-71007-9","article-title":"Quantum state optimization and computational pathway evaluation for gate-model quantum computers","volume":"10","author":"Gyongyosi","year":"2020","journal-title":"Sci. Rep."},{"key":"ref_83","unstructured":"Farhi, E., Goldstone, J., Gutmann, S., and Neven, H. (2017). Quantum algorithms for fixed qubit architectures. arXiv."},{"key":"ref_84","unstructured":"Van Meter, R.D. (2006). Architecture of a quantum multicomputer optimized for Shor\u2019s factoring algorithm. arXiv."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1103\/RevModPhys.68.733","article-title":"Quantum computation and Shor\u2019s factoring algorithm","volume":"68","author":"Ekert","year":"1996","journal-title":"Rev. Mod. Phys."},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Van Meter, R., and Devitt, S.J. (2016). Local and distributed quantum computation. arXiv.","DOI":"10.1109\/MC.2016.291"},{"key":"ref_87","first-page":"1","article-title":"Designing a million-qubit quantum computer using a resource performance simulator","volume":"12","author":"Ahsan","year":"2015","journal-title":"ACM J. Emerg. Technol. Comput. Syst. (JETC)"},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1038\/s41534-017-0032-4","article-title":"Quantum generalisation of feedforward neural networks","volume":"3","author":"Wan","year":"2017","journal-title":"NPJ Quantum Inf."},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"103108","DOI":"10.1063\/1.4943622","article-title":"Towards a feasible implementation of quantum neural networks using quantum dots","volume":"108","author":"Altaisky","year":"2016","journal-title":"Appl. Phys. Lett."},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"153002","DOI":"10.1103\/PhysRevLett.102.153002","article-title":"High-fidelity transport of trapped-ion qubits through an X-junction trap array","volume":"102","author":"Blakestad","year":"2009","journal-title":"Phys. Rev. Lett."},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"16034","DOI":"10.1038\/npjqi.2016.34","article-title":"Co-designing a scalable quantum computer with trapped atomic ions","volume":"2","author":"Brown","year":"2016","journal-title":"NPJ Quantum Inf."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"4091","DOI":"10.1103\/PhysRevLett.74.4091","article-title":"Quantum computations with cold trapped ions","volume":"74","author":"Cirac","year":"1995","journal-title":"Phys. Rev. Lett."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"062324","DOI":"10.1103\/PhysRevA.73.062324","article-title":"Probabilistic quantum gates between remote atoms through interference of optical frequency qubits","volume":"73","author":"Duan","year":"2006","journal-title":"Phys. Rev. A"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"034101","DOI":"10.1063\/1.2164910","article-title":"T-junction ion trap array for two-dimensional ion shuttling, storage, and manipulation","volume":"88","author":"Hensinger","year":"2006","journal-title":"Appl. Phys. Lett."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1038\/nphys3150","article-title":"Modular entanglement of atomic qubits using photons and phonons","volume":"11","author":"Hucul","year":"2015","journal-title":"Nat. Phys."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"1068","DOI":"10.1126\/science.aad9480","article-title":"Realization of a scalable Shor algorithm","volume":"351","author":"Monz","year":"2016","journal-title":"Science"},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"1609","DOI":"10.1038\/s41598-017-01711-6","article-title":"Basic protocols in quantum reinforcement learning with superconducting circuits","volume":"7","author":"Lamata","year":"2017","journal-title":"Sci. Rep."},{"key":"ref_98","unstructured":"Kerenidis, I., and Prakash, A. (2016). Quantum recommendation systems. arXiv."},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"034007","DOI":"10.1088\/2058-9565\/aabd98","article-title":"Quantum-assisted Helmholtz machines: A quantum\u2013classical deep learning framework for industrial datasets in near-term devices","volume":"3","author":"Benedetti","year":"2018","journal-title":"Quantum Sci. Technol."},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"1552","DOI":"10.1109\/JSTQE.2003.820922","article-title":"Toward a scalable, silicon-based quantum computing architecture","volume":"9","author":"Copsey","year":"2003","journal-title":"IEEE J. Sel. Top. Quantum Electron."},{"key":"ref_101","first-page":"031007","article-title":"Layered architecture for quantum computing","volume":"2","author":"Jones","year":"2012","journal-title":"Phys. Rev. X"},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MC.2006.4","article-title":"A layered software architecture for quantum computing design tools","volume":"39","author":"Svore","year":"2006","journal-title":"Computer"},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1080\/00107510500293261","article-title":"An introduction to quantum information processing: Applications and realizations","volume":"46","author":"Spiller","year":"2005","journal-title":"Contemp. Phys."},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1126257.1126259","article-title":"Architectural implications of quantum computing technologies","volume":"2","author":"Meter","year":"2006","journal-title":"ACM J. Emerg. Technol. Comput. Syst. (JETC)"},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"771","DOI":"10.1002\/1521-3978(200009)48:9\/11<771::AID-PROP771>3.0.CO;2-E","article-title":"The physical implementation of quantum computation","volume":"48","author":"DiVincenzo","year":"2000","journal-title":"Fortschritte Phys. Prog. Phys."},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Steane, A.M. (2002). Quantum computer architecture for fast entropy extraction. arXiv.","DOI":"10.26421\/QIC2.4-3"},{"key":"ref_107","unstructured":"Steane, A.M. (2004). How to build a 300 bit, 1 giga-operation quantum computer. arXiv."},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"3305","DOI":"10.1073\/pnas.1618020114","article-title":"Experimental comparison of two quantum computing architectures","volume":"114","author":"Linke","year":"2017","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_109","doi-asserted-by":"crossref","unstructured":"Sengupta, K., and Srivastava, P.R. (2021). Quantum algorithm for quicker clinical prognostic analysis: An application and experimental study using CT scan images of COVID-19 patients. BMC Med. Inform. Decis. Mak., 21.","DOI":"10.1186\/s12911-021-01588-6"},{"key":"ref_110","doi-asserted-by":"crossref","first-page":"109440","DOI":"10.1016\/j.asoc.2022.109440","article-title":"A multi-objective quantum-inspired genetic algorithm for workflow healthcare application scheduling with hard and soft deadline constraints in hybrid clouds","volume":"128","author":"Hussain","year":"2022","journal-title":"Appl. Soft Comput."},{"key":"ref_111","unstructured":"(2023, February 18). SEEQC UK Receives 7.99M Grant from Innovate UK to Build Quantum Enhanced Computer for Pharmaceutical R&D|Silicon Canals. Available online: https:\/\/siliconcanals.com\/crowdfunding\/seeqc-uk-receives-7-99m-grant\/."},{"key":"ref_112","unstructured":"Castellanos, S. (2023, January 27). Quantum Computing May Speed Drug Discovery, Biogen Test Suggests. The Wall Street Journal. Available online: https:\/\/www.wsj.com\/articles\/BL-CIOB-12236."},{"key":"ref_113","doi-asserted-by":"crossref","unstructured":"Liu, Z., Liang, X., and Huang, M. (2018, January 20\u201321). Design of Logistic Regression Health Assessment Model Using Novel Quantum PSO. Proceedings of the 2018 IEEE 3rd International Conference on Cloud Computing and Internet of Things (CCIOT), Dalian, China.","DOI":"10.1109\/CCIOT45285.2018.9032494"},{"key":"ref_114","doi-asserted-by":"crossref","unstructured":"Javidi, B. (2015, January 1\u20135). 3D imaging with applications to displays, quantum imaging, optical security, and healthcare. Proceedings of the 2015 14th Workshop on Information Optics (WIO), Kyoto, Japan.","DOI":"10.1109\/WIO.2015.7206892"},{"key":"ref_115","unstructured":"Datta, S., Newell, B., Lamb, J., Tang, Y., Schoettker, P., Santucci, C., Pachta, T.G., Joshi, S., Geman, O., and Vanegas, D.C. (2023, January 27). Aptamers for Detection and Diagnostics (ADD) is a Proposed Mobile App Acquiring Optical Data from Conjugated Quantum Nanodots to Identify Molecules Indicating Presence of SARS-CoV-2 Virus: Why Public Health and Healthcare Need Smartphone Sensors as a Platform for Early Detection and Prevention. ChemRxiv. Available online: https:\/\/chemrxiv.org\/engage\/chemrxiv\/article-details\/617c108926b9c744380acf48."},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Koyama, T., Shibata, N., Kino, S., Sugiyama, A., Akikusa, N., and Matsuura, Y. (2020). A Compact Mid-Infrared Spectroscopy System for Healthcare Applications Based on a Wavelength-Swept, Pulsed Quantum Cascade Laser. Sensors, 20.","DOI":"10.3390\/s20123438"},{"key":"ref_117","doi-asserted-by":"crossref","unstructured":"Naresh, V.S., Nasralla, M.M., Reddi, S., and Garc\u00eda-Magari\u00f1o, I. (2020). Quantum Diffie\u2013Hellman Extended to Dynamic Quantum Group Key Agreement for e-Healthcare Multi-Agent Systems in Smart Cities. Sensors, 20.","DOI":"10.3390\/s20143940"},{"key":"ref_118","first-page":"102832","article-title":"A secure medical image transmission scheme aided by quantum representation","volume":"59","author":"Janani","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_119","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1016\/j.future.2018.03.053","article-title":"Quantum digital signature for the access control of sensitive data in the big data era","volume":"86","author":"Qiu","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"105942","DOI":"10.1016\/j.optlastec.2019.105942","article-title":"Controlled alternate quantum walks based privacy preserving healthcare images in Internet of Things","volume":"124","year":"2020","journal-title":"Opt. Laser Technol."},{"key":"ref_121","first-page":"102673","article-title":"Blockchain and quantum blind signature-based hybrid scheme for healthcare 5.0 applications","volume":"56","author":"Bhavin","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_122","doi-asserted-by":"crossref","first-page":"21075","DOI":"10.1109\/ACCESS.2018.2820603","article-title":"Efficient quantum information hiding for remote medical image sharing","volume":"6","author":"Hossain","year":"2018","journal-title":"IEEE Access"},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"7173","DOI":"10.1007\/s12652-020-02393-1","article-title":"Architectural framework and simulation of quantum key optimization techniques in healthcare networks for data security","volume":"12","author":"Perumal","year":"2021","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_124","first-page":"408","article-title":"Quantum physics principles and communication in the acute healthcare setting: A pilot study","volume":"12","author":"Helgeson","year":"2016","journal-title":"EXPLORE J. Sci. Health"},{"key":"ref_125","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1046\/j.1466-769X.2002.00108.x","article-title":"Modern nursing and modern physics: Does quantum theory contain useful insights for nursing practice and healthcare management?","volume":"3","author":"Hastings","year":"2002","journal-title":"Nurs. Philos."},{"key":"ref_126","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1097\/00005110-199701000-00006","article-title":"Quantum mechanics and the future of healthcare leadership","volume":"27","year":"1997","journal-title":"J. Nurs. Adm."},{"key":"ref_127","doi-asserted-by":"crossref","unstructured":"Latif, S., Qadir, J., Farooq, S., and Imran, M.A. (2017). How 5G wireless (and concomitant technologies) will revolutionize healthcare?. Future Internet, 9.","DOI":"10.3390\/fi9040093"},{"key":"ref_128","unstructured":"Brooks, C. (2021, June 16). Quantum Trends and the Internet of Things. Available online: https:\/\/www.forbes.com\/sites\/cognitiveworld\/2019\/12\/05\/quantum-trends-and-the-internet-of-things\/?sh=148479943eb0."},{"key":"ref_129","unstructured":"Bennett, C.H., and Brassard, G. (2020). Quantum cryptography: Public key distribution and coin tossing. arXiv."},{"key":"ref_130","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","article-title":"Simple proof of security of the BB84 quantum key distribution protocol","volume":"85","author":"Shor","year":"2000","journal-title":"Phys. Rev. Lett."},{"key":"ref_131","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.copbio.2021.10.001","article-title":"Implantable brain machine interfaces: First-in-human studies, technology challenges and trends","volume":"72","author":"Rapeaux","year":"2021","journal-title":"Curr. Opin. Biotechnol."},{"key":"ref_132","doi-asserted-by":"crossref","first-page":"127902","DOI":"10.1103\/PhysRevLett.88.127902","article-title":"Security of quantum key distribution using d-level systems","volume":"88","author":"Cerf","year":"2002","journal-title":"Phys. Rev. Lett."},{"key":"ref_133","doi-asserted-by":"crossref","first-page":"052310","DOI":"10.1103\/PhysRevA.65.052310","article-title":"Security of quantum key distribution with entangled photons against individual attacks","volume":"65","author":"Waks","year":"2002","journal-title":"Phys. Rev. A"},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","article-title":"Quantum key distribution with high loss: Toward global secure communication","volume":"91","author":"Hwang","year":"2003","journal-title":"Phys. Rev. Lett."},{"key":"ref_135","doi-asserted-by":"crossref","first-page":"170502","DOI":"10.1103\/PhysRevLett.93.170502","article-title":"Security of quantum key distribution with coherent states and homodyne detection","volume":"93","author":"Iblisdir","year":"2004","journal-title":"Phys. Rev. Lett."},{"key":"ref_136","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1007\/s00145-005-0011-3","article-title":"A proof of the security of quantum key distribution","volume":"19","author":"Biham","year":"2006","journal-title":"J. Cryptol."},{"key":"ref_137","doi-asserted-by":"crossref","first-page":"230501","DOI":"10.1103\/PhysRevLett.98.230501","article-title":"Device-independent security of quantum cryptography against collective attacks","volume":"98","author":"Brunner","year":"2007","journal-title":"Phys. Rev. Lett."},{"key":"ref_138","doi-asserted-by":"crossref","first-page":"103037","DOI":"10.1088\/1367-2630\/11\/10\/103037","article-title":"Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices","volume":"11","author":"McKague","year":"2009","journal-title":"New J. Phys."},{"key":"ref_139","doi-asserted-by":"crossref","first-page":"023024","DOI":"10.1088\/1367-2630\/12\/2\/023024","article-title":"Security analysis of an untrusted source for quantum key distribution: Passive approach","volume":"12","author":"Zhao","year":"2010","journal-title":"New J. Phys."},{"key":"ref_140","doi-asserted-by":"crossref","first-page":"032337","DOI":"10.1103\/PhysRevA.82.032337","article-title":"Security of quantum key distribution with arbitrary individual imperfections","volume":"82","author":"Lydersen","year":"2010","journal-title":"Phys. Rev. A"},{"key":"ref_141","doi-asserted-by":"crossref","first-page":"010302","DOI":"10.1103\/PhysRevA.84.010302","article-title":"Semi-device-independent security of one-way quantum key distribution","volume":"84","author":"Brunner","year":"2011","journal-title":"PHysical Rev. A"},{"key":"ref_142","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1038\/ncomms1244","article-title":"Secure device-independent quantum key distribution with causally independent measurement devices","volume":"2","author":"Masanes","year":"2011","journal-title":"Nat. Commun."},{"key":"ref_143","doi-asserted-by":"crossref","first-page":"4973","DOI":"10.1109\/TIT.2014.2329417","article-title":"Full security of quantum key distribution from no-signaling constraints","volume":"60","author":"Masanes","year":"2014","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_144","doi-asserted-by":"crossref","first-page":"030502","DOI":"10.1103\/PhysRevLett.110.030502","article-title":"Security of continuous-variable quantum key distribution against general attacks","volume":"110","author":"Leverrier","year":"2013","journal-title":"Phys. Rev. Lett."},{"key":"ref_145","doi-asserted-by":"crossref","first-page":"260501","DOI":"10.1103\/PhysRevLett.109.260501","article-title":"Security of distributed-phase-reference quantum key distribution","volume":"109","author":"Moroder","year":"2012","journal-title":"Phys. Rev. Lett."},{"key":"ref_146","doi-asserted-by":"crossref","first-page":"052328","DOI":"10.1103\/PhysRevA.97.052328","article-title":"Security analysis of orthogonal-frequency-division-multiplexing\u2013based continuous-variable quantum key distribution with imperfect modulation","volume":"97","author":"Zhang","year":"2018","journal-title":"Phys. Rev. A"},{"key":"ref_147","doi-asserted-by":"crossref","first-page":"052327","DOI":"10.1103\/PhysRevA.97.052327","article-title":"Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks","volume":"97","author":"Lupo","year":"2018","journal-title":"Phys. Rev. A"},{"key":"ref_148","first-page":"031007","article-title":"Security of device-independent quantum key distribution in the bounded-quantum-storage model","volume":"3","author":"Pironio","year":"2013","journal-title":"Phys. Rev. X"},{"key":"ref_149","doi-asserted-by":"crossref","first-page":"062302","DOI":"10.1103\/PhysRevA.88.062302","article-title":"Security of two-way quantum key distribution","volume":"88","author":"Beaudry","year":"2013","journal-title":"Phys. Rev. A"},{"key":"ref_150","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1145\/3310974","article-title":"Fully device independent quantum key distribution","volume":"62","author":"Vazirani","year":"2019","journal-title":"Commun. ACM"},{"key":"ref_151","doi-asserted-by":"crossref","first-page":"030301","DOI":"10.1103\/PhysRevA.82.030301","article-title":"Security proof for quantum key distribution using qudit systems","volume":"82","author":"Sheridan","year":"2010","journal-title":"Phys. Rev. A"},{"key":"ref_152","doi-asserted-by":"crossref","first-page":"045024","DOI":"10.1088\/1367-2630\/11\/4\/045024","article-title":"Finite-key analysis for practical implementations of quantum key distribution","volume":"11","author":"Cai","year":"2009","journal-title":"New J. Phys."},{"key":"ref_153","doi-asserted-by":"crossref","first-page":"022332","DOI":"10.1103\/PhysRevA.86.022332","article-title":"Finite-key analysis for measurement-device-independent quantum key distribution","volume":"86","author":"Song","year":"2012","journal-title":"Phys. Rev. A"},{"key":"ref_154","doi-asserted-by":"crossref","first-page":"3732","DOI":"10.1038\/ncomms4732","article-title":"Finite-key analysis for measurement-device-independent quantum key distribution","volume":"5","author":"Curty","year":"2014","journal-title":"Nat. Commun."},{"key":"ref_155","doi-asserted-by":"crossref","first-page":"16971","DOI":"10.1364\/OE.25.016971","article-title":"Finite-key bound for semi-device-independent quantum key distribution","volume":"25","author":"Zhou","year":"2017","journal-title":"Opt. Express"},{"key":"ref_156","doi-asserted-by":"crossref","first-page":"083027","DOI":"10.1088\/1367-2630\/aad839","article-title":"Finite-key security analysis for quantum key distribution with leaky sources","volume":"20","author":"Wang","year":"2018","journal-title":"New J. Phys."},{"key":"ref_157","doi-asserted-by":"crossref","first-page":"010503","DOI":"10.1103\/PhysRevLett.110.010503","article-title":"Memory attacks on device-independent quantum cryptography","volume":"110","author":"Barrett","year":"2013","journal-title":"Phys. Rev. Lett."},{"key":"ref_158","unstructured":"Qi, B., Fung, C.H.F., Lo, H.K., and Ma, X. (2005). Time-shift attack in practical quantum cryptosystems. arXiv."},{"key":"ref_159","doi-asserted-by":"crossref","first-page":"032314","DOI":"10.1103\/PhysRevA.75.032314","article-title":"Phase-remapping attack in practical quantum-key-distribution systems","volume":"75","author":"Fung","year":"2007","journal-title":"Phys. Rev. A"},{"key":"ref_160","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1038\/nphoton.2010.214","article-title":"Hacking commercial quantum cryptography systems by tailored bright illumination","volume":"4","author":"Lydersen","year":"2010","journal-title":"Nat. Photonics"},{"key":"ref_161","doi-asserted-by":"crossref","first-page":"062308","DOI":"10.1103\/PhysRevA.84.062308","article-title":"Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources","volume":"84","author":"Li","year":"2011","journal-title":"Phys. Rev. A"},{"key":"ref_162","first-page":"031006","article-title":"Device-independent quantum key distribution with local Bell test","volume":"3","author":"Lim","year":"2013","journal-title":"Phys. Rev. X"},{"key":"ref_163","doi-asserted-by":"crossref","first-page":"052318","DOI":"10.1103\/PhysRevA.92.052318","article-title":"Device-independent quantum key distribution with generalized two-mode Schr\u00f6dinger cat states","volume":"92","author":"Broadbent","year":"2015","journal-title":"Phys. Rev. A"},{"key":"ref_164","doi-asserted-by":"crossref","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","article-title":"Measurement-device-independent quantum key distribution","volume":"108","author":"Lo","year":"2012","journal-title":"Phys. Rev. Lett."},{"key":"ref_165","doi-asserted-by":"crossref","first-page":"052301","DOI":"10.1103\/PhysRevA.89.052301","article-title":"Continuous-variable measurement-device-independent quantum key distribution","volume":"89","author":"Li","year":"2014","journal-title":"Phys. Rev. A"},{"key":"ref_166","doi-asserted-by":"crossref","first-page":"042335","DOI":"10.1103\/PhysRevA.89.042335","article-title":"Gaussian-modulated coherent-state measurement-device-independent quantum key distribution","volume":"89","author":"Ma","year":"2014","journal-title":"Phys. Rev. A"},{"key":"ref_167","doi-asserted-by":"crossref","first-page":"022313","DOI":"10.1103\/PhysRevA.91.022313","article-title":"Biased decoy-state measurement-device-independent quantum key distribution with finite resources","volume":"91","author":"Zhou","year":"2015","journal-title":"Phys. Rev. A"},{"key":"ref_168","doi-asserted-by":"crossref","first-page":"042307","DOI":"10.1103\/PhysRevA.85.042307","article-title":"Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw","volume":"85","author":"Tamaki","year":"2012","journal-title":"Phys. Rev. A"},{"key":"ref_169","doi-asserted-by":"crossref","first-page":"042328","DOI":"10.1103\/PhysRevA.97.042328","article-title":"Continuous-variable measurement-device-independent quantum key distribution with virtual photon subtraction","volume":"97","author":"Zhao","year":"2018","journal-title":"Phys. Rev. A"},{"key":"ref_170","doi-asserted-by":"crossref","first-page":"042329","DOI":"10.1103\/PhysRevA.97.042329","article-title":"Continuous-variable measurement-device-independent quantum key distribution with photon subtraction","volume":"97","author":"Ma","year":"2018","journal-title":"Phys. Rev. A"},{"key":"ref_171","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/s11128-018-2003-x","article-title":"Fault-tolerant measurement-device-independent quantum key distribution in a decoherence-free subspace","volume":"17","author":"Li","year":"2018","journal-title":"Quantum Inf. Process."},{"key":"ref_172","doi-asserted-by":"crossref","unstructured":"Boyer, M., Kenigsberg, D., and Mor, T. (2007, January 2\u20136). Quantum key distribution with classical Bob. Proceedings of the 2007 First International Conference on Quantum, Nano, and Micro Technologies (ICQNM\u201907), Guadeloupe, France.","DOI":"10.1109\/ICQNM.2007.18"},{"key":"ref_173","doi-asserted-by":"crossref","first-page":"032341","DOI":"10.1103\/PhysRevA.79.032341","article-title":"Semiquantum key distribution","volume":"79","author":"Boyer","year":"2009","journal-title":"Phys. Rev. A"},{"key":"ref_174","doi-asserted-by":"crossref","first-page":"1195","DOI":"10.1142\/S0219749908004353","article-title":"Quantum key distribution with classical Alice","volume":"6","author":"Lu","year":"2008","journal-title":"Int. J. Quantum Inf."},{"key":"ref_175","doi-asserted-by":"crossref","first-page":"052312","DOI":"10.1103\/PhysRevA.79.052312","article-title":"Semiquantum-key distribution using less than four quantum states","volume":"79","author":"Zou","year":"2009","journal-title":"Phys. Rev. A"},{"key":"ref_176","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1016\/j.ipl.2013.03.008","article-title":"Eavesdropping in semiquantum key distribution protocol","volume":"113","author":"Maitra","year":"2013","journal-title":"Inf. Process. Lett."},{"key":"ref_177","doi-asserted-by":"crossref","first-page":"032323","DOI":"10.1103\/PhysRevA.91.032323","article-title":"Mediated semiquantum key distribution","volume":"91","author":"Krawec","year":"2015","journal-title":"Phys. Rev. A"},{"key":"ref_178","doi-asserted-by":"crossref","first-page":"2981","DOI":"10.1007\/s11128-015-1015-z","article-title":"Semiquantum key distribution without invoking the classical party\u2019s measurement capability","volume":"14","author":"Zou","year":"2015","journal-title":"Quantum Inf. Process."},{"key":"ref_179","doi-asserted-by":"crossref","first-page":"1700206","DOI":"10.1002\/andp.201700206","article-title":"Mediated Semi-Quantum Key Distribution Without Invoking Quantum Measurement","volume":"530","author":"Liu","year":"2018","journal-title":"Ann. Phys."},{"key":"ref_180","unstructured":"Sun, Z., Du, R., and Long, D. (2011). Semi-quantum key distribution protocol using Bell state. arXiv."},{"key":"ref_181","doi-asserted-by":"crossref","first-page":"100301","DOI":"10.1088\/0256-307X\/28\/10\/100301","article-title":"Semiquantum key distribution using entangled states","volume":"28","author":"Jian","year":"2011","journal-title":"Chin. Phys. Lett."},{"key":"ref_182","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1007\/s11128-014-0740-z","article-title":"Authenticated semi-quantum key distribution protocol using Bell states","volume":"13","author":"Yu","year":"2014","journal-title":"Quantum Inf. Process."},{"key":"ref_183","doi-asserted-by":"crossref","first-page":"19898","DOI":"10.1038\/srep19898","article-title":"Semiquantum key distribution with secure delegated quantum computation","volume":"6","author":"Li","year":"2016","journal-title":"Sci. Rep."},{"key":"ref_184","doi-asserted-by":"crossref","first-page":"1850012","DOI":"10.1142\/S0219749918500120","article-title":"Measurement-device-independent semiquantum key distribution","volume":"16","author":"He","year":"2018","journal-title":"Int. J. Quantum Inf."},{"key":"ref_185","doi-asserted-by":"crossref","first-page":"3621","DOI":"10.1007\/s10773-018-3875-3","article-title":"Semi-quantum key distribution protocols with GHZ states","volume":"57","author":"Zhu","year":"2018","journal-title":"Int. J. Theor. Phys."},{"key":"ref_186","doi-asserted-by":"crossref","first-page":"2417","DOI":"10.1007\/s11128-014-0802-2","article-title":"Restricted attacks on semi-quantum key distribution protocols","volume":"13","author":"Krawec","year":"2014","journal-title":"Quantum Inf. Process."},{"key":"ref_187","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1007\/s11128-014-0872-1","article-title":"Trojan-horse attacks on quantum key distribution with classical Bob","volume":"14","author":"Yang","year":"2015","journal-title":"Quantum Inf. Process."},{"key":"ref_188","doi-asserted-by":"crossref","first-page":"2067","DOI":"10.1007\/s11128-016-1266-3","article-title":"Security of a semi-quantum protocol where reflections contribute to the secret key","volume":"15","author":"Krawec","year":"2016","journal-title":"Quantum Inf. Process."},{"key":"ref_189","doi-asserted-by":"crossref","first-page":"062335","DOI":"10.1103\/PhysRevA.96.062335","article-title":"Experimentally feasible protocol for semiquantum key distribution","volume":"96","author":"Boyer","year":"2017","journal-title":"Phys. Rev. A"},{"key":"ref_190","doi-asserted-by":"crossref","first-page":"1754","DOI":"10.1007\/s11227-017-2222-4","article-title":"Big data analytics enhanced healthcare systems: A review","volume":"76","author":"Shafqat","year":"2020","journal-title":"J. Supercomput."},{"key":"ref_191","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1016\/j.inffus.2020.06.008","article-title":"A smart healthcare monitoring system for heart disease prediction based on ensemble deep learning and feature fusion","volume":"63","author":"Ali","year":"2020","journal-title":"Inf. Fusion"},{"key":"ref_192","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3467982","article-title":"Quantum machine learning algorithm for knowledge graphs","volume":"2","author":"Ma","year":"2021","journal-title":"ACM Trans. Quantum Comput."},{"key":"ref_193","unstructured":"Chehimi, M., Chaccour, C., and Saad, W. (2022). Quantum Semantic Communications: An Unexplored Avenue for Contextual Networking. arXiv."},{"key":"ref_194","first-page":"463","article-title":"The potential of quantum computing and machine learning to advance clinical research and change the practice of medicine","volume":"115","author":"Solenov","year":"2018","journal-title":"Mo. Med."},{"key":"ref_195","unstructured":"Sutskever, I., Hinton, G.E., and Taylor, G.W. (2009, January 7\u201310). The recurrent temporal restricted Boltzmann machine. Proceedings of the Advances in Neural Information Processing Systems, Vancouver, BC, Canada."},{"key":"ref_196","doi-asserted-by":"crossref","first-page":"31","DOI":"10.3389\/fgene.2018.00031","article-title":"Digital twins in health care: Ethical implications of an emerging engineering paradigm","volume":"9","author":"Bruynseels","year":"2018","journal-title":"Front. Genet."},{"key":"ref_197","doi-asserted-by":"crossref","first-page":"106043","DOI":"10.1016\/j.compbiomed.2022.106043","article-title":"Explainable, trustworthy, and ethical machine learning for healthcare: A survey","volume":"149","author":"Rasheed","year":"2022","journal-title":"Comput. Biol. Med."},{"key":"ref_198","unstructured":"Cleveland Clinic (2023, January 27). Cleveland Clinic and IBM Begin Installation of IBM Quantum System One. Cleaveland Clin. Newsroom. Available online: https:\/\/newsroom.ibm.com\/2022-10-18-Cleveland-Clinic-and-IBM-Begin-Installation-of-IBM-Quantum-System-One."},{"key":"ref_199","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1007\/s42354-021-0330-z","article-title":"Cloud based QC with Amazon Braket","volume":"5","author":"Gonzalez","year":"2021","journal-title":"Digit. Welt"},{"key":"ref_200","doi-asserted-by":"crossref","first-page":"240502","DOI":"10.1103\/PhysRevLett.94.240502","article-title":"Protocol for universal gates in optimally biased superconducting qubits","volume":"94","author":"Rigetti","year":"2005","journal-title":"Phys. Rev. Lett."},{"key":"ref_201","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1177\/002200278002400101","article-title":"Effective choice in the prisoner\u2019s dilemma","volume":"24","author":"Axelrod","year":"1980","journal-title":"J. Confl. Resolut."},{"key":"ref_202","unstructured":"Pardalos, P.M., Migdalas, A., and Pitsoulis, L. (2008). Pareto Optimality, Game Theory and Equilibria, Springer Science & Business Media."},{"key":"ref_203","first-page":"1347","article-title":"Do people play Nash equilibrium? Lessons from evolutionary game theory","volume":"36","author":"Mailath","year":"1998","journal-title":"J. Econ. Lit."},{"key":"ref_204","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1109\/RBME.2020.3013489","article-title":"Secure and Robust Machine Learning for Healthcare: A Survey","volume":"14","author":"Qayyum","year":"2020","journal-title":"IEEE Rev. Biomed. Eng."},{"key":"ref_205","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1109\/COMST.2020.2975048","article-title":"Securing connected & autonomous vehicles: Challenges posed by adversarial machine learning and the way forward","volume":"22","author":"Qayyum","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_206","doi-asserted-by":"crossref","unstructured":"Qayyum, A., Ijaz, A., Usama, M., Iqbal, W., Qadir, J., Elkhatib, Y., and Al-Fuqaha, A. (2020). Securing Machine Learning in the Cloud: A Systematic Review of Cloud Machine Learning Security. Front. Big Data, 3.","DOI":"10.3389\/fdata.2020.587139"},{"key":"ref_207","unstructured":"(2022, October 23). Business Wire. D-Wave Launches in AWS Marketplace. Available online: https:\/\/www.businesswire.com\/news\/home\/20221021005086\/en\/D-Wave-Launches-in-AWS-Marketplace."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/15\/3\/94\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,7]],"date-time":"2023-12-07T23:01:56Z","timestamp":1701990116000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/15\/3\/94"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,27]]},"references-count":207,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,3]]}},"alternative-id":["fi15030094"],"URL":"https:\/\/doi.org\/10.3390\/fi15030094","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,27]]}}}