Quantum Adversarial Machine Learning: From Classical Adaptations to Quantum-Native Methods
Pith reviewed 2026-05-20 22:23 UTC · model grok-4.3
The pith
Quantum adversarial machine learning studies vulnerabilities in quantum ML models along with attacks and quantum-enhanced defenses.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
Given recent advancements in quantum computing and machine learning, the quantum adversarial machine learning field has emerged to study the vulnerabilities of quantum machine learning, possible attacks, and novel quantum-enhanced defense strategies; the survey supplies a detailed overview of these attacks, countermeasures, theoretical underpinnings, emerging trends, and critical challenges.
What carries the argument
A structured literature review that organizes attacks on quantum machine learning models and the corresponding quantum-enhanced countermeasures.
If this is right
- Researchers gain a map of known attack vectors that can guide development of more robust quantum classifiers and generative models.
- Quantum-native defense strategies become candidates for implementation once hardware supports deeper circuits.
- Identified critical challenges point to concrete directions for future theoretical and experimental work in the area.
Where Pith is reading between the lines
- As quantum devices grow in size and fidelity, adversarial robustness may become a standard evaluation metric alongside accuracy.
- Hybrid classical-quantum defense pipelines could emerge by combining the surveyed quantum methods with established classical techniques.
- Standardized benchmark datasets and attack suites for quantum ML would help compare the effectiveness of the reviewed countermeasures.
Load-bearing premise
The current body of literature on quantum adversarial machine learning is mature enough to support a detailed and representative overview of attacks, countermeasures, and challenges.
What would settle it
A major new attack type, defense method, or body of unpublished work that the survey omits or that shows the field remains too immature for a comprehensive review.
read the original abstract
Machine learning has revolutionized numerous industrial domains. Despite recent advances, machine learning models remain vulnerable to adversarial threats. Adversarial machine learning is a field that studies these vulnerabilities to build robust machine learning models. Quantum machine learning is an interdisciplinary field that bridges quantum computing and classical machine learning. While quantum machine learning shows potentials to outperform classical machine learning in complex tasks such as regression, classification, and generative modeling, it remains vulnerable to adversarial attacks. Given the recent advancements in quantum computing and machine learning, the quantum adversarial machine learning field has emerged to study the vulnerabilities of quantum machine learning, possible attacks, and novel quantum-enhanced defense strategies. In this survey, we provide a detailed overview on quantum adversarial machine learning and explore the existing attacks and countermeasures. We also review the theoretical underpinnings of this area, emerging trends, and critical challenges.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. This manuscript is a survey on the emerging field of quantum adversarial machine learning. It reviews vulnerabilities of quantum machine learning models, catalogs attacks adapted from classical adversarial ML as well as quantum-native threats, examines defense strategies including quantum-enhanced countermeasures, and discusses theoretical underpinnings, trends, and open challenges.
Significance. If the coverage is representative, the survey would be a useful consolidation for an interdisciplinary area that is still forming. It could help researchers map the landscape of attacks on variational quantum circuits and quantum kernels, identify gaps between classical adaptations and truly quantum-native methods, and highlight directions for robust quantum ML. The value hinges on whether the reviewed literature forms a balanced sample of the limited but growing body of work.
major comments (1)
- [Abstract and §1] Abstract and §1: The central claim that the paper supplies a 'detailed overview' of attacks, countermeasures, theoretical underpinnings, trends, and challenges rests on an unstated literature-review protocol. No search strategy, databases, keywords, inclusion/exclusion criteria, or cutoff date are provided. In an explicitly 'emerging' field with sparse prior literature, this omission makes it impossible to assess whether important works on quantum-specific gradient attacks, circuit poisoning, or variational defenses have been omitted or over-weighted, directly affecting the reliability of the synthesis.
minor comments (1)
- The distinction between 'classical adaptations' and 'quantum-native methods' is introduced but not consistently applied when classifying individual attacks and defenses; a clear taxonomy table would improve readability.
Simulated Author's Rebuttal
We thank the referee for the constructive feedback and positive evaluation of the manuscript's potential utility in consolidating this emerging interdisciplinary area. We address the major comment below and will revise the manuscript to improve transparency.
read point-by-point responses
-
Referee: [Abstract and §1] Abstract and §1: The central claim that the paper supplies a 'detailed overview' of attacks, countermeasures, theoretical underpinnings, trends, and challenges rests on an unstated literature-review protocol. No search strategy, databases, keywords, inclusion/exclusion criteria, or cutoff date are provided. In an explicitly 'emerging' field with sparse prior literature, this omission makes it impossible to assess whether important works on quantum-specific gradient attacks, circuit poisoning, or variational defenses have been omitted or over-weighted, directly affecting the reliability of the synthesis.
Authors: We agree that explicitly documenting the literature review protocol would strengthen the survey, especially given the field's emerging nature and limited body of work. In the revised version, we will add a dedicated paragraph (or short subsection) early in Section 1 that describes our review methodology. This will specify: the databases and repositories searched (arXiv, Google Scholar, IEEE Xplore, and proceedings from quantum computing venues such as QIP and AQIS); the primary keywords and Boolean combinations used (e.g., 'quantum adversarial machine learning', 'adversarial attacks on variational quantum circuits', 'quantum kernel robustness', 'quantum-native attacks'); the inclusion criteria (peer-reviewed articles and preprints that directly examine vulnerabilities, attacks, or defenses in quantum machine learning models, including both classical adaptations and quantum-specific methods); the exclusion criteria (purely classical adversarial ML papers without quantum components, or works focused solely on quantum advantage without adversarial considerations); and the literature cutoff date. We will also briefly note how we handled the sparse literature to avoid over- or under-representation. This addition will enable readers to evaluate coverage of topics such as quantum-specific gradient attacks, circuit poisoning, and variational defenses. We will cross-check the current references against these criteria and incorporate any qualifying works that were inadvertently omitted. revision: yes
Circularity Check
Survey aggregates prior literature with no internal derivations or self-referential steps
full rationale
This paper is a literature survey on quantum adversarial machine learning. It reviews existing attacks, countermeasures, theoretical underpinnings, trends, and challenges by citing prior works rather than deriving new results from its own equations or assumptions. No predictions, fitted parameters, uniqueness theorems, or ansatzes are introduced that could reduce to the paper's inputs by construction. The overview claim rests on synthesis of external references, making the structure self-contained against external benchmarks with no circularity.
Axiom & Free-Parameter Ledger
Reference graph
Works this paper leans on
- [1]
-
[2]
N. Pitropakis, E. Panaousis, T. Giannetsos, E. Anastasiadis, G. Loukas, A taxonomy and survey of attacks against machine learning. Computer Science Review34, 100199 (2019) 45
work page 2019
-
[3]
Adversarial Machine Learning at Scale
A. Kurakin, I. Goodfellow, S. Bengio, Adversarial machine learning at scale. arXiv preprint arXiv:1611.01236 (2016)
work page internal anchor Pith review Pith/arXiv arXiv 2016
-
[4]
D. Kaur, S. Uslu, K.J. Rittichier, A. Durresi, Trustworthy artificial intelligence: a review. ACM computing surveys (CSUR)55(2), 1–38 (2022)
work page 2022
-
[5]
A. Vashagh, R. Razavi-Far, M. Meymani, B. Biggio, Recent advances in adversarial attacks on model utility, privacy, and explainability: A comprehensive survey. Authorea Preprints (2026)
work page 2026
-
[6]
M. Meymani, R. Razavi-Far, Divided we fall: Defending against adversarial attacks via soft-gated fractional mixture-of-experts with randomized adversarial training. Information Sciences p. 123427 (2026)
work page 2026
-
[7]
Leading ai progress: Policy insights and a u.s
Bipartisan House Task Force on Artificial Intelligence. Leading ai progress: Policy insights and a u.s. vision for ai adoption, responsible innovation, and governance (2024). URL https://obernolte.house. gov/AITFReport. Report of the Bipartisan House AI Task Force, 118th Congress
work page 2024
-
[8]
D. Kusnezov, Y. Barsoum, E. Begoli, A. Henninger, A. Sadovnik. Risks and mitigation strategies for adversarial artificial intelligence threats: A dhs s&t study preparedness series (2023)
work page 2023
-
[9]
R. Rietsche, C. Dremel, S. Bosch, L. Steinacker, M. Meckel, J.M. Leimeister, Quantum computing. Electronic Markets32(4), 2525–2536 (2022)
work page 2022
-
[10]
K. Sooksatra, P. Rivas, J. Orduz,Evaluating accuracy and adversarial robustness of quanvolutional neural networks, in2021 International conference on computational science and computational intelligence (CSCI)(IEEE, 2021), pp. 152–157
work page 2021
- [11]
-
[12]
N. Franco, A. Sakhnenko, L. Stolpmann, D. Thuerck, F. Petsch, A. R¨ ull, J.M. Lorenz,Predominant aspects on security for quantum machine learning: Literature review, in2024 IEEE International Conference on Quantum Computing and Engineering (QCE), vol. 1 (IEEE, 2024), pp. 1467–1477
work page 2024
- [13]
-
[14]
S. Lu, L.M. Duan, D.L. Deng, Quantum adversarial machine learning. Phys. Rev. Res.2, 033212 (2020). https://doi.org/10.1103/PhysRevResearch.2.033212. URL https://link.aps.org/doi/10.1103/ PhysRevResearch.2.033212
-
[15]
H.F. Zhang, Z.Y. Chen, P. Wang, L.L. Guo, T.L. Wang, X.Y. Yang, ..., G.P. Guo. Experimental robustness benchmark of quantum neural network on a superconducting quantum processor (2025)
work page 2025
-
[16]
J. Tian, X. Sun, Y. Du, S. Zhao, Q. Liu, K. Zhang, W. Yi, W. Huang, C. Wang, X. Wu, et al., Recent advances for quantum neural networks in generative learning. IEEE Transactions on Pattern Analysis and Machine Intelligence45(10), 12321–12340 (2023)
work page 2023
-
[17]
T. Xiao, X. Zhai, X. Wu, J. Fan, G. Zeng, Practical advantage of quantum machine learning in ghost imaging. Communications Physics6(1), 171 (2023)
work page 2023
-
[18]
Z. Tian, L. Cui, J. Liang, S. Yu, A comprehensive survey on poisoning attacks and countermeasures in machine learning. ACM Computing Surveys55(8), 1–35 (2022)
work page 2022
-
[19]
D. Arias, I. Garc´ ıa Rodr´ ıguez de Guzm´ an, M. Rodr´ ıguez, E.B. Terres, B. Sanz, J. Gaviria de la Puerta, I. Pastor, A. Zubillaga, P. Garc´ ıa Bringas, Let’s do it right the first time: Survey on security concerns in the way to quantum software engineering (2023). Appears in Communications in Computer and Information Science, vol 1851
work page 2023
-
[20]
D. Edwards, D.B. Rawat,Quantum Adversarial Machine Learning: Status, Challenges and Perspec- tives, in2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)(2020), pp. 128–133. https://doi.org/10.1109/TPS-ISA50397. 2020.00028 46
-
[21]
C. Xu, F. Erata, J. Szefer. Classification of quantum computer fault injection attacks (2023)
work page 2023
-
[22]
Quantum Adversarial Machine Learning and Defense Strategies: Challenges and Opportunities
E. Yocam, A. Rizi, M. Kamepalli, V. Vaidyan, Y. Wang, G. Comert, Quantum adversarial machine learning and defense strategies: Challenges and opportunities. arXiv preprint arXiv:2412.12373 (2024)
work page internal anchor Pith review Pith/arXiv arXiv 2024
-
[23]
H. Xu, T. Xiao, J. Huang, M. He, J. Fan, G. Zeng, Toward heisenberg limit without critical slowing down via quantum reinforcement learning. Physical Review Letters134(12), 120803 (2025)
work page 2025
-
[24]
T. Xiao, J. Huang, H. Li, J. Fan, G. Zeng, Quantum generative adversarial imitation learning. New Journal of Physics25(3), 033034 (2023)
work page 2023
-
[25]
S.T. Marella, H.S.K. Parisa, Introduction to quantum computing. Quantum Computing and Communications p. 61 (2020)
work page 2020
-
[26]
E. Chae, J. Choi, J. Kim, An elementary review on basic principles and developments of qubits for quantum computing. Nano Convergence11(1), 11 (2024)
work page 2024
-
[27]
M.A. Khan, S. Ghafoor, S.M.H. Zaidi, H. Khan, A. Ahmad, From quantum communication fun- damentals to decoherence mitigation strategies: Addressing global quantum network challenges and projected applications. Heliyon10(14) (2024)
work page 2024
- [28]
-
[29]
E. Mu˜ noz-Coreas, H. Thapliyal, Everything you always wanted to know about quantum circuits. arXiv preprint arXiv:2208.11725 (2022)
- [30]
-
[31]
Schlosshauer, Quantum decoherence
M. Schlosshauer, Quantum decoherence. Physics Reports831, 1–57 (2019)
work page 2019
-
[32]
M. Kjaergaard, M.E. Schwartz, J. Braum¨ uller, P. Krantz, J.I.J. Wang, S. Gustavsson, W.D. Oliver, Superconducting qubits: Current state of play. Annual Review of Condensed Matter Physics11(1), 369–395 (2020)
work page 2020
- [33]
- [34]
- [35]
-
[36]
S. Upadhyay, S. Ghosh,Quantum quandaries: Unraveling encoding vulnerabilities in quantum neu- ral networks, in2025 26th International Symposium on Quality Electronic Design (ISQED)(IEEE, 2025), pp. 1–7
work page 2025
-
[37]
J.R. McClean, S. Boixo, V.N. Smelyanskiy, R. Babbush, H. Neven, Barren plateaus in quantum neural network training landscapes. Nature communications9(1), 4812 (2018)
work page 2018
-
[38]
I. Kerenidis, J. Landman, A. Luongo, A. Prakash, q-means: A quantum algorithm for unsupervised machine learning. Advances in neural information processing systems32(2019)
work page 2019
-
[39]
A. Poggiali, A. Berti, A. Bernasconi, G.M. Del Corso, R. Guidotti, Quantum clustering with k-means: A hybrid approach. Theoretical Computer Science992, 114466 (2024)
work page 2024
- [40]
- [41]
-
[42]
S. Li, Y. Fan, X. Li, X. Ruan, Q. Zhao, Z. Peng, R.B. Wu, J. Zhang, P. Song, Robust quantum control using reinforcement learning from demonstration. npj Quantum Information11(1), 124 (2025)
work page 2025
-
[43]
W. Li, D.L. Deng, Recent advances for quantum classifiers. Science China Physics, Mechanics & Astronomy65(2), 220301 (2022)
work page 2022
-
[44]
W. Li, Z.d. Lu, D.L. Deng, Quantum neural network classifiers: A tutorial. SciPost Physics Lecture Notes p. 061 (2022)
work page 2022
-
[45]
S.Y. Huang, W.J. An, D.S. Zhang, N.R. Zhou, Image classification and adversarial robustness anal- ysis based on hybrid quantum–classical convolutional neural network. Optics Communications533, 129287 (2023)
work page 2023
-
[46]
T.G. Tan, J. Zhou, V. Sharma, S.P. Mohanty, Post-quantum adversarial modeling: A user’s perspective. Computer56(8), 58–67 (2023)
work page 2023
-
[47]
S. Darzi, A.A. Yavuz, Pqc meets ml or ai: Exploring the synergy of machine learning and post- quantum cryptography. Authorea Preprints (2024)
work page 2024
- [48]
-
[49]
D.K. Kejriwal, A. Goel, A. Sharma, Advancing adversarial robustness in cybersecurity: Gradient-free attacks and quantum-inspired defenses for machine learning models. Journal of Innovative Science and Research Technology10(4), 54–65 (2025)
work page 2025
-
[50]
K.C. Tseng, W.C. Lai, W.C. Huang, Y.C. Chang, S. Zeadally, Ai threats: Adversarial examples with a quantum-inspired algorithm. IEEE Consumer Electronics Magazine (2024)
work page 2024
-
[51]
F. Marchiori, M. Conti,ATTAQ: Adversarial Robustness of Quantum Machine Learning, in 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)(IEEE, 2025), pp. 200–207
work page 2025
-
[52]
N. Liu, P. Wittek, Vulnerability of quantum classification to adversarial perturbations. Physical Review A101(6), 062331 (2020)
work page 2020
-
[53]
B. Li, T. Alpcan, C. Thapa, U. Parampalli, Computable model-independent bounds for adversarial quantum machine learning. IEEE Transactions on Quantum Engineering (2025). Forthcoming
work page 2025
-
[54]
P. Georgiou, A.M. Thomas, S.T. Jose, O. Simeone. On the generalization of adversarially trained quantum classifiers (2025)
work page 2025
-
[55]
W. Ren, W. Li, S. Xu, K. Wang, W. Jiang, F. Jin, X. Zhu, J. Chen, Z. Song, P. Zhang, et al. Experimental quantum adversarial learning with programmable superconducting qubits (2022)
work page 2022
-
[56]
G. Montalbano, L. Banchi, Quantum adversarial learning for kernel methods. Quantum Machine Intelligence7(1), 15 (2025)
work page 2025
- [57]
- [58]
-
[59]
J. Shi, Z. Xiao, H. Shi, Y. Jiang, X. Li. QuanTest: Entanglement-guided testing of quantum neural network systems (2024)
work page 2024
-
[60]
X. Liu, L. Xie, Y. Wang, J. Zou, J. Xiong, Z. Ying, A. Vasilakos. Privacy and security issues in deep learning: a survey. ieee access 9: 4566–4593 (2021)
work page 2021
-
[61]
Explaining and Harnessing Adversarial Examples
I.J. Goodfellow, J. Shlens, C. Szegedy, Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014) 48
work page internal anchor Pith review Pith/arXiv arXiv 2014
-
[62]
Towards Deep Learning Models Resistant to Adversarial Attacks
A. Madry, A. Makelov, L. Schmidt, D. Tsipras, A. Vladu, Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)
work page internal anchor Pith review Pith/arXiv arXiv 2017
-
[63]
W. El Maouaki, A. Marchisio, T. Said, M. Shafique, M. Bennai. RobQuNNs: A methodology for robust quanvolutional neural networks against adversarial attacks (2024)
work page 2024
- [64]
-
[65]
G. Papadopoulos, S. Eloul, Y. Satsangi, J. Heredge, N. Kumar, C.F. Chen, M. Pistoia, A numerical gradient inversion attack in variational quantum neural-networks. arXiv preprint arXiv:2504.12806 (2025)
-
[66]
A. Jin, T. Dutta, A.T. Ngo, A. Chattopadhyay, M. Mukherjee. Realizing quantum adversarial defense on a trapped-ion quantum processor (2025)
work page 2025
-
[67]
N. Wiebe, R.S. Kumar. Hardening quantum machine learning against adversaries (2017)
work page 2017
-
[68]
M.S.H. Onim, H. Thapliyal. Detection of physiological data tampering attacks with quantum machine learning (2025)
work page 2025
- [69]
- [70]
- [71]
-
[72]
M.S. Akter, H. Shahriar, I. Iqbal, M. Hossain, M. Karim, V. Clincy, R. Voicu,Exploring the vulnera- bilities of machine learning and quantum machine learning to adversarial attacks using a malware dataset: a comparative analysis, in2023 IEEE International Conference on Software Services Engineering (SSE)(IEEE, 2023), pp. 222–231
work page 2023
-
[73]
Y. Wu, E. Adermann, C. Thapa, S. Camtepe, H. Suzuki, M. Usman. Radio signal classification by adversarially robust quantum machine learning (2023)
work page 2023
-
[74]
M. Wendlinger, K. Tscharke, P. Debus. A comparative analysis of adversarial robustness for quantum and classical machine learning models (2024)
work page 2024
- [75]
-
[76]
O.J. Tiwo, Quantum machine learning for secure financial forecasting: Mitigating data breaches and adversarial exploits. Asian Journal of Research in Computer Science18(4), 154–175 (2025)
work page 2025
-
[77]
W. El Maouaki, A. Marchisio, T. Said, M. Bennai, M. Shafique. AdvQuNN: A methodology for analyzing the adversarial robustness of quanvolutional neural networks (2024)
work page 2024
-
[78]
E. Wang, H. Chaine, X. Wang, A. Ray, T. Wooldridge,Defending Quantum Neural Networks Against Adversarial Attacks with Homomorphic Data Encryption, in2023 International Conference on Computational Science and Computational Intelligence (CSCI)(IEEE, 2023), pp. 816–822
work page 2023
-
[79]
A. Kurakin, I.J. Goodfellow, S. Bengio, Adversarial examples in the physical world pp. 99–112 (2018)
work page 2018
-
[80]
D. Winderl, N. Franco, J.M. Lorenz. Quantum neural networks under depolarization noise: Exploring white-box attacks and defenses (2023) 49
work page 2023
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.