{"id":6438,"date":"2025-10-20T22:15:15","date_gmt":"2025-10-21T02:15:15","guid":{"rendered":"https:\/\/lincslab.ca\/?p=6438"},"modified":"2026-04-24T14:43:08","modified_gmt":"2026-04-24T18:43:08","slug":"quantum-gans-for-smarter-network-anomaly-detection","status":"publish","type":"post","link":"https:\/\/lincslab.ca\/en\/quantum-gans-for-smarter-network-anomaly-detection\/","title":{"rendered":"Quantum GANs for Smarter Network Anomaly Detection"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6438\" class=\"elementor elementor-6438\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f624551 e-flex e-con-boxed e-con e-parent\" data-id=\"f624551\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1167b8c elementor-widget elementor-widget-spacer\" data-id=\"1167b8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a0c727f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a0c727f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bef6500\" data-id=\"bef6500\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e1484c elementor-widget elementor-widget-heading\" data-id=\"7e1484c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Quantum GANs for Smarter Network Anomaly Detection<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc6cc67 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"fc6cc67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-795fffa e-flex e-con-boxed e-con e-parent\" data-id=\"795fffa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0f42cb7 e-con-full e-flex e-con e-child\" data-id=\"0f42cb7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-028606b elementor-widget elementor-widget-text-editor\" data-id=\"028606b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As modern communication networks grow in complexity, traditional anomaly detection techniques face challenges in identifying sophisticated threats such as distributed denial-of-service (DDoS) or stealth attacks. In our latest study, we explore how <strong data-start=\"685\" data-end=\"713\">quantum machine learning<\/strong> can offer a new frontier for cybersecurity analytics.<\/p><p>In our recent paper, &#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/11059562\"><span style=\"text-decoration: underline;\">Enhancing Network Anomaly Detection with Quantum GANs and Successive Data Injection for Multivariate Time Series<\/span><\/a>&#8221; [<a href=\"https:\/\/arxiv.org\/pdf\/2505.11631\">arXiv<\/a>], <strong data-start=\"167\" data-end=\"199\">Hammami, Cherkaoui, and Wang<\/strong> present a <strong data-start=\"782\" data-end=\"831\">Quantum Generative Adversarial Network (QGAN)<\/strong> designed for detecting anomalies in <strong data-start=\"868\" data-end=\"909\">multivariate network time-series data<\/strong>. The model integrates <strong data-start=\"932\" data-end=\"964\">variational quantum circuits<\/strong>, <strong data-start=\"966\" data-end=\"987\">data re-uploading<\/strong>, and a novel <strong data-start=\"1001\" data-end=\"1038\">Successive Data Injection (SuDaI)<\/strong> technique that efficiently maps high-dimensional classical data into quantum states\u2014overcoming current hardware limits such as the small number of available qubits.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8bbab25 e-con-full e-flex e-con e-child\" data-id=\"8bbab25\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-646e828 e-con-full e-flex e-con e-child\" data-id=\"646e828\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e564db elementor-widget elementor-widget-image\" data-id=\"3e564db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1794\" height=\"449\" src=\"https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/10\/insight2_discriminator.png\" class=\"attachment-full size-full wp-image-6449\" alt=\"\" srcset=\"https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/10\/insight2_discriminator.png 1794w, https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/10\/insight2_discriminator-300x75.png 300w, https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/10\/insight2_discriminator-1024x256.png 1024w, https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/10\/insight2_discriminator-768x192.png 768w, https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/10\/insight2_discriminator-1536x384.png 1536w, https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/10\/insight2_discriminator-18x5.png 18w\" sizes=\"(max-width: 1794px) 100vw, 1794px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91b60a5 elementor-widget elementor-widget-text-editor\" data-id=\"91b60a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong data-start=\"310\" data-end=\"355\">Figure 1 \u2014 Quantum Discriminator Circuit.<\/strong><br data-start=\"355\" data-end=\"358\"><i>The discriminator circuit used in the proposed Quantum GAN architecture for network anomaly detection. It evaluates generated samples against real multivariate time-series data to guide the generator toward realistic outputs.<\/i><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4ddb919 e-grid e-con-boxed e-con e-parent\" data-id=\"4ddb919\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5364cf4 e-con-full e-flex e-con e-child\" data-id=\"5364cf4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0b43060 elementor-widget elementor-widget-text-editor\" data-id=\"0b43060\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1205\" data-end=\"1612\">Trained on the <strong data-start=\"1220\" data-end=\"1238\">CIC-CIDDS-2018<\/strong> dataset, the proposed model achieves <strong data-start=\"1276\" data-end=\"1292\">99% accuracy<\/strong> and an <strong data-start=\"1300\" data-end=\"1320\">F1-score of 0.98<\/strong>, matching the performance of deep learning models that use thousands of parameters while requiring only <strong data-start=\"1425\" data-end=\"1452\">80 trainable parameters<\/strong>. Even under simulated quantum noise, the QGAN maintained robust performance, highlighting its potential for real-world deployment on near-term quantum devices.<\/p><p data-start=\"1614\" data-end=\"1835\">This research demonstrates that quantum-enhanced learning can deliver compact, efficient, and resilient models for <strong data-start=\"1729\" data-end=\"1766\">network security in 6G and beyond<\/strong>, opening the door to hybrid quantum\u2013classical cybersecurity systems.<\/p><p data-start=\"1614\" data-end=\"1835\"><em>Authors: Wajdi Hammami, Soumaya Cherkaoui, and Shengrui Wang (Polytechnique Montr\u00e9al, Universit\u00e9 de Sherbrooke).<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4ce9a58 e-con-full e-flex e-con e-parent\" data-id=\"4ce9a58\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f619d71 e-con-full e-flex e-con e-child\" data-id=\"f619d71\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-13d5142 elementor-widget elementor-widget-html\" data-id=\"13d5142\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/lincslab.ca\/en\/quantum-gans-for-smarter-network-anomaly-detection\/\" \n   target=\"_blank\" \n   rel=\"noopener noreferrer\">\n  <button style=\"padding: 10px 16px; background-color: #0A66C2; color: white; border: none; border-radius: 4px; cursor: pointer;\">\n    Share on LinkedIn \u2197\ufe0f\n  <\/button>\n<\/a>\n\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>As modern communication networks grow in complexity, traditional anomaly detection techniques face challenges in identifying sophisticated threats such as distributed denial-of-service (DDoS) or stealth attacks. In our latest study, we explore how quantum machine learning can offer a new frontier for cybersecurity analytics.<\/p>\n<p>In our recent paper, &#8220;Enhancing Network Anomaly Detection with Quantum GANs and Successive Data Injection for Multivariate Time Series&#8221;<\/p>\n","protected":false},"author":25,"featured_media":6735,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[174,17],"tags":[81,110,105,108,112,114,109,111,107,104,106,103,113,102],"class_list":["post-6438","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-home","category-insights","tag-accuracy","tag-anomaly-detection","tag-computer-architecture","tag-generative-adversarial-networks","tag-generative-adversarial-networks-gans","tag-network-security","tag-quantum-circuit","tag-quantum-computing","tag-quantum-state","tag-qubit","tag-telecommunication-traffic","tag-time-series-analysis","tag-variational-quantum-circuits-vqcs","tag-wireless-communication"],"rttpg_featured_image_url":{"full":["https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/10\/insight2_discriminator-1.png",1794,449,false],"landscape":["https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/10\/insight2_discriminator-1.png",1794,449,false],"portraits":["https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/10\/insight2_discriminator-1.png",1794,449,false],"thumbnail":["https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/10\/insight2_discriminator-1-150x150.png",150,150,true],"medium":["https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/10\/insight2_discriminator-1-300x75.png",300,75,true],"large":["https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/10\/insight2_discriminator-1-1024x256.png",1024,256,true],"1536x1536":["https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/10\/insight2_discriminator-1-1536x384.png",1536,384,true],"2048x2048":["https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/10\/insight2_discriminator-1.png",1794,449,false],"trp-custom-language-flag":["https:\/\/lincslab.ca\/wp-content\/uploads\/2025\/10\/insight2_discriminator-1-18x5.png",18,5,true]},"rttpg_author":{"display_name":"Maha Mubarak","author_link":"https:\/\/lincslab.ca\/en\/author\/mahamubarak\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/lincslab.ca\/en\/category\/home\/\" rel=\"category tag\">Home<\/a> <a href=\"https:\/\/lincslab.ca\/en\/category\/insights\/\" rel=\"category tag\">Insights<\/a>","rttpg_excerpt":"As modern communication networks grow in complexity, traditional anomaly detection techniques face challenges in identifying sophisticated threats such as distributed denial-of-service (DDoS) or stealth attacks. In our latest study, we explore how quantum machine learning can offer a new frontier for cybersecurity analytics. In our recent paper, \"Enhancing Network Anomaly Detection with Quantum GANs and&hellip;","_links":{"self":[{"href":"https:\/\/lincslab.ca\/en\/wp-json\/wp\/v2\/posts\/6438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lincslab.ca\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lincslab.ca\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lincslab.ca\/en\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/lincslab.ca\/en\/wp-json\/wp\/v2\/comments?post=6438"}],"version-history":[{"count":44,"href":"https:\/\/lincslab.ca\/en\/wp-json\/wp\/v2\/posts\/6438\/revisions"}],"predecessor-version":[{"id":8051,"href":"https:\/\/lincslab.ca\/en\/wp-json\/wp\/v2\/posts\/6438\/revisions\/8051"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lincslab.ca\/en\/wp-json\/wp\/v2\/media\/6735"}],"wp:attachment":[{"href":"https:\/\/lincslab.ca\/en\/wp-json\/wp\/v2\/media?parent=6438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lincslab.ca\/en\/wp-json\/wp\/v2\/categories?post=6438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lincslab.ca\/en\/wp-json\/wp\/v2\/tags?post=6438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}