Fig. 5: Channel model based on the entangling cloner attack. | npj Quantum Information