- Quantum Computing Algorithms and Architecture
- Quantum Information and Cryptography
- Quantum Mechanics and Applications
- Cryptography and Data Security
- Quantum-Dot Cellular Automata
- Blockchain Technology Applications and Security
- Chaos-based Image/Signal Encryption
- Coding theory and cryptography
- Educational Technology and Assessment
- Advanced Decision-Making Techniques
- Speech and Audio Processing
- Software Engineering Research
- Cellular Automata and Applications
- Quantum and electron transport phenomena
- Control and Dynamics of Mobile Robots
- Marine Sponges and Natural Products
- Data Management and Algorithms
- Face and Expression Recognition
- Advanced Authentication Protocols Security
- Cryptographic Implementations and Security
- UAV Applications and Optimization
- Precipitation Measurement and Analysis
- Educational Methods and Teacher Development
- Soil Moisture and Remote Sensing
- Advanced Clustering Algorithms Research
Lincoln University College
2025
North University of China
2024
Xiangtan University
2013-2024
Xi’an University of Posts and Telecommunications
2024
Peking University
2007-2024
Changzhou Institute of Technology
2024
Sichuan Cancer Hospital
2024
University of Electronic Science and Technology of China
2024
Zhejiang Institute of Science and Technology Information
2024
Fudan University Shanghai Cancer Center
2023
In an arbitrated quantum signature scheme, the signatory signs message and receiver verifies signature's validity with assistance of arbitrator. We present scheme using two-particle entangled Bell states similar to previous three-particle Greenberger-Horne-Zeilinger [G. H. Zeng C. Keitel, Phys. Rev. A 65, 042312 (2002)]. The proposed can preserve merits in original while providing a higher efficiency transmission reducing complexity implementation.
Secret sharing is a procedure for secret among number of participants such that only the qualified subsets have ability to reconstruct secret. Even in presence eavesdropping, can be achieved when all members are quantum. So what happens if not quantum? In this paper we propose two semi-quantum protocols using maximally entangled GHZ-type states which quantum Alice shares with classical parties, Bob and Charlie, way both parties sufficient obtain secret, but one them cannot. The presented...
Quantum blockchain is expected to offer an alternative classical resist malicious attacks laughed by future quantum computers. Although a few schemes have been constructed, their efficiency low and unable meet application requirements due the fact that they lack of suitable consensus mechanism. To tackle this issue, mechanism called delegated proof stake (QDPoS) constructed using voting provide fast decentralization for scheme at first. Then efficient proposed based on QDPoS, where...
This study aims to assess the impact of Continuing Professional Development (CPD) training on teaching competence English language educators at application-oriented universities in Henan, China. By employing a systematic literature review and bibliometric analysis, gathers evaluates relevant data understand current state CPD instruction within this specific geographical educational context. The research analyzes previous trends their effects, identifying key areas for future refinement...
Three-dimensional user interfaces (3D UIs) support tasks in many non-traditional interactive systems such as virtual environments and augmented reality. Although 3D UI researchers have been successful identifying basic interaction metaphors, evaluating the usability of techniques, improving applications, research now stands at a crossroads. Very few fundamentally new techniques metaphors for discovered recent years, yet UIs real-world applications is still not desirable level. What...
Blind quantum computation allows a client who does not have enough resources or technologies to achieve on remote server such that the client's input, output, and algorithm remain unknown server. Up now, single- double-server blind been considered. In this work, we propose triple-server protocol where can delegate three servers by use of entanglement swapping. Furthermore, communicate with each other is almost classical since one require any computational power, memory, ability prepare...
Abstract Semiquantum key distribution allows a quantum party to share random with “classical” who only can prepare and measure qubits in the computational basis or reorder some when he has access channel. In this work, we present protocol where secret be established between user an almost classical needs ability channels, by securely delegating computation server. We show proposed is robust even delegated server powerful adversary experimentally feasible current technology. As one of our...
With the growing significance of network security, classification encrypted traffic has emerged as an urgent challenge. Traditional byte-based analysis methods are constrained by rigid granularity information and fail to fully exploit diverse correlations between bytes. To address these limitations, this paper introduces MH-Net, a novel approach for classifying that leverages multi-view heterogeneous graphs model intricate relationships The essence MH-Net lies in aggregating varying numbers...
This study aims to assess the impact of Continuing Professional Development (CPD) training on teaching competence English language educators at application-oriented universities in Henan, China. By employing a systematic literature review and bibliometric analysis, gathers evaluates relevant data understand current state CPD instruction within this specific geographical educational context. The research analyzes previous trends their effects, identifying key areas for future refinement...
Blind quantum computing (BQC) enables a client with limited capability to delegate her computation remote server and still keeps the client's input, output, algorithm private. One important property of BQC is verifiability, which means can verify correctness or unknown inputs. Recently, Morimae proposed verifiable blind protocol where both input. However, needs much memory takes lot qubits get true result. We reduce size number used in Morimae's protocol. Besides, we extend resource state...
Accurate diagnosis of breast lesions and discrimination axillary lymph node (ALN) metastases largely depend on radiologist experience. To develop a deep learning-based whole-process system (DLWPS) for segmentation ALN metastasis. Retrospective. 1760 patients, who were divided into training validation sets (1110 patients), internal (476 external (174 patients) test sets. 3.0T/dynamic contrast-enhanced (DCE)-MRI sequence. DLWPS was developed using classification models. The DLWPS-based model...
Variational quantum algorithms (VQAs) can train parameterized circuits via classical optimizers to find approximate solutions some important problems. They overcome the limitations of existing technologies only allowing for a few qubits and small circuit depth are considered as one most promising methods achieving advantages in noisy intermediate-scale (NISQ) era. In this paper, we propose secure delegated VQAs by utilizing homomorphic encryption (QHE) users with limited power delegate task...
Semiquantum key distribution (SQKD) allows two parties to share a common string when one of them is quantum and the other has rather limited capability. Almost all existing SQKD protocols have been proved be robust in theory, namely that if an eavesdropper tries gain information, he will inevitably induce some detectable errors. However, ideal devices do not exist reality their imperfection may result side-channel attacks, which can used by adversary get information on secret string. In this...
Blind quantum computation (BQC) provides a solution for clients with limited capabilities to delegate their computational tasks remote servers while keeping own data private. In this paper, we first propose three multi-party verifiable blind (MPVBQC) protocols, each of which can handle one type certain simple such as making single-qubit measurements, preparing single qubits, or performing few gates. Then flexible and hybrid MPVBQC framework multi-type in networks is given by combining the...