Qin Li

ORCID: 0000-0001-6393-3236
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Computing Algorithms and Architecture
  • Quantum Information and Cryptography
  • Quantum Mechanics and Applications
  • Cryptography and Data Security
  • Quantum-Dot Cellular Automata
  • Blockchain Technology Applications and Security
  • Chaos-based Image/Signal Encryption
  • Coding theory and cryptography
  • Educational Technology and Assessment
  • Advanced Decision-Making Techniques
  • Speech and Audio Processing
  • Software Engineering Research
  • Cellular Automata and Applications
  • Quantum and electron transport phenomena
  • Control and Dynamics of Mobile Robots
  • Marine Sponges and Natural Products
  • Data Management and Algorithms
  • Face and Expression Recognition
  • Advanced Authentication Protocols Security
  • Cryptographic Implementations and Security
  • UAV Applications and Optimization
  • Precipitation Measurement and Analysis
  • Educational Methods and Teacher Development
  • Soil Moisture and Remote Sensing
  • Advanced Clustering Algorithms Research

Lincoln University College
2025

North University of China
2024

Xiangtan University
2013-2024

Xi’an University of Posts and Telecommunications
2024

Peking University
2007-2024

Changzhou Institute of Technology
2024

Sichuan Cancer Hospital
2024

University of Electronic Science and Technology of China
2024

Zhejiang Institute of Science and Technology Information
2024

Fudan University Shanghai Cancer Center
2023

In an arbitrated quantum signature scheme, the signatory signs message and receiver verifies signature's validity with assistance of arbitrator. We present scheme using two-particle entangled Bell states similar to previous three-particle Greenberger-Horne-Zeilinger [G. H. Zeng C. Keitel, Phys. Rev. A 65, 042312 (2002)]. The proposed can preserve merits in original while providing a higher efficiency transmission reducing complexity implementation.

10.1103/physreva.79.054307 article EN Physical Review A 2009-05-21

Secret sharing is a procedure for secret among number of participants such that only the qualified subsets have ability to reconstruct secret. Even in presence eavesdropping, can be achieved when all members are quantum. So what happens if not quantum? In this paper we propose two semi-quantum protocols using maximally entangled GHZ-type states which quantum Alice shares with classical parties, Bob and Charlie, way both parties sufficient obtain secret, but one them cannot. The presented...

10.1103/physreva.82.022303 article EN Physical Review A 2010-08-04

Quantum blockchain is expected to offer an alternative classical resist malicious attacks laughed by future quantum computers. Although a few schemes have been constructed, their efficiency low and unable meet application requirements due the fact that they lack of suitable consensus mechanism. To tackle this issue, mechanism called delegated proof stake (QDPoS) constructed using voting provide fast decentralization for scheme at first. Then efficient proposed based on QDPoS, where...

10.1109/tifs.2022.3203316 article EN IEEE Transactions on Information Forensics and Security 2022-01-01

This study aims to assess the impact of Continuing Professional Development (CPD) training on teaching competence English language educators at application-oriented universities in Henan, China. By employing a systematic literature review and bibliometric analysis, gathers evaluates relevant data understand current state CPD instruction within this specific geographical educational context. The research analyzes previous trends their effects, identifying key areas for future refinement...

10.62754/joe.v4i1.5877 article EN cc-by-nc-nd Journal of Ecohumanism 2025-01-15

Three-dimensional user interfaces (3D UIs) support tasks in many non-traditional interactive systems such as virtual environments and augmented reality. Although 3D UI researchers have been successful identifying basic interaction metaphors, evaluating the usability of techniques, improving applications, research now stands at a crossroads. Very few fundamentally new techniques metaphors for discovered recent years, yet UIs real-world applications is still not desirable level. What...

10.20870/ijvr.2006.5.2.2683 article EN cc-by International Journal of Virtual Reality 2006-01-01

Blind quantum computation allows a client who does not have enough resources or technologies to achieve on remote server such that the client's input, output, and algorithm remain unknown server. Up now, single- double-server blind been considered. In this work, we propose triple-server protocol where can delegate three servers by use of entanglement swapping. Furthermore, communicate with each other is almost classical since one require any computational power, memory, ability prepare...

10.1103/physreva.89.040302 article EN Physical Review A 2014-04-18

Abstract Semiquantum key distribution allows a quantum party to share random with “classical” who only can prepare and measure qubits in the computational basis or reorder some when he has access channel. In this work, we present protocol where secret be established between user an almost classical needs ability channels, by securely delegating computation server. We show proposed is robust even delegated server powerful adversary experimentally feasible current technology. As one of our...

10.1038/srep19898 article EN cc-by Scientific Reports 2016-01-27

With the growing significance of network security, classification encrypted traffic has emerged as an urgent challenge. Traditional byte-based analysis methods are constrained by rigid granularity information and fail to fully exploit diverse correlations between bytes. To address these limitations, this paper introduces MH-Net, a novel approach for classifying that leverages multi-view heterogeneous graphs model intricate relationships The essence MH-Net lies in aggregating varying numbers...

10.48550/arxiv.2501.03279 preprint EN arXiv (Cornell University) 2025-01-05

This study aims to assess the impact of Continuing Professional Development (CPD) training on teaching competence English language educators at application-oriented universities in Henan, China. By employing a systematic literature review and bibliometric analysis, gathers evaluates relevant data understand current state CPD instruction within this specific geographical educational context. The research analyzes previous trends their effects, identifying key areas for future refinement...

10.62754/joe.v4i3.5877 article EN cc-by-nc-nd Journal of Ecohumanism 2025-02-04

10.1007/s11128-010-0180-3 article EN Quantum Information Processing 2010-05-24

10.1016/j.physa.2021.126265 article EN Physica A Statistical Mechanics and its Applications 2021-07-14

Blind quantum computing (BQC) enables a client with limited capability to delegate her computation remote server and still keeps the client's input, output, algorithm private. One important property of BQC is verifiability, which means can verify correctness or unknown inputs. Recently, Morimae proposed verifiable blind protocol where both input. However, needs much memory takes lot qubits get true result. We reduce size number used in Morimae's protocol. Besides, we extend resource state...

10.1002/que2.58 article EN Quantum Engineering 2021-01-03

Accurate diagnosis of breast lesions and discrimination axillary lymph node (ALN) metastases largely depend on radiologist experience. To develop a deep learning-based whole-process system (DLWPS) for segmentation ALN metastasis. Retrospective. 1760 patients, who were divided into training validation sets (1110 patients), internal (476 external (174 patients) test sets. 3.0T/dynamic contrast-enhanced (DCE)-MRI sequence. DLWPS was developed using classification models. The DLWPS-based model...

10.1002/jmri.28913 article EN Journal of Magnetic Resonance Imaging 2023-07-27

Variational quantum algorithms (VQAs) can train parameterized circuits via classical optimizers to find approximate solutions some important problems. They overcome the limitations of existing technologies only allowing for a few qubits and small circuit depth are considered as one most promising methods achieving advantages in noisy intermediate-scale (NISQ) era. In this paper, we propose secure delegated VQAs by utilizing homomorphic encryption (QHE) users with limited power delegate task...

10.1109/tcad.2024.3391690 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2024-04-19

Semiquantum key distribution (SQKD) allows two parties to share a common string when one of them is quantum and the other has rather limited capability. Almost all existing SQKD protocols have been proved be robust in theory, namely that if an eavesdropper tries gain information, he will inevitably induce some detectable errors. However, ideal devices do not exist reality their imperfection may result side-channel attacks, which can used by adversary get information on secret string. In this...

10.1142/s0219749918500120 article EN International Journal of Quantum Information 2018-02-02

Blind quantum computation (BQC) provides a solution for clients with limited capabilities to delegate their computational tasks remote servers while keeping own data private. In this paper, we first propose three multi-party verifiable blind (MPVBQC) protocols, each of which can handle one type certain simple such as making single-qubit measurements, preparing single qubits, or performing few gates. Then flexible and hybrid MPVBQC framework multi-type in networks is given by combining the...

10.1109/tifs.2023.3340859 article EN IEEE Transactions on Information Forensics and Security 2023-12-07
Coming Soon ...