- Quantum Computing Algorithms and Architecture
- Quantum Information and Cryptography
- Quantum Mechanics and Applications
- Privacy-Preserving Technologies in Data
- Energy Efficient Wireless Sensor Networks
- Cryptography and Data Security
- Security in Wireless Sensor Networks
- Multimodal Machine Learning Applications
- Mobile Ad Hoc Networks
- Blockchain Technology Applications and Security
- Topic Modeling
- Quantum-Dot Cellular Automata
- Anomaly Detection Techniques and Applications
- Advanced Image and Video Retrieval Techniques
- Advanced Neural Network Applications
- Complexity and Algorithms in Graphs
- Cloud Data Security Solutions
- Privacy, Security, and Data Protection
- Mobile Crowdsensing and Crowdsourcing
- Domain Adaptation and Few-Shot Learning
- Advanced Graph Neural Networks
- Advanced Steganography and Watermarking Techniques
- Adversarial Robustness in Machine Learning
- Recommender Systems and Techniques
- Smart Grid Security and Resilience
Hangzhou Dianzi University
2025
Heilongjiang University
2016-2024
State Key Laboratory of Cryptology
2022-2024
Harbin Engineering University
2014-2024
Guizhou University
2023-2024
Northeast Petroleum University
2014-2024
University of Bristol
2023
Central University of Finance and Economics
2023
Beijing University of Posts and Telecommunications
2012-2022
Tsinghua University
2021
As a deep learning network with an encoder-decoder architecture, UNet and its series of improved versions have been widely used in medical image segmentation great applications. However, when to segment targets 3D images such as magnetic resonance imaging (MRI), computed tomography (CT), these models do not model the relevance vertical space, resulting poor accurate analysis consecutive slices same patient. On other hand, large amount detail lost during encoding process makes incapable...
For general bipartite quantum systems, many sets of locally indistinguishable orthogonal product states have been constructed so far. Here, we first present a method to construct multipartite in ${d}_{1}\ensuremath{\bigotimes}{d}_{2}\ensuremath{\bigotimes}\ensuremath{\cdots}\ensuremath{\bigotimes}{d}_{n}({d}_{1,2,\ensuremath{\cdots},n}\ensuremath{\ge}3,n\ensuremath{\ge}4)$ by using some states. And prove that these cannot be distinguished local operations and classical communication....
Air access networks have been recognized as a significant driver of various Internet Things (IoT) services and applications. In particular, the aerial computing network infrastructure centered on Drones has set off new revolution in automatic image recognition. This emerging technology relies sharing ground-truth-labeled data between unmanned vehicle (UAV) swarms to train high-quality recognition model. However, such an approach will bring privacy availability challenges. To address these...
Large vision-language models (LVMs) extend large language (LLMs) with visual perception capabilities, enabling them to process and interpret information. A major challenge compromising their reliability is object hallucination that LVMs may generate plausible but factually inaccurate We propose a novel adversarial perturbation (VAP) method mitigate this issue. VAP alleviates LVM by applying strategically optimized noise without altering the base model. Our approach formulates suppression as...
The majority of deep learning methods for detecting image forgery fail to accurately detect and localize the tampering operations. Furthermore, they only support a single type. Our method introduces three key innovations: (1) A spatial perception module that combines rich model (SRM) with constrained convolution, enabling focused detection traces while suppressing interference from content; (2) hierarchical feature architecture integrates Swin Transformer UperNet effective multi-scale...
Blockchain technology has been widely used in digital currency, Internet of Things, and other important fields because its decentralization, nontampering, anonymity. The vigorous development blockchain cannot be separated from the security guarantee. However, there are various threats within that have shown past to cause huge financial losses. This paper aims at studying multi-level existing Ethereum blockchain, exploring protection schemes under multiple attack scenarios. There ten...
Abstract Secure multiparty quantum summation, as a critical part of secure computation, plays pivotal role in the field cryptography. In this paper, hybrid protocol is proposed to implement summation and anonymous ranking simultaneously, which uses ‐level two‐particle entangled states. designed protocol, particles are conveyed way circle‐type transmission mode, can compute sum secret by analyzing distribution participants associated with different values. Moreover, random number sequences be...
In this paper, we propose a new secure quantum group signature with Bell states, which may have applications in e-payment system, e-government, e-business, etc. Compared the recent protocols, our scheme is focused on most general situation practice, i.e. only arbitrator trusted and no intermediate information needs to be stored signing phase ensure security. Furthermore, has achieved all characteristics of signature—anonymity, verifiability, traceability, unforgetability undeniability, by...
The homomorphic proxy re-encryption scheme combines the characteristics of a encryption and scheme. can not only convert ciphertext delegator into delegatee, but also homomorphically calculate original belonging to same user, so it is especially suitable for cloud computing. Yin et al. put forward concept strong collusion attack on scheme, carried out through an example. existing schemes use key switching algorithms generate keys, resist attack. In this paper, we construct first...
To guarantee information security in communication, quantum identity authentication plays a key role politics, economy, finance, daily life and other fields. In this paper, new multiparty simultaneous protocol with Greenberger-Home-Zeilinger (GHZ) state is presented. protocol, the authenticator certified parties are participants ability, whereas third party classical participant. Here, third-party honest two may be dishonest. With help of third-party, multiple can implement two-way at same...