Kejia Zhang

ORCID: 0000-0001-9715-6076
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Computing Algorithms and Architecture
  • Quantum Information and Cryptography
  • Quantum Mechanics and Applications
  • Privacy-Preserving Technologies in Data
  • Energy Efficient Wireless Sensor Networks
  • Cryptography and Data Security
  • Security in Wireless Sensor Networks
  • Multimodal Machine Learning Applications
  • Mobile Ad Hoc Networks
  • Blockchain Technology Applications and Security
  • Topic Modeling
  • Quantum-Dot Cellular Automata
  • Anomaly Detection Techniques and Applications
  • Advanced Image and Video Retrieval Techniques
  • Advanced Neural Network Applications
  • Complexity and Algorithms in Graphs
  • Cloud Data Security Solutions
  • Privacy, Security, and Data Protection
  • Mobile Crowdsensing and Crowdsourcing
  • Domain Adaptation and Few-Shot Learning
  • Advanced Graph Neural Networks
  • Advanced Steganography and Watermarking Techniques
  • Adversarial Robustness in Machine Learning
  • Recommender Systems and Techniques
  • Smart Grid Security and Resilience

Hangzhou Dianzi University
2025

Heilongjiang University
2016-2024

State Key Laboratory of Cryptology
2022-2024

Harbin Engineering University
2014-2024

Guizhou University
2023-2024

Northeast Petroleum University
2014-2024

University of Bristol
2023

Central University of Finance and Economics
2023

Beijing University of Posts and Telecommunications
2012-2022

Tsinghua University
2021

As a deep learning network with an encoder-decoder architecture, UNet and its series of improved versions have been widely used in medical image segmentation great applications. However, when to segment targets 3D images such as magnetic resonance imaging (MRI), computed tomography (CT), these models do not model the relevance vertical space, resulting poor accurate analysis consecutive slices same patient. On other hand, large amount detail lost during encoding process makes incapable...

10.26599/tst.2022.9010023 article EN Tsinghua Science & Technology 2023-01-06

For general bipartite quantum systems, many sets of locally indistinguishable orthogonal product states have been constructed so far. Here, we first present a method to construct multipartite in ${d}_{1}\ensuremath{\bigotimes}{d}_{2}\ensuremath{\bigotimes}\ensuremath{\cdots}\ensuremath{\bigotimes}{d}_{n}({d}_{1,2,\ensuremath{\cdots},n}\ensuremath{\ge}3,n\ensuremath{\ge}4)$ by using some states. And prove that these cannot be distinguished local operations and classical communication....

10.1103/physreva.95.052344 article EN Physical review. A/Physical review, A 2017-05-24

Air access networks have been recognized as a significant driver of various Internet Things (IoT) services and applications. In particular, the aerial computing network infrastructure centered on Drones has set off new revolution in automatic image recognition. This emerging technology relies sharing ground-truth-labeled data between unmanned vehicle (UAV) swarms to train high-quality recognition model. However, such an approach will bring privacy availability challenges. To address these...

10.1109/jiot.2022.3151945 article EN IEEE Internet of Things Journal 2022-02-16

Large vision-language models (LVMs) extend large language (LLMs) with visual perception capabilities, enabling them to process and interpret information. A major challenge compromising their reliability is object hallucination that LVMs may generate plausible but factually inaccurate We propose a novel adversarial perturbation (VAP) method mitigate this issue. VAP alleviates LVM by applying strategically optimized noise without altering the base model. Our approach formulates suppression as...

10.48550/arxiv.2501.19164 preprint EN arXiv (Cornell University) 2025-01-31

The majority of deep learning methods for detecting image forgery fail to accurately detect and localize the tampering operations. Furthermore, they only support a single type. Our method introduces three key innovations: (1) A spatial perception module that combines rich model (SRM) with constrained convolution, enabling focused detection traces while suppressing interference from content; (2) hierarchical feature architecture integrates Swin Transformer UperNet effective multi-scale...

10.7717/peerj-cs.2775 article EN cc-by PeerJ Computer Science 2025-04-08

10.1007/s11128-015-0995-z article EN Quantum Information Processing 2015-04-20

Blockchain technology has been widely used in digital currency, Internet of Things, and other important fields because its decentralization, nontampering, anonymity. The vigorous development blockchain cannot be separated from the security guarantee. However, there are various threats within that have shown past to cause huge financial losses. This paper aims at studying multi-level existing Ethereum blockchain, exploring protection schemes under multiple attack scenarios. There ten...

10.1155/2022/5307697 article EN cc-by Security and Communication Networks 2022-02-14

Abstract Secure multiparty quantum summation, as a critical part of secure computation, plays pivotal role in the field cryptography. In this paper, hybrid protocol is proposed to implement summation and anonymous ranking simultaneously, which uses ‐level two‐particle entangled states. designed protocol, particles are conveyed way circle‐type transmission mode, can compute sum secret by analyzing distribution participants associated with different values. Moreover, random number sequences be...

10.1002/qute.202400078 article EN Advanced Quantum Technologies 2024-05-22

In this paper, we propose a new secure quantum group signature with Bell states, which may have applications in e-payment system, e-government, e-business, etc. Compared the recent protocols, our scheme is focused on most general situation practice, i.e. only arbitrator trusted and no intermediate information needs to be stored signing phase ensure security. Furthermore, has achieved all characteristics of signature—anonymity, verifiability, traceability, unforgetability undeniability, by...

10.1088/0031-8949/87/04/045012 article EN Physica Scripta 2013-03-18

The homomorphic proxy re-encryption scheme combines the characteristics of a encryption and scheme. can not only convert ciphertext delegator into delegatee, but also homomorphically calculate original belonging to same user, so it is especially suitable for cloud computing. Yin et al. put forward concept strong collusion attack on scheme, carried out through an example. existing schemes use key switching algorithms generate keys, resist attack. In this paper, we construct first...

10.3390/s21010288 article EN cc-by Sensors 2021-01-04

To guarantee information security in communication, quantum identity authentication plays a key role politics, economy, finance, daily life and other fields. In this paper, new multiparty simultaneous protocol with Greenberger-Home-Zeilinger (GHZ) state is presented. protocol, the authenticator certified parties are participants ability, whereas third party classical participant. Here, third-party honest two may be dishonest. With help of third-party, multiple can implement two-way at same...

10.3390/e24040483 article EN cc-by Entropy 2022-03-30
Coming Soon ...