Yukun Wang

ORCID: 0000-0002-3193-9251
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Information and Cryptography
  • Quantum Mechanics and Applications
  • Quantum Computing Algorithms and Architecture
  • Advanced oxidation water treatment
  • Simulation and Modeling Applications
  • Quantum optics and atomic interactions
  • Technology and Security Systems
  • Safety and Risk Management
  • Industrial Gas Emission Control
  • Green IT and Sustainability
  • Advanced Fluorescence Microscopy Techniques
  • Heat shock proteins research
  • Advanced Graph Neural Networks
  • Electrochemical Analysis and Applications
  • Water Treatment and Disinfection
  • Advanced Nanomaterials in Catalysis
  • IoT-based Smart Home Systems
  • Human-Automation Interaction and Safety
  • Target Tracking and Data Fusion in Sensor Networks
  • Statistical Methods in Clinical Trials
  • Complex Network Analysis Techniques
  • Photovoltaic System Optimization Techniques
  • Mobile and Web Applications
  • Reservoir Engineering and Simulation Methods
  • FinTech, Crowdfunding, Digital Finance

China University of Petroleum, Beijing
2008-2025

Southwest University
2025

State Key Laboratory of Cryptology
2022-2024

Guangzhou University
2024

Northwestern Polytechnical University
2024

PowerChina (China)
2022

National University of Singapore
2016-2020

Chongqing Institute of Geology and Mineral Resources
2020

Ministry of Natural Resources
2020

University of Science and Technology Liaoning
2019

Nowadays, it is common for one natural person to join multiple social networks enjoy different kinds of services. Linking identical users across networks, also known as network alignment, an important problem great research challenges. Existing methods usually link identities on the pairwise sample level, which may lead undesirable performance when number available annotations limited. Motivated by isomorphism information, in this paper we consider all a whole and perform alignment from...

10.1609/aaai.v33i01.3301996 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2019-07-17

Self-testing refers to the possibility of characterizing uniquely (up local isometries) state and measurements contained in quantum devices, based only on observed input-output statistics. Already basic case two-qubit singlet, self-testing is not unique: two known criteria (the maximal violation CHSH inequality Mayers-Yao correlations) are equivalent. It unknown how many there are. In this paper, we find whole set for ideal singlet with outcomes each side: it coincides all extremal points...

10.1088/1367-2630/18/2/025021 article EN cc-by New Journal of Physics 2016-02-23

Abstract In the standard Bell scenario, when making a local projective measurement on each system component, amount of randomness generated is restricted. However, this limitation can be surpassed through implementation sequential measurements. Nonetheless, rigorous definition random numbers in context measurements yet to established, except for lower quantification device-independent scenarios. paper, we provide quantum intrinsic and quantify Collins-Gisin-Linden-Massar-Popescu (CGLMP)...

10.1088/1367-2630/ad19fe article EN cc-by New Journal of Physics 2024-01-01

Entanglement plays a pivotal role in numerous quantum applications, and as technology progresses, entanglement systems continue to expand. However, quantifying is complex problem, particularly for multipartite states. The currently available measures suffer from high computational complexity, unknown entangled states, complete information about the state often necessary, further complicating calculations. In this paper, we train neural networks quantify using input features based on squared...

10.3390/e27020185 article EN cc-by Entropy 2025-02-12

Current quantum devices only support interactions between physical qubits and a limited number of neighboring qubits, preventing circuits from being executed directly on the devices. To execute circuit, SWAP gates must be inserted to adjust mapping relationships which consequently increases runtime error rates in circuits. address these challenges, this paper proposes HAIL, an efficient iterative qubit algorithm minimize additional gates. First, layer-weight assignment method integrated with...

10.48550/arxiv.2502.07536 preprint EN arXiv (Cornell University) 2025-02-11

10.1007/s10773-025-05946-2 article EN International Journal of Theoretical Physics 2025-03-20

Prepare-and-measure (P&M) quantum networks are the basic building blocks of communication and cryptography. These crucially rely on non-orthogonal encodings to distribute correlations, thus enabling superior rates information-theoretic security. Here, we present a computational toolbox that is able efficiently characterise set input-output probability distributions for any discrete-variable P&M network, assuming only inner-product information encodings. Our highly versatile can be used...

10.1038/s41534-019-0133-3 article EN cc-by npj Quantum Information 2019-02-08

10.1007/s11432-018-9618-2 article EN Science China Information Sciences 2019-09-10

Abstract In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the without any finite-key analyses are not suitable for in practice. The securities of (PDS) with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), analyzed our paper. According to PDS protocols, we establish an optimizing programming respectively obtain lower bounds rates. Under some reasonable values setup...

10.1038/srep15276 article EN cc-by Scientific Reports 2015-10-16

In secure communication, quantum key distribution (QKD) based on coherent states is well known for its simple implementation, but it suffers from loss-dependent attacks, and generally underestimates the final rate. To address this problem, authors present a six-coherent-state phase-encoding QKD protocol non-phase-randomized states, with which secret rates transmission distance can be significantly improved. The security of determined using recently developed security-proof technique...

10.1103/physrevapplied.12.024048 article EN Physical Review Applied 2019-08-22

Abstract Bipartite and multipartite entangled states are basic ingredients for constructing quantum networks their accurate verification is crucial to the functioning of networks, especially untrusted networks. Here we propose a simple approach verifying Bell state in an network which one party not honest. Only local projective measurements required honest party. It turns out each protocol tied probability distribution on Bloch sphere its performance has intuitive geometric meaning. This...

10.1038/s41534-021-00499-8 article EN cc-by npj Quantum Information 2021-11-26

Self-testing refers to a device-independent way uniquely identify an unknown quantum device based only on the observed statistics. Earlier results self-testing of multipartite state were restricted either Dicke states or Graph states. In this paper, we propose schemes for large family symmetric three-qubit states, namely superposition W and GHZ state. We first analytically prove criterion special with equal coefficients canonical bases, by designing subsystem partially maximally entangled...

10.1109/jsac.2020.2968994 article EN IEEE Journal on Selected Areas in Communications 2020-01-28

10.1007/s11128-021-03367-8 article EN Quantum Information Processing 2022-01-19

The determination of many special types quantum states has been studied thoroughly, such as the generalized |GHZ> states, |W> equivalent under stochastic local operations and classical communication Dicke states. In this paper, we are going to study another entanglement which is stabilizer their subset graph play an important role in error correcting codes, multipartite purification so on. We show that all n- qubit uniquely determined (among arbitrary pure or mixed) by reduced density...

10.1103/physreva.92.012305 article EN Physical Review A 2015-07-02

Semi-device-independent randomness expansion is the protocol which can generate and certify perfect free random numbers, without making detailed assumptions on internal working of quantum devices, except bound dimension Hilbert space. The two-dimensional (2D) witness violation has been used to guaranteed fresh from untrusted devices in prepare-and-measure configuration. In this paper we first show that 2D be simulated by a classical deterministic process relaxing assumption dimension. A...

10.1103/physreva.89.032312 article EN Physical Review A 2014-03-11

The WebSocket protocol emerges to supersede existing bidirectional communication technologies that use HTTP as a transport layer. Currently, there are many network application frameworks support the protocol, but have different behaviors in performance of various aspects. To study and compare common frameworks, say Netty, Undertow, Vert.x, Grizzly Jetty, this paper, we concurrency test, flow connection test resource occupancy test. experiment results show Netty Undertow perform better highly...

10.1109/hoticn.2018.8605989 article EN 2018-08-01

Self-testing refers to a way of uniquely identifying an uncharacterized quantum device based solely on certain extremal correlations. It is known that in the ideal case two-qubit singlet all points can be obtained by measuring form whole criteria for self-testing and associated measurements. To make these more suitable practical applications, relevant robustness bounds are necessary discuss. However, previous analyses were swap method, which may not guaranteed tight. In this paper, we...

10.1364/josab.36.000457 article EN Journal of the Optical Society of America B 2019-01-28

Oblivious key transfer (OKT) is a fundamental problem in the field of secure multi-party computation. It makes provider send secret sequence to user obliviously, i.e., may only get almost one bit ke... | Find, read and cite all research you need on Tech Science Press

10.32604/cmc.2020.09836 article EN Computers, materials & continua/Computers, materials & continua (Print) 2020-01-01

The sequential process (EC–E-peroxone process) is the optimal solution for drilling wastewater treatment.

10.1039/d1ew00523e article EN Environmental Science Water Research & Technology 2021-01-01

With the rapid development of quantum technology, understanding properties entanglement states has become an urgent task.Various classifications have been proposed to cater distinct applications, highlighting significance classification. This paper presents a variational classifier for classification discrimination which can effectively reduce measurement resources, specifically four-qubit equivalence under SLOCC (Stochastic Local Operations and Classical Communication). Through training...

10.1016/j.physa.2024.129530 article EN cc-by-nc-nd Physica A Statistical Mechanics and its Applications 2024-01-18
Coming Soon ...