- Quantum Information and Cryptography
- Quantum Mechanics and Applications
- Quantum Computing Algorithms and Architecture
- Advanced oxidation water treatment
- Simulation and Modeling Applications
- Quantum optics and atomic interactions
- Technology and Security Systems
- Safety and Risk Management
- Industrial Gas Emission Control
- Green IT and Sustainability
- Advanced Fluorescence Microscopy Techniques
- Heat shock proteins research
- Advanced Graph Neural Networks
- Electrochemical Analysis and Applications
- Water Treatment and Disinfection
- Advanced Nanomaterials in Catalysis
- IoT-based Smart Home Systems
- Human-Automation Interaction and Safety
- Target Tracking and Data Fusion in Sensor Networks
- Statistical Methods in Clinical Trials
- Complex Network Analysis Techniques
- Photovoltaic System Optimization Techniques
- Mobile and Web Applications
- Reservoir Engineering and Simulation Methods
- FinTech, Crowdfunding, Digital Finance
China University of Petroleum, Beijing
2008-2025
Southwest University
2025
State Key Laboratory of Cryptology
2022-2024
Guangzhou University
2024
Northwestern Polytechnical University
2024
PowerChina (China)
2022
National University of Singapore
2016-2020
Chongqing Institute of Geology and Mineral Resources
2020
Ministry of Natural Resources
2020
University of Science and Technology Liaoning
2019
Nowadays, it is common for one natural person to join multiple social networks enjoy different kinds of services. Linking identical users across networks, also known as network alignment, an important problem great research challenges. Existing methods usually link identities on the pairwise sample level, which may lead undesirable performance when number available annotations limited. Motivated by isomorphism information, in this paper we consider all a whole and perform alignment from...
Self-testing refers to the possibility of characterizing uniquely (up local isometries) state and measurements contained in quantum devices, based only on observed input-output statistics. Already basic case two-qubit singlet, self-testing is not unique: two known criteria (the maximal violation CHSH inequality Mayers-Yao correlations) are equivalent. It unknown how many there are. In this paper, we find whole set for ideal singlet with outcomes each side: it coincides all extremal points...
Abstract In the standard Bell scenario, when making a local projective measurement on each system component, amount of randomness generated is restricted. However, this limitation can be surpassed through implementation sequential measurements. Nonetheless, rigorous definition random numbers in context measurements yet to established, except for lower quantification device-independent scenarios. paper, we provide quantum intrinsic and quantify Collins-Gisin-Linden-Massar-Popescu (CGLMP)...
Entanglement plays a pivotal role in numerous quantum applications, and as technology progresses, entanglement systems continue to expand. However, quantifying is complex problem, particularly for multipartite states. The currently available measures suffer from high computational complexity, unknown entangled states, complete information about the state often necessary, further complicating calculations. In this paper, we train neural networks quantify using input features based on squared...
Current quantum devices only support interactions between physical qubits and a limited number of neighboring qubits, preventing circuits from being executed directly on the devices. To execute circuit, SWAP gates must be inserted to adjust mapping relationships which consequently increases runtime error rates in circuits. address these challenges, this paper proposes HAIL, an efficient iterative qubit algorithm minimize additional gates. First, layer-weight assignment method integrated with...
Prepare-and-measure (P&M) quantum networks are the basic building blocks of communication and cryptography. These crucially rely on non-orthogonal encodings to distribute correlations, thus enabling superior rates information-theoretic security. Here, we present a computational toolbox that is able efficiently characterise set input-output probability distributions for any discrete-variable P&M network, assuming only inner-product information encodings. Our highly versatile can be used...
Abstract In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the without any finite-key analyses are not suitable for in practice. The securities of (PDS) with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), analyzed our paper. According to PDS protocols, we establish an optimizing programming respectively obtain lower bounds rates. Under some reasonable values setup...
In secure communication, quantum key distribution (QKD) based on coherent states is well known for its simple implementation, but it suffers from loss-dependent attacks, and generally underestimates the final rate. To address this problem, authors present a six-coherent-state phase-encoding QKD protocol non-phase-randomized states, with which secret rates transmission distance can be significantly improved. The security of determined using recently developed security-proof technique...
Abstract Bipartite and multipartite entangled states are basic ingredients for constructing quantum networks their accurate verification is crucial to the functioning of networks, especially untrusted networks. Here we propose a simple approach verifying Bell state in an network which one party not honest. Only local projective measurements required honest party. It turns out each protocol tied probability distribution on Bloch sphere its performance has intuitive geometric meaning. This...
Self-testing refers to a device-independent way uniquely identify an unknown quantum device based only on the observed statistics. Earlier results self-testing of multipartite state were restricted either Dicke states or Graph states. In this paper, we propose schemes for large family symmetric three-qubit states, namely superposition W and GHZ state. We first analytically prove criterion special with equal coefficients canonical bases, by designing subsystem partially maximally entangled...
The determination of many special types quantum states has been studied thoroughly, such as the generalized |GHZ> states, |W> equivalent under stochastic local operations and classical communication Dicke states. In this paper, we are going to study another entanglement which is stabilizer their subset graph play an important role in error correcting codes, multipartite purification so on. We show that all n- qubit uniquely determined (among arbitrary pure or mixed) by reduced density...
Semi-device-independent randomness expansion is the protocol which can generate and certify perfect free random numbers, without making detailed assumptions on internal working of quantum devices, except bound dimension Hilbert space. The two-dimensional (2D) witness violation has been used to guaranteed fresh from untrusted devices in prepare-and-measure configuration. In this paper we first show that 2D be simulated by a classical deterministic process relaxing assumption dimension. A...
The WebSocket protocol emerges to supersede existing bidirectional communication technologies that use HTTP as a transport layer. Currently, there are many network application frameworks support the protocol, but have different behaviors in performance of various aspects. To study and compare common frameworks, say Netty, Undertow, Vert.x, Grizzly Jetty, this paper, we concurrency test, flow connection test resource occupancy test. experiment results show Netty Undertow perform better highly...
Self-testing refers to a way of uniquely identifying an uncharacterized quantum device based solely on certain extremal correlations. It is known that in the ideal case two-qubit singlet all points can be obtained by measuring form whole criteria for self-testing and associated measurements. To make these more suitable practical applications, relevant robustness bounds are necessary discuss. However, previous analyses were swap method, which may not guaranteed tight. In this paper, we...
Oblivious key transfer (OKT) is a fundamental problem in the field of secure multi-party computation. It makes provider send secret sequence to user obliviously, i.e., may only get almost one bit ke... | Find, read and cite all research you need on Tech Science Press
The sequential process (EC–E-peroxone process) is the optimal solution for drilling wastewater treatment.
With the rapid development of quantum technology, understanding properties entanglement states has become an urgent task.Various classifications have been proposed to cater distinct applications, highlighting significance classification. This paper presents a variational classifier for classification discrimination which can effectively reduce measurement resources, specifically four-qubit equivalence under SLOCC (Stochastic Local Operations and Classical Communication). Through training...