- Quantum Computing Algorithms and Architecture
- Physical Unclonable Functions (PUFs) and Hardware Security
- Quantum and electron transport phenomena
- Advanced Memory and Neural Computing
- Integrated Circuits and Semiconductor Failure Analysis
- Quantum Information and Cryptography
- Cryptography and Data Security
- Topological Materials and Phenomena
- Nanowire Synthesis and Applications
- Computability, Logic, AI Algorithms
- Semiconductor materials and interfaces
- Advancements in Semiconductor Devices and Circuit Design
- Graphene research and applications
Sorbonne Université
2022-2023
Laboratoire de Recherche en Informatique de Paris 6
2022-2023
Xi'an University of Technology
2019
Quantum computing promises advantages over classical computing. The manufacturing of quantum hardware is in the infancy stage, called Noisy Intermediate-Scale (NISQ) era. A major challenge automated circuit design that map a to gates universal gate set. In this paper, we present generic MDP modeling and employ Q-learning DQN algorithms for design. By leveraging power deep reinforcement learning, aim provide an automatic scalable approach traditional hand-crafted heuristic methods.
Abstract We introduce a secure hardware device named QEnclave that can the remote execution of quantum operations while only using classical controls. This extends to computing from concept enclave isolates computation its environment provide privacy and tamper-resistance. Remarkably, our performs single qubit rotations but nevertheless be used an arbitrary even if source is controlled by adversary. More precisely, attaching computer, client controlling securely delegate server solely...
Quantum-enhanced parameter estimation has widespread applications in many fields. An important issue is to protect the precision against noise-induced decoherence. Here we develop a general theoretical framework for improving estimating an arbitrary by monitoring quantum trajectories (MQT) and establish its connections purification-based approach estimation. Monitoring trajectory can be achieved two ways: (i) Any monitored directly environment, which experimentally challenging realistic...
Physical unclonable functions(PUFs) provide a unique fingerprint to physical entity by exploiting the inherent randomness. Gao et al. discussed vulnerability of most current-day PUFs sophisticated machine learning-based attacks. We address this problem integrating classical and existing quantum communication technology. Specifically, paper proposes generic design provably secure PUFs, called hybrid locked PUFs(HLPUFs), providing practical solution for securing PUFs. An HLPUF uses PUF(CPUF),...