Jie Lin

ORCID: 0000-0003-1750-2659
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Information and Cryptography
  • Quantum Computing Algorithms and Architecture
  • Advanced Control Systems Optimization
  • Quantum Mechanics and Applications
  • Fault Detection and Control Systems
  • Control Systems and Identification
  • Cryptography and Data Security
  • Neural Networks and Reservoir Computing
  • Privacy-Preserving Technologies in Data
  • Speech and Audio Processing
  • Advanced Optimization Algorithms Research
  • Anomaly Detection Techniques and Applications
  • Quantum-Dot Cellular Automata
  • Neural Networks and Applications
  • Iterative Learning Control Systems
  • Scientific Research and Philosophical Inquiry
  • Blind Source Separation Techniques
  • Image Retrieval and Classification Techniques
  • Machine Learning and ELM
  • Orbital Angular Momentum in Optics
  • Probabilistic and Robust Engineering Design
  • Spacecraft Dynamics and Control
  • Speech Recognition and Synthesis
  • Time Series Analysis and Forecasting
  • Network Security and Intrusion Detection

Xanadu Quantum Technologies (Canada)
2024

University of Toronto
2022-2024

Xi'an Jiaotong University
1989-2024

University of Waterloo
2018-2023

Queen's University Belfast
2023

Cornell University
2021

Weill Cornell Medicine
2021

Southern Medical University
2021

Nanfang Hospital
2021

CAS Key Laboratory of Urban Pollutant Conversion
2019-2020

Variations of phase-matching measurement-device-independent quantum key distribution (PM-MDI QKD) protocols have been investigated before, but it was recently discovered that this type protocol (under the name twin-field can beat linear scaling repeaterless bound on secret capacity. We propose a variation PM-MDI QKD protocol, which reduces sifting cost and uses non-phase-randomized coherent states as test states. provide security proof in infinite limit. Our is conceptually simple gives...

10.1103/physreva.98.042332 article EN Physical review. A/Physical review, A 2018-10-25

A new analysis demonstrates that discrete-modulated CV QKD, a quantum key establishment protocol, can become cost-effective tool for securing current classical and future networks over long distances.

10.1103/physrevx.9.041064 article EN cc-by Physical Review X 2019-12-30

We develop a method to connect the infinite-dimensional description of optical continuous-variable quantum key distribution (QKD) protocols finite-dimensional formulation. The secure rates QKD can then be evaluated using recently-developed reliable numerical methods for rate calculations. apply this obtain asymptotic discrete-modulated protocols, which are practical significance due their experimental simplicity and potential large-scale deployment in quantum-secured networks. Importantly,...

10.1103/prxquantum.2.020325 article EN cc-by PRX Quantum 2021-05-24

Discrete-modulated (DM) continuous-variable quantum key distribution (CV-QKD) protocols are promising candidates for commercial implementations of communication networks due to their experimental simplicity. While tight security analyses in the asymptotic limit exist, proofs finite-size regime still subject active research. We present a composable proof against independently and identically distributed collective attacks general DM CV-QKD protocol. introduce new energy testing theorem bound...

10.1103/prxquantum.4.040306 article EN cc-by PRX Quantum 2023-10-10

Quantum key distribution (QKD) protocols with threshold detectors are driving high-performance QKD demonstrations. The corresponding security proofs usually assume that all physical have the same detection efficiency. However, efficiencies of used in practice might show a mismatch depending on manufacturing and setup these detectors. A can also be induced as different spatial-temporal modes an incoming signal couple differently to detector. Here we develop method allows provide without usual...

10.1103/physrevresearch.3.013076 article EN cc-by Physical Review Research 2021-01-25

Discrete-modulated continuous-variable quantum key distribution protocols are promising candidates for large-scale deployment due to the large technological overlap with deployed modern optical communication devices. The security of discrete modulation schemes has previously analyzed in ideal detector scenario asymptotic limit. In this work, we calculate rates against collective attacks trusted noise scenario. Our results show that can thus cut out most effect and obtain similar those had...

10.1103/physrevapplied.14.064030 article EN cc-by Physical Review Applied 2020-12-09

AbstractA nuclear power plant's (NPP's) status is usually monitored by a human operator. Any classifier system used to enhance the operators capability diagnose safety-critical like an NPP should classify novel transient as "don't-know" if it not contained within its accumulated knowledge base. In particular, needs some kind of proximity measure between new data and training set. Artificial neural networks have been proposed classifiers, most popular ones being multilayered perceptron (MLP)...

10.13182/nt95-a35112 article EN Nuclear Technology 1995-06-01

We present an analysis of the entangling quantum kicked top focusing on few qubit case and initial condition dependence time-averaged entanglement ${S}_{Q}$ for spin-coherent states. show a very strong connection between classical phase space even extreme two spin-$1/2$ qubits. This correlation is not related directly to chaos in dynamics. introduce measure behavior trajectory which correlates far better with that maps initial-condition are both organized around symmetry points Hamiltonian....

10.1103/physreve.95.062222 article EN Physical review. E 2017-06-26

Security proof methods for quantum key distribution, QKD, that are based on the numerical rate calculation problem, powerful in principle. However, practicality of limited by computational resources and efficiency accuracy underlying algorithms convex optimization. We derive a stable reformulation nonlinear semidefinite programming, SDP, model problems. use this to develop an efficient, accurate algorithm. The is novel forms facial reduction, FR, both linear constraints relative entropy...

10.22331/q-2022-09-08-792 article EN cc-by Quantum 2022-09-08

Abstract An underlying relationship between a dynamic stochastic control system and its steady-state counterpart is thoroughly investigated. A novel approach which uses both information for solving the optimizing problem presented. two-stage identification technique proposed employed in presented to estimate expectation of real process derivative. Compared with integrated optimization parameter estimation (ISOPE) methods, this new has reduced significantly required controller set point...

10.1080/00207178908953494 article EN International Journal of Control 1989-12-01

This article presents a method for determining tight, finite key rates numerically. The relies in theorem allowing to data-process the parameter estimation statistics multiple ways while preserving same security statement.

10.1103/physrevresearch.3.013274 article EN cc-by Physical Review Research 2021-03-24

Realizing photonic graph states, crucial in various quantum protocols, is challenging due to the absence of deterministic entangling gates linear optics. To address this, emitter qubits are leveraged establish and transfer entanglement photons. We introduce an optimization method for such protocols based on local Clifford equivalency states graph-shape correlated generation cost parameters. Employing this method, we achieve a 50% reduction use 2-qubit repeater 65% total gate count 15-node...

10.48550/arxiv.2401.00635 preprint EN other-oa arXiv (Cornell University) 2024-01-01

<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"><mml:mrow class="MJX-TeXAtom-ORD"><mml:mi mathvariant="monospace">G</mml:mi><mml:mi mathvariant="monospace">r</mml:mi><mml:mi mathvariant="monospace">a</mml:mi><mml:mi mathvariant="monospace">p</mml:mi><mml:mi mathvariant="monospace">h</mml:mi><mml:mi mathvariant="monospace">i</mml:mi><mml:mi mathvariant="monospace">Q</mml:mi></mml:mrow></mml:math> is a versatile open-source framework for designing photonic graph state generation...

10.22331/q-2024-08-28-1453 article EN cc-by Quantum 2024-08-28

We aim to develop self-healing networks that can detect degradation of streaming video quality experience (QoE), react, and correct the pathology on network. present an architecture assess real time QoE RTMP streams. Results from a small set preliminary experiments demonstrate we predict with 70-80% accuracy based stream state measurements previous users' ratings, using at little as 20 seconds information.

10.1109/pccc.2011.6108105 article EN 2011-11-01

Continuous-variable (CV) quantum key distribution (QKD) allows for secure communication with the benefit of being close to existing classical coherent communication. In recent years, CV QKD protocols using a discrete number displaced states have been studied intensively, as modulation can be directly implemented real devices finite digital resolution. However, experimental demonstrations until now only calculated rates in asymptotic regime. To used cryptographic applications, system has...

10.48550/arxiv.2410.12915 preprint EN arXiv (Cornell University) 2024-10-16

This paper proposes an Adaptive Heterogeneous Multiple Ant ColoniesSystem (AHMACS) Algorithm to solve the Traveling Salesman Problem (TSP).In this algorithm, heterogeneous multiple ant colonies with different pheromone updating mechanism had searching traits.To leverage feature, we designed a set of adaptive rules facilitate collaboration between these colonies.An evolution coefficient was defined adaptively determine sub-colonies' information exchange partners and strategies.This approach...

10.1515/jisys.2010.19.4.301 article EN cc-by-nc Journal of Intelligent Systems 2010-01-01

Academic institutions need to maintain publication lists for thousands of faculty and other scholars. Automated tools are essential minimize the direct feedback from scholars themselves who practically unable commit necessary effort keep data accurate. In relying exclusively on clustering techniques, author disambiguation applications fail satisfy key use cases academic institutions. Algorithms can perfectly group together a set publications authored by common individual, but, them be useful...

10.1371/journal.pone.0244641 article EN cc-by PLoS ONE 2021-04-01

In wireless sensor networks (WSNs), attackers could inject false data into the by compromising nodes. False injected compromised nodes, if undetected, not only cause alarms but also consume limited energy of posing serious threats to lifetime networks. To mitigate this type attacks, a number en-route filtering schemes filter inside have been developed in past. However, there is lack systematical strategy evaluate those and establishing foundation for designing techniques. address these...

10.1109/glocom.2011.6134278 article EN 2011-12-01

For the unsorted database quantum search with unknown fraction $\lambda$ of target items, there are mainly two kinds methods, i.e., fixed-point or trail-and-error. (i) In terms method, Yoder et al. [Phys. Rev. Lett. 113, 210501 (2014)] claimed that quadratic speedup over classical algorithms has been achieved. However, in this paper, we point out is not case, because query complexity Yoder's algorithm actually $O(1/\sqrt{\lambda_0})$ rather than $O(1/\sqrt{\lambda})$, where $\lambda_0$ a...

10.1088/1674-1056/ab4e88 article EN Chinese Physics B 2019-11-01

A white-box encryption algorithm is proposed for computing using a mobile agent protected with time-limited black box security. Block matrix multiplication on finite fields and secure addition randomly generated input output transformation generates set of tables that hide the key. Thus, countermeasure against threat could compromise key in attack context provides data by encrypted functions. The size implementation this small suitable migrating from one host to another as part agent.

10.6138/jit.2011.12.6.12 article EN 網際網路技術學刊 2011-11-01
Coming Soon ...