- Quantum Information and Cryptography
- Quantum Computing Algorithms and Architecture
- Quantum Mechanics and Applications
- Advanced Computational Techniques and Applications
- Chromium effects and bioremediation
- Optical Network Technologies
- Geochemistry and Geologic Mapping
- Distributed Control Multi-Agent Systems
- Environmental remediation with nanomaterials
- Mobile Agent-Based Network Management
- Advanced Wireless Network Optimization
- Cooperative Communication and Network Coding
- IPv6, Mobility, Handover, Networks, Security
- Auditing, Earnings Management, Governance
- Advanced Algorithms and Applications
- Quantum optics and atomic interactions
- Mathematical Biology Tumor Growth
- Geoscience and Mining Technology
- Energy Efficient Wireless Sensor Networks
- Molecular Communication and Nanonetworks
- Adsorption and biosorption for pollutant removal
- Heavy metals in environment
- Cryptographic Implementations and Security
- Photonic and Optical Devices
- Financial Reporting and Valuation Research
Beijing University of Posts and Telecommunications
2008-2024
Chongqing University
2015-2024
Shihezi University
2023-2024
Chinese Academy of Geological Sciences
2024
China State Construction Engineering (China)
2023
Southwestern Institute of Physics
2019-2023
Guizhou Electric Power Design and Research Institute
2023
Chengdu University of Traditional Chinese Medicine
2023
Anhui Science and Technology University
2022
Anhui University of Science and Technology
2022
An intelligent transportation system (ITS) plays an important role in public transport management, security and other issues. Traffic flow detection is part of the ITS. Based on real-time acquisition urban road traffic information, ITS provides guidance for relieving jams reducing environmental pollution. The usually adopts cloud computing mode. edge network will transmit all captured video to center. However, increasing monitoring has brought great challenges storage, communication...
Higher security and lower failure probability have always been people's pursuits in quantum-oblivious-key-transfer-based private query (QOKT-PQ) protocols since Jacobi et al. [Phys. Rev. A 83, 022301 (2011)] proposed the first protocol of this kind. However, higher database generally has to be obtained at cost a probability, vice versa. Recently, based on round-robin differential-phase-shift quantum key distribution protocol, Liu [Sci. China-Phys. Mech. Astron., 58, 100301 (2015)] presented...
Quantum private query (QPQ) is a kind of quantum protocols to protect both users' privacy in their communication. There an interesting example, that is, Alice wants buy one item from Bob's database, which composed quantity valuable messages. QPQ protocol the communication procedure ensuring can get only Bob, and at same time, Bob cannot know was taken by Alice. Owing its practicability, quantum-key-distribution-based has draw much attention recent years. However, post-processing key such...
Point of interest (POI) recommendation, which provides personalized recommendation places to mobile users, is an important task in location-based social networks (LBSNs). However, quite different from traditional interest-oriented merchandise POI more complex due the timing effects: we need examine whether fits a user's availability. While there are some prior studies included temporal effect into recommendations, they overlooked compatibility between time-varying popularity POIs and regular...
A high-rate continuous-variable quantum key distribution (CV-QKD) system based on high-order discrete modulation is experimentally investigated. With the help of novel scheme, effective digital signal processing (DSP) algorithms and advanced analytical security proof methods, transmission results 5.059 km, 10.314 24.490 50.592 km are achieved for 1 GBaud optimized signals. Correspondingly, asymptotic secret rates (SKRs) 292.185 Mbps, 156.246 50.491 7.495 Mbps Gaussian (DG) 64QAM, 328.297...
We present a flexible quantum-key-distribution-based protocol for quantum private queries.Similar to M. Jakobi et al 's [Phys.Rev. A 83, 022301 (2011)], it is loss tolerant, practical and robust against memory attack.Furthermore, our more controllable.We show that, by adjusting the value of θ, average number key bits Alice obtains can be located on any fixed users wanted database size.And parameter k generally smaller (even = 1 achieved) when θ < π/4, which implies lower complexity both...
Based on the fundamental concept of quantum counterfactuality, we propose a protocol to achieve private database queries, which is theoretical study how counterfactuality can be employed beyond counterfactual key distribution (QKD). By adding crucial detecting apparatus device QKD, privacy both distrustful user and owner guaranteed. Furthermore, proposed private-database-query makes full use low efficiency in by adjusting relevant parameters, obtains excellent flexibility extensibility.
By exploring different granularities of data-level and task-level parallelism, we map 16 implementations an Advanced Encryption Standard (AES) cipher with both online offline key expansion on a fine-grained many-core system. The smallest design utilizes only six cores for eight expansion, while the largest requires 107 137 cores, respectively. In comparison published AES general purpose processors, our has 3.5-15.6 times higher throughput per unit chip area 8.2-18.1 energy efficiency....
Anonymous ranking is a kind of privacy-preserving whereby each the involved participants can correctly and anonymously get rankings his data. It be utilized to solve many practical problems, such as students' exam scores. We investigate issue how quantum mechanics use in maintaining anonymity multiparty present series anonymous multiparty, multidata protocols. In these protocols, participant correct data nobody else match identity Furthermore, security protocols with respect different kinds...