- Quantum Computing Algorithms and Architecture
- Quantum Information and Cryptography
- Quantum Mechanics and Applications
- Molecular Communication and Nanonetworks
- Network Traffic and Congestion Control
- Cryptographic Implementations and Security
- Mobile Agent-Based Network Management
- Advanced Mathematical Theories
- Internet Traffic Analysis and Secure E-voting
- Quantum-Dot Cellular Automata
- Educational Technology and Assessment
- Service-Oriented Architecture and Web Services
- Higher Education and Teaching Methods
- Seismology and Earthquake Studies
- Seismic Waves and Analysis
- Computational Geometry and Mesh Generation
- Phytochemistry and Biological Activities
- Wireless Networks and Protocols
- Mining and Resource Management
- Chaos-based Image/Signal Encryption
- Human Mobility and Location-Based Analysis
- Advanced Vision and Imaging
- Advanced Decision-Making Techniques
- Computational Drug Discovery Methods
- Advanced Data Compression Techniques
University of Science and Technology of China
2021-2025
Shanghai Tunnel Engineering Rail Transit Design & Research Institute
2022
Chinese Academy of Medical Sciences & Peking Union Medical College
2022
Wangjing Hospital of China Academy of Chinese Medical Sciences
2022
University of Alabama in Huntsville
2021
Fordham University
2021
China University of Mining and Technology
2016
Yanshan University
2013
Shanghai Institute of Geological Survey
2013
Huazhong University of Science and Technology
2013
Over the past few decades, significant progress has been made in quantum information technology, from theoretical studies to experimental demonstrations. Revolutionary applications are now limelight, showcasing advantages of technology and becoming a research hotspot academia industry. To enable have more profound impact wider application, interconnection multiple nodes through channels becomes essential. Building an entanglement-assisted network, capable realizing transmission between these...
The theory and experiment of quantum information have been studied extensively in recent years, the feasibility communication has proved. Although fundamental technology is not yet mature, research on internet should be conducted. To implement internet, an architecture that describes how nodes are linked to form networks protocol functions vertically composed need developed urgently. In this paper, we present a novel design cluster-based structure describe interconnected, can improve...
Microseismic (MS) technology has been widely adopted for monitoring coal and rock dynamic disasters. Insights into MS wave characteristics contribute to the accurate prediction of these In this study, were analysed from three aspects: signal spectra, wavelet packet energy fractal features. It is shown that prior burst, main frequency decreased following a power law, amplitude linearly increased, tended become concentrated on low bands, correlation dimension decreased. When burst occurred,...
Quantum network is a promising platform for numerous quantum applications, including distributed computing, secure communication, and improved sensing. Implementing entanglement distribution between remote nodes plays vital role in realizing the network's capabilities, it requires effective protocols. To meet this requirement, we propose two strategies, namely connection-oriented connectionless, to achieve end-to-end inspired by designs of classical communication. For strategy, an exclusive...
Remote entanglement distribution plays a crucial role in quantum networks, which can support many essential and exciting applications. As the network scale expands, it is urgent to design general efficient remote protocol. Nowadays, connection-oriented protocols are available achieve reliable distribution. However, memory-limited cannot utilize resources fully increase delay of End-to-End (E2E) connection establishment. To overcome these shortcomings existing protocols, we connectionless...
The quantum network is designed to connect numerous nodes and support various ground-breaking applications. Most of these applications require communicating parties share entangled pairs. Therefore, entanglement routing, a technology distributing pairs between distant nodes, plays vital role in realizing networks' capability. However, due the limitation memory size decoherence, shared by adjacent can hardly satisfy concurrent routing requests, thus leading severe congestion. In this paper,...
WireGuard is a pioneering and lightweight Virtual Private Network (VPN) protocol that has been merged into the Linux kernel. It leverages Noise secure framework to provide advanced security functionalities, such as identity hiding perfect forward security. Although an optional pre-shared key mode ensure security, features are guaranteed by asymmetric cryptography algorithms, which cannot be held in face of superior quantum computers. To achieve quantum-resistant should avoid using vulnerable...
The therapeutic effects of a combination Chinese medicines called Baihedihuang decoction (BD) have been clinically verified, although its molecular targets in breast cancer related anxiety remain unknown.To explore the mechanisms BD for treatment.We used Traditional Medicine Systems Pharmacology database to screen active ingredients and potential BD, constructed "drug-ingredient-target" network map with help Cytoscape 3.8 software. Also, we Online Mendelian Inheritance Man, DrugBank,...
Remote entanglement distribution in an efficient and reliable manner, especially the context of a large-scale quantum network with multiple requests, remains unsolved challenge. The key difficulties lie achieving spontaneous precise control over procedure, as nodes need to reach consensus on how perform it. From aspect, allocating link-layer entangled pairs resources achieve high efficiency is also challenging. To address these issues, we propose decentralized Reliable Entanglement...
Quantum Key Distribution (QKD) offers a novel approach to address the challenges posed by quantum computations in classical ciphers. Due hardware limitations and stochastic nature of QKD protocols, secure key generation rate is currently constrained subject fluctuations. However, users expect consistent supply keys at stable while maintaining threshold. To this issue, we present Continuous Secure Derivation Function named Q-CSKDF that utilizes produce stable, high-rate, but derivated keys....
With the trend of economic globalization and localization services, employees are distributed in different regions, old enterprise information system closed environment has been difficult to support all business enterprises, also cannot meet need sharing between upstream downstream enterprises partners supply chain. The new model requires companies have systems, remote access other characteristics. VPN (virtual private network) is high cost lack flexibility, Web services-based can achieve...
Path planning is an important problem for mobile robot in complex environments. In this paper, optimized path method based on segmented Bezier curves and A* algorithm proposed. The result of used to guide the direction curves, which fit path. are generated meet requirements fitting index with consideration constraints from environment itself. set each connected end regarded as robot. effectiveness proposed verified through experiments.