Yang Li

ORCID: 0000-0003-1812-3829
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Information and Cryptography
  • Quantum Computing Algorithms and Architecture
  • Optical Network Technologies
  • Quantum-Dot Cellular Automata
  • Quantum optics and atomic interactions
  • Quantum Mechanics and Applications
  • Advanced Frequency and Time Standards
  • Advanced Photonic Communication Systems
  • Photonic and Optical Devices
  • Privacy-Preserving Technologies in Data
  • Chaos-based Image/Signal Encryption
  • Network Time Synchronization Technologies
  • Advanced Fiber Laser Technologies
  • Atomic and Subatomic Physics Research
  • Internet Traffic Analysis and Secure E-voting
  • Cryptographic Implementations and Security
  • Semiconductor Lasers and Optical Devices
  • Wireless Signal Modulation Classification
  • Network Security and Intrusion Detection
  • Cold Atom Physics and Bose-Einstein Condensates
  • Cryptography and Data Security
  • Blockchain Technology Applications and Security
  • Digital Media Forensic Detection
  • Privacy, Security, and Data Protection
  • Wireless Communication Security Techniques

Southwestern Institute of Physics
2015-2025

Beijing Microelectronics Technology Institute
2024

Wuhan Institute of Physics and Mathematics
2023

Chinese Academy of Sciences
2022-2023

University of Chinese Academy of Sciences
2022-2023

China University of Mining and Technology
2023

National University of Defense Technology
2022

Aerospace Information Research Institute
2022

Hong Kong Baptist University
2022

Southern University of Science and Technology
2022

A high-speed Gaussian-modulated continuous-variable quantum key distribution (CVQKD) with a local oscillator (LLO) is experimentally demonstrated based on pilot-tone-assisted phase compensation. In the proposed scheme, frequency-multiplexing and polarization-multiplexing techniques are used for separate transmission heterodyne detection between signal pilot tone, guaranteeing no crosstalk from strong tone to weak different requirements of low-noise high-saturation limitation tone. Moreover,...

10.1364/oe.404611 article EN cc-by Optics Express 2020-10-11

A high-rate continuous-variable quantum key distribution (CV-QKD) system based on high-order discrete modulation is experimentally investigated. With the help of novel scheme, effective digital signal processing (DSP) algorithms and advanced analytical security proof methods, transmission results 5.059 km, 10.314 24.490 50.592 km are achieved for 1 GBaud optimized signals. Correspondingly, asymptotic secret rates (SKRs) 292.185 Mbps, 156.246 50.491 7.495 Mbps Gaussian (DG) 64QAM, 328.297...

10.1364/ol.456978 article EN Optics Letters 2022-06-10

Precise and secure time synchronization between two remote sites is necessary in many practical scenarios. Recently, the two-way fiber transfer (TWFTT) system has become an attractive option for high-precision synchronization. However, TWFTT implemented based on symmetric link assumption, such assumption may be maliciously utilized to cause significant asynchronization TWFTT. In this paper, we propose novel controllable asymmetry attack schemes TWFTT, namely, attenuation attack. We...

10.1109/jphot.2021.3121569 article EN cc-by IEEE photonics journal 2021-10-20

Abstract Continuous-variable quantum key distribution (CVQKD) has potential advantages of high secret rate, which is very suitable for high-speed metropolitan network application. However, the rates reported CVQKD systems are only a few Mbps over typical transmission distance so far. Here, we address fundamental experimental problems and demonstrate single-carrier four-state with sub-Gbps rate within area. In demonstrated using local oscillator, an ultra-low level excess noise obtained...

10.1038/s42005-022-00941-z article EN cc-by Communications Physics 2022-06-25

We experimentally demonstrated a sub-Mbps key rate Gaussian-modulated coherent-state (GMCS) continuous-variable quantum distribution (CV-QKD) over 100-km transmission distance. To efficiently control the excess noise, signal and pilot tone are co-transmitted in fiber channel based on wideband frequency polarization multiplexing methods. Furthermore, high-accuracy data-assisted time domain equalization algorithm is carefully designed to compensate phase noise variation low signal-to-noise...

10.1364/ol.485913 article EN Optics Letters 2023-02-28

Quantum Random Number Generators (QRNGs) have been theoretically proven to be able generate completely unpredictable random sequences, and important applications in many fields. However, the practical implementation of QRNG is always susceptible unwanted classical noise or device imperfections, which inevitably diminishes quality generated bits. It necessary perform post-processing extract true quantum randomness contained raw data by entropy source QRNG. In this work, a novel method for...

10.3390/e27010068 article EN cc-by Entropy 2025-01-14

We present FPGA-based emulation results of a single QC-LDPC code with 20% redundancy designed for applications in 100 Gb/s optical transmission systems. Error floor-free can be achieved at BER 10−15with Q factor 5.9 dB.

10.1364/ofc.2011.otun2 article EN 2011-01-01

The study of topological states has developed rapidly in electric circuits, which permits flexible fabrications non-Hermitian systems by introducing terms. Here, nonreciprocal coupling terms are realized utilizing a voltage follower module circuits. We report the experimental realization one- and two-dimensional skin interface where induced effects localized at different domains carrying winding numbers. Our circuit system provides readily accessible platform to explore non-Hermitian-induced...

10.1103/physrevresearch.5.043034 article EN cc-by Physical Review Research 2023-10-11

With the development of big data, data sharing has become a hot topic. According to previous research on sharing, there is problem with regard how design an effective incentive mechanism make users willing share data. First, we integrate incentives based reputation and payment introduce "credibility coins" as cryptocurrency for data-sharing transactions, encourage participate honestly in process federated learning. Second, propose dynamic model evolutionary game theory analyze stability...

10.1109/jiot.2022.3191671 article EN IEEE Internet of Things Journal 2022-07-18

Nowadays, Industrial Internet of Things (IIoT) technology has made a great progress and the industrial control systems (ICSs) have been used extensively, which brought more serious information security threats to ICS at same time. The authenticated key agreement (AKA) protocol is common method ensure communication security. This work proposes lightweight AKA based on elliptic curve cryptography (ECC) algorithm adapt resource-constrained environment. We only employ hash operation, XOR ECC...

10.1109/jiot.2022.3219233 article EN IEEE Internet of Things Journal 2022-11-04

With the development of big data and blockchain, an increasing number scholars have begun to study blockchain for sharing. By studying sharing models that are based on we find almost all them following problems: 1) it is difficult protect privacy integrity users' data, along with ownership; 2) storage burden heavy, lacks a mechanism dealing diverse types inconsistent formats; 3) consensus has low fairness or efficiency. Therefore, propose data-sharing protection model (DS2PM) federated...

10.1109/jiot.2021.3134755 article EN IEEE Internet of Things Journal 2021-12-13

Quantum key distribution, which ensures information-theoretically secret generation, is currently advancing through photonic integration to achieve high performance, cost reduction, and compact size, thereby facilitating the large-scale deployment. Continuous-variable quantum distribution an attractive approach for integrations due its compatibility with off-the-shelf optical communication devices. However, chip-based systems have encountered significant limitations primarily related...

10.1063/5.0203130 article EN mit Applied Physics Letters 2024-04-22

In practical continuous-variable quantum key distribution system using local oscillator (LLO CV-QKD), the phase noise related to coherent detection and phase-reference pulse intensity can be locally calibrated at receiver side. Therefore, it regarded as trusted in order obtain a higher secret rate transmission distance. However, security loopholes will opened for eavesdropper launch attacks without appropriate countermeasures. To this end, we propose two attack strategies, where Eve reduce...

10.1103/physreva.105.032601 article EN Physical review. A/Physical review, A 2022-03-02

Recently, the use of wireless channel state information (CSI) to generate encryption keys in physical layer has gained significant attention from researchers. Unlike classical cryptography, this approach relies on variability channel, reciprocity, and spatial decorrelation ensure security, making it more lightweight providing strong randomness. This article proposes a key generation scheme for LAN MIMO systems based feature fusion autoencoder (FFAEncoder) address issue high disagreement rate...

10.1109/jiot.2023.3288641 article EN IEEE Internet of Things Journal 2023-06-24

Two-way fiber-optic time transfer (TWFTT) is a promising precise synchronization technique with subnanosecond stability. However, the asymmetric delay attack severe threat, which can deteriorate performance of TWFTT system. In this article, clock model-based scheme used to defend attack. For scheme, security threshold set according two-state model, and estimated frequency difference excluded from measured detect Systematic detection mitigation for developed in article. Theoretical simulation...

10.1109/tim.2023.3268476 article EN cc-by IEEE Transactions on Instrumentation and Measurement 2023-01-01

Physical-layer secret key generation (PLKG) is a new research area that has emerged in recent years. It aimed at scenarios where legitimate IoT devices communicate directly, interacting with confidential information for lower overhead and higher security by using wireless channel. When applying it to feature extraction, noise removal not taken into account current deep learning networks. To address these problems, the PLKG scheme based on bidirectional convergence convolutional network...

10.1109/jiot.2023.3244993 article EN IEEE Internet of Things Journal 2023-02-16

The round-trip fiber time synchronization system is preferred for high-precision due to its easier implementation compared bidirectional systems. However, link-symmetry assumption renders it susceptible asymmetric delay attacks, posing a serious threat the that current encryption methods cannot effectively prevent. This letter proposes controllable channel attack scheme system. objective assess impact of asymmetry on accuracy by measuring difference between local and remote ends Experimental...

10.1109/lpt.2023.3315965 article EN IEEE Photonics Technology Letters 2023-09-15

With the rapid development of machine learning and a growing concern for data privacy, federated has become focal point attention. However, attacks on model parameters lack incentive mechanisms hinder effectiveness learning. Therefore, we propose A Privacy Protected Blockchain-based Federated Learning Model (PPBFL) to enhance security encourage active participation nodes in training. Blockchain technology ensures integrity stored InterPlanetary File System (IPFS), providing protection...

10.48550/arxiv.2401.01204 preprint EN other-oa arXiv (Cornell University) 2024-01-01

Quantum key distribution allows secret generation with information theoretical security. It can be realized photonic integrated circuits to benefit the tiny footprints and large-scale manufacturing capacity. Continuous-variable quantum is suitable for chip-based integration due its compatibility mature optical communication devices. However, signal power control compatible process faces difficulties on stability, which limits system performance causes overestimation of a rate that opens...

10.1364/ol.522320 article EN Optics Letters 2024-04-10

A quantum random-number generator (QRNG) can theoretically generate unpredictable random numbers with perfect devices and is an ideal secure source of for cryptography. However, the practical implementations always contain imperfections, which will greatly influence randomness final output even open loopholes to eavesdroppers. Recently, Thewes et al. experimentally demonstrated a continuous-variable eavesdropping attack, based on heterodyne detection, trusted QRNG in Phys. Rev. 100, 052318...

10.1103/physreva.102.012422 article EN Physical review. A/Physical review, A 2020-07-21
Coming Soon ...