| Publication | Date of Publication | Type |
|---|
Near-term quantum algorithm for solving the MaxCut problem with fewer quantum resources Physica A | 2024-08-26 | Paper |
Experimental and analytical study on the penetration depth of mortar targets subjected to projectile impact in the hypervelocity regime International Journal of Structural Stability and Dynamics | 2024-05-08 | Paper |
Decoy-state quantum private query protocol with two-way communication Physica A | 2024-01-19 | Paper |
Ensemble extended belief rule-based systems with different similarity measures for classification problems International Journal of Approximate Reasoning | 2023-12-12 | Paper |
Defining And Estimating Principal Stratum Specific Natural Mediation Effects With Semi-competing Risks Data STATISTICA SINICA | 2023-11-14 | Paper |
Discussion on “Causal mediation of semicompeting risks” by Yen‐Tsung Huang Biometrics | 2023-10-30 | Paper |
Noniterative adjustment to regression estimators with population‐based auxiliary information for semiparametric models Biometrics | 2023-10-30 | Paper |
A modification of Faddeev–Popov approach free from Gribov ambiguity Communications in Theoretical Physics | 2023-09-14 | Paper |
Tight bound on tilted CHSH inequality with measurement dependence Physica A | 2023-09-08 | Paper |
Quantum alternating operator ansatz for solving the minimum exact cover problem Physica A | 2023-09-08 | Paper |
A fast belief rule base generation and reduction method for classification problems International Journal of Approximate Reasoning | 2023-09-04 | Paper |
Quantum algorithm for unsupervised anomaly detection Physica A | 2023-08-07 | Paper |
Expanding the sharpness parameter area based on sequential \(3 \rightarrow 1\) parity-oblivious quantum random access code Quantum Information Processing | 2023-06-01 | Paper |
Quantum discriminative canonical correlation analysis Quantum Information Processing | 2023-05-23 | Paper |
\(N\)-qudit SLOCC equivalent \(W\) states are determined by their bipartite reduced density matrices with tree form Quantum Information Processing | 2023-02-16 | Paper |
The effect on \((2, N, 2)\) Bell tests with distributed measurement dependence Quantum Information Processing | 2023-02-03 | Paper |
Local distinguishability of generalized Bell states with one ebit of entanglement Journal of Physics A: Mathematical and Theoretical | 2023-01-23 | Paper |
Using entanglement more efficiently in distinguishing orthogonal product states by LOCC Quantum Information Processing | 2023-01-05 | Paper |
Quantum data compression by principal component analysis Quantum Information Processing | 2022-12-08 | Paper |
Cryptanalysis of multiparty quantum digital signatures Quantum Information Processing | 2022-12-08 | Paper |
Cryptanalysis of secure multiparty quantum summation Quantum Information Processing | 2022-12-06 | Paper |
Practical quantum contract signing without quantum storage Quantum Information Processing | 2022-11-28 | Paper |
Quantum mean centering for block-encoding-based quantum algorithm Physica A | 2022-11-11 | Paper |
Controlling the key by choosing the detection bits in quantum cryptographic protocols Science China Information Sciences | 2022-10-28 | Paper |
Quantum algorithms for anomaly detection using amplitude estimation Physica A | 2022-09-06 | Paper |
Cryptanalysis of quantum digital signature for the access control of sensitive data Physica A | 2022-03-09 | Paper |
Finite-time synchronization of memristor-based complex-valued neural networks with time delays Physics Letters. A | 2021-09-29 | Paper |
Numerical modelling of interaction between aluminium structure and explosion in soil Applied Mathematical Modelling | 2021-09-21 | Paper |
Cryptanalysis of a multi-party quantum key agreement protocol with single particles Quantum Information Processing | 2020-06-16 | Paper |
A new rule reduction and training method for extended belief rule base based on DBSCAN algorithm International Journal of Approximate Reasoning | 2020-02-27 | Paper |
Semiparametric regression analysis of length-biased interval-censored data Biometrics | 2020-02-07 | Paper |
Efficient simulation budget allocation for subset selection using regression metamodels Automatica | 2019-12-19 | Paper |
Semiparametric regression analysis of multiple right- and interval-censored events Journal of the American Statistical Association | 2019-11-12 | Paper |
Data encryption algorithm for e-commerce platform based on blockchain technology Discrete and Continuous Dynamical Systems. Series S | 2019-08-23 | Paper |
Early diagnosis of neurological disease using peak degeneration ages of multiple biomarkers The Annals of Applied Statistics | 2019-08-15 | Paper |
Maximum likelihood estimation for semiparametric regression models with multivariate interval-censored data Biometrika | 2019-06-24 | Paper |
One-bit quantization and distributed detection with an unknown scale parameter Algorithms | 2019-03-26 | Paper |
The critical detection efficiency for closing the detection loophole of some modified Bell inequalities Quantum Information Processing | 2019-03-15 | Paper |
Combination of biorthogonal wavelet hybrid kernel OCSVM with feature weighted approach based on EVA and GRA in financial distress prediction Mathematical Problems in Engineering | 2019-02-08 | Paper |
Decompositions of edge-colored digraphs: a new technique in the construction of constant-weight codes and related families SIAM Journal on Discrete Mathematics | 2019-01-23 | Paper |
A universal constraint on the infrared behavior of the ghost propagator in QCD Physics Letters B | 2018-12-07 | Paper |
Semiparametric estimation of the accelerated failure time model with partly interval-censored data Biometrics | 2018-11-16 | Paper |
Complex networks modeled on the Sierpinski gasket Physica A | 2018-11-13 | Paper |
Fault diagnosis for engine based on single-stage extreme learning machine Mathematical Problems in Engineering | 2018-10-12 | Paper |
Perfect quantum multiple-unicast network coding protocol Quantum Information Processing | 2018-08-07 | Paper |
A Generic Construction of Quantum-Oblivious-Key-Transfer-Based Private Query with Ideal Database Security and Zero Failure IEEE Transactions on Computers | 2018-06-27 | Paper |
scientific article; zbMATH DE number 6875263 (Why is no real title available?) | 2018-05-25 | Paper |
Local indistinguishability of multipartite orthogonal product bases Quantum Information Processing | 2018-02-27 | Paper |
RAMP and an improved algorithm for sparse channel estimation in MIMO-OFDM system | 2018-01-29 | Paper |
Existence of mild solutions for the vibration equations of beam with structural damping | 2017-10-20 | Paper |
Research on UWB synchronization technology and its implementation in FPGA | 2017-10-20 | Paper |
A deterministic auto-regressive STAP approach for nonhomogenerous clutter suppression Multidimensional Systems and Signal Processing | 2017-08-10 | Paper |
scientific article; zbMATH DE number 6747393 (Why is no real title available?) | 2017-07-14 | Paper |
Optimal Ternary Constant-Composition Codes of Weight Four and Distance Five IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Deterministic Construction of Compressed Sensing Matrices via Algebraic Curves IEEE Transactions on Information Theory | 2017-06-08 | Paper |
An Improvement on the Gilbert–Varshamov Bound for Permutation Codes IEEE Transactions on Information Theory | 2017-06-08 | Paper |
New Bounds on Separable Codes for Multimedia Fingerprinting IEEE Transactions on Information Theory | 2017-05-16 | Paper |
A novel semisupervised support vector machine classifier based on active learning and context information Multidimensional Systems and Signal Processing | 2016-11-03 | Paper |
A small-world and scale-free network generated by Sierpinski tetrahedron Fractals | 2016-07-05 | Paper |
Determination of locally perfect discrimination for two-qubit unitary operations Quantum Information Processing | 2016-04-04 | Paper |
Weighted two-phase supervised sparse representation based on Gaussian for face recognition Discrete and Continuous Dynamical Systems. Series S | 2016-03-10 | Paper |
Asymptotic formula on average path length of fractal networks modeled on Sierpinski gasket Journal of Mathematical Analysis and Applications | 2015-11-17 | Paper |
Local distinguishability of maximally entangled states in canonical form Quantum Information Processing | 2015-11-11 | Paper |
Perfect discrimination of projective measurements with the rank of all projectors being one Quantum Information Processing | 2015-08-11 | Paper |
General bounds for quantum discord and discord distance Quantum Information Processing | 2015-06-05 | Paper |
Asymptotic stability of solutions to elastic systems with structural damping | 2015-04-27 | Paper |
Bound on local unambiguous discrimination between multipartite quantum states Quantum Information Processing | 2015-04-13 | Paper |
Objective image quality assessment: a survey International Journal of Computer Mathematics | 2015-02-23 | Paper |
Novel multiparty quantum key agreement protocol with GHZ states Quantum Information Processing | 2015-01-09 | Paper |
Optimization iterative learning control for constrained systems Journal of Tsinghua University. Science and Technology | 2014-11-03 | Paper |
A new delay-range-dependent \(H_\infty\) filter design for T-S nonlinear systems Journal of the Franklin Institute | 2014-06-25 | Paper |
Quantum key agreement with EPR pairs and single-particle measurements Quantum Information Processing | 2014-06-13 | Paper |
One-way LOCC indistinguishability of maximally entangled states Quantum Information Processing | 2014-06-13 | Paper |
Improved convected particle domain interpolation method for coupled dynamic analysis of fully saturated porous media involving large deformation Computer Methods in Applied Mechanics and Engineering | 2014-05-13 | Paper |
Quantum private comparison protocol based on entanglement swapping of \(d\)-level Bell states Quantum Information Processing | 2014-02-25 | Paper |
Numerical analysis of respiratory flow patterns within human upper airway Acta Mechanica Sinica | 2013-08-09 | Paper |
Multiparty quantum key agreement with single particles Quantum Information Processing | 2013-07-05 | Paper |
A watermark strategy for quantum images based on quantum Fourier transform Quantum Information Processing | 2013-05-31 | Paper |
Efficient quantum private comparison employing single photons and collective detection Quantum Information Processing | 2013-05-31 | Paper |
A quantum watermark protocol International Journal of Theoretical Physics | 2013-04-08 | Paper |
Participant attack and improvement to multiparty quantum secret sharing based on GHZ states International Journal of Theoretical Physics | 2013-04-08 | Paper |
Splitting a quantum secret without the assistance of entanglements Quantum Information Processing | 2013-03-04 | Paper |
Cryptanalysis of the QSDC protocol without using perfect quantum channel International Journal of Quantum Information | 2013-02-11 | Paper |
Dynamic quantum secret sharing Physics Letters. A | 2013-01-22 | Paper |
Comment on ``Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair Physical Review A | 2013-01-19 | Paper |
Remote preparation of a six-particle entangled cluster-type state International Journal of Theoretical Physics | 2013-01-10 | Paper |
Deterministic secure quantum communication with collective detection using single photons International Journal of Theoretical Physics | 2013-01-10 | Paper |
Global stability of periodic solutions and almost periodic solutions of price cooperating models with time lag Acta Mathematica Scientia. Series A. (Chinese Edition) | 2012-10-05 | Paper |
Eavesdropping and improvement to multiparty quantum secret sharing with collective eavesdropping-check International Journal of Theoretical Physics | 2012-07-17 | Paper |
Quantum private comparison using genuine four-particle entangled states International Journal of Theoretical Physics | 2012-07-17 | Paper |
A complete generalization of clatworthy group divisible designs SIAM Journal on Discrete Mathematics | 2012-03-15 | Paper |
Blurred defocused image restoration based on truncated singular value decomposition | 2012-01-27 | Paper |
scientific article; zbMATH DE number 5989869 (Why is no real title available?) | 2011-12-19 | Paper |
Cryptanalysis and improvement of multiparty quantum secret sharing schemes Physics Letters. A | 2011-11-30 | Paper |
The existence of positive solutions of nonlocal boundary value problems for the fourth order | 2011-09-29 | Paper |
Comment on: ``Three-party quantum secure direct communication based on GHZ states Physics Letters. A | 2011-09-06 | Paper |
Robust quantum secure direct communication over collective rotating channel Communications in Theoretical Physics | 2011-06-30 | Paper |
Joint optimal ordering and weather hedging decisions: mean-CVaR model Flexible Services and Manufacturing Journal | 2011-05-30 | Paper |
Clutter suppression for airborne phased radar with conformal arrays by least squares estimation Signal Processing | 2011-05-19 | Paper |
Quantum key distribution by constructing nonorthogonal states with Bell states International Journal of Modern Physics B | 2011-02-03 | Paper |
A two-step channel-encrypting quantum key distribution protocol International Journal of Quantum Information | 2011-01-20 | Paper |
One-time pads cannot be used to improve the efficiency of quantum communication Physics Letters. A | 2011-01-20 | Paper |
Supporting Information for the Paper: Optimal Ternary Constant-Composition Codes of Weight Four and Distance Five, IEEE Trans. Inform. Theory, To Appear | 2010-12-02 | Paper |
A novel support vector regression model | 2010-11-05 | Paper |
Quantum key distribution without alternative measurements and rotations Physics Letters. A | 2010-09-27 | Paper |
On the information-splitting essence of two types of quantum key distribution protocols Physics Letters. A | 2010-03-01 | Paper |
Risk-oriented evaluation based on fuzzy proximity for clusters | 2009-11-11 | Paper |
Security of quantum secret sharing with two-particle entanglement against individual attacks | 2009-10-12 | Paper |
Restricted triple I method and opposite direction restricted triple I method under Lukasiewicz implication operator | 2009-08-03 | Paper |
Improving the security of multiparty quantum secret sharing against an attack with a fake signal Physics Letters. A | 2008-10-29 | Paper |
A simple participant attack on the Bradler--Dusek protocol | 2008-09-03 | Paper |
Appraise students synthetically with analytic hierarchy process | 2008-04-04 | Paper |
Diffusion on a curved surface coupled to diffusion in the volume: application to cell biology Journal of Computational Physics | 2007-11-01 | Paper |
Information Security and Cryptology Lecture Notes in Computer Science | 2006-11-14 | Paper |
scientific article; zbMATH DE number 1983532 (Why is no real title available?) | 2003-01-01 | Paper |
Convexification, concavification and monotonization in global optimization Annals of Operations Research | 2002-03-26 | Paper |
scientific article; zbMATH DE number 967203 (Why is no real title available?) | 1997-05-26 | Paper |
scientific article; zbMATH DE number 4016533 (Why is no real title available?) | 1987-01-01 | Paper |
scientific article; zbMATH DE number 3898529 (Why is no real title available?) | 1984-01-01 | Paper |