| Publication | Date of Publication | Type |
|---|
Probability and entanglement evolutions for Szegedy's quantum search on the one-dimensional cycle with self-loops Quantum Information Processing | 2023-03-01 | Paper |
Comment on ``Protection of quantum dialogue affected by quantum field'' Quantum Information Processing | 2023-03-01 | Paper |
Comment on: ``Controlled quantum secure direct communication with authentication protocol based on five-particle cluster state and classical XOR operation'' Quantum Information Processing | 2023-02-22 | Paper |
A unitary operator construction solution based on Pauli group for maximal dense coding with a class of symmetric states Quantum Information Processing | 2023-02-03 | Paper |
Quantum transport on large-scale sparse regular networks by using continuous-time quantum walk Quantum Information Processing | 2023-02-03 | Paper |
Security loopholes in the controlled quantum dialogue robust against conspiring users protocol Quantum Information Processing | 2022-12-08 | Paper |
QIPC: a novel quantum representation model for polar coordinate images Quantum Information Processing | 2022-12-05 | Paper |
Continuous-time quantum walks on strongly regular graphs with loops and its application to spatial search for multiple marked vertices Quantum Information Processing | 2022-11-25 | Paper |
Construction of minimal trellises for quantum stabilizer codes Science China Information Sciences | 2021-12-15 | Paper |
Construction of punctured and extended quantum codes over GF(2) Science China Information Sciences | 2021-12-15 | Paper |
Correlation between the continuous-time quantum walk and cliques in graphs and its application International Journal of Quantum Information | 2021-07-21 | Paper |
Analyzing and improving the secure quantum dialogue protocol based on four-qubit cluster state International Journal of Theoretical Physics | 2020-09-04 | Paper |
Entanglement in phase estimation algorithm and quantum counting algorithm International Journal of Theoretical Physics | 2020-06-19 | Paper |
Passive attack to the controlled secure direct communication with seven-qubit entangled states protocol Modern Physics Letters A | 2020-01-06 | Paper |
Cryptanalysis and improvement of the robust quantum dialogue protocols based on the entanglement swapping between any two logical Bell states and the shared auxiliary logical Bell state Modern Physics Letters A | 2019-09-27 | Paper |
Cryptanalysis of the efficient controlled quantum secure direct communication and authentication by using four particle cluster states protocol International Journal of Theoretical Physics | 2019-09-03 | Paper |
Analyzing and revising quantum dialogue without information leakage based on the entanglement swapping between any two Bell states and the shared secret Bell state International Journal of Theoretical Physics | 2019-05-03 | Paper |
Cryptanalysis and improvement in controlled quantum dialogue using cluster states Quantum Information Processing | 2019-03-15 | Paper |
Analysis and improvement of large payload bidirectional quantum secure direct communication without information leakage International Journal of Theoretical Physics | 2018-08-02 | Paper |
| Spatial search for a general multi-vertex state on graph by continuous-time quantum walks | 2018-04-09 | Paper |
Quantum circuit synthesis using a new quantum logic gate library of NCV quantum gates International Journal of Theoretical Physics | 2018-03-14 | Paper |
Cryptanalysis and improvement of efficient quantum dialogue using entangled states and entanglement swapping without information leakage Quantum Information Processing | 2018-03-05 | Paper |
Analysis and revision of secure quantum dialogue via cavity QED International Journal of Theoretical Physics | 2018-02-22 | Paper |
Generalized quantum counting algorithm for non-uniform amplitude distribution Quantum Information Processing | 2017-10-23 | Paper |
| Asymmetric quantum product and tensor product codes | 2017-10-20 | Paper |
| Puncturing method for systematic Polar code based on decoding reliability | 2017-10-20 | Paper |
Comments on and Corrections to “On the Equivalence of Generalized Concatenated Codes and Generalized Error Location Codes” [Mar 00 642-649] IEEE Transactions on Information Theory | 2017-10-19 | Paper |
Cryptanalysis of controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad International Journal of Theoretical Physics | 2017-03-28 | Paper |
Deterministic joint remote preparation of arbitrary four-qubit cluster-type state using EPR pairs International Journal of Theoretical Physics | 2017-03-24 | Paper |
Information leakage problem in efficient bidirectional quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom International Journal of Theoretical Physics | 2017-03-24 | Paper |
A construction of quantum error-locating codes Communications in Theoretical Physics | 2017-03-13 | Paper |
Finding structural anomalies in complete graphs using scattering quantum walks International Journal of Quantum Information | 2016-12-22 | Paper |
Quantum computation for large-scale image classification Quantum Information Processing | 2016-10-27 | Paper |
| Quantum particle swarm optimization algorithm with crossover operator | 2016-08-10 | Paper |
Constructions of asymmetric quantum alternant codes International Journal of Theoretical Physics | 2016-04-08 | Paper |
Quantum image with high retrieval performance Quantum Information Processing | 2016-04-01 | Paper |
| A high-capacity quantum secret sharing scheme based on six states | 2015-02-11 | Paper |
Realization of a new permutative gate library using controlled-\(k\)th-root-of-NOT quantum gates for exact minimization of quantum circuits International Journal of Quantum Information | 2014-12-23 | Paper |
Quantum simultaneous secret distribution with dense coding by using cluster states Quantum Information Processing | 2014-12-05 | Paper |
Cryptanalysis and improvement of quantum private comparison protocol based on Bell entangled states Communications in Theoretical Physics | 2014-10-15 | Paper |
Classical-operation-based deterministic secure quantum communication International Journal of Theoretical Physics | 2014-09-30 | Paper |
Improvement on ``an efficient protocol for the quantum private comparison of equality with \(W\) state'' International Journal of Quantum Information | 2014-05-28 | Paper |
Selection of unitary operations in quantum secret sharing without entanglement Science China Information Sciences | 2013-07-03 | Paper |
Efficient algorithms for optimal 4-bit reversible logic system synthesis Journal of Applied Mathematics | 2013-06-14 | Paper |
High-dimensional deterministic multiparty quantum secret sharing without unitary operations Quantum Information Processing | 2013-03-04 | Paper |
Construction of quantum codes based on elementary transformations Journal of Southeast University. Natural Science Edition | 2012-10-05 | Paper |
A simple and secure quantum secret sharing scheme based on product states International Journal of Quantum Information | 2012-08-30 | Paper |
Analyzing and revising a two-way protocol for quantum cryptography with a nonmaximally entangled qubit pair International Journal of Quantum Information | 2011-11-18 | Paper |
| scientific article; zbMATH DE number 5951630 (Why is no real title available?) | 2011-09-29 | Paper |
| A class of quantum codes over finite fields | 2011-07-19 | Paper |
An algorithm for optimizing quantum reversible logic synthesis Journal of Software | 2010-11-05 | Paper |
The convex-concave characteristics of Gaussian channel capacity functions IEEE Transactions on Information Theory | 2008-12-21 | Paper |
| scientific article; zbMATH DE number 5031927 (Why is no real title available?) | 2006-06-14 | Paper |
| scientific article; zbMATH DE number 1511890 (Why is no real title available?) | 2000-09-27 | Paper |
Upper bounds on the capacity of discrete-time blockwise white Gaussian channels with feedback IEEE Transactions on Information Theory | 2000-09-07 | Paper |
Operator inequality and its application to capacity of Gaussian channel Taiwanese Journal of Mathematics | 2000-01-01 | Paper |
Refinements of the half-bit and factor-of-two bounds for capacity in Gaussian channel with feedback IEEE Transactions on Information Theory | 1999-11-21 | Paper |