| Publication | Date of Publication | Type |
|---|
| Finding maximum independent set based on multi-stage simulated quantum adiabatic evolution | 2024-09-19 | Paper |
| Force-chemical coupling analysis of nanocomposite anode during charging and discharging process | 2024-05-29 | Paper |
| Quantum approximate optimization for combinatorial problems with constraints | 2024-04-18 | Paper |
| Quantum secret sharing with identity authentication based on GHZ states entanglement swapping | 2024-02-02 | Paper |
| Recursive quantum circuits for generating sequency ordering Walsh-Hadamard transform | 2023-06-13 | Paper |
| Probability and entanglement evolutions for Szegedy's quantum search on the one-dimensional cycle with self-loops | 2023-03-01 | Paper |
| Comment on ``Protection of quantum dialogue affected by quantum field | 2023-03-01 | Paper |
| Comment on: ``Controlled quantum secure direct communication with authentication protocol based on five-particle cluster state and classical XOR operation | 2023-02-22 | Paper |
| A unitary operator construction solution based on Pauli group for maximal dense coding with a class of symmetric states | 2023-02-03 | Paper |
| Quantum transport on large-scale sparse regular networks by using continuous-time quantum walk | 2023-02-03 | Paper |
| Security loopholes in the controlled quantum dialogue robust against conspiring users protocol | 2022-12-08 | Paper |
| QIPC: a novel quantum representation model for polar coordinate images | 2022-12-05 | Paper |
| Continuous-time quantum walks on strongly regular graphs with loops and its application to spatial search for multiple marked vertices | 2022-11-25 | Paper |
| Nearest neighbor representations of Boolean functions | 2022-06-08 | Paper |
| Construction of punctured and extended quantum codes over GF(2) | 2021-12-15 | Paper |
| Correlation between the continuous-time quantum walk and cliques in graphs and its application | 2021-07-21 | Paper |
| Linear active disturbance rejection control of a two-degrees-of-freedom manipulator | 2021-05-14 | Paper |
| Time series prediction based on EMD-LSTM model | 2020-10-27 | Paper |
| Analyzing and improving the secure quantum dialogue protocol based on four-qubit cluster state | 2020-09-04 | Paper |
| Entanglement in phase estimation algorithm and quantum counting algorithm | 2020-06-19 | Paper |
| Passive attack to the controlled secure direct communication with seven-qubit entangled states protocol | 2020-01-06 | Paper |
| Cryptanalysis and improvement of the robust quantum dialogue protocols based on the entanglement swapping between any two logical Bell states and the shared auxiliary logical Bell state | 2019-09-27 | Paper |
| Cryptanalysis of the efficient controlled quantum secure direct communication and authentication by using four particle cluster states protocol | 2019-09-03 | Paper |
| Analyzing and revising quantum dialogue without information leakage based on the entanglement swapping between any two Bell states and the shared secret Bell state | 2019-05-03 | Paper |
| Discrete-time quantum walk search on Johnson graphs | 2019-03-15 | Paper |
| Cryptanalysis and improvement in controlled quantum dialogue using cluster states | 2019-03-15 | Paper |
| Analysis and improvement of large payload bidirectional quantum secure direct communication without information leakage | 2018-08-02 | Paper |
| Spatial search for a general multi-vertex state on graph by continuous-time quantum walks | 2018-04-09 | Paper |
| Cryptanalysis and improvement of efficient quantum dialogue using entangled states and entanglement swapping without information leakage | 2018-03-05 | Paper |
| Analysis and revision of secure quantum dialogue via cavity QED | 2018-02-22 | Paper |
| Regularization Parameter Selection for Nonlinear Iterative Image Restoration and MRI Reconstruction Using GCV and SURE-Based Methods | 2017-10-27 | Paper |
| Cryptanalysis of controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad | 2017-03-28 | Paper |
| Deterministic joint remote preparation of arbitrary four-qubit cluster-type state using EPR pairs | 2017-03-24 | Paper |
| Information leakage problem in efficient bidirectional quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom | 2017-03-24 | Paper |
| Finding structural anomalies in complete graphs using scattering quantum walks | 2016-12-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2990937 | 2016-08-10 | Paper |
| Quantum image with high retrieval performance | 2016-04-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5498224 | 2015-02-11 | Paper |
| Quantum simultaneous secret distribution with dense coding by using cluster states | 2014-12-05 | Paper |
| Cryptanalysis and improvement of quantum private comparison protocol based on Bell entangled states | 2014-10-15 | Paper |
| Classical-operation-based deterministic secure quantum communication | 2014-09-30 | Paper |
| Improvement on "an efficient protocol for the quantum private comparison of equality with W state" | 2014-05-28 | Paper |
| Same initial states attack in Yang et al.'s quantum private comparison protocol and the improvement | 2014-04-08 | Paper |
| Erratum to: ``Same initial states attack in Yang et al.'s quantum private comparison protocol and the improvement | 2014-04-08 | Paper |
| Selection of unitary operations in quantum secret sharing without entanglement | 2013-07-03 | Paper |
| High-dimensional deterministic multiparty quantum secret sharing without unitary operations | 2013-03-04 | Paper |
| A simple and secure quantum secret sharing scheme based on product states | 2012-08-30 | Paper |
| ANALYZING AND REVISING A TWO-WAY PROTOCOL FOR QUANTUM CRYPTOGRAPHY WITH A NONMAXIMALLY ENTANGLED QUBIT PAIR | 2011-11-18 | Paper |
| Linear analysis of three-dimensional instability of non-Newtonian liquid jets | 2006-08-24 | Paper |