Author of the publication

Two intercept-and-resend attacks on a bidirectional quantum secure direct communication and its improvement.

, , , , , , , , and . Quantum Inf. Process., 22 (9): 346 (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visual question answering by pattern matching and reasoning., , , , and . Neurocomputing, (2022)Coaxial Capacitive Dividers for High-Voltage Pulse Measurements in Intense Electron Beam Accelerator With Water Pulse-Forming Line., , , , , and . IEEE Trans. Instrumentation and Measurement, 58 (1): 161-166 (2009)Improved Dynamic Subjective Logic Model with Evidence Driven., , and . J. Inf. Process. Syst., 11 (4): 630-642 (2015)Recognition and 3D Pose Estimation for Underwater Objects Using Deep Convolutional Neural Network and Point Cloud Registration., , and . ICSSE, page 1-6. IEEE, (2020)The MPEG-21 rights expression language and rights data dictionary, , , , and . IEEE Transactions on Multimedia, 7 (3): 408-- 417 (2005)Application of Bi-Orthogonal Wavelet Transform in the De-Noising of Gyro Signal., , , and . WAA, page 67-72. World Scientific, (2003)PLZMA: A Parallel Data Compression Method for Cloud Computing., , , , , , , and . ICA3PP (3), volume 11336 of Lecture Notes in Computer Science, page 504-518. Springer, (2018)Spatial Entropy-Based Clustering for Mining Data with Spatial Correlation., and . PAKDD (1), volume 6634 of Lecture Notes in Computer Science, page 196-208. Springer, (2011)Deriving Software Performance Models from Architectural Patterns by Graph Transformations., and . TAGT, volume 1764 of Lecture Notes in Computer Science, page 475-488. Springer, (1998)Model-Based Estimation of Word Saliency in Text., and . Discovery Science, volume 4265 of Lecture Notes in Computer Science, page 279-290. Springer, (2006)