Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deterministic secure quantum communication based on spatial encoding., , , , , , and . Quantum Inf. Process., 21 (1): 2 (2022)Simple hash function using discrete-time quantum walks., , , , , and . Quantum Inf. Process., 17 (8): 189 (2018)An image reranking algorithm based on discrete-time quantum walk., , , , and . Multim. Tools Appl., 83 (12): 34979-34994 (April 2024)Combining long-term learning and active learning with semi-supervised method for content-based image retrieval., , , and . MMM, IEEE, (2006)Efficient color image encryption by color-grayscale conversion based on steganography., , , , and . Multim. Tools Appl., 82 (7): 10835-10866 (March 2023)Novel classical post-processing for quantum key distribution-based quantum private query., , , , , and . Quantum Inf. Process., 15 (9): 3833-3840 (2016)Practical Quantum Anonymous Private Information Retrieval Based on Quantum Key Distribution., , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Two-party quantum key agreement against collective noisy channel., , , , and . Quantum Inf. Process., 19 (3): 100 (2020)Three-party quantum secret sharing against collective noise., , , , and . Quantum Inf. Process., 18 (7): 215 (2019)Dual embedding model: a new framework for visually meaningful image encryption., , , , and . Multim. Tools Appl., 80 (6): 9055-9074 (2021)