Advances in quantum entanglement purification
PS Yan, L Zhou, W Zhong, YB Sheng - Science China Physics, Mechanics …, 2023 - Springer
Since its discovery, the quantum entanglement becomes a promising resource in quantum
communication and computation. However, the entanglement is fragile due to the presence …
communication and computation. However, the entanglement is fragile due to the presence …
Reviewing federated learning aggregation algorithms; strategies, contributions, limitations and future perspectives
The success of machine learning (ML) techniques in the formerly difficult areas of data
analysis and pattern extraction has led to their widespread incorporation into various …
analysis and pattern extraction has led to their widespread incorporation into various …
Experimental quantum e-commerce
E-commerce, a type of trading that occurs at a high frequency on the internet, requires
guaranteeing the integrity, authentication, and nonrepudiation of messages through long …
guaranteeing the integrity, authentication, and nonrepudiation of messages through long …
Experimental quantum Byzantine agreement on a three-user quantum network with integrated photonics
Quantum communication networks are crucial for both secure communication and
cryptographic networked tasks. Building quantum communication networks in a scalable …
cryptographic networked tasks. Building quantum communication networks in a scalable …
Experimental quantum secret sharing based on phase encoding of coherent states
Quantum secret sharing (QSS) is one of the basic communication primitives in future
quantum networks which addresses part of the basic cryptographic tasks of multiparty …
quantum networks which addresses part of the basic cryptographic tasks of multiparty …
Demonstration of quantum-digital payments
P Schiansky, J Kalb, E Sztatecsny… - nature …, 2023 - nature.com
Digital payments have replaced physical banknotes in many aspects of our daily lives.
Similarly to banknotes, they should be easy to use, unique, tamper-resistant and …
Similarly to banknotes, they should be easy to use, unique, tamper-resistant and …
Artificial intelligence-based malware detection, analysis, and mitigation
Malware, a lethal weapon of cyber attackers, is becoming increasingly sophisticated, with
rapid deployment and self-propagation. In addition, modern malware is one of the most …
rapid deployment and self-propagation. In addition, modern malware is one of the most …
Digital empowerment and win-win co-operation for green and low-carbon industrial development: analysis of regional differences based on GMM-ANN intelligence …
The study employs two sophisticated computational model validation mechanisms, Artificial
Neural Network (ANN) and System Generalized Method of Moments (SYS-GMM), as the …
Neural Network (ANN) and System Generalized Method of Moments (SYS-GMM), as the …
A simple AIE-active salicylideneaniline towards bimodal encryption-decryption with unique ESIPT-inhibited amorphous state
XM Cai, W Zhong, Z Deng, Y Lin, Z Tang… - Chemical Engineering …, 2023 - Elsevier
Multimodal encryption-decryption with photochromism has been proved to ensure
information security with great feasibility and operability. However, most of the photochromic …
information security with great feasibility and operability. However, most of the photochromic …
One-time universal hashing quantum digital signatures without perfect keys
Quantum digital signatures (QDSs), generating correlated bit strings among three remote
parties for signatures through quantum law, can guarantee nonrepudiation, authenticity, and …
parties for signatures through quantum law, can guarantee nonrepudiation, authenticity, and …