Advances in quantum entanglement purification

PS Yan, L Zhou, W Zhong, YB Sheng - Science China Physics, Mechanics …, 2023 - Springer
Since its discovery, the quantum entanglement becomes a promising resource in quantum
communication and computation. However, the entanglement is fragile due to the presence …

Reviewing federated learning aggregation algorithms; strategies, contributions, limitations and future perspectives

M Moshawrab, M Adda, A Bouzouane, H Ibrahim… - Electronics, 2023 - mdpi.com
The success of machine learning (ML) techniques in the formerly difficult areas of data
analysis and pattern extraction has led to their widespread incorporation into various …

Experimental quantum e-commerce

XY Cao, BH Li, Y Wang, Y Fu, HL Yin, ZB Chen - Science Advances, 2024 - science.org
E-commerce, a type of trading that occurs at a high frequency on the internet, requires
guaranteeing the integrity, authentication, and nonrepudiation of messages through long …

Experimental quantum Byzantine agreement on a three-user quantum network with integrated photonics

X **g, C Qian, CX Weng, BH Li, Z Chen, CQ Wang… - Science …, 2024 - science.org
Quantum communication networks are crucial for both secure communication and
cryptographic networked tasks. Building quantum communication networks in a scalable …

Experimental quantum secret sharing based on phase encoding of coherent states

A Shen, XY Cao, Y Wang, Y Fu, J Gu, WB Liu… - Science China Physics …, 2023 - Springer
Quantum secret sharing (QSS) is one of the basic communication primitives in future
quantum networks which addresses part of the basic cryptographic tasks of multiparty …

Demonstration of quantum-digital payments

P Schiansky, J Kalb, E Sztatecsny… - nature …, 2023 - nature.com
Digital payments have replaced physical banknotes in many aspects of our daily lives.
Similarly to banknotes, they should be easy to use, unique, tamper-resistant and …

Artificial intelligence-based malware detection, analysis, and mitigation

A Djenna, A Bouridane, S Rubab, IM Marou - Symmetry, 2023 - mdpi.com
Malware, a lethal weapon of cyber attackers, is becoming increasingly sophisticated, with
rapid deployment and self-propagation. In addition, modern malware is one of the most …

Digital empowerment and win-win co-operation for green and low-carbon industrial development: analysis of regional differences based on GMM-ANN intelligence …

K Di, W Chen, Q Shi, Q Cai, B Zhang - Journal of Cleaner Production, 2024 - Elsevier
The study employs two sophisticated computational model validation mechanisms, Artificial
Neural Network (ANN) and System Generalized Method of Moments (SYS-GMM), as the …

A simple AIE-active salicylideneaniline towards bimodal encryption-decryption with unique ESIPT-inhibited amorphous state

XM Cai, W Zhong, Z Deng, Y Lin, Z Tang… - Chemical Engineering …, 2023 - Elsevier
Multimodal encryption-decryption with photochromism has been proved to ensure
information security with great feasibility and operability. However, most of the photochromic …

One-time universal hashing quantum digital signatures without perfect keys

BH Li, YM **e, XY Cao, CL Li, Y Fu, HL Yin… - Physical Review Applied, 2023 - APS
Quantum digital signatures (QDSs), generating correlated bit strings among three remote
parties for signatures through quantum law, can guarantee nonrepudiation, authenticity, and …