Author of the publication

Resource-saving quantum key distribution based on three-photon matrix product states.

, , , and . Quantum Inf. Process., 22 (6): 235 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Unified Variational Model for Single Image Dehazing., , , , and . IEEE Access, (2019)Testing Digital Forensic Software Tools Used in Expert Testimony., and . Handbook of Research on Computational Forensics, Digital Crime, and Investigation, IGI Global, (2010)Distributed Parallel Computing using Navigational Programming: Orchestrating Computations Around Data., , , , and . IASTED PDCS, page 453-458. IASTED/ACTA Press, (2002)Modulation Method for Nine-Switch Converter Based on Equivalent Mechanism Between Nine-Switch Converter and Dual Six-Switch Converters., , , , and . IEEE Trans. Ind. Electron., 68 (4): 2845-2855 (2021)Private and Trustworthy Distributed Lending Model Using Hyperledger Besu., , and . SN Comput. Sci., 2 (2): 115 (2021)Robust performance testing for digital forensic tools., and . Digital Investigation, 6 (1-2): 71-81 (2009)Predicting the Impact of Android Malicious Samples via Machine Learning., , , , , and . IEEE Access, (2019)Comprehensive Analysis of Network Traffic Data., , , , , and . CIT, page 423-430. IEEE Computer Society, (2016)Using Relationship-Building in Event Profiling for Digital Forensic Investigations., and . e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 40-52. Springer, (2010)Distributed Detection of Zero-Day Network Traffic Flows., , , , , and . AusDM, volume 845 of Communications in Computer and Information Science, page 173-191. Springer, (2017)