Author of the publication

新量子技术时代下的信息安全 (Information Security in New Quantum Technology Age).

, , , , and . 计算机科学, 44 (7): 1-7 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Look, Listen, and Act: Towards Audio-Visual Embodied Navigation., , , , and . ICRA, page 9701-9707. IEEE, (2020)Social capital, phone call activities and borrower default in mobile micro-lending., , , and . Decis. Support Syst., (2022)Crowdsourcing Incentives for Multi-Hop Urban Parcel Delivery Network., , , , and . IEEE Access, (2019)Neuro-Symbolic Learning: Principles and Applications in Ophthalmology., , , , , , , , , and 17 other author(s). CoRR, (2022)New theoretical bounds and constructions of permutation codes under block permutation metric., , and . Des. Codes Cryptogr., 87 (11): 2625-2637 (2019)Power Allocation for LDM-based Hybrid Multicast Transmission., , , , , and . IWCMC, page 1369-1373. IEEE, (2022)BEV2PR: BEV-Enhanced Visual Place Recognition with Structural Cues., , , , , and . CoRR, (2024)Exploration of the anti-inflammatory mechanism of Lanqin oral solution based on the network pharmacology analysis optimized by Q-markers selection., , , , , , , , , and . Comput. Biol. Medicine, (March 2023)Mode Selection Algorithm for Multicast Service Delivery., , , , and . IEEE Trans. Broadcast., 67 (1): 96-105 (2021)Snake-in-the-Box Codes for Rank Modulation under Kendall's $τ$-Metric., and . CoRR, (2015)