Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of Controlled Bidirectional Quantum Secure Direct Communication Network Using Classical XOR Operation and Quantum Entanglement., and . IEEE Communications Letters, 21 (10): 2202-2205 (2017)Is A Quantum Stabilizer Code Degenerate or Nondegenerate for Pauli Channel?, and . CoRR, (2010)Identifying CpG Islands in Genome Using Conditional Random Fields., , and . ICIC (1), volume 7389 of Lecture Notes in Computer Science, page 309-318. Springer, (2012)High-dimensional deterministic multiparty quantum secret sharing without unitary operations., , , , and . Quantum Inf. Process., 11 (6): 1785-1795 (2012)Quantum computation for large-scale image classification., , , and . Quantum Inf. Process., 15 (10): 4049-4069 (2016)Continuous-time quantum walks on strongly regular graphs with loops and its application to spatial search for multiple marked vertices., , , , and . Quantum Inf. Process., 18 (6): 195 (2019)A unitary operator construction solution based on Pauli group for maximal dense coding with a class of symmetric states., , , , and . Quantum Inf. Process., 19 (8): 231 (2020)Cryptanalysis and improvement in controlled quantum dialogue using cluster states., and . Quantum Inf. Process., 18 (4): 98 (2019)Fault detection for single and multiple missing-gate faults in reversible circuits., , , and . IEEE Congress on Evolutionary Computation, page 131-135. IEEE, (2008)Constructions of pure asymmetric quantum alternant codes based on subclasses of Alternant codes., and . ISIT, page 896-900. IEEE, (2014)