Hong Lai

According to our database1, Hong Lai authored at least 30 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Novel entanglement compression for QKD protocols using isometric tensors.
Sci. China Inf. Sci., August, 2023

Resource-saving quantum key distribution based on three-photon matrix product states.
Quantum Inf. Process., 2023

2022
An improved quantum network communication model based on compressed tensor network states.
Quantum Inf. Process., 2022

Dynamic and compressed quantum many-body state secret sharing based on site-independent matrix product states.
Quantum Inf. Process., 2022

Enhanced nuclear norm based matrix regression for occluded face recognition.
Pattern Recognit., 2022

Cross-modal distribution alignment embedding network for generalized zero-shot learning.
Neural Networks, 2022

ConTenNet: Quantum Tensor-augmented Convolutional Representations for Breast Cancer Histopathological Image Classification.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

2020
Analysis of weighted quantum secret sharing based on matrix product states.
Quantum Inf. Process., 2020

High-capacity (2, 3) threshold quantum secret sharing based on asymmetric quantum lossy channels.
Quantum Inf. Process., 2020

2019
Energy Minimization in Internet-of-Things System Based on Rotary-Wing UAV.
IEEE Wirel. Commun. Lett., 2019

The improved protocol based on the Bennett 92 protocol.
Proceedings of the ACM Turing Celebration Conference - China, 2019

Quantum secure direct communication based on orbital angular momentum.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
A Hybrid Quantum Key Distribution Protocol for Tele-care Medicine Information Systems.
Wirel. Pers. Commun., 2018

Generalized quantum no-go theorems of pure states.
Quantum Inf. Process., 2018

A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement.
Quantum Inf. Process., 2018

Tunable multi-party high-capacity quantum key distribution based on <i>m</i>-generalized Fibonacci sequences using golden coding.
Quantum Inf. Process., 2018

Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice.
Inf. Process. Lett., 2018

High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space.
Sci. China Inf. Sci., 2018

Unified Quantum No-Go Theorems of Pure States.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

An Efficient and Secure Key Agreement Protocol Preserving User Anonymity Under Chebyshev Chaotic Maps.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Unified quantum no-go theorems and transforming of quantum pure states in a restricted set.
Quantum Inf. Process., 2017

New parallel processing strategies in complex event processing systems with data streams.
Int. J. Distributed Sens. Networks, 2017

An efficient quantum blind digital signature scheme.
Sci. China Inf. Sci., 2017

An Information Theory Based Approach for Identifying Influential Spreaders in Temporal Networks.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding.
Quantum Inf. Process., 2016

2015
A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes.
Quantum Inf. Process., 2015

2014
Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes.
Quantum Inf. Process., 2014

Fault-tolerant high-capacity quantum key distribution over a collective-noise channel using extended unitary operations.
Quantum Inf. Process., 2014

2012
Recursive hiding of biometrics-based secret sharing scheme using adversary structure.
Inf. Process. Lett., 2012

2010
Secret sharing schemes from binary linear codes.
Inf. Sci., 2010


  Loading...