Su-Juan Qin

Orcid: 0000-0002-6405-6711

According to our database1, Su-Juan Qin authored at least 43 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Hierarchical Fused Quantum Fuzzy Neural Network for Image Classification.
CoRR, 2024

2023
Quantum Attacks on 1K-AES and PRINCE.
Comput. J., May, 2023

Quantum discriminative canonical correlation analysis.
Quantum Inf. Process., April, 2023

Practical efficient 1-out-of-n quantum oblivious transfer protocol.
Quantum Inf. Process., February, 2023

Improved BV-based quantum attack on block ciphers.
Quantum Inf. Process., 2023

Quantum Attacks on Type-1 Generalized Feistel Schemes.
IACR Cryptol. ePrint Arch., 2023

Quantum Attacks on Beyond-Birthday-Bound MACs.
IACR Cryptol. ePrint Arch., 2023

New record in the number of qubits for a quantum implementation of AES.
IACR Cryptol. ePrint Arch., 2023

2022
Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud.
IEEE Trans. Serv. Comput., 2022

DoSGuard: Mitigating Denial-of-Service Attacks in Software-Defined Networks.
Sensors, 2022

KRProtector: Detection and Files Protection for IoT Devices on Android Without ROOT Against Ransomware Based on Decoys.
IEEE Internet Things J., 2022

KRTunnel: DNS channel detector for mobile devices.
Comput. Secur., 2022

Fabric Smart Contract Read-After-Write Risk Detection Method Based on Key Methods and Call Chains.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

Smart Contract Vulnerability Detection Based on Critical Combination Path and Deep Learning.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

2021
KRRecover: An Auto-Recovery Tool for Hijacked Devices and Encrypted Files by Ransomwares on Android.
Symmetry, 2021

SQL Injection Attack Detection Framework Based on HTTP Traffic.
Proceedings of the ACM TURC 2021: ACM Turing Award Celebration Conference - Hefei, China, 30 July 2021, 2021

2020
Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems".
IEEE Trans. Inf. Forensics Secur., 2020

Error Tolerance Bound in QKD-Based Quantum Private Query.
IEEE J. Sel. Areas Commun., 2020

Self-Testing of Symmetric Three-Qubit States.
IEEE J. Sel. Areas Commun., 2020

Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage.
Comput. J., 2020

DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps.
IEEE Access, 2020

Sarcasm Detection Using Graph Convolutional Networks with Bidirectional LSTM.
Proceedings of the ICBDT 2020: 3rd International Conference on Big Data Technologies, 2020

2019
Outsourced dynamic provable data possession with batch update for secure cloud storage.
Future Gener. Comput. Syst., 2019

Bayesian machine learning for Boltzmann machine in quantum-enhanced feature spaces.
CoRR, 2019

2018
The randomness in 2 → 1 quantum random access code without a shared reference frame.
Quantum Inf. Process., 2018

Perfect quantum multiple-unicast network coding protocol.
Quantum Inf. Process., 2018

DexX: A Double Layer Unpacking Framework for Android.
IEEE Access, 2018

An Ensemble Learning Framework for Credit Card Fraud Detection Based on Training Set Partitioning and Clustering.
Proceedings of the 2018 IEEE SmartWorld, 2018

2017
Local indistinguishability of multipartite orthogonal product bases.
Quantum Inf. Process., 2017

2016
Transparent Discovery of Hidden Service.
IEICE Trans. Inf. Syst., 2016

2015
Local distinguishability of maximally entangled states in canonical form.
Quantum Inf. Process., 2015

2014
Novel multiparty quantum key agreement protocol with GHZ states.
Quantum Inf. Process., 2014

An arbitrated quantum signature scheme with fast signing and verifying.
Quantum Inf. Process., 2014

Practical quantum all-or-nothing oblivious transfer protocol.
Quantum Inf. Process., 2014

Cheat sensitive quantum bit commitment via pre- and post-selected quantum states.
Quantum Inf. Process., 2014

2013
Reexamination of arbitrated quantum signature: the impossible and the possible.
Quantum Inf. Process., 2013

The general theory of three-party quantum secret sharing protocols over phase-damping channels.
Quantum Inf. Process., 2013

Quantum private comparison against decoherence noise.
Quantum Inf. Process., 2013

Quantum private comparison protocol based on entanglement swapping of (d)-level Bell states.
Quantum Inf. Process., 2013

2011
Finite-key analysis for quantum key distribution with decoy states.
Quantum Inf. Comput., 2011

2009
Security of quantum secret sharing with two-particle entanglement against individual attacks.
Quantum Inf. Comput., 2009

2007
A simple participant attack on the brádler-dušek protocol.
Quantum Inf. Comput., 2007

2005
An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005


  Loading...