default search action
Hong Lai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c7]Geng Zhang, Hong Lai:
QTN-MLP: Quantum Tensor Network-enhanced MLP for Medical Image Classification. CSCWD 2024: 2134-2139 - 2023
- [j24]Hong Lai, Josef Pieprzyk, Lei Pan:
Novel entanglement compression for QKD protocols using isometric tensors. Sci. China Inf. Sci. 66(8) (2023) - [j23]Hong Lai, Josef Pieprzyk, Lei Pan, Ya Li:
Resource-saving quantum key distribution based on three-photon matrix product states. Quantum Inf. Process. 22(6): 235 (2023) - 2022
- [j22]Qin Li, Mingzhen Hou, Hong Lai, Ming Yang:
Cross-modal distribution alignment embedding network for generalized zero-shot learning. Neural Networks 148: 176-182 (2022) - [j21]Qin Li, Huihui He, Hong Lai, Tie Cai, Qianqian Wang, Quanxue Gao:
Enhanced nuclear norm based matrix regression for occluded face recognition. Pattern Recognit. 126: 108585 (2022) - [j20]Hong Lai, Josef Pieprzyk, Lei Pan:
Dynamic and compressed quantum many-body state secret sharing based on site-independent matrix product states. Quantum Inf. Process. 21(3): 83 (2022) - [j19]Qiang Zhang, Hong Lai, Josef Pieprzyk, Lei Pan:
An improved quantum network communication model based on compressed tensor network states. Quantum Inf. Process. 21(7): 253 (2022) - [c6]Jie Liu, Hong Lai, Jinshu Ma, Shuchao Pang:
ConTenNet: Quantum Tensor-augmented Convolutional Representations for Breast Cancer Histopathological Image Classification. BIBM 2022: 1654-1657 - 2020
- [j18]Hong Lai, Josef Pieprzyk, Mingxing Luo, Cheng Zhan, Lei Pan, Mehmet A. Orgun:
High-capacity (2, 3) threshold quantum secret sharing based on asymmetric quantum lossy channels. Quantum Inf. Process. 19(5): 157 (2020) - [j17]Hong Lai, Josef Pieprzyk, Lei Pan:
Analysis of weighted quantum secret sharing based on matrix product states. Quantum Inf. Process. 19(12): 418 (2020)
2010 – 2019
- 2019
- [j16]Cheng Zhan, Hong Lai:
Energy Minimization in Internet-of-Things System Based on Rotary-Wing UAV. IEEE Wirel. Commun. Lett. 8(5): 1341-1344 (2019) - [c5]Hong Lai, Liling Zhang, Yanrong Zhu:
Quantum secure direct communication based on orbital angular momentum. ACM TUR-C 2019: 154:1-154:10 - [c4]Yan Xiong, Hong Lai:
The improved protocol based on the Bennett 92 protocol. ACM TUR-C 2019: 161:1-161:9 - 2018
- [j15]Hong Lai, Mingxing Luo, Josef Pieprzyk, Jun Zhang, Lei Pan, Mehmet A. Orgun:
High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space. Sci. China Inf. Sci. 61(6): 062501:1-062501:11 (2018) - [j14]Hong Lai, Mingxing Luo, Josef Pieprzyk, Zhiguo Qu, Mehmet A. Orgun:
Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice. Inf. Process. Lett. 134: 24-30 (2018) - [j13]Hong Lai, Mingxing Luo, Jun Zhang, Josef Pieprzyk, Lei Pan, Mehmet A. Orgun:
A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement. Quantum Inf. Process. 17(7): 162 (2018) - [j12]Hui-Ran Li, Mingxing Luo, Hong Lai:
Generalized quantum no-go theorems of pure states. Quantum Inf. Process. 17(7): 168 (2018) - [j11]Hong Lai, Mingxing Luo, Mehmet A. Orgun, Josef Pieprzyk, Fuyuan Xiao, Cheng Zhan:
Tunable multi-party high-capacity quantum key distribution based on m-generalized Fibonacci sequences using golden coding. Quantum Inf. Process. 17(9): 246 (2018) - [j10]Hong Lai, Mingxing Luo, Zhiguo Qu, Fuyuan Xiao, Mehmet A. Orgun:
A Hybrid Quantum Key Distribution Protocol for Tele-care Medicine Information Systems. Wirel. Pers. Commun. 98(1): 929-943 (2018) - [c3]Hui-Ran Li, Mingxing Luo, Hong Lai:
Unified Quantum No-Go Theorems of Pure States. ICCCS (4) 2018: 38-47 - [c2]Hong Lai, Mingxing Luo, Li Tao, Fuyuan Xiao, Cheng Zhan, Xiaofang Hu:
An Efficient and Secure Key Agreement Protocol Preserving User Anonymity Under Chebyshev Chaotic Maps. ICCCS (3) 2018: 479-489 - 2017
- [j9]Hong Lai, Mingxing Luo, Josef Pieprzyk, Zhiguo Qu, Shudong Li, Mehmet A. Orgun:
An efficient quantum blind digital signature scheme. Sci. China Inf. Sci. 60(8): 082501:1-082501:14 (2017) - [j8]Fuyuan Xiao, Cheng Zhan, Hong Lai, Li Tao, Zhiguo Qu:
New parallel processing strategies in complex event processing systems with data streams. Int. J. Distributed Sens. Networks 13(8) (2017) - [j7]Mingxing Luo, Hui-Ran Li, Hong Lai, Xiaojun Wang:
Unified quantum no-go theorems and transforming of quantum pure states in a restricted set. Quantum Inf. Process. 16(12): 297 (2017) - [c1]Liang Luo, Li Tao, Hongyi Xu, Zhenyun Yuan, Hong Lai, Zili Zhang:
An Information Theory Based Approach for Identifying Influential Spreaders in Temporal Networks. CSS 2017: 477-484 - 2016
- [j6]Hong Lai, Mehmet A. Orgun, Josef Pieprzyk, Jing Li, Mingxing Luo, Jinghua Xiao, Fuyuan Xiao:
High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding. Quantum Inf. Process. 15(11): 4663-4679 (2016) - 2015
- [j5]Hong Lai, Liyin Xue, Mehmet A. Orgun, Jinghua Xiao, Josef Pieprzyk:
A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes. Quantum Inf. Process. 14(2): 697-713 (2015) - 2014
- [j4]Hong Lai, Jinghua Xiao, Mehmet A. Orgun, Liyin Xue, Josef Pieprzyk:
Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes. Quantum Inf. Process. 13(4): 895-907 (2014) - [j3]Hong Lai, Mehmet A. Orgun, Jinghua Xiao, Liyin Xue:
Fault-tolerant high-capacity quantum key distribution over a collective-noise channel using extended unitary operations. Quantum Inf. Process. 13(7): 1523-1535 (2014) - 2012
- [j2]Hong Lai, Jinghua Xiao, Lixiang Li, Yixian Yang:
Recursive hiding of biometrics-based secret sharing scheme using adversary structure. Inf. Process. Lett. 112(17-18): 683-687 (2012) - 2010
- [j1]Zhihui Li, Ting Xue, Hong Lai:
Secret sharing schemes from binary linear codes. Inf. Sci. 180(22): 4412-4419 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-20 20:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint