default search action
Yi-Hua Zhou 0001
Person information
- affiliation: Beijing University of Technology, Faculty of Information Technology, China
Other persons with the same name
- Yihua Zhou — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j55]Songshou Dong, Yanqing Yao, Yihua Zhou, Yuguang Yang:
A Certificateless Linearly Homomorphic Signature Scheme Based on Lattice for Network Coding. Comput. J. 67(9): 2739-2748 (2024) - [j54]Yi-Hua Zhou, Bin Tang, Yu-Guang Yang:
A lattice-based searchable encryption scheme with multi-user authorization for the certificateless cloud computing environment. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j53]Yu-Guang Yang, Zi-Jia Wang, Bao-Pu Wang, Yi-Hua Zhou, Wei-Min Shi, Xin Liao:
A new visually meaningful double-image encryption algorithm combining 2D compressive sensing with fractional-order chaotic system. Multim. Tools Appl. 83(2): 3621-3655 (2024) - [j52]Yu-Guang Yang, Ming-Xin Niu, Yihua Zhou, Wei-Min Shi, Dong-Hua Jiang, Xin Liao:
A visually secure image encryption algorithm based on block compressive sensing and deep neural networks. Multim. Tools Appl. 83(10): 29777-29803 (2024) - [j51]Wei-Min Shi, Qing-Tian Zhuang, Xue-Zhang, Yi-Hua Zhou, Yu-Guang Yang:
An image reranking algorithm based on discrete-time quantum walk. Multim. Tools Appl. 83(12): 34979-34994 (2024) - [j50]Songshou Dong, Yanqing Yao, Yihua Zhou, Yu-Guang Yang:
A lattice-based unordered certificateless aggregate signature scheme for cloud medical health monitoring system. Peer Peer Netw. Appl. 17(1): 284-296 (2024) - [j49]Wei-Min Shi, Meng-Xuan Bai, Yi-Hua Zhou, Yu-Guang Yang:
Hierarchical quantum rotation operation sharing with multiparty users. Quantum Inf. Process. 23(5): 196 (2024) - 2023
- [j48]Yu-Guang Yang, Bao-Pu Wang, Yi-Hua Zhou, Wei-Min Shi, Xin Liao:
Efficient color image encryption by color-grayscale conversion based on steganography. Multim. Tools Appl. 82(7): 10835-10866 (2023) - [j47]Yu-Guang Yang, Bao-Pu Wang, Yong-Li Yang, Yi-Hua Zhou, Wei-Min Shi, Xin Liao:
A visually meaningful image encryption algorithm based on adaptive 2D compressive sensing and chaotic system. Multim. Tools Appl. 82(14): 22033-22062 (2023) - [j46]Wei-Min Shi, Meng-Xuan Bai, Yi-Hua Zhou, Yu-Guang Yang:
Controlled quantum teleportation based on quantum walks. Quantum Inf. Process. 22(1): 34 (2023) - [j45]Yu-Guang Yang, Rui-Chen Huang, Guang-Bao Xu, Yi-Hua Zhou, Wei-Min Shi, Dan Li:
Measurement-device-independent quantum key agreement based on entanglement swapping. Quantum Inf. Process. 22(12): 438 (2023) - [j44]Yu-Guang Yang, Bing-Xin Liu, Guang-Bao Xu, Yi-Hua Zhou, Wei-Min Shi:
Practical Quantum Anonymous Private Information Retrieval Based on Quantum Key Distribution. IEEE Trans. Inf. Forensics Secur. 18: 4034-4045 (2023) - [c5]Songshou Dong, Yanqing Yao, Yihua Zhou, Yuguang Yang:
Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem). ICDF2C (2) 2023: 54-62 - [c4]Songshou Dong, Yanqing Yao, Yihua Zhou, Yuguang Yang:
Improvement of an Identity-Based Aggregate Signature Protocol from Lattice. ICDF2C (2) 2023: 258-263 - 2022
- [j43]Yongli Yang, Yu-Guang Yang, Yi-Hua Zhou, Wei-Min Shi:
Discrimination of two nonorthogonal states against amplitude-damping noise via feed-forward control. Concurr. Comput. Pract. Exp. 34(10) (2022) - [j42]Songshou Dong, Yihua Zhou, Yu-Guang Yang, Yanqing Yao:
A certificateless ring signature scheme based on lattice. Concurr. Comput. Pract. Exp. 34(28) (2022) - [j41]Yihua Zhou, Songshou Dong, Yu-Guang Yang:
A unidirectional certificateless proxy re-signature scheme based on lattice. Trans. Emerg. Telecommun. Technol. 33(4) (2022) - [j40]Yu-Guang Yang, Hong-Mei Fu, Shang Gao, Yi-Hua Zhou, Wei-Min Shi:
Intrusion detection: A model based on the improved vision transformer. Trans. Emerg. Telecommun. Technol. 33(9) (2022) - [j39]Yihua Zhou, Songshou Dong, Yuguang Yang:
Ring Signature Scheme Based on Lattice and Its Application on Anonymous Electronic Voting. KSII Trans. Internet Inf. Syst. 16(1): 287-304 (2022) - [j38]Wei-Min Shi, Bin-Bin Chen, Yi-Hua Zhou, Yu-Guang Yang:
Image two-classification algorithm based on continuous-time quantum walk. J. Electronic Imaging 31(4) (2022) - [j37]Jie Li, Yu-Guang Yang, Jian Li, Yue-Chao Wang, Yong-Li Yang, Yi-Hua Zhou, Wei-Min Shi:
Deterministic secure quantum communication based on spatial encoding. Quantum Inf. Process. 21(1): 2 (2022) - [j36]Yong-Li Yang, Yuguang Yang, Yi-Hua Zhou, Wei-Min Shi, Dan Li:
Measurement-device-independent quantum wireless network communication. Quantum Inf. Process. 21(1) (2022) - [j35]Yu-Guang Yang, Guo-Dong Cao, Rui-Chen Huang, Shang Gao, Yi-Hua Zhou, Wei-Min Shi, Guang-Bao Xu:
Multiparty anonymous quantum communication without multipartite entanglement. Quantum Inf. Process. 21(6): 196 (2022) - [j34]Yi-Hua Zhou, Shu-Fen Qin, Wei-Min Shi, Yu-Guang Yang:
Measurement-device-independent continuous variable semi-quantum key distribution protocol. Quantum Inf. Process. 21(8): 303 (2022) - [c3]Xue Liao, Yihua Zhou, Jiawei Xu, Shuaikun Xing, Wei Zou, Jin Zhou, Qi Wang, Zhenhu Ning:
Identity-based Linkable Blind Ring Signature Scheme on Lattice. ICCNS 2022: 51-57 - 2021
- [j33]Yu-Guang Yang, Bao-Pu Wang, Yong-Li Yang, Yi-Hua Zhou, Wei-Min Shi, Xin Liao:
Visually meaningful image encryption based on universal embedding model. Inf. Sci. 562: 304-324 (2021) - [j32]Yu-Guang Yang, Bao-Pu Wang, Shuai-Kang Pei, Yi-Hua Zhou, Wei-Min Shi, Xin Liao:
Using M-ary decomposition and virtual bits for visually meaningful image encryption. Inf. Sci. 580: 174-201 (2021) - [j31]Yu-Guang Yang, Bowen Guan, Yi-Hua Zhou, Wei-Min Shi:
Double image compression-encryption algorithm based on fractional order hyper chaotic system and DNA approach. Multim. Tools Appl. 80(1): 691-710 (2021) - [j30]Yu-Guang Yang, Bao-Pu Wang, Yong-Li Yang, Yi-Hua Zhou, Wei-Min Shi:
Dual embedding model: a new framework for visually meaningful image encryption. Multim. Tools Appl. 80(6): 9055-9074 (2021) - [j29]Yu-Guang Yang, Xiao-Xiao Liu, Shang Gao, Yihua Zhou, Wei-Min Shi, Jian Li, Dan Li:
Detector-device-independent quantum secret sharing based on hyper-encoding and single-photon Bell-state measurement. Quantum Eng. 3(3) (2021) - [j28]Yong-Li Yang, Yu-Guang Yang, Yihua Zhou, Wei-Min Shi, Jian Li:
Efficient quantum multi-hop communication based on Greenberger-Horne-Zeilinger states and Bell states. Quantum Inf. Process. 20(5): 189 (2021) - [j27]Yu-Guang Yang, Jingru Dong, Yong-Li Yang, Jian Li, Yi-Hua Zhou, Wei-Min Shi:
High-capacity measurement-device-independent deterministic secure quantum communication. Quantum Inf. Process. 20(6): 203 (2021) - [j26]Yu-Guang Yang, Xiao-Xiao Liu, Shang Gao, Xiu-Bo Chen, Dan Li, Yi-Hua Zhou, Wei-Min Shi:
A stronger participant attack on the measurement-device-independent protocol for deterministic quantum secret sharing. Quantum Inf. Process. 20(7): 1-12 (2021) - [j25]Yu-Guang Yang, Yue-Chao Wang, Jian Li, Yi-Hua Zhou, Wei-Min Shi:
Semi-device-independent quantum key agreement protocol. Quantum Inf. Process. 20(11): 376 (2021) - 2020
- [j24]Yu-Guang Yang, Ning Chen, Yong-Li Yang, Yi-Hua Zhou, Wei-Min Shi:
Discriminating two non-orthogonal states against decoherence by feedback control. Quantum Inf. Process. 19(2): 69 (2020) - [j23]Yi-Hua Zhou, Mao-Feng Wang, Wei-Min Shi, Yu-Guang Yang, Jing Zhang:
Two-party quantum key agreement against collective noisy channel. Quantum Inf. Process. 19(3): 100 (2020) - [j22]Yu-Guang Yang, Ning Chen, Yong-Li Yang, Yi-Hua Zhou, Wei-Min Shi:
Better quantum control does not imply better discrimination effect. Quantum Inf. Process. 19(6): 168 (2020)
2010 – 2019
- 2019
- [j21]Yu-Guang Yang, Xue-Pei Guo, Gang Xu, Xiu-Bo Chen, Jian Li, Yi-Hua Zhou, Wei-Min Shi:
Reducing the communication complexity of quantum private database queries by subtle classical post-processing with relaxed quantum ability. Comput. Secur. 81: 15-24 (2019) - [j20]Yihua Zhou, Guanghui Li, Yuguang Yang, Weimin Shi:
基于GeoHash的近邻查询位置隐私保护方法 (Location Privacy Preserving Nearest Neighbor Querying Based on GeoHash). 计算机科学 46(8): 212-216 (2019) - [j19]Yihua Zhou, Bing Zhang, Yuguang Yang, Weimin Shi:
基于聚类的社交网络隐私保护方法 (Cluster-based Social Network Privacy Protection Method). 计算机科学 46(10): 154-160 (2019) - [j18]Yu-Guang Yang, Shang Gao, Dan Li, Yi-Hua Zhou, Wei-Min Shi:
Two-party quantum key agreement over a collective noisy channel. Quantum Inf. Process. 18(3): 74 (2019) - [j17]Yu-Guang Yang, Bo-Ran Li, Shuang-Yong Kang, Xiu-Bo Chen, Yi-Hua Zhou, Wei-Min Shi:
New quantum key agreement protocols based on cluster states. Quantum Inf. Process. 18(3): 77 (2019) - [j16]Yu-Guang Yang, Shang Gao, Dan Li, Yi-Hua Zhou, Wei-Min Shi:
Three-party quantum secret sharing against collective noise. Quantum Inf. Process. 18(7): 215 (2019) - [j15]Yu-Guang Yang, Bo-Ran Li, Dan Li, Yi-Hua Zhou, Wei-Min Shi:
New quantum key agreement protocols based on Bell states. Quantum Inf. Process. 18(10): 322 (2019) - 2018
- [j14]Yu-Guang Yang, Jiajie Yang, Yi-Hua Zhou, Wei-Min Shi, Xiubo Chen, Jian Li, Huijuan Zuo:
Quantum network communication: a discrete-time quantum-walk approach. Sci. China Inf. Sci. 61(4): 042501:1-042501:10 (2018) - [j13]Yu-Guang Yang, Yong-Ce Zhang, Xiu-Bo Chen, Yi-Hua Zhou, Wei-Min Shi:
Eliminating the texture features in visually meaningful cipher images. Inf. Sci. 429: 102-119 (2018) - [j12]Wei-Feng Cao, Yong-Ce Zhang, Yu-Guang Yang, Dan Li, Yi-Hua Zhou, Wei-Min Shi:
Constructing quantum Hash functions based on quantum walks on Johnson graphs. Quantum Inf. Process. 17(7): 156 (2018) - [j11]Yu-Guang Yang, Jing-Lin Bi, Xiu-Bo Chen, Zheng Yuan, Yi-Hua Zhou, Wei-Min Shi:
Simple hash function using discrete-time quantum walks. Quantum Inf. Process. 17(8): 189 (2018) - 2017
- [j10]Yu-Guang Yang, Zhi-Chao Liu, Jian Li, Xiu-Bo Chen, Huijuan Zuo, Yi-Hua Zhou, Wei-Min Shi:
Theoretically extensible quantum digital signature with starlike cluster states. Quantum Inf. Process. 16(1): 12 (2017) - [c2]Yihua Zhou, Chenhui Ji, Changyou Zhang:
A Clustering Algorithm based on Internal Constrained Multi-view K-means. ChineseCSCW 2017: 137-144 - 2016
- [j9]Yu-Guang Yang, Ju Tian, He Lei, Yi-Hua Zhou, Wei-Min Shi:
Novel quantum image encryption using one-dimensional quantum cellular automata. Inf. Sci. 345: 257-270 (2016) - [j8]Yu-Guang Yang, He Lei, Zhi-Chao Liu, Yi-Hua Zhou, Wei-Min Shi:
Arbitrated quantum signature scheme based on cluster states. Quantum Inf. Process. 15(6): 2487-2497 (2016) - [j7]Yu-Guang Yang, Zhi-Chao Liu, Xiu-Bo Chen, Wei-Feng Cao, Yi-Hua Zhou, Wei-Min Shi:
Novel classical post-processing for quantum key distribution-based quantum private query. Quantum Inf. Process. 15(9): 3833-3840 (2016) - 2015
- [j6]Wei-Min Shi, Jian-biao Zhang, Yi-Hua Zhou, Yu-Guang Yang:
A novel quantum deniable authentication protocol without entanglement. Quantum Inf. Process. 14(6): 2183-2193 (2015) - [j5]Wei-Min Shi, Jian-biao Zhang, Yi-Hua Zhou, Yu-Guang Yang:
A new quantum blind signature with unlinkability. Quantum Inf. Process. 14(8): 3019-3030 (2015) - [j4]Yu-Guang Yang, Rui Yang, He Lei, Wei-Min Shi, Yi-Hua Zhou:
Quantum oblivious transfer with relaxed constraints on the receiver. Quantum Inf. Process. 14(8): 3031-3040 (2015) - 2014
- [j3]Yi-Hua Zhou, Wei-Min Shi, Yu-Guang Yang:
Comment on "efficient and feasible quantum private comparison of equality against the collective amplitude damping noise". Quantum Inf. Process. 13(2): 573-585 (2014) - [j2]Wei-Min Shi, Yi-Hua Zhou, Yu-Guang Yang:
Comment on "The enhanced quantum blind signature protocol". Quantum Inf. Process. 13(6): 1305-1312 (2014) - [j1]Wei-Min Shi, Yi-Hua Zhou, Yu-Guang Yang:
Quantum deniable authentication protocol. Quantum Inf. Process. 13(7): 1501-1510 (2014)
2000 – 2009
- 2006
- [c1]Yi-Hua Zhou, Yuan-Da Cao, Le-Peng Bi, Ben-Jie Wei:
Combining long-term learning and active learning with semi-supervised method for content-based image retrieval. MMM 2006
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint