Jian Li

Orcid: 0000-0002-6237-2307

Affiliations:
  • Zaozhuang University, Center for Quantum Information Research, Zaozhuang, China
  • Beijing University of Posts and Telecommunications, School of Computer Science, China
  • Beijing Institute of Technology, China (PhD 2005)


According to our database1, Jian Li authored at least 63 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Quantum private query protocol based on counterfactual quantum key distribution with noiseless attack.
Quantum Inf. Process., October, 2024

Controlled node dialogue in IoT networks based on nonlocal orthogonal product states.
J. Opt. Commun. Netw., March, 2024

2023
Measurement-Based Quantum Sealed-Bid Auction.
IEEE Trans. Circuits Syst. I Regul. Pap., December, 2023

Efficient Quantum Private Comparison without Sharing a Key.
Entropy, November, 2023

Circular mediated semi-quantum key distribution.
Quantum Inf. Process., April, 2023

Multi-party quantum private information comparison based on nonlocal orthogonal product states.
Quantum Inf. Process., 2023

Efficient Privacy Preserving in IoMT With Blockchain and Lightweight Secret Sharing.
IEEE Internet Things J., 2023

A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity.
Entropy, 2023

High-Capacity Quantum Private Comparison Protocol With Six-Qubit Hyperentangled Bell States and Hypercoding.
IEEE Access, 2023

2022
Efficient Medical Big Data Management With Keyword-Searchable Encryption in Healthchain.
IEEE Syst. J., 2022

Quantum multi-proxy strong blind signature based on block blind coding.
Quantum Inf. Process., 2022

A secure cross-chain transaction model based on quantum multi-signature.
Quantum Inf. Process., 2022

Deterministic secure quantum communication based on spatial encoding.
Quantum Inf. Process., 2022

Generalized quantum teleportation of shared quantum secret: a coined quantum-walk approach.
Quantum Inf. Process., 2022

An Efficient Semi-Quantum Key Distribution Protocol and Its Security Proof.
IEEE Commun. Lett., 2022

A Rational Hierarchical Quantum State Sharing Protocol.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

A Vulnerability Detection Algorithm Based on Transformer Model.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

2021
Efficient semi-quantum private comparison without using entanglement resource and pre-shared key.
Quantum Inf. Process., 2021

Efficient quantum multi-hop communication based on Greenberger-Horne-Zeilinger states and Bell states.
Quantum Inf. Process., 2021

Semi-device-independent quantum key agreement protocol.
Quantum Inf. Process., 2021

High-capacity measurement-device-independent deterministic secure quantum communication.
Quantum Inf. Process., 2021

A class of protocols for multi-party quantum private comparison based on traveling mode.
Quantum Inf. Process., 2021

An efficient semi-quantum private comparison without pre-shared keys.
Quantum Inf. Process., 2021

An efficient semi-quantum secret sharing protocol of specific bits.
Quantum Inf. Process., 2021

Cluster-state-based quantum secret sharing for users with different abilities.
Quantum Inf. Process., 2021

EPR and single-particle hybridization.
Quantum Inf. Comput., 2021

Detector-device-independent quantum secret sharing based on hyper-encoding and single-photon Bell-state measurement.
Quantum Eng., 2021

Privacy-Preserving Top-k Location-based Services Retrieval in Mobile Internet.
Mob. Networks Appl., 2021

A Quantum Key Distribution Protocol Based on the EPR Pairs and its Simulation.
Mob. Networks Appl., 2021

An efficient anti-quantum lattice-based blind signature for blockchain-enabled systems.
Inf. Sci., 2021

Healthchain: Secure EMRs Management and Trading in Distributed Healthcare Service System.
IEEE Internet Things J., 2021

Information System Security Risk Assessment Based on Entropy Weight Method - Bayesian Network.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

2020
Source-Location Privacy Protection Based on Anonymity Cloud in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2020

Simulation algorithm on the quantum BB84 protocol based on Monte Carlo method in classical computer environment.
Quantum Inf. Process., 2020

Quantum algorithm for Help-Training semi-supervised support vector machine.
Quantum Inf. Process., 2020

Quantum key distribution based on single-particle and EPR entanglement.
Sci. China Inf. Sci., 2020

Sequential Quantum Multiparty Signature Based on Quantum Fourier Transform and Chaotic System.
IEEE Access, 2020

2019
A new kind of universal and flexible quantum information splitting scheme with multi-coin quantum walks.
Quantum Inf. Process., 2019

A new kind of flexible quantum teleportation of an arbitrary multi-qubit state by multi-walker quantum walks.
Quantum Inf. Process., 2019

Efficient quantum private comparison protocol based on the entanglement swapping between four-qubit cluster state and extended Bell state.
Quantum Inf. Process., 2019

Reducing the communication complexity of quantum private database queries by subtle classical post-processing with relaxed quantum ability.
Comput. Secur., 2019

Shortest Path Routing With Risk Control for Compromised Wireless Sensor Networks.
IEEE Access, 2019

Continuous-Variable Arbitrated Quantum Signature Based on Dense Coding and Teleportation.
IEEE Access, 2019

Deterministic Quantum Secure Direct Communication Protocol Based on Hyper-Entangled State.
IEEE Access, 2019

Deterministic Quantum Secure Direct Communication Protocol Based on Omega State.
IEEE Access, 2019

Quantum Wireless Network Private Query With Multiple Third Parties.
IEEE Access, 2019

Quantum Private Query With Perfect Performance Universally Applicable Against Collective-Noise.
IEEE Access, 2019

A New Lattice-Based Signature Scheme in Post-Quantum Blockchain Network.
IEEE Access, 2019

One Step Quantum Key Distribution Protocol Based on the Hyperentangled Bell State.
IEEE Access, 2019

Design and Simulation of a Quantum Key Distribution Protocol Based on Single-Particle and EPR Entanglement.
Proceedings of the Simulation Tools and Techniques - 11th International Conference, 2019

A Quantum Key Distribution Protocol Based on the EPR Pairs and Its Simulation.
Proceedings of the Simulation Tools and Techniques - 11th International Conference, 2019

Design and Simulation of a Deterministic Quantum Secure Direct Communication and Authentication Protocol Based on Three-Particle Asymmetric Entangled State.
Proceedings of the Simulation Tools and Techniques - 11th International Conference, 2019

2018
The security analysis of E91 protocol in collective-rotation noise channel.
Int. J. Distributed Sens. Networks, 2018

Quantum network communication: a discrete-time quantum-walk approach.
Sci. China Inf. Sci., 2018

Learning Word Sentiment with Neural Bag-Of-Words Model Combined with Ngram.
Proceedings of the Intelligence Science II, 2018

Recurrent Convolutional Neural Network with Attention for Twitter and Yelp Sentiment Classification: ARC Model for Sentiment Classification.
Proceedings of the 2018 International Conference on Algorithms, 2018

2017
Theoretically extensible quantum digital signature with starlike cluster states.
Quantum Inf. Process., 2017

2011
An answer extraction method based on discourse structure and rank learning.
Proceedings of the 7th International Conference on Natural Language Processing and Knowledge Engineering, 2011

Naxi-English bilingual word alignment based on language feature model of Naxi.
Proceedings of the 7th International Conference on Natural Language Processing and Knowledge Engineering, 2011

Memory errors prevention technology for C/C++ program based on probability.
Proceedings of the 7th International Conference on Natural Language Processing and Knowledge Engineering, 2011

Study on meaningful string extraction algorithm for improving webpage classification.
Proceedings of the 7th International Conference on Natural Language Processing and Knowledge Engineering, 2011

2008
Design and Realization of a Large-Scale Distributed Intrusion Management System Module.
Proceedings of the PACIIA 2008, 2008

2005
A Novel Fuzzy Anomaly Detection Method Based on Clonal Selection Clustering Algorithm.
Proceedings of the Advances in Machine Learning and Cybernetics, 2005


  Loading...