Yi-Hua Zhou

Orcid: 0000-0002-9191-964X

Affiliations:
  • Beijing University of Technology, Faculty of Information Technology, China


According to our database1, Yi-Hua Zhou authored at least 59 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Hierarchical quantum rotation operation sharing with multiparty users.
Quantum Inf. Process., May, 2024

An image reranking algorithm based on discrete-time quantum walk.
Multim. Tools Appl., April, 2024

A lattice-based searchable encryption scheme with multi-user authorization for the certificateless cloud computing environment.
Trans. Emerg. Telecommun. Technol., April, 2024

A visually secure image encryption algorithm based on block compressive sensing and deep neural networks.
Multim. Tools Appl., March, 2024

A lattice-based unordered certificateless aggregate signature scheme for cloud medical health monitoring system.
Peer Peer Netw. Appl., January, 2024

A new visually meaningful double-image encryption algorithm combining 2D compressive sensing with fractional-order chaotic system.
Multim. Tools Appl., January, 2024

A Certificateless Linearly Homomorphic Signature Scheme Based on Lattice for Network Coding.
Comput. J., 2024

2023
Measurement-device-independent quantum key agreement based on entanglement swapping.
Quantum Inf. Process., December, 2023

Efficient color image encryption by color-grayscale conversion based on steganography.
Multim. Tools Appl., March, 2023

Practical Quantum Anonymous Private Information Retrieval Based on Quantum Key Distribution.
IEEE Trans. Inf. Forensics Secur., 2023

Controlled quantum teleportation based on quantum walks.
Quantum Inf. Process., 2023

A visually meaningful image encryption algorithm based on adaptive 2D compressive sensing and chaotic system.
Multim. Tools Appl., 2023

Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem).
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

Improvement of an Identity-Based Aggregate Signature Protocol from Lattice.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

2022
Measurement-device-independent continuous variable semi-quantum key distribution protocol.
Quantum Inf. Process., 2022

Measurement-device-independent quantum wireless network communication.
Quantum Inf. Process., 2022

Multiparty anonymous quantum communication without multipartite entanglement.
Quantum Inf. Process., 2022

Deterministic secure quantum communication based on spatial encoding.
Quantum Inf. Process., 2022

Ring Signature Scheme Based on Lattice and Its Application on Anonymous Electronic Voting.
KSII Trans. Internet Inf. Syst., 2022

A unidirectional certificateless proxy re-signature scheme based on lattice.
Trans. Emerg. Telecommun. Technol., 2022

Intrusion detection: A model based on the improved vision transformer.
Trans. Emerg. Telecommun. Technol., 2022

Discrimination of two nonorthogonal states against amplitude-damping noise via feed-forward control.
Concurr. Comput. Pract. Exp., 2022

A certificateless ring signature scheme based on lattice.
Concurr. Comput. Pract. Exp., 2022

Identity-based Linkable Blind Ring Signature Scheme on Lattice.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

2021
Efficient quantum multi-hop communication based on Greenberger-Horne-Zeilinger states and Bell states.
Quantum Inf. Process., 2021

Semi-device-independent quantum key agreement protocol.
Quantum Inf. Process., 2021

A stronger participant attack on the measurement-device-independent protocol for deterministic quantum secret sharing.
Quantum Inf. Process., 2021

High-capacity measurement-device-independent deterministic secure quantum communication.
Quantum Inf. Process., 2021

Detector-device-independent quantum secret sharing based on hyper-encoding and single-photon Bell-state measurement.
Quantum Eng., 2021

Dual embedding model: a new framework for visually meaningful image encryption.
Multim. Tools Appl., 2021

Double image compression-encryption algorithm based on fractional order hyper chaotic system and DNA approach.
Multim. Tools Appl., 2021

Visually meaningful image encryption based on universal embedding model.
Inf. Sci., 2021

Using M-ary decomposition and virtual bits for visually meaningful image encryption.
Inf. Sci., 2021

2020
Two-party quantum key agreement against collective noisy channel.
Quantum Inf. Process., 2020

Better quantum control does not imply better discrimination effect.
Quantum Inf. Process., 2020

Discriminating two non-orthogonal states against decoherence by feedback control.
Quantum Inf. Process., 2020

2019
New quantum key agreement protocols based on Bell states.
Quantum Inf. Process., 2019

New quantum key agreement protocols based on cluster states.
Quantum Inf. Process., 2019

Three-party quantum secret sharing against collective noise.
Quantum Inf. Process., 2019

Two-party quantum key agreement over a collective noisy channel.
Quantum Inf. Process., 2019

基于GeoHash的近邻查询位置隐私保护方法 (Location Privacy Preserving Nearest Neighbor Querying Based on GeoHash).
计算机科学, 2019

基于聚类的社交网络隐私保护方法 (Cluster-based Social Network Privacy Protection Method).
计算机科学, 2019

Reducing the communication complexity of quantum private database queries by subtle classical post-processing with relaxed quantum ability.
Comput. Secur., 2019

2018
Simple hash function using discrete-time quantum walks.
Quantum Inf. Process., 2018

Constructing quantum Hash functions based on quantum walks on Johnson graphs.
Quantum Inf. Process., 2018

Eliminating the texture features in visually meaningful cipher images.
Inf. Sci., 2018

Quantum network communication: a discrete-time quantum-walk approach.
Sci. China Inf. Sci., 2018

2017
Theoretically extensible quantum digital signature with starlike cluster states.
Quantum Inf. Process., 2017

A Clustering Algorithm based on Internal Constrained Multi-view K-means.
Proceedings of the 12th Chinese Conference on Computer Supported Cooperative Work and Social Computing, 2017

2016
Arbitrated quantum signature scheme based on cluster states.
Quantum Inf. Process., 2016

Novel classical post-processing for quantum key distribution-based quantum private query.
Quantum Inf. Process., 2016

Novel quantum image encryption using one-dimensional quantum cellular automata.
Inf. Sci., 2016

2015
Quantum oblivious transfer with relaxed constraints on the receiver.
Quantum Inf. Process., 2015

A new quantum blind signature with unlinkability.
Quantum Inf. Process., 2015

A novel quantum deniable authentication protocol without entanglement.
Quantum Inf. Process., 2015

2014
Comment on "efficient and feasible quantum private comparison of equality against the collective amplitude damping noise".
Quantum Inf. Process., 2014

Quantum deniable authentication protocol.
Quantum Inf. Process., 2014

Comment on "The enhanced quantum blind signature protocol".
Quantum Inf. Process., 2014

2006
Combining long-term learning and active learning with semi-supervised method for content-based image retrieval.
Proceedings of the 12th International Conference on Multi Media Modeling (MMM 2006), 2006


  Loading...