scispace - formally typeset
Search or ask a question
Author

Fuyuan Xiao

Bio: Fuyuan Xiao is an academic researcher from Southwest University. The author has contributed to research in topics: Computer science & Divergence (linguistics). The author has an hindex of 5, co-authored 11 publications receiving 1259 citations.

Papers published on a yearly basis

Papers
More filters
Journal ArticleDOI
TL;DR: A novel hybrid threshold adaptable quantum secret sharing scheme, using an m-bonacci orbital angular momentum pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding, which can detect eavesdropping without joint quantum operations and permits secret sharing for an arbitrary but no less than threshold-value number of classical participants with much lower bandwidth.
Abstract: With prevalent attacks in communication, sharing a secret between communicating parties is an ongoing challenge. Moreover, it is important to integrate quantum solutions with classical secret sharing schemes with low computational cost for the real world use. This paper proposes a novel hybrid threshold adaptable quantum secret sharing scheme, using an m-bonacci orbital angular momentum (OAM) pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding. To be exact, we employ entangled states prepared by m-bonacci sequences to detect eavesdropping. Meanwhile, we encode m-bonacci sequences in Lagrange interpolation polynomials to generate the shares of a secret with reverse Huffman-Fibonacci-tree coding. The advantages of the proposed scheme is that it can detect eavesdropping without joint quantum operations, and permits secret sharing for an arbitrary but no less than threshold-value number of classical participants with much lower bandwidth. Also, in comparison with existing quantum secret sharing schemes, it still works when there are dynamic changes, such as the unavailability of some quantum channel, the arrival of new participants and the departure of participants. Finally, we provide security analysis of the new hybrid quantum secret sharing scheme and discuss its useful features for modern applications.

812 citations

12 Aug 2016
TL;DR: In this article, the authors proposed a hybrid threshold adaptable quantum secret sharing scheme, using an m-bonacci orbital angular momentum (OAM) pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding.
Abstract: With prevalent attacks in communication, sharing a secret between communicating parties is an ongoing challenge. Moreover, it is important to integrate quantum solutions with classical secret sharing schemes with low computational cost for the real world use. This paper proposes a novel hybrid threshold adaptable quantum secret sharing scheme, using an m-bonacci orbital angular momentum (OAM) pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding. To be exact, we employ entangled states prepared by m -bonacci sequences to detect eavesdropping. Meanwhile, we encode m -bonacci sequences in Lagrange interpolation polynomials to generate the shares of a secret with reverse Huffman-Fibonacci-tree coding. The advantages of the proposed scheme is that it can detect eavesdropping without joint quantum operations, and permits secret sharing for an arbitrary but no less than threshold-value number of classical participants with much lower bandwidth. Also, in comparison with existing quantum secret sharing schemes, it still works when there are dynamic changes, such as the unavailability of some quantum channel, the arrival of new participants and the departure of participants. Finally, we provide security analysis of the new hybrid quantum secret sharing scheme and discuss its useful features for modern applications.

400 citations

Journal ArticleDOI
TL;DR: In this paper , a measure to quantify the information quality of intuitionistic fuzzy information based on a pseudo probability transformation is proposed, and its induced order is derived to rank intuitionistic values.

66 citations

Journal ArticleDOI
TL;DR: This is the first work to design MSQIF algorithms to support quantum decision making from a new perspective of negation, which provides promising solutions to knowledge representation, uncertainty measure, and fusion of quantum information.
Abstract: In artificial intelligence systems, a question on how to express the uncertainty in knowledge remains an open issue. The negation scheme provides a new perspective to solve this issue. In this paper, we study quantum decisions from the negation perspective. Specifically, complex evidence theory (CET) is considered to be effective to express and handle uncertain information in a complex plane. Therefore, we first express CET in the quantum framework of Hilbert space. On this basis, a generalized negation method is proposed for quantum basic belief assignment (QBBA), called QBBA negation. In addition, a QBBA entropy is revisited to study the QBBA negation process to reveal the variation tendency of negation iteration. Meanwhile, the properties of the QBBA negation function are analyzed and discussed along with special cases. Then, several multisource quantum information fusion (MSQIF) algorithms are designed to support decision making. Finally, these MSQIF algorithms are applied in pattern classification to demonstrate their effectiveness. This is the first work to design MSQIF algorithms to support quantum decision making from a new perspective of “negation”, which provides promising solutions to knowledge representation, uncertainty measure, and fusion of quantum information.

61 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: In this phase 3 study, the survival benefits indicate that nivolumab might be a new treatment option for heavily pretreated patients with advanced gastric or gastro-oesophageal junction cancer.

1,512 citations

Journal ArticleDOI
TL;DR: Two-dimensional transition metal carbides and nitrides (MXenes) have emerged as highly conductive and stable materials, of promise for electronic applications, and in situ electric biasing and transmission electron microscopy are used to investigate the effect of surface termination and intercalation on electronic properties.
Abstract: MXenes are an emerging family of highly-conductive 2D materials which have demonstrated state-of-the-art performance in electromagnetic interference shielding, chemical sensing, and energy storage. To further improve performance, there is a need to increase MXenes' electronic conductivity. Tailoring the MXene surface chemistry could achieve this goal, as density functional theory predicts that surface terminations strongly influence MXenes' Fermi level density of states and thereby MXenes' electronic conductivity. Here, we directly correlate MXene surface de-functionalization with increased electronic conductivity through in situ vacuum annealing, electrical biasing, and spectroscopic analysis within the transmission electron microscope. Furthermore, we show that intercalation can induce transitions between metallic and semiconductor-like transport (transitions from a positive to negative temperature-dependence of resistance) through inter-flake effects. These findings lay the groundwork for intercalation- and termination-engineered MXenes, which promise improved electronic conductivity and could lead to the realization of semiconducting, magnetic, and topologically insulating MXenes.

605 citations

Journal ArticleDOI
TL;DR: In this article, the authors describe how evapotranspiration represents the key variable in linking ecosystem functioning, carbon and climate feedbacks, agricultural management, and water resources, and highlight both the outstanding science and applications questions and the actions, especially from a space-based perspective, necessary to advance them.
Abstract: The fate of the terrestrial biosphere is highly uncertain given recent and projected changes in climate. This is especially acute for impacts associated with changes in drought frequency and intensity on the distribution and timing of water availability. The development of effective adaptation strategies for these emerging threats to food and water security are compromised by limitations in our understanding of how natural and managed ecosystems are responding to changing hydrological and climatological regimes. This information gap is exacerbated by insufficient monitoring capabilities from local to global scales. Here, we describe how evapotranspiration (ET) represents the key variable in linking ecosystem functioning, carbon and climate feedbacks, agricultural management, and water resources, and highlight both the outstanding science and applications questions and the actions, especially from a space-based perspective, necessary to advance them.

492 citations

12 Aug 2016
TL;DR: In this article, the authors proposed a hybrid threshold adaptable quantum secret sharing scheme, using an m-bonacci orbital angular momentum (OAM) pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding.
Abstract: With prevalent attacks in communication, sharing a secret between communicating parties is an ongoing challenge. Moreover, it is important to integrate quantum solutions with classical secret sharing schemes with low computational cost for the real world use. This paper proposes a novel hybrid threshold adaptable quantum secret sharing scheme, using an m-bonacci orbital angular momentum (OAM) pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding. To be exact, we employ entangled states prepared by m -bonacci sequences to detect eavesdropping. Meanwhile, we encode m -bonacci sequences in Lagrange interpolation polynomials to generate the shares of a secret with reverse Huffman-Fibonacci-tree coding. The advantages of the proposed scheme is that it can detect eavesdropping without joint quantum operations, and permits secret sharing for an arbitrary but no less than threshold-value number of classical participants with much lower bandwidth. Also, in comparison with existing quantum secret sharing schemes, it still works when there are dynamic changes, such as the unavailability of some quantum channel, the arrival of new participants and the departure of participants. Finally, we provide security analysis of the new hybrid quantum secret sharing scheme and discuss its useful features for modern applications.

400 citations