


Остановите войну!
for scientists:


default search action
Mingxing Luo
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j30]Yuefeng Cen
, Mingxing Luo, Gang Cen, Cheng Zhao, Zhigang Cheng:
Financial Market Correlation Analysis and Stock Selection Application Based on TCN-Deep Clustering. Future Internet 14(11): 331 (2022) - 2020
- [j29]Hong Lai, Josef Pieprzyk
, Mingxing Luo, Cheng Zhan, Lei Pan
, Mehmet A. Orgun
:
High-capacity (2, 3) threshold quantum secret sharing based on asymmetric quantum lossy channels. Quantum Inf. Process. 19(5): 157 (2020) - [i1]Mingxing Luo, Xiaojun Wang:
Unconditionally secure quantum bit commitment: Revised. IACR Cryptol. ePrint Arch. 2020: 1077 (2020)
2010 – 2019
- 2019
- [j28]Lei Zhang, Mingxing Luo, Jiangtao Li
, Man Ho Au
, Kim-Kwang Raymond Choo
, Tong Chen, Shengwei Tian:
Blockchain based secure data sharing system for Internet of vehicles: A position paper. Veh. Commun. 16: 85-93 (2019) - 2018
- [j27]Hong Lai, Mingxing Luo, Josef Pieprzyk, Jun Zhang, Lei Pan
, Mehmet A. Orgun
:
High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space. Sci. China Inf. Sci. 61(6): 062501:1-062501:11 (2018) - [j26]Hong Lai, Mingxing Luo, Josef Pieprzyk, Zhiguo Qu, Mehmet A. Orgun
:
Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice. Inf. Process. Lett. 134: 24-30 (2018) - [j25]Hong Lai, Mingxing Luo, Jun Zhang, Josef Pieprzyk, Lei Pan
, Mehmet A. Orgun
:
A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement. Quantum Inf. Process. 17(7): 162 (2018) - [j24]Hui-Ran Li, Mingxing Luo
, Hong Lai:
Generalized quantum no-go theorems of pure states. Quantum Inf. Process. 17(7): 168 (2018) - [j23]Hong Lai, Mingxing Luo, Mehmet A. Orgun
, Josef Pieprzyk, Fuyuan Xiao, Cheng Zhan:
Tunable multi-party high-capacity quantum key distribution based on m-generalized Fibonacci sequences using golden coding. Quantum Inf. Process. 17(9): 246 (2018) - [j22]Hong Lai, Mingxing Luo, Zhiguo Qu, Fuyuan Xiao, Mehmet A. Orgun
:
A Hybrid Quantum Key Distribution Protocol for Tele-care Medicine Information Systems. Wirel. Pers. Commun. 98(1): 929-943 (2018) - [c3]Hui-Ran Li, Mingxing Luo, Hong Lai:
Unified Quantum No-Go Theorems of Pure States. ICCCS (4) 2018: 38-47 - [c2]Hong Lai, Mingxing Luo, Li Tao, Fuyuan Xiao, Cheng Zhan, Xiaofang Hu:
An Efficient and Secure Key Agreement Protocol Preserving User Anonymity Under Chebyshev Chaotic Maps. ICCCS (3) 2018: 479-489 - 2017
- [j21]Hong Lai, Mingxing Luo, Josef Pieprzyk
, Zhiguo Qu, Shudong Li, Mehmet A. Orgun
:
An efficient quantum blind digital signature scheme. Sci. China Inf. Sci. 60(8): 082501:1-082501:14 (2017) - [j20]Mingxing Luo
, Hui-Ran Li, Hong Lai, Xiaojun Wang:
Unified quantum no-go theorems and transforming of quantum pure states in a restricted set. Quantum Inf. Process. 16(12): 297 (2017) - 2016
- [j19]Feng Wang, Mingxing Luo, Hui-Ran Li, Zhiguo Qu, Xiaojun Wang:
Improved quantum ripple-carry addition circuit. Sci. China Inf. Sci. 59(4): 042406:1-042406:8 (2016) - [j18]Feng Wang, Mingxing Luo, Hui-Ran Li, Zhiguo Qu, Xiaojun Wang:
Quantum private comparison based on quantum dense coding. Sci. China Inf. Sci. 59(11): 112501 (2016) - [j17]Hong Lai, Mehmet A. Orgun
, Josef Pieprzyk
, Jing Li, Mingxing Luo, Jinghua Xiao, Fuyuan Xiao:
High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding. Quantum Inf. Process. 15(11): 4663-4679 (2016) - [c1]Mingxing Luo, Hui-Ran Li:
Distributed Quantum Computation Assisted by Remote Toffoli Gate. ICCCS (1) 2016: 475-485 - 2015
- [j16]Mingxing Luo, Hui-Ran Li:
Teleportation of a controlled-NOT gate for photon and electron-spin qubits assisted by the nitrogen-vacancy center. Quantum Inf. Comput. 15(15&16): 1397-1419 (2015) - [j15]Mingxing Luo, Song-Ya Ma, Yun Deng, Xiaojun Wang:
Deterministic generations of quantum state with no more than six qubits. Quantum Inf. Process. 14(3): 901-920 (2015) - [j14]Mingxing Luo, Yun Deng, Hui-Ran Li, Xiaojun Wang:
Generations of N-atom GHZ state and 2n-atom W state assisted by quantum dots in optical microcavities. Quantum Inf. Process. 14(10): 3661-3676 (2015) - 2014
- [j13]Song-Ya Ma, Mingxing Luo, Xiu-Bo Chen, Yixian Yang:
Schemes for remotely preparing an arbitrary four-qubit χ-state. Quantum Inf. Process. 13(9): 1951-1965 (2014) - [j12]Zhihua Zhang, Lan Shu, Zhiwen Mo, Jun Zheng
, Song-Ya Ma, Mingxing Luo:
Joint remote state preparation between multi-sender and multi-receiver. Quantum Inf. Process. 13(9): 1979-2005 (2014) - 2013
- [j11]Yanbin Sun, Yan Sun, Mingxing Luo, Lize Gu, Shihui Zheng, Yixian Yang:
Comment on Lee et al.'s group signature and e-auction scheme. Inf. Syst. Frontiers 15(1): 133-139 (2013) - [j10]Mingxing Luo, Yun Deng, Xiu-Bo Chen, Yixian Yang:
The faithful remote preparation of general quantum states. Quantum Inf. Process. 12(1): 279-294 (2013) - [j9]Mingxing Luo, Yun Deng:
Quantum splitting an arbitrary three-qubit state with χ-state. Quantum Inf. Process. 12(2): 773-784 (2013) - [j8]Mingxing Luo, Yun Deng:
Distort one qubit from copying and deleting. Quantum Inf. Process. 12(4): 1701-1717 (2013) - [j7]Mingxing Luo, Yun Deng, Xiu-Bo Chen, Yi-Xian Yang, Hongheng Li:
Faithful quantum broadcast beyond the no-go theorem. Quantum Inf. Process. 12(5): 1969-1979 (2013) - [j6]Jia-Yin Peng, Mingxing Luo, Zhi-Wen Mo:
Joint remote state preparation of arbitrary two-particle states via GHZ-type states. Quantum Inf. Process. 12(7): 2325-2342 (2013) - [j5]Mingxing Luo, Yun Deng, Xiu-Bo Chen, Yi-Xian Yang:
The rational approximations of the unitary groups. Quantum Inf. Process. 12(10): 3149-3166 (2013) - [j4]Mingxing Luo, Yun Deng, Song-Ya Ma, Xiu-Bo Chen, Zhiguo Qu:
Random quantum evolution. Quantum Inf. Process. 12(10): 3353-3367 (2013) - 2012
- [j3]Mingxing Luo, Xiu-Bo Chen, Yi-Xian Yang, Xinxin Niu:
Experimental architecture of joint remote state preparation. Quantum Inf. Process. 11(3): 751-767 (2012) - 2010
- [j2]Mingxing Luo, Yixian Yang, Licheng Wang, Xinxin Niu:
Secure network coding in the presence of eavesdroppers. Sci. China Inf. Sci. 53(3): 648-658 (2010) - [j1]Qin Guo, Mingxing Luo, Lixiang Li
, Yixian Yang:
Secure Network Coding against Wiretapping and Byzantine Attacks. EURASIP J. Wirel. Commun. Netw. 2010 (2010)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2022-12-06 21:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint