The reduction of greenhouse gas emissions in the Internet and ICT sectors has become a critical challenge. According to recent research, the key contributors to greenhouse gas emissions in Internet include high energy...
详细信息
Because the damage caused by source code vulnerabilities to agencies and organizations is increasing, early detection and warning of these vulnerabilities is very necessary today. In recent times, approaches based on ...
详细信息
We propose a quantum-enhanced metrological scheme utilizing unbalanced entangled coherent states(ECSs) generated by passing a coherent state and a coherent state superposition through an unbalanced beam splitter(BS). ...
详细信息
We propose a quantum-enhanced metrological scheme utilizing unbalanced entangled coherent states(ECSs) generated by passing a coherent state and a coherent state superposition through an unbalanced beam splitter(BS). We identify the optimal phase sensitivity of this scheme by maximizing the quantum Fisher information(QFI) with respect to the BS transmission ratio. Our scheme outperforms the conventional scheme with a balanced BS, particularly in the presence of single-mode photon loss. Notably, our scheme retains quantum advantage in phase sensitivity in the limit of high photon intensity, where the balanced scheme offers no advantage over the classical strategy.
Classification of quantum phases is one of the most important areas of research in condensed matter *** this work,we obtain the phase diagram of one-dimensional quasiperiodic models via unsupervised ***,we choose two ...
详细信息
Classification of quantum phases is one of the most important areas of research in condensed matter *** this work,we obtain the phase diagram of one-dimensional quasiperiodic models via unsupervised ***,we choose two advanced unsupervised learning algorithms,namely,density-based spatial clustering of applications with noise(DBSCAN)and ordering points to identify the clustering structure(OPTICS),to explore the distinct phases of the Aubry–André–Harper model and the quasiperiodic p-wave *** unsupervised learning results match well with those obtained through traditional numerical ***,we assess similarity across different algorithms and find that the highest degree of similarity between the results of unsupervised learning algorithms and those of traditional algorithms exceeds 98%.Our work sheds light on applications of unsupervised learning for phase classification.
Quantum secure direct communication(QSDC)can transmit the secret message ***-photon-based QSDC protocol requires the active modulation of the quantum state of the source,potentially introducing various side-channel **...
详细信息
Quantum secure direct communication(QSDC)can transmit the secret message ***-photon-based QSDC protocol requires the active modulation of the quantum state of the source,potentially introducing various side-channel *** this paper,we propose a passive-state preparation QSDC *** utilizing a passive-state preparation method,we remove the need for active modulation,thus eliminating the side-channel risks associated with the source *** evaluate the performance of the protocol,we develop a system model and improve the decoy state *** parameter optimization,we identify the optimal secrecy message capacity for various communication distances and compare it with active modulation *** a communication distance of 10(15)km,the secrecy message capacity of passive-state preparation QSDC reaches3.894×10^(-4)(3.715×10^(-5))bit/pulse,achieving 95.3%(91.5%)of the active case’s ***,we consider the resource consumption and optimize the secrecy message transmission rate of passive-state preparation *** a coherent light source with a frequency of 10^(6)Hz,at communication distances of 5,10,and 15 km,the secrecy message transmission rates for passive-state preparation QSDC reach 2.370×10^(2),4.218×10,and 2.504 bit/s,respectively.
Networked control systems(NCSs), whose feedback loops are connected via the communication networks, have a wide application in computer science, medicine, telecommunications, and so on. However, communication networks...
Networked control systems(NCSs), whose feedback loops are connected via the communication networks, have a wide application in computer science, medicine, telecommunications, and so on. However, communication networks may suffer from congested network traffic due to the limited network bandwidth. One way to solve these issues is to use event-triggered sampling to alleviate network bandwidth utilization.
Hybrid entangled states(HESs),which involve different particles with various degrees of freedom,have garnered significant attention and been applied in a wide range of quantum ***,similar to other categories of entang...
详细信息
Hybrid entangled states(HESs),which involve different particles with various degrees of freedom,have garnered significant attention and been applied in a wide range of quantum ***,similar to other categories of entanglement,maximally HESs inevitably degrade to mixed states due to the environmental noise and operational *** address the degradation problem,measurement-based entanglement purification offers a feasible and robust solution alternative to conventional gate-based purification *** this paper,we propose a measurement-based hybrid entanglement purification protocol(MB-HEPP)for a certain kind of HES which consists of polarization photons and coherent *** extend our methodology to several conditions,such as the multi-copy and multi-party scenarios,and the photon-loss *** with previous HEPPs,this protocol has several ***,it does not depend on post-selection and the purified HESs can be retained for further ***,it does not require the Bell state measurement,but only uses the parity check with conventional linear optical elements,which makes it have the higher success probability and more *** MB-HEPP has potential applications in future heterogeneous quantum networks.
Detecting malware on mobile devices using the Android operating system has become a critical challenge in the field of cybersecurity,in the context of the rapid increase in the number of malware variants and the frequ...
详细信息
Detecting malware on mobile devices using the Android operating system has become a critical challenge in the field of cybersecurity,in the context of the rapid increase in the number of malware variants and the frequency of attacks targeting Android *** this paper,we propose a novel intelligent computational method to enhance the effectiveness of Android malware detection *** proposed method combines two main techniques:(1)constructing a malware behavior profile and(2)extracting features from the malware behavior profile using graph neural ***,to effectively construct an Android malware behavior profile,this paper proposes an information enrichment technique for the function call graph of malware files,based on new graph-structured features and semantic features of the malware’s source ***,to extract significant features from the constructed behavior profile,the study proposes using the GraphSAGE graph neural *** this novel intelligent computational method,a variety of significant features of the malware have been effectively represented,synthesized,and *** approach to detecting Android malware proposed in this paper is a new study and has not been explored in previous *** experimental results on a dataset of 40,819 Android software indicate that the proposed method performs well across all metrics,with particularly impressive accuracy and recall scores of 99.03%and 99.19%,respectively,which outperforms existing state-of-the-art methods.
Quantum digital signature(QDS)can guarantee the information-theoretical security of a signature with the fundamental laws of quantum ***,most current QDS protocols do not take source security into account,leading to a...
详细信息
Quantum digital signature(QDS)can guarantee the information-theoretical security of a signature with the fundamental laws of quantum ***,most current QDS protocols do not take source security into account,leading to an overestimation of the signature *** this paper,we propose to utilize Hong–Ou–Mandel interference to characterize the upper bound of the source imperfections,and further to quantify information leakage from potential ***,we combine decoy-state methods and finite-size analysis in analyzing the signature *** results demonstrate the performance and feasibility of our *** current work can improve the practical security of QDS systems,thereby promoting their further networked applications.
Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of *** intrusion tolerant techniques suffered fr...
详细信息
Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of *** intrusion tolerant techniques suffered from problems such as low adaptability,policy lag,and difficulty in determining the degree of *** address these issues,we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas:(1)it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights;and (2)it combines a tournament competition model with incentive weights to obtain optimal strategies for each stage of the game *** experiments are conducted in the IEEE 39-bus system,whose results demonstrate the feasibility of the incentive weights,confirm the proposed strategy strengthens the system’s ability to tolerate aggression,and improves the dynamic adaptability and response efficiency of the aggression-tolerant system in the case of limited resources.
暂无评论