default search action
Qin Li 0009
Person information
- affiliation: Xiangtan University, School of Cyberspace Security, China
Other persons with the same name
- Qin Li — disambiguation page
- Qin Li 0001 — Shenzhen Institute of Information Technology, School of Software Engineering, China (and 2 more)
- Qin Li 0002 — East China Normal University, Shanghai Key Laboratory of Trustworthy Computing, China (and 1 more)
- Qin Li 0003 — Jinan University, School of Information Science and Technology, Guangzhou, China
- Qin Li 0004 — Xiamen University, School of Aerospace Engineering, Fujian, China (and 2 more)
- Qin Li 0005 — Zhengzhou Institute of Surveying and Mapping, China
- Qin Li 0006 — Chongqing Centers for Disease Control and Prevention, China
- Qin Li 0007 — University of Wisconsin, Madison, WI, USA
- Qin Li 0008 — Statoil Research Center, Porsgrunn, Norway
- Qin Li 0010 — Central South University, Changsha, China
- Qin Li 0011 — Chongqing University of Posts and Telecommunications, Chongqing, China
- Qin Li 0012 — Beijing Institute of Technology, School of Mechanical Engineering, Beijing, China
- Qin Li 0013 — Hebei University of Technology, School of Artificial Intelligence, Tianjin, China
- Qin Li 0014 — Beihang University, Beijing, China
- Qin Li 0015 — University of Washington, Seattle, WA, USA
- Qin Li 0016 — Tsinghua University, Department of Electronic Engineering, BNRist, Beijing, China
- Qin Li 0017 — Nanyang Technological University, Singapore, Singapore
- Qin Li 0018 — U.S. Food and Drug Administration, Silver Spring, MD, USA
- Qin Li 0019 — Leshan Normal University, Leshan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Qin Li, Junyu Quan, Jinjing Shi, Shichao Zhang, Xuelong Li:
Secure Delegated Variational Quantum Algorithms. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(10): 3129-3142 (2024) - [j21]Junyu Quan, Qin Li, Lvzhou Li:
Verifiable Blind Quantum Computation With Identity Authentication for Multi-Type Clients. IEEE Trans. Inf. Forensics Secur. 19: 1687-1698 (2024) - [j20]Jiaye Li, Jinjing Shi, Jian Zhang, Yuhu Lu, Qin Li, Chunlin Yu, Shichao Zhang:
Quantum Nearest Neighbor Collaborative Filtering Algorithm for Recommendation System. ACM Trans. Knowl. Discov. Data 18(8): 201:1-201:28 (2024) - [i5]Junhong Yang, Banghai Wang, Junyu Quan, Qin Li:
Verifiable cloud-based variational quantum algorithms. CoRR abs/2408.13713 (2024) - 2023
- [j19]Qin Li, Can Wang, Jiang Zhu, Lingling Xu, Zhiwei Sun:
Verifiable Multiparty Delegated Quantum Computation. Int. J. Intell. Syst. 2023: 1-17 (2023) - [j18]Lv Chen, Lingli Chen, Qin Li:
Practical multi-party quantum homomorphic encryption. Theor. Comput. Sci. 971: 114067 (2023) - [i4]Qin Li, Junyu Quan, Jinjing Shi, Shichao Zhang, Xuelong Li:
Delegated variational quantum algorithms based on quantum homomorphic encryption. CoRR abs/2301.10433 (2023) - 2022
- [j17]Jiang Liu, Qin Li, Junyu Quan, Can Wang, Jinjing Shi, Haozhen Situ:
Efficient quantum homomorphic encryption scheme with flexible evaluators and its simulation. Des. Codes Cryptogr. 90(3): 577-591 (2022) - [j16]Jinjing Shi, Yuhu Lu, Yanyan Feng, Duan Huang, Xiaoping Lou, Qin Li, Ronghua Shi:
A quantum hash function with grouped coarse-grained boson sampling. Quantum Inf. Process. 21(2): 73 (2022) - [j15]Qin Li, Peishan Li, Li Xie, Lingli Chen, Junyu Quan:
Security analysis and improvement of a semi-quantum private comparison protocol with three-particle G-like states. Quantum Inf. Process. 21(4): 127 (2022) - [j14]Qin Li, Jia Wu, Junyu Quan, Jinjing Shi, Shichao Zhang:
Efficient Quantum Blockchain With a Consensus Mechanism QDPoS. IEEE Trans. Inf. Forensics Secur. 17: 3264-3276 (2022) - [c3]Yuxun Wang, Junyu Quan, Qin Li:
A Delegated Quantum Approximate Optimization Algorithm. WCSP 2022: 804-808 - 2021
- [j13]Junyu Quan, Qin Li, Chengdong Liu, Jinjing Shi, Yu Peng:
A simplified verifiable blind quantum computing protocol with quantum input verification. Quantum Eng. 3(1) (2021) - [j12]Li Xie, Qin Li, Fang Yu, Xiaoping Lou, Cai Zhang:
Cryptanalysis and improvement of a semi-quantum private comparison protocol based on Bell states. Quantum Inf. Process. 20(7): 1-16 (2021) - 2020
- [j11]Fang Yu, Daowen Qiu, Xiaoming Wang, Qin Li, Lvzhou Li, Jozef Gruska:
Security improvements of several basic quantum private query protocols with O(log N) communication complexity. Theor. Comput. Sci. 807: 330-340 (2020) - [i3]Fang Yu, Daowen Qiu, Xiaoming Wang, Qin Li, Lvzhou Li, Jozef Gruska:
Security Improvements of Several Basic Quantum Private Query Protocols with O(log N) Communication Complexity. CoRR abs/2005.13382 (2020)
2010 – 2019
- 2018
- [j10]Zhulin Li, Qin Li, Chengdong Liu, Yu Peng, Wai Hong Chan, Lvzhou Li:
Limited resource semiquantum secret sharing. Quantum Inf. Process. 17(10): 285 (2018) - 2016
- [j9]Chun-Hui Wu, Qin Li, Zhiwei Sun, Xueling Zhong:
Generic Construction of Chameleon Hash to Group Elements. J. Commun. 11(6): 564-572 (2016) - 2015
- [j8]Chun-Hui Wu, Qin Li, Dongyang Long:
Efficient ID-based Non-Malleable Trapdoor Commitments Based on RSA and Factoring. J. Commun. 10(5): 330-338 (2015) - 2014
- [j7]Chun-Hui Wu, Qin Li, Chuan Lin:
New Identity-based Key-exposure Free Chameleon Hash from Bilinear Pairings. J. Networks 9(7): 1756-1763 (2014) - 2013
- [j6]Qin Li, Chengqing Li, Dongyang Long, Wai Hong Chan, Changji Wang:
Efficient arbitrated quantum signature and its proof of security. Quantum Inf. Process. 12(7): 2427-2439 (2013) - [j5]Zhiwei Sun, Cai Zhang, Banghai Wang, Qin Li, Dongyang Long:
Improvements on "multiparty quantum key agreement with single particles". Quantum Inf. Process. 12(11): 3411-3420 (2013) - 2012
- [j4]Chun-Hui Wu, Xiaofeng Chen, Qin Li, Dongyang Long:
Efficient ID-based non-malleable trapdoor commitment. Comput. Electr. Eng. 38(6): 1647-1657 (2012) - [j3]Qin Li, Chengqing Li, Dongyang Long, Wai Hong Chan, Chun-Hui Wu:
On the impossibility of non-static quantum bit commitment between two parties. Quantum Inf. Process. 11(2): 519-527 (2012) - 2011
- [j2]Qin Li, Dongyang Long, Wai Hong Chan, Daowen Qiu:
Sharing a quantum secret without a trusted party. Quantum Inf. Process. 10(1): 97-106 (2011) - [i2]Qin Li, Chengqing Li, Dongyang Long, Wai Hong Chan, Chun-Hui Wu:
On the impossibility of non-static quantum bit commitment between two parties. CoRR abs/1101.5684 (2011) - [i1]Yu Zhang, Chengqing Li, Qin Li, Dan Zhang, Shi Shu:
Breaking a chaotic image encryption algorithm based on perceptron model. CoRR abs/1111.1410 (2011)
2000 – 2009
- 2008
- [c2]Qin Li, Dongyang Long, Changji Wang:
Secure Relativistic Bit Commitment with Fixed Channel Capacity. ICYCS 2008: 1522-1526 - 2007
- [j1]Chang-Ji Wang, Yong Tang, Qin Li:
ID-Based Fair Off-Line Electronic Cash System with Multiple Banks. J. Comput. Sci. Technol. 22(3): 487-493 (2007) - [c1]Changji Wang, Qin Li, Xingfeng Yang:
A Fair and Transferable Off-line Electronic Cash System with Multiple Banks. ICEBE 2007: 189-194
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint