Shan, Rui-Ting Chen, Xiubo Yuan, Kai-Guo
Published in
Science China Information Sciences
Blind quantum computation (BQC) can ensure a client with limited quantum capability safely delegates computing tasks to a remote quantum server. In order to resist attacks from ignoring identity authentication in BQC protocols, it is necessary to guarantee the legality of both clients and servers in a multi-party BQC network. So we propose a multi-...
Shang, Tao Zhao, Zheng Ren, Xujie Liu, Jianwei
Published in
Science China Information Sciences
Individual privacy preservation has become an important issue with the development of big data technology. The definition of ρ-differential identifiability (DI) precisely matches the legal definitions of privacy, which can provide an easy parameterization approach for practitioners so that they can set privacy parameters based on the privacy concep...
Zhang, Zhen Feng, Qilong Xu, Jinhui Wang, Jianxin
Published in
Science China Information Sciences
Guo, Qipeng Qiu, Xipeng Xue, Xiangyang Zhang, Zheng
Published in
Science China Information Sciences
Text generation is a fundamental and important task in natural language processing. Most of the existing models generate text in a sequential manner and have difficulty modeling complex dependency structures. In this paper, we treat the text generation task as a graph generation problem exploiting both syntactic and word-ordering relationships. Lev...
Lou, Baichuan Li, Yufang Lu, Xiaoding Xu, Zhe
Published in
Science China Information Sciences
Zhou, Junping Li, Chumin Zhou, Yupeng Li, Mingyang Liang, Lili Wang, Jianan
Published in
Science China Information Sciences
Zhang, Xiang He, Shuping Stojanovic, Vladimir Luan, Xiaoli Liu, Fei
Published in
Science China Information Sciences
In the present study, the finite-time asynchronous dissipative filter design problem for the Markov jump systems with conic-type nonlinearity is studied. The hidden Markov model can describe the asynchronism embodied in the system modes and the filter modes reasonably. Moreover, a suitable Lyapunov-Krasovskii function is utilized and linear matrix ...
Lu, Jianquan Li, Bowen Zhong, Jie
Published in
Science China Information Sciences
A random fault or a malicious attack can compromise the security of decryption systems. Using a stable and monotonous feedback shift register (FSR) as the main building block in a convolutional decoder can limit some error propagation. This work foucus on the synthesis of reliable (i.e., globally stable and monotonous) FSRs using the Boolean networ...
Liu, Yu Liang, Huicong Li, Muzhou Huang, Luning Hu, Kai Yang, Chenhe Wang, Meiqin
Published in
Science China Information Sciences
Wei, Man Sun, Siwei Wei, Zihao Hu, Lei
Published in
Science China Information Sciences