Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    Role-Based Network Embedding via Quantum Walk with Weighted Features Fusion

    Mingqiang Zhou*, Mengjiao Li, Zhiyuan Qian, Kunpeng Li

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2443-2460, 2023, DOI:10.32604/cmc.2023.038675 - 30 August 2023

    Abstract Role-based network embedding aims to embed role-similar nodes into a similar embedding space, which is widely used in graph mining tasks such as role classification and detection. Roles are sets of nodes in graph networks with similar structural patterns and functions. However, the role-similar nodes may be far away or even disconnected from each other. Meanwhile, the neighborhood node features and noise also affect the result of the role-based network embedding, which are also challenges of current network embedding work. In this paper, we propose a Role-based network Embedding via Quantum walk with weighted Features… More >

  • Open Access

    ARTICLE

    A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos

    Muhammad Islam Kamran1, Muazzam A. Khan1, Suliman A. Alsuhibany2, Yazeed Yasin Ghadi3, Arshad4, Jameel Arif1, Jawad Ahmad5,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 657-672, 2022, DOI:10.32604/cmc.2022.028876 - 18 May 2022

    Abstract The use of multimedia data sharing has drastically increased in the past few decades due to the revolutionary improvements in communication technologies such as the 4th generation (4G) and 5th generation (5G) etc. Researchers have proposed many image encryption algorithms based on the classical random walk and chaos theory for sharing an image in a secure way. Instead of the classical random walk, this paper proposes the quantum walk to achieve high image security. Classical random walk exhibits randomness due to the stochastic transitions between states, on the other hand, the quantum walk is more… More >

  • Open Access

    ARTICLE

    Quantum Hierarchical Agglomerative Clustering Based on One Dimension Discrete Quantum Walk with Single-Point Phase Defects

    Gongde Guo1, Kai Yu1, Hui Wang2, Song Lin1, *, Yongzhen Xu1, Xiaofeng Chen3

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1397-1409, 2020, DOI:10.32604/cmc.2020.011399 - 20 August 2020

    Abstract As an important branch of machine learning, clustering analysis is widely used in some fields, e.g., image pattern recognition, social network analysis, information security, and so on. In this paper, we consider the designing of clustering algorithm in quantum scenario, and propose a quantum hierarchical agglomerative clustering algorithm, which is based on one dimension discrete quantum walk with single-point phase defects. In the proposed algorithm, two nonclassical characters of this kind of quantum walk, localization and ballistic effects, are exploited. At first, each data point is viewed as a particle and performed this kind of… More >

  • Open Access

    ARTICLE

    A Controlled Quantum Dialogue Protocol Based on Quantum Walks

    Jinqiao Dai1, Shibin Zhang1, *, Yan Chang1, Xueyang Li1, Tao Zheng1, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1247-1260, 2020, DOI:10.32604/cmc.2020.010550 - 10 June 2020

    Abstract In order to enable two parties to exchange their secret information equally, we propose a controlled quantum dialogue protocol based on quantum walks, which implements the equal exchange of secret information between the two parties with the help of the controller TP. The secret information is transmitted via quantum walks, by using this method, the previously required entangled particles do not need to be prepared in the initial phase, and the entangled particles can be produced spontaneously via quantum walks. Furthermore, to resist TP’s dishonest behavior, we use a hash function to verify the correctness More >

  • Open Access

    ARTICLE

    Message Authentication with a New Quantum Hash Function

    Yalan Wang1,2, Yuling Chen1,*, Haseeb Ahmad3, Zhanhong Wei4

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 635-648, 2019, DOI:10.32604/cmc.2019.05251

    Abstract To ensure the security during the communication, we often adopt different ways to encrypt the messages to resist various attacks. However, with the computing power improving, the existing encryption and authentication schemes are being faced with big challenges. We take the message authentication as an example into a careful consideration. Then, we proposed a new message authentication scheme with the Advanced Encryption Standard as the encryption function and the new quantum Hash function as the authentication function. Firstly, the Advanced Encryption Standard algorithm is used to encrypt the result of the initial message cascading the… More >

Displaying 1-10 on page 1 of 5. Per Page