Hidden-Markov-model-based calibration-attack recognition for continuous-variable quantum key distribution
暂无分享,去创建一个
Hao Qin | Ying Guo | Duan Huang | Wenti Huang | Yiyu Mao | Yijun Wang | Ying Guo | Duan Huang | Yiyu Mao | Wenti Huang | Yijun Wang | Hao Qin
[1] Émilie Chouzenoux,et al. Variable Metric Forward–Backward Algorithm for Minimizing the Sum of a Differentiable Function and a Convex Function , 2013, Journal of Optimization Theory and Applications.
[2] Mario Berta,et al. Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks. , 2012 .
[3] Tao Wang,et al. Robust continuous-variable quantum key distribution against practical attacks , 2017 .
[4] Adam Prügel-Bennett,et al. SVM Parameter Optimization using Grid Search and Genetic Algorithm to Improve Classification Performance , 2016 .
[5] Mu-Sheng Jiang,et al. Enhancement of the security of a practical continuous-variable quantum-key-distribution system by manipulating the intensity of the local oscillator , 2014 .
[6] Yuzhen Yu,et al. A two-grid search scheme for large-scale 3-D finite element analyses of slope stability , 2014 .
[7] E. Diamanti,et al. Preventing Calibration Attacks on the Local Oscillator in Continuous-Variable Quantum Key Distribution , 2013, 1304.7024.
[8] G. Guo,et al. Quantum hacking on quantum key distribution using homodyne detection , 2014, 1402.6921.
[9] Nicolas J. Cerf,et al. Experimental implementation of non-gaussian attacks on a continuous-variable quantum key distribution system , 2007, 2007 Quantum Electronics and Laser Science Conference.
[10] L. Liang,et al. Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems , 2013, 1303.6043.
[11] S. Lloyd,et al. Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography. , 2008, Physical review letters.
[12] David Volent Lindberg,et al. Inference of the Transition Matrix in Convolved Hidden Markov Models and the Generalized Baum–Welch Algorithm , 2015, IEEE Transactions on Geoscience and Remote Sensing.
[13] Peng Huang,et al. Practical security of continuous-variable quantum key distribution with finite sampling bandwidth effects , 2016 .
[14] Witold Pedrycz,et al. Multivariate time series anomaly detection: A framework of Hidden Markov Models , 2017, Appl. Soft Comput..
[15] Émilie Chouzenoux,et al. A block coordinate variable metric forward–backward algorithm , 2016, Journal of Global Optimization.
[16] E. Diamanti,et al. Field test of classical symmetric encryption with continuous variables quantum key distribution. , 2012, Optics express.
[17] Radim Filip,et al. Long-distance continuous-variable quantum key distribution with efficient channel estimation , 2014 .
[18] Peng Huang,et al. Composable security of unidimensional continuous-variable quantum key distribution , 2017, Quantum Information Processing.
[19] Dirk A. Lorenz,et al. An Inertial Forward-Backward Algorithm for Monotone Inclusions , 2014, Journal of Mathematical Imaging and Vision.
[20] Xinghuo Yu,et al. Detecting Anomalous Behavior in Cloud Servers by Nested-Arc Hidden SEMI-Markov Model with State Summarization , 2019, IEEE Transactions on Big Data.
[21] Anthony Leverrier,et al. Composable security proof for continuous-variable quantum key distribution with coherent States. , 2014, Physical review letters.
[22] S. Srivastava,et al. Optimisation of Hidden Markov Model using Baum–Welch algorithm for prediction of maximum and minimum temperature over Indian Himalaya , 2017, Journal of Earth System Science.
[23] G. Guo,et al. Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack , 2013, 1302.0090.
[24] Víctor A. Villagrá,et al. Real-Time Multistep Attack Prediction Based on Hidden Markov Models , 2020, IEEE Transactions on Dependable and Secure Computing.
[25] P. Grangier,et al. Finite-size analysis of a continuous-variable quantum key distribution , 2010, 1005.0339.
[26] Renato Renner,et al. Security of continuous-variable quantum key distribution against general attacks. , 2012, Physical review letters.
[27] Zhang Yu,et al. Application of Improved Grid Search Algorithm on SVM for Classification of Tumor Gene , 2014, MUE 2014.
[28] Mu-Sheng Jiang,et al. Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol , 2013 .
[29] Anthony Leverrier,et al. Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction. , 2017, Physical review letters.
[30] Rupesh Kumar,et al. Homodyne-detector-blinding attack in continuous-variable quantum key distribution , 2018, Physical Review A.
[31] E. Diamanti,et al. Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers , 2008, 0812.4314.
[32] Guihua Zeng,et al. Integrating machine learning to achieve an automatic parameter prediction for practical continuous-variable quantum key distribution , 2018 .