Deepbackground: Metamorphic testing for deep-learning-driven image recognition systems accompanied by background-relevance Z Zhang, P Wang, H Guo, Z Wang, Y Zhou, Z Huang Information and Software Technology 140, 106701, 2021 | 45 | 2021 |
Semi-device-independent randomness expansion with partially free random sources YQ Zhou, HW Li, YK Wang, DD Li, F Gao, QY Wen Physical Review A 92 (2), 022331, 2015 | 15 | 2015 |
Many-box locality Y Zhou, Y Cai, JD Bancal, F Gao, V Scarani Physical Review A 96 (5), 052108, 2017 | 13 | 2017 |
Semi-device-independent randomness expansion with partially free random sources using quantum random access code YQ Zhou, F Gao, DD Li, XH Li, QY Wen Physical Review A 94 (3), 032318, 2016 | 11 | 2016 |
Security of semi-device-independent random number expansion protocols DD Li, QY Wen, YK Wang, YQ Zhou, F Gao Scientific Reports 5 (1), 15543, 2015 | 10 | 2015 |
Controlled alternate quantum walk-based block hash function D Li, P Ding, Y Zhou, Y Yang Quantum Information Processing 22 (10), 363, 2023 | 9 | 2023 |
Effects of measurement dependence on generalized Clauser-Horne-Shimony-Holt Bell test in the single-run and multiple-run scenarios DD Li, YQ Zhou, F Gao, XH Li, QY Wen Physical Review A 94 (1), 012104, 2016 | 8 | 2016 |
Frequency estimation mechanisms under ϵδ-utility-optimized local differential privacy Y Zhang, Y Zhu, Y Zhou, J Yuan IEEE Transactions on Emerging Topics in Computing 12 (1), 316-327, 2023 | 7 | 2023 |
Authenticated quantum sortition and application in “Picking at random” problems Q Wang, C Yu, Y Li, J Liu, R Shi, Y Zhou IEEE Communications Letters 25 (2), 518-522, 2020 | 7 | 2020 |
Quantitative security analysis of three-level unitary operations in quantum secret sharing without entanglement J Xu, X Li, Y Han, Y Zhou, Z Liu, Z Zhang, Y Song Frontiers in Physics 11, 1213153, 2023 | 5 | 2023 |
Mean estimation mechanisms under (ε, δ)-local differential privacy Y ZHANG, Y ZHU, Y ZHOU, J YUAN Dianzi Yu Xinxi Xuebao 45 (3), 765-774, 2023 | 5 | 2023 |
Reversible gender privacy enhancement via adversarial perturbations Y Xie, Y Zhou, T Wang, W Wen, S Yi, Y Zhang Neural Networks 172, 106130, 2024 | 3 | 2024 |
A high-fidelity quantum state transfer algorithm on the complete bipartite graph D Li, JN Huang, YQ Zhou, YG Yang Quantum Information Processing 22 (6), 245, 2023 | 3 | 2023 |
Perfect state transfer by means of discrete-time quantum walk on the complete bipartite graph J Huang, D Li, P Li, Y Zhou, Y Yang Physica Scripta 99 (1), 015110, 2023 | 2 | 2023 |
BEAIV: blockchain empowered accountable integrity verification scheme for cross-chain data W Wei, Y Zhou, D Li, X Hong International Conference on Web Information Systems and Applications, 488-500, 2023 | 2 | 2023 |
Quantum partial search algorithm with smaller oracles for multiple target items D Li, L Qian, YQ Zhou, YG Yang Quantum Information Processing 21 (5), 160, 2022 | 2 | 2022 |
Semi-device-independent randomness expansion using sequential quantum random access codes X Wang, J Yuan, Y Zhou, Y Liu, L Fan Quantum Information Processing 20, 1-12, 2021 | 2 | 2021 |
Test data augmentation for image recognition software P Wang, Z Zhang, Y Zhou, Z Huang 2020 IEEE 20th International Conference on Software Quality, Reliability and …, 2020 | 2 | 2020 |
Controllable facial protection against malicious translation-based attribute editing Y Xie, Y Zhou, T Wang, Z Hua, W Wen, S Yi, Y Zhang Knowledge-Based Systems 309, 112873, 2025 | 1 | 2025 |
Secure, Efficient, and Privacy-Protecting One-to-Many Cross-Chain Shared Data Consistency Audit D Li, P Ding, Y Zhou, Y Yang, C Li 2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2023 | 1 | 2023 |