default search action
Xin Sun 0001
Person information
- affiliation: Sun Yat-sen University, Institute of Logic and Cognition, Guangzhou, China
- affiliation: John Paul II Catholic University of Lublin, Poland
- affiliation (PhD 2016): University of Luxembourg, Luxembourg
Other persons with the same name
- Xin Sun — disambiguation page
- Xin Sun 0002 — Florida International University (and 1 more)
- Xin Sun 0003 — Technical University of Munich, Germany (and 2 more)
- Xin Sun 0004 — Oak Ridge National Laboratory, TN, USA (and 1 more)
- Xin Sun 0005 — Inst. of Intell. Machines, Hefei, China
- Xin Sun 0006 — National University of Defense Technology, Changsha, China
- Xin Sun 0008 — Beijing Jiaotong University, Beijing, China
- Xin Sun 0009 — Nanjing University, China
- Xin Sun 0010 — University of Oxford, UK
- Xin Sun 0011 — Shanghai University, School of Mechatronical Engineering and Automation, China
- Xin Sun 0012 — University of Bath, Somerset, UK
- Xin Sun 0013 — Peking University, MOE Key Lab of Computational Linguistics, Beijing, China
- Xin Sun 0014 — Adobe Research, San Jose, CA, USA (and 2 more)
- Xin Sun 0015 — Nanyang Technological University, SMRT-NTU Smart Urban Rail Corporate Laboratory, School of Electrical and Electronic Engineering, Singapore
- Xin Sun 0016 — University of Amsterdam, Netherlands
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [i6]Xin Sun, Feifei He, Daowen Qiu, Piotr Kulicki, Mirek Sopek, Meiyun Guo:
Distributed Quantum Vote Based on Quantum Logical Operators, a New Battlefield of the Second Quantum Revolution. CoRR abs/2202.00147 (2022) - 2021
- [j19]Xin Sun, Feifei He, Mirek Sopek, Meiyun Guo:
Schrödinger's Ballot: Quantum Information and the Violation of Arrow's Impossibility Theorem. Entropy 23(8): 1083 (2021) - [j18]Xin Sun, Piotr Kulicki, Mirek Sopek:
Logic Programming with Post-Quantum Cryptographic Primitives for Smart Contract on Quantum-Secured Blockchain. Entropy 23(9): 1120 (2021) - [i5]Xin Sun, Feifei He, Piotr Kulicki, Mirek Sopek:
Schrödinger's Ballot: Quantum Information and the Violation of Arrow's Impossibility Theorem. CoRR abs/2103.11364 (2021) - 2020
- [j17]Xin Sun, Feifei He, Quanlong Wang:
Impossibility of Quantum Bit Commitment, a Categorical Perspective. Axioms 9(1): 28 (2020) - [j16]Xin Sun, Feifei He:
A First Step to the Categorical Logic of Quantum Programs. Entropy 22(2): 144 (2020) - [j15]Xin Sun, Piotr Kulicki, Mirek Sopek:
Multi-Party Quantum Byzantine Agreement without Entanglement. Entropy 22(10): 1152 (2020) - [j14]Xin Sun, Piotr Kulicki, Mirek Sopek:
Lottery and Auction on Quantum Blockchain. Entropy 22(12): 1377 (2020) - [i4]Xin Sun, Piotr Kulicki, Mirek Sopek:
Multi-party Quantum Byzantine Agreement Without Entanglement. CoRR abs/2003.09120 (2020) - [i3]Xin Sun, Piotr Kulicki, Mirek Sopek:
Bit Commitment for Lottery and Auction on Quantum Blockchain. CoRR abs/2004.10312 (2020)
2010 – 2019
- 2019
- [j13]Xin Sun, Mirek Sopek, Quanlong Wang, Piotr Kulicki:
Towards Quantum-Secured Permissioned Blockchain: Signature, Consensus, and Logic. Entropy 21(9): 887 (2019) - [j12]Lu Zhou, Xin Sun, Chunhua Su, Zhe Liu, Kim-Kwang Raymond Choo:
Game theoretic security of quantum bit commitment. Inf. Sci. 479: 503-514 (2019) - 2018
- [j11]Xin Sun, Xishun Zhao, Livio Robaldo:
Norm-based deontic logic for access control, some computational results. Future Gener. Comput. Syst. 79: 295-302 (2018) - [j10]Lu Zhou, Chunhua Su, Xin Sun, Xishun Zhao, Kim-Kwang Raymond Choo:
Stag hunt and trust emergence in social networks. Future Gener. Comput. Syst. 88: 168-172 (2018) - [j9]Lu Zhou, Quanlong Wang, Xin Sun, Piotr Kulicki, Arcangelo Castiglione:
Quantum technique for access control in cloud computing II: Encryption and key distribution. J. Netw. Comput. Appl. 103: 178-184 (2018) - [j8]Xin Sun:
Proof theory, semantics and algebra for normative systems. J. Log. Comput. 28(8): 1757-1779 (2018) - [j7]Lirong Qiu, Xin Sun:
Deontic STIT logic, from logical paradox to security policy. Soft Comput. 22(3): 751-757 (2018) - [j6]Lirong Qiu, Xin Sun, Juan Xu:
Categorical quantum cryptography for access control in cloud computing. Soft Comput. 22(19): 6363-6370 (2018) - [i2]Xin Sun, Quanlong Wang, Piotr Kulicki, Xishun Zhao:
Quantum-enhanced Logic-based Blockchain I: Quantum Honest-success Byzantine Agreement and Qulogicoin. CoRR abs/1805.06768 (2018) - [i1]Xin Sun, Quanlong Wang, Piotr Kulicki:
A Simple Voting Protocol on Quantum Blockchain. CoRR abs/1805.11979 (2018) - 2017
- [j5]Lirong Qiu, Xin Sun, Xishun Zhao:
Realizing correlated equilibrium by secure computation. J. Inf. Secur. Appl. 34: 251-254 (2017) - [j4]Xin Sun, Livio Robaldo:
On the complexity of input/output logic. J. Appl. Log. 25: 69-88 (2017) - [j3]Xin Sun, Xishun Zhao, Livio Robaldo:
Ali Baba and the Thief, Convention Emergence in Games. J. Artif. Soc. Soc. Simul. 20(3) (2017) - [j2]Livio Robaldo, Xin Sun:
Reified Input/Output logic: Combining Input/Output logic and Reification to represent norms coming from existing legislation. J. Log. Comput. 27(8): 2471-2503 (2017) - 2016
- [c15]Xin Sun, Livio Robaldo:
Norm Creation in Proposition Control Games. CLAR 2016: 12-22 - 2015
- [c14]Xin Sun, Beishui Liao:
Probabilistic Argumentation, a Small Step for Uncertainty, a Giant Step for Complexity. EUMAS/AT 2015: 279-286 - [c13]Xin Sun, Livio Robaldo:
Logic and Games for Ethical Agents in Normative Multi-agent Systems. EUMAS/AT 2015: 367-375 - [c12]Livio Robaldo, Llio Humphreys, Xin Sun, Loredana Cupi, Cristiana Santos, Robert Muthuri:
Combining Input/Output Logic and Reification for Representing Real-World Obligations. JSAI-isAI Workshops 2015: 217-232 - [c11]Xin Sun:
Boolean Game with Prioritized Norms. LORI 2015: 341-352 - [c10]Xin Sun, Diego Agustín Ambrossio:
On the Complexity of Input/Output Logic. LORI 2015: 429-434 - [c9]Xin Sun:
Boolean Games with Norms. MIWAI 2015: 61-71 - [c8]Xin Sun, Diego Agustín Ambrossio:
Computational Complexity of Input/Output Logic. MIWAI 2015: 72-79 - [c7]Xin Sun:
Input/Output STIT Logic for Normative Systems. RuleML 2015: 347-359 - 2014
- [j1]Dov M. Gabbay, Loïc Gammaitoni, Xin Sun:
The paradoxes of permission an action based solution. J. Appl. Log. 12(2): 179-191 (2014) - [c6]Xin Sun:
How to Build Input/Output Logic. CLIMA 2014: 123-137 - [c5]Dov M. Gabbay, Livio Robaldo, Xin Sun, Leendert W. N. van der Torre, Zohreh Baniasadi:
Toward a Linguistic Interpretation of Deontic Paradoxes - Beth-Reichenbach Semantics Approach for a New Analysis of the Miners Scenario. DEON 2014: 108-123 - [c4]Xin Sun, Leendert W. N. van der Torre:
Combining Constitutive and Regulative Norms in Input/Output Logic. DEON 2014: 241-257 - [c3]Xin Sun, Zohreh Baniasadi:
STIT Based Deontic Logics for the Miners Puzzle. EUMAS 2014: 236-251 - 2013
- [c2]Xin Sun:
Proof Theory, Semantics and Algebra for Normative Systems. LORI 2013: 228-238 - 2011
- [c1]Xin Sun:
Conditional Ought, a Game Theoretical Perspective. LORI 2011: 356-369
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint