


default search action
Chun-Wei Yang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j32]Chun-Wei Yang
, Jason Lin
, Kai-Lin Wang, Chia-Wei Tsai
:
Cryptanalysis and improvement of a controlled quantum secure direct communication with authentication protocol based on five-particle cluster state. Quantum Inf. Process. 22(5): 196 (2023) - 2022
- [j31]Chun-Wei Yang
, Jason Lin
, Chia-Wei Tsai
, Ching-Lin Cheng:
Cryptanalysis of a Semi-Quantum Bi-Signature Scheme Based on W States. Entropy 24(10): 1408 (2022) - [j30]Chia-Wei Tsai
, Chun-Wei Yang
, Jason Lin
:
Multiparty mediated quantum secret sharing protocol. Quantum Inf. Process. 21(2): 63 (2022) - [j29]Hung-Wen Wang
, Chia-Wei Tsai
, Jason Lin
, Chun-Wei Yang
:
Authenticated Semi-Quantum Key Distribution Protocol Based on W States. Sensors 22(13): 4998 (2022) - [j28]Jason Lin
, Chia-Wei Tsai
, Chun-Wei Yang
, Kuan-Hung Liu:
A Large Payload Data Hiding Scheme Using Scalable Secret Reference Matrix. Symmetry 14(4): 828 (2022) - [j27]Chun-Wei Yang, Thanh Hai Phung, Hong-Han Shuai, Wen-Huang Cheng:
Mask or Non-Mask? Robust Face Mask Detector via Triplet-Consistency Representation Learning. ACM Trans. Multim. Comput. Commun. Appl. 18(1s): 42:1-42:20 (2022) - [c1]Jason Lin
, Chia-Wei Tsai
, Chun-Wei Yang
, Elie Lafortune:
Behavior Profiling of Role-Playing Game Players Based on Heuristic Event Log Mining. ICS 2022: 521-532 - 2021
- [j26]Chia-Wei Tsai
, Jason Lin, Chun-Wei Yang
:
Cryptanalysis and improvement in semi-quantum private comparison based on Bell states. Quantum Inf. Process. 20(3): 120 (2021) - [i4]Chia-Wei Tsai, Chun-Wei Yang, Jason Lin:
Multiparty Mediated Semi-Quantum Secret Sharing Protocol. CoRR abs/2102.06846 (2021) - [i3]Chun-Wei Yang, Thanh Hai Phung, Hong-Han Shuai, Wen-Huang Cheng:
Mask or Non-Mask? Robust Face Mask Detector via Triplet-Consistency Representation Learning. CoRR abs/2110.00523 (2021) - 2020
- [j25]Chun-Wei Yang
:
Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack. Quantum Inf. Process. 19(2): 50 (2020) - [j24]Chun-Wei Yang
, Chia-Wei Tsai
:
Advanced semi-quantum secure direct communication protocol based on bell states against flip attack. Quantum Inf. Process. 19(4): 126 (2020) - [j23]Chun-Wei Yang
, Chia-Wei Tsai
:
Efficient and secure dynamic quantum secret sharing protocol based on bell states. Quantum Inf. Process. 19(5): 162 (2020) - [j22]Chia-Wei Tsai
, Yao-Chung Chang, Ying-Hsun Lai
, Chun-Wei Yang
:
Cryptanalysis of limited resource semi-quantum secret sharing. Quantum Inf. Process. 19(8): 224 (2020)
2010 – 2019
- 2019
- [j21]Chun-Wei Yang
, Chia-Wei Tsai
:
Intercept-and-resend attack and improvement of semiquantum secure direct communication using EPR pairs. Quantum Inf. Process. 18(10): 306 (2019) - [i2]Chia-Wei Tsai, Chun-Wei Yang:
Lightweight Mediated Semi-Quantum Key Distribution Protocol with a Dishonest Third Party based on Bell States. CoRR abs/1909.02788 (2019) - 2017
- [j20]Bo-Hu Li, Baocun Hou, Wentao Yu, Xiaobing Lu, Chun-Wei Yang:
Applications of artificial intelligence in intelligent manufacturing: a review. Frontiers Inf. Technol. Electron. Eng. 18(1): 86-96 (2017) - 2016
- [j19]Chih-Hung Chang, Chun-Wei Yang
, Geng-Rong Hzu, Tzonelih Hwang, Shih-Hung Kao:
Quantum dialogue protocols over collective noise using entanglement of GHZ state. Quantum Inf. Process. 15(7): 2971-2991 (2016) - [j18]Shih-Hung Kao, Chun-Wei Yang
, Tzonelih Hwang:
Fault-tolerant controlled deterministic secure quantum communication using EPR states against collective noise. Quantum Inf. Process. 15(11): 4711-4727 (2016) - 2015
- [j17]Chih-Hung Chang, Yi-Ping Luo, Chun-Wei Yang
, Tzonelih Hwang:
Intercept-and-resend attack on controlled bidirectional quantum direct communication and its improvement. Quantum Inf. Process. 14(9): 3515-3522 (2015) - 2014
- [j16]Tzu-Han Lin, Chun-Wei Yang, Tzonelih Hwang:
Unitary operation attack and the improvement on probabilistic quantum key distribution. Quantum Inf. Comput. 14(9-10): 757-762 (2014) - [j15]Jason Lin
, Chun-Wei Yang
, Tzonelih Hwang:
Quantum private comparison of equality protocol without a third party. Quantum Inf. Process. 13(2): 239-247 (2014) - [j14]Chun-Wei Yang
, Tzonelih Hwang:
Trojan horse attack free fault-tolerant quantum key distribution protocols. Quantum Inf. Process. 13(3): 781-794 (2014) - [j13]Tzonelih Hwang, Yi-Ping Luo, Chun-Wei Yang
, Tzu-Han Lin:
Quantum authencryption: one-step authenticated quantum secure direct communications for off-line communicants. Quantum Inf. Process. 13(4): 925-933 (2014) - [j12]Kun-Fei Yu, Chun-Wei Yang
, Ci-Hong Liao, Tzonelih Hwang:
Authenticated semi-quantum key distribution protocol using Bell states. Quantum Inf. Process. 13(6): 1457-1465 (2014) - [j11]Ci-Hong Liao, Chun-Wei Yang
, Tzonelih Hwang:
Dynamic quantum secret sharing protocol based on GHZ state. Quantum Inf. Process. 13(8): 1907-1916 (2014) - [j10]Chun-Wei Yang
, Yi-Ping Luo, Tzonelih Hwang:
Forgery attack on one-time proxy signature and the improvement. Quantum Inf. Process. 13(9): 2007-2016 (2014) - 2013
- [j9]Chun-Wei Yang
, Tzonelih Hwang, Yi-Ping Luo:
Enhancement on "quantum blind signature based on two-state vector formalism". Quantum Inf. Process. 12(1): 109-117 (2013) - [j8]Chun-Wei Yang
, Tzonelih Hwang:
Quantum dialogue protocols immune to collective noise. Quantum Inf. Process. 12(6): 2131-2142 (2013) - [j7]Chun-Wei Yang
, Shih-Hung Kao, Tzonelih Hwang:
Comment on "Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise". Quantum Inf. Process. 12(8): 2871-2875 (2013) - [j6]Chun-Wei Yang
, Chia-Wei Tsai
, Tzonelih Hwang:
Fault tolerant deterministic quantum communications using GHZ states over collective-noise channels. Quantum Inf. Process. 12(9): 3043-3055 (2013) - [j5]Ci-Hong Liao, Chun-Wei Yang
, Tzonelih Hwang:
Comment on "Dynamic quantum secret sharing". Quantum Inf. Process. 12(10): 3143-3147 (2013) - [j4]Chun-Wei Yang
, Tzonelih Hwang:
Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels. Quantum Inf. Process. 12(10): 3207-3222 (2013) - [j3]Chun-Wei Yang
, Tzonelih Hwang:
Fault tolerant authenticated quantum direct communication immune to collective noises. Quantum Inf. Process. 12(11): 3495-3509 (2013) - 2012
- [j2]Chun-Wei Yang
, Chia-Wei Tsai
, Tzonelih Hwang:
Thwarting intercept-and-resend attack on Zhang's quantum secret sharing using collective rotation noises. Quantum Inf. Process. 11(1): 113-122 (2012) - 2011
- [i1]Jason Lin, Chun-Wei Yang, Chia-Wei Tsai, Tzonelih Hwang:
Intercept-resend attacks on Semiquantum secret sharing and the Improvements. CoRR abs/1106.4908 (2011) - 2010
- [j1]Chun-Wei Yang
, Jau-Ji Shen:
Recover the tampered image based on VQ indexing. Signal Process. 90(1): 331-343 (2010)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint