Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (17)
  • Open Access

    ARTICLE

    Proactive Disentangled Modeling of Trigger–Object Pairings for Backdoor Defense

    Kyle Stein1,*, Andrew A. Mahyari1,2, Guillermo Francia III3, Eman El-Sheikh3

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1001-1018, 2025, DOI:10.32604/cmc.2025.068201 - 29 August 2025

    Abstract Deep neural networks (DNNs) and generative AI (GenAI) are increasingly vulnerable to backdoor attacks, where adversaries embed triggers into inputs to cause models to misclassify or misinterpret target labels. Beyond traditional single-trigger scenarios, attackers may inject multiple triggers across various object classes, forming unseen backdoor-object configurations that evade standard detection pipelines. In this paper, we introduce DBOM (Disentangled Backdoor-Object Modeling), a proactive framework that leverages structured disentanglement to identify and neutralize both seen and unseen backdoor threats at the dataset level. Specifically, DBOM factorizes input image representations by modeling triggers and objects as independent primitives in the… More >

  • Open Access

    ARTICLE

    An Effective Adversarial Defense Framework: From Robust Feature Perspective

    Baolin Li1, Tao Hu1,2,3,*, Xinlei Liu1, Jichao Xie1, Peng Yi1,2,3

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2141-2155, 2025, DOI:10.32604/cmc.2025.066370 - 29 August 2025

    Abstract Deep neural networks are known to be vulnerable to adversarial attacks. Unfortunately, the underlying mechanisms remain insufficiently understood, leading to empirical defenses that often fail against new attacks. In this paper, we explain adversarial attacks from the perspective of robust features, and propose a novel Generative Adversarial Network (GAN)-based Robust Feature Disentanglement framework (GRFD) for adversarial defense. The core of GRFD is an adversarial disentanglement structure comprising a generator and a discriminator. For the generator, we introduce a novel Latent Variable Constrained Variational Auto-Encoder (LVCVAE), which enhances the typical beta-VAE with a constrained rectification module… More >

  • Open Access

    ARTICLE

    A Protocol for Conversion of Path-Spin to Spin-Spin Quantum Entanglement

    Indranil Bayal1, Pradipta Panchadhyayee1,2,*

    Journal of Quantum Computing, Vol.5, pp. 71-79, 2023, DOI:10.32604/jqc.2023.045164 - 14 December 2023

    Abstract The present model deals with a protocol which involves the generation and conversion of entanglement from path-spin (P-S) hybrid entanglement associated with half-spin particle to spin-spin (S-S) interparticle entanglement. This protocol finds its applications in quantum information processing via a series of operations which include a beam splitter, spin flipper, spin measurement, classical channel, unitary transformations. Finally, it leads to two particles having completely entangled spin variables, without any requirement of any simultaneous operation on the two particles. More >

  • Open Access

    ARTICLE

    Design and Implementation of Quantum Repeaters: Insights on Quantum Entanglement Purification

    Karoki A. Mũgambi*, Geoffrey O. Okeng’o

    Journal of Quantum Computing, Vol.5, pp. 25-40, 2023, DOI:10.32604/jqc.2023.045654 - 12 December 2023

    Abstract Quantum communication is a groundbreaking technology that is driving the future of information transmission and communication technologies to a new paradigm. It relies on quantum entanglement to facilitate the transmission of quantum states between parties. Quantum repeaters are crucial for facilitating long-distance quantum communication. These quantum devices act as intermediaries between adjacent communication channel segments within a fragmented quantum network, allowing for entanglement swapping between the channel segments. This entanglement swapping process establishes entanglement links between the endpoints of adjacent segments, gradually creating a continuous entanglement connection over the entire length of the transmission channel. More >

  • Open Access

    ARTICLE

    On Factorization of N-Qubit Pure States and Complete Entanglement Analysis of 3-Qubit Pure States Containing Exactly Two Terms and Three Terms

    Dhananjay P. Mehendale1,*, Madhav R. Modak2

    Journal of Quantum Computing, Vol.5, pp. 15-24, 2023, DOI:10.32604/jqc.2023.043370 - 05 December 2023

    Abstract A multi-qubit pure quantum state is called separable when it can be factored as the tensor product of 1-qubit pure quantum states. Factorizing a general multi-qubit pure quantum state into the tensor product of its factors (pure states containing a smaller number of qubits) can be a challenging task, especially for highly entangled states. A new criterion based on the proportionality of the rows of certain associated matrices for the existence of certain factorization and a factorization algorithm that follows from this criterion for systematically extracting all the factors is developed in this paper. 3-qubit More >

  • Open Access

    ARTICLE

    Quantum Cryptography–A Theoretical Overview

    Pratik Roy*, Saptarshi Sahoo, Amit Kumar Mandal, Indranil Basu

    Journal of Quantum Computing, Vol.3, No.4, pp. 151-160, 2021, DOI:10.32604/jqc.2021.019864 - 10 January 2022

    Abstract Quantum Key Distribution seems very promising as it offers unconditional security, that’s why it is being implemented by the tech giants of the networking industry and government. Having quantum phenomenon as a backbone, QKD protocols become indecipherable. Here we have focused on the complexities of quantum key distribution and how this technology has contributed to secure key communication. This article gives an updated overview of this technology and can serve as a guide to get familiar with the current trends of quantum cryptography. More >

  • Open Access

    ARTICLE

    Entanglement and Entropy Squeezing for Moving Two Two-Level Atoms Interaction with a Radiation Field

    S. Abdel-Khalek1,2,*, E. M. Khalil1,3, Beida Alsubei1, A. Al-Barakaty4, S. M. Abo Dahab5

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2445-2456, 2021, DOI:10.32604/cmc.2021.013830 - 28 December 2020

    Abstract In this paper, we analyzed squeezing in the information entropy, quantum state fidelity, and qubit-qubit entanglement in a time-dependent system. The proposed model consists of two qubits that interact with a two-mode electromagnetic field under the dissipation effect. An analytical solution is calculated by considering the constants for the equations of motion. The effect of the general form of the time-dependent for qubit-field coupling and the dissipation term on the temporal behavior of the qubit-qubit entanglement, quantum state fidelity, entropy, and variance squeezing are examined. It is shown that the intervals of entanglement caused more… More >

  • Open Access

    ARTICLE

    Entanglement and Sudden Death for a Two-Mode Radiation Field Two Atoms

    Eman M. A. Hilal1, E. M. Khalil2,3,*, S. Abdel-Khalek2,4

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1227-1236, 2021, DOI:10.32604/cmc.2020.012659 - 26 November 2020

    Abstract The effect of the field–field interaction on a cavity containing two qubit (TQ) interacting with a two mode of electromagnetic field as parametric amplifier type is investigated. After performing an appropriate transformation, the constants of motion are calculated. Using the Schrödinger differential equation a system of differential equations was obtained, and the general solution was obtained in the case of exact resonance. Some statistical quantities were calculated and discussed in detail to describe the features of this system. The collapses and revivals phenomena have been discussed in details. The Shannon information entropy has been applied… More >

  • Open Access

    ARTICLE

    Interpretation of the Entangled States

    D. L. Khokhlov*

    Journal of Quantum Computing, Vol.2, No.3, pp. 147-150, 2020, DOI:10.32604/jqc.2020.014734 - 31 December 2020

    Abstract An interpretation of the entangled states is considered. Two-photon states of photon A on path a and photon B on path b with polarizations H, V are constructed. Two synchronized photons, 1 and 2, can take the paths a and b, with equal probability 50%. In the bases a, b and H, V, the states of the photons form the product states. In the basis 1, 2, the states of the photons form the entangled state. The states of the photons in the bases 1, 2; a, b; H, V are inseparable. The correlation of the photons due to the entanglement in the More >

  • Open Access

    ARTICLE

    Device-Independent Quantum Key Distribution Protocol Based on Hyper-Entanglement

    Yan Chang1, *, Shibin Zhang1, Lili Yan1, Xueyang Li1, Tian Cao1, Qirun Wang2

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 879-896, 2020, DOI:10.32604/cmc.2020.010042 - 23 July 2020

    Abstract The secure key rate of quantum key distribution (QKD) is greatly reduced because of the untrusted devices. In this paper, to raise the secure key rate of QKD, a device-independent quantum key distribution (DIQKD) protocol is proposed based on hyper-entangled states and Bell inequalities. The security of the protocol is analyzed against the individual attack by an adversary only limited by the no-signaling condition. Based on the formalization of Clauser-Horne Shimony-Holt (CHSH) violation measurement on local correlation, the probability of a secure secret bit is obtained, which is produced by a pair of hyper-entangled particles. More >

Displaying 1-10 on page 1 of 17. Per Page